{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T19:57:11Z","timestamp":1774382231082,"version":"3.50.1"},"reference-count":178,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2014,12,19]],"date-time":"2014-12-19T00:00:00Z","timestamp":1418947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000121","name":"Division of Mathematical Sciences","doi-asserted-by":"publisher","award":["DMS1106738"],"award-info":[{"award-number":["DMS1106738"]}],"id":[{"id":"10.13039\/100000121","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["GM59507 and CA154295"],"award-info":[{"award-number":["GM59507 and CA154295"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002920","name":"Research Grants Council, University Grants Committee, Hong Kong","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2015,1,8]]},"abstract":"<jats:p>Low-rank modeling generally refers to a class of methods that solves problems by representing variables of interest as low-rank matrices. It has achieved great success in various fields including computer vision, data mining, signal processing, and bioinformatics. Recently, much progress has been made in theories, algorithms, and applications of low-rank modeling, such as exact low-rank matrix recovery via convex programming and matrix completion applied to collaborative filtering. These advances have brought more and more attention to this topic. In this article, we review the recent advances of low-rank modeling, the state-of-the-art algorithms, and the related applications in image analysis. We first give an overview of the concept of low-rank modeling and the challenging problems in this area. Then, we summarize the models and algorithms for low-rank matrix recovery and illustrate their advantages and limitations with numerical experiments. Next, we introduce a few applications of low-rank modeling in the context of image analysis. Finally, we conclude this article with some discussions.<\/jats:p>","DOI":"10.1145\/2674559","type":"journal-article","created":{"date-parts":[[2014,12,22]],"date-time":"2014-12-22T13:53:23Z","timestamp":1419256403000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":126,"title":["Low-Rank Modeling and Its Applications in Image Analysis"],"prefix":"10.1145","volume":"47","author":[{"given":"Xiaowei","family":"Zhou","sequence":"first","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, China"}]},{"given":"Can","family":"Yang","sequence":"additional","affiliation":[{"name":"Hong Kong Baptist University, Hong Kong, China"}]},{"given":"Hongyu","family":"Zhao","sequence":"additional","affiliation":[{"name":"Yale University, New Haven, CT"}]},{"given":"Weichuan","family":"Yu","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2014,12,19]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1033213"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00180-013-0441-6"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126536"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.2197748"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of Annual Allerton Conference on Communication, Control, and Computing.","author":"Balzano L."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1177153"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1137\/080716542"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/344779.344972"},{"key":"e_1_2_1_9_1","volume-title":"Nonlinear Programming","author":"Bertsekas D."},{"key":"e_1_2_1_10_1","unstructured":"C. M. Bishop. 1999. Bayesian PCA. In Advances in Neural Information Processing Systems 382--388.   C. M. Bishop. 1999. Bayesian PCA. In Advances in Neural Information Processing Systems 382--388."},{"key":"e_1_2_1_11_1","unstructured":"C. M. Bishop etal 2006. Pattern Recognition and Machine Learning. Springer New York.   C. M. Bishop et al. 2006. Pattern Recognition and Machine Learning. Springer New York."},{"key":"e_1_2_1_12_1","unstructured":"A. Blake and M. Isard. 2000. Active Contours. Springer.  A. Blake and M. Isard. 2000. Active Contours. Springer."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.acha.2009.04.002"},{"key":"e_1_2_1_14_1","first-page":"406","volume-title":"Advances in Neural Information Processing Systems","author":"Boumal N.","year":"2011"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2638581"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000016"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/645315.649157"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","author":"Bregler C."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.118"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01397471"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mri.2006.03.006"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.309"},{"key":"e_1_2_1_23_1","unstructured":"J. Cai and S. Osher. 2010. Fast singular value thresholding without singular value decomposition. UCLA CAM Report 5.  J. Cai and S. Osher. 2010. Fast singular value thresholding without singular value decomposition. UCLA CAM Report 5."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1137\/080738970"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2014.2319055"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2035722"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10208-009-9045-5"},{"key":"e_1_2_1_28_1","doi-asserted-by":"crossref","unstructured":"E. Cand\u00e8s X. Li Y. Ma and J. Wright. 2011. Robust principal component analysis&quest; Journal of the ACM 58 3 11.  E. Cand\u00e8s X. Li Y. Ma and J. Wright. 2011. Robust principal component analysis&quest; Journal of the ACM 58 3 11.","DOI":"10.1145\/1970392.1970395"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2270464"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2044061"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1137\/090761793"},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","author":"Chen C."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-008-0135-7"},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the International Conference on Machine Learning.","author":"Chen Y."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126528"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the IEEE International Symposium on Biomedical Imaging.","author":"Christodoulou A."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.58320"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.1995.1004"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.927467"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.161"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33718-5_44"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2144977"},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","author":"Dai Y."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1023709501986"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2156801"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1021669406132"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02288367"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0895479895290954"},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","author":"Eriksson A."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1088\/0031-9155\/56\/11\/002"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33715-4_50"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-012-0607-7"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020426"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.927464"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2104999"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.366"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2013.2293974"},{"key":"e_1_2_1_59_1","volume-title":"Proceedings of the IEEE International Symposium on Biomedical Imaging.","author":"Haldar J."},{"key":"e_1_2_1_60_1","volume-title":"Proceedings of the IEEE International Symposium on Biomedical Imaging.","author":"Haldar J."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2009.2018223"},{"key":"e_1_2_1_62_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","author":"He J."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0071325"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016372015744"},{"key":"e_1_2_1_65_1","volume-title":"Proceedings of Advances in Neural Information Processing Systems.","author":"Jain P."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488693"},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","author":"Ji H."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553434"},{"key":"e_1_2_1_69_1","volume-title":"Principal Component Analysis","author":"Jolliffe I. T."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.309"},{"key":"e_1_2_1_71_1","volume-title":"Proceedings of Annual Allerton Conference on Communication, Control, and Computing.","author":"Keshavan R. H."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2046205"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1859920"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.41390"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.114"},{"key":"e_1_2_1_77_1","first-page":"425","volume-title":"International Conference on Artificial Intelligence and Statistics","author":"Lakshminarayanan B."},{"key":"e_1_2_1_78_1","volume-title":"Proceedings of the IEEE International Symposium on Biomedical Imaging.","author":"Lam F."},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.5555\/1046920.1194904"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1038\/44565"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054251"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.92"},{"key":"e_1_2_1_83_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","author":"Leventon M."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.836169"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2013.12.005"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33715-4_35"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/NFSI-ICFBI.2007.4387720"},{"key":"e_1_2_1_88_1","unstructured":"Z. Lin M. Chen and Y. Ma. 2010. The augmented Lagrange multiplier method for exact recovery of corrupted low-rank matrices. arXiv preprint arXiv:1009.5055.  Z. Lin M. Chen and Y. Ma. 2010. The augmented Lagrange multiplier method for exact recovery of corrupted low-rank matrices. arXiv preprint arXiv:1009.5055."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2010.2100850"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2013.2255133"},{"key":"e_1_2_1_91_1","volume-title":"Proceedings of the International Conference on Machine Learning.","author":"Liu G."},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.526"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.914728"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-009-0306-5"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1088\/0954-898X_6_3_011"},{"key":"e_1_2_1_96_1","unstructured":"L. W. Mackey M. I. Jordan and A. Talwalkar. 2011. Divide-and-conquer matrix factorization. In Advances in Neural Information Processing Systems.  L. W. Mackey M. I. Jordan and A. Talwalkar. 2011. Divide-and-conquer matrix factorization. In Advances in Neural Information Processing Systems."},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mri.2011.07.021"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mri.2010.09.001"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.258082"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.2212015"},{"key":"e_1_2_1_101_1","volume-title":"Implementation, Applications","author":"Markovsky I."},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1859931"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.169"},{"key":"e_1_2_1_104_1","volume-title":"Proceedings of the International Conference on Machine Learning.","author":"Meyer G."},{"key":"e_1_2_1_105_1","unstructured":"M. Michenkov\u00e1. 2011. Numerical algorithms for low-rank matrix completion problems http:\/\/www.math. ethz.ch\/&sim;kressner\/students\/michenkova.pdf.  M. Michenkov\u00e1. 2011. Numerical algorithms for low-rank matrix completion problems http:\/\/www.math. ethz.ch\/&sim;kressner\/students\/michenkova.pdf."},{"key":"e_1_2_1_106_1","unstructured":"B. Mishra K. A. Apuroop and R. Sepulchre. 2012. A Riemannian geometry for low-rank matrix completion. arXiv preprint arXiv:1211.1550.  B. Mishra K. A. Apuroop and R. Sepulchre. 2012. A Riemannian geometry for low-rank matrix completion. arXiv preprint arXiv:1211.1550."},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1137\/110859646"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00180-013-0464-z"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.5555\/2503308.2503351"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.24033\/bsmf.1625"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.acha.2008.07.002"},{"key":"e_1_2_1_112_1","first-page":"372","article-title":"A method of solving a convex programming problem with convergence rate 0(1\/k2)","volume":"27","author":"Nesterov Y.","year":"1983","journal-title":"Soviet Mathematics Doklady"},{"key":"e_1_2_1_114_1","unstructured":"T. Ngo and Y. Saad. 2012. Scaled gradients on grassmann manifolds for matrix completion. In Advances in Neural Information Processing Systems.  T. Ngo and Y. Saad. 2012. Scaled gradients on grassmann manifolds for matrix completion. In Advances in Neural Information Processing Systems."},{"key":"e_1_2_1_115_1","volume-title":"Proceedings of the IEEE International Symposium on Biomedical Imaging.","author":"Nguyen H."},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.160"},{"key":"e_1_2_1_117_1","unstructured":"B. O\u2019Donoghue and E. Candes. 2012. Adaptive restart for accelerated gradient schemes. Foundations of Computational Mathematics 1--18.  B. O\u2019Donoghue and E. Candes. 2012. Adaptive restart for accelerated gradient schemes. Foundations of Computational Mathematics 1--18."},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-006-9785-5"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126324"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.868684"},{"key":"e_1_2_1_121_1","volume-title":"Proceedings of the SPIE Optical Engineering &plus; Applications.","author":"Otazo R."},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.74"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.282"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1118\/1.3160108"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.191"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12532-013-0053-8"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1137\/070697835"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102441"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-007-0075-7"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390267"},{"key":"e_1_2_1_131_1","unstructured":"R. Salakhutdinov and A. Mnih. 2008b. Probabilistic matrix factorization. In Advances in Neural Information Processing Systems.  R. Salakhutdinov and A. Mnih. 2008b. Probabilistic matrix factorization. In Advances in Neural Information Processing Systems."},{"key":"e_1_2_1_132_1","first-page":"429","article-title":"Online learning in the embedded manifold of low-rank matrices","volume":"13","author":"Shalit U.","year":"2012","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_2_1_133_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","author":"Shen X."},{"key":"e_1_2_1_134_1","doi-asserted-by":"crossref","unstructured":"P. J. Shin P. E. Larson M. A. Ohliger M. Elad J. M. Pauly D. B. Vigneron and M. Lustig. 2013. Calibrationless parallel imaging reconstruction based on structured low-rank matrix completion. In Magnetic Resonance in Medicine.  P. J. Shin P. E. Larson M. A. Ohliger M. Elad J. M. Pauly D. B. Vigneron and M. Lustig. 2013. Calibrationless parallel imaging reconstruction based on structured low-rank matrix completion. In Magnetic Resonance in Medicine.","DOI":"10.1002\/mrm.24997"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.495"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.406651"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.5555\/3121525.3121550"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.4.000519"},{"key":"e_1_2_1_139_1","first-page":"1329","article-title":"Maximum-margin matrix factorization","volume":"17","author":"Srebro N.","year":"2005","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2161471"},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1162\/15324430152748236"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9868.00196"},{"key":"e_1_2_1_143_1","first-page":"615","article-title":"An accelerated proximal gradient algorithm for nuclear norm regularized linear least squares problems","volume":"6","author":"Toh K.","year":"2010","journal-title":"Pacific Journal of Optimization"},{"key":"e_1_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00129684"},{"key":"e_1_2_1_145_1","volume-title":"Proceedings of the International Conference on Machine Learning.","author":"Tomioka R."},{"key":"e_1_2_1_146_1","volume-title":"Proceedings of the European Conference on Computer Vision.","author":"Torresani L."},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.939537"},{"key":"e_1_2_1_148_1","volume-title":"Proceedings of the SPIE Optical Engineering&plus; Applications.","author":"Trzasko J. D.","year":"2013"},{"key":"e_1_2_1_149_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","author":"Tsai A."},{"key":"e_1_2_1_150_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","author":"Turk M. A."},{"key":"e_1_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1137\/110845768"},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.939739"},{"key":"e_1_2_1_153_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","author":"Vidal R."},{"key":"e_1_2_1_154_1","volume-title":"Proceedings of the European Conference on Computer Vision.","author":"Vidal R."},{"key":"e_1_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.224"},{"key":"e_1_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33786-4_10"},{"key":"e_1_2_1_157_1","volume-title":"Sparcs: Recovering low-rank and sparse matrices from compressive measurements. In Advances in Neural Information Processing Systems.","author":"Waters A. E.","year":"2011"},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12532-012-0044-1"},{"key":"e_1_2_1_159_1","volume-title":"Proceedings of the IEEE International Symposium on Information Theory.","author":"Wright J."},{"key":"e_1_2_1_160_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-005-3962-9"},{"key":"e_1_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2173156"},{"key":"e_1_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11464-012-0194-5"},{"key":"e_1_2_1_163_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","author":"Yang C."},{"key":"e_1_2_1_164_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","author":"Ye G."},{"key":"e_1_2_1_165_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33715-4_24"},{"key":"e_1_2_1_166_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","author":"Zhang D."},{"key":"e_1_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2250577"},{"key":"e_1_2_1_168_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33783-3_34"},{"key":"e_1_2_1_169_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.42"},{"key":"e_1_2_1_170_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.93"},{"key":"e_1_2_1_171_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-012-0515-x"},{"key":"e_1_2_1_172_1","volume-title":"Proceedings of the IEEE International Symposium on Biomedical Imaging.","author":"Zhao B."},{"key":"e_1_2_1_173_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2012.2203921"},{"key":"e_1_2_1_174_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","author":"Zheng Y."},{"key":"e_1_2_1_175_1","volume-title":"Proceedings of the International Conference on Machine Learning.","author":"Zhou T."},{"key":"e_1_2_1_176_1","volume-title":"Proceedings of SPIE Defense, Security, and Sensing.","author":"Zhou X."},{"key":"e_1_2_1_177_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.382"},{"key":"e_1_2_1_178_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.132"},{"key":"e_1_2_1_179_1","volume-title":"Proceedings of the IEEE International Symposium on Information Theory.","author":"Zhou Z."},{"key":"e_1_2_1_180_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2009.2031063"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2674559","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2674559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:49Z","timestamp":1750229749000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2674559"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,19]]},"references-count":178,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,1,8]]}},"alternative-id":["10.1145\/2674559"],"URL":"https:\/\/doi.org\/10.1145\/2674559","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,19]]},"assertion":[{"value":"2014-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-12-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}