{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T23:39:42Z","timestamp":1762040382170,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,14]],"date-time":"2021-08-14T00:00:00Z","timestamp":1628899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Geospatial-Intelligence Agency","award":["HM0476-20-1-0011"],"award-info":[{"award-number":["HM0476-20-1-0011"]}]},{"name":"NSF Smart and Connected Communities (SC&C)","award":["CMMI-1831547"],"award-info":[{"award-number":["CMMI-1831547"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,14]]},"DOI":"10.1145\/3447548.3467379","type":"proceedings-article","created":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T06:12:09Z","timestamp":1628748729000},"page":"1191-1201","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Temporal Graph Signal Decomposition"],"prefix":"10.1145","author":[{"given":"Maxwell J.","family":"McNeil","sequence":"first","affiliation":[{"name":"University at Albany \u0096 SUNY, Albany, NY, USA"}]},{"given":"Lin","family":"Zhang","sequence":"additional","affiliation":[{"name":"University at Albany \u0096 SUNY, Albany, NY, USA"}]},{"given":"Petko","family":"Bogdanov","sequence":"additional","affiliation":[{"name":"University at Albany \u0096 SUNY, Albany, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,8,14]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Hubway data visualization challenge:. http:\/\/hubwaydatachallenge.org.  Hubway data visualization challenge:. http:\/\/hubwaydatachallenge.org."},{"key":"e_1_3_2_2_2_1","volume-title":"Graph based anomaly detection and description: a survey. Data mining and knowledge discovery, 29(3):626--688","author":"Akoglu L.","year":"2015","unstructured":"L. Akoglu , H. Tong , and D. Koutra . Graph based anomaly detection and description: a survey. Data mining and knowledge discovery, 29(3):626--688 , 2015 . L. Akoglu, H. Tong, and D. Koutra. Graph based anomaly detection and description: a survey. Data mining and knowledge discovery, 29(3):626--688, 2015."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.64"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bth283"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-21579-2_5"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.124"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000016"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.309"},{"key":"e_1_3_2_2_9_1","first-page":"6775","volume-title":"Advances in Neural Information Processing Systems 31","author":"Cao W.","year":"2018","unstructured":"W. Cao , D. Wang , J. Li , H. Zhou , L. Li , and Y. Li . Brits: Bidirectional recurrent imputation for time series. In S. Bengio, H. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, and R. Garnett, editors , Advances in Neural Information Processing Systems 31 , pages 6775 -- 6785 . Curran Associates, Inc. , 2018 . W. Cao, D. Wang, J. Li, H. Zhou, L. Li, and Y. Li. Brits: Bidirectional recurrent imputation for time series. In S. Bengio, H. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, and R. Garnett, editors, Advances in Neural Information Processing Systems 31, pages 6775--6785. Curran Associates, Inc., 2018."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150467"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209207"},{"key":"e_1_3_2_2_12_1","first-page":"7","volume-title":"AAAI Spring Symposium: Human Behavior Modeling","author":"Dong W.","year":"2009","unstructured":"W. Dong and A. Pentland . A network analysis of road traffic with vehicle tracking data . In AAAI Spring Symposium: Human Behavior Modeling , pages 7 -- 12 , 2009 . W. Dong and A. Pentland. A network analysis of road traffic with vehicle tracking data. In AAAI Spring Symposium: Human Behavior Modeling, pages 7--12, 2009."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2887284"},{"key":"e_1_3_2_2_14_1","volume-title":"Reality mining: sensing complex social systems. Personal and ubiquitous computing, 10(4):255--268","author":"Eagle N.","year":"2006","unstructured":"N. Eagle and A. S. Pentland . Reality mining: sensing complex social systems. Personal and ubiquitous computing, 10(4):255--268 , 2006 . N. Eagle and A. S. Pentland. Reality mining: sensing complex social systems. Personal and ubiquitous computing, 10(4):255--268, 2006."},{"issue":"12","key":"e_1_3_2_2_15_1","first-page":"3736","article-title":"Image denoising via sparse and redundant representations over learned dictionaries","volume":"15","author":"Elad M.","year":"2006","unstructured":"M. Elad and M. Aharon . Image denoising via sparse and redundant representations over learned dictionaries . IEEE TIP , 15 ( 12 ): 3736 -- 3745 , 2006 . M. Elad and M. Aharon. Image denoising via sparse and redundant representations over learned dictionaries. IEEE TIP, 15(12):3736--3745, 2006.","journal-title":"IEEE TIP"},{"key":"e_1_3_2_2_16_1","volume-title":"Spline regression with automatic knot selection. arXiv preprint arXiv:1808.01770","author":"Goepp V.","year":"2018","unstructured":"V. Goepp , O. Bouaziz , and G. Nuel . Spline regression with automatic knot selection. arXiv preprint arXiv:1808.01770 , 2018 . V. Goepp, O. Bouaziz, and G. Nuel. Spline regression with automatic knot selection. arXiv preprint arXiv:1808.01770, 2018."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220118"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783313"},{"key":"e_1_3_2_2_19_1","first-page":"1","article-title":"Imputation of missing network data: Some simple procedures","volume":"10","author":"Huisman M.","year":"2009","unstructured":"M. Huisman . Imputation of missing network data: Some simple procedures . Journal of Social Structure , 10 : 1 -- 29 , 2009 . M. Huisman. Imputation of missing network data: Some simple procedures. Journal of Social Structure, 10:1--29, 2009.","journal-title":"Journal of Social Structure"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488693"},{"issue":"2065","key":"e_1_3_2_2_21_1","first-page":"20150202","article-title":"Principal component analysis: a review and recent developments. Philosophical Transactions of the Royal Society A: Mathematical","volume":"374","author":"Jolliffe I. T.","year":"2016","unstructured":"I. T. Jolliffe and J. Cadima . Principal component analysis: a review and recent developments. Philosophical Transactions of the Royal Society A: Mathematical , Physical and Engineering Sciences , 374 ( 2065 ): 20150202 , 2016 . I. T. Jolliffe and J. Cadima. Principal component analysis: a review and recent developments. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 374(2065):20150202, 2016.","journal-title":"Physical and Engineering Sciences"},{"key":"e_1_3_2_2_22_1","volume-title":"A review of network traffic analysis and prediction techniques. arXiv preprint arXiv:1507.05722","author":"Joshi M.","year":"2015","unstructured":"M. Joshi and T. H. Hadi . A review of network traffic analysis and prediction techniques. arXiv preprint arXiv:1507.05722 , 2015 . M. Joshi and T. H. Hadi. A review of network traffic analysis and prediction techniques. arXiv preprint arXiv:1507.05722, 2015."},{"key":"e_1_3_2_2_23_1","volume-title":"Matrix completion on graphs. arXiv preprint arXiv:1408.1717","author":"Kalofolias V.","year":"2014","unstructured":"V. Kalofolias , X. Bresson , M. Bronstein , and P. Vandergheynst . Matrix completion on graphs. arXiv preprint arXiv:1408.1717 , 2014 . V. Kalofolias, X. Bresson, M. Bronstein, and P. Vandergheynst. Matrix completion on graphs. arXiv preprint arXiv:1408.1717, 2014."},{"key":"e_1_3_2_2_24_1","volume-title":"Semi-supervised classification with graph convolutional networks. CoRR, abs\/1609.02907","author":"Kipf T. N.","year":"2016","unstructured":"T. N. Kipf and M. Welling . Semi-supervised classification with graph convolutional networks. CoRR, abs\/1609.02907 , 2016 . T. N. Kipf and M. Welling. Semi-supervised classification with graph convolutional networks. CoRR, abs\/1609.02907, 2016."},{"key":"e_1_3_2_2_25_1","volume-title":"Dynamic graph collaborative filtering. arXiv preprint arXiv:2101.02844","author":"Li X.","year":"2021","unstructured":"X. Li , M. Zhang , S. Wu , Z. Liu , L. Wang , and P. S. Yu . Dynamic graph collaborative filtering. arXiv preprint arXiv:2101.02844 , 2021 . X. Li, M. Zhang, S. Wu, Z. Liu, L. Wang, and P. S. Yu. Dynamic graph collaborative filtering. arXiv preprint arXiv:2101.02844, 2021."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835942"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2365801"},{"key":"e_1_3_2_2_28_1","volume-title":"The augmented lagrange multiplier method for exact recovery of corrupted low-rank matrices. ArXiv, abs\/1009.5055","author":"Lin Z.","year":"2013","unstructured":"Z. Lin , M. Chen , and Y. Ma . The augmented lagrange multiplier method for exact recovery of corrupted low-rank matrices. ArXiv, abs\/1009.5055 , 2013 . Z. Lin, M. Chen, and Y. Ma. The augmented lagrange multiplier method for exact recovery of corrupted low-rank matrices. ArXiv, abs\/1009.5055, 2013."},{"key":"e_1_3_2_2_29_1","volume-title":"Perceids: Periodic community detection","author":"Lin Zhang A. G.","year":"2019","unstructured":"A. G. Lin Zhang and P. Bogdanov . Perceids: Periodic community detection . In IEEE ICDM (ICDM) , 2019 . A. G. Lin Zhang and P. Bogdanov. Perceids: Periodic community detection. In IEEE ICDM (ICDM), 2019."},{"key":"e_1_3_2_2_30_1","first-page":"531","volume-title":"Coupled clustering of time-series and networks. In 2019 SIAM ICDM","author":"Liu Y.","year":"2019","unstructured":"Y. Liu , L. Zhu , P. Szekely , A. Galstyan , and D. Koutra . Coupled clustering of time-series and networks. In 2019 SIAM ICDM , pages 531 -- 539 . SIAM , 2019 . Y. Liu, L. Zhu, P. Szekely, A. Galstyan, and D. Koutra. Coupled clustering of time-series and networks. In 2019 SIAM ICDM, pages 531--539. SIAM, 2019."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-813677-5.00009-2"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.107000"},{"key":"e_1_3_2_2_33_1","first-page":"1651","volume-title":"NIPS","author":"Mitra K.","year":"2010","unstructured":"K. Mitra , S. Sheorey , and R. Chellappa . Large-scale matrix factorization with missing data under additional constraints . In NIPS , pages 1651 -- 1659 , 2010 . K. Mitra, S. Sheorey, and R. Chellappa. Large-scale matrix factorization with missing data under additional constraints. In NIPS, pages 1651--1659, 2010."},{"key":"e_1_3_2_2_34_1","volume-title":"Geometric matrix completion with recurrent multi-graph neural networks. CoRR, abs\/1704.06803","author":"Monti F.","year":"2017","unstructured":"F. Monti , M. M. Bronstein , and X. Bresson . Geometric matrix completion with recurrent multi-graph neural networks. CoRR, abs\/1704.06803 , 2017 . F. Monti, M. M. Bronstein, and X. Bresson. Geometric matrix completion with recurrent multi-graph neural networks. CoRR, abs\/1704.06803, 2017."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.32614\/RJ-2017-009"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2928130"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2820126"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2726969"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487692"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-6629-0"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2235192"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113347"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186118"},{"issue":"8","key":"e_1_3_2_2_44_1","first-page":"2123","article-title":"Short-term traffic prediction based on dynamic tensor completion","volume":"17","author":"Tan H.","year":"2016","unstructured":"H. Tan , Y. Wu , B. Shen , P. J. Jin , and B. Ran . Short-term traffic prediction based on dynamic tensor completion . IEEE Transactions on ITS , 17 ( 8 ): 2123 -- 2133 , 2016 . H. Tan, Y. Wu, B. Shen, P. J. Jin, and B. Ran. Short-term traffic prediction based on dynamic tensor completion. IEEE Transactions on ITS, 17(8):2123--2133, 2016.","journal-title":"IEEE Transactions on ITS"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2434318"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1978.10489693"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.79"},{"key":"e_1_3_2_2_48_1","volume-title":"Communications (ICC), 2015 IEEE International Conference on","author":"Xiaming C.","year":"2015","unstructured":"C. Xiaming , J. Yaohui , Q. Siwei , H. Weisheng , and J. Kaida . Analyzing and modeling spatio-temporal dependence of cellular traffic at city scale . In Communications (ICC), 2015 IEEE International Conference on , 2015 . C. Xiaming, J. Yaohui, Q. Siwei, H. Weisheng, and J. Kaida. Analyzing and modeling spatio-temporal dependence of cellular traffic at city scale. In Communications (ICC), 2015 IEEE International Conference on, 2015."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.12328"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.2899822"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33017370"},{"key":"e_1_3_2_2_52_1","volume-title":"Spatio-temporal graph convolutional neural network: A deep learning framework for traffic forecasting. CoRR, abs\/1709.04875","author":"Yu B.","year":"2017","unstructured":"B. Yu , H. Yin , and Z. Zhu . Spatio-temporal graph convolutional neural network: A deep learning framework for traffic forecasting. CoRR, abs\/1709.04875 , 2017 . B. Yu, H. Yin, and Z. Zhu. Spatio-temporal graph convolutional neural network: A deep learning framework for traffic forecasting. CoRR, abs\/1709.04875, 2017."},{"key":"e_1_3_2_2_53_1","volume-title":"Neural network forecasting for seasonal and trend time series. European journal of operational research, 160(2):501--514","author":"Zhang G. P.","year":"2005","unstructured":"G. P. Zhang and M. Qi . Neural network forecasting for seasonal and trend time series. European journal of operational research, 160(2):501--514 , 2005 . G. P. Zhang and M. Qi. Neural network forecasting for seasonal and trend time series. European journal of operational research, 160(2):501--514, 2005."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975673.38"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2430359"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939824"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6247828"}],"event":{"name":"KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Virtual Event Singapore","acronym":"KDD '21"},"container-title":["Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447548.3467379","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3447548.3467379","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447548.3467379","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447548.3467379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:23Z","timestamp":1750191503000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447548.3467379"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,14]]},"references-count":57,"alternative-id":["10.1145\/3447548.3467379","10.1145\/3447548"],"URL":"https:\/\/doi.org\/10.1145\/3447548.3467379","relation":{},"subject":[],"published":{"date-parts":[[2021,8,14]]},"assertion":[{"value":"2021-08-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}