{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:01:06Z","timestamp":1755993666870,"version":"3.44.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T00:00:00Z","timestamp":1751932800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T00:00:00Z","timestamp":1751932800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,8]]},"DOI":"10.23919\/acc63710.2025.11108047","type":"proceedings-article","created":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:17:51Z","timestamp":1755800271000},"page":"1765-1770","source":"Crossref","is-referenced-by-count":0,"title":["An SVD-like Decomposition of Functions with Finite 2-induced Norm"],"prefix":"10.23919","author":[{"given":"Brian Charles","family":"Brown","sequence":"first","affiliation":[{"name":"Brigham Young University,Department of Computer Science,UT,84602"}]},{"given":"Michael","family":"King","sequence":"additional","affiliation":[{"name":"Brigham Young University,Department of Computer Science,UT,84602"}]},{"given":"Sean","family":"Warnick","sequence":"additional","affiliation":[{"name":"Brigham Young University,Department of Computer Science,UT,84602"}]},{"given":"Enoch","family":"Yeung","sequence":"additional","affiliation":[{"name":"University of California,Department of Mechanical Engineering,Santa Barbara,CA,93106"}]},{"given":"David","family":"Grimsman","sequence":"additional","affiliation":[{"name":"Brigham Young University,Department of Computer Science,UT,84602"}]}],"member":"263","reference":[{"volume-title":"Functional Analysis","year":"2000","author":"Bachman","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-7171(85)80012-2"},{"key":"ref3","article-title":"Histoire du Th\u00e9or\u00e8me de Jordan de La D\u00e9composition Matricielle (1870-1930). Formes de Repr\u00e9sentation et M\u00e9thodes de D\u00e9composition","volume-title":"PhD thesis","author":"Brechenmacher","year":"2006"},{"article-title":"An svd-like decomposition of bounded-input bounded-output functions","year":"2024","author":"Brown","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1137\/21M1401243"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1017\/S0962492900000015"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.23919\/ACC45564.2020.9148000"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/BF02288367"},{"key":"ref9","first-page":"21","article-title":"M\u00e9moire sur la propagation de la chaleur dans les corps solides,(nepublikov\u00e1no) pro institute de france","author":"Fourier","year":"1807","journal-title":"Paris, pod\u00e1no"},{"article-title":"Theory and applications of correspondence analysis","year":"1984","author":"Greenacre","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139020411"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2024.106177"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2018.8431525"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35713-9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcp.2024.112795"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-fluid-011212-140652"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1090\/noti2306"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-7643-7778-6","volume-title":"Wavelet Analysis and Applications","author":"Qian","year":"2007"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.29172\/766cdcd9-f515-4656-afc1-7eae7766ec6c"},{"article-title":"Nonlinear svd with asymmetric kernels: Feature learning and asymmetric nystr\\\" om method","year":"2023","author":"Tao","key":"ref20"},{"article-title":"A non-linear generalization of singular value decomposition and its application to cryptanalysis","year":"2007","author":"Vaidya","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1137\/0713009"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/acc.2019.8815339"},{"key":"ref24","first-page":"421","article-title":"Machine learning by function decomposition","volume-title":"ICML","author":"Zupan"}],"event":{"name":"2025 American Control Conference (ACC)","start":{"date-parts":[[2025,7,8]]},"location":"Denver, CO, USA","end":{"date-parts":[[2025,7,10]]}},"container-title":["2025 American Control Conference (ACC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11107441\/11107442\/11108047.pdf?arnumber=11108047","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T23:57:44Z","timestamp":1755907064000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11108047\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,8]]},"references-count":24,"URL":"https:\/\/doi.org\/10.23919\/acc63710.2025.11108047","relation":{},"subject":[],"published":{"date-parts":[[2025,7,8]]}}}