Author of the publication

A modified augmented lagrange multiplier algorithm for toeplitz matrix completion.

, , and . Adv. Comput. Math., 42 (5): 1209-1224 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SVDinsTN: An Integrated Method for Tensor Network Representation with Efficient Structure Search., , , , , , and . CoRR, (2023)Investigation on Key Techniques of Measurement Device of Position and Attitude Applied in Large-Scale Pushing Bridge Construction Machinery., , , and . RAM, page 697-701. IEEE, (2008)Maintenance Organization Value Chain Analysis and Its Formalization., , and . ICAIC (3), volume 226 of Communications in Computer and Information Science, page 289-296. Springer, (2011)A Data- and Workload-Aware Algorithm for Range Queries Under Differential Privacy., , , and . CoRR, (2014)Efficient Batch Query Answering Under Differential Privacy, and . CoRR, (2011)Coverage probability of the downlink in heterogeneous cellular networks considering the effect of user clustering around spatially depended social attractors., , and . CAMAD, page 48-52. IEEE, (2016)A complexity measure for military communication networks., , , , and . MILCOM, page 1708-1713. IEEE, (2011)A Time-Space Attribute-Based Evidence Fixing Method in Digital Forensics., , and . TSA, page 127-131. IEEE, (2016)Optimal error of query sets under the differentially-private matrix mechanism., and . ICDT, page 272-283. ACM, (2013)Optimizing linear counting queries under differential privacy., , , , and . PODS, page 123-134. ACM, (2010)