2015
DOI: 10.1109/tit.2015.2403263
|View full text |Cite
|
Sign up to set email alerts
|

Distributed iterative thresholding for ℓ0/ℓ1-regularized linear inverse problems

Abstract: The 0 / 1 -regularized least-squares approach is used to deal with linear inverse problems under sparsity constraints, which arise in mathematical and engineering fields. In particular, multiagent models have recently emerged in this context to describe diverse kinds of networked systems, ranging from medical databases to wireless sensor networks. In this paper, we study methods for solving 0 / 1 -regularized leastsquares problems in such multiagent systems. We propose a novel class of distributed protocols ba… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
59
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 55 publications
(59 citation statements)
references
References 43 publications
(108 reference statements)
0
59
0
Order By: Relevance
“…In PG-EXTRA, we use the Metropolis constant edge weight for W andW = I+W 2 , and a constant step size α. We compare PG-EXTRA with the recent work DISTA [25], [26], which has two free parameters: temperature parameter q ∈ (0, 1) and τ ≤ M (i) −2 2 , ∀i. We have hand optimized q and show the effect of τ in our experiment.…”
Section: B Decentralized Compressed Sensingmentioning
confidence: 99%
“…In PG-EXTRA, we use the Metropolis constant edge weight for W andW = I+W 2 , and a constant step size α. We compare PG-EXTRA with the recent work DISTA [25], [26], which has two free parameters: temperature parameter q ∈ (0, 1) and τ ≤ M (i) −2 2 , ∀i. We have hand optimized q and show the effect of τ in our experiment.…”
Section: B Decentralized Compressed Sensingmentioning
confidence: 99%
“…The partitioning style depends on data availability, computational considerations, and privacy concerns. Both types of partitioning result in reduced storage requirements per node and faster computation [8][9][10][11][12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…A secure average consensus-based time synchronization protocol is proposed in [28]. Consensus-based D-LS Using ADMM [29] DiCE: introducing new consensus constraints to reduce exchanged message [30] Fast-DiCE: fast convergence by using Nesterov's optimal gradient descend method [31] Consensus-based D-LS with quantization and communication noise [32] Consensus-based D-TLS [34] IPI-based D-TLS: reduced computational complexity [35] Two stage consensus-based solution for L norm regularization [36] Three stage solution with low complexity and memory requirement [37] PSSE: iteratively exclude abnormal values [38] Consensus-based framework from both attacker and defender aspects [39] …”
Section: Efficiencymentioning
confidence: 99%
“…A model-robust adaptation is also adopted to control the approximation error caused by spatial quantization. An iterative thresholding and input driven consensus-based three-step method appears in [37] with low complexity and memory requirement. In order to obtain robust power state estimation, [38] proposes a distributed PSSE estimator based on ADMM to iteratively exclude the abnormal values.…”
Section: In-network Regression Consensusmentioning
confidence: 99%