{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:10:20Z","timestamp":1725739820113},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,9,3]],"date-time":"2021-09-03T00:00:00Z","timestamp":1630627200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,3]],"date-time":"2021-09-03T00:00:00Z","timestamp":1630627200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11971138","11661007"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Optim Appl"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s10589-021-00315-1","type":"journal-article","created":{"date-parts":[[2021,9,3]],"date-time":"2021-09-03T19:38:54Z","timestamp":1630697934000},"page":"883-913","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["T-product factorization method for internet traffic data completion with spatio-temporal regularization"],"prefix":"10.1007","volume":"80","author":[{"given":"Chen","family":"Ling","sequence":"first","affiliation":[]},{"given":"Gaohang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Liqun","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Yanwei","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,3]]},"reference":[{"key":"315_CR1","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.chemolab.2010.08.004","volume":"106","author":"E Acar","year":"2011","unstructured":"Acar, E., Dunlavy, D.M., Kolda, T.G., M\u00f8rup, M.: Scalable tensor factorizations for incomplete data. Chemom. Intell. Lab. Syst. 106, 41\u201356 (2011)","journal-title":"Chemom. Intell. Lab. Syst."},{"issue":"4","key":"315_CR2","doi-asserted-by":"publisher","first-page":"569","DOI":"10.3934\/nhm.2006.1.569","volume":"1","author":"D Alderson","year":"2006","unstructured":"Alderson, D., Chang, H., Roughan, M., Uhlig, S., Willinger, W.: The many facets of internet topology and traffic. Netw. Heterog. Media 1(4), 569\u2013600 (2006)","journal-title":"Netw. Heterog. Media"},{"key":"315_CR3","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1137\/120887679","volume":"23","author":"A Beck","year":"2013","unstructured":"Beck, A., Tetruashvili, L.: On the convergence of block corrdinate descent type methods. SIAM J. Optim. 23, 2037\u20132060 (2013)","journal-title":"SIAM J. Optim."},{"key":"315_CR4","volume-title":"Generalized Inverses: Theory and Applications","author":"A Ben-Israel","year":"2003","unstructured":"Ben-Israel, A., Greville, T.N.E.: Generalized Inverses: Theory and Applications, 2nd edn. Springer, New York (2003)","edition":"2"},{"key":"315_CR5","volume-title":"Matrix Mathematics: Theory, Facts, and Formulas","author":"DS Bernstein","year":"2008","unstructured":"Bernstein, D.S.: Matrix Mathematics: Theory, Facts, and Formulas, 2nd edn. Princeton University Press, Princeton and Oxford (2008)","edition":"2"},{"key":"315_CR6","volume-title":"Nonlinear Programming","author":"DP Bertsekas","year":"1999","unstructured":"Bertsekas, D.P.: Nonlinear Programming, 2nd edn. Athena Scientific, Belmont, MA (1999)","edition":"2"},{"issue":"1","key":"315_CR7","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1049\/ip-h-1.1983.0004","volume":"130","author":"DH Brandwood","year":"1983","unstructured":"Brandwood, D.H.: A complex gradient operator and its application in adaptive array theory. IEE Proc. H Microwav. Opt. Antennas 130(1), 11\u201316 (1983)","journal-title":"IEE Proc. H Microwav. Opt. Antennas"},{"key":"315_CR8","volume-title":"Wide Area Network Design","author":"RS Cahn","year":"1998","unstructured":"Cahn, R.S.: Wide Area Network Design. Morgan Kaufman, San Mateo, CA (1998)"},{"key":"315_CR9","doi-asserted-by":"crossref","unstructured":"Cand\u00e9s, E.J., Recht, B.: Exact matrix completion via convex optimization. Found. Comput. Math. 9(6), 717\u2013772 (2009)","DOI":"10.1007\/s10208-009-9045-5"},{"key":"315_CR10","doi-asserted-by":"crossref","unstructured":"Carroll, J.D., Chang, J.J.: Analysis of individual differences in multidimensional scaling via an $$n$$-way generalization of \u2018Eckart-Young\u2019 decomposition. Psychometrika 35(3), 283\u2013319 (1970)","DOI":"10.1007\/BF02310791"},{"key":"315_CR11","doi-asserted-by":"crossref","unstructured":"Chen, Y.C., Qiu, L., Zhang, Y., Xue, G., Hu, Z.: Robust network compressive sensing. In: Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, pp. 545\u2013556 (2014)","DOI":"10.1145\/2639108.2639129"},{"key":"315_CR12","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.laa.2015.04.015","volume":"481","author":"C Da Silva","year":"2015","unstructured":"Da Silva, C., Herrmann, F.J.: Optimization on the hierarchical Tucker manifold-applications to tensor completion. Linear Algebra Appl. 481, 131\u2013173 (2015)","journal-title":"Linear Algebra Appl."},{"key":"315_CR13","doi-asserted-by":"crossref","unstructured":"Du, R., Chen, C., Yang, B., Guan, X.: VANET based traffic estimation: a matrix completion approach. In: IEEE Global Communications Conference, pp. 30\u201335 (2013)","DOI":"10.1109\/GLOCOM.2013.6831043"},{"issue":"2","key":"315_CR14","doi-asserted-by":"publisher","first-page":"025010","DOI":"10.1088\/0266-5611\/27\/2\/025010","volume":"27","author":"S Gandy","year":"2011","unstructured":"Gandy, S., Recht, B., Yamada, I.: Tensor completion and low-$$n$$-rank tensor recovery via convex optimization. Inverse Probl. 27(2), 025010 (2011)","journal-title":"Inverse Probl."},{"key":"315_CR15","doi-asserted-by":"crossref","DOI":"10.56021\/9781421407944","volume-title":"Matrix Computations","author":"GH Golub","year":"2013","unstructured":"Golub, G.H., Van Loan, C.F.: Matrix Computations, 4th edn. Johns Hopkins University Press, Baltimore (2013)","edition":"4"},{"key":"315_CR16","doi-asserted-by":"crossref","unstructured":"G\u00fcrsun, G., Crovella, M.: On traffic matrix completion in the internet. In: Proceedings of the ACM SIGCOMM Internet Measurement Conference, pp. 399-412 (2012)","DOI":"10.1145\/2398776.2398818"},{"issue":"1","key":"315_CR17","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1137\/110842570","volume":"6","author":"N Hao","year":"2013","unstructured":"Hao, N., Kilmer, M.E., Braman, K., Hoover, R.C.: Facial recognition using tensor\u2013tensor decompositions. SIAM J. Imaging Sci. 6(1), 437\u2013463 (2013)","journal-title":"SIAM J. Imaging Sci."},{"key":"315_CR18","unstructured":"Harshman, R.A.: Foundations of the PARAFAC procedure: models and conditions for an \u2018explanatory\u2019 multi-modal factor analysis. UCLA Work Papers Phonetics 16(1), 1\u201384 (1970)"},{"key":"315_CR19","unstructured":"Horn, R.A., Johnson, C.R.: Topics in Matrix Analysis. Cambridge University Press (1994)"},{"issue":"1","key":"315_CR20","first-page":"57","volume":"9","author":"ID Irawati","year":"2017","unstructured":"Irawati, I.D., Suksmono, A.B., Edward, I.J.M.: Missing internet traffic reconstruction using compressive sampling. Int. J. Commun. Netw. Inf. Secur. 9(1), 57\u201366 (2017)","journal-title":"Int. J. Commun. Netw. Inf. Secur."},{"key":"315_CR21","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.01.035","volume":"436\u2013437","author":"TX Jiang","year":"2018","unstructured":"Jiang, T.X., Huang, T.Z., Zhao, X.L., Ji, T.Y., Deng, L.J.: Matrix factorization for low-rank tensor completion using framelet prior. Inf. Sci. 436\u2013437, 403\u2013417 (2018)","journal-title":"Inf. Sci."},{"key":"315_CR22","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1016\/j.laa.2010.09.020","volume":"435","author":"ME Kilmer","year":"2011","unstructured":"Kilmer, M.E., Martin, C.D.: Factorization strategies for third-order tensors. Linear Algebra Appl. 435, 641\u2013658 (2011)","journal-title":"Linear Algebra Appl."},{"key":"315_CR23","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1137\/110837711","volume":"34","author":"ME Kilmer","year":"2013","unstructured":"Kilmer, M.E., Braman, K., Hao, N., Hoover, R.C.: Third-order tensors as operators on matrices: a theoretical and computational framework with applications in imaging. SIAM J. Matrix Anal. Appl. 34, 148\u2013172 (2013)","journal-title":"SIAM J. Matrix Anal. Appl."},{"key":"315_CR24","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Papagiannaki, K., Crovella, M., Diot, C., Kolaczyk, E.D., Taft, N.: Structural analysis of network traffic flows. In: ACM SIGMETRICS Performance Evaluation Review, pp. 61\u201372 (2004)","DOI":"10.1145\/1012888.1005697"},{"issue":"5","key":"315_CR25","doi-asserted-by":"publisher","first-page":"1511","DOI":"10.1109\/TNET.2012.2228881","volume":"21","author":"Y Liao","year":"2013","unstructured":"Liao, Y., Du, W., Geurts, P., Leduc, G.: DMFSGD: a decentralized matrix factorization algorithm for network distance prediction. IEEE\/ACM Trans. Netw. 21(5), 1511\u20131524 (2013)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"6","key":"315_CR26","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1007\/s10851-019-00933-9","volume":"62","author":"XL Lin","year":"2020","unstructured":"Lin, X.L., Ng, M.K., Zhao, X.L.: Tensor factorization with total variation and tikhonov regularization for low-rank tensor completion in imaging data. J. Math. Imaging Vis. 62(6), 900\u2013918 (2020)","journal-title":"J. Math. Imaging Vis."},{"key":"315_CR27","unstructured":"Majumdar, A.: Matrix Completion via Thresholding. MATLAB Central File Exchange. Retrieved April 2 (2020)"},{"key":"315_CR28","doi-asserted-by":"crossref","unstructured":"Mardani, M., Giannakis, G.B.: Robust network traffic estimation via sparsity and low rank. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 4529\u20134533 (2013)","DOI":"10.1109\/ICASSP.2013.6638517"},{"key":"315_CR29","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1016\/j.apm.2021.03.036","volume":"96","author":"Z Ming","year":"2021","unstructured":"Ming, Z., Zhang, L., Xu, Y., Bakshi, M.: An algorithm for matrix recovery of high-loss-rate network traffic data. Appl. Math. Modell. 96, 645\u2013656 (2021)","journal-title":"Appl. Math. Modell."},{"issue":"2","key":"315_CR30","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1016\/j.jnca.2012.10.007","volume":"36","author":"L Nie","year":"2013","unstructured":"Nie, L., Jiang, D., Guo, L.: A power laws-based reconstruction approach to end-to-end network traffic. J. Netw. Comput. Appl. 36(2), 898\u2013907 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"315_CR31","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1109\/TIP.2006.888343","volume":"16","author":"KA Patwardhan","year":"2007","unstructured":"Patwardhan, K.A., Sapiro, G., Bertalm, M.: Video inpainting under constrained camera motion. IEEE Trans. Image Process. 16, 545\u2013553 (2007)","journal-title":"IEEE Trans. Image Process."},{"key":"315_CR32","doi-asserted-by":"crossref","unstructured":"Roughan, M., Thorup, M., Zhang, Y.: Traffic engineering with estimated traffic matrices. In: Proceedings of the ACM IMC, pp. 248\u2013258 (2003)","DOI":"10.1145\/948205.948237"},{"key":"315_CR33","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TNET.2011.2169424","volume":"20","author":"M Roughan","year":"2012","unstructured":"Roughan, M., Zhang, Y., Willinger, W., Qiu, L.: Spatio-temporal compressive sensing and internet traffic matrices (extended version). IEEE\/ACM Trans. Netw. 20, 662\u2013676 (2012)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"315_CR34","doi-asserted-by":"publisher","first-page":"2075","DOI":"10.1109\/23.819285","volume":"46","author":"AC Sauve","year":"1999","unstructured":"Sauve, A.C., Hero, A.O., Rogers, W.L., Wilderman, S.J., Clinthorne, N.H.: 3d image reconstruction for a compton spect camera model. IEEE Trans. Nuclear Sci. 46, 2075\u20132084 (1999)","journal-title":"IEEE Trans. Nuclear Sci."},{"key":"315_CR35","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1016\/j.ins.2019.01.031","volume":"482","author":"K Shang","year":"2019","unstructured":"Shang, K., Li, Y.F., Huang, Z.H.: Iterative $$p$$-shrinkage thresholding algorithm for low Tucker rank tensor recovery. Inf. Sci. 482, 374\u2013391 (2019)","journal-title":"Inf. Sci."},{"key":"315_CR36","unstructured":"The Abilene observatory data collections. Accessed May 2004. http:\/\/abilene.internet2.edu\/observatory\/data-collections.html"},{"key":"315_CR37","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1016\/0022-247X(77)90193-7","volume":"58","author":"RC Thompson","year":"1977","unstructured":"Thompson, R.C.: Inertial properties of eigenvalues II. J. Math. Anal. Appl. 58, 572\u2013577 (1977)","journal-title":"J. Math. Anal. Appl."},{"issue":"3","key":"315_CR38","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/BF02289464","volume":"31","author":"L Tucker","year":"1966","unstructured":"Tucker, L.: Some mathematical notes on three-mode factor analysis. Psychometrika 31(3), 279\u2013311 (1966)","journal-title":"Psychometrika"},{"key":"315_CR39","unstructured":"Tune, P., Roughan, M.: Internet traffic matrices: a Primer. In: Haddadi, H., Bonaventure, O. (eds.), Recent Advances in Networking, vol. 1, pp. 1\u201356 (2013)"},{"key":"315_CR40","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1145\/1111322.1111341","volume":"36","author":"S Uhlig","year":"2006","unstructured":"Uhlig, S., Quoitin, B., Lepropre, J., Balon, S.: Providing public intradomain traffic matrices to the research community. ACM SIGCOMM Comput. Commun. Rev. 36, 83\u201386 (2006)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"433","key":"315_CR41","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1080\/01621459.1996.10476697","volume":"91","author":"Y Vardi","year":"1996","unstructured":"Vardi, Y.: Network tomography: estimating source\u2013destination traffic intensities from link data. J. Am. Stat. Assoc. 91(433), 365\u2013377 (1996)","journal-title":"J. Am. Stat. Assoc."},{"key":"315_CR42","unstructured":"Varghees, V.N., Manikandan, M.S., Gini, R.: Adaptive MRI image denoising using total-variation and local noise estimation. In: Proceedings of the 2012 International Conference on Advances in Engineering, Science and Management (ICAESM), pp. 506\u2013511 (2012)"},{"key":"315_CR43","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TNET.2018.2819504","volume":"26","author":"K Xie","year":"2018","unstructured":"Xie, K., Peng, C., Wang, X., Xie, G., Wen, J., Cao, J., Zhang, D., Qin, Z.: Accurate recovery of internet traffic data under variable rate measurements. IEEE\/ACM Trans. Netw. 26, 1137\u20131150 (2018)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"315_CR44","doi-asserted-by":"crossref","unstructured":"Xie, K., Wang, L., Wang, X., Xie, G., Zhang, G.X., Xie, D.L., Wen, J.: Sequential and adaptive sampling for matrix completion in network monitoring systems. In: Proceedings of the IEEE INFOCOM, pp. 2443\u20132451 (2015)","DOI":"10.1109\/INFOCOM.2015.7218633"},{"issue":"2","key":"315_CR45","doi-asserted-by":"publisher","first-page":"601","DOI":"10.3934\/ipi.2015.9.601","volume":"9","author":"Y Xu","year":"2015","unstructured":"Xu, Y., Hao, R., Yin, W., Su, Z.: Parallel matrix factorization for low-rank tensor completion. Inverse Probl. Imaging 9(2), 601\u2013624 (2015)","journal-title":"Inverse Probl. Imaging"},{"key":"315_CR46","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s10589-015-9769-x","volume":"63","author":"L Yang","year":"2016","unstructured":"Yang, L., Huang, Z.H., Hu, S.L., Han, J.Y.: An iterative algorithm for third-order tensor multi-rank minimization. Comput. Optim. Appl. 63, 169\u2013202 (2016)","journal-title":"Comput. Optim. Appl."},{"key":"315_CR47","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Ely, G., Aeron, S., Hao, N., Kilmer, M.: Novel methods for multilinear data completion and de-noising based on tensor-SVD. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, pp. 3842-3849 (2014)","DOI":"10.1109\/CVPR.2014.485"},{"key":"315_CR48","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1109\/TIP.2017.2762595","volume":"3","author":"P Zhou","year":"2018","unstructured":"Zhou, P., Lu, C.Y., Lin, Z.C., Zhang, C.: Tensor factorization for low-rank tensor completion. IEEE Trans. Image Process. 3, 1152\u20131163 (2018)","journal-title":"IEEE Trans. Image Process."},{"key":"315_CR49","unstructured":"Zhou, H., Zhang, D., Xie, K., Chen, Y.: Spatio-temporal tensor completion for imputing missing internet traffic data. In: IEEE 34th International Performance Computing and Communications Conference (IPCCC) (2015)"},{"issue":"2","key":"315_CR50","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1109\/TNET.2016.2612695","volume":"25","author":"R Zhu","year":"2017","unstructured":"Zhu, R., Liu, B., Niu, D., Li, Z., Zhao, H.V.: Network latency estimation for personal devices: a matrix completion approach. IEEE\/ACM Trans. Netw. 25(2), 724\u2013737 (2017)","journal-title":"IEEE\/ACM Trans. Netw."}],"container-title":["Computational Optimization and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10589-021-00315-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10589-021-00315-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10589-021-00315-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T19:14:29Z","timestamp":1725736469000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10589-021-00315-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,3]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["315"],"URL":"https:\/\/doi.org\/10.1007\/s10589-021-00315-1","relation":{},"ISSN":["0926-6003","1573-2894"],"issn-type":[{"type":"print","value":"0926-6003"},{"type":"electronic","value":"1573-2894"}],"subject":[],"published":{"date-parts":[[2021,9,3]]},"assertion":[{"value":"27 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}