Combating Curse of Dimensionality in Resilient Monitoring Systems: Conditions for Lossless Decomposition
نویسندگان
چکیده
منابع مشابه
Combating Curse of Dimensionality in Resilient Plant Monitoring Systems: Overlapping Decomposition with Intra- and Inter-Subplant Inferences
This paper is intended to design and evaluate the performance of a power plant monitoring system (sensor network) that degrades gracefully under a cyber-physical attack. Such a system is referred to as resilient. While several features of the resilient system considered here have been developed in the previous work, the current paper addresses the “curse of dimensionality”, which arises due to ...
متن کاملThe curse of dimensionality
In this text, some question related to higher dimensional geometrical spaces will be discussed. The goal is to give the reader a feeling for geometric distortions related to the use of such spaces (e.g. as search spaces).
متن کاملOvercoming the Curse of Dimensionality ?
We study the behavior of pivot-based algorithms for similarity searching in metric spaces. We show that they are eeective tools for intrinsically high-dimensional spaces, and that their performance is basically dependent on the number of pivots used and the precision used to store the distances. In this paper we give a simple yet eeective recipe for practitioners seeking for a black-box method ...
متن کاملBreaking the curse of dimensionality in regression
Models with many signals, high-dimensional models, often impose structures on the signal strengths. The common assumption is that only a few signals are strong and most of the signals are zero or close (collectively) to zero. However, such a requirement might not be valid in many real-life applications. In this article, we are interested in conducting large-scale inference in models that might ...
متن کاملPrivacy and the Dimensionality Curse
Most privacy-transformation methods such as k-anonymity or randomization use some kind of transformation on the data for privacy-preservation purposes. In many cases, the data can be indirectly identified with the use of a combination of attributes. Such attributes may be available from public records and they may be used to link the sensitive records to the target of interest. Thus, the sensit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Cybernetics
سال: 2017
ISSN: 2168-2267,2168-2275
DOI: 10.1109/tcyb.2016.2543701