EE 381 V : Large Scale Learning Spring 2013 Lecture 21 — April 2
نویسنده
چکیده
In the past few lectures we have been studying the problem of sparse signal reconstruction from a small number of noiseless linear measurements. The objective is to recover an unknown, k-sparse, n-dimensional vector x from a measurement vector y = Ax ∈ R, which is a linear transformation of x by a known m× n matrix A, where m < n. We have presented various heuristics for sparse signal recovery, including greedy algorithms such as Orthogonal Matching Pursuit, and algorithms based on convex optimization such as Basis Pursuit. In order to provide performance guarantees, the analysis of these algorithms seeks conditions on the measurement matrix A and the sparsity k of x, under which the solution is unique and/or the algorithm can successfully recover the sparsest solution. Examples of such conditions include mutual coherence (maximum coherence between columns of the measurement matrix A), the Restricted Isometry Property, and the Restricted Strong Convexity (which may be the subject of a future lecture). The previous lecture focused on the analysis of Basis Pursuit under the assumption that the measurement matrix satisfies an RIP condition. Specifically, if A satisfies the ( , 2k)RIP for < √ 2− 1, then we can recover the unique k-sparse vector x as the solution of the l1-minimization problem
منابع مشابه
EE 381 V : Large Scale Learning Spring 2013 Lecture 11 — February 19
The last two lectures focused on the algorithms and analysis of spectral clustering for Gaussian mixtures in the isotropic case, in which the i-th Gaussian has the distribution Xi ∼ N (μi, σ i I). Note that the covariance matrix is simply a multiple of the identity matrix, so each Gaussian is distributed spherically, as depicted in figure 11.1. Recall that in this case, we reduced dimension by ...
متن کاملCs294-1 On-line Computation & Network Algorithms Lecture 21: April 17
Spring 1997 Lecture 21: April 17 Lecturer: Yair Bartal Scribe: Tzu-Yi Chen This is the third of a series of lectures on probabilistic approximate metric spaces [Bartal96]. This lecture states a theorem relating probabilistic partitions to k-HST trees and then proves it. At the end of the lecture we brie y discuss why probabilistic approximate metric spaces are useful in practice. 21.1 Probabili...
متن کاملEE 228 a - Lecture - Spring 2006
We have, by now, seen the various uses of game theory in different aspects of networking like bandwidth trading, MAC Layer access, congestion control, etc. In this lecture, we will see how routing is modeled using game theory.
متن کاملSNF Project Locomotion: Progress report 2008-2009
From locomotion to cognition..............................................................................................................1 Table of contents..............................................................................................................................1 1 Summary of results (project period 1. 10. 2008 – 30. 9. 2009)....................................................
متن کاملEE 228 a - Lecture 21 - Spring 2006 Auctions and VCG Allocation
In this lecture, we study several types of auctions, and we introduce the Envelope Theorem (E.T.) to analyze the payoffs for the auctions. The expected payoff in each case is found to be the expectation of the second highest valuation. The VickreyClarke-Grove (VCG) allocation mechanism is used in a generalized scenario of the auctions, and it produces a dominant strategy with the resulting Nash...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013