2000
DOI: 10.1137/s0895479898332928
|View full text |Cite
|
Sign up to set email alerts
|

On the Optimality of the Backward Greedy Algorithm for the Subset Selection Problem

Abstract: The following linear inverse problem is considered: given a full column rank m n data matrix A and a length m observation vector b, nd the best least squares solution to Ax = b with at most r < n nonzero components. The backward greedy algorithm computes a sparse solution to Ax = b by removing greedily columns from A until r columns are left. A simple implementation based on a QR downdating scheme by Givens rotations is described. The backward greedy algorithm is shown to be optimal for this problem in the sen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
78
0

Year Published

2005
2005
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 93 publications
(80 citation statements)
references
References 10 publications
2
78
0
Order By: Relevance
“…5(a) is a = (5,6,7,6,7,11,12,13) and that in Fig. 5(b) is a = (7,6,7,6,5,11,13,12). Each wiring activates either element of the X-cells.…”
Section: Digital Spiking Neuronsmentioning
confidence: 97%
See 3 more Smart Citations
“…5(a) is a = (5,6,7,6,7,11,12,13) and that in Fig. 5(b) is a = (7,6,7,6,5,11,13,12). Each wiring activates either element of the X-cells.…”
Section: Digital Spiking Neuronsmentioning
confidence: 97%
“…5(a) gives the characteristic vector of Dmap in Fig. 1: 7,6,7,6,5,11,13,12) The Dmap generates stable PEO and the DSN generates a stable PST as shown in Fig. 6(a).…”
Section: Digital Spiking Neuronsmentioning
confidence: 99%
See 2 more Smart Citations
“…Such an approach is termed the forward greedy selection approach, and the majority of the proposed methods are related to this type [3], [12], [32], [35]. Another approach, the backward greedy selection approach, starts with the full dictionary, and sequentially eliminates one vector after the other [13], [14], [40]. Other approaches are based on minimizing the norm as well as some entropy-based criterion [39], minimizing the norm [17], or based on some algebraic approach [33].…”
Section: A Overviewmentioning
confidence: 99%