Author of the publication

An Interior-Point Method for Large-Scale $l_1$-Regularized Least Squares

, , , , and . IEEE Journal of Selected Topics in Signal Processing, 1 (4): 606--617 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Interior-Point Method for Large-Scale $l_1$-Regularized Least Squares, , , , and . IEEE Journal of Selected Topics in Signal Processing, 1 (4): 606--617 (2008)$l_1 $ trend filtering, , , and . SIAM Review, 51 (2): 339--360 (2009)Utilizing Transformer Deep Learning Based Outlier Detection to Screen Out Reliability Weak ICs., , , , , , , , , and 5 other author(s). IRPS, page 1-5. IEEE, (2024)A constraints-based method of the inverse kinematics for redundant manipulators., , , and . IROS, page 531-538. IEEE, (1994)Security Governance: Its Impact on Security Culture., , , and . AISM, page 47-58. School of Computer and Information Science, Edith Cowan University, Western Australia, (2005)A Taxonomy of Issues in Name Systems Design and Implementation., , and . ACM SIGOPS Oper. Syst. Rev., 27 (3): 4-18 (1993)A Survey of Asynchronous Remote Procedure Calls., , and . ACM SIGOPS Oper. Syst. Rev., 26 (2): 92-109 (1992)Session 6 - RF and millimeter-wave power amplifiers and transmitters., and . CICC, page 1. IEEE, (2017)SRDTP: A reliable datagram transport protocol for distributed computing., , and . Comput. Commun., 16 (4): 241-250 (1993)Segmentation of Kidney Cortex in MRI Studies using a Constrained Morphological 3D H-maxima Transform., , , and . ICARCV, page 1-5. IEEE, (2006)