%PDF-1.5 % 1 0 obj << /S /GoTo /D (anchor:title.0) >> endobj 4 0 obj (Low-Rank Matrix Approximations and Applications) endobj 5 0 obj << /S /GoTo /D (anchor:abstract.0) >> endobj 8 0 obj (Resumo) endobj 9 0 obj << /S /GoTo /D (anchor:contents.0) >> endobj 12 0 obj (Summary) endobj 13 0 obj << /S /GoTo /D (chapter.1) >> endobj 16 0 obj (Introduction) endobj 17 0 obj << /S /GoTo /D (section.1.1) >> endobj 20 0 obj (Motivations, Problems and Background) endobj 21 0 obj << /S /GoTo /D (section.1.2) >> endobj 24 0 obj (Structure and Contributions of the Dissertation) endobj 25 0 obj << /S /GoTo /D (subsection.1.2.1) >> endobj 28 0 obj (Chapter 2: Literature Review) endobj 29 0 obj << /S /GoTo /D (subsection.1.2.2) >> endobj 32 0 obj (Chapter 3: Randomized Rank-Revealing UZV Decomposition) endobj 33 0 obj << /S /GoTo /D (subsection.1.2.3) >> endobj 36 0 obj (Chapter 4: Subspace-Orbit Randomized SVD) endobj 37 0 obj << /S /GoTo /D (subsection.1.2.4) >> endobj 40 0 obj (Chapter 5: Compressed Randomized UTV Decompositions) endobj 41 0 obj << /S /GoTo /D (subsection.1.2.5) >> endobj 44 0 obj (Chapter 6: Randomized Subspace Methods) endobj 45 0 obj << /S /GoTo /D (subsection.1.2.6) >> endobj 48 0 obj (Chapter 7: Conclusions) endobj 49 0 obj << /S /GoTo /D (section.1.3) >> endobj 52 0 obj (Notation) endobj 53 0 obj << /S /GoTo /D (section.1.4) >> endobj 56 0 obj (List of Publications) endobj 57 0 obj << /S /GoTo /D (chapter.2) >> endobj 60 0 obj (Literature Review) endobj 61 0 obj << /S /GoTo /D (section.2.1) >> endobj 64 0 obj (Deterministic Algorithms) endobj 65 0 obj << /S /GoTo /D (subsection.2.1.1) >> endobj 68 0 obj (Singular Value Decomposition) endobj 69 0 obj << /S /GoTo /D (subsection.2.1.2) >> endobj 72 0 obj (Rank-Revealing QR Decomposition) endobj 73 0 obj << /S /GoTo /D (subsection.2.1.3) >> endobj 76 0 obj (UTV Decompositions) endobj 77 0 obj << /S /GoTo /D (section.2.2) >> endobj 80 0 obj (Randomized Algorithms) endobj 81 0 obj << /S /GoTo /D (subsection.2.2.1) >> endobj 84 0 obj (Random Projections) endobj 85 0 obj << /S /GoTo /D (subsection.2.2.2) >> endobj 88 0 obj (A Randomized Algorithm for PCA) endobj 89 0 obj << /S /GoTo /D (subsection.2.2.3) >> endobj 92 0 obj (Randomized Algorithms for SVD) endobj 93 0 obj << /S /GoTo /D (subsection.2.2.4) >> endobj 96 0 obj (Sketching-based Fixed-Rank Approximation) endobj 97 0 obj << /S /GoTo /D (section.2.3) >> endobj 100 0 obj (Comparison of Deterministic and Randomized Algorithms for Image Reconstruction) endobj 101 0 obj << /S /GoTo /D (section.2.4) >> endobj 104 0 obj (Computational and communication costs) endobj 105 0 obj << /S /GoTo /D (section.2.5) >> endobj 108 0 obj (Principal Component Analysis) endobj 109 0 obj << /S /GoTo /D (section.2.6) >> endobj 112 0 obj (Robust PCA) endobj 113 0 obj << /S /GoTo /D (section.2.7) >> endobj 116 0 obj (Comparison of PCA and Robust PCA for Background Modeling in Surveillance Video) endobj 117 0 obj << /S /GoTo /D (section.2.8) >> endobj 120 0 obj (Switched-Randomized Robust PCA) endobj 121 0 obj << /S /GoTo /D (subsection.2.8.1) >> endobj 124 0 obj (The Bilateral Projections Technique) endobj 125 0 obj << /S /GoTo /D (subsection.2.8.2) >> endobj 128 0 obj (Singular Values Estimation Technique) endobj 129 0 obj << /S /GoTo /D (subsection.2.8.3) >> endobj 132 0 obj (Partitioning Input Matrix) endobj 133 0 obj << /S /GoTo /D (subsection.2.8.4) >> endobj 136 0 obj (Experiments) endobj 137 0 obj << /S /GoTo /D (chapter.3) >> endobj 140 0 obj (Randomized Rank-Revealing UZV Decomposition) endobj 141 0 obj << /S /GoTo /D (section.3.1) >> endobj 144 0 obj (The RRR-UZVD Algorithm) endobj 145 0 obj << /S /GoTo /D (section.3.2) >> endobj 148 0 obj (Analysis of RRR-UZVD) endobj 149 0 obj << /S /GoTo /D (subsection.3.2.1) >> endobj 152 0 obj (Rank-Revealing Property) endobj 153 0 obj << /S /GoTo /D (subsection.3.2.2) >> endobj 156 0 obj (Computational Complexity) endobj 157 0 obj << /S /GoTo /D (section.3.3) >> endobj 160 0 obj (Simulations) endobj 161 0 obj << /S /GoTo /D (subsection.3.3.1) >> endobj 164 0 obj (Rank-Revealing Property and Singular Value Estimation) endobj 165 0 obj << /S /GoTo /D (subsection.3.3.2) >> endobj 168 0 obj (Image Reconstruction) endobj 169 0 obj << /S /GoTo /D (subsection.3.3.3) >> endobj 172 0 obj (Robust PCA Using RRR-UZVD) endobj 173 0 obj << /S /GoTo /D (subsubsection.3.3.3.1) >> endobj 176 0 obj (Synthetic Data Recovery) endobj 177 0 obj << /S /GoTo /D (subsubsection.3.3.3.2) >> endobj 180 0 obj (Background Modeling in Surveillance Video) endobj 181 0 obj << /S /GoTo /D (subsubsection.3.3.3.3) >> endobj 184 0 obj (Shadow and Specularity Removal from Face Images) endobj 185 0 obj << /S /GoTo /D (chapter.4) >> endobj 188 0 obj (Subspace-Orbit Randomized Singular Value Decomposition) endobj 189 0 obj << /S /GoTo /D (section.4.1) >> endobj 192 0 obj (Proposed SOR-SVD Algorithm) endobj 193 0 obj << /S /GoTo /D (section.4.2) >> endobj 196 0 obj (Analysis of SOR-SVD) endobj 197 0 obj << /S /GoTo /D (subsection.4.2.1) >> endobj 200 0 obj (Deterministic Error Bounds) endobj 201 0 obj << /S /GoTo /D (subsection.4.2.2) >> endobj 204 0 obj (Average-Case Error Bounds) endobj 205 0 obj << /S /GoTo /D (subsection.4.2.3) >> endobj 208 0 obj (Computational Complexity) endobj 209 0 obj << /S /GoTo /D (section.4.3) >> endobj 212 0 obj (Numerical Experiments) endobj 213 0 obj << /S /GoTo /D (subsection.4.3.1) >> endobj 216 0 obj (Synthetic Matrices) endobj 217 0 obj << /S /GoTo /D (subsection.4.3.2) >> endobj 220 0 obj (Empirical Evaluation of SOR-SVD Error Bounds) endobj 221 0 obj << /S /GoTo /D (subsection.4.3.3) >> endobj 224 0 obj (Robust PCA Using SOR-SVD) endobj 225 0 obj << /S /GoTo /D (subsubsection.4.3.3.1) >> endobj 228 0 obj (Synthetic Data Recovery) endobj 229 0 obj << /S /GoTo /D (subsubsection.4.3.3.2) >> endobj 232 0 obj (Background Subtraction in Surveillance Video) endobj 233 0 obj << /S /GoTo /D (subsubsection.4.3.3.3) >> endobj 236 0 obj (Shadow and Specularity Removal From Face Images) endobj 237 0 obj << /S /GoTo /D (chapter.5) >> endobj 240 0 obj (Compressed Randomized UTV Decompositions) endobj 241 0 obj << /S /GoTo /D (section.5.1) >> endobj 244 0 obj (The CoR-UTV Algorithm) endobj 245 0 obj << /S /GoTo /D (section.5.2) >> endobj 248 0 obj (Analysis of CoR-UTV Decompositions) endobj 249 0 obj << /S /GoTo /D (subsection.5.2.1) >> endobj 252 0 obj (Rank-Revealing Property) endobj 253 0 obj << /S /GoTo /D (subsection.5.2.2) >> endobj 256 0 obj (Low-Rank Approximation) endobj 257 0 obj << /S /GoTo /D (subsection.5.2.3) >> endobj 260 0 obj (Computational Complexity) endobj 261 0 obj << /S /GoTo /D (subsection.5.2.4) >> endobj 264 0 obj (Robust PCA Using CoR-UTV) endobj 265 0 obj << /S /GoTo /D (section.5.3) >> endobj 268 0 obj (Numerical Experiments) endobj 269 0 obj << /S /GoTo /D (subsection.5.3.1) >> endobj 272 0 obj (Comparison of Rank-revealing Property and Singular Values) endobj 273 0 obj << /S /GoTo /D (subsection.5.3.2) >> endobj 276 0 obj (Comparison of Low-Rank Approximation) endobj 277 0 obj << /S /GoTo /D (subsection.5.3.3) >> endobj 280 0 obj (Image Reconstruction) endobj 281 0 obj << /S /GoTo /D (subsection.5.3.4) >> endobj 284 0 obj (Robust PCA) endobj 285 0 obj << /S /GoTo /D (subsubsection.5.3.4.1) >> endobj 288 0 obj (Recovery of Synthetic Matrix) endobj 289 0 obj << /S /GoTo /D (subsubsection.5.3.4.2) >> endobj 292 0 obj (Background Modeling in Surveillance Video) endobj 293 0 obj << /S /GoTo /D (subsubsection.5.3.4.3) >> endobj 296 0 obj (Shadow and Specularity Removal From Face Images) endobj 297 0 obj << /S /GoTo /D (chapter.6) >> endobj 300 0 obj (Randomized Subspace Methods) endobj 301 0 obj << /S /GoTo /D (section.6.1) >> endobj 304 0 obj (Data Model) endobj 305 0 obj << /S /GoTo /D (section.6.2) >> endobj 308 0 obj (PCA-Based Subspace Method for Anomaly Detection) endobj 309 0 obj << /S /GoTo /D (section.6.3) >> endobj 312 0 obj (Randomized Subspace Methods for Anomaly Detection) endobj 313 0 obj << /S /GoTo /D (subsection.6.3.1) >> endobj 316 0 obj (Randomized Basis for Anomaly Detection \(RBAD\)) endobj 317 0 obj << /S /GoTo /D (subsection.6.3.2) >> endobj 320 0 obj (Switched Subspace-Projected Basis for Anomaly Detection \(SSPBAD\)) endobj 321 0 obj << /S /GoTo /D (section.6.4) >> endobj 324 0 obj (Simulations) endobj 325 0 obj << /S /GoTo /D (section.6.5) >> endobj 328 0 obj (Concluding Remarks) endobj 329 0 obj << /S /GoTo /D (chapter.7) >> endobj 332 0 obj (Conclusions and Future Work) endobj 333 0 obj << /S /GoTo /D (section.7.1) >> endobj 336 0 obj (Summary of Contributions) endobj 337 0 obj << /S /GoTo /D (section.7.2) >> endobj 340 0 obj (Future Directions) endobj 341 0 obj << /S /GoTo /D (chapter.8) >> endobj 344 0 obj (Appendix) endobj 345 0 obj << /S /GoTo /D (section.8.1) >> endobj 348 0 obj (Proofs for Chapter 3) endobj 349 0 obj << /S /GoTo /D (section.8.2) >> endobj 352 0 obj (Proofs for Chapter 4) endobj 353 0 obj << /S /GoTo /D (subsection.8.2.1) >> endobj 356 0 obj (Proof of Theorem 4.2) endobj 357 0 obj << /S /GoTo /D (subsection.8.2.2) >> endobj 360 0 obj (Proof of Lemma 4.6) endobj 361 0 obj << /S /GoTo /D (subsection.8.2.3) >> endobj 364 0 obj (Proof of Theorem 4.7) endobj 365 0 obj << /S /GoTo /D (subsection.8.2.4) >> endobj 368 0 obj (Proof of Theorem 4.9) endobj 369 0 obj << /S /GoTo /D (subsection.8.2.5) >> endobj 372 0 obj (Proof of Proposition 4.11) endobj 373 0 obj << /S /GoTo /D (subsection.8.2.6) >> endobj 376 0 obj (Proof of Proposition 4.13) endobj 377 0 obj << /S /GoTo /D (subsection.8.2.7) >> endobj 380 0 obj (Proof of Theorem 4.14) endobj 381 0 obj << /S /GoTo /D (subsection.8.2.8) >> endobj 384 0 obj (Proof of Theorem 4.15) endobj 385 0 obj << /S /GoTo /D [386 0 R /Fit] >> endobj 389 0 obj << /Length 564 /Filter /FlateDecode >> stream xڅSMs0W(ÖdnMB;S2D8jԱW_a2ήV>l 2H?0ʱTH)sYx8qp,8cacG>[l@ŜK@W $3|>GB;5. 9'P4}U ?uo? Ee2r܄9hVynùg~T *f-*`bA*(u^1(IN tc=ŜS,$Tb%z3GT>x7͠;WM9p߯+݁f+^Hv1M?j0\"̶+^RgڳP\q]ʆi2{3N9pnDo ޏm,N(0D22kBJJL X҃4?>`pL^<+mE7<@7XoQ02}{p-3 0),Ugfu F endstream endobj 386 0 obj << /Type /Page /Contents 389 0 R /Resources 388 0 R /MediaBox [0 0 595.276 841.89] /Parent 394 0 R >> endobj 387 0 obj << /Type /XObject /Subtype /Image /Width 2803 /Height 652 /BitsPerComponent 8 /ColorSpace /DeviceRGB /Length 229531 /Filter/FlateDecode /DecodeParms<> >> stream xw\TG{]ADDcM415j4AA4齳sADb~?Ν;wyܳgxB ]|O>QRRjlXXX^$=MN s֭.ˤ$= 99)++4:' [o]t\]>}^XT5w7@ $L;+ :5F 2 Bf t^IO fzzz K.'Ow 1