pith. machine review for the scientific record. sign in

arxiv: 1309.1541 · v1 · submitted 2013-09-06 · 💻 cs.LG · math.OC· stat.ML

Recognition: unknown

Projection onto the probability simplex: An efficient algorithm with a simple proof, and an application

Miguel \'A. Carreira-Perpi\~n\'an, Weiran Wang

Authors on Pith no claims yet
classification 💻 cs.LG math.OCstat.ML
keywords algorithmapplicationefficientontoprobabilityprojectionproofsimple
0
0 comments X
read the original abstract

We provide an elementary proof of a simple, efficient algorithm for computing the Euclidean projection of a point onto the probability simplex. We also show an application in Laplacian K-modes clustering.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 4 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Enhanced quantum capacity thresholds from symmetry

    quant-ph 2026-05 conditional novelty 8.0

    Generalizing a representation-theoretic framework to the full symmetric subspace yields the first improvement in 18 years to the quantum capacity threshold of the depolarizing channel, exceeding all prior gains combined.

  2. Local LMO: Constrained Gradient Optimization via a Local Linear Minimization Oracle

    math.OC 2026-05 unverdicted novelty 8.0

    Local LMO is a new projection-free method that achieves the convergence rates of projected gradient descent for constrained optimization by using local linear minimization oracles over small balls.

  3. Enhanced quantum capacity thresholds from symmetry

    quant-ph 2026-05 unverdicted novelty 7.0

    First improvement in 18 years to the depolarizing channel quantum capacity threshold via symmetry-enhanced coherent information on rank-two symmetric states.

  4. Constrained Contextual Bandits with Adversarial Contexts

    cs.LG 2026-05 unverdicted novelty 7.0

    A modular reduction from budget-constrained contextual bandits with adversarial contexts to unconstrained bandits via surrogate rewards, yielding improved guarantees and an efficient algorithm based on SquareCB.