Login / Signup

A modified TLS-Prony method using data decimation.

William M. SteedlyChing-Hui J. YingRandolph L. Moses
Published in: IEEE Trans. Signal Process. (1994)
Keyphrases