A modified TLS-Prony method using data decimation | IEEE Journals & Magazine | IEEE Xplore