{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:15:25Z","timestamp":1729613725070,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icassp.1989.266616","type":"proceedings-article","created":{"date-parts":[[2003,1,13]],"date-time":"2003-01-13T18:41:49Z","timestamp":1042483309000},"page":"1067-1070","source":"Crossref","is-referenced-by-count":10,"title":["Implementing the optimal bounding ellipsoid algorithm on a fast processor"],"prefix":"10.1109","author":[{"given":"J.R.","family":"Deller","sequence":"first","affiliation":[]},{"given":"S.F.","family":"Odeh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"19","article-title":"Matrix triangularization by systolic arrays","volume":"298","author":"gentleman","year":"1981","journal-title":"Proc SPIE Real-Time Signal Processing IV"},{"journal-title":"Introduction to VLSI Systems","year":"1980","author":"mead","key":"ref11b"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1117\/12.936448","article-title":"Recursive least-squares minimization using a systolic array","volume":"431","author":"mcwhirter","year":"1983","journal-title":"Proc SPIE Real-Time Signal Processing VI"},{"key":"ref13","first-page":"732","article-title":"A nonclassical WRLS algorithm","author":"luk","year":"1985","journal-title":"Proc 20th Ann Allerton Conf"},{"journal-title":"Algorithms for VLSI Processor Arrays","year":"1978","author":"kung","key":"ref11a"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/29.21710"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1093\/imamat\/12.3.329"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1987.1169574"},{"journal-title":"Matrix Computations","year":"1983","author":"golub","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/29.31297"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0885-2308(89)90001-6"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/0005-1098(82)90110-8","article-title":"On the value of information in system identification ? Noise bounded case","volume":"18","author":"fogel","year":"1982","journal-title":"Automatica"},{"journal-title":"System identification using membership set description of system uncertainties","year":"1979","author":"huang","key":"ref7"},{"key":"ref2","first-page":"14","author":"ljung","year":"1986","journal-title":"Theory and Practice of Recursive Identification"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1986.1164931"},{"journal-title":"Identification of Systems","year":"1976","author":"graupe","key":"ref9"}],"event":{"name":"International Conference on Acoustics, Speech, and Signal Processing","location":"Glasgow, UK"},"container-title":["International Conference on Acoustics, Speech, and Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx2\/805\/6677\/00266616.pdf?arnumber=266616","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T17:19:04Z","timestamp":1497547144000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/266616\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icassp.1989.266616","relation":{},"subject":[]}}