Transient analysis with the linearly constrained TLS Prony method | IEEE Conference Publication | IEEE Xplore