{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:06:40Z","timestamp":1729652800220,"version":"3.28.0"},"reference-count":29,"publisher":"SPIE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3,7]]},"DOI":"10.1117\/12.2047282","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T20:48:01Z","timestamp":1394225281000},"page":"902006","source":"Crossref","is-referenced-by-count":0,"title":["Architectures and algorithms for x-ray diffraction imaging"],"prefix":"10.1117","volume":"9020","author":[{"given":"Ke","family":"Chen","sequence":"additional","affiliation":[]},{"given":"David A.","family":"Casta\u00f1\u00f3n","sequence":"additional","affiliation":[]}],"member":"189","reference":[{"key":"c1","first-page":"235","article-title":"Dual energy computed tomography for explosive detection","volume":"14","author":"Ying","year":"2006"},{"unstructured":"G. Harding and A. Harding, Counter-terrorist detection techniques of explosives, ch. 8. Elsevier, 2007.","key":"c2"},{"doi-asserted-by":"publisher","key":"c3","DOI":"10.1016\/j.apradiso.2008.08.006"},{"key":"c4","first-page":"730619-1","article-title":"Detector considerations relevant to x-ray diffraction imaging for security screening application","volume":"7306","author":"Harding","year":"2009"},{"doi-asserted-by":"publisher","key":"c5","DOI":"10.1016\/j.apradiso.2011.12.015"},{"doi-asserted-by":"publisher","key":"c6","DOI":"10.1364\/OE.20.016310"},{"doi-asserted-by":"publisher","key":"c7","DOI":"10.1118\/1.596063"},{"doi-asserted-by":"publisher","key":"c8","DOI":"10.1364\/JOSAA.12.000291"},{"doi-asserted-by":"publisher","key":"c9","DOI":"10.1117\/12.430865"},{"doi-asserted-by":"publisher","key":"c10","DOI":"10.1118\/1.1598731"},{"doi-asserted-by":"publisher","key":"c11","DOI":"10.1063\/1.555523"},{"doi-asserted-by":"publisher","key":"c12","DOI":"10.1016\/S0969-806X(99)00281-9"},{"doi-asserted-by":"crossref","unstructured":"J.-P. Schlomka, J. Delfs, H. Barschdorf, A. Thran, and U. van Stevendaal, Experimental feasibility study of energy-resolved fan-beam coherent scatter computed tomography, pp. 410\u2013423. 2004.","key":"c13","DOI":"10.1117\/12.556313"},{"doi-asserted-by":"publisher","key":"c14","DOI":"10.1109\/29.45551"},{"key":"c15","first-page":"141","article-title":"Regularization in image restoration and reconstruction","author":"Karl","year":"2000"},{"unstructured":"M. Bertero and P. Boccacci, Introduction to inverse problems in imaging, CRC press, 2010.","key":"c16"},{"key":"c17","first-page":"41","article-title":"Maximum entropy and the nearly black object","author":"Donoho","year":"1992"},{"key":"c18","first-page":"1035","article-title":"Solution of incorrectly formulated problems and the regularization method","volume":"4","author":"Tikhonov","year":"1963"},{"doi-asserted-by":"publisher","key":"c19","DOI":"10.1016\/0167-2789(92)90242-F"},{"doi-asserted-by":"publisher","key":"c20","DOI":"10.1002\/(ISSN)1097-0312"},{"doi-asserted-by":"publisher","key":"c21","DOI":"10.1007\/BF02294245"},{"unstructured":"F. Hppner, F. Klawonn, R. Kruse, and T. Runkler, Fuzzy cluster analysis: methods for classification, data analysis and image recognition, J. Wiley, 1999.","key":"c22"},{"year":"2004","author":"Weisenseel","article-title":"Exploiting shared image structure fusion in multi-modality data inversion for atherosclerotic plaque characterization","key":"c23"},{"year":"2005","author":"Weisenseel","article-title":"Multisensor data inversion and fusion based on shared image structure","key":"c24"},{"key":"c25","article-title":"Robust multifrequency inversion in terahertz diffraction tomography","volume":"7873","author":"Chen","year":"2011"},{"doi-asserted-by":"publisher","key":"c26","DOI":"10.1002\/(ISSN)1097-0312"},{"doi-asserted-by":"publisher","key":"c27","DOI":"10.1117\/1.2150368"},{"doi-asserted-by":"publisher","key":"c28","DOI":"10.1109\/83.491321"},{"doi-asserted-by":"publisher","key":"c29","DOI":"10.1109\/TIP.2010.2058811"}],"event":{"name":"IS&T\/SPIE Electronic Imaging","location":"San Francisco, California, USA"},"container-title":["SPIE Proceedings","Computational Imaging XII"],"original-title":[],"deposited":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T07:50:46Z","timestamp":1565250646000},"score":1,"resource":{"primary":{"URL":"http:\/\/proceedings.spiedigitallibrary.org\/proceeding.aspx?doi=10.1117\/12.2047282"}},"subtitle":[],"editor":[{"given":"Charles A.","family":"Bouman","sequence":"first","affiliation":[]},{"given":"Ken D.","family":"Sauer","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2014,3,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1117\/12.2047282","relation":{},"ISSN":["0277-786X"],"issn-type":[{"type":"print","value":"0277-786X"}],"subject":[],"published":{"date-parts":[[2014,3,7]]}}}