Skip to main content
. 2017 Feb 10;2016:1169–1178.

Figure 3.

Figure 3.

Building BDAM vector using two checkpoints (a) an example of a randomly sampled checkpoint and (b) an alternative sampled checkpoint