Author of the publication

Inversion of Deep-Water Velocity Using the Munk Formula and the Seabed Reflection Traveltime: An Inversion Scheme That Takes the Complex Seabed Topography Into Account.

, , , , and . IEEE Trans. Geosci. Remote. Sens., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Regression analysis of current status data in the presence of dependent censoring with applications to tumorigenicity experiments., , , and . Comput. Stat. Data Anal., (2017)Generalized log-rank test for mixed interval-censored failure time data., and . Statistics in medicine, 23 (10): 1621-9 (May 2004)4092<m:linebreak></m:linebreak>LR: 20061115; PUBM: Print; CI: Copyright 2004; JID: 8215016; ppublish;<m:linebreak></m:linebreak>Anàlisi de supervivència; Interval-censored.Regression analysis of asynchronous longitudinal data with informative observation processes., , and . Comput. Stat. Data Anal., (2021)Regression analysis of multivariate recurrent event data with time-varying covariate effects., , and . J. Multivar. Anal., 100 (10): 2214-2223 (2009)A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT., , , , , and . Secur. Commun. Networks, (2017)A Large-Scale Image Retrieval Method Based on Image Elimination Technology and Supervised Kernel Hash., , , , and . ADHIP, volume 279 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 233-243. Springer, (2018)Research on Cross-Layer Optimization of Smart Grid Demand Side Based on WSNs., , , and . QRS Companion, page 414-420. IEEE, (2018)Research of Sentence-Level Intelligent Input Method Based on Symbian OS., , and . IMSCCS (2), page 666-670. IEEE Computer Society, (2006)0-7695-2581-4.Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graphs., , , , , , and . CoRR, (2024)Underwater Acoustic Target Recognition with Fusion Feature., , , , and . ICONIP (1), volume 13108 of Lecture Notes in Computer Science, page 609-620. Springer, (2021)