Author of the publication

Precise Orbit Determination for BeiDou GEO/IGSO Satellites during Orbit Maneuvering with Pseudo-Stochastic Pulses.

, , , , , , , and . Remote. Sens., 11 (21): 2587 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of Large Language Models, , , , , , , , , and 12 other author(s). (2023)cite arxiv:2303.18223Comment: ongoing work; 85 pages, 610 citations.LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (1): 28:1-28:25 (2019)Image-Based Insider Threat Detection via Geometric Transformation., , , , , and . Secur. Commun. Networks, (2021)Design and implementation of homogeneous multi-core system., , , and . ASICON, page 788-791. IEEE, (2017)Solutions for One-Dimensional Time-Dependent Schrödinger Equations., , and . ICICA (2), volume 308 of Communications in Computer and Information Science, page 371-378. Springer, (2012)How to Develop Service Climate in G2B E-Service Industry: a Multi-method Study., , and . PACIS, page 351. (2016)Supporting quality of service in energy harvesting wireless links: The effective capacity analysis., , , , and . ICC Workshops, page 901-906. IEEE, (2014)Hadoop-RINS - A Hadoop Accelerated Pipeline for Rapid Nonhuman Sequence Identification., , , , , and . BIOINFORMATICS, page 296-299. SciTePress, (2013)Web service sub-chain recommendation leveraging graph searching., , , and . ComComAP, page 271-275. IEEE, (2014)PrivacyContext: identifying malicious mobile privacy leak using program context., and . Int. J. Inf. Comput. Secur., 11 (6): 562-584 (2019)