Author of the publication

Radiometric Calibration of Fengyun-3D Mersi-II Satellite: A Case Study in Lake Qinghai, China.

, , , , , , , and . IGARSS, page 6109-6112. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

System Analysis and Design of an Online Group-Buying System with Android., , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 1895-1904. IOS Press, (2014)iPTF Discovery of the Rapid "Turn On" of a Luminous Quasar, , , , , , , , , and 6 other author(s). (2016)cite arxiv:1612.04830Comment: Accepted for Publication in ApJ.Decomposition of decision systems based on granular computing., and . GrC, page 590-595. IEEE Computer Society, (2011)Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table., , and . Trustcom/BigDataSE/ISPA, page 394-401. IEEE, (2016)Cues or Content? Examining the Moderating Role of Crowdfunder Experience., and . AMCIS, Association for Information Systems, (2017)Extended Schmidt Law: Role Of Existing Stars In Current Star Formation, , , , , , and . (2011)cite arxiv:1103.3711 Comment: 18 pages, 9 figures, resubmitted to ApJ.Device and architecture co-optimization for FPGA power reduction., , , , and . DAC, page 915-920. ACM, (2005)FPGA power reduction using configurable dual-Vdd., , and . DAC, page 735-740. ACM, (2004)Impact of Online Influencer Endorsement on Product Sales: Quantifying Value of Online Influencer., , and . PACIS, page 201. (2018)SafeStack ^+ : Enhanced Dual Stack to Combat Data-Flow Hijacking., , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 95-112. Springer, (2017)