Author of the publication

Forest vertical structure parameters extraction from airborne X-band InSAR data.

, , , , and . IGARSS, page 155-158. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unambiguous correct discrimination of linearly dependent states with multiple copies., , and . Quantum Inf. Process., 23 (1): 26 (January 2024)Revisiting unambiguous discrimination., , , and . Quantum Inf. Process., 21 (1): 4 (2022)Computerized texture analysis of mammographic parenchymal patterns of digitized mammograms., , , , , and . CARS, volume 1268 of International Congress Series, page 878-881. Elsevier, (2004)Quality Cost Optimization Problems Research Based on the Operating Station with Winning Machine., and . CSISE (1), volume 104 of Advances in Intelligent and Soft Computing, page 105-111. Springer, (2011)Deep learning in computer-aided diagnosis incorporating mammographic characteristics of both tumor and parenchyma stroma., , , , and . IWBI, volume 10718 of SPIE Proceedings, page 1071806. SPIE, (2018)Automatic selection of region of interest for radiographic texture analysis., , , , , , , , and . Medical Imaging: Computer-Aided Diagnosis, volume 6514 of SPIE Proceedings, page 651436. SPIE, (2007)Optimizing feature selection across a multimodality database in computerized classification of breast lesions., , , , , , , and . Medical Imaging: Image Processing, volume 4684 of SPIE Proceedings, SPIE, (2002)Intelligent CAD workstation for breast imaging using similarity to known lesions and multiple visual prompt aids., , , , , , , and . Medical Imaging: Image Processing, volume 4684 of SPIE Proceedings, SPIE, (2002)The effects of social messaging on students' learning and intrinsic motivation in peer assessment., , and . J. Comput. Assist. Learn., 36 (4): 439-448 (2020)UC-RBAC: A Usage Constrained Role-Based Access Control Model., , , and . ICICS, volume 2836 of Lecture Notes in Computer Science, page 337-347. Springer, (2003)