Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experimental validation of the Corbella's visibility function using HUT-2D and MIRAS., , , , , , , and . IGARSS, page 4286-4289. IEEE, (2010)SMOS L1 algorithms., , , , , , , , , and . IGARSS, page 3154-3157. IEEE, (2010)Rfianalysis in smos imagery., , , , , and . IGARSS, page 2007-2010. IEEE, (2010)Detection and mitigation of radio frequency interference in SMOS data., , and . IGARSS, page 4575-4578. IEEE, (2012)Review of the image reconstruction techniques used in SMOS data processing., , , and . IGARSS, page 4648-4651. IEEE, (2012)Smos payload performance assessment., , , , , , , , , and 4 other author(s). IGARSS, page 3150-3153. IEEE, (2010)SMOS instrument performance and calibration., , , , , , , , , and 4 other author(s). IGARSS, page 2864-2867. IEEE, (2012)Well-Founded IT Architecture Ontology: An Approach from a Service Continuity Perspective., , , and . NDT (2), volume 294 of Communications in Computer and Information Science, page 136-150. Springer, (2012)Mapping of vulnerabilities in the public cloud with the use of foundational ontology: A perspective for service IaaS., , , and . ICDIM, page 245-252. IEEE, (2012)