Author of the publication

Modeling synthetic aperture radar computation with Aspen.

, , , and . Int. J. High Perform. Comput. Appl., 27 (3): 255-262 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling synthetic aperture radar computation with Aspen., , , and . Int. J. High Perform. Comput. Appl., 27 (3): 255-262 (2013)GAIA - a unified framework for sediment transport and bed evolution in rivers, coastal seas and transitional waters in the TELEMAC-MASCARET modelling system., , , , , , , , , and . Environ. Model. Softw., (2023)Optimizing the computation of n-point correlations on large-scale astronomical data., , , , , , , , and . SC, page 74. IEEE/ACM, (2012)Efficient backprojection-based synthetic aperture radar computation with many-core processors., , , , and . Sci. Program., 21 (3-4): 165-179 (2013)Efficient backprojection-based synthetic aperture radar computation with many-core processors., , , , and . SC, page 28. IEEE/ACM, (2012)Scalable hierarchical PDE sampler for generating spatially correlated random fields using nonmatching meshes., , , , , and . Numer. Linear Algebra Appl., (2018)Computational Analysis and Improvement of SIRT., and . IEEE Trans. Med. Imaging, 27 (7): 918-924 (2008)Energy Minimization for Liquid Crystal Equilibrium with Electric and Flexoelectric Effects., , , , and . SIAM J. Sci. Comput., (2015)Secure distributed membership tests via secret sharing: How to hide your hostile hosts: Harnessing shamir secret sharing., , , , , and . ICNC, page 1-6. IEEE Computer Society, (2016)Preconditioning a mass-conserving discontinuous Galerkin discretization of the Stokes equations., , and . Numerical Lin. Alg. with Applic., (2017)