Author of the publication

A Methodological Framework to Retrospectively Obtain Downscaled Precipitation Estimates over the Tibetan Plateau.

, , , , , , , and . Remote Sensing, 10 (12): 1974 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparisons of Spatially Downscaling TMPA and IMERG over the Tibetan Plateau., , , , , , and . Remote Sensing, 10 (12): 1883 (2018)TF-BIV: transparent and fine-grained binary integrity verification in the cloud., , , , , and . ACSAC, page 57-69. ACM, (2019)Quantitative Evaluations and Error Source Analysis of Fengyun-2-Based and GPM-Based Precipitation Products over Mainland China in Summer, 2018., , , , , , and . Remote Sensing, 11 (24): 2992 (2019)Improving TMPA 3B43 V7 Data Sets Using Land-Surface Characteristics and Ground Observations on the Qinghai-Tibet Plateau., , , , , and . IEEE Geosci. Remote. Sens. Lett., 15 (2): 178-182 (2018)Copker: A Cryptographic Engine Against Cold-Boot Attacks., , , , , and . IEEE Trans. Dependable Sec. Comput., 15 (5): 742-754 (2018)A Methodological Framework to Retrospectively Obtain Downscaled Precipitation Estimates over the Tibetan Plateau., , , , , , , and . Remote Sensing, 10 (12): 1974 (2018)Does AGRI of FY4A Have the Ability to Capture the Motions of Precipitation?, and . IEEE Geosci. Remote. Sens. Lett., (2022)A spatial data model and its application in 3D geological modeling., , , , and . FSKD, page 903-907. IEEE, (2013)RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks., , , , , and . SEC, volume 471 of IFIP Advances in Information and Communication Technology, page 293-307. Springer, (2016)Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers., , , , and . Journal of Computer Security, 27 (5): 547-580 (2019)