Author of the publication

Using crop simulation model to study the time lag between precipitation and NDVI and its effect on NDVI based agricultural applications.

, , , , and . IGARSS, page 4084-4086. IEEE, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. Daniel Weiskopf University of Stuttgart

Dataset for "How Deep Is Your Gaze? Leveraging Distance in Image-Based Gaze Analysis", , , and . Dataset, (2024)Related to: Maurice Koch, Nelusa Pathmanathan, Daniel Weiskopf, and Kuno Kurzhals.2024. How Deep Is Your Gaze? Leveraging Distance in Image-Based GazeAnalysis. In 2024 Symposium on Eye Tracking Research and Applications(ETRA ’24), June 04–07, 2024, Glasgow, United Kingdom. ACM, New York,NY, USA, 7 pages. doi: 10.1145/3649902.3653349.
 

Other publications of authors with the same name

Position Auction.. Encyclopedia of Algorithms, (2016)Stabilization analysis of time-delay Hamiltonian systems in the presence of saturation.. Applied Mathematics and Computation, 217 (23): 9625-9634 (2011)Color image segmentation using PDTDFB domain hidden Markov tree model., , , , and . Appl. Soft Comput., (2015)An Improved Algorithm for Implication Testing Involving Arithmetic Inequalities., and . IEEE Trans. Knowl. Data Eng., 6 (6): 997-1001 (1994)Addendum to Ön Satisfiability, Equivalence, and Implication Problems Involving Conjunctive Queries in Database Systems"., , and . IEEE Trans. Knowl. Data Eng., 10 (5): 863 (1998)Development of a decision-support system for rural eco-environmental management in Yongxin County, Jiangxi Province, China., , , , and . Environmental Modelling and Software, 25 (1): 24-42 (2010)Random grid-based visual secret sharing for general access structures with cheat-preventing ability., and . Journal of Systems and Software, 85 (5): 1119-1134 (2012)High-capacity reversible data hiding in encrypted images by prediction error., and . Signal Processing, (2014)Comprehensive Performance Evaluation of VANETs for Safety-Related Applications., , , and . Wireless Personal Communications, 83 (4): 3017-3031 (2015)Binary image steganalysis based on pixel mesh Markov transition matrix., , and . J. Visual Communication and Image Representation, (2015)