Author of the publication

Alerts of forest disturbance from MODIS imagery.

, , and . Int. J. Applied Earth Observation and Geoinformation, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. David Remy University of Stuttgart

Periodic Trajectories of Passive One-Legged Hopper, and . Dataset, (2024)Related to: M. Raff, N. Rosa and C. D. Remy, "Connecting Gaits in Energetically Conservative Legged Systems," in IEEE Robotics and Automation Letters, vol. 7, no. 3, pp. 8407-8414, July 2022,. doi: 10.1109/LRA.2022.3186500.
 

Other publications of authors with the same name

Last Orders.. Security Protocols Workshop, volume 3957 of Lecture Notes in Computer Science, page 324. Springer, (2004)Protocols Using Keys from Faulty Data (Transcript of Discussion).. Security Protocols Workshop, volume 2467 of Lecture Notes in Computer Science, page 180-187. Springer, (2001)Direct Relative Edge Optimization, A Robust Alternative for Pose Graph Optimization., , , , and . IEEE Robotics and Automation Letters, 4 (2): 1932-1939 (2019)Hardware security risk assessment: A case study., and . HOST, page 179-184. IEEE Computer Society, (2016)Alerts of forest disturbance from MODIS imagery., , and . Int. J. Applied Earth Observation and Geoinformation, (2014)Protocols Using Keys from Faulty Data.. Security Protocols Workshop, volume 2467 of Lecture Notes in Computer Science, page 170-179. Springer, (2001)BOSS-LDG: A Novel Computational Framework that Brings Together Blue Waters, Open Science Grid, Shifter and the LIGO Data Grid to Accelerate Gravitational Wave Discovery., , , , , , , , , and 2 other author(s). CoRR, (2017)Transferring a petabyte in a day., , , , , and . Future Generation Comp. Syst., (2018)Merkle Puzzles Revisited - Finding Matching Elements Between Lists., and . Security Protocols Workshop, volume 2467 of Lecture Notes in Computer Science, page 87-90. Springer, (2001)Transactions Using Bets.. Security Protocols Workshop, volume 1189 of Lecture Notes in Computer Science, page 89-92. Springer, (1996)