Skip to main content
Article
Licensed
Unlicensed Requires Authentication

Bistatic RCS Computations by FDTD and Comparison with other Rigorous Methods and Experiment

  • , , and
Published/Copyright: May 1, 2000
Become an author with De Gruyter Brill

Published Online: 2000-05

©2011 by Walter de Gruyter GmbH & Co.

Downloaded on 30.4.2026 from https://www.degruyterbrill.com/document/doi/10.1515/FREQ.2000.54.5-6.141/html?lang=en
Scroll to top button