Reference:Reference-019075: Difference between revisions

From CSDMS
Bot: Automated import of articles *** existing text overwritten ***
No edit summary
 
Line 17: Line 17:
|MS_PublicationClusterID=0
|MS_PublicationClusterID=0
|Semantic_ID=eec0147e0191a19489d6817a761655107a182e9b
|Semantic_ID=eec0147e0191a19489d6817a761655107a182e9b
|CorpusID=0
|PublicationWhatKindOf=a module application description
|PublicationWhatKindOf=a module application description
|PublicationNrofModels=a single module
|PublicationNrofModels=a single module

Latest revision as of 18:06, 9 October 2024



Author(s) Laroche, Christophe; Alquier, Mathieu; Floriani, Fanny; Tejral, Ron; Lang, M.; Klijn, F.; Samuels, P.;
BibType journalArticle
Title Breach modelling by overflow with TELEMAC 2D: comparison with largescale experiments
Editors
Year 2016
Journal E3S Web of Conferences
Booktitle
Volume 7
Pages 04001
URL http://www.e3s-conferences.org/10.1051/e3sconf/20160704001
DOI 10.1051/e3sconf/20160704001
ISBN
Note Auto downloaded ref at: 2022-02-22


 
Feature reference No
PublicationClusterID 0
MS_PublicationClusterID 0
Semantic_ID eec0147e0191a19489d6817a761655107a182e9b
Nr of citations 0
Sort of publication a module application description
Sort of model publication a single module
Is the CSDMS HPC used No
If HPC is used, for what project was it?:
Associated simulation movie if any:


Model(s) discussed: The TELEMAC system