default search action
Michael Schwarz 0001
Person information
- affiliation: CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
- affiliation (former): Graz University of Technology, Austria
Other persons with the same name
- Michael Schwarz — disambiguation page
- Michael Schwarz 0002 — Yahoo! Labs, Berkeley, CA, USA
- Michael Schwarz 0003 — Esri R&D Center Zurich, Switzerland (and 3 more)
- Michael Schwarz 0004 — University of Duisburg-Essen, Duisburg, Germany
- Michael Schwarz 0005 — Municipal Hospital Dortmund, Germany
- Michael Schwarz 0006 — University of Ulm, Germany
- Michael Schwarz 0007 — Technische Universität München, Germany
- Michael Schwarz 0008 — Joanneum Research Forschungsgesellschaft mbH, Graz, Austria
- Michael Schwarz 0009 (aka: Peter Michael Schwarz) — Philipps-Universität Marburg, University of Marburg, Department of Mathematics and Computer Science, Germany
- Michael Schwarz 0010 — Kaiserslautern University of Technology, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c60]Lorenz Hetterich, Markus Bauer, Michael Schwarz, Christian Rossow:
Switchpoline: A Software Mitigation for Spectre-BTB and Spectre-BHB on ARMv8. AsiaCCS 2024 - [c59]Lukas Gerlach, Simon Schwarz, Nicolas Faroß, Michael Schwarz:
Efficient and Generic Microarchitectural Hash-Function Recovery. SP 2024: 3661-3678 - [c58]Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng Lü, Andreas Kogler, Michael Schwarz:
CacheWarp: Software-based Fault Injection using Selective State Reset. USENIX Security Symposium 2024 - 2023
- [c57]Till Schlüter, Amit Choudhari, Lorenz Hetterich, Leon Trampert, Hamed Nemati, Ahmad Ibrahim, Michael Schwarz, Christian Rossow, Nils Ole Tippenhauer:
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers. CCS 2023: 975-989 - [c56]Daniel Weber, Fabian Thomas, Lukas Gerlach, Ruiyi Zhang, Michael Schwarz:
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks. ESORICS (3) 2023: 22-42 - [c55]Lukas Gerlach, Fabian Thomas, Robert Pietsch, Michael Schwarz:
A Rowhammer Reproduction Study Using the Blacksmith Fuzzer. ESORICS (3) 2023: 62-79 - [c54]Daniel Weber, Fabian Thomas, Lukas Gerlach, Ruiyi Zhang, Michael Schwarz:
Reviving Meltdown 3a. ESORICS (3) 2023: 80-99 - [c53]Dhiman Chakraborty, Michael Schwarz, Sven Bugiel:
TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors. FC (1) 2023: 147-165 - [c52]Pietro Borrello, Catherine Easdon, Martin Schwarzl, Roland Czerny, Michael Schwarz:
CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode. SP (Workshops) 2023: 285-297 - [c51]Martin Schwarzl, Pietro Borrello, Gururaj Saileshwar, Hanna Müller, Michael Schwarz, Daniel Gruss:
Practical Timing Side-Channel Attacks on Memory Compression. SP 2023: 1186-1203 - [c50]Lukas Gerlach, Daniel Weber, Ruiyi Zhang, Michael Schwarz:
A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs. SP 2023: 2321-2338 - [c49]Ruiyi Zhang, Taehyun Kim, Daniel Weber, Michael Schwarz:
(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels. USENIX Security Symposium 2023: 7267-7284 - [c48]Andreas Kogler, Jonas Juffinger, Lukas Giner, Lukas Gerlach, Martin Schwarzl, Michael Schwarz, Daniel Gruss, Stefan Mangard:
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels. USENIX Security Symposium 2023: 7285-7302 - [i28]Dhiman Chakraborty, Michael Schwarz, Sven Bugiel:
TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors (Technical Report). CoRR abs/2306.03643 (2023) - [i27]Daniel Weber, Fabian Thomas, Lukas Gerlach, Ruiyi Zhang, Michael Schwarz:
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks. CoRR abs/2310.04183 (2023) - [i26]Daniel Weber, Fabian Thomas, Lukas Gerlach, Ruiyi Zhang, Michael Schwarz:
Reviving Meltdown 3a. CoRR abs/2310.04192 (2023) - 2022
- [c47]Mohammad Sina Karvandi, MohammadHosein Gholamrezaei, Saleh Khalaj Monfared, Soroush Meghdadi Zanjani, Behrooz Abbassi, Ali Amini, Reza Mortazavi, Saeid Gorgin, Dara Rahmati, Michael Schwarz:
HyperDbg: Reinventing Hardware-Assisted Debugging. CCS 2022: 1709-1723 - [c46]Lorenz Hetterich, Michael Schwarz:
Branch Different - Spectre Attacks on Apple Silicon. DIMVA 2022: 116-135 - [c45]Leon Trampert, Christian Rossow, Michael Schwarz:
Browser-Based CPU Fingerprinting. ESORICS (3) 2022: 87-105 - [c44]Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Michael Schwarz, Daniel Gruss:
Robust and Scalable Process Isolation Against Spectre in the Cloud. ESORICS (2) 2022: 167-186 - [c43]Thomas Rokicki, Clémentine Maurice, Michael Schwarz:
CPU Port Contention Without SMT. ESORICS (3) 2022: 209-228 - [c42]Andreas Kogler, Daniel Weber, Martin Haubenwallner, Moritz Lipp, Daniel Gruss, Michael Schwarz:
Finding and Exploiting CPU Features using MSR Templating. SP 2022: 1474-1490 - [c41]Moritz Lipp, Daniel Gruss, Michael Schwarz:
AMD Prefetch Attacks through Power and Time. USENIX Security Symposium 2022: 643-660 - [c40]Lukas Giner, Andreas Kogler, Claudio Canella, Michael Schwarz, Daniel Gruss:
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX. USENIX Security Symposium 2022: 3111-3127 - [c39]Catherine Easdon, Michael Schwarz, Martin Schwarzl, Daniel Gruss:
Rapid Prototyping for Microarchitectural Attacks. USENIX Security Symposium 2022: 3861-3877 - [c38]Pietro Borrello, Andreas Kogler, Martin Schwarzl, Moritz Lipp, Daniel Gruss, Michael Schwarz:
ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture. USENIX Security Symposium 2022: 3917-3934 - [c37]Andreas Kogler, Daniel Gruss, Michael Schwarz:
Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks. USENIX Security Symposium 2022: 4147-4164 - [i25]Claudio Canella, Sebastian Dorn, Daniel Gruss, Michael Schwarz:
SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in Modern Systems. CoRR abs/2202.13716 (2022) - [i24]Mohammad Sina Karvandi, MohammadHosein Gholamrezaei, Saleh Khalaj Monfared, Suorush Medi, Behrooz Abbassi, Ali Amini, Reza Mortazavi, Saeid Gorgin, Dara Rahmati, Michael Schwarz:
HyperDbg: Reinventing Hardware-Assisted Debugging. CoRR abs/2207.05676 (2022) - 2021
- [c36]Claudio Canella, Mario Werner, Daniel Gruss, Michael Schwarz:
Automating Seccomp Filter Generation for Linux Applications. CCSW 2021: 139-151 - [c35]Martin Schwarzl, Claudio Canella, Daniel Gruss, Michael Schwarz:
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation. Financial Cryptography (1) 2021: 293-310 - [c34]Martin Schwarzl, Thomas Schuster, Michael Schwarz, Daniel Gruss:
Speculative Dereferencing: Reviving Foreshadow. Financial Cryptography (1) 2021: 311-330 - [c33]Moritz Lipp, Andreas Kogler, David F. Oswald, Michael Schwarz, Catherine Easdon, Claudio Canella, Daniel Gruss:
PLATYPUS: Software-based Power Side-Channel Attacks on x86. SP 2021: 355-371 - [c32]Daniel Weber, Ahmad Ibrahim, Hamed Nemati, Michael Schwarz, Christian Rossow:
Osiris: Automated Discovery of Microarchitectural Side Channels. USENIX Security Symposium 2021: 1415-1432 - [i23]Daniel Weber, Ahmad Ibrahim, Hamed Nemati, Michael Schwarz, Christian Rossow:
Osiris: Automated Discovery of Microarchitectural Side Channels. CoRR abs/2106.03470 (2021) - [i22]Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Daniel Gruss, Michael Schwarz:
Dynamic Process Isolation. CoRR abs/2110.04751 (2021) - [i21]Martin Schwarzl, Pietro Borrello, Gururaj Saileshwar, Hanna Müller, Michael Schwarz, Daniel Gruss:
Practical Timing Side Channel Attacks on Memory Compression. CoRR abs/2111.08404 (2021) - [i20]Claudio Canella, Andreas Kogler, Lukas Giner, Daniel Gruss, Michael Schwarz:
Domain Page-Table Isolation. CoRR abs/2111.10876 (2021) - 2020
- [j5]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg, Raoul Strackx:
Meltdown: reading kernel memory from user space. Commun. ACM 63(6): 46-56 (2020) - [j4]Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre attacks: exploiting speculative execution. Commun. ACM 63(7): 93-101 (2020) - [j3]Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard:
Malware Guard Extension: abusing Intel SGX to conceal cache attacks. Cybersecur. 3(1): 2 (2020) - [j2]Michael Schwarz, Daniel Gruss:
How Trusted Execution Environments Fuel Research on Microarchitectural Attacks. IEEE Secur. Priv. 18(5): 18-27 (2020) - [c31]Claudio Canella, Michael Schwarz, Martin Haubenwallner, Martin Schwarzl, Daniel Gruss:
KASLR: Break It, Fix It, Repeat. AsiaCCS 2020: 481-493 - [c30]Moritz Lipp, Vedad Hadzic, Michael Schwarz, Arthur Perais, Clémentine Maurice, Daniel Gruss:
Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors. AsiaCCS 2020: 813-825 - [c29]Moritz Lipp, Michael Schwarz, Lukas Raab, Lukas Lamster, Misiker Tadesse Aga, Clémentine Maurice, Daniel Gruss:
Nethammer: Inducing Rowhammer Faults through Network Requests. EuroS&P Workshops 2020: 710-719 - [c28]Michael Schwarz, Moritz Lipp, Claudio Canella, Robert Schilling, Florian Kargl, Daniel Gruss:
ConTExT: A Generic Approach for Mitigating Spectre. NDSS 2020 - [c27]Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruss, Frank Piessens:
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. SP 2020: 54-72 - [c26]Daniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz:
Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis. USENIX Security Symposium 2020: 1427-1444 - [c25]David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, Daniel Gruss:
Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86. USENIX Security Symposium 2020: 1677-1694 - [i19]Martin Schwarzl, Thomas Schuster, Michael Schwarz, Daniel Gruss:
Speculative Dereferencing of Registers: Reviving Foreshadow. CoRR abs/2008.02307 (2020) - [i18]Claudio Canella, Mario Werner, Daniel Gruss, Michael Schwarz:
Automating Seccomp Filter Generation for Linux Applications. CoRR abs/2012.02554 (2020)
2010 – 2019
- 2019
- [c24]Daniel Gruss, Erik Kraft, Trishita Tiwari, Michael Schwarz, Ari Trachtenberg, Jason Hennessey, Alex Ionescu, Anders Fogh:
Page Cache Attacks. CCS 2019: 167-180 - [c23]Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, Daniel Gruss:
ZombieLoad: Cross-Privilege-Boundary Data Sampling. CCS 2019: 753-768 - [c22]Claudio Canella, Daniel Genkin, Lukas Giner, Daniel Gruss, Moritz Lipp, Marina Minkin, Daniel Moghimi, Frank Piessens, Michael Schwarz, Berk Sunar, Jo Van Bulck, Yuval Yarom:
Fallout: Leaking Data on Meltdown-resistant CPUs. CCS 2019: 769-784 - [c21]Michael Schwarz, Samuel Weiser, Daniel Gruss:
Practical Enclave Malware with Intel SGX. DIMVA 2019: 177-196 - [c20]Michael Schwarz, Martin Schwarzl, Moritz Lipp, Jon Masters, Daniel Gruss:
NetSpectre: Read Arbitrary Memory over Network. ESORICS (1) 2019: 279-299 - [c19]Michael Schwarz, Florian Lackner, Daniel Gruss:
JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits. NDSS 2019 - [c18]Samuel Weiser, Luca Mayr, Michael Schwarz, Daniel Gruss:
SGXJail: Defeating Enclave Malware via Confinement. RAID 2019: 353-366 - [c17]Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. IEEE Symposium on Security and Privacy 2019: 1-19 - [c16]Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss:
A Systematic Evaluation of Transient Execution Attacks and Defenses. USENIX Security Symposium 2019: 249-266 - [c15]Mario Werner, Thomas Unterluggauer, Lukas Giner, Michael Schwarz, Daniel Gruss, Stefan Mangard:
ScatterCache: Thwarting Cache Attacks via Cache Set Randomization. USENIX Security Symposium 2019: 675-692 - [i17]Daniel Gruss, Erik Kraft, Trishita Tiwari, Michael Schwarz, Ari Trachtenberg, Jason Hennessey, Alex Ionescu, Anders Fogh:
Page Cache Attacks. CoRR abs/1901.01161 (2019) - [i16]Michael Schwarz, Samuel Weiser, Daniel Gruss:
Practical Enclave Malware with Intel SGX. CoRR abs/1902.03256 (2019) - [i15]Michael Schwarz, Claudio Canella, Lukas Giner, Daniel Gruss:
Store-to-Leak Forwarding: Leaking Data on Meltdown-resistant CPUs. CoRR abs/1905.05725 (2019) - [i14]Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, Daniel Gruss:
ZombieLoad: Cross-Privilege-Boundary Data Sampling. CoRR abs/1905.05726 (2019) - [i13]Michael Schwarz, Robert Schilling, Florian Kargl, Moritz Lipp, Claudio Canella, Daniel Gruss:
ConTExT: Leakage-Free Transient Execution. CoRR abs/1905.09100 (2019) - [i12]Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Frank Piessens, Berk Sunar, Yuval Yarom:
Fallout: Reading Kernel Writes From User Space. CoRR abs/1905.12701 (2019) - 2018
- [c14]Daniel Gruss, Michael Schwarz, Matthias Wübbeling, Simon Guggi, Timo Malderle, Stefan More, Moritz Lipp:
Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services. AsiaCCS 2018: 297-311 - [c13]Michael Schwarz, Daniel Gruss, Moritz Lipp, Clémentine Maurice, Thomas Schuster, Anders Fogh, Stefan Mangard:
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features. AsiaCCS 2018: 587-600 - [c12]Michael Schwarz, Moritz Lipp, Daniel Gruss:
JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks. NDSS 2018 - [c11]Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard:
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks. NDSS 2018 - [c10]Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom:
Another Flip in the Wall of Rowhammer Defenses. IEEE Symposium on Security and Privacy 2018: 245-261 - [c9]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown: Reading Kernel Memory from User Space. USENIX Security Symposium 2018: 973-990 - [i11]Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. CoRR abs/1801.01203 (2018) - [i10]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown. CoRR abs/1801.01207 (2018) - [i9]Moritz Lipp, Misiker Tadesse Aga, Michael Schwarz, Daniel Gruss, Clémentine Maurice, Lukas Raab, Lukas Lamster:
Nethammer: Inducing Rowhammer Faults through Network Requests. CoRR abs/1805.04956 (2018) - [i8]Michael Schwarz, Martin Schwarzl, Moritz Lipp, Daniel Gruss:
NetSpectre: Read Arbitrary Memory over Network. CoRR abs/1807.10535 (2018) - [i7]Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss:
A Systematic Evaluation of Transient Execution Attacks and Defenses. CoRR abs/1811.05441 (2018) - [i6]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown. meltdownattack.com (2018) - [i5]Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. meltdownattack.com (2018) - 2017
- [j1]Thomas Ulz, Michael Schwarz, Alexander Felfernig, Sarah Haas, Amal Shehadeh, Stefan Reiterer, Martin Stettinger:
Human computation for constraint-based recommenders. J. Intell. Inf. Syst. 49(1): 37-57 (2017) - [c8]Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard:
Malware Guard Extension: Using SGX to Conceal Cache Attacks. DIMVA 2017: 3-24 - [c7]Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, Clémentine Maurice, Stefan Mangard:
Practical Keystroke Timing Attacks in Sandboxed JavaScript. ESORICS (2) 2017: 191-209 - [c6]Daniel Gruss, Moritz Lipp, Michael Schwarz, Richard Fellner, Clémentine Maurice, Stefan Mangard:
KASLR is Dead: Long Live KASLR. ESSoS 2017: 161-176 - [c5]Michael Schwarz, Clémentine Maurice, Daniel Gruss, Stefan Mangard:
Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript. Financial Cryptography 2017: 247-267 - [c4]Clémentine Maurice, Manuel Weber, Michael Schwarz, Lukas Giner, Daniel Gruss, Carlo Alberto Boano, Stefan Mangard, Kay Römer:
Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud. NDSS 2017 - [i4]Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard:
Malware Guard Extension: Using SGX to Conceal Cache Attacks. CoRR abs/1702.08719 (2017) - [i3]Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard:
KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks. CoRR abs/1706.06381 (2017) - [i2]Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom:
Another Flip in the Wall of Rowhammer Defenses. CoRR abs/1710.00551 (2017) - [i1]Michael Schwarz, Daniel Gruss, Moritz Lipp, Clémentine Maurice, Thomas Schuster, Anders Fogh, Stefan Mangard:
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features. CoRR abs/1711.01254 (2017) - 2016
- [c3]Peter Pessl, Daniel Gruss, Clémentine Maurice, Michael Schwarz, Stefan Mangard:
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. USENIX Security Symposium 2016: 565-581 - 2015
- [c2]Alexander Felfernig, Michael Jeran, Martin Stettinger, Thomas Absenger, Thomas Gruber, Sarah Haas, Emanuel Kirchengast, Michael Schwarz, Lukas Skofitsch, Thomas Ulz:
Human Computation Based Acquisition of Financial Service Advisory Practices. FINREC 2015: 27-34 - 2014
- [c1]Andreas Holzinger, Michael Schwarz, Bernhard Ofner, Fleur Jeanquartier, André Calero Valdez, Carsten Röcker, Martina Ziefle:
Towards Interactive Visualization of Longitudinal Data to Support Knowledge Discovery on Multi-touch Tablet Computers. CD-ARES 2014: 124-137
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint