default search action
Balaji Palanisamy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j20]Akshay Madan, David Tipper, Balaji Palanisamy, Mai Abdelhakim, Prashant Krishnamurthy, Vinay Chamola:
BLE-based sensors for privacy-enabled contagious disease monitoring with zero trust architecture. Ad Hoc Networks 167: 103693 (2025) - 2024
- [j19]David Tipper, Amy Babay, Balaji Palanisamy, Prashant Krishnamurthy:
Network Connectivity Resilience in Next Generation Backhaul Networks: Challenges and Future Opportunities. IEEE Trans. Netw. Serv. Manag. 21(5): 5321-5334 (2024) - [j18]Chao Li, Balaji Palanisamy:
T-Watch: Towards Timed Execution of Private Transaction in Blockchains. IEEE Trans. Serv. Comput. 17(3): 1279-1292 (2024) - [c71]Abdulrahman Alhaidari, Balaji Palanisamy, Prashant Krishnamurthy:
Digital Twin-Based Dynamic Task Assignment for Smart Home Maintenance. ICC Workshops 2024: 31-36 - [c70]Balaji Palanisamy, Jinlai Xu:
Efficient and Resilient Edge Computing: Algorithms, Techniques and Research Opportunities. ICDCN 2024: 8-11 - [c69]Jingzhe Wang, Haocheng Wang, Chao Li, Balaji Palanisamy:
Timed Data Release Using Smart Contracts. ICDCS 2024: 1420-1422 - [i16]Ying Song, Balaji Palanisamy:
MAPPING: Debiasing Graph Neural Networks for Fair Node Classification with Limited Sensitive Information Leakage. CoRR abs/2401.12824 (2024) - [i15]Chao Li, Balaji Palanisamy:
T-Watch: Towards Timed Execution of Private Transaction in Blockchains. CoRR abs/2405.08268 (2024) - [i14]Ying Song, Rita Singh, Balaji Palanisamy:
Krait: A Backdoor Attack Against Graph Prompt Tuning. CoRR abs/2407.13068 (2024) - [i13]Chao Li, Runhua Xu, Balaji Palanisamy, Li Duan, Meng Shen, Jiqiang Liu, Wei Wang:
Blockchain Takeovers in Web 3.0: An Empirical Study on the TRON-Steem Incident. CoRR abs/2407.17825 (2024) - 2023
- [j17]Jingzhe Wang, Balaji Palanisamy:
Securing blockchain-based timed data release against adversarial attacks. J. Comput. Secur. 31(6): 649-677 (2023) - [c68]Chao Li, Balaji Palanisamy, Runhua Xu, Li Duan:
Cross-Consensus Measurement of Individual-level Decentralization in Blockchains. BigDataSecurity/HPSC/IDS 2023: 45-50 - [c67]Chao Li, Balaji Palanisamy, Runhua Xu, Li Duan, Jiqiang Liu, Wei Wang:
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance. CCS 2023: 150-164 - [c66]Surya Nepal, Jaideep Vaidya, Elena Ferrari, Balaji Palanisamy:
Message from the General Chairs and PC Chairs TPS-ISA 2023. TPS-ISA 2023: xi - [i12]Chao Li, Balaji Palanisamy, Runhua Xu, Li Duan:
Cross-Consensus Measurement of Individual-level Decentralization in Blockchains. CoRR abs/2306.05788 (2023) - [i11]Chao Li, Balaji Palanisamy, Runhua Xu, Li Duan, Jiqiang Liu, Wei Wang:
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance. CoRR abs/2310.18596 (2023) - 2022
- [j16]Jinlai Xu, Balaji Palanisamy, Qingyang Wang, Heiko Ludwig, Sandeep Gopisetty:
Amnis: Optimized stream processing for edge computing. J. Parallel Distributed Comput. 160: 49-64 (2022) - [j15]Chao Li, Balaji Palanisamy:
SilentDelivery: Practical Timed-Delivery of Private Information Using Smart Contracts. IEEE Trans. Serv. Comput. 15(6): 3528-3540 (2022) - [c65]Muthukur Venkata Akhil Vasishta, Balaji Palanisamy, Shamik Sural:
Decentralized Authorization using Hyperledger Fabric. Blockchain 2022: 238-243 - [c64]Maddipati Varun, Balaji Palanisamy, Shamik Sural:
Mitigating Frontrunning Attacks in Ethereum. BSCI 2022: 115-124 - [c63]Jinlai Xu, Balaji Palanisamy, Qingyang Wang, Heiko Ludwig, Sandeep Gopisetty:
Decentralized Allocation of Geo-distributed Edge Resources using Smart Contracts. CCGRID 2022: 422-431 - [c62]Jingzhe Wang, Balaji Palanisamy:
Attack-Resilient Blockchain-Based Decentralized Timed Data Release. DBSec 2022: 123-140 - [c61]Somay Chopra, Balaji Palanisamy, Shamik Sural:
Credit-based Peer-to-Peer Ride Sharing using Smart Contracts. ICBC 2022: 1-3 - [c60]Jingzhe Wang, Balaji Palanisamy:
Protecting Blockchain-based Decentralized Timed release of Data from Malicious Adversaries. ICBC 2022: 1-2 - [c59]Jingzhe Wang, Balaji Palanisamy:
CTDRB: Controllable Timed Data Release Using Blockchains. SecureComm 2022: 231-249 - [c58]Ritik Kumar, Balaji Palanisamy, Shamik Sural:
Efficient Blockchain Enabled Attribute-based Access Control as a Service. TPS-ISA 2022: 87-96 - 2021
- [j14]Jinlai Xu, Balaji Palanisamy:
Optimized Contract-Based Model for Resource Allocation in Federated Geo-Distributed Clouds. IEEE Trans. Serv. Comput. 14(2): 530-543 (2021) - [c57]Jinlai Xu, Balaji Palanisamy, Qingyang Wang:
Resilient Stream Processing in Edge Computing. CCGRID 2021: 504-513 - [c56]Chao Li, Balaji Palanisamy, Runhua Xu, Jinlai Xu, Jingzhe Wang:
SteemOps: Extracting and Analyzing Key Operations in Steemit Blockchain-based Social Media Platform. CODASPY 2021: 113-118 - [c55]Jinlai Xu, Balaji Palanisamy:
Cost-aware & Fault-tolerant Geo-distributed Edge Computing for Low-latency Stream Processing. CIC 2021: 117-124 - [c54]Jinlai Xu, Balaji Palanisamy:
Model-based Reinforcement Learning for Elastic Stream Processing in Edge Computing. HiPC 2021: 292-301 - [c53]Maddipati Varun, Muthukur Venkata Akhil Vasishta, Balaji Palanisamy, Shamik Sural:
Decentralized Authorization in Web Services Using Public Blockchain. ICBC 2021: 27-42 - [c52]Ritik Kumar, Balaji Palanisamy, Shamik Sural:
BEAAS: Blockchain Enabled Attribute-Based Access Control as a Service. IEEE ICBC 2021: 1-3 - [i10]Chao Li, Balaji Palanisamy, Runhua Xu, Jinlai Xu, Jingzhe Wang:
SteemOps: Extracting and Analyzing Key Operations in Steemit Blockchain-based Social Media Platform. CoRR abs/2102.00177 (2021) - 2020
- [j13]Yang Zhou, Ling Liu, Kisung Lee, Balaji Palanisamy, Qi Zhang:
Improving Collaborative Filtering with Social Influence over Heterogeneous Information Networks. ACM Trans. Internet Techn. 20(4): 36:1-36:29 (2020) - [c51]Jingzhe Wang, Balaji Palanisamy, Jinlai Xu:
Sustainability-aware Resource Provisioning in Data Centers. CIC 2020: 60-69 - [c50]Chao Li, Balaji Palanisamy:
Comparison of Decentralization in DPoS and PoW Blockchains. ICBC 2020: 18-32 - [c49]Chao Li, Balaji Palanisamy:
EventWarden: A Decentralized Event-driven Proxy Service for Outsourcing Arbitrary Transactions in Ethereum-like Blockchains. ICWS 2020: 9-16 - [c48]Chao Li, Balaji Palanisamy, Runhua Xu, Jian Wang, Jiqiang Liu:
NF-Crowd: Nearly-free Blockchain-based Crowdsourcing. SRDS 2020: 41-50 - [e4]Zhixiong Chen, Laizhong Cui, Balaji Palanisamy, Liang-Jie Zhang:
Blockchain - ICBC 2020 - Third International Conference, Held as Part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, Proceedings. Lecture Notes in Computer Science 12404, Springer 2020, ISBN 978-3-030-59637-8 [contents] - [e3]João Eduardo Ferreira, Balaji Palanisamy, Kejiang Ye, Siva Kantamneni, Liang-Jie Zhang:
Services - SERVICES 2020 - 16th World Congress, Held as Part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, Proceedings. Lecture Notes in Computer Science 12411, Springer 2020, ISBN 978-3-030-59594-4 [contents] - [i9]Chao Li, Balaji Palanisamy:
Comparison of Decentralization in DPoS and PoW Blockchains. CoRR abs/2002.02082 (2020) - [i8]Chao Li, Balaji Palanisamy:
EventWarden: A Decentralized Event-driven Proxy Service for Outsourcing Arbitrary Transactions in Ethereum-like Blockchains. CoRR abs/2004.12793 (2020) - [i7]Chao Li, Balaji Palanisamy, Runhua Xu, Jian Wang, Jiqiang Liu:
NF-Crowd: Nearly-free Blockchain-based Crowdsourcing. CoRR abs/2009.02561 (2020)
2010 – 2019
- 2019
- [j12]Chao Li, Balaji Palanisamy:
Reversible spatio-temporal perturbation for protecting location privacy. Comput. Commun. 135: 16-27 (2019) - [j11]Chao Li, Balaji Palanisamy:
Privacy in Internet of Things: From Principles to Technologies. IEEE Internet Things J. 6(1): 488-505 (2019) - [j10]Nathalie Baracaldo, Balaji Palanisamy, James Joshi:
G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework. IEEE Trans. Dependable Secur. Comput. 16(1): 84-98 (2019) - [j9]Qingyang Wang, Shungeng Zhang, Yasuhiko Kanemasa, Calton Pu, Balaji Palanisamy, Lilian Harada, Motoyuki Kawaba:
Optimizing N-Tier Application Scalability in the Cloud: A Study of Soft Resource Allocation. ACM Trans. Model. Perform. Evaluation Comput. Syst. 4(2): 10:1-10:27 (2019) - [j8]Qingyang Wang, Hui Chen, Shungeng Zhang, Liting Hu, Balaji Palanisamy:
Integrating Concurrency Control in n-Tier Application Scaling Management in the Cloud. IEEE Trans. Parallel Distributed Syst. 30(4): 855-869 (2019) - [c47]Balaji Palanisamy, Chao Li:
Self-Emerging Data Infrastructures. CIC 2019: 256-265 - [c46]Yang Zhou, Ling Liu, Qi Zhang, Kisung Lee, Balaji Palanisamy:
Enhancing Collaborative Filtering with Multi-label Classification. CSoNet 2019: 323-338 - [c45]Chao Li, Balaji Palanisamy, Runhua Xu:
Scalable and Privacy-Preserving Design of On/Off-Chain Smart Contracts. ICDE Workshops 2019: 7-12 - [c44]Chao Li, Balaji Palanisamy:
Incentivized Blockchain-based Social Media Platforms: A Case Study of Steemit. WebSci 2019: 145-154 - [e2]Valérie Issarny, Balaji Palanisamy, Liang-Jie Zhang:
Internet of Things - ICIOT 2019 - 4th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings. Lecture Notes in Computer Science 11519, Springer 2019, ISBN 978-3-030-23356-3 [contents] - [i6]Chao Li, Balaji Palanisamy:
Decentralized Privacy-preserving Timed Execution in Blockchain-based Smart Contract Platforms. CoRR abs/1902.05613 (2019) - [i5]Chao Li, Balaji Palanisamy:
Decentralized Release of Self-emerging Data using Smart Contracts. CoRR abs/1902.05623 (2019) - [i4]Chao Li, Balaji Palanisamy, Runhua Xu:
Scalable and Privacy-preserving Design of On/Off-chain Smart Contracts. CoRR abs/1902.06359 (2019) - [i3]Chao Li, Balaji Palanisamy:
Incentivized Blockchain-based Social Media Platforms: A Case Study of Steemit. CoRR abs/1904.07310 (2019) - [i2]Chao Li, Balaji Palanisamy:
SilentDelivery: Practical Timed-delivery of Private Information using Smart Contracts. CoRR abs/1912.07824 (2019) - 2018
- [j7]Lei Jin, Chao Li, Balaji Palanisamy, James Joshi:
k-Trustee: Location injection attack-resilient anonymization for location privacy. Comput. Secur. 78: 212-230 (2018) - [j6]Balaji Palanisamy, Ling Liu, Yang Zhou, Qingyang Wang:
Privacy-Preserving Publishing of Multilevel Utility-Controlled Graph Datasets. ACM Trans. Internet Techn. 18(2): 24:1-24:21 (2018) - [c43]Chao Li, Balaji Palanisamy, Prashant Krishnamurthy:
Reversible Data Perturbation Techniques for Multi-level Privacy-Preserving Data Publication. BigData Congress 2018: 26-42 - [c42]Chao Li, Balaji Palanisamy:
Decentralized Privacy-Preserving Timed Execution in Blockchain-Based Smart Contract Platforms. HiPC 2018: 265-274 - [c41]Katchaguy Areekijseree, Yuzhe Richard Tang, Ju Chen, Shuang Wang, Arun Iyengar, Balaji Palanisamy:
Secure and Efficient Multi-Party Directory Publication for Privacy-Preserving Data Sharing. SecureComm (1) 2018: 71-94 - [c40]Chao Li, Balaji Palanisamy:
Decentralized Release of Self-Emerging Data using Smart Contracts. SRDS 2018: 213-220 - [c39]Runhua Xu, Balaji Palanisamy, James Joshi:
QueryGuard: Privacy-Preserving Latency-Aware Query Optimization for Edge Computing. TrustCom/BigDataSE 2018: 1097-1106 - [i1]Chao Li, Balaji Palanisamy:
Privacy in Internet of Things: from Principles to Technologies. CoRR abs/1808.08443 (2018) - 2017
- [c38]Chao Li, Balaji Palanisamy:
Emerge: Self-Emerging Data Release Using Cloud Data Storage. CLOUD 2017: 26-33 - [c37]Jinlai Xu, Balaji Palanisamy:
Cost-Aware Resource Management for Federated Clouds Using Resource Sharing Contracts. CLOUD 2017: 238-245 - [c36]Chao Li, Balaji Palanisamy, James Joshi:
Differentially Private Trajectory Analysis for Points-of-Interest Recommendation. BigData Congress 2017: 49-56 - [c35]Balaji Palanisamy, Chao Li, Prashant Krishnamurthy:
Group privacy-aware disclosure of association graph data. IEEE BigData 2017: 1043-1052 - [c34]Jinlai Xu, Balaji Palanisamy, Yuzhe Richard Tang, S. D. Madhu Kumar:
PADS: Privacy-Preserving Auction Design for Allocating Dynamically Priced Cloud Resources. CIC 2017: 87-96 - [c33]Jinlai Xu, Balaji Palanisamy, Heiko Ludwig, Qingyang Wang:
Zenith: Utility-Aware Resource Allocation for Edge Computing. EDGE 2017: 47-54 - [c32]Hui Chen, Qingyang Wang, Balaji Palanisamy, Pengcheng Xiong:
DCM: Dynamic Concurrency Management for Scaling n-Tier Applications in Cloud. ICDCS 2017: 2097-2104 - [c31]Chao Li, Balaji Palanisamy:
Timed-Release of Self-Emerging Data Using Distributed Hash Tables. ICDCS 2017: 2344-2351 - [c30]Chao Li, Balaji Palanisamy, Aravind Kalaivanan, Sriram Raghunathan:
ReverseCloak: A Reversible Multi-level Location Privacy Protection System. ICDCS 2017: 2521-2524 - [c29]Balaji Palanisamy, Chao Li, Prashant Krishnamurthy:
Group Differential Privacy-Preserving Disclosure of Multi-level Association Graphs. ICDCS 2017: 2587-2588 - [e1]Chengcui Zhang, Balaji Palanisamy, Latifur Khan, Sahra Sedigh Sarvestani:
2017 IEEE International Conference on Information Reuse and Integration, IRI 2017, San Diego, CA, USA, August 4-6, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-1562-1 [contents] - 2016
- [j5]Kisung Lee, Ling Liu, Balaji Palanisamy, Emre Yigitoglu:
Road Network-Aware Spatial Alarms. IEEE Trans. Mob. Comput. 15(1): 188-201 (2016) - [c28]Leila Karimi, Balaji Palanisamy, James Joshi:
A Dynamic Privacy Aware Access Control Model for Location Based Services. CIC 2016: 554-557 - [c27]Chao Li, Balaji Palanisamy, James Joshi:
SocialMix: Supporting Privacy-Aware Trusted Social Networking Services. ICWS 2016: 115-122 - 2015
- [j4]Balaji Palanisamy, Ling Liu:
Attack-Resilient Mix-zones over Road Networks: Architecture and Algorithms. IEEE Trans. Mob. Comput. 14(3): 495-508 (2015) - [j3]Balaji Palanisamy, Aameek Singh, Ling Liu:
Cost-Effective Resource Provisioning for MapReduce in a Cloud. IEEE Trans. Parallel Distributed Syst. 26(5): 1265-1279 (2015) - [c26]Balaji Palanisamy, Ling Liu:
Privacy-Preserving Data Publishing in the Cloud: A Multi-level Utility Controlled Approach. CLOUD 2015: 130-137 - [c25]Qiulei Guo, Balaji Palanisamy, Hassan A. Karimi:
A MapReduce Algorithm for Polygon Retrieval in Geospatial Analysis. CLOUD 2015: 901-908 - [c24]Yuzhe Richard Tang, Arun Iyengar, Wei Tan, Liana L. Fong, Ling Liu, Balaji Palanisamy:
Deferred Lightweight Indexing for Log-Structured Key-Value Stores. CCGRID 2015: 11-20 - [c23]Chao Li, Balaji Palanisamy:
ReverseCloak: Protecting Multi-level Location Privacy over Road Networks. CIKM 2015: 673-682 - [c22]Yang Zhou, Ling Liu, Calton Pu, Xianqiang Bao, Kisung Lee, Balaji Palanisamy, Emre Yigitoglu, Qi Zhang:
Clustering Service Networks with Entity, Attribute, and Link Heterogeneity. ICWS 2015: 257-264 - [c21]Vasa Hardik, Vasudevan Anirudh, Balaji Palanisamy:
Link Analysis of Wikipedia Documents Using MapReduce. IRI 2015: 582-588 - [c20]Chao Li, Balaji Palanisamy:
De-anonymizable Location Cloaking for Privacy-Controlled Mobile Systems. NSS 2015: 449-458 - 2014
- [b1]Balaji Palanisamy:
Cost-effective and privacy-conscious cloud service provisioning: architectures and algorithms. Georgia Institute of Technology, Atlanta, GA, USA, 2014 - [j2]Balaji Palanisamy, Ling Liu, Kisung Lee, Shicong Meng, Yuzhe Richard Tang, Yang Zhou:
Anonymizing continuous queries with delay-tolerant mix-zones over road networks. Distributed Parallel Databases 32(1): 91-118 (2014) - [j1]Balaji Palanisamy, Ling Liu:
Effective mix-zone anonymization techniques for mobile travelers. GeoInformatica 18(1): 135-164 (2014) - [c19]Balaji Palanisamy, Aameek Singh, NagaPramod Mandagere, Gabriel Alatorre, Ling Liu:
MapReduce Analysis for Cloud-Archived Data. CCGRID 2014: 51-60 - [c18]Lei Jin, Balaji Palanisamy, James B. D. Joshi:
POSTER: Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks. CCS 2014: 1439-1441 - [c17]Qiulei Guo, Balaji Palanisamy, Hassan A. Karimi:
A distributed polygon retrieval algorithm using MapReduce. CollaborateCom 2014: 435-436 - [c16]Balaji Palanisamy, Sheldon Sensenig, James B. D. Joshi, Rose Constantino:
LEAF: A privacy-conscious social network-based intervention tool for IPV survivors. IRI 2014: 138-146 - [c15]Nathalie Baracaldo, Balaji Palanisamy, James B. D. Joshi:
Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework. NSS 2014: 501-509 - 2013
- [c14]Balaji Palanisamy, Sindhuja Ravichandran, Ling Liu, Binh Han, Kisung Lee, Calton Pu:
Road network mix-zones for anonymous location based services. ICDE 2013: 1300-1303 - [c13]Kisung Lee, Emre Yigitoglu, Ling Liu, Binh Han, Balaji Palanisamy, Calton Pu:
RoadAlarm: A spatial alarm system on road networks. ICDE 2013: 1372-1375 - [c12]Balaji Palanisamy, Aameek Singh, Ling Liu, Bryan Langston:
Cura: A Cost-Optimized Model for MapReduce in a Cloud. IPDPS 2013: 1275-1286 - 2012
- [c11]Shicong Meng, Arun Iyengar, Isabelle Rouvellou, Ling Liu, Kisung Lee, Balaji Palanisamy, Yuzhe Richard Tang:
Reliable State Monitoring in Cloud Datacenters. IEEE CLOUD 2012: 951-958 - [c10]Kisung Lee, Ling Liu, Shicong Meng, Balaji Palanisamy:
Scaling Spatial Alarm Services on Road Networks. ICWS 2012: 98-105 - [c9]Balaji Palanisamy, Ling Liu, Kisung Lee, Aameek Singh, Yuzhe Richard Tang:
Location Privacy with Road Network Mix-Zones. MSN 2012: 124-131 - 2011
- [c8]Yuzhe Richard Tang, Ting Wang, Ling Liu, Shicong Meng, Balaji Palanisamy:
Privacy preserving indexing for eHealth information networks. CIKM 2011: 905-914 - [c7]Balaji Palanisamy, Ling Liu:
MobiMix: Protecting location privacy with mix-zones over road networks. ICDE 2011: 494-505 - [c6]Balaji Palanisamy, Aameek Singh, Ling Liu, Bhushan Jain:
Purlieus: locality-aware resource allocation for MapReduce in a cloud. SC 2011: 58:1-58:11
2000 – 2009
- 2009
- [c5]Priyanka Sharad Prabhu, Shamkant B. Navathe, Stephen Tyler, Venu Dasigi, Neha Narkhede, Balaji Palanisamy:
LITSEEK: public health literature search by metadata enhancement with external knowledge bases. DTMBIO 2009: 83-88 - 2006
- [c4]N. Sreenath, Balaji Palanisamy:
Distributed Reconfiguration for Traffic Changes in IP-Over-WDM Networks. ICIT 2006: 96-97 - [c3]N. Sreenath, Balaji Palanisamy:
An Online Distributed Protocol for the Restoration of Connectivity in the Virtual topology after Link failure in IP over WDM networks. ICNS 2006: 111 - [c2]N. Sreenath, Balaji Palanisamy:
A Two - Phase Distributed Reconfiguration Algorithm for Node Failures in IP-Over-WDM Networks. ICSNC 2006: 10 - [c1]N. Sreenath, Balaji Palanisamy, S. R. Nadarajan:
Grooming of Multicast Sessions in Sparse Splitting WDM Mesh Networks using Virtual Source Based Trees. ICSNC 2006: 11
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint