default search action
Naranker Dulay
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j18]Rami A. Khalil, Naranker Dulay:
AC/DC: Adaptive Cutoffs and Disputable Cutoffs for Robust Critical Transactions in Smart-Contracts. IEEE Trans. Netw. Serv. Manag. 19(4): 5383-5394 (2022) - [c99]Rami A. Khalil, Naranker Dulay:
Towards Equity in Proof-of-Work Mining Rewards. MARBLE 2022: 1-21 - [c98]Rami A. Khalil, Naranker Dulay:
RANC: reward-all nakamoto consensus. SAC 2022: 236-245 - 2021
- [c97]Rami Khalil, Naranker Dulay:
Adaptive layer-two dispute cutoffs in smart-contract blockchains. BRAINS 2021: 129-136 - [c96]Rami Khalil, Naranker Dulay:
PoSH in Practice: Implementing Proof of Staked Hardware Consensus with Limited Storage. IEEE ICBC 2021: 1-2 - 2020
- [c95]Alberto Spina, Michael Breza, Naranker Dulay, Julie Ann McCann:
XPC: Fast and Reliable Synchronous Transmission Protocols for 2-Phase Commit and 3-Phase Commit. EWSN 2020: 73-84 - [i3]Rami Khalil, Naranker Dulay:
Short Paper: PoSH Proof of Staked Hardware Consensus. IACR Cryptol. ePrint Arch. 2020: 1176 (2020) - [i2]Rami Khalil, Naranker Dulay:
Adaptive layer-two dispute periods in blockchains. IACR Cryptol. ePrint Arch. 2020: 1601 (2020)
2010 – 2019
- 2019
- [i1]Alberto Spina, Michael Breza, Naranker Dulay, Julie A. McCann:
XPC: Fast and Reliable Synchronous Transmission Protocols for 2-Phase Commit and 3-Phase Commit. CoRR abs/1910.09941 (2019) - 2018
- [c94]Naranker Dulay, Matteo Micheletti, Leonardo Mostarda, Andrea Piermarteri:
PICO-MP: De-centralised Macro-Programming for Wireless Sensor and Actuator Networks. AINA 2018: 289-296 - [c93]Fergus Leahy, Naranker Dulay:
DejaVu: Visual Diffing of Cyber Physical Systems. EWSN 2018: 157-162 - 2017
- [c92]Fergus Leahy, Naranker Dulay:
DejaVu: visual diffing of cyber physical systems. BuildSys@SenSys 2017: 43:1-43:2 - 2016
- [c91]Fergus Leahy, Naranker Dulay:
Ardán: Using 3D Game Engines in Cyber-Physical Simulations (Tool Paper). CyPhy 2016: 61-70 - 2015
- [c90]Antonio Bucchiarone, Naranker Dulay, Anna Lavygina, Annapaola Marconi, Heorhi Raik, Alessandra Russo:
An Approach for Collective Adaptation in Socio-Technical Systems. SASO Workshops 2015: 43-48 - [c89]Anna Lavygina, Alessandra Russo, Naranker Dulay:
Integrating Privacy and Safety Criteria into Planning Tasks. STM 2015: 20-36 - 2014
- [j17]Srdjan Marinovic, Naranker Dulay, Morris Sloman:
Rumpole: An Introspective Break-Glass Access Control Language. ACM Trans. Inf. Syst. Secur. 17(1): 2:1-2:32 (2014) - [c88]Jeremiah Smith, Anna Lavygina, Alessandra Russo, Naranker Dulay:
When did your smartphone bother you last? UbiComp Adjunct 2014: 409-414 - [c87]Jeremiah Smith, Anna Lavygina, Jiefei Ma, Alessandra Russo, Naranker Dulay:
Learning to recognise disruptive smartphone notifications. Mobile HCI 2014: 121-124 - [c86]Jeremiah Smith, Naranker Dulay:
RingLearn: Long-term mitigation of disruptive smartphone interruptions. PerCom Workshops 2014: 27-35 - 2013
- [c85]Jeremiah Smith, Naranker Dulay, Máté Attila Tóth, Oliver Amft, Yanxia Zhang:
Exploring concept drift using interactive simulations. PerCom Workshops 2013: 49-54 - 2012
- [j16]Eskindir Asmare, Anandha Gopalan, Morris Sloman, Naranker Dulay, Emil Lupu:
Self-Management Framework for Mobile Autonomous Systems. J. Netw. Syst. Manag. 20(2): 244-275 (2012) - [c84]Dimosthenis Pediaditakis, Anandha Gopalan, Naranker Dulay, Morris Sloman:
A configuration service for home networks. NOMS 2012: 1048-1053 - [c83]Dimosthenis Pediaditakis, Anandha Gopalan, Naranker Dulay, Morris Sloman, Tom Lodge:
Home Network Management Policies: Putting the User in the Loop. POLICY 2012: 9-16 - 2011
- [j15]Changyu Dong, Giovanni Russello, Naranker Dulay:
Shared and searchable encrypted data for untrusted servers. J. Comput. Secur. 19(3): 367-397 (2011) - [j14]Giovanni Russello, Leonardo Mostarda, Naranker Dulay:
A policy-based publish/subscribe middleware for sense-and-react applications. J. Syst. Softw. 84(4): 638-654 (2011) - [c82]Dimosthenis Pediaditakis, Naranker Dulay:
Verifying home network bandwidth sharing plans. CNSM 2011: 1-9 - [c81]Changyu Dong, Naranker Dulay:
Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications. IFIPTM 2011: 133-148 - [c80]Joe Sventek, Alexandros Koliousis, Oliver Sharma, Naranker Dulay, Dimosthenis Pediaditakis, Morris Sloman, Tom Rodden, Tom Lodge, Ben Bedwell, Kevin Glover, Richard Mortier:
An information plane architecture supporting home network management. Integrated Network Management 2011: 1-8 - [c79]Srdjan Marinovic, Robert Craven, Jiefei Ma, Naranker Dulay:
Rumpole: a flexible break-glass access control model. SACMAT 2011: 73-82 - [c78]Changyu Dong, Naranker Dulay:
Argumentation-based fault diagnosis for home networks. HomeNets@SIGCOMM 2011: 37-42 - 2010
- [j13]Leonardo Mostarda, Changyu Dong, Naranker Dulay:
Context-based authentication and transport of cultural assets. Pers. Ubiquitous Comput. 14(4): 321-334 (2010) - [j12]Giovanni Russello, Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, Maarten van Steen:
Providing data confidentiality against malicious hosts in Shared Data Spaces. Sci. Comput. Program. 75(6): 426-439 (2010) - [c77]Leonardo Mostarda, Srdjan Marinovic, Naranker Dulay:
Distributed Orchestration of Pervasive Services. AINA 2010: 166-173 - [c76]Srdjan Marinovic, Kevin P. Twidle, Naranker Dulay, Morris Sloman:
Teleo-Reactive policies for managing human-centric pervasive services. CNSM 2010: 80-87 - [c75]Leonardo Mostarda, Rudi Ball, Naranker Dulay:
Distributed Fault Tolerant Controllers. DAIS 2010: 141-154 - [c74]Driss Choujaa, Naranker Dulay:
Predicting human behaviour from selected mobile phone data points. UbiComp 2010: 105-108 - [c73]Changyu Dong, Naranker Dulay:
Shinren: Non-monotonic Trust Management for Distributed Systems. IFIPTM 2010: 125-140 - [c72]Vittorio Cortellessa, Catia Trubiani, Leonardo Mostarda, Naranker Dulay:
An Architectural Framework for Analyzing Tradeoffs between Software Security and Performance. ISARCS 2010: 1-18 - [c71]Srdjan Marinovic, Kevin P. Twidle, Naranker Dulay:
Teleo-Reactive workflows for pervasive healthcare. PerCom Workshops 2010: 316-321 - [c70]Giovanni Russello, Enrico Scalavino, Naranker Dulay, Emil C. Lupu:
Coordinating Data Usage Control in Loosely-Connected Networks. POLICY 2010: 30-39 - [c69]Kevin P. Twidle, Srdjan Marinovic, Naranker Dulay:
Teleo-Reactive Policies in Ponder2. POLICY 2010: 57-60
2000 – 2009
- 2009
- [j11]Marinos Charalambides, Paris Flegkas, George Pavlou, Javier Rubio-Loyola, Arosha K. Bandara, Emil C. Lupu, Alessandra Russo, Naranker Dulay, Morris Sloman:
Policy conflict analysis for diffserv quality of service management. IEEE Trans. Netw. Serv. Manag. 6(1): 15-30 (2009) - [j10]Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay:
Locating network domain entry and exit point/path for DDoS attack traffic. IEEE Trans. Netw. Serv. Manag. 6(3): 163-174 (2009) - [c68]Giovanni Russello, Naranker Dulay:
An Architectural Approach for Self-Managing Security Services. AINA Workshops 2009: 153-158 - [c67]Rudi Ball, Naranker Dulay:
Approximating Travel Times Using Opportunistic Networking. AINA Workshops 2009: 844-849 - [c66]Kevin P. Twidle, Naranker Dulay, Emil Lupu, Morris Sloman:
Ponder2: A Policy System for Autonomous Pervasive Environments. ICAS 2009: 330-335 - [c65]Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay:
Adaptive response system for distributed denial-of-service attacks. Integrated Network Management 2009: 809-814 - [c64]Driss Choujaa, Naranker Dulay:
Activity Inference through Sequence Alignment. LoCA 2009: 19-36 - [c63]Driss Choujaa, Naranker Dulay:
Routine classification through sequence alignment. ACM Multimedia 2009: 737-740 - [c62]Eskindir Asmare, Anandha Gopalan, Morris Sloman, Naranker Dulay, Emil C. Lupu:
A Mission Management Framework for Unmanned Autonomous Vehicles. MOBILWARE 2009: 222-235 - [c61]Giovanni Russello, Naranker Dulay:
xDUCON: Coordinating Usage Control Policies in Distributed Domains. NSS 2009: 246-253 - [c60]Eskindir Asmare, Anandha Gopalan, Morris Sloman, Naranker Dulay, Emil Lupu:
A Policy-Based Management Architecture for Mobile Collaborative Teams. PerCom 2009: 1-6 - [c59]Driss Choujaa, Naranker Dulay:
Aligning Activity Sequences for Continuous Tracking of Cellphone Users. PerCom Workshops 2009: 1-6 - [c58]Dimosthenis Pediaditakis, Leonardo Mostarda, Changyu Dong, Naranker Dulay:
Policies for Self Tuning Home Networks. POLICY 2009: 29-32 - [c57]Giovanni Russello, Naranker Dulay:
xDUCON: Cross Domain Usage Control through Shared Data Spaces. POLICY 2009: 178-181 - 2008
- [j9]Emil Lupu, Naranker Dulay, Morris Sloman, Joseph S. Sventek, Steven Heeps, Stephen D. Strowes, Kevin P. Twidle, Sye Loong Keoh, Alberto E. Schaeffer Filho:
AMUSE: autonomic management of ubiquitous e-Health systems. Concurr. Comput. Pract. Exp. 20(3): 277-295 (2008) - [j8]Sherif Yusuf, Wayne Luk, Morris Sloman, Naranker Dulay, Emil C. Lupu, Geoffrey Brown:
Reconfigurable Architecture for Network Flow Analysis. IEEE Trans. Very Large Scale Integr. Syst. 16(1): 57-65 (2008) - [c56]Giovanni Russello, Changyu Dong, Naranker Dulay:
A Workflow-Based Access Control Framework for e-Health Applications. AINA Workshops 2008: 111-120 - [c55]Giovanni Russello, Leonardo Mostarda, Naranker Dulay:
ESCAPE: A Component-Based Policy Framework for Sense and React Applications. CBSE 2008: 212-229 - [c54]Giovanni Russello, Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, Maarten van Steen:
Encrypted Shared Data Spaces. COORDINATION 2008: 264-279 - [c53]Changyu Dong, Giovanni Russello, Naranker Dulay:
Shared and Searchable Encrypted Data for Untrusted Servers. DBSec 2008: 127-143 - [c52]Changyu Dong, Giovanni Russello, Naranker Dulay:
Flexible Resolution of Authorisation Conflicts in Distributed Systems. DSOM 2008: 95-108 - [c51]Driss Choujaa, Naranker Dulay:
TRAcME: Temporal Activity Recognition Using Mobile Phone Data. EUC (1) 2008: 119-126 - [c50]Yanmin Zhu, Sye Loong Keoh, Morris Sloman, Emil Lupu, Naranker Dulay, Nat Pryce:
An Efficient Policy System for Body Sensor Networks. ICPADS 2008: 383-390 - [c49]Leonardo Mostarda, Changyu Dong, Naranker Dulay:
Place and Time Authentication of Cultural Assets. IFIPTM 2008: 279-294 - [c48]Yanmin Zhu, Sye Loong Keoh, Morris Sloman, Emil Lupu, Yu Zhang, Naranker Dulay, Nathaniel Pryce:
Finger: An efficient policy system for body sensor networks. MASS 2008: 428-433 - [c47]Eskindir Asmare, Anandha Gopalan, Morris Sloman, Naranker Dulay, Emil Lupu:
Adaptive self-management of teams of autonomous vehicles. MPAC 2008: 1-6 - [c46]Driss Choujaa, Naranker Dulay:
Using screenplays as a source of context data. SRMC 2008: 13-20 - [c45]Driss Choujaa, Naranker Dulay:
Towards context-aware face anonymisation. MUM 2008: 137-144 - [c44]Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay:
Network domain entrypoint/path determination for DDoS attacks. NOMS 2008: 57-64 - [c43]Giovanni Russello, Changyu Dong, Naranker Dulay:
Personalising situated workflow systems for pervasive healthcare applications. PervasiveHealth 2008: 183-187 - [c42]Giovanni Russello, Changyu Dong, Naranker Dulay:
Consent-Based Workflows for Healthcare Management. POLICY 2008: 153-161 - [c41]Kevin P. Twidle, Emil Lupu, Naranker Dulay, Morris Sloman:
Ponder2 - A Policy Environment for Autonomous Pervasive Systems. POLICY 2008: 245-246 - [c40]Klaus Herrmann, Kurt Rothermel, Gerd Kortuem, Naranker Dulay:
Adaptable Pervasive Flows - An Emerging Technology for Pervasive Adaptation. SASO Workshops 2008: 108-113 - [c39]Giovanni Russello, Naranker Dulay, Michel R. V. Chaudron, Maarten van Steen:
GSpace: an architectural approach for self-managing extra-functional concerns. CSTST 2008: 492-498 - 2007
- [c38]Giovanni Russello, Changyu Dong, Naranker Dulay:
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents. AINA Workshops (1) 2007: 489-496 - [c37]Sye Loong Keoh, Kevin P. Twidle, Nathaniel Pryce, Alberto E. Schaeffer Filho, Emil Lupu, Naranker Dulay, Morris Sloman, Steven Heeps, Stephen D. Strowes, Joe Sventek, Eleftheria Katsiri:
Policy-based Management for Body-Sensor Networks. BSN 2007: 92-98 - [c36]Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay:
Non-intrusive IP traceback for DDoS attacks. AsiaCCS 2007: 371-373 - [c35]Changyu Dong, Giovanni Russello, Naranker Dulay:
Trust Transfer in Distributed Systems. IFIPTM 2007: 17-29 - [c34]Steven Heeps, Joe Sventek, Naranker Dulay, Alberto E. Schaeffer Filho, Emil C. Lupu, Morris Sloman, Stephen D. Strowes:
Dynamic Ontology Mapping for Interacting Autonomous Systems. IWSOS 2007: 255-263 - [c33]Sye Loong Keoh, Naranker Dulay, Emil Lupu, Kevin P. Twidle, Alberto E. Schaeffer Filho, Morris Sloman, Steven Heeps, Stephen D. Strowes, Joseph S. Sventek:
Self-Managed Cell: A Middleware for Managing Body-Sensor Networks. MobiQuitous 2007: 1-5 - [c32]Emil Lupu, Naranker Dulay, Joe Sventek, Morris Sloman:
Autonomous Pervasive Systems and the Policy Challenges of a Small World! POLICY 2007: 3-7 - [c31]Giovanni Russello, Changyu Dong, Naranker Dulay:
Authorisation and Conflict Resolution for Hierarchical Domains. POLICY 2007: 201-210 - [c30]Alberto E. Schaeffer Filho, Emil C. Lupu, Naranker Dulay, Sye Loong Keoh, Kevin P. Twidle, Morris Sloman, Steven Heeps, Stephen D. Strowes, Joe Sventek:
Towards Supporting Interactions between Self-Managed Cells. SASO 2007: 224-236 - [c29]Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay:
A Survey of Bots Used for Distributed Denial of Service Attacks. SEC 2007: 229-240 - 2006
- [j7]Arosha K. Bandara, Emil C. Lupu, Alessandra Russo, Naranker Dulay, Morris Sloman, Paris Flegkas, Marinos Charalambides, George Pavlou:
Policy refinement for IP differentiated services Quality of Service management. IEEE Trans. Netw. Serv. Manag. 3(2): 2-13 (2006) - [c28]Marinos Charalambides, Paris Flegkas, George Pavlou, Javier Rubio-Loyola, Arosha K. Bandara, Emil C. Lupu, Alessandra Russo, Morris Sloman, Naranker Dulay:
Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management. NOMS 2006: 294-304 - [c27]Changyu Dong, Naranker Dulay:
Privacy Preserving Trust Negotiation for Pervasive Healthcare. PervasiveHealth 2006: 1-9 - 2005
- [c26]Joseph S. Sventek, Nagwa L. Badr, Naranker Dulay, Steven Heeps, Emil Lupu, Morris Sloman:
Self-Managed Cells and their Federation. CAiSE Workshops (2) 2005: 97-107 - [c25]Wayne Luk, Sherif Yusuf, Morris Sloman, Geoffrey Brown, Emil C. Lupu, Naranker Dulay:
A Combined Hardware-Software Architecture for Network Flow. ERSA 2005: 149-155 - [c24]Arosha K. Bandara, Emil C. Lupu, Alessandra Russo, Naranker Dulay, Morris Sloman, Paris Flegkas, Marinos Charalambides, George Pavlou:
Policy refinement for DiffServ quality of service management. Integrated Network Management 2005: 469-482 - [c23]Naranker Dulay, Emil C. Lupu, Morris Sloman, Joe Sventek, Nagwa L. Badr, Steven Heeps:
Self-managed Cells for Ubiquitous Systems. MMM-ACNS 2005: 1-6 - [c22]Marinos Charalambides, Paris Flegkas, George Pavlou, Arosha K. Bandara, Emil C. Lupu, Alessandra Russo, Naranker Dulay, Morris Sloman, Javier Rubio-Loyola:
Policy Conflict Analysis for Quality of Service Management. POLICY 2005: 99-108 - 2004
- [j6]Dan Chalmers, Naranker Dulay, Morris Sloman:
A framework for contextual mediation in mobile and ubiquitous computing applied to the context-aware adaptation of maps. Pers. Ubiquitous Comput. 8(1): 1-18 (2004) - [c21]Dan Chalmers, Naranker Dulay, Morris Sloman:
Meta Data to Support Context Aware Mobile Applications. Mobile Data Management 2004: 199- - 2003
- [c20]T. K. Lee, Sherif Yusuf, Wayne Luk, Morris Sloman, Emil Lupu, Naranker Dulay:
Compiling Policy Descriptions into Reconfigurable Firewall Processors. FCCM 2003: 39- - [c19]T. K. Lee, Sherif Yusuf, Wayne Luk, Morris Sloman, Emil Lupu, Naranker Dulay:
Irregular Reconfigurable CAM Structures for Firewall Applications. FPL 2003: 890-899 - 2002
- [c18]T. K. Lee, Sherif Yusuf, Wayne Luk, Morris Sloman, Emil Lupu, Naranker Dulay:
Development framework for firewall processors. FPT 2002: 352-355 - [c17]Nicodemos Damianou, Naranker Dulay, Emil Lupu, Morris Sloman, Toshio Tonouchi:
Tools for domain-based policy management of distributed systems. NOMS 2002: 203-217 - 2001
- [j5]Rebecca Montanari, Cesare Stefanelli, Naranker Dulay:
Flexible security policies for mobile agent systems. Microprocess. Microsystems 25(2): 93-99 (2001) - [c16]Naranker Dulay, Nicodemos Damianou, Emil Lupu, Morris Sloman:
A Policy Language for the Management of Distributed Agents. AOSE 2001: 84-100 - [c15]Naranker Dulay, Emil Lupu, Morris Sloman, Nicodemos Damianou:
A Policy Deployment Model for the Ponder Language. Integrated Network Management 2001: 529-543 - [c14]Nicodemos Damianou, Naranker Dulay, Emil Lupu, Morris Sloman:
The Ponder Policy Specification Language. POLICY 2001: 18-38 - [c13]Antonio Corradi, Naranker Dulay, Rebecca Montanari, Cesare Stefanelli:
Policy-Driven Management of Agent Systems. POLICY 2001: 214-229 - [c12]Dan Chalmers, Morris Sloman, Naranker Dulay:
Map adaptation for users of mobile systems. WWW 2001: 735-744 - 2000
- [c11]Emil Lupu, Morris Sloman, Naranker Dulay, Nicodemos Damianou:
Ponder: Realising Enterprise Viewpoint Concepts. EDOC 2000: 66-75
1990 – 1999
- 1999
- [c10]Nat Pryce, Naranker Dulay:
Dynamic Architectures and Architectural Styles for Distributed Program. FTDCS 1999: 89-94 - 1997
- [c9]Stephen Crane, Naranker Dulay:
A configurable protocol architecture for CORBA environments. ISADS 1997: 187-194 - 1995
- [c8]Jeff Magee, Naranker Dulay, Susan Eisenbach, Jeff Kramer:
Specifying Distributed Software Architectures. ESEC 1995: 137-153 - [c7]Keng Ng, Jeff Kramer, Jeff Magee, Naranker Dulay:
The Software Architect's Assistant-a visual environment for distributed programming. HICSS (2) 1995: 254-263 - [c6]Steve Crane, Naranker Dulay, Halldor Fosså, Jeff Kramer, Jeff Magee, Morris Sloman, Kevin P. Twidle:
Configuration management for distributed software services. Integrated Network Management 1995: 29-42 - 1994
- [j4]Jeff Magee, Naranker Dulay, Jeff Kramer:
Regis: a constructive development environment for distributed programs. Distributed Syst. Eng. 1(5): 304-312 (1994) - [c5]Jeff N. Magee, Naranker Dulay, Jeff Kramer:
A constructive development environment for parallel and distributed programs. CDS 1994: 4-14 - 1993
- [j3]Jeff Magee, Naranker Dulay, Jeff Kramer:
Structuring parallel and distributed programs. Softw. Eng. J. 8(2): 73-82 (1993) - 1992
- [j2]Jeff Magee, Naranker Dulay:
A configuration approach to parallel programming. Future Gener. Comput. Syst. 8(4): 337-347 (1992) - [j1]Jeff Kramer, Jeff Magee, Morris Sloman, Naranker Dulay:
Configuring object-based distributed programs in REX. Softw. Eng. J. 7(2): 139-149 (1992) - [c4]Jeff N. Magee, Naranker Dulay, Jeff Kramer:
Structuring parallel and distributed programs. CDS 1992: 102-117 - [c3]Jeff Magee, Naranker Dulay:
MP: A Programming Environment for Multicomputers. Programming Environments for Parallel Computing 1992: 1-16 - 1991
- [c2]Jeff Magee, Naranker Dulay:
A Configuration Approach to Parallel Programming. PARLE (2) 1991: 313-330 - 1990
- [b1]Naranker Dulay:
A configuration language for distributed programming. Imperial College London, UK, 1990
1980 – 1989
- 1987
- [c1]Naranker Dulay, Jeff Kramer, Jeff Magee, Morris Sloman, Kevin P. Twidle:
Distributed System Construction: Experience with the Conic Toolkit. Experiences with Distributed Systems 1987: 189-212
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint