default search action
Chi-Chun Lo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j48]Chi-Chun Lo, Chih-Sheng Chiang:
Application of the artificial bee colony algorithm to power contract capacity optimization. Microprocess. Microsystems 93: 104621 (2022)
2010 – 2019
- 2019
- [c54]Wen-Hui Lin, Ping Wang, Bao-Hua Wu, Ming-Sheng Jhou, Kuo-Ming Chao, Chi-Chun Lo:
Behaviorial-Based Network Flow Analyses for Anomaly Detection in Sequential Data Using Temporal Convolutional Networks. ICEBE 2019: 173-183 - 2018
- [c53]Ping Wang, Wen-Hui Lin, Bao-Hua Wu, Kuo-Ming Chao, Chi-Chun Lo:
A Cross-Age Face Recognition Approach Using Fog Computing Architecture for User Authentication on Mobile Devices. ICEBE 2018: 86-93 - [i1]Ming-Yen Wu, Chi-Hua Chen, Chi-Chun Lo:
An Exercise Fatigue Detection Model Based on Machine Learning Methods. CoRR abs/1803.07952 (2018) - 2017
- [j47]Chi-Hua Chen, Chen-Ling Wu, Chi-Chun Lo, Feng-Jang Hwang:
An Augmented Reality Question Answering System Based on Ensemble Neural Networks. IEEE Access 5: 17425-17435 (2017) - [j46]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Yu-Shih Wang:
Using ontologies to perform threat analysis and develop defensive strategies for mobile security. Inf. Technol. Manag. 18(1): 1-25 (2017) - [j45]Chi-Chun Lo, Shang-Ho Tsai, Bor-Shyh Lin:
Novel non-contact control system of electric bed for medical healthcare. Medical Biol. Eng. Comput. 55(3): 517-526 (2017) - [c52]Ping Wang, Wen-Hui Lin, Kuo-Ming Chao, Chi-Chun Lo:
A Face-Recognition Approach Using Deep Reinforcement Learning Approach for User Authentication. ICEBE 2017: 183-188 - 2016
- [j44]Chi-Hua Chen, Chi-Ao Lee, Chi-Chun Lo:
Vehicle Localization and Velocity Estimation Based on Mobile Phone Sensing. IEEE Access 4: 803-817 (2016) - [j43]Chi-Chun Lo, Tsung-Yi Chien, Jeng-Shyang Pan, Bor-Shyh Lin:
Novel Non-Contact Control System for Medical Healthcare of Disabled Patients. IEEE Access 4: 5687-5694 (2016) - [j42]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Wen-Hui Lin, Hsiao-Chung Lin, Wun Jie Chao:
Using malware for software-defined networking-based smart home security management through a taint checking approach. Int. J. Distributed Sens. Networks 12(8) (2016) - [j41]Chi-Chun Lo, Tsung-Yi Chien, Yu-Chun Chen, Shang-Ho Tsai, Wai-Chi Fang, Bor-Shyh Lin:
A Wearable Channel Selection-Based Brain-Computer Interface for Motor Imagery Detection. Sensors 16(2): 213 (2016) - [c51]Ping Wang, Kuo-Ming Chao, Hsiao-Chung Lin, Wen-Hui Lin, Chi-Chun Lo:
An Efficient Flow Control Approach for SDN-Based Network Threat Detection and Migration Using Support Vector Machine. ICEBE 2016: 56-63 - 2015
- [j40]Jeng-Shyang Pan, Chi-Chun Lo, Shang-Ho Tsai, Bor-Shyh Lin:
Design of novel non-contact multimedia controller for disability by using visual stimulus. Comput. Methods Programs Biomed. 122(3): 384-392 (2015) - [j39]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo:
A reputation-based computing approach in trusted web service provisions. Comput. Syst. Sci. Eng. 30(4) (2015) - [j38]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo:
Satisfaction-based Web service discovery and selection scheme utilizing vague sets theory. Inf. Syst. Frontiers 17(4): 827-844 (2015) - [c50]Ping Wang, Wen-Hui Lin, Wun Jie Chao, Kuo-Ming Chao, Chi-Chun Lo:
Using Dynamic Taint Approach for Malware Threat. ICEBE 2015: 408-416 - 2014
- [j37]Szu-Yin Lin, Chin-Hui Lai, Chih-Heng Wu, Chi-Chun Lo:
A trustworthy QoS-based collaborative filtering approach for web service discovery. J. Syst. Softw. 93: 217-228 (2014) - [c49]Ping Wang, Wun Jie Chao, Kuo-Ming Chao, Chi-Chun Lo:
Using Taint Analysis for Threat Risk of Cloud Applications. ICEBE 2014: 185-190 - 2013
- [j36]Chi-Hua Chen, Hsu-Chia Chang, Chun-Yun Su, Chi-Chun Lo, Hui-Fei Lin:
Traffic speed estimation based on normal location updates and call arrivals from cellular networks. Simul. Model. Pract. Theory 35: 26-33 (2013) - [c48]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo:
A Novel Threat and Risk Assessment Mechanism for Security Controls in Service Management. ICEBE 2013: 337-344 - [c47]Ding-Yuan Cheng, Tzu-Chin Chao, Chi-Chun Lo, Chi-Hua Chen:
Research of Ontology and Semantic Web Apply for Building Information Model. ICEBE 2013: 358-363 - [c46]Szu-Yin Lin, Kuo-Ming Chao, Chi-Chun Lo, Nick Godwin:
Distributed dynamic data driven prediction based on reinforcement learning approach. SAC 2013: 779-784 - [c45]Szu-Yin Lin, Ya-Ching Yang, Chi-Chun Lo, Kuo-Ming Chao:
A Social Trust Based Recommendation Mechanism for Web Service Dynamic Collaboration. SOCA 2013: 318-322 - 2012
- [j35]Chi-Chun Lo, Wan-Jia Chen:
A hybrid information security risk assessment procedure considering interdependences between controls. Expert Syst. Appl. 39(1): 247-257 (2012) - [j34]Chi-Hua Chen, Bon-Yeh Lin, Chun-Hao Lin, Yen-Szu Liu, Chi-Chun Lo:
A green positioning algorithm for Campus Guidance System. Int. J. Mob. Commun. 10(2): 119-131 (2012) - 2011
- [j33]Chi-Chun Lo, Ting-Huan Kuo, Hsu-Yang Kung, Hsiang-Ting Kao, Chi-Hua Chen, Che-I Wu, Ding-Yuan Cheng:
Mobile merchandise evaluation service using novel information retrieval and image recognition technology. Comput. Commun. 34(2): 120-128 (2011) - [j32]Chi-Chun Lo, Chi-Hua Chen, Ding-Yuan Cheng, Hsu-Yang Kung:
Ubiquitous Healthcare Service System with Context-awareness Capability: Design and Implementation. Expert Syst. Appl. 38(4): 4416-4436 (2011) - [j31]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Ray Farmer:
An evidence-based scheme for web service selection. Inf. Technol. Manag. 12(2): 161-172 (2011) - [j30]Wei-Li Lin, Chi-Chun Lo, Kuo-Ming Chao, Nick Godwin:
Multi-group QoS consensus for web services. J. Comput. Syst. Sci. 77(2): 223-243 (2011) - [j29]Ding-Yuan Cheng, Kuo-Ming Chao, Chi-Chun Lo, Chen-Fang Tsai:
A user centric service-oriented modeling approach. World Wide Web 14(4): 431-459 (2011) - [c44]Shi-Hong Chou, Chi-Chun Lo, Chun-Chieh Huang:
Mitigating routing misbehavior in Dynamic Source Routing protocl using trust-based reputation mechanism for wireless ad-hoc networks. CCNC 2011: 442-446 - [c43]Chi-Chun Lo, Chun-Chieh Huang, Meng-Ju Lee:
A channel-based key management protocol for IPTV service. CCNC 2011: 693-694 - [c42]Kuo-Ming Chao, Nazaraf Shah, Adriana Matei, Tomasz J. Zlamaniec, Weidong Li, Chi-Chun Lo, Yinsheng Li:
Intelligent interactive system for collaborative green computing. CSCWD 2011: 690-697 - [c41]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Wen-Hui Lin, Tzu Chia Wang:
A Consumer Trust-Based Approach in Web Services Selection. ICEBE 2011: 251-256 - [c40]Szu-Yin Lin, Kuo-Ming Chao, Chi-Chun Lo:
Service-oriented dynamic data driven application systems to potential field method vehicle navigation. SAC 2011: 462-467 - 2010
- [j28]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo:
On optimal decision for QoS-aware composite service selection. Expert Syst. Appl. 37(1): 440-449 (2010) - [j27]Po-Huan Chiu, Gloria Yi-Ming Kao, Chi-Chun Lo:
Personalized blog content recommender system for mobile phone users. Int. J. Hum. Comput. Stud. 68(8): 496-507 (2010) - [c39]Chi-Chun Lo, Ding-Yuan Cheng, Chen-Fang Tsai, Kuo-Ming Chao:
Service Selection Based on Fuzzy TOPSIS Method. AINA Workshops 2010: 367-372 - [c38]Chun-Chieh Huang, Chi-Chun Lo:
Threshold Based Group-Oriented Nominative Proxy Signature Scheme for Digital Rights Management. CCNC 2010: 1-5 - [c37]Chi-Chun Lo, Ding-Yuan Cheng, Kuo-Ming Chao:
Dynamic data driven smart home system based on a Service Component Architecture. CSCWD 2010: 473-478 - [c36]Chun-Chieh Huang, Chi-Chun Lo:
A Two-Key Agreement Based Supervising Mechanism for Cluster-Based Peer-to-Peer Applications. ICPADS 2010: 823-828 - [c35]Chi-Chun Lo, Chun-Chieh Huang, Joy Ku:
A Cooperative Intrusion Detection System Framework for Cloud Computing Networks. ICPP Workshops 2010: 280-284 - [c34]Szu-Yin Lin, Kuo-Ming Chao, Chi-Chun Lo:
Service-oriented dynamic data driven application systems to traffic signal control. SMC 2010: 3463-3470 - [p1]Ping Wang, Chi-Chun Lo, Leon Smalov:
Consensus Issues for Service Advertisement and Selection. Agent-Based Service-Oriented Computing 2010: 161-187
2000 – 2009
- 2009
- [j26]Po-Huan Chiu, Chi-Chun Lo, Kuo-Ming Chao:
Integrating Semantic Web and Object-Oriented Programming for Cooperative Design. J. Univers. Comput. Sci. 15(9): 1970-1990 (2009) - [c33]Wei-Li Lin, Chi-Chun Lo, Kuo-Ming Chao, Nick Godwin:
Fuzzy Similarity Clustering for Consumer-Centric QoS-Aware Selection of Web Services. CISIS 2009: 904-909 - [c32]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Ray Farmer, Pu-Tsun Kuo:
A Reputation-Based Service Selection Scheme. ICEBE 2009: 501-506 - [c31]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Pu-Tsun Kuo:
A reputation scheme with witness reasoning for service selection. SOCA 2009: 1-8 - 2008
- [j25]Kwo-Jean Farn, Shu-Kuo Lin, Chi-Chun Lo:
A study on e-Taiwan information system security classification and implementation. Comput. Stand. Interfaces 30(1-2): 1-7 (2008) - [j24]Wei-Li Lin, Chi-Chun Lo, Kuo-Ming Chao, Muhammad Younas:
Consumer-centric QoS-aware selection of web services. J. Comput. Syst. Sci. 74(2): 211-231 (2008) - [c30]Chi-Chun Lo, Ding-Yuan Cheng, Ping-Chi Lin, Kuo-Ming Chao:
A Study on Representation of QoS in UDDI for Web Services Composition. CISIS 2008: 423-428 - [c29]Chi-Chun Lo, Ding-Yuan Cheng, Chi-Hua Chen:
A Semantic Web Methodology for Situation-Aware Curative Food Service Recommendation System. CSSE (4) 2008: 444-447 - [c28]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Yinsheng Li:
QoS-Aware Service Selection under Consumer's Reputation. ICEBE 2008: 627-632 - 2007
- [j23]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Chun-Lung Huang, Muhammad Younas:
A fuzzy outranking approach in risk analysis of web service security. Clust. Comput. 10(1): 47-55 (2007) - [j22]Chun-Lung Huang, Chi-Chun Lo, Ping Wang, Kuo-Ming Chao, Yinsheng Li:
Applying Semi-Order Preference Model in Content-Based Service Discovery. Int. J. Electron. Bus. Manag. 5(1): 48-58 (2007) - 2006
- [j21]Chi-Chun Lo, Ming-Hua Lin:
Location-based incentive pricing for tree-based relaying in multi-hop cellular networks. Comput. Commun. 29(16): 3148-3157 (2006) - [j20]Chun-Lung Huang, Kuo-Ming Chao, Chi-Chun Lo, Ping Wang, Jen-Yao Chung:
Service discovery through consensus based preferences. Comput. Syst. Sci. Eng. 21(4) (2006) - [j19]Chi-Chun Lo, Ping Wang, Kuo-Ming Chao:
A fuzzy group-preferences analysis method for new-product development. Expert Syst. Appl. 31(4): 826-834 (2006) - [j18]Wen-Chuan Hsieh, Chi-Chun Lo, Yi-Hsien Chiu:
The proactive intrusion prevention for Wireless Local Area Network. Int. J. Mob. Commun. 4(4): 477-496 (2006) - [j17]Chun-Lung Huang, Chi-Chun Lo, Kuo-Ming Chao, Muhammad Younas:
Reaching consensus: A moderated fuzzy web services discovery method. Inf. Softw. Technol. 48(6): 410-423 (2006) - [c27]Muhammad Younas, Kuo-Ming Chao, Chi-Chun Lo, Yinsheng Li:
An Efficient Transaction Commit Protocol for Composite Web Services. AINA (1) 2006: 591-596 - [c26]Wei-Li Lin, Chi-Chun Lo, Kuo-Ming Chao, Muhammad Younas:
Fuzzy Consensus on QoS in Web Services Discovery. AINA (1) 2006: 791-798 - [c25]Ping Wang, Kuo-Ming Chao, Chun-Lung Huang, Chi-Chun Lo, Chia-Ling Hu:
A Fuzzy Decision Model of Risk Assessment Through Fuzzy Preference Relations with Users Confidence-interval. AINA (2) 2006: 889-893 - [c24]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Chun-Lung Huang, Yinsheng Li:
A Fuzzy Model for Selection of QoS-Aware Web Services. ICEBE 2006: 585-593 - [c23]Nazaraf Shah, Chi-Chun Lo, Chun-Lung Huang, Kuo-Ming Chao, Nick Godwin:
Exception Diagnosis for Agent-Oriented Services. SMC 2006: 3017-3022 - 2005
- [c22]Chun-Lung Huang, Kuo-Ming Chao, Chi-Chun Lo:
A Moderated Fuzzy Matchmaking for Web Services. CIT 2005: 1116-1122 - [c21]Kuo-Ming Chao, Muhammad Younas, Chi-Chun Lo, Tao-Hsin Tan:
Fuzzy Matchmaking for Web Services. AINA 2005: 721-726 - [c20]Chi-Chun Lo, Ping Wang, Kuo-Ming Chao:
Solving Consensus Measure of Ambiguous GDM Problems Using Vague Sets - An Application of Risk Assessment. CSCWD (Selected papers) 2005: 573-585 - [c19]Ming-Hua Lin, Chi-Chun Lo:
A Quality of Relay-Based Incentive Pricing Scheme for Relaying Services in Multi-hop Cellular Networks. ICOIN 2005: 796-805 - [c18]Chun-Lung Huang, Chi-Chun Lo, Yinsheng Li, Kuo-Ming Chao, Jen-Yao Chung, Ying Huang:
Service discovery through multi-agent consensus. SOSE 2005: 37-44 - 2004
- [j16]Chi-Chun Lo, Shuenn-Jyi Wang, Lee-Wen Huang:
Video retrieval using successive modular operations on temporal similarity. Comput. Stand. Interfaces 26(4): 317-328 (2004) - [j15]Chi-Chun Lo, Kuen-Liang Sue:
Diminishing signalling traffic for authentication in mobile communication system. Int. J. Electron. Bus. 2(3): 274-282 (2004) - [j14]Kuen-Liang Sue, Chi-Chun Lo:
Diminishing Capacity Requirement For Mobility Database In Wireless ATM. J. Circuits Syst. Comput. 13(2): 271-291 (2004) - [c17]Wen-Chuan Hsieh, Chi-Chun Lo, Jing-Chi Lee, Li-Tsung Huang:
The Implementation of a Proactive Wireless Intrusion Detection System. CIT 2004: 581-586 - [c16]Chi-Chun Lo, Ping Wang:
Using fuzzy distance to evaluate the consensus of group decision-making an entropy-based approach. FUZZ-IEEE 2004: 1001-1006 - [c15]Chi-Chun Lo, Wen-Chuan Hsieh, Li-Tsung Huang:
The Implementation of an Intelligent Logistics Tracking System Utilizing RFID. ICEB 2004: 199-204 - [c14]Ming-Hua Lin, Chi-Chun Lo:
A Dynamic Incentive Pricing Scheme for Relaying Services in Multi-hop Cellular Networks. ICOIN 2004: 211-220 - [c13]Wen-Chuan Hsieh, Yi-Hsien Chiu, Chi-Chun Lo:
An Interference-Based Prevention Mechanism Against WEP Attack for 802.11B Network. Net-Con 2004: 127-138 - 2003
- [j13]Chi-Chun Lo, Bin-Wen Chuang:
A novel approach of backup path reservation for survivable high-speed networks. IEEE Commun. Mag. 41(3): 146-152 (2003) - [j12]Chi-Chun Lo, Bin-Wen Chuang:
An adaptive survivability admission control algorithm using backup path for high-speed networks. Int. J. Netw. Manag. 13(6): 399-410 (2003) - [j11]Chi-Chun Lo, Shuenn-Jyi Wang:
A histogram-based moment-preserving clustering algorithm for video segmentation. Pattern Recognit. Lett. 24(14): 2209-2218 (2003) - [c12]Ming-Hua Lin, Chi-Chun Lo, Wayne Zhuang:
A Flexible Time-based Pricing Policy for Charging Internet Services. CAiSE Short Paper Proceedings 2003 - 2002
- [c11]Chi-Chun Lo, Kuen-Liang Sue:
Second chance replacement policy for mobile database overflow. GLOBECOM 2002: 1683-1687 - [c10]Chi-Chun Lo, Bin-Wen Chuang:
An adaptive survivability admission control mechanism using backup VPs for self-healing ATM networks. ISCC 2002: 647-652 - 2001
- [j10]Chi-Chun Lo, Yu-Jen Chen:
Stream ciphers for GSM networks. Comput. Commun. 24(11): 1090-1096 (2001) - [j9]Chi-Chun Lo, Shuenn-Jyi Wang:
Video segmentation using a histogram-based fuzzy c-means clustering algorithm. Comput. Stand. Interfaces 23(5): 429-438 (2001) - [c9]Chi-Chun Lo, Shuenn-Jyi Wang:
Video Segmentation Using a Histogram-Based Fuzzy C-Means Clustering Algorithm. FUZZ-IEEE 2001: 920-923 - 2000
- [j8]Chi-Chun Lo, Shing Hong Chen, Bon-Yeh Lin:
Coding-based schemes for fault identification in communication networks. Int. J. Netw. Manag. 10(3): 157-164 (2000) - [j7]Chi-Chun Lo, Wei-Hsin Chang:
A multiobjective hybrid genetic algorithm for the capacitated multipoint network design problem. IEEE Trans. Syst. Man Cybern. Part B 30(3): 461-470 (2000) - [c8]Chi-Chun Lo, Yu-Jen Chen:
Stream Ciphers for GSM Networks. ICC (1) 2000: 80-84 - [c7]Chi-Chun Lo, Yi-Chun Yeh:
Authentication protocols for the broadband ISDN billing system. NOMS 2000: 669-682
1990 – 1999
- 1999
- [j6]Chi-Chun Lo, Shing Hong Chen:
A scheduling-based event correlation scheme for fault identification in communications network. Comput. Commun. 22(5): 432-438 (1999) - [j5]Chi-Chun Lo:
Building and managing virtual private network; by D. Kosiur. Comput. Commun. 22(12): 1173 (1999) - [j4]Chi-Chun Lo, Chen-Yu Chiu:
A fault-tolerant architecture for ATM networks. Comput. Commun. 22(17): 1540-1548 (1999) - [j3]Chi-Chun Lo, Shing Hong Chen:
Robust event correlation scheme for fault identification in communication networks. Int. J. Commun. Syst. 12(3): 217-228 (1999) - [j2]Chi-Chun Lo, Yu-Jen Chen:
Secure communication mechanisms for GSM networks. IEEE Trans. Consumer Electron. 45(4): 1074-1080 (1999) - [c6]Chi-Chun Lo, Wei-Hsin Chang:
A multiobjective hybrid genetic algorithm for the capacitated multipoint network design problem. ICC 1999: 1573-1576 - 1998
- [c5]Chi-Chun Lo, Yi-Chun Yeh:
Security issues on B-ISDN billing system. NOMS 1998: 287 - 1996
- [c4]Ying-Dar Lin, Ren-Kuei Yang, Chi-Chun Lo:
Alarm correlation for congestion diagnosis in ATM networks. NOMS 1996: 624-627 - 1995
- [c3]Chi-Chun Lo, Chen-Yu Chiu:
A fault-tolerant architecture for ATM networks. LCN 1995: 29-36 - 1991
- [c2]Chi-Chun Lo:
An expert integrator for communication networks management. LCN 1991: 369-374
1980 – 1989
- 1989
- [j1]Chi-Chun Lo, Aaron Kershenbaum:
A two-phase algorithm and performance bounds for the star-star concentrator location problem. IEEE Trans. Commun. 37(11): 1151-1163 (1989) - 1988
- [c1]Chi-Chun Lo, Aaron Kershenbaum:
A two-phase algorithm for the star-star concentrator location problem. INFOCOM 1988: 946-955
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-26 18:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint