default search action
Yoichi Shinoda
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c86]Kei Hiroi, Souma Nakagawa, Ryoma Takahashi, Akihito Kohiga, Sho Fukaya, Yoichi Shinoda:
Demo: Flood Damage CyRealization with an Orchestrator Framework. PerCom Workshops 2024: 388-390 - 2023
- [j15]Razvan Beuran, Jan Vykopal, Daniela Belajová, Pavel Celeda, Yasuo Tan, Yoichi Shinoda:
Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms. Comput. Secur. 128: 103120 (2023) - [c85]Kei Hiroi, Akihito Kohiga, Sho Fukaya, Yoichi Shinoda:
An Orchestrator Framework for IoT-Based Disaster Prevention Simulation. SENSORS 2023: 1-4 - [c84]Kei Hiroi, Akihito Kohiga, Sho Fukaya, Yoichi Shinoda:
Performance Evaluation of Flood Level Estimation Method Using State-Space Model with Time-Series Monitoring Data. ITDRR 2023: 52-65 - [c83]Akihito Kohiga, Kei Hiroi, Takumi Kataoka, Sho Fukaya, Yoichi Shinoda:
Interaction-Based Task Group Scheduling for a Scalable and Real-Time Self-Driving Simulation. SIMULTECH 2023: 287-294 - [c82]Kentaro Kuribayashi, Yusuke Miyake, Kenji Rikitake, Kiyofumi Tanaka, Yoichi Shinoda:
Dynamic IoT Applications and Isomorphic IoT Systems Using WebAssembly. WF-IoT 2023: 1-8 - 2020
- [j14]Naomi Okumura, Kazuhiro Ogata, Yoichi Shinoda:
Formal analysis of RFC 8120 authentication protocol for HTTP under different assumptions. J. Inf. Secur. Appl. 53: 102529 (2020) - [c81]Akihito Kohiga, Yoichi Shinoda:
Deploy Mechanism for Virtual-Machine Based Vehicular Ad Hoc Network Simulation. SpringSim 2020: 1-12
2010 – 2019
- 2019
- [j13]Razvan Beuran, Dat Tang, Zheyu Tan, Shinobu Hasegawa, Yasuo Tan, Yoichi Shinoda:
Supporting cybersecurity education and training via LMS integration: CyLMS. Educ. Inf. Technol. 24(6): 3619-3643 (2019) - [c80]Razvan Beuran, Takuya Inoue, Yasuo Tan, Yoichi Shinoda:
Realistic Cybersecurity Training via Scenario Progression Management. EuroS&P Workshops 2019: 67-76 - [c79]Kei Hiroi, Tomoya Inoue, Kunio Akashi, Tsubasa Yumura, Toshiyuki Miyachi, Hayate Hironaka, Hironobu Kanno, Yoichi Shinoda:
ARIA: interactive damage prediction system for urban flood using simulation and emulation federation platform. UbiComp/ISWC Adjunct 2019: 284-287 - [c78]Kei Hiroi, Daisuke Murakami, Kazumi Kurata, Takashi Tashiro, Yoichi Shinoda:
Data Assimilation Approach for Flood Level Estimation using State Space Model for Urban Internal Flooding. ICT-DM 2019: 1-6 - [c77]Tsubasa Yumura, Yuki Oshikawa, Masatoshi Enomoto, Tomoya Inoue, Yoichi Shinoda:
Joostar: Heterogeneous Simulator Federation for Application-in-the-Loop Simulation. IGARSS 2019: 5629-5632 - [c76]Eiichi Muramoto, Kazuhiro Ogata, Yoichi Shinoda:
Formal Specification and Model Checking of a Ride-sharing System in Maude. SOFL+MSVL 2019: 187-204 - 2018
- [j12]Razvan Beuran, Dat Tang, Cuong Pham, Ken-ichi Chinen, Yasuo Tan, Yoichi Shinoda:
Integrated framework for hands-on cybersecurity training: CyTrONE. Comput. Secur. 78: 43-59 (2018) - [j11]Razvan Beuran, Cuong Pham, Dat Tang, Ken-ichi Chinen, Yasuo Tan, Yoichi Shinoda:
Cybersecurity Education and Training Support System: CyRIS. IEICE Trans. Inf. Syst. 101-D(3): 740-749 (2018) - [c75]Tsubasa Yumura, Masatoshi Enomoto, Kunio Akashi, Futoshi Hirose, Tomoya Inoue, Satoshi Uda, Toshiyuki Miyachi, Yasuo Tan, Yoichi Shinoda:
AOBAKO: A Testbed for Context-Aware Applications with Physicalizing Virtual Beacons. UbiComp/ISWC Adjunct 2018: 476-479 - 2017
- [c74]Razvan Beuran, Cuong Pham, Dat Tang, Ken-ichi Chinen, Yasuo Tan, Yoichi Shinoda:
CyTrONE: An Integrated Cybersecurity Training Framework. ICISSP 2017: 157-166 - 2016
- [c73]Kunio Akashi, Tomoya Inoue, Shingo Yasuda, Yuuki Takano, Yoichi Shinoda:
NETorium: high-fidelity scalable wireless network emulator. AINTEC 2016: 25-32 - [c72]Kei Hiroi, Yoichi Shinoda, Nobuo Kawaguchi:
A better positioning with BLE tag by RSSI compensation through crowd density estimation. UbiComp Adjunct 2016: 831-840 - 2015
- [j10]Razvan Beuran, Shingo Yasuda, Tomoya Inoue, Yuuki Takano, Toshiyuki Miyachi, Yoichi Shinoda:
Towards an Interactive Experiment Framework: DynamiQ. EAI Endorsed Trans. Cloud Syst. 1(4): e1 (2015) - [j9]Razvan Beuran, Shingo Yasuda, Tomoya Inoue, Yuuki Takano, Toshiyuki Miyachi, Yoichi Shinoda:
DynamiQ: A Tool for Dynamic Emulation of Networks. EAI Endorsed Trans. Self Adapt. Syst. 1(2): e1 (2015) - [c71]Razvan Beuran, Muhammad Imran Tariq, Shinsuke Miwa, Yoichi Shinoda:
Wireless network performance evaluation through emulation: WiMAX case study. ICOIN 2015: 265-270 - 2014
- [j8]Hoai Son Nguyen, Yasuo Tan, Yoichi Shinoda:
D-AVTree: DHT-Based Search System to Support Scalable Multi-Attribute Queries. IEICE Trans. Commun. 97-B(9): 1898-1909 (2014) - [c70]Razvan Beuran, Shingo Yasuda, Tomoya Inoue, Shinsuke Miwa, Yoichi Shinoda:
Using emulation to validate post-disaster network recovery solutions. SimuTools 2014: 92-97 - 2013
- [j7]Saber Zrelli, Nobuo Okabe, Yoichi Shinoda:
XKDCP: An Inter-KDC Protocol for Dependable Kerberos Cross-Realm Operations. J. Networks 8(2): 290-296 (2013) - [c69]Razvan Beuran, Shinsuke Miwa, Yoichi Shinoda:
Behavioral Mobility Model with Geographic Constraints. AINA Workshops 2013: 470-477 - [c68]Hoai Son Nguyen, Yoshiki Makino, Azman Osman Lim, Yasuo Tan, Yoichi Shinoda:
Building High-Accuracy Thermal Simulation for Evaluation of Thermal Comfort in Real Houses. ICOST 2013: 159-166 - [c67]Razvan Beuran, Shinsuke Miwa, Yoichi Shinoda:
Network emulation testbed for DTN applications and protocols. INFOCOM Workshops 2013: 151-156 - [c66]Razvan Beuran, Shinsuke Miwa, Yoichi Shinoda:
Network emulation testbed for DTN applications and protocols. INFOCOM 2013: 3441-3446 - [c65]Shingo Yasuda, Kunio Akashi, Toshiyuki Miyachi, Razvan Beuran, Yoshiki Makino, Tomoya Inoue, Shinsuke Miwa, Yoichi Shinoda:
Emulation-Based ICT System Resiliency Verification for Disaster Situations. SITIS 2013: 875-882 - 2012
- [j6]Saber Zrelli, Nobuo Okabe, Yoichi Shinoda:
EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks. IEICE Trans. Inf. Syst. 95-D(2): 490-502 (2012) - [j5]Razvan Beuran, Junya Nakata, Yasuo Tan, Yoichi Shinoda:
Emulation Testbed for IEEE 802.15.4 Networked Systems. IEICE Trans. Commun. 95-B(9): 2892-2905 (2012) - [c64]Hoai Son Nguyen, Yasuo Tan, Yoichi Shinoda:
Building Distributed Attribute-Value Trees on DHT-based Networks. AINA 2012: 795-802 - [c63]Razvan Beuran, Shinsuke Miwa, Yoichi Shinoda:
Performance evaluation of DTN implementations on a large-scale network emulation testbed. CHANTS@MobiCom 2012: 39-42 - [c62]Razvan Beuran, Shinsuke Miwa, Yoichi Shinoda:
Making the best of two worlds: a framework for hybrid experiments. WiNTECH 2012: 75-82 - [c61]Toshiyuki Miyachi, Razvan Beuran, Yoshiki Makino, Kunio Akashi, Shingo Yasuda, Tomoya Inoue, Shinsuke Miwa, Satoshi Uda, Yasuo Tan, Yoichi Shinoda:
On network system evaluation under various failures. VALUETOOLS 2012: 226-227 - 2011
- [j4]Lan Tien Nguyen, Razvan Beuran, Yoichi Shinoda:
An interference and load aware routing metric for Wireless Mesh Networks. Int. J. Ad Hoc Ubiquitous Comput. 7(1): 25-37 (2011) - [c60]Razvan Beuran, Junya Nakata, Yasuo Tan, Yoichi Shinoda:
IEEE 802.15.4 Network Emulation Testbed. AINA 2011: 451-458 - [c59]Tomoya Inoue, Yuuki Takano, Shinsuke Miwa, Yoichi Shinoda:
A design and implementation of nickname-based sockets for applications inside NATed network. AINTEC 2011: 48-55 - [c58]Razvan Beuran, Yasuo Tan, Yoichi Shinoda:
Challenges of using wireless network testbeds: a case study on ORBIT. WiNTECH 2011: 11-18 - [c57]Toshiyuki Miyachi, Takeshi Nakagawa, Ken-ichi Chinen, Shinsuke Miwa, Yoichi Shinoda:
StarBED and SpringOS Architectures and Their Performance. TRIDENTCOM 2011: 43-58 - 2010
- [j3]Razvan Beuran, Junya Nakata, Tetsuya Kawakami, Takashi Okada, Ken-ichi Chinen, Yasuo Tan, Yoichi Shinoda:
Emulation framework for the design and development of active RFID tag systems. J. Ambient Intell. Smart Environ. 2(2): 155-177 (2010) - [c56]Lan Tien Nguyen, Razvan Beuran, Yoichi Shinoda:
AEROMAN: A Novel Architecture to Evaluate Routing Protocols for Multi-Hop Ad-Hoc Networks. ICCCN 2010: 1-7 - [c55]Hoai-Nam Nguyen, Yoichi Shinoda:
Modeling Malware Diffusion in Wireless Networks with Nodes' Heterogeneity and Mobility. ICCCN 2010: 1-8 - [c54]Hoai-Nam Nguyen, Yasuhiro Ohara, Yoichi Shinoda:
A stochastic framework to depict viral propagation in wireless heterogeneous networks. IPDPS Workshops 2010: 1-8 - [c53]Razvan Beuran, Lan Tien Nguyen, Yoichi Shinoda:
QOMB wireless network emulation testbed: evaluation and case study. WiNTECH 2010: 1-8 - [c52]Ruo Ando, Youki Kadobayashi, Yoichi Shinoda:
Blink: Large-scale P2P network monitoring and visualization system using VM introspection. NCM 2010: 351-358 - [c51]Trung Nguyen, Hoai-Nam Nguyen, Yoichi Shinoda:
eBATMAN: An Emulator-BAsed Testbed for Studying Mobile Ad-Hoc Network Security. RIVF 2010: 1-4 - [c50]Hoai-Nam Nguyen, Yoichi Shinoda:
Viral Dispersal in Heterogeneous Wireless Networks: A Stochastic Approach. RIVF 2010: 1-4 - [c49]Lan Tien Nguyen, Razvan Beuran, Yoichi Shinoda:
Multi-hop Wireless Network Emulation on StarBED. TRIDENTCOM 2010: 561-563 - [c48]Junya Nakata, Razvan Beuran, Takashi Okada, Ken-ichi Chinen, Yasuo Tan, Yoichi Shinoda:
Polymorphic Ubiquitous Network Testbed RUBIQ. TRIDENTCOM 2010: 570-572 - [c47]Takashi Okada, Marios Sioutis, Junsoo Kim, Junya Nakata, Yasuo Tan, Yoichi Shinoda:
A Component-Based Simulation Environment for Large-Scale Simulation of Home Network Systems. TRIDENTCOM 2010: 626-628 - [c46]Toshiyuki Miyachi, Shinsuke Miwa, Yoichi Shinoda:
XBurner: A XENebula-Based Native Traffic-Generation Platform. TRIDENTCOM 2010: 629-631
2000 – 2009
- 2009
- [j2]Makoto Misumi, Shin-ichi Nakagawa, Ken-ichi Chinen, Yoichi Shinoda, Katsunori Yamaoka:
A Solution for Irregular IP Multicast Packet Flooding - For Heavy Traffic IP Multicast Communication. IEICE Trans. Commun. 92-B(1): 68-76 (2009) - [c45]Ruo Ando, Zonghua Zhang, Youki Kadobayashi, Yoichi Shinoda:
A Dynamic Protection System of Web Server in Virtual Cluster Using Live Migration. DASC 2009: 95-102 - [c44]Razvan Beuran, Lan Tien Nguyen, Toshiyuki Miyachi, Junya Nakata, Ken-ichi Chinen, Yasuo Tan, Yoichi Shinoda:
QOMB: A Wireless Network Emulation Testbed. GLOBECOM 2009: 1-6 - [c43]Hoai-Nam Nguyen, Yoichi Shinoda:
A Node's Number of Neighbors in Wireless Mobile Ad Hoc Networks: A Statistical View. ICN 2009: 52-60 - [c42]Hoai-Nam Nguyen, Yoichi Shinoda:
A Macro View of Viral Propagation and Its Persistence in Heterogeneous Wireless Networks. ICNS 2009: 359-365 - [c41]Hoai-Nam Nguyen, Yoichi Shinoda:
On Modeling Viral Diffusion in Heterogeneous Wireless Networks . MobiSec 2009: 238-252 - [c40]Shinsuke Miwa, Mio Suzuki, Hiroaki Hazeyama, Satoshi Uda, Toshiyuki Miyachi, Youki Kadobayashi, Yoichi Shinoda:
Experiences in emulating 10K AS topology with massive VM multiplexing. VISA 2009: 97-104 - [c39]Hoai-Nam Nguyen, Yoichi Shinoda:
A novel analytical framework to model malware diffusion in heterogeneous wireless networks. WOWMOM 2009: 1-10 - 2008
- [c38]Razvan Beuran, Junya Nakata, Takashi Okada, Lan Tien Nguyen, Yasuo Tan, Yoichi Shinoda:
A Multi-Purpose Wireless Network Emulator: QOMET. AINA Workshops 2008: 223-228 - [c37]Toshiyuki Miyachi, Achmad Basuki, Shoko Mikawa, Shinsuke Miwa, Ken-ichi Chinen, Yoichi Shinoda:
Educational environment on StarBED: case study of SOI Asia 2008 Spring Global E-Workshop. AINTEC 2008: 27-36 - [c36]Razvan Beuran, Junya Nakata, Takashi Okada, Tetsuya Kawakami, Ken-ichi Chinen, Yasuo Tan, Yoichi Shinoda:
Emulation of an Active Tag Location Tracking System. AMIF 2008: 50-57 - [c35]Ruo Ando, Youki Kadobayashi, Yoichi Shinoda:
An Enhancement of Trusted Domain Enforcement using VMM Interruption Mechanism. ICYCS 2008: 2222-2229 - [c34]Lan Tien Nguyen, Razvan Beuran, Yoichi Shinoda:
A load-aware routing metric for wireless mesh networks. ISCC 2008: 429-435 - [c33]Lan Tien Nguyen, Xavier Défago, Razvan Beuran, Yoichi Shinoda:
An energy efficient routing scheme for mobile wireless sensor networks. ISWCS 2008: 568-572 - [c32]Takashi Okada, Junya Nakata, Razvan Beuran, Yasuo Tan, Yoichi Shinoda:
Large-scale Simulation Method of Mobile Robots. ISUC 2008: 309-314 - [c31]Razvan Beuran, Junya Nakata, Takashi Okada, Yasuo Tan, Yoichi Shinoda:
Real-time emulation of networked robot systems. SimuTools 2008: 56 - [c30]Saber Zrelli, Atsuko Miyaji, Yoichi Shinoda, Thierry Ernst:
Security and Access Control for Vehicular Communications. WiMob 2008: 561-566 - 2007
- [c29]Razvan Beuran, Lan Tien Nguyen, Khin Thida Latt, Junya Nakata, Yoichi Shinoda:
QOMET: A Versatile WLAN Emulator. AINA 2007: 348-353 - [c28]Saber Zrelli, Yoichi Shinoda:
Specifying Kerberos over EAP: Towards an integrated network access and Kerberos single sign-on process. AINA 2007: 490-497 - [c27]Saber Zrelli, Yoichi Shinoda:
Experimental Evaluation of EAP Performance in Roaming Scenarios. AINTEC 2007: 86-98 - [c26]Takashi Okada, Razvan Beuran, Junya Nakata, Yasuo Tan, Yoichi Shinoda:
Collaborative motion planning of autonomous robots. CollaborateCom 2007: 328-335 - [c25]Ruo Ando, Youki Kadobayashi, Yoichi Shinoda:
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. ICISC 2007: 131-143 - [c24]Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda:
Design Issues of an Isolated Sandbox Used to Analyze Malwares. IWSEC 2007: 13-27 - [c23]Lan Tien Nguyen, Razvan Beuran, Yoichi Shinoda:
Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks. MSN 2007: 326-337 - [c22]Saber Zrelli, Tunç D. Medeni, Yoichi Shinoda, Ihsan Tolga Medeni:
Improving Kerberos Security System for Cross-Realm Collaborative Interactions: An Innovative Example of Knowledge Technology for Evolving & Verifiable E-Society. RIVF 2007: 211-219 - [c21]Junya Nakata, Satoshi Uda, Toshiyuki Miyachi, Kenji Masui, Razvan Beuran, Yasuo Tan, Ken-ichi Chinen, Yoichi Shinoda:
StarBED2: Large-scale, Realistic and Real-time Testbed for Ubiquitous Networks. TRIDENTCOM 2007: 1-7 - [c20]Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda:
Design and Implementation of an Isolated Sandbox with Mimetic Internet Used to Analyze Malwares. DETER 2007 - 2006
- [c19]Saber Zrelli, Yoichi Shinoda:
Single sign-on framework for AAA operations within commercial mobile networks. ARES 2006: 74-81 - [c18]Yuuki Takano, Naoki Isozaki, Yoichi Shinoda:
Multipath Key Exchange on P2P Networks. ARES 2006: 748-755 - [c17]Razvan Beuran, Ken-ichi Chinen, Khin Thida Latt, Toshiyuki Miyachi, Junya Nakata, Lan Tien Nguyen, Yoichi Shinoda, Yasuo Tan:
Application Performance Assessment on Wireless Ad Hoc Networks. AINTEC 2006: 128-138 - [c16]Ken-ichi Chinen, Toshiyuki Miyachi, Yoichi Shinoda:
A rendezvous in network experiment -case study of Kuroyuri. TRIDENTCOM 2006 - [c15]Toshiyuki Miyachi, Ken-ichi Chinen, Yoichi Shinoda:
StarBED and SpringOS: large-scale general purpose network testbed and supporting software. VALUETOOLS 2006: 30 - 2005
- [j1]Nobuo Ogashiwa, Hiroaki Harai, Naoya Wada, Fumito Kubota, Yoichi Shinoda:
Multi-Stage Fiber Delay Line Buffer in Photonic Packet Switch for Asynchronously Arriving Variable-Length Packets. IEICE Trans. Commun. 88-B(1): 258-265 (2005) - [c14]Toshiyuki Miyachi, Kenjiro Cho, Yoichi Shinoda:
On the Stability of Server Selection Algorithms Against Network Fluctuations. AINTEC 2005: 210-224 - [c13]Toshiyuki Miyachi, Ken-ichi Chinen, Yoichi Shinoda:
Automatic Configuration and Execution of Internet Experiments On An Actual Node-Based Testbed. TRIDENTCOM 2005: 274-282 - [c12]Yoichi Shinoda, Ko Ikai, Motomu Itoh:
Vulnerabilities of Passive Internet Threat Monitors. USENIX Security Symposium 2005 - 2004
- [c11]Satoshi Uda, Nobuo Ogashiwa, Kenichi Nagami, Kuniaki Kondo, Ikuo Nakagawa, Yoichi Shinoda, Hiroshi Esaki:
Design and Implementation of Overlaying Multi-Homing Architecture. SAINT Workshops 2004: 165-172 - 2003
- [c10]Satoshi Uda, Nobuo Ogashiwa, Yojiro Uo, Yoichi Shinoda:
IPv6 support on MPLS networks: Experiences with 6PE approach. SAINT Workshops 2003: 226-231
1990 – 1999
- 1998
- [c9]Hayato Yamana, Kent Tamura, Hiroyuki Kawano, Satoshi Kamei, Masanori Harada, Hideki Nishimura, Isao Asai, Hiroyuki Kusumoto, Yoichi Shinoda, Yoichi Muraoka:
Experiments of Collecting WWW Information Using Distributed WWW Robots. SIGIR 1998: 379-380 - 1996
- [c8]Masakazu Hori, Yoichi Shinoda, Koichiro Ochimizu:
Shared Data Management Mechanism for Distributed Software Development Based on a Reflective Object-Oriented Model. CAiSE 1996: 362-382 - 1994
- [c7]Nobuo Saito, Hideyuki Tokuda, Tatsuya Hagino, Shuichi Oikawa, Akinori Yonezawa, Satoshi Matsuoka, Shigekazu Inohara, Yoshikatsu Tada, Hideki Sunahara, Shuji Ishii, Etsuya Shibayama, Yoichi Shinoda:
Comprehensive operating system for highly parallel machine. ISPAN 1994: 435-442 - [c6]Masahiro Morita, Yoichi Shinoda:
Information Filtering Based on User Behaviour Analysis and Best Match Text Retrieval. SIGIR 1994: 272-281 - 1993
- [c5]Katsuhiko Gondow, Takashi Imaizumi, Yoichi Shinoda, Takuya Katayama:
Change Management and Consistency Maintenance in Software Development Environments Using Object-Oriented Attribute Grammars. ISOTAS 1993: 77-94 - 1990
- [c4]Yoichi Shinoda, Takuya Katayama:
Object-oriented software processes and their environment. ISPW 1990: 191-194 - [c3]Lichao Tan, Yoichi Shinoda, Takuya Katayama:
Coping with changes in an object management system based on attribute grammars. SDE 1990: 56-65 - [c2]Yoichi Shinoda, Takuya Katayama:
Object-Oriented Extension of Attribute Grammars and its Implementation Using Distributed Attribute Evaluation Algorithm. WAGA 1990: 177-191
1980 – 1989
- 1989
- [c1]Yoichi Shinoda, Takuya Katayama:
Towards Formal Description and Automatic Generation of Programming Environments. SEE 1989: 261-270
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-10 20:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint