default search action
Subhash C. Kak
Person information
- affiliation: Oklahoma State University, Stillwater, School of Electrical and Computer Engineering
- affiliation: Louisiana State University, Baton Rouge, Department of Electrical & Computer Engineering
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j61]Subhash C. Kak:
Fractal Dimensions in Circular and Spiral Phenomena. Circuits Syst. Signal Process. 43(1): 634-645 (2024) - 2023
- [j60]Subhash C. Kak:
An Information Principle Based on Partitions for Cognitive Data. J. Artif. Intell. Conscious. 10(1): 1-14 (2023) - [j59]Subhash C. Kak:
No-Go Theorems on Machine Consciousness. J. Artif. Intell. Conscious. 10(2): 237-247 (2023) - [j58]Subhash C. Kak:
Linear Fractals with Weights. Parallel Process. Lett. 33(4): 2340011:1-2340011:14 (2023) - [j57]Subhash C. Kak:
The Dimensionality of Genetic Information. Parallel Process. Lett. 33(4): 2340012:1-2340012:11 (2023) - [j56]Subhash C. Kak:
Self-similarity and the maximum entropy principle in the genetic code. Theory Biosci. 142(3): 205-210 (2023) - 2022
- [j55]Subhash C. Kak:
New Classes of Regular Symmetric Fractals. Circuits Syst. Signal Process. 41(7): 4149-4159 (2022) - [j54]Subhash C. Kak:
The Limits to Machine Consciousness. J. Artif. Intell. Conscious. 9(1): 59-72 (2022) - [j53]Subhash C. Kak:
Number of Autonomous Cognitive Agents in a Neural Network. J. Artif. Intell. Conscious. 9(2): 227-240 (2022) - 2021
- [j52]Subhash C. Kak:
The Base-e Representation of Numbers and the Power Law. Circuits Syst. Signal Process. 40(1): 490-500 (2021) - [j51]Subhash C. Kak:
The Intrinsic Dimensionality of Data. Circuits Syst. Signal Process. 40(5): 2599-2607 (2021) - [j50]Subhash C. Kak:
Fractals with Optimal Information Dimension. Circuits Syst. Signal Process. 40(11): 5733-5743 (2021)
2010 – 2019
- 2018
- [i75]Subhash C. Kak:
Reasoning in a Hierarchical System with Missing Group Size Information. CoRR abs/1802.04093 (2018) - [i74]Subhash C. Kak:
On the Algebra in Boole's Laws of Thought. CoRR abs/1803.04994 (2018) - [i73]Subhash C. Kak:
Order Effects for Queries in Intelligent Systems. CoRR abs/1804.02759 (2018) - [i72]Subhash C. Kak:
On Ternary Coding and Three-Valued Logic. CoRR abs/1807.06419 (2018) - 2017
- [j49]Subhash C. Kak:
Power series models of self-similarity in social networks. Inf. Sci. 376: 31-38 (2017) - [c22]Prashanth Busireddygari, Subhash C. Kak:
Authentication of parties in piggy bank cryptography. ACSSC 2017: 1389-1393 - [c21]Prashanth Busireddygari, Subhash C. Kak:
Pseudorandom tableau sequences. ACSSC 2017: 1733-1736 - [c20]Prashanth Busireddygari, Subhash C. Kak:
Binary primes sequence for cryptography and secure communication. CNS 2017: 570-574 - [c19]Subhash C. Kak:
Incomplete information and quantum decision trees. SMC 2017: 276-281 - [c18]Stefan Prandl, Mihai M. Lazarescu, Duc-Son Pham, Sieteng Soh, Subhash C. Kak:
An Investigation of Power Law Probability Distributions for Network Anomaly Detection. IEEE Symposium on Security and Privacy Workshops 2017: 217-222 - [i71]Subhash C. Kak:
The Absent-Minded Driver Problem Redux. CoRR abs/1702.05778 (2017) - [i70]Subhash C. Kak:
On Quantum Decision Trees. CoRR abs/1703.03693 (2017) - [i69]Prashanth Busireddygari, Subhash C. Kak:
Binary Prime Tableau Sequences. CoRR abs/1704.08718 (2017) - [i68]Subhash C. Kak:
The Limits to Machine Consciousness. CoRR abs/1707.06257 (2017) - [i67]Subhash C. Kak:
Probability Reversal and the Disjunction Effect in Reasoning Systems. CoRR abs/1709.04029 (2017) - [i66]Subhash C. Kak:
Reasoning in Systems with Elements that Randomly Switch Characteristics. CoRR abs/1712.04909 (2017) - [i65]Subhash C. Kak:
Learning Based on CC1 and CC4 Neural Networks. CoRR abs/1712.09331 (2017) - 2016
- [j48]Subhash C. Kak:
Simulating entanglement in classical computing for cryptographic applications. Cryptologia 40(4): 348-354 (2016) - [j47]Subhash C. Kak:
Generalized Unary Coding. Circuits Syst. Signal Process. 35(4): 1419-1426 (2016) - [i64]Krishnamurthy Kirthi, Subhash C. Kak:
The Narayana Universal Code. CoRR abs/1601.07110 (2016) - [i63]B. Prashanth Reddy, Subhash C. Kak:
The binary primes sequence for computational hardening of pseudorandom sequences. CoRR abs/1606.00410 (2016) - 2015
- [j46]Subhash C. Kak:
Orthogonal Residue Sequences. Circuits Syst. Signal Process. 34(3): 1017-1025 (2015) - [i62]Subhash C. Kak:
Extended Unary Coding. CoRR abs/1502.00894 (2015) - [i61]Krishnamurthy Kirthi, Subhash C. Kak:
A Class of Random Sequences for Key Generation. CoRR abs/1503.03821 (2015) - [i60]Kam Wai Clifford Chan, Mayssaa El Rifai, Pramode K. Verma, Subhash C. Kak, Yuhua Chen:
Multi-Photon Quantum Key Distribution Based on Double-Lock Encryption. CoRR abs/1503.05793 (2015) - [i59]Subhash C. Kak:
Oblivious Transfer Protocol with Verification. CoRR abs/1504.00601 (2015) - [i58]Subhash C. Kak:
Multiparty Probability Computation and Verification. CoRR abs/1505.05081 (2015) - [i57]Sieteng Soh, Gongqi Lin, Subhash C. Kak:
Connectivity in Social Networks. CoRR abs/1506.03377 (2015) - [i56]Subhash C. Kak:
Two Power Series Models of Self-Similarity in Social Networks. CoRR abs/1506.07497 (2015) - 2014
- [j45]Subhash C. Kak, Monisha Prabhu:
Cryptographic Applications of Primitive Pythagorean Triples. Cryptologia 38(3): 215-222 (2014) - [j44]Subhash C. Kak:
The Number Theoretic Hilbert Transform. Circuits Syst. Signal Process. 33(8): 2539-2548 (2014) - [c17]Shiyu Ji, Tingting Chen, Sheng Zhong, Subhash C. Kak:
DAWN: Defending against wormhole attacks in wireless network coding systems. INFOCOM 2014: 664-672 - [p1]Sheng Yu, Subhash C. Kak:
Social Network Dynamics: An Attention Economics Perspective. Social Networks: A Framework of Computational Intelligence 2014: 225-258 - [i55]Subhash C. Kak:
Efficiency of Matrix Multiplication on the Cross-Wired Mesh Array. CoRR abs/1411.3273 (2014) - [i54]Subhash C. Kak:
Authentication Using Piggy Bank Approach to Secure Double-Lock Cryptography. CoRR abs/1411.3645 (2014) - [i53]Subhash C. Kak:
Spread Unary Coding. CoRR abs/1412.6122 (2014) - [i52]Subhash C. Kak:
Friendship Paradox and Attention Economics. CoRR abs/1412.7049 (2014) - 2013
- [c16]Yuhua Chen, Subhash C. Kak, Pramode K. Verma, Gregory Macdonald, Mayssaa El Rifai, Nikhil Punekar:
Multi-photon tolerant secure quantum communication - From theory to practice. ICC 2013: 2111-2116 - [c15]Sayonnha Mandal, Gregory Macdonald, Mayssaa El Rifai, Nikhil Punekar, Farnaz Zamani, Yuhua Chen, Subhash C. Kak, Pramode K. Verma, Robert C. Huck, James J. Sluss Jr.:
Multi-photon implementation of three-stage quantum cryptography protocol. ICOIN 2013: 6-11 - [i51]Subhash C. Kak:
The Piggy Bank Cryptographic Trope. CoRR abs/1301.0313 (2013) - [i50]Gunjan Talati, Subhash C. Kak:
The Quartic Public Key Transformation. CoRR abs/1304.4273 (2013) - [i49]Gunjan Talati, Subhash C. Kak:
Generalized Public Key Transformations with Side Information. CoRR abs/1304.4651 (2013) - [i48]Subhash C. Kak:
Residue Classes of the PPT Sequence. CoRR abs/1305.1900 (2013) - [i47]Matt Stowe, Subhash C. Kak:
Neural Network Capacity for Multilevel Inputs. CoRR abs/1307.8104 (2013) - [i46]Subhash C. Kak:
The Number Theoretic Hilbert Transform. CoRR abs/1308.1688 (2013) - [i45]Subhash C. Kak:
Probability and the Classical/Quantum Divide. CoRR abs/1309.2238 (2013) - [i44]Subhash C. Kak:
Threshold Quantum Cryptography. CoRR abs/1310.6333 (2013) - [i43]Subhash C. Kak:
A Class of Orthogonal Sequences. CoRR abs/1311.6821 (2013) - [i42]Subhash C. Kak:
A Key Set Cipher for Wireless Sensor Networks. CoRR abs/1312.2539 (2013) - 2012
- [c14]Sheng Yu, Subhash C. Kak:
An empirical study of how users adopt famous entities. FGST 2012: 64-69 - [c13]Grajzer Chan-Tin, Tingting Chen, Subhash C. Kak:
A Comprehensive Security Model for Networking Applications. ICCCN 2012: 1-5 - [i41]Sindhu Chitikela, Subhash C. Kak:
Increasing Randomness Using Permutations on Blocks. CoRR abs/1202.0200 (2012) - [i40]Sheng Yu, Subhash C. Kak:
A Survey of Prediction Using Social Media. CoRR abs/1203.1647 (2012) - [i39]Subhash C. Kak, Yuhua Chen, Pramode K. Verma:
iAQC: The Intensity-Aware Quantum Cryptography Protocol. CoRR abs/1206.6778 (2012) - [i38]Krishnama Raju Kanchu, Subhash C. Kak:
On Randomness of Goldbach Sequences. CoRR abs/1207.6307 (2012) - [i37]Krishnama Raju Kanchu, Subhash C. Kak:
Goldbach Ellipse Sequences for Cryptographic Applications. CoRR abs/1208.1984 (2012) - [i36]Sayonnha Mandal, Gregory Macdonald, Mayssaa El Rifai, Nikhil Punekar, Farnaz Zamani, Yuhua Chen, Subhash C. Kak, Pramode K. Verma, Robert C. Huck, James J. Sluss Jr.:
Implementation of Secure Quantum Protocol using Multiple Photons for Communication. CoRR abs/1208.6198 (2012) - [i35]Deepthi Cherlopalle, Subhash C. Kak:
Goldbach Triples and Key Distribution. CoRR abs/1209.0135 (2012) - [i34]Sheng Yu, Subhash C. Kak:
An Empirical Study of How Users Adopt Famous Entities. CoRR abs/1209.1323 (2012) - [i33]Krishnama Raju Kanchu, Subhash C. Kak:
Goldbach Circles and Balloons and Their Cross Correlation. CoRR abs/1209.4621 (2012) - [i32]Subhash C. Kak:
Random Sequences Based on the Divisor Pairs Function. CoRR abs/1210.4614 (2012) - [i31]Sandeep Hosangadi, Subhash C. Kak:
An Alignment Algorithm for Sequences. CoRR abs/1210.8398 (2012) - [i30]Monisha Prabhu, Subhash C. Kak:
Random Sequences from Primitive Pythagorean Triples. CoRR abs/1211.2751 (2012) - 2011
- [j43]Abhishek Parakh, Subhash C. Kak:
Space efficient secret sharing for implicit data security. Inf. Sci. 181(2): 335-341 (2011) - [c12]Abhishek Parakh, Subhash C. Kak:
Matrix based key agreement algorithms for sensor networks. IEEE ANTS 2011: 1-3 - [c11]Abhishek Parakh, Subhash C. Kak:
A New Small World Lattice. ADCONS 2011: 1-8 - [c10]Raviteja Gunda, Joe Cecil, Prasad Calyam, Subhash C. Kak:
Information Centric Frameworks for Micro Assembly. OTM Workshops 2011: 93-101 - [i29]Subhash C. Kak:
The Algebra of Two Dimensional Patterns. CoRR abs/1102.4573 (2011) - 2010
- [j42]Abhishek Parakh, Subhash C. Kak:
Internet Voting Protocol Based on Improved Implicit Security. Cryptologia 34(3): 258-268 (2010) - [j41]Yuhua Chen, Subhash C. Kak, Lei Wang:
Hybrid Neural Network Architecture for On-Line Learning. Intell. Inf. Manag. 2(4): 253-261 (2010) - [c9]Subhash C. Kak, Yuhua Chen, Lei Wang:
Data Mining Using Surface and Deep Agents Based on Neural Networks. AMCIS 2010: 16 - [c8]Abhishek Parakh, Subhash C. Kak:
A Tree Based Recursive Information Hiding Scheme. ICC 2010: 1-5 - [i28]Abhishek Parakh, Subhash C. Kak:
Internet voting protocol based on implicit data security. CoRR abs/1001.1711 (2010) - [i27]Abhishek Parakh, Subhash C. Kak:
A Key Distribution Scheme for Sensor Networks Using Structured Graphs. CoRR abs/1001.1936 (2010) - [i26]Abhishek Parakh, Subhash C. Kak:
A Distributed Data Storage Scheme for Sensor Networks. CoRR abs/1001.2326 (2010) - [i25]Abhishek Parakh, Subhash C. Kak:
Recursive Secret Sharing for Distributed Storage and Information Hiding. CoRR abs/1001.3331 (2010) - [i24]Subhash C. Kak:
Aryabhata's Mathematics. CoRR abs/1002.3409 (2010) - [i23]Subhash C. Kak:
Pythagorean Triples and Cryptographic Coding. CoRR abs/1004.3770 (2010) - [i22]Subhash C. Kak:
Unary Coding for Neural Network Learning. CoRR abs/1009.4495 (2010) - [i21]Subhash C. Kak:
On the Mesh Array for Matrix Multiplication. CoRR abs/1010.5421 (2010) - [i20]Praveen Kuruvada, Daniel Asamoah, Nikunj Dalal, Subhash C. Kak:
The Use of Rapid Digital Game Creation to Learn Computational Thinking. CoRR abs/1011.4093 (2010)
2000 – 2009
- 2009
- [j40]Nikunj Dalal, Parth Dalal, Subhash C. Kak, Pavlo D. Antonenko, Susan Stansberry:
Rapid digital game creation for broadening participation in computing and fostering crucial thinking skills. Int. J. Soc. Humanist. Comput. 1(2): 123-137 (2009) - [j39]Abhishek Parakh, Subhash C. Kak:
Online data storage using implicit security. Inf. Sci. 179(19): 3323-3331 (2009) - [j38]Yuhua Chen, Pramode K. Verma, Subhash C. Kak:
Embedded security framework for integrated classical and quantum cryptography services in optical burst switching networks. Secur. Commun. Networks 2(6): 546-554 (2009) - [j37]Maruti Satti, Subhash C. Kak:
Multilevel Indexed Quasigroup Encryption for Data and Speech. IEEE Trans. Broadcast. 55(2): 270-281 (2009) - [c7]Parth Dalal, Nikunj Dalal, Subhash C. Kak:
Learning Computer Programming with Game Design. CSEDU (2) 2009: 135-138 - [c6]Abhishek Parakh, Subhash C. Kak:
A Distributed Data Storage Scheme for Sensor Networks. MobiSec 2009: 14-22 - [i19]Abhishek Parakh, Subhash C. Kak:
Space Efficient Secret Sharing. CoRR abs/0901.4798 (2009) - [i18]Abhishek Parakh, Subhash C. Kak:
Space Efficient Secret Sharing: A Recursive Approach. CoRR abs/0901.4814 (2009) - [i17]Abhishek Parakh, Subhash C. Kak:
A Recursive Threshold Visual Cryptography Scheme. CoRR abs/0902.2487 (2009) - [i16]Subhash C. Kak:
Cryptography for Multi-Located Parties. CoRR abs/0905.2977 (2009) - [i15]Subhash C. Kak:
Memory Retrieved from Single Neurons. CoRR abs/0905.3771 (2009) - [i14]Subhash C. Kak:
Single Neuron Memories and the Network's Proximity Matrix. CoRR abs/0906.0798 (2009) - [i13]Subhash C. Kak:
The Transactional Nature of Quantum Information. CoRR abs/0907.2465 (2009) - [i12]Subhash C. Kak:
Recursive Random Number Generator Using Prime Reciprocals. CoRR abs/0907.5226 (2009) - [i11]Subhash C. Kak:
Another Look at Quantum Neural Computing. CoRR abs/0908.3148 (2009) - [i10]Abhishek Parakh, Subhash C. Kak:
Space Efficient Secret Sharing: A Recursive Approach. IACR Cryptol. ePrint Arch. 2009: 365 (2009) - [i9]Abhishek Parakh, Subhash C. Kak:
A Tree Based Recursive Scheme for Space Efficient Secret Sharing. IACR Cryptol. ePrint Arch. 2009: 409 (2009) - 2008
- [c5]Abhishek Parakh, Subhash C. Kak:
Internet Voting Protocol Based on Implicit Data Security. ICCCN 2008: 743-746 - [i8]Subhash C. Kak:
Stream Computing. CoRR abs/0801.1336 (2008) - [i7]Yuhua Chen, Subhash C. Kak, Lei Wang:
Hybrid Neural Network Architecture for On-Line Learning. CoRR abs/0809.5087 (2008) - [i6]Abhishek Parakh, Subhash C. Kak:
A Recursive Threshold Visual Cryptography Scheme. IACR Cryptol. ePrint Arch. 2008: 535 (2008) - 2007
- [j36]Arvind Kumar Parthasarathy, Subhash C. Kak:
An Improved Method of Content Based Image Watermarking. IEEE Trans. Broadcast. 53(2): 468-479 (2007) - [j35]Abhishek Parakh, Subhash C. Kak:
How to improve security in electronic voting? Ubiquity 2007(February): 2:1-2:7 (2007) - 2006
- [j34]Kiranmayi Penumarthi, Subhash C. Kak:
Augmented Watermarking. Cryptologia 30(2): 173-180 (2006) - [j33]Subhash C. Kak, C. Donald, Elaine T. Delaune:
On the realizability of quantum computers. Ubiquity 2006(March): 3:1 (2006) - [i5]Subhash C. Kak:
Artificial and Biological Intelligence. CoRR abs/cs/0601052 (2006) - [i4]Navneet Mandhani, Subhash C. Kak:
Watermarking Using Decimal Sequences. CoRR abs/cs/0602003 (2006) - [i3]Subhash C. Kak:
The Cubic Public-Key Transformation. CoRR abs/cs/0602097 (2006) - [i2]Subhash C. Kak:
Quantum Information and Entropy. CoRR abs/quant-ph/0605096 (2006) - 2005
- [j32]Navneet Mandhani, Subhash C. Kak:
Watermarking Using Decimal Sequences. Cryptologia 29(1): 50-58 (2005) - [j31]Subhash C. Kak, C. Donald, Elaine T. Delaune:
Artificial and Biological Intelligence. Ubiquity 2005(November): 1 (2005) - [i1]Subhash C. Kak:
A Three-Stage Quantum Cryptography Protocol. CoRR abs/quant-ph/0503027 (2005) - 2003
- [j30]Subhash C. Kak:
General qubit errors cannot be corrected. Inf. Sci. 152: 195-202 (2003) - 2002
- [j29]Meenakshi Gnanaguruparan, Subhash C. Kak:
Recursive Hiding of Secrets in Visual Cryptography. Cryptologia 26(1): 68-76 (2002) - [j28]Subhash C. Kak:
A class of instantaneously trained neural networks. Inf. Sci. 148(1-4): 97-102 (2002) - [c4]Subhash C. Kak:
A Class of Instantaneously Trained Neural Networks. JCIS 2002: 19-22 - 2000
- [j27]Subhash C. Kak:
Active agents, intelligence and quantum computing. Inf. Sci. 128(1-2): 1-17 (2000) - [j26]Dan Ventura, Subhash C. Kak:
Quantum computing and neural information processing. Inf. Sci. 128(3-4): 147-148 (2000) - [j25]Subhash C. Kak:
Rotating a qubit. Inf. Sci. 128(3-4): 149-154 (2000)
1990 – 1999
- 1999
- [j24]Sreenivas Tejomurtula, Subhash C. Kak:
Inverse Kinematics in Robotics using Neural Networks. Inf. Sci. 116(2-4): 147-164 (1999) - [j23]Bo Shu, Subhash C. Kak:
A Neural Network-based Intelligent Metasearch Engine. Inf. Sci. 120(1-4): 1-11 (1999) - 1998
- [j22]Subhash C. Kak:
On Generalization by Neural Networks. Inf. Sci. 111(1-4): 293-302 (1998) - 1996
- [j21]Subhash C. Kak:
An Indus-Sarasvatī Signboard. Cryptologia 20(3): 275-279 (1996) - 1995
- [j20]Subhash C. Kak:
On Quantum Neural Computing. Inf. Sci. 83(3&4): 143-160 (1995) - 1994
- [j19]Subhash C. Kak:
New algorithms for training feedforward neural networks. Pattern Recognit. Lett. 15(3): 295-298 (1994) - 1993
- [j18]Subhash C. Kak:
Neural networks and artificial intelligence. Inf. Sci. 70(1-2): 1-3 (1993) - 1990
- [j17]Subhash C. Kak:
The Vararuchi Cipher. Cryptologia 14(1): 79-82 (1990) - [j16]Subhash C. Kak:
Indus and Brahmi Further Connections. Cryptologia 14(2): 169-183 (1990) - [c3]Subhash C. Kak:
Neural computing with structured information. TAI 1990: 359-365
1980 – 1989
- 1989
- [j15]Subhash C. Kak:
A New Method for Coin Flipping by Telephone. Cryptologia 13(1): 73-78 (1989) - 1988
- [j14]Subhash C. Kak:
The Aryabhata Cipher. Cryptologia 12(2): 113-117 (1988) - [j13]Subhash C. Kak:
A frequency Analysis of the Indus Script. Cryptologia 12(3): 129-143 (1988) - [j12]Subhash C. Kak:
Multilayered array computing. Inf. Sci. 45(3): 347-365 (1988) - [j11]Subhash C. Kak:
A two-layered mesh array for matrix multiplication. Parallel Comput. 6(3): 383-385 (1988) - 1987
- [j10]Subhash C. Kak:
The Study of the Indus Script General Considerations. Cryptologia 11(3): 182-191 (1987) - [j9]Subhash C. Kak:
The Paninian approach to natural language processing. Int. J. Approx. Reason. 1(1): 117-130 (1987) - 1985
- [j8]Subhash C. Kak:
How to Detect Tampering of Data. Inf. Process. Lett. 20(2): 109-110 (1985) - [j7]Subhash C. Kak:
Encryption and Error-Correction Coding Using D Sequences. IEEE Trans. Computers 34(9): 803-809 (1985) - 1984
- [j6]Subhash C. Kak:
On the method of puzzles for key distribution. Int. J. Parallel Program. 13(2): 103-109 (1984) - 1983
- [j5]Subhash C. Kak:
Data Security in Computer Networks: Guest Editor's Introduction. Computer 16(2): 8-10 (1983) - [j4]Subhash C. Kak:
Exponentiation modulo a polynomial for data security. Int. J. Parallel Program. 12(5): 337-346 (1983) - [j3]Subhash C. Kak:
A Structural Redundancy in d-Sequences. IEEE Trans. Computers 32(11): 1069-1071 (1983) - [c2]Subhash C. Kak:
Joint Encryption and Error-Correction Coding. S&P 1983: 55-60 - 1981
- [j2]Subhash C. Kak, Amitava Chatterjee:
On decimal sequences. IEEE Trans. Inf. Theory 27(5): 647- (1981) - [c1]Subhash C. Kak:
Scrambling and Randomization. CRYPTO 1981: 59-63
1970 – 1979
- 1974
- [j1]Subhash C. Kak:
Binary Sequences and Redundancy. IEEE Trans. Syst. Man Cybern. 4(4): 399-401 (1974)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint