Остановите войну!
for scientists:
default search action
Colin J. Fidge
- > Home > Persons > Colin J. Fidge
Publications
- 2023
- [j59]Mukhtar Hussain, Colin J. Fidge, Ernest Foo, Zahra Jadidi:
Discovering a data interpreted petri net model of industrial control systems for anomaly detection. Expert Syst. Appl. 230: 120511 (2023) - [j56]Andrei Furda, Alessandro Soro, Erwin Fielt, Nicola Bartlett, Colin J. Fidge, Jesse Steineck, Lionel van den Berg:
Jump-Starting Software Engineering Careers. IEEE Softw. 40(5): 108-115 (2023) - 2022
- [j55]Xuelei Wang, Colin J. Fidge, Ghavameddin Nourbakhsh, Ernest Foo, Zahra Jadidi, Calvin Li:
Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems. IEEE Access 10: 6629-6649 (2022) - [j54]Md Whaiduzzaman, Alistair Barros, Moumita Chanda, Supti Barman, Tania Sultana, Md. Sazzadur Rahman, Shanto Roy, Colin J. Fidge:
A Review of Emerging Technologies for IoT-Based Smart Cities. Sensors 22(23): 9271 (2022) - [j53]Mukhtar Hussain, Colin J. Fidge, Ernest Foo, Zahra Jadidi:
Discovering Data-Aware Mode-Switching Constraints to Monitor Mode-Switching Decisions in Supervisory Control. IEEE Trans. Ind. Informatics 18(6): 3734-3743 (2022) - 2021
- [j52]Md Whaiduzzaman, Md. Julkar Nayeen Mahi, Alistair Barros, Md. Ibrahim Khalil, Colin J. Fidge, Rajkumar Buyya:
BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture. IEEE Access 9: 106655-106674 (2021) - [j51]Md Whaiduzzaman, Nishat Farjana, Alistair Barros, Md. Julkar Nayeen Mahi, Md. Shahriare Satu, Shanto Roy, Colin J. Fidge:
HIBAF: A data security scheme for fog computing. J. High Speed Networks 27(4): 381-402 (2021) - [j47]Md. Razon Hossain, Md Whaiduzzaman, Alistair Barros, Shelia Rahman Tuly, Md. Julkar Nayeen Mahi, Shanto Roy, Colin J. Fidge, Rajkumar Buyya:
A scheduling-based dynamic fog computing framework for augmenting resource utilization. Simul. Model. Pract. Theory 111: 102336 (2021) - [c92]Md Whaiduzzaman, Alistair Barros, Ahmedur Rahman Shovon, Md. Razon Hossain, Colin J. Fidge:
A Resilient Fog-IoT Framework for Seamless Microservice Execution. SCC 2021: 213-221 - [c91]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros, Colin J. Fidge, Artem Polyvyanyy:
Microservice Remodularisation of Monolithic Enterprise Systems for Embedding in Industrial IoT Networks. CAiSE 2021: 432-448 - 2020
- [c90]Mahesh Fernando, Colin J. Fidge, Tony Sahama:
Design Guidelines for Effective Occupation-Based Personal Health Records. ACSW 2020: 25:1-25:10 - [c89]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros, Colin J. Fidge, Artem Polyvyanyy:
Remodularization Analysis for Microservice Discovery Using Syntactic and Semantic Clustering. CAiSE 2020: 3-19 - [c88]Zahra Jadidi, Ali Dorri, Raja Jurdak, Colin J. Fidge:
Securing Manufacturing Using Blockchain. TrustCom 2020: 1920-1925 - [i1]Zahra Jadidi, Ali Dorri, Raja Jurdak, Colin J. Fidge:
Securing Manufacturing Using Blockchain. CoRR abs/2010.07493 (2020) - 2019
- [c87]Mahesh Fernando, Colin J. Fidge, Tony Sahama:
An Overall Health and Well-Being Data Model for Employer-Sponsored Personal Health Records. ACSW 2019: 23:1-23:10 - [c86]Chathurika Wickramage, Colin J. Fidge, Chun Ouyang, Tony Sahama:
Generating Log Requirements for Checking Conformance against Healthcare Standards using Workflow Modelling. ACSW 2019: 35:1-35:10 - [c85]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros, Colin J. Fidge, Artem Polyvyanyy:
Business Object Centric Microservices Patterns. OTM Conferences 2019: 476-495 - [c84]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros, Colin J. Fidge, Artem Polyvyanyy:
Availability and Scalability Optimized Microservice Discovery from Enterprise Systems. OTM Conferences 2019: 496-514 - 2018
- [j45]Andrei Furda, Colin J. Fidge, Alistair Barros:
A practical approach for detecting multi-tenancy data interference. Sci. Comput. Program. 163: 160-173 (2018) - [j44]Andrei Furda, Colin J. Fidge, Olaf Zimmermann, Wayne Kelly, Alistair Barros:
Migrating Enterprise Legacy Source Code to Microservices: On Multitenancy, Statefulness, and Data Consistency. IEEE Softw. 35(3): 63-72 (2018) - [c83]Mahesh Fernando, Colin J. Fidge, Tony Sahama, K. Priyantha Hewagamage:
Employees' perceptions of sharing employer-sponsored personal health records. ACSW 2018: 35:1-35:10 - [c82]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros, Artem Polyvyanyy, Colin J. Fidge:
Function-Splitting Heuristics for Discovery of Microservices in Enterprise Systems. ICSOC 2018: 37-53 - [c81]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros, Colin J. Fidge, Artem Polyvyanyy:
Discovering Microservices in Enterprise Systems Using a Business Object Containment Heuristic. OTM Conferences (2) 2018: 60-79 - 2017
- [j43]Yi-Fan Zhang, Yu-Chu Tian, Wayne Kelly, Colin J. Fidge:
Scalable and efficient data distribution for distributed computing of all-to-all comparison problems. Future Gener. Comput. Syst. 67: 152-162 (2017) - [j42]Anastasiia Pika, Michael Leyer, Moe Thandar Wynn, Colin J. Fidge, Arthur H. M. ter Hofstede, Wil M. P. van der Aalst:
Mining Resource Profiles from Event Logs. ACM Trans. Manag. Inf. Syst. 8(1): 1:1-1:30 (2017) - [c80]Daniel Hunter, Jack Parry, Kenneth Radke, Colin J. Fidge:
Authenticated encryption for time-sensitive critical infrastructure. ACSW 2017: 19:1-19:10 - [c79]Chathurika Wickramage, Colin J. Fidge, Tony Sahama, Roy Wong:
Challenges for Log Based Detection of Privacy Violations during Healthcare Emergencies. GLOBECOM 2017: 1-6 - [c78]Pramitha Perera, Yu-Chu Tian, Colin J. Fidge, Wayne Kelly:
A Comparison of Supervised Machine Learning Algorithms for Classification of Communications Network Traffic. ICONIP (1) 2017: 445-454 - 2016
- [j40]Anastasiia Pika, Wil M. P. van der Aalst, Moe Thandar Wynn, Colin J. Fidge, Arthur H. M. ter Hofstede:
Evaluating and predicting overall process risk using event logs. Inf. Sci. 352-353: 98-120 (2016) - [j39]Yi-Fan Zhang, Yu-Chu Tian, Colin J. Fidge, Wayne Kelly:
Data-aware task scheduling for all-to-all comparison problems in heterogeneous distributed systems. J. Parallel Distributed Comput. 93-94: 87-101 (2016) - [c77]Donna Teague, Colin J. Fidge, Yue Xu:
Combining unsupervised and invigilated assessment of introductory programming. ACSW 2016: 9 - [c76]Jack Parry, Daniel Hunter, Kenneth Radke, Colin J. Fidge:
A network forensics tool for precise data packet capture and replay in cyber-physical systems. ACSW 2016: 22 - [c75]Chathurika Wickramage, Tony Sahama, Colin J. Fidge:
Anatomy of log files: Implications for information accountability measures. HealthCom 2016: 1-6 - [c74]Mahesh Fernando, Tony Sahama, Colin J. Fidge, K. Priyantha Hewagamage:
Personal health records as sources of productivity evidence. ICC 2016: 1-6 - 2015
- [j38]Nuwan Goonasekera, William J. Caelli, Colin J. Fidge:
LibVM: an architecture for shared library sandboxing. Softw. Pract. Exp. 45(12): 1597-1617 (2015) - [c73]Ayodeji James Akande, Colin J. Fidge, Ernest Foo:
Component Modeling for SCADA Network Mapping. ACSC 2015: 91-100 - [c72]Yi-Fan Zhang, Yu-Chu Tian, Wayne Kelly, Colin J. Fidge, Jing Gao:
Application of Simulated Annealing to Data Distribution for All-to-All Comparison Problems in Homogeneous Systems. ICONIP (3) 2015: 683-691 - [c71]Yi-Fan Zhang, Yu-Chu Tian, Wayne Kelly, Colin J. Fidge:
Distributed computing of all-to-all comparison problems in heterogeneous systems. IECON 2015: 2053-2058 - [c70]Samuel A. Brian, Richard N. Thomas, James M. Hogan, Colin J. Fidge:
Planting Bugs: A System for Testing Students' Unit Tests. ITiCSE 2015: 45-50 - 2014
- [j37]Suriadi Suriadi, Burkhard Weiß, Axel Winkelmann, Arthur H. M. ter Hofstede, Michael Adams, Raffaele Conforti, Colin J. Fidge, Marcello La Rosa, Chun Ouyang, Anastasiia Pika, Michael Rosemann, Moe Thandar Wynn:
Current Research in Risk-aware Business Process Management - Overview, Comparison, and Gap Analysis. Commun. Assoc. Inf. Syst. 34: 52 (2014) - [j36]Guosong Tian, Yu-Chu Tian, Colin J. Fidge:
Precise relative clock synchronization for distributed control using TSC registers. J. Netw. Comput. Appl. 44: 63-71 (2014) - [j35]Madhushika M. E. Karunarathna, Yu-Chu Tian, Colin J. Fidge:
Domain-specific application analysis for customized instruction identification. Microprocess. Microsystems 38(7): 637-648 (2014) - [c69]Anastasiia Pika, Moe Thandar Wynn, Colin J. Fidge, Arthur H. M. ter Hofstede, Michael Leyer, Wil M. P. van der Aalst:
An Extensible Framework for Analysing Resource Behaviour Using Event Logs. CAiSE 2014: 564-579 - [c68]Yi-Fan Zhang, Yu-Chu Tian, Wayne Kelly, Colin J. Fidge:
A distributed computing framework for All-to-All comparison problems. IECON 2014: 2499-2505 - 2013
- [c67]Colin J. Fidge, Jim Hogan, Raymond Lister:
What vs. how: comparing students' testing and coding skills. ACE 2013: 97-106 - [c66]Anastasiia Pika, Wil M. P. van der Aalst, Colin J. Fidge, Arthur H. M. ter Hofstede, Moe Thandar Wynn:
Profiling Event Logs to Configure Risk Indicators for Process Delays. CAiSE 2013: 465-481 - [c65]Christophe Hauser, Frederic Tronel, Colin J. Fidge, Ludovic Mé:
Intrusion detection in distributed systems, an approach based on taint marking. ICC 2013: 1962-1967 - [c64]Madhushika M. E. Karunarathna, Yu-Chu Tian, Colin J. Fidge, Ross Hayward:
Algorithm clustering for multi-algorithm processor design. ICCD 2013: 451-454 - [c63]Bandar Alshammari, Colin J. Fidge, Diane Corney:
Security Metrics for Java Bytecode Programs (S). SEKE 2013: 394-399 - [p2]Bandar Alhaqbani, Michael Adams, Colin J. Fidge, Arthur H. M. ter Hofstede:
Privacy-Aware Workflow Management. Business Process Management 2013: 111-128 - 2012
- [j34]Nuwan Goonasekera, William J. Caelli, Colin J. Fidge:
A Hardware Virtualization Based Component Sandboxing Architecture. J. Softw. 7(9): 2107-2118 (2012) - [c62]Chris Mills, Colin J. Fidge, Diane Corney:
Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device. AISC 2012: 59-70 - [c61]Christopher Doble, Colin J. Fidge, Diane Corney:
Data Flow Analysis of Embedded Program Expressions. AISC 2012: 71-82 - [c60]Christophe Hauser, Frédéric Tronel, Jason Reid, Colin J. Fidge:
A taint marking approach to confidentiality violation detection. AISC 2012: 83-90 - [c59]Anastasiia Pika, Wil M. P. van der Aalst, Colin J. Fidge, Arthur H. M. ter Hofstede, Moe Thandar Wynn:
Predicting Deadline Transgressions Using Event Logs. Business Process Management Workshops 2012: 211-216 - 2011
- [j33]Moe Thandar Wynn, Chun Ouyang, Arthur H. M. ter Hofstede, Colin J. Fidge:
Data and process requirements for product recall coordination. Comput. Ind. 62(7): 776-786 (2011) - [j32]Lifeng Ai, Maolin Tang, Colin J. Fidge:
Partitioning composite web services for decentralized execution using a genetic algorithm. Future Gener. Comput. Syst. 27(2): 157-172 (2011) - [c58]Chun Ouyang, Moe Thandar Wynn, Jan-Christian Kuhr, Michael Adams, Thomas Becker, Arthur H. M. ter Hofstede, Colin J. Fidge:
Workflow support for scheduling in surgical care processes. ECIS 2011: 30 - [c57]Lifeng Ai, Maolin Tang, Colin J. Fidge:
Resource Allocation and Scheduling of Multiple Composite Web Services in Cloud Computing Using Cooperative Coevolution Genetic Algorithm. ICONIP (2) 2011: 258-267 - [c56]Li Gui, Yu-Chu Tian, Colin J. Fidge:
A conditional retransmission enabled transport protocol for real-time networked control systems. LCN 2011: 231-234 - [c55]Bandar Alshammari, Colin J. Fidge, Diane Corney:
A Hierarchical Security Assessment Model for Object-Oriented Programs. QSIC 2011: 218-227 - 2010
- [j31]Lifeng Ai, Maolin Tang, Colin J. Fidge:
QoS-oriented Resource Allocation and Scheduling of Multiple CompositeWeb Services in a Hybrid Cloud Using a Random-Key Genetic Algorithm. Aust. J. Intell. Inf. Process. Syst. 12(1) (2010) - [j30]Bandar Alhaqbani, Colin J. Fidge:
Probabilistic Inference Channel Detection and Restriction Applied to Patients' Privacy Assurance. Int. J. Inf. Secur. Priv. 4(4): 35-59 (2010) - [c54]Bandar Alshammari, Colin J. Fidge, Diane Corney:
Assessing the Impact of Refactoring on Security-Critical Object-Oriented Designs. APSEC 2010: 186-195 - [c53]Bandar Alshammari, Colin J. Fidge, Diane Corney:
Security Metrics for Object-Oriented Designs. Australian Software Engineering Conference 2010: 55-64 - [c52]Maolin Tang, Colin J. Fidge:
Reconstruction of Falsified Computer Logs for Digital Forensics Investigations. AISC 2010: 12-21 - [c51]Reza Hassanzadeh, Tony Sahama, Colin J. Fidge:
A Secure Framework and Related Protocols for Ubiquitous Access to Electronic Health Records Using Java SIM Cards. E-HEALTH 2010: 102-113 - [c50]Guosong Tian, Yu-Chu Tian, Colin J. Fidge:
Performance analysis of IEEE 802.11 DCF based WNCS networks. LCN 2010: 496-503 - [c49]Shamsul Kamal Ahmad Khalid, Jacob Zimmermann, Diane Corney, Colin J. Fidge:
Automatic Generation of Assertions to Detect Potential Security Vulnerabilities in C Programs That Use Union and Pointer Types. NSS 2010: 351-356 - [p1]Moe Thandar Wynn, Anne Rozinat, Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, Colin J. Fidge:
Process Mining and Simulation. Modern Business Process Automation 2010: 437-457 - 2009
- [j29]Anne Rozinat, Moe Thandar Wynn, Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, Colin J. Fidge:
Workflow simulation for operational decision support. Data Knowl. Eng. 68(9): 834-850 (2009) - [j28]Bandar Alhaqbani, Audun Jøsang, Colin J. Fidge:
A Medical Data Reliability Assessment Model. J. Theor. Appl. Electron. Commer. Res. 4(2): 64-63 (2009) - [c48]Maolin Tang, Colin J. Fidge:
A genetic algorithm for the multi-source and multi-sink minimum vertex cut problem and its applications. IEEE Congress on Evolutionary Computation 2009: 3226-3233 - [c47]Raymond Lister, Colin J. Fidge, Donna Teague:
Further evidence of a relationship between explaining, tracing and writing skills in introductory programming. ITiCSE 2009: 161-165 - [c46]Colin J. Fidge, Diane Corney:
Integrating hardware and software information flow analyses. LCTES 2009: 157-166 - [c45]Guosong Tian, Colin J. Fidge, Yu-Chu Tian:
Hybrid system simulation of computer control applications over communication networks. MASCOTS 2009: 1-10 - [c44]Bandar Alshammari, Colin J. Fidge, Diane Corney:
Security Metrics for Object-Oriented Class Designs. QSIC 2009: 11-20 - 2008
- [c43]Moe Thandar Wynn, Colin J. Fidge, Arthur H. M. ter Hofstede, Marlon Dumas:
Product flow analysis in distribution networks with a fixed time horizon. ACSC 2008: 73-81 - [c41]Anne Rozinat, Moe Thandar Wynn, Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, Colin J. Fidge:
Workflow Simulation for Operational Decision Support Using Design, Historic and State Information. BPM 2008: 196-211 - [c40]Guosong Tian, Yu-Chu Tian, Colin J. Fidge:
High-Precision Relative Clock Synchronization Using Time Stamp Counters. ICECCS 2008: 69-78 - 2007
- [c39]Benjamin W. Long, Colin J. Fidge, David A. Carrington:
Cross-Layer Verification of Type Flaw Attacks on Security Protocols. ACSC 2007: 171-180 - [c38]Moe Thandar Wynn, Marlon Dumas, Colin J. Fidge, Arthur H. M. ter Hofstede, Wil M. P. van der Aalst:
Business Process Simulation for Operational Decision Support. Business Process Management Workshops 2007: 66-77 - [c37]Bandar Alhaqbani, Colin J. Fidge:
Access Control Requirements for Processing Electronic Health Records. Business Process Management Workshops 2007: 371-382 - [c36]Li Gui, Yu-Chu Tian, Colin J. Fidge:
Performance Evaluation of IEEE 802.11 Wireless Networks for Real-time Networked Control Systems. ESA 2007: 121-126 - 2006
- [j27]Andrew Rae, Colin J. Fidge, Luke Wildman:
Fault Evaluation for Security-Critical Communications Devices. Computer 39(5): 61-68 (2006) - [j26]Karl Lermer, Colin J. Fidge:
Procedure compilation in the refinement calculus. Formal Aspects Comput. 18(2): 152-180 (2006) - [c35]Colin J. Fidge, Tim McComb:
Tracing secure information flow through mode changes. ACSC 2006: 303-310 - [c34]Benjamin W. Long, Colin J. Fidge:
Formally Analysing a Security Protocol for Replay Attacks. ASWEC 2006: 171-180 - [c33]Phil Cook, Colin J. Fidge:
Well-Measuring Programs. ASWEC 2006: 253-261 - [c32]Colin J. Fidge, Yu-Chu Tian:
Functional Analysis of a Real-Time Protocol for Networked Control Systems. ATVA 2006: 446-460 - 2005
- [j24]Andrew Rae, Colin J. Fidge:
Identifying Critical Components During Information Security Evaluations. J. Res. Pract. Inf. Technol. 37(4) (2005) - [j23]Andrew Rae, Colin J. Fidge:
Information Flow Analysis for Fail-Secure Devices. Comput. J. 48(1): 17-26 (2005) - [j22]Karl Lermer, Colin J. Fidge, Ian J. Hayes:
A theory for execution-time derivation in real-time programs. Theor. Comput. Sci. 346(1): 3-27 (2005) - [c31]Colin J. Fidge, Phil Cook:
Model Checking Interrupt-Dependent Software. APSEC 2005: 51-58 - [c30]Colin J. Fidge, Peter J. Robinson, Steve Dunne:
Refinement Laws for Verifying Library Subroutine Adaptation. Australian Software Engineering Conference 2005: 224-232 - 2003
- [j21]Colin J. Fidge, Carron Shankland:
But What if I Don't Want to Wait Forever? Formal Aspects Comput. 14(3): 281-294 (2003) - [j20]Luke Wildman, Colin J. Fidge, David A. Carrington:
The Variety of Variables in Automated Real-Time Refinement. Formal Aspects Comput. 15(2-3): 258-279 (2003) - [j19]Karl Lermer, Colin J. Fidge, Ian J. Hayes:
Linear Approximation of Execution-Time Constraints. Formal Aspects Comput. 15(4): 319-348 (2003) - [c28]Benjamin W. Long, Colin J. Fidge, Antonio Cerone:
A Z Based Approach to Verifying Security Protocols. ICFEM 2003: 375-395 - [c27]Geoffrey Watson, Colin J. Fidge:
A Partial-Correctness Semantics for Modelling Assembler Programs. SEFM 2003: 82-90 - [c26]Karl Lermer, Colin J. Fidge, Ian J. Hayes:
Formal Semantics for Program Paths. CATS 2003: 58-81 - 2002
- [j17]Karl Lermer, Colin J. Fidge:
A formal model of real-time program compilation. Theor. Comput. Sci. 282(1): 151-190 (2002) - [c22]Luke Wildman, Colin J. Fidge:
The variety of variables in computer-aided real-time programming. Refine 2002: 21-36 - 2001
- [j16]Ian J. Hayes, Colin J. Fidge, Karl Lermer:
Semantic characterisation of dead control-flow paths. IEE Proc. Softw. 148(6): 175-186 (2001) - [c19]Andrew P. Martin, Colin J. Fidge:
Lifting in Z. CATS 2001: 197-219 - 2000
- [j15]Graeme Smith, Colin J. Fidge:
Incremental Development of Real-Time Requirements: The Light Control Case Study. J. Univers. Comput. Sci. 6(7): 704-730 (2000) - [j14]Luke Wildman, Colin J. Fidge, David A. Carrington:
Computer-aided development of a real-time program. Softw. Concepts Tools 19(4): 190-202 (2000) - 1999
- [j13]Colin J. Fidge, Ian J. Hayes, Geoffrey Watson:
The deadline command. IEE Proc. Softw. 146(2): 104-111 (1999) - [c16]Karl Lermer, Colin J. Fidge:
A Formal Model of Real-Time Program Compilation. ARTS 1999: 192-210 - 1998
- [c14]Colin J. Fidge, Ian J. Hayes, Brendan P. Mahony:
Defining Differentiation and Integration in Z. ICFEM 1998: 64-75 - [c13]Colin J. Fidge, Ian J. Hayes, Andrew P. Martin, Axel Wabenhorst:
A Set-Theoretic Model for Real-Time Specification and Reasoning. MPC 1998: 188-206 - 1997
- [j9]Colin J. Fidge, Peter Kearney, Mark Utting:
A Formal Method for Building Concurrent Real-Time Software. IEEE Softw. 14(2): 99-106 (1997) - [c11]Karl Lermer, Colin J. Fidge:
A Methodology for Compilation of High-Integrity Real-Time Programs. Euro-Par 1997: 1274-1281 - 1996
- [c10]Colin J. Fidge, Mark Utting, Peter Kearney, Ian J. Hayes:
Integrating Real-Time Scheduling Theory and Program Refinement. FME 1996: 327-346 - 1995
- [c9]Colin J. Fidge, Peter Kearney, Mark Utting:
Interactively Verifying a Simple Real-time Scheduler. CAV 1995: 395-408
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-11-15 20:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint