


default search action
ICSE 2020: Seoul, South Korea
- Gregg Rothermel, Doo-Hwan Bae:

ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June - 19 July, 2020. ACM 2020, ISBN 978-1-4503-7121-6
Continuous integration
- Antonia Bertolino, Antonio Guerriero

, Breno Miranda, Roberto Pietrantuono
, Stefano Russo
:
Learning-to-rank vs ranking-to-learn: strategies for regression testing in continuous integration. 1-12 - Xianhao Jin

, Francisco Servant
:
A cost-efficient approach to building in continuous integration. 13-25 - Thodoris Sotiropoulos, Dimitris Mitropoulos, Diomidis Spinellis

:
Practical fault detection in puppet programs. 26-37 - Jordan Henkel, Christian Bird, Shuvendu K. Lahiri, Thomas W. Reps:

Learning from, understanding, and supporting DevOps artifacts for docker. 38-49
Cyber-physical systems
- Dalal Alrajeh, Antoine Cailliau, Axel van Lamsweerde:

Adapting requirements models to varying environments. 50-61 - Alessio Ferrari

, Franco Mazzanti, Davide Basile
, Maurice H. ter Beek, Alessandro Fantechi:
Comparing formal tools for system design: a judgment study. 62-74
Debugging 1
- Lukas Kirschner, Ezekiel O. Soremekun

, Andreas Zeller:
Debugging inputs. 75-86 - Brittany Johnson, Yuriy Brun

, Alexandra Meliou
:
Causal testing: understanding defects' root causes. 87-99
Ecosystems and evolution
- Wanwangying Ma, Lin Chen, Xiangyu Zhang, Yang Feng, Zhaogui Xu, Zhifei Chen, Yuming Zhou, Baowen Xu

:
Impact analysis of cross-project bugs on software ecosystems. 100-111 - Lingchao Chen, Foyzul Hassan, Xiaoyin Wang

, Lingming Zhang:
Taming behavioral backward incompatibilities via cross-project testing and analysis. 112-124 - Ying Wang, Ming Wen, Yepang Liu, Yibo Wang, Zhenming Li, Chao Wang, Hai Yu, Shing-Chi Cheung

, Chang Xu, Zhiliang Zhu:
Watchman: monitoring dependency conflicts for Python library ecosystem. 125-135
Empirical studies for security
- Anastasia Danilova, Alena Naiakshina, Matthew Smith

:
One size does not fit all: a grounded theory and online survey study of developer preferences for security warning types. 136-148 - Dirk van der Linden, Pauline Anthonysamy, Bashar Nuseibeh

, Thein Than Tun, Marian Petre, Mark Levine
, John N. Towse
, Awais Rashid
:
Schrödinger's security: opening the box on app developers' security rationale. 149-160
Human practice
- Claire Ingram, Anders Drachen

:
How software practitioners use informal local meetups to share software engineering knowledge. 161-173 - Carolyn D. Egelman

, Emerson R. Murphy-Hill, Elizabeth Kammer, Margaret Morrow Hodges, Collin Green, Ciera Jaspan, James Lin:
Predicting developers' negative feelings about code review. 174-185
Web testing
- Rahulkrishna Yandrapally, Andrea Stocco, Ali Mesbah

:
Near-duplicate detection in web app model inference. 186-197 - Cristian-Alexandru Staicu, Martin Toldam Torp, Max Schäfer, Anders Møller, Michael Pradel:

Extracting taint specifications for JavaScript libraries. 198-209 - George Mathew, Chris Parnin, Kathryn T. Stolee:

SLACC: simion-based language agnostic code clones. 210-221 - I Luk Kim, Yunhui Zheng, Hogun Park, Weihang Wang, Wei You, Yousra Aafer, Xiangyu Zhang:

Finding client-side business flow tampering vulnerabilities. 222-233
Analysis for security
- Peiming Liu, Gang Zhao, Jeff Huang:

Securing unsafe rust programs with XRust. 234-245 - Ana Nora Evans, Bradford Campbell

, Mary Lou Soffa:
Is rust used safely by software developers? 246-257 - Changwei Zou, Jingling Xue

:
Burn after reading: a shadow stack with microsecond-level runtime rerandomization for protecting return addresses. 258-270 - Seongjoon Hong, Junhee Lee, Jeongsoo Lee, Hakjoo Oh:

SAVER: scalable, precise, and safe memory-error repair. 271-283
Android and web application testing
- Katherine Hough

, Gebrehiwet B. Welearegai, Christian Hammer
, Jonathan Bell:
Revealing injection vulnerabilities by leveraging existing tests. 284-296 - Ju Qian, Zhengyu Shang, Shuoyan Yan, Yan Wang, Lin Chen:

RoScript: a visual script driven truly non-intrusive robotic testing system for touch screen applications. 297-308 - Carlos Bernal-Cárdenas, Nathan Cooper, Kevin Moran, Oscar Chaparro

, Andrian Marcus
, Denys Poshyvanyk
:
Translating video recordings of mobile app usages into replayable scenarios. 309-321 - Jieshan Chen

, Chunyang Chen
, Zhenchang Xing, Xiwei Xu, Liming Zhu
, Guoqiang Li, Jinshui Wang
:
Unblind your apps: predicting natural-language labels for mobile GUI components by deep learning. 322-334
Autonomous driven system
- Shafiul Azam Chowdhury, Sohil Lal Shrestha

, Taylor T. Johnson, Christoph Csallner
:
SLEMI: equivalence modulo input (EMI) based mutation of CPS models for finding compiler bugs in Simulink. 335-346 - Husheng Zhou

, Wei Li, Zelun Kong, Junfeng Guo, Yuqun Zhang, Bei Yu, Lingming Zhang, Cong Liu:
DeepBillboard: systematic physical-world testing of autonomous driving systems. 347-358 - Andrea Stocco, Michael Weiss

, Marco Calzana, Paolo Tonella:
Misbehaviour prediction for autonomous driving systems. 359-371 - Claudio Menghi

, Shiva Nejati, Lionel C. Briand, Yago Isasi Parache:
Approximation-refinement testing of compute-intensive cyber-physical models: an approach based on system identification. 372-384 - Joshua Garcia, Yang Feng, Junjie Shen, Sumaya Almanee, Yuan Xia, Qi Alfred Chen:

A comprehensive study of autonomous vehicle bugs. 385-396
Debugging 2
- Boyuan Chen, Zhen Ming (Jack) Jiang:

Studying the use of Java logging utilities in the wild. 397-408
Human aspects of software engineering 1
- Harsha Perera, Waqar Hussain, Jon Whittle, Arif Nurwidyantoro, Davoud Mougouei

, Rifat Ara Shams
, Gillian C. Oliver
:
A study on the prevalence of human values in software engineering publications, 2015 - 2018. 409-420 - Franz Zieris

, Lutz Prechelt
:
Explaining pair programming session dynamics from knowledge gaps. 421-432 - Claudia Hilderbrand, Christopher Perdriau, Lara Letaw, Jillian Emard, Zoe Steine-Hanson, Margaret Burnett, Anita Sarma

:
Engineering gender-inclusivity into software: ten teams' tales from the trenches. 433-444
Version control and programming practice
- Shurui Zhou, Bogdan Vasilescu, Christian Kästner:

How has forking changed in the last 20 years?: a study of hard forks on GitHub. 445-456
Android application testing
- Jiwei Yan, Hao Liu, Linjie Pan, Jun Yan, Jian Zhang, Bin Liang:

Multiple-entry testing of Android applications by constructing activity launching contexts. 457-468 - Jue Wang

, Yanyan Jiang, Chang Xu, Chun Cao, Xiaoxing Ma, Jian Lu:
ComboDroid: generating high-quality test inputs for Android apps via use case combinations. 469-480 - Zhen Dong, Marcel Böhme, Lucia Cojocaru, Abhik Roychoudhury:

Time-travel testing of Android apps. 481-492
Clones and changes
- Jason Lau

, Aishwarya Sivaraman, Qian Zhang, Muhammad Ali Gulzar, Jason Cong, Miryung Kim:
HeteroRefactor: refactoring for heterogeneous computing with FPGA. 493-505 - Weijie Zhou, Yue Zhao, Guoqiang Zhang, Xipeng Shen

:
HARP: holistic analysis for refactoring Python-based analytics programs. 506-517 - Thong Hoang, Hong Jin Kang

, David Lo
, Julia Lawall:
CC2Vec: distributed representations of code changes. 518-529
Contracts
- Thomas Durieux

, João F. Ferreira, Rui Abreu
, Pedro Cruz:
Empirical review of automated analysis tools on 47, 587 Ethereum smart contracts. 530-541 - Sungjae Hwang, Sukyoung Ryu

:
Gap between theory and practice: an empirical study of security patches in solidity. 542-553
Defect prediction
- Sadia Tabassum

, Leandro L. Minku
, Danyi Feng, George G. Cabral, Liyan Song:
An investigation of cross-project learning in online just-in-time software defect prediction. 554-565 - Ke Li, Zilin Xiang, Tao Chen, Shuo Wang, Kay Chen Tan

:
Understanding the automated parameter optimization on transfer learning for cross-project defect prediction: an empirical study. 566-577 - Jinyin Chen, Keke Hu, Yue Yu, Zhuangzhi Chen, Qi Xuan, Yi Liu

, Vladimir Filkov:
Software visualization and deep transfer learning for effective software defect prediction. 578-589
Human aspects of software engineering 2
- Emad Aghajani, Csaba Nagy, Mario Linares-Vásquez

, Laura Moreno, Gabriele Bavota
, Michele Lanza
, David C. Shepherd
:
Software documentation: the practitioners' perspective. 590-601
Program repair
- Yi Li, Shaohua Wang, Tien N. Nguyen:

DLFix: context-based code transformation learning for automated program repair. 602-614 - Kui Liu

, Shangwen Wang
, Anil Koyuncu, Kisub Kim, Tegawendé F. Bissyandé, Dongsun Kim
, Peng Wu, Jacques Klein
, Xiaoguang Mao
, Yves Le Traon
:
On the efficiency of test suite based program repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs. 615-627
Requirement discovery
- Hui Guo, Munindar P. Singh

:
Caspar: extracting and synthesizing user stories of problems from app reviews. 628-640 - Lin Shi

, Mingzhe Xing, Mingyang Li, Yawen Wang
, Shoubin Li, Qing Wang:
Detection of hidden feature requests from massive chat messages via deep siamese network. 641-653
Cognition
- Souti Chattopadhyay

, Nicholas Nelson
, Audrey Au, Natalia Morales, Christopher A. Sanchez, Rahul Pandita, Anita Sarma:
A tale from the trenches: cognitive biases and software development. 654-665 - Daniela Girardi, Nicole Novielli, Davide Fucci, Filippo Lanubile:

Recognizing developers' emotions while programming. 666-677 - Ryan Krueger, Yu Huang, Xinyu Liu

, Tyler Santander
, Westley Weimer, Kevin Leach:
Neurological divide: an fMRI study of prose and code writing. 678-690 - Nischal Shrestha, Colton Botta, Titus Barik, Chris Parnin:

Here we go again: why is it difficult for developers to learn another programming language? 691-701
Deep learning testing and debugging 1
- Simos Gerasimou, Hasan Ferit Eniser, Alper Sen, Alper Çakan

:
Importance-driven deep learning system testing. 702-713 - Brandon Paulsen, Jingbo Wang

, Chao Wang:
ReluDiff: differential verification of deep neural networks. 714-726 - Huiyan Wang, Jingwei Xu, Chang Xu, Xiaoxing Ma, Jian Lu:

Dissector: input validation for deep learning applications by crossing-layer dissection. 727-738 - Xiyue Zhang

, Xiaofei Xie
, Lei Ma, Xiaoning Du, Qiang Hu, Yang Liu
, Jianjun Zhao, Meng Sun:
Towards characterizing adversarial defects of deep learning software from the lens of uncertainty. 739-751
Fuzzing 1
- Akond Rahman

, Effat Farhana, Chris Parnin, Laurie A. Williams:
Gang of eight: a defect taxonomy for infrastructure as code scripts. 752-764 - Cheng Wen

, Haijun Wang, Yuekang Li
, Shengchao Qin
, Yang Liu
, Zhiwu Xu, Hongxu Chen, Xiaofei Xie
, Geguang Pu, Ting Liu:
MemLock: memory usage guided fuzzing. 765-777 - Tai D. Nguyen

, Long H. Pham, Jun Sun, Yun Lin, Quang Tran Minh:
sFuzz: an efficient adaptive fuzzer for solidity smart contracts. 778-788 - Valentin Wüstholz, Maria Christakis:

Targeted greybox fuzzing with static lookahead analysis. 789-800 - Caius Brindescu, Iftekhar Ahmed, Rafael Leano, Anita Sarma

:
Planning for untangling: predicting the difficulty of merge conflicts. 801-811
Static analysis 1
- Qingkai Shi

, Rongxin Wu
, Gang Fan, Charles Zhang:
Conquering the extensional scalability problem for value-flow analysis frameworks. 812-823 - Rijnard van Tonder

, Claire Le Goues
:
Tailoring programs for static analysis via program transformation. 824-834 - Qingkai Shi

, Charles Zhang:
Pipelining bottom-up data flow analysis. 835-847
Traceability
- Mounifah Alenazi

, Nan Niu, Juha Savolainen:
A novel approach to tracing safety requirements and state-based design models. 848-860 - Robert White

, Jens Krinke, Raymond Tan:
Establishing multilevel test-to-code traceability links. 861-872 - Kevin Moran, David N. Palacio

, Carlos Bernal-Cárdenas, Daniel McCrystal, Denys Poshyvanyk
, Chris Shenefiel, Jeff Johnson:
Improving the effectiveness of traceability link recovery using hierarchical bayesian networks. 873-885
API
- Hao Xia, Yuan Zhang, Yingtian Zhou, Xiaoting Chen

, Yang Wang
, Xiangyu Zhang, Shuaishuai Cui, Geng Hong, Xiaohan Zhang, Min Yang, Zhemin Yang:
How Android developers handle evolution-induced API compatibility issues: a large-scale study. 886-898 - Hao Zhong

, Na Meng, Zexuan Li, Li Jia:
An empirical study on API parameter rules. 899-911 - Maxime Lamothe, Weiyi Shang:

When APIs are intentionally bypassed: an exploratory study of API workarounds. 912-924 - Xiaoxue Ren, Jiamou Sun, Zhenchang Xing, Xin Xia, Jianling Sun:

Demystify official API usage directives with crowdsourced API misuse scenarios, erroneous code examples and patches. 925-936
Bug analysis
- Mingyuan Wu, Yicheng Ouyang, Husheng Zhou

, Lingming Zhang, Cong Liu, Yuqun Zhang:
Simulee: detecting CUDA synchronization bugs via memory-access modeling. 937-948
Deep learning testing and debugging 2
- Peixin Zhang, Jingyi Wang, Jun Sun, Guoliang Dong, Xinyu Wang, Xingen Wang, Jin Song Dong, Ting Dai:

White-box fairness testing through adversarial sampling. 949-960 - Pinjia He, Clara Meister, Zhendong Su

:
Structure-invariant testing for machine translation. 961-973 - Zeyu Sun, Jie M. Zhang

, Mark Harman, Mike Papadakis
, Lu Zhang:
Automatic testing and improvement of machine translation. 974-985 - Guanhong Tao, Shiqing Ma, Yingqi Liu, Qiuling Xu, Xiangyu Zhang:

TRADER: trace divergence analysis and embedding regulation for debugging recurrent neural networks. 986-998
Fuzzing 2
- Haijun Wang, Xiaofei Xie

, Yi Li
, Cheng Wen
, Yuekang Li
, Yang Liu
, Shengchao Qin
, Hongxu Chen, Yulei Sui:
Typestate-guided fuzzer for discovering use-after-free vulnerabilities. 999-1010 - Tegan Brennan, Seemanta Saha

, Tevfik Bultan:
JVM fuzzing for JIT-induced side-channel detection. 1011-1023 - Valentin J. M. Manès, Soomin Kim, Sang Kil Cha:

Ankou: guiding grey-box fuzzing towards combinatorial difference. 1024-1036
Static analysis 2
- Ramanathan Ramu, Ganesha B. Upadhyaya, Hoan Anh Nguyen, Hridesh Rajan

:
BCFA: bespoke control flow analysis for CFA at scale. 1037-1048 - Li Sui, Jens Dietrich

, Amjed Tahir, George Fourtounis:
On the recall of static call graph construction in practice. 1049-1060 - Manuel Benz, Erik Krogh Kristensen, Linghui Luo

, Nataniel P. Borges, Eric Bodden, Andreas Zeller
:
Heaps'n leaks: how heap snapshots improve Android taint analysis. 1061-1072
Big data
- Rafael-Michael Karampatsis, Hlib Babii, Romain Robbes, Charles Sutton, Andrea Janes:

Big code != big vocabulary: open-vocabulary models for source code. 1073-1085 - Jingmei Hu, Jiwon Joung, Maia L. Jacobs, Krzysztof Z. Gajos, Margo I. Seltzer:

Improving data scientist efficiency with provenance. 1086-1097 - Junwen Yang, Utsav Sethi, Cong Yan, Alvin Cheung

, Shan Lu:
Managing data constraints in database-backed web applications. 1098-1109
Deep learning testing and debugging 3
- Nargiz Humbatova, Gunel Jahangirova, Gabriele Bavota

, Vincenzo Riccio
, Andrea Stocco, Paolo Tonella:
Taxonomy of real faults in deep learning systems. 1110-1121 - Yuchi Tian, Ziyuan Zhong, Vicente Ordonez, Gail E. Kaiser

, Baishakhi Ray:
Testing DNN image classifiers for confusion & bias errors. 1122-1134 - Md Johirul Islam, Rangeet Pan, Giang Nguyen, Hridesh Rajan

:
Repairing deep neural networks: fix patterns and challenges. 1135-1146 - Xiang Gao, Ripon K. Saha, Mukul R. Prasad, Abhik Roychoudhury:

Fuzz testing based data augmentation to improve robustness of deep neural networks. 1147-1158 - Ru Zhang, Wencong Xiao, Hongyu Zhang

, Yu Liu, Haoxiang Lin
, Mao Yang:
An empirical study on program failures of deep learning jobs. 1159-1170
Natural language artifacts in software
- Davide Spadini, Gül Çalikli

, Alberto Bacchelli:
Primers or reminders?: the effects of existing review comments on code review. 1171-1182 - Ehsan Mirsaeedi, Peter C. Rigby:

Mitigating turnover with code review recommendation: balancing expertise, workload, and knowledge distribution. 1183-1195
Open source software
- Yuxia Zhang, Minghui Zhou, Klaas-Jan Stol, Jianyu Wu, Zhi Jin:

How do companies collaborate in open source ecosystems?: an empirical study of OpenStack. 1196-1208 - Cassandra Overney, Jens Meinicke, Christian Kästner, Bogdan Vasilescu

:
How to not get rich: an empirical study of donations in open source. 1209-1221 - Xin Tan, Minghui Zhou, Brian Fitzgerald:

Scaling open source communities: an empirical study of the Linux kernel. 1222-1234
Symbolic execution
- Shengjian Guo, Yueqi Chen, Peng Li, Yueqiang Cheng, Huibo Wang, Meng Wu, Zhiqiang Zuo:

SpecuSym: speculative symbolic execution for cache timing leak detection. 1235-1247 - Hengbiao Yu, Zhenbang Chen, Xianjin Fu

, Ji Wang, Zhendong Su
, Jun Sun, Chun Huang, Wei Dong:
Symbolic verification of message passing interface programs. 1248-1260 - Hui Guo, Cindy Rubio-González:

Efficient generation of error-inducing floating-point inputs via symbolic execution. 1261-1272 - Yannic Noller

, Corina S. Pasareanu, Marcel Böhme, Youcheng Sun
, Hoang Lam Nguyen, Lars Grunske
:
HyDiff: hybrid differential software analysis. 1273-1285
Testing 1
- Dehai Zhao, Zhenchang Xing, Chunyang Chen

, Xiwei Xu, Liming Zhu
, Guoqiang Li, Jinshui Wang
:
Seenomaly: vision-based linting of GUI animation effects against design-don't guidelines. 1286-1297 - Yan Cai

, Ruijie Meng, Jens Palsberg:
Low-overhead deadlock prediction. 1298-1309
Android
- Sen Chen, Lingling Fan, Guozhu Meng, Ting Su, Minhui Xue, Yinxing Xue, Yang Liu

, Lihua Xu:
An empirical assessment of security risks of global Android banking apps. 1310-1322 - Abdulaziz Alshayban, Iftekhar Ahmed, Sam Malek:

Accessibility issues in Android apps: state of affairs, sentiments, and ways forward. 1323-1334 - Shin Hwei Tan, Ziqiang Li:

Collaborative bug finding for Android apps. 1335-1347
Code summarization and analysis
- Profir-Petru Pârtachi

, Santanu Kumar Dash
, Christoph Treude
, Earl T. Barr
:
POSIT: simultaneously tagging natural and programming languages. 1348-1358 - Juan Zhai

, Xiangzhe Xu, Yu Shi, Guanhong Tao, Minxue Pan, Shiqing Ma, Lei Xu, Weifeng Zhang, Lin Tan, Xiangyu Zhang:
CPC: automatically classifying and propagating natural language comments via program analysis. 1359-1371 - Son Nguyen, Hung Phan, Trinh Le, Tien N. Nguyen:

Suggesting natural method names to check name consistencies. 1372-1384 - Jian Zhang, Xu Wang, Hongyu Zhang

, Hailong Sun, Xudong Liu:
Retrieval-based neural source code summarization. 1385-1397
Machine learning and models
- Cody Watson, Michele Tufano, Kevin Moran, Gabriele Bavota

, Denys Poshyvanyk
:
On learning meaningful assert statements for unit test cases. 1398-1409 - Sameer Reddy, Caroline Lemieux, Rohan Padhye

, Koushik Sen:
Quickly generating diverse valid test inputs with reinforcement learning. 1410-1421
Meta studies
- He Zhang, Xin Zhou, Xin Huang, Huang Huang

, Muhammad Ali Babar:
An evidence-based inquiry into the use of grey literature in software engineering. 1422-1434
Performance
- Zishuo Ding, Jinfu Chen

, Weiyi Shang:
Towards the use of the readily available tests from the release pipeline as performance tests: are we there yet? 1435-1446
Software verification
- Martin Kellogg

, Manli Ran, Manu Sridharan
, Martin Schäf
, Michael D. Ernst:
Verifying object construction. 1447-1458 - Alexandra Bugariu, Peter Müller:

Automatically testing string solvers. 1459-1470
Testing 2
- Wing Lam, Kivanç Muslu, Hitesh Sajnani, Suresh Thummalapenta:

A study on the lifecycle of flaky tests. 1471-1482 - Dongjie Chen, Yanyan Jiang, Chang Xu, Xiaoxing Ma, Jian Lu:

Testing file system implementations on layered models. 1483-1495
Code generation
- Djamel Eddine Khelladi, Benoît Combemale, Mathieu Acher, Olivier Barais

, Jean-Marc Jézéquel
:
Co-evolving code with evolving metamodels. 1496-1508
Dependencies and configuration
- Michael Lienhardt, Ferruccio Damiani, Einar Broch Johnsen, Jacopo Mauro

:
Lazy product discovery in huge configuration spaces. 1509-1521 - Clay Stevens

, Hamid Bagheri:
Reducing run-time adaptation space via analysis of possible utility bounds. 1522-1534
Recommendations
- Junjie Wang, Ye Yang, Song Wang, Yuanzhe Hu, Dandan Wang, Qing Wang:

Context-aware in-process crowdworker recommendation. 1535-1546
Security
- Bingchang Liu

, Guozhu Meng, Wei Zou, Qi Gong, Feng Li, Min Lin, Dandan Sun, Wei Huo, Chao Zhang:
A large-scale empirical study on vulnerability distribution within projects and the lessons learned. 1547-1559 - Yude Bai, Zhenchang Xing, Xiaohong Li, Zhiyong Feng, Duoyuan Ma:

Unsuccessful story about few shot malware family classification and siamese network to the rescue. 1560-1571 - Xueling Zhang, Xiaoyin Wang

, Rocky Slavin
, Travis D. Breaux, Jianwei Niu:
How does misconfiguration of analytic services compromise mobile privacy? 1572-1583
Stack overflow
- Alex Cummaudo

, Rajesh Vasa, Scott Barnett, John C. Grundy
, Mohamed Abdelrazek
:
Interpreting cloud computer vision pain-points: a mining study of stack overflow. 1584-1596

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














