


default search action
Cluster Computing, Volume 21
Volume 21, Number 1, March 2018
- Ao Zhou, Shangguang Wang

, Qibo Sun, Jinglin Li, Qinglin Zhao, Fangchun Yang:
Support for spot virtual machine purchasing simulation. 1-13 - Su-Kyung Yoon, Young-Sun Youn, Min-Ho Son, Shin-Dug Kim:

Harmonized memory system for object-based cloud storage. 15-28 - L. Priya

, Sheila Anand:
Object recognition and 3D reconstruction of occluded objects using binocular stereo. 29-38 - R. Kishorekumar

, P. Deepa:
Automatic change detection using multiindex information map on high-resolution remote sensing images. 39-49 - Opinder Singh, Jatinder Singh, Ravinder Singh:

Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET. 51-63 - R. Rajamohamed, J. Manokaran

:
Improved credit card churn prediction based on rough clustering and supervised learning techniques. 65-77 - Ravi Subban

, N. Susitha, Dattatreya P. Mankame
:
Efficient iris recognition using Haralick features based extraction and fuzzy particle swarm optimization. 79-90 - Mukil Alagirisamy

, Chee-Onn Chow
:
An energy based cluster head selection unequal clustering algorithm with dual sink (ECH-DUAL) for continuous monitoring applications in wireless sensor networks. 91-103 - S. Angeline Julia, Paul Rodrigues:

A case study of HMS using CIPA. 105-113 - K. L. Neela

, V. Kavitha:
Enhancement of data confidentiality and secure data transaction in cloud storage environment. 115-124 - M. Sugadev, E. Logashanmugam

:
Corporate feed based metamaterial antenna for wireless applications. 125-134 - V. C. Maha Vishnu, M. Rajalakshmi

, Raju Nedunchezhian
:
Intelligent traffic video surveillance and accident detection system with dynamic traffic signal control. 135-147 - M. Veeresha, M. Sugumaran:

Hybrid spatial air index for processing queries in road networks. 149-161 - Dinesh Komarasamy

, Muthuswamy Vijayalakshmi
:
ScHeduling of jobs and Adaptive Resource Provisioning (SHARP) approach in cloud computing. 163-176 - A. Karthikeyan

, P. Senthil Kumar:
GALS implementation of randomly prioritized buffer-less routing architecture for 3D NoC. 177-187 - Gunasekaran Manogaran, Daphne Lopez:

A Gaussian process based big data processing framework in cluster computing environment. 189-204 - I. Nelson, Chinnamuthu Annadurai

, Rajakani Kalidoss, B. Partibane:
Mitigation of co-channel interferences in cognitive multi-carrier code division multiple access system by singular value decomposition techniques. 205-211 - Priyan Malarvizhi Kumar

, Usha Devi Gandhi
:
Energy efficient node selection algorithm based on node performance index and random waypoint mobility model in internet of vehicles. 213-227 - A. Ravi

, M. N. Giriprasad, P. V. Naganjaneyulu
:
SAR images denoising using a novel stochastic diffusion wavelet scheme. 229-237 - L. Javid Ali

, G. S. Anandhamala:
Actor-oriented approach for fault tolerance in e-commerce events. 239-250 - Yubin Yang, Zongtao Wei, Yong Xu, Haiwu He, Wei Wang:

DroidWard: An Effective Dynamic Analysis Method for Vetting Android Applications. 265-275 - Ping Li, Jin Li, Zhengan Huang, Chong-Zhi Gao, Wenbin Chen, Kai Chen:

Privacy-preserving outsourced classification in cloud computing. 277-286 - Yamin Wen, Zheng Gong, Zhengan Huang, Weidong Qiu:

A new efficient authorized private set intersection protocol from Schnorr signature and its applications. 287-297 - Wenjuan Li

, Weizhi Meng
, Lam-for Kwok
, Horace H. S. Ip:
Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks. 299-310 - Javid Ullah, Muhammad Arfan Jaffar:

Object and motion cues based collaborative approach for human activity localization and recognition in unconstrained videos. 311-322 - Sadia Arshid, Ayyaz Hussain, Asim Munir, Anum Nawaz, Sanneya Aziz:

Multi-stage binary patterns for facial expression recognition in real world. 323-331 - Shah Nazir

, Sara Shahzad
, Rodziah Binti Atan
, Haleem Farman
:
Estimation of software features based birthmark. 333-346 - E. Vijay Sekar, J. Anuradha

, Anshita Arya, Balamurugan Balusamy
, Victor I. Chang
:
A framework for smart traffic management using hybrid clustering techniques. 347-362 - Babar Shah

, Farkhund Iqbal
, Omar Alfandi
, Yoonsoo Kim, SeokYoon Kang, Ki-Il Kim
:
Fuzzy searching and routing in unstructured mobile peer-to-peer networks. 363-375 - Zahid Halim

, Uzma:
Optimizing the minimum spanning tree-based extracted clusters using evolution strategy. 377-391 - M. Arfan Jaffar, Abdul Basit Siddiqui

, Mubashar Mushtaq:
Ensemble classification of pulmonary nodules using gradient intensity feature descriptor and differential evolution. 393-407 - Toqeer Ali Syed

, Mohammad Nauman
, Salman Jan
:
Trust in IoT: dynamic remote attestation through efficient behavior capture. 409-421 - Adnan Amin

, Babar Shah
, Sajid Anwar
, Feras N. Al-Obeidat
, Asad Masood Khattak, Awais Adnan:
A prudent based approach for compromised user credentials detection. 423-441 - Fozia Mehboob

, Muhammad Abbas, Richard Jiang
, Abdul Rauf, Shoab Ahmad Khan, Saad Rehman:
Trajectory based vehicle counting and anomalous event visualization in smart cities. 443-452 - Zulfiqar Ali

, Waseem Shahzad:
EPACO: a novel ant colony optimization for emerging patterns based classification. 453-467 - Saleh M. Al-Saleem, Aftab Ali, Naveed Khan

:
Energy efficient key agreement scheme for ubiquitous and continuous remote healthcare systems using data mining technique. 469-480 - Abdul Shahid, Muhammad Tanvir Afzal

:
Section-wise indexing and retrieval of research articles. 481-492 - Khawaja Tehseen Ahmed, Muhammad Amjad Iqbal

:
Region and texture based effective image extraction. 493-502 - Naila Habib Khan

, Awais Adnan, Sadia Basar:
Urdu ligature recognition using multi-level agglomerative hierarchical clustering. 503-514 - Muhammad Abid, Asad Habib, Jawad Ashraf

, Abdul Shahid:
Urdu word sense disambiguation using machine learning approach. 515-522 - Haseeb Ahmad

, Ali Daud
, Licheng Wang, Ibrar Ahmad, Muhammad Hafeez
, Yixian Yang:
Quantifying team precedence in the game of cricket. 523-537 - Muhammad Nazir, Zahoor Jan, Muhammad Sajjad:

Facial expression recognition using histogram of oriented gradients based transformed features. 539-548 - Muhammad Sajjad, Adnan Shah, Zahoor Jan, Syed Inayat Ali Shah, Sung Wook Baik

, Irfan Mehmood
:
Facial appearance and texture feature-based robust facial expression recognition framework for sentiment knowledge discovery. 549-567 - Mohammad Nauman

, Tamleek Ali Tanveer, Sohail Khan
, Toqeer Ali Syed
:
Deep neural architectures for large scale android malware analysis. 569-588 - Bashir Hayat, Kyong Hoon Kim, Ki-Il Kim

:
A study on fuzzy logic based cloud computing. 589-603 - Afsheen Khalid, Fakhri Alam Khan

, Imran Ahmed:
Extracting reference text from citation contexts. 605-622 - Feras N. Al-Obeidat

, Abdallah Tubaishat, Anna Dillon
, Babar Shah
:
Analyzing students' performance using multi-criteria classification. 623-632 - Imran Ahmed

, Awais Adnan:
A robust algorithm for detecting people in overhead views. 633-654 - Muhammad Saad Razzaq, Fahad Maqbool, Maham Khalid, Iram Tariq, Aqsa Zahoor, Muhammad Ilyas:

Zombies Arena: fusion of reinforcement learning with augmented reality on NPC. 655-666 - Arif Jamal Malik, Farrukh Aslam Khan

:
A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection. 667-680 - R. Varatharajan, Gunasekaran Manogaran, Priyan Malarvizhi Kumar

, Revathi Sundarasekar
:
Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. 681-690 - Syed Hamad Shirazi, Arif Iqbal Umar, Nuhman ul Haq

, Saeeda Naz, Muhammad Imran Razzak
, Ahmad Zaib:
Extreme learning machine based microscopic red blood cells classification. 691-701 - Ibrar Ahmad

, Xiaojie Wang, Yuzhao Mao, Guang Liu, Haseeb Ahmad
, Rahat Ullah
:
Ligature based Urdu Nastaleeq sentence recognition using gated bidirectional long short term memory. 703-714 - Janeth López-Martínez, Alan Ramírez-Noriega

, Reyes Juárez-Ramírez, Guillermo Licea
, Samantha Jiménez
:
User stories complexity estimation using Bayesian networks for inexperienced developers. 715-728 - Abdul Rauf, Muhammad Ramzan

:
Parallel testing and coverage analysis for context-free applications. 729-739 - Muhammad Amin, Tamleek Ali Tanveer, Shakirullah Shah, Muhammad Abdullah, Muhammad Shafi:

DeepSIC: a deep model. 741-754 - R. Karthikeyan, P. Chitra

:
Novel power reduction framework for enhancing cloud computing by integrated GSNN scheduling method. 755-766 - D. Danalakshmi, S. Kannan, V. Thiruppathy Kesavan

:
Reactive power pricing using cloud service considering wind energy. 767-777 - (Withdrawn) Text mining and sustainable clusters from unstructured data in cloud computing. 779-788

- Zhanyu Liu:

Research on the Internet of Things and the development of smart city industry based on big data. 789-795 - Xiaoping Jiang, Chenghua Li, Jing Sun:

A modified K-means clustering for mining of multimedia databases based on dimensionality reduction and similarity measures. 797-804 - Shiqi Li, Mingming Wang, Shiping Liu, Yan Fu:

A novel pattern recognition technique based on group clustering computing and convex optimization for dimensionality reduction. 805-811 - Jianqin Zhang, Zhihong Chen, Yaqiong Liu, Mingyi Du, Weijun Yang, Liang Guo:

Space-time visualization analysis of bus passenger big data in Beijing. 813-825 - Zhengyan Cui, Taohua-Ouyang:

Research from the perspective of resource orchestration on digital ecosystem. 827-835 - ZheXi Yang, Wei Liu, Duo Xu:

Study of cloud service queuing model based on imbedding Markov chain perspective. 837-844 - Wei Xiong, Hejin Yuan, Lang You:

Prediction method of icing thickness of transmission line based on MEAO. 845-853 - Lanyong Zhang, Zewei Liu, Christos Papavassiliou, Sheng Liu:

Formation path control method for group coordination based on fuzzy logic control method. 855-868 - Yun Bai:

Industrial Internet of things over tactile Internet in the context of intelligent manufacturing. 869-877 - Yao-Hsu Tsai:

Simplified structural modeling of loyalty acquisition based on the conceptual clustering model. 879-892 - Xue Yang, Han-Qi Yu, Shi-Ming Sun, Wei Chen:

Using correspondence analysis to select training set for multi-modal information data. 893-905 - Xing Li, Jianmin He, BingJie Hou, Peiyang Zhang:

Exploring the innovation modes and evolution of the cloud-based service using the activity theory on the basis of big data. 907-922 - Qindong Sun, Yimin Qiao, Hongyi Zhou, Jiamin Wang, Nan Wang:

A loss prevention methodology for catering industry based on operation data analysis. 923-931 - Hui Li, Shu Zhang, Yun Hu, Jun Shi, Zhaoman Zhong:

Research of social recommendation based on social tag and trust relation. 933-943 - Hongtao Liu, Hongwei Guan, Jie Jian, Xueyan Liu, Ying Pei:

Clustering based on words distances. 945-953 - Fengjun Shang, Yalin Li, Xiaolin Deng, Dexiang He:

Android malware detection method based on naive Bayes and permission correlation algorithm. 955-966 - Xinyao Zou:

A four-gram unified event model for web mining. 967-975 - Jian Yang:

The artificial stock market model based on agent and scale-free network. 977-984 - Lirong Qiu, Jie Li:

Sentiment analysis of short texts in microblog based on ependency parsing. 985-995 - Min Xiao

, Sheng Cui, Ruixing Ming, Tao Jiang
:
Large deviations for the stochastic present value of aggregate net claims with infinite variance in the renewal risk model and its application in risk management. 997-1007 - Ming Qu, Yuchun Chang:

A collaboration centric approach for building the semantic knowledge network for knowledge advantage machine. 1009-1022 - Yanqing Han, Yuyan Lei, Guanju Chen:

Consumption experience model and identification based on IWOM and emotional computing. 1023-1031 - Akash Kumar Bhoi

, Karma Sonam Sherpa, Bidita Khandelwal:
Arrhythmia and ischemia classification and clustering using QRS-ST-T (QT) analysis of electrocardiogram. 1033-1044 - Hyesung Ji, Youdong Yun, Seolhwa Lee, Kuekyeng Kim, Heuiseok Lim:

An adaptable UI/UX considering user's cognitive and behavior information in distributed environment. 1045-1058 - Yoon-Su Jeong

, Seung-Soo Shin:
An IoT healthcare service model of a vehicle using implantable devices. 1059-1068 - Taegyu Kim, Jung-Hoon Cha, Jongchul Park:

Association between in-game performance parameters recorded via global positioning system and sports injuries to the lower extremities in elite female field hockey players. 1069-1078 - Doohwan Kim, Jang-Eui Hong, Ilchul Yoon, Sang-Ho Lee:

Code refactoring techniques for reducing energy consumption in embedded computing environment. 1079-1095 - SeolHwa Lee, Danial Hooshyar

, Hyesung Ji, Kichun Nam, Heuiseok Lim:
Mining biometric data to predict programmer expertise and task difficulty. 1097-1107 - Seon-Chil Kim, Sun-Youl Seo, Ji-Hyun Yu, Sang-Deok Lee, Kwang-Hwan Kim, Chang-Gyu Kim:

Development of radiation shield providing medical support for radioactive disaster in computer awareness analysis convergence-based. 1109-1116 - Meijing Li, Xiuming Yu, Keun Ho Ryu, Sanghyuk Lee, Nipon Theera-Umpon

:
Face recognition technology development with Gabor, PCA and SVM methodology under illumination normalization condition. 1117-1126 - GuoZhong Li, Jae-Rim Jung, Seong-Taek Park:

Factors enhancing mobile social networking friendship maintenance: a study of alumni community on Wechat. 1127-1138 - Hyun Yoo, Kyungyong Chung:

Heart rate variability based stress index service model using bio-sensor. 1139-1149 - Sungho Sim, Hanyong Choi:

A study on web services discovery system based on the internetof things user information. 1151-1160 - Hyung-Jin Mun

, Sunghyuck Hong, Jungpil Shin:
A novel secure and efficient hash function with extra padding against rainbow table attacks. 1161-1173 - Sang-Hyun Lee, Sang-Joon Lee:

Development of remote automatic panorama VR imaging rig systems using smartphones. 1175-1185 - Hyung-Jin Mun

, Sunghyuck Hong, Jungpil Shin:
Erratum to: A novel secure and efficient hash function with extra padding against rainbow table attacks. 1187
Volume 21, Number 2, June 2018
- Wai-Kong Lee

, Raphael C.-W. Phan
, Geong Sen Poh, Bok-Min Goi
:
SearchaStore: fast and secure searchable cloud services. 1189-1202 - Sukhpal Singh Gill

, Inderveer Chana, Maninder Singh
, Rajkumar Buyya
:
CHOPPER: an intelligent QoS-aware autonomic resource management approach for cloud computing. 1203-1241 - Vimalkumar Kumaresan

, Ramachandran Baskaran, P. Dhavachelvan:
AEGEUS++: an energy-aware online partition skew mitigation algorithm for mapreduce in cloud. 1243-1260 - Francisco Luna

, Alejandro Cervantes
, Pedro Isasi
, Juan F. Valenzuela-Valdés
:
Grid-enabled evolution strategies for large-scale home care crew scheduling. 1261-1273 - Zhuo Liu, Bin Wang, Weikuan Yu

:
HALO: a fast and durable disk write cache using phase change memory. 1275-1287 - Marcos Dias de Assunção

, Laurent Lefèvre:
Bare-metal reservation for cloud: an analysis of the trade off between reactivity and energy efficiency. 1289-1300 - Shubo Chen, Kejing He

, Lingcong You, Funan Lin:
Parallel multilayer particle collision detection method based on performance estimation. 1301-1309 - Nidhi Jain Kansal, Inderveer Chana:

An empirical evaluation of energy-aware load balancing technique for cloud data center. 1311-1329 - Chunlin Li, Jianhang Tang, Youlong Luo:

Distributed QoS-aware scheduling optimization for resource-intensive mobile application in hybrid cloud. 1331-1348 - Lin Li, Chee Shin Yeo

, Chia-Yu Hsu, Liang-Chih Yu, K. Robert Lai:
Agent-based fuzzy constraint-directed negotiation for service level agreements in cloud computing. 1349-1363 - Sumalatha Saleti

, R. B. V. Subramanyam:
A novel Bit Vector Product algorithm for mining frequent itemsets from large datasets using MapReduce framework. 1365-1380 - Safiye Ghasemi, Mohammad Reza Meybodi, Mehdi Dehghan Takht Fooladi, Amir Masoud Rahmani

:
A cost-aware mechanism for optimized resource provisioning in cloud computing. 1381-1394 - Ying Li

, Jing Zhang, Xiaojun Chen, Junhuai Li, JuLan Ding:
An accurate resource scheduling system for virtual machines based on CPU load monitoring and assessment. 1395-1410 - M. Thangavel

, P. Varalakshmi:
Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud. 1411-1437 - Chao Shen, Weiqin Tong, Kim-Kwang Raymond Choo

, Samina Kausar
:
Performance prediction of parallel computing models to analyze cloud-based big data applications. 1439-1454 - Omar Batarfi, Radwa El Shawi, Ayman G. Fayoumi

, Reza Nouri, Amin Beheshti
, Ahmed Barnawi, Sherif Sakr:
Correction To: Large scale graph processing systems: survey and an experimental evaluation. 1455
Volume 21, Number 3, September 2018
- Achal Kaushik

, Deo Prakash Vidyarthi:
A model for resource management in computational grid using sequential auction and bargaining procurement. 1457-1477 - Uras Tos

, Riad Mokadem
, Abdelkader Hameurlain, Tolga Ayav
, Sebnem Bora:
Ensuring performance and provider profit through data replication in cloud systems. 1479-1492 - Izzat Alsmadi

, Abdallah Khreishah
, Dianxiang Xu:
Network slicing to improve multicasting in HPC clusters. 1493-1506 - Kang-Wook Chon, Min-Soo Kim:

BIGMiner: a fast and scalable distributed frequent pattern miner for big data. 1507-1520 - Ching-Wen Chen, An Hsia, Yong-Wei Zhan, Tzong-Jye Liu:

Energy-efficient hybrid coherence protocol for multicore processors. 1521-1541 - Guo Zhou, Rui Wang

, Yongquan Zhou:
Flower pollination algorithm with runway balance strategy for the aircraft landing scheduling problem. 1543-1560 - Zhengyu Yang

, Yufeng Wang, Janki Bhimani, Chiu C. Tan, Ningfang Mi:
EAD: elasticity aware deduplication manager for datacenters with multi-tier storage systems. 1561-1579 - Xiaoyong Tang, Xiaoyi Liao, Jie Zheng, Xiaopan Yang:

Energy efficient job scheduling with workload prediction on cloud data center. 1581-1593 - Christopher Liao, Yonatan Klausner, David Starobinski, Eran Simhon, Azer Bestavros:

A case study of a shared/buy-in computing ecosystem. 1595-1606 - Haiou Jiang

, Haihong E, Meina Song:
Multi-prediction based scheduling for hybrid workloads in the cloud data center. 1607-1622 - Kanniga Devi Rangaswamy

, Murugaboopathi Gurusamy
, M. Muthukannan:
Load monitoring and system-traffic-aware live VM migration-based load balancing in cloud data center using graph theoretic solutions. 1623-1638 - Shimaa E. El-Sayyad, Ahmed I. Saleh, Hesham A. Ali:

A new semantic web service classification (SWSC) strategy. 1639-1665 - Altaf Hussain

, Muhammad Aleem
, Abid Khan
, Muhammad Azhar Iqbal, Muhammad Arshad Islam:
RALBA: a computation-aware load balancing scheduler for cloud computing. 1667-1680 - Robayet Nasim, Enrica Zola

, Andreas J. Kassler:
Robust optimization for energy-efficient virtual machine consolidation in modern datacenters. 1681-1709 - Reza Mohammadi Bahram Abadi, Amir Masoud Rahmani

, Sasan Hossein Alizadeh
:
Self-adaptive architecture for virtual machines consolidation based on probabilistic model evaluation of data centers in Cloud computing. 1711-1733
Volume 21, Number 4, December 2018
- Amjad Ullah, Jingpeng Li

, Yindong Shen, Amir Hussain
:
A control theoretical view of cloud elasticity: taxonomy, survey and challenges. 1735-1764 - K. Munivara Prasad, A. Rama Mohan Reddy, K. Venugopal Rao:

DEFAD: ensemble classifier for DDOS enabled flood attack defense in distributed network environment. 1765-1783 - Roktaek Lim

, Yeongha Lee, Raehyun Kim
, Jaeyoung Choi
:
An implementation of matrix-matrix multiplication on the Intel KNL processor with AVX-512. 1785-1795 - Hicham Ben Alla

, Said Ben Alla
, Abdellah Touhafi
, Abdellah Ezzati
:
A novel task scheduling approach based on dynamic queues and hybrid meta-heuristic algorithms for cloud computing environment. 1797-1820 - Mehrdad Almasi

, Mohammad Saniee Abadeh
:
A new MapReduce associative classifier based on a new storage format for large-scale imbalanced data. 1821-1847 - Huiying Hou, Jia Yu, Hanlin Zhang, Yan Xu, Rong Hao:

Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage. 1849-1863 - Nae Young Song, Hwajung Kim, Hyuck Han

, Heon Young Yeom:
Optimizing of metadata management in large-scale file systems. 1865-1879 - Mohammad Mahdi Tajiki

, Behzad Akbari, Mohammad Shojafar
, Seyed Hesomodding Ghasemi, Mahdi Latifi Barazandeh, Nader Mokari, Luca Chiaraviglio, Michael Zink
:
CECT: computationally efficient congestion-avoidance and traffic engineering in software-defined cloud data centers. 1881-1897 - Sergio Serrano-Iglesias

, Eduardo Gómez-Sánchez
, Miguel L. Bote-Lorenzo
, Juan I. Asensio-Pérez
, Manuel Rodríguez-Cayetano
:
A self-scalable distributed network simulation environment based on cloud computing. 1899-1915 - Taher Al-Shehari

, Sami Zhioua
:
An empirical study of web browsers' resistance to traffic analysis and website fingerprinting attacks. 1917-1931 - Anmin Fu

, Yiming Zhu, Guomin Yang
, Shui Yu
, Yan Yu:
Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server. 1933-1947 - Dzmitry Makatun

, Jérôme Lauret, Hana Rudová
:
Planning of distributed data production for High Energy and Nuclear Physics. 1949-1965 - Chamseddine Hamdeni, Tarek Hamrouni, Faouzi Ben Charrada:

Evaluation of site availability exploitation towards performance optimization in data grids. 1967-1980 - Benay Kumar Ray, Avirup Saha, Sarbani Roy

:
Migration cost and profit oriented cloud federation formation: hedonic coalition game based approach. 1981-1999 - Hatem M. Bahig

, Khaled A. AbdElbari:
A fast GPU-based hybrid algorithm for addition chains. 2001-2011 - Chunlin Li, Jianhang Tang, Youlong Luo:

Towards operational cost minimization for cloud bursting with deadline constraints in hybrid clouds. 2013-2029

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














