


default search action
IEEE Computer, Volume 44
Volume 44, Number 1, January 2011
- Sorel Reisman

:
Planning for an Inevitable Future. 6-8 - Ron Vetter:

Print, Mobile, and Online. 9-11 - David Alan Grier:

The Migration to the Middle. 12-14 - George Lawton:

3D Displays without Glasses: Coming to a Screen near You. 17-19 - Linda Dailey Paulson:

Scanning the Future with New Barcodes. 20-23 - Geetha Thiagarajan, Venkatesh Sarangan, Ramasubramanian Suriyanarayanan, Pragathichitra Sethuraman, Anand Sivasubramaniam, Avinash Yegyanarayanan:

Automating a Building's Carbon Management. 24-30 - Samuel H. Fuller, Lynette I. Millett:

Computing Performance: Game Over or Next Level? 31-38 - Parthasarathy Ranganathan:

From Microprocessors to Nanostores: Rethinking Data-Centric Systems. 39-48 - Daniel S. Stevenson, Robert O. Conn:

Bridging the Interconnection Density Gap for Exascale Computation. 49-57 - Roy Sterritt

:
Apoptotic Computing: Programmed Death by Default for Computer-Based Systems. 59-65 - Anna Cinzia Squicciarini

, S. D. Rajasekaran, Marco Casassa Mont
:
Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks. 66-73 - Bill Tomlinson

, Michael Six Silberman, Jim White:
Can More Efficient IT Be Worse for the Environment? 87-89 - Neil M. Ferguson:

Achieving Synergy in the Industry-Academia Relationship. 90-92 - John Riedl:

The Promise and Peril of Social Computing. 93-95 - Karl Ricanek Jr.:

Dissecting the Human Identity. 96-97 - W. Neville Holmes:

Computers and Their Users. 100-99
Volume 44, Number 2, February 2011
- David Alan Grier:

A Very Bad Idea. 6-8 - Sixto Ortiz:

Is Peer-to-Peer on the Decline? 11-13 - L. D. Paulson:

IBM Project Proposes Using Light to Make Chips Faster. 14-17 - Shamik Das:

Transitioning from Microelectronics to Nanoelectronics [Guest editor's introduction]. 18-19 - Greg Snider, Rick Amerson, Dick Carter, Hisham Abdalla, Muhammad Shakeel Qureshi, Jasmin Léveillé, Massimiliano Versace, Heather Ames, Sean Patrick, Ben Chandler, Anatoli Gorchetchnikov, Ennio Mingolla

:
From Synapses to Circuitry: Using Memristive Memory to Explore the Electronic Brain. 21-28 - Daniel Schinke, Neil Di Spigna, M. Shiveshwarkar, Paul D. Franzon

:
Computing with Novel Floating-Gate Devices. 29-36 - André DeHon, Benjamin Gojman:

Crystals and Snowflakes: Building Computation from Nanowire Crossbars. 37-45 - Wenjing Rao, Chengmo Yang, Ramesh Karri

, Alex Orailoglu:
Toward Future Systems with Nanoscale Devices: Overcoming the Reliability Challenge. 46-53 - J. Yan, Ahmad Salah El Ahmad:

Captcha Robustness: A Security Engineering Perspective. 54-60 - Richard J. Welke, Rudy Hirschheim, Andrew Schwarz:

Service-Oriented Architecture Maturity. 61-67 - Bob Ward:

Tom Williams Wins TTTC Award. 74-76 - Bob Ward:

Call and Calendar. 77-78 - Phillip A. Laplante, George F. Hurlburt

, Keith W. Miller, Jeffrey M. Voas:
Certainty through Uncertainty? 79-81 - Ina Schaefer, Reiner Hähnle

:
Formal Methods in Software Product Line Engineering. 82-85 - Albrecht Schmidt

, Marc Langheinrich
, Kristian Kersting:
Perception beyond the Here and Now. 86-88 - Ann E. Kelley Sobel:

Academic Misconduct in the Early 21st Century. 89-90 - Kelvin Sung:

Recent Videogame Console Technologies. 91-93 - Robert Fabian:

Computing Professionals. 96-95
Volume 44, Number 3, March 2011
- David Alan Grier:

The Voice of Wisdom. 8-10 - George Lawton:

4G: Engineering versus Marketing. 14-16 - L. D. Paulson:

Accessing the Internet via Overhead Lights. 18-21 - Savitha Srinivasan, Vladimir Getov

:
Navigating the Cloud Computing Landscape - Technologies, Services, and Adopters. 22-23 - B. Narasimhan, R. Nichols:

State of Cloud Applications and Platforms: The Cloud Adopters' View. 24-28 - Y. Khalidi:

Building a Cloud Computing Platform for New Possibilities. 29-34 - Prith Banerjee, Rich Friedrich, Cullen E. Bash

, Patrick Goldsack, Bernardo A. Huberman, John Manley, Chandrakant D. Patel, Parthasarathy Ranganathan, Alistair C. Veitch:
Everything as a Service: Powering the New Information Economy. 36-43 - Benny Rochwerger, David Breitgand

, Amir Epstein, David Hadas, Irit Loy, Kenneth Nagin, Johan Tordsson, Carmelo Ragusa, Massimo Villari
, Stuart Clayman, Eliezer Levy, A. Maraschini, Philippe Massonet
, H. Muñoz, Giovanni Toffetti
:
Reservoir - When One Cloud Is Not Enough. 44-51 - E. Olden:

Architecting a Cloud-Scale Identity Fabric. 52-59 - R. Vasan:

A Venture Perspective on Cloud Computing. 60-62 - Orathai Sukwong, Hyong S. Kim, James C. Hoe:

Commercial Antivirus Software Effectiveness: An Empirical Study. 63-70 - Bob Ward:

Chen, Hescott Win Society Education Awards. 71-73 - P. Jonathon Phillips:

Improving Face Recognition Technology. 84-86 - Shyong K. Lam, John Riedl:

The Past, Present, and Future of Wikipedia. 87-90 - Kirk W. Cameron

:
Computing's Role in Resource Accounting. 91-92 - Peter J. Denning, W. Neville Holmes:

Computer Science: An Interview. 96-95
Volume 44, Number 4, April 2011
- David Alan Grier, Erin Dian Dumbacher:

Where Are You From? 8-10 - Sixto Ortiz:

Chipmakers ARM for Battle in Traditional Computing Market. 14-17 - Linda Dailey Paulson:

Some Users Find the Speed of Light Too Slow for Their Networks. 18-21 - Sasu Tarkoma

, Eemil Lagerspetz
:
Arching over the Mobile Computing Chasm: Platforms and Runtimes. 22-28 - Steven Fontana:

Technology Development as an Alternative to Traditional Technology Transfer Models. 30-36 - Thomas Miller III, Stephen Walsh, Seth Hollar, Elaine Rideout, Beryl Pittman:

Engineering and Innovation: An Immersive Start-up Experience. 38-46 - Ann Q. Gates, Fernando Naveda, Fanny Klett, Miguel Alonso, Rodrigo Romero, Dina Grewal:

Cultivating Entrepreneurial Thinking through IEEE-CS Student Chapters. 48-55 - Alberto Savoia, Patrick Copeland:

Entrepreneurial Innovation at Google. 56-61 - Toby Myers, R. Geoff Dromey, Peter Fritzson:

Comodeling: From Requirements to an Integrated Software/Hardware Model. 62-70 - Bob Ward:

Akyildiz Wins W. Wallace McDowell Award. 71-73 - Antonio Krüger

, Johannes Schöning
, Patrick Olivier
:
How Computing Will Change the Face of Retail. 84-87 - Hans Vandierendonck

, Tom Mens
:
Averting the Next Software Crisis. 88-90 - Thomas M. Chen

, Saeed Abu-Nimeh:
Lessons from Stuxnet. 91-93 - Tommer Leyvand, Casey Meekhof, Yichen Wei, Jian Sun, Baining Guo:

Kinect Identity: Technology and Experience. 94-96 - James J. Sluss

:
Engineering Education Activities in Electric Energy Systems. 97-98 - Jieping Ye, Teresa Wu, Jing Li, Kewei Chen

:
Machine Learning Approaches for the Neuroimaging Study of Alzheimer's Disease. 99-101 - Dejan S. Milojicic

, Rich Wolski:
Eucalyptus: Delivering a Private Cloud. 102-104 - Chris Morris

, Kai A. Olsen:
Democracy and Technology. 108-107
Volume 44, Number 5, May 2011
- Bob Ward:

Computer Highlights Society Magazines. 4-5 - David Alan Grier:

Not for All Markets. 6-8 - Linda World:

Forecasting in Geologic Time: The Tohoku Quake and Tsunami. 11-13 - Lourdes Moreno, Paloma Martínez, Belén Ruíz

, Ana Iglesias
:
Toward an Equal Opportunity Web: Applications, Standards, and Tools that Increase Accessibility. 18-26 - Bill N. Schilit:

Mobile Computing: Looking to the Future. 28-29 - Tommi Mikkonen, Antero Taivalsaari

:
Reports of the Web's Death Are Greatly Exaggerated. 30-36 - Anna Spagnolli, Nicola Corradi, Luciano Gamberini, Eve E. Hoggan

, Giulio Jacucci
, Cecilia Katzeff, Loove Broms, Li Jönsson:
Eco-Feedback on the Go: Motivating Energy Awareness. 38-45 - J. Antonio García-Macías, Jorge Alvarez-Lozano, Paul Estrada, Edgardo Avilés-López

:
Browsing the Internet of Things with Sentient Visors. 46-52 - Raja Bose, Jörg Brakensiek, Keun-Young Park, Jonathan Lester:

Morphing Smartphones into Automotive Application Platforms. 53-61 - Nenad Medvidovic, Hossein Tajalli, Joshua Garcia

, Ivo Krka, Yuriy Brun
, George Edwards:
Engineering Heterogeneous Robotics Systems: A Software Architecture-Based Approach. 62-71 - Bob Ward:

Grid Pioneer Foster Named 2011 Kanai Award Winner. 83-85 - Christopher L. Huntley:

The Developer's Perspective. 88-90 - Parthasarathy Ranganathan, Jichuan Chang:

Saving the World, One Server at a Time, Together. 91-93 - Anil K. Jain, Brendan Klare:

Matching Forensic Sketches and Mug Shots to Apprehend Criminals. 94-96 - Shilad Sen, John Riedl:

Folksonomy Formation. 97-101 - W. Neville Holmes:

Aspects of Data Obesity. 104-103
Volume 44, Number 6, June 2011
- Bob Ward:

Computer Highlights Society Magazines. 4-5 - David Alan Grier:

Dumb Grids and Smart Markets. 6-8 - Neal Leavitt:

Mobile Security: Finally a Serious Problem? 11-14 - Richard Honicky Jr.:

Understanding and Using Rendezvous to Enhance Mobile Crowdsourcing Applications. 22-28 - Sumi Helal

:
IT Footprinting - Groundwork for Future Smart Cities. 30-31 - Milind R. Naphade, Guruduth Banavar, Colin Harrison, Jurij R. Paraszczak, Robert J. T. Morris

:
Smarter Cities and Their Innovation Challenges. 32-39 - Kai Kuikkaniemi, Giulio Jacucci

, Marko Turpeinen
, Eve E. Hoggan
, Jörg Müller:
From Space to Stage: How Interactive Screens Will Change Urban Life. 40-47 - Felipe J. Gil-Castiñeira

, Enrique Costa-Montenegro
, Francisco J. González-Castaño
, Cristina López-Bravo
, Timo Ojala, Raja Bose:
Experiences inside the Ubiquitous Oulu Smart City. 48-55 - Jungwoo Lee

, Songhoon Baik, Choonhwa Lee:
Building an Integrated Service Management Platform for Ubiquitous Cities. 56-63 - Nilanjan Mukherjee, Janusz Rajski, Grzegorz Mrugalski, Artur Pogiel, Jerzy Tyszer

:
Ring Generator: An Ultimate Linear Feedback Shift Register. 64-71 - Dejan S. Milojicic

, Phillip A. Laplante:
Special Technical Communities. 84-88 - Bob Ward:

Kuck Receives Computer Pioneer Award. 89-91 - Bob Ward:

Call and Calendar. 92-93 - César Jesús Pardo Calvache

, Francisco J. Pino
, Félix García
, Mario Piattini
:
Harmonizing Quality Assurance Processes and Product Characteristics. 94-96 - John Solaro:

The Kinect Digital Out-of-Box Experience. 97-99 - Dan Breznitz, Michael Murphree

, Seymour E. Goodman:
Ubiquitous Data Collection: Rethinking Privacy Debates. 100-102 - Cynthia Rudin, Rebecca J. Passonneau, Axinia Radeva, Steve Ierome, Delfina Isaac:

21st-Century Data Miners Meet 19th-Century Electrical Cables. 103-105 - Jan Cuny:

Transforming Computer Science Education in High Schools. 107-109 - W. Neville Holmes:

Computing and the Step Function. 112-111
Volume 44, Number 7, July 2011
- Bob Ward:

Computer Highlights Society Magazines. 4-5 - David Alan Grier:

Experienced Hands. 6-8 - Brian M. Gaff, Catherine J. Toppin:

Ten Things to Know When Applying for a Patent. 11-12 - Sixto Ortiz Jr.:

The Problem with Cloud-Computing Standardization. 13-16 - Lee Garber:

News Briefs. 17-19 - Daqing Zhang, Bin Guo, Zhiwen Yu:

The Emergence of Social and Community Intelligence. 21-28 - Oliver Bimber, Carl K. Chang:

Computational Archaeology: Reviving the Past with Present-Day Tools. 30-31 - Michael Edmunds, Tony Freeth:

Using Computation to Decode the First Known Computer. 32-39 - Eugene Ch'ng

, Henry Chapman
, Vincent Gaffney
, Phil Murgatroyd
, Chris Gaffney
, Wolfgang Neubauer
:
From Sites to Landscapes: How Computing Technology Is Shaping Archaeological Practice. 40-46 - Roberto Scopigno, Marco Callieri, Paolo Cignoni

, Massimiliano Corsini
, Matteo Dellepiane, Federico Ponchio
, Guido Ranzuglia:
3D Models for Cultural Heritage: Beyond Plain Visualization. 48-55 - Vid Petrovic, Aaron Gidding

, Tom Wypych, Falko Kuester, Thomas A. DeFanti, Thomas E. Levy:
Dealing with Archaeology's Data Avalanche. 56-60 - Renju Li, Tao Luo, Hongbin Zha, Wei Lu:

Computer-Assisted Archaeological Line Drawing. 62-65 - Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang, Michel Wang, Ramesh Karri

, Jeyavijayan Rajendran, Kurt Rosenfeld:
Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges. 66-74 - Dirk Riehle

:
Controlling and Steering Open Source Projects. 93-96 - Richard P. Larrick, Kirk W. Cameron

:
Consumption-Based Metrics: From Autos to IT. 97-99 - Kevin W. Bowyer

:
What Surprises Do Identical Twins Have for Identity Science? 100-102 - Shyong K. Lam, John Riedl:

Expressing My Inner Gnome: Appearance and Behavior in Virtual Worlds. 103-105 - Kai A. Olsen:

Programmed Politeness. 108-107
Volume 44, Number 8, August 2011
- David Alan Grier:

The Chicken Bus. 6-8 - Brian M. Gaff, Catherine J. Toppin:

Ten Things to Know When Your Patent Application Is Pending. 11-12 - Steven J. Vaughan-Nichols:

OpenFlow: The Next Generation of the Network? 13-15 - David Bradley:

A Personal History of the IBM PC. 19-25 - Greg Goth:

IBM PC Retrospective: There Was Enough Right to Make It Work. 26-33 - Edward Bride:

The IBM Personal Computer: A Software-Driven Market. 34-39 - Gurbir Singh:

The IBM PC: The Silicon Story. 40-45 - Pieter Simoens

, Filip De Turck
, Bart Dhoedt, Piet Demeester:
Remote Display Solutions for Mobile Cloud Computing. 46-53 - Sungkap Yeo, Hsien-Hsin S. Lee:

Using Mathematical Modeling in Provisioning a Heterogeneous Cloud Computing Environment. 55-62 - Alain Chesnais, Sorel Reisman

:
From the Presidents of the IEEE Computer Society and ACM. 63-64 - John Bryant, Jason Bay:

Stereoscopic Technologies and Effects. 93-95 - Emil Vassev, Mike Hinchey

:
Knowledge Representation and Reasoning for Intelligent Software Systems. 96-99 - Manfred Tscheligi

, Alexander Meschtscherjakov
, David Wilfinger:
Interactive Computing on Wheels. 100-102 - Manish Marwah, Amip Shah, Cullen E. Bash

, Chandrakant D. Patel, Naren Ramakrishnan
:
Using Data Mining to Help Design Sustainable Products. 103-106 - Charles R. Severance:

Toward Developing an Education App Store. 107-109 - W. Neville Holmes:

The Cultural Potential of Keyboards. 112-111
Volume 44, Number 9, September 2011
- David Alan Grier:

Leisure Science. 6-8 - Brian M. Gaff, Catherine J. Toppin:

Ten Things to Know When Your Patent Application Is Allowed. 11-13 - Neal Leavitt:

IPv6: Any Closer to Adoption? 14-16 - Rolf Oppliger:

Security and Privacy in an Online World. 21-22 - Saeed Abu-Nimeh, Thomas M. Chen

, Omar A. Alzubi
:
Malicious and Spam Posts in Online Social Networks. 23-28 - Hossein Saiedian

, Dan Broyle:
Security Vulnerabilities in the Same-Origin Policy: Implications and Alternatives. 29-36 - Florian Kerschbaum, Axel Schröpfer, Antonio Zilli

, Richard Pibernik, Octavian Catrina
, Sebastiaan de Hoogh, Berry Schoenmakers, Stelvio Cimato
, Ernesto Damiani
:
Secure Collaborative Supply-Chain Management. 38-43 - Francisco Rocha, Salvador Abreu

, Miguel Correia
:
The Final Frontier: Confidentiality and Privacy in the Cloud. 44-50 - Rodrigo Roman, Pablo Najera, Javier López

:
Securing the Internet of Things. 51-58 - Siani Pearson

, Marco Casassa Mont
:
Sticky Policies: An Approach for Managing Privacy across Multiple Parties. 60-68 - Frederick Ryckbosch, Stijn Polfliet, Lieven Eeckhout:

Trends in Server Energy Proportionality. 69-72 - Vivek Menon

, Bharat Jayaraman, Venu Govindaraju:
The Three Rs of Cyberphysical Spaces. 73-79 - Henry Lieberman, Karthik Dinakar, Birago Jones:

Let's Gang Up on Cyberbullying. 93-96 - Suparna Bhattacharya

, Kanchi Gopinath, Karthick Rajamani, Manish Gupta:
Software Bloat and Wasted Joules: Is Modularity a Hurdle to Green Software? 97-101 - Christopher L. Huntley:

Onshore Mobile App Development: Successes and Challenges. 102-104 - Karl Ricanek Jr., Benjamin Barbour:

What Are Soft Biometrics and How Can They Be Used? 106-108 - Alessio Malizia

, Kai A. Olsen:
Has Everything Been Invented? On Software Development and the Future of Apps. 112-111
Volume 44, Number 10, October 2011
- David Alan Grier:

The Habit of Change. 6-8 - Sixto Ortiz Jr.:

Bringing 3D to the Small Screen. 11-13 - Carl K. Chang, David M. Weiss, Mike Hinchey

:
Where Software Engineering Meets ... 17-18 - Manfred Broy:

Can Practitioners Neglect Theory and Theoreticians Neglect Practice? 19-24 - Brian Fitzgerald

:
Open Source Software: Lessons from and for Software Engineering. 25-30 - Mark Harman

:
Software Engineering Meets Evolutionary Computation. 31-39 - Robyn R. Lutz

:
Software Engineering for Space Exploration. 41-46 - Stephen S. Yau, Ho G. An:

Software Engineering Meets Services and Cloud Computing. 47-53 - David Lorge Parnas:

Software Engineering - Missing in Action: A Personal Perspective. 54-58 - Jae Min Kim, Minyong Kim, Joonho Kong, Hyung Beom Jang, Sung Woo Chung:

Display Power Management That Detects User Intent. 60-66 - Justin Clark:

Object Digitization for Everyone. 81-83 - Min Chen, Anne E. Trefethen, René Bañares-Alcántara, Marina Jirotka, Bob Coecke, Thomas Ertl, Albrecht Schmidt

:
From Data Analysis and Visualization to Causality Discovery. 84-87 - Dirk Basten, Ali Sunyaev

:
Guidelines for Software Development Effort Estimation. 88-90 - Johan Bollen, Huina Mao:

Twitter Mood as a Stock Market Predictor. 91-94 - Mark Guzdial

:
Learning How to Prepare Computer Science High School Teachers. 95-97 - W. Neville Holmes:

Digital Machinery and Analog Brains. 100-99
Volume 44, Number 11, 2011
- David Alan Grier:

The Honest Give-and-Take. 6-8 - Lee Garber:

Turning on the Lights for Wireless Communications. 11-14 - Vladimir Getov

, Adolfy Hoisie, Harvey J. Wasserman:
Codesign for Systems and Applications: Charting the Path to Exascale Computing. 19-21 - John Shalf

, Daniel J. Quinlan, Curtis L. Janssen:
Rethinking Hardware-Software Codesign for Exascale Systems. 22-30 - Sayantan Sur, Sreeram Potluri, Krishna Chaitanya Kandalla, Hari Subramoni, Dhabaleswar K. Panda, Karen Tomko

:
Codesign for InfiniBand Clusters. 31-36 - Darren J. Kerbyson, Abhinav Vishnu, Kevin J. Barker

, Adolfy Hoisie
:
Codesign Challenges for Exascale Systems: Performance, Power, and Reliability. 37-43 - Dan Stanzione:

The iPlant Collaborative: Cyberinfrastructure to Feed the World. 44-52 - Bindu Padmanabhuni, Hee Beng Kuan Tan:

Defending against Buffer-Overflow Vulnerabilities. 53-60 - Giuseppe Nuti

, Mahnoosh Mirghaemi, Philip C. Treleaven, Chaiyakorn Yingsaeree:
Algorithmic Trading. 61-69 - Yung-Hsiang Lu, Qinru Qiu, Ali Raza Butt

, Kirk W. Cameron
:
End-to-End Energy Management. 75-77 - Arun Ross, Ayman Abaza:

Human Ear Recognition. 79-81 - José Luis Gómez Barroso

, Claudio Feijóo
, Ramón Compañó:
Opportunities in the Mobile Search Market. 83-85 - Shubu Mukherjee:

If Anything in This Life Is Certain, It's That You Can Kill Any ISA. 87-88 - Mikhil Masli:

Crowdsourcing Maps. 90-93 - Kai A. Olsen, Alessio Malizia

:
Automated Personal Assistants. 112-111
Volume 44, Number 12, 2011
- Sorel Reisman

:
Looking Back, Looking Forward. 8-10 - David Alan Grier:

Uncharted Territory. 12-14 - Neal Leavitt:

Internet Security under Attack: The Undermining of Digital Certificates. 17-20 - Jesse M. Heines, Gena R. Greher, S. Alex Ruthmann

, Brendan Reilly:
Two Approaches to Interdisciplinary Computing+Music Courses. 25-32 - Joe Geigel, Marla Schweppe, David Huynh, Brian Johnstone:

Adapting a Virtual World for Theatrical Performance. 33-38 - So Yamaoka, Lev Manovich, Jeremy Douglass, Falko Kuester:

Cultural Analytics in Large-Scale Visualization Environments. 39-48 - Ami Marowka:

Back to Thin-Core Massively Parallel Processors. 49-54 - Mary C. Lacity, Erran Carmel, Joseph W. Rottman:

Rural Outsourcing: Delivering ITO and BPO Services from Remote Domestic Locations. 55-62 - Laura Ferrari, Marco Mamei

:
Discovering City Dynamics through Sports Tracking Applications. 63-68 - Wil M. P. van der Aalst

:
Using Process Mining to Bridge the Gap between BI and BPM. 77-80 - Douglas Baldwin:

Is Computer Science a Relevant Academic Discipline for the 21st Century? 81-83 - Emi Tamaki

, Jun Rekimoto:
PossessedHand: Controlling Hand Movements with Computer Output. 84-86 - Alexander Hills:

Museums at Your Fingertips. 87-89 - Kim Schaffer

:
Are Password Requirements too Difficult? 90-92 - Rafael Capilla

, Jan Bosch:
The Promise and Challenge of Runtime Variability. 93-95 - W. Neville Holmes:

The Profession and Digital Technology. 116-115

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














