


default search action
IEEE Computer, Volume 45
Volume 45, Number 1, January 2012
- John W. Walz

:
Creating Our Future. 6-7 - Ron Vetter:

Digital Computer: The Next-Generation Flagship Publication. 8-9 - Charles R. Severance:

The Second-Order Effects of Steve Jobs. 10-11 - Brian M. Gaff, Ralph A. Loren, Gabriel J. McCool:

Intellectual Property, Part I. 14-16 - Lee Garber:

The Challenges of Securing the Virtualized Environment. 17-20 - Daniel A. Reed, James R. Larus, Dennis Gannon:

Imagining the Future: Thoughts on Computing. 25-30 - Alex Pentland:

Society's Nervous System: Building Effective Government, Energy, and Public Health Systems. 31-38 - Dawn Song, Elaine Shi, Ian Fischer, Umesh Shankar:

Cloud Data Protection for the Masses. 39-45 - Bjarne Stroustrup:

Software Development for Infrastructure. 47-58 - S. Sitharama Iyengar

, Xin Li
, Huanhuan Xu, Supratik Mukhopadhyay, N. Balakrishnan, Amit Sawant
, Puneeth Iyengar:
Toward More Precise Radiotherapy Treatment of Lung Tumors. 59-65 - Antonia Bertolino

, Guglielmo De Angelis, Sampo Kellomaki, Andrea Polini
:
Enhancing Service Federation Trustworthiness through Online Testing. 66-72 - Anil K. Jain, Soweon Yoon:

Automatic Detection of Altered Fingerprints. 79-82 - Doug Lyon:

The Java Tree Withers. 83-85 - Hal Berghel:

Identity Theft and Financial Fraud: Some Strangeness in the Proportions. 86-89 - Shyong K. Lam, John Riedl:

Are Our Online "Friends" Really Friends? 91-93 - Matthew E. Tolentino, Kirk W. Cameron

:
The Optimist, the Pessimist, and the Global Race to Exascale in 20 Megawatts. 95-97 - David Alan Grier, Erin Dian Dumbacher:

The Common Future. 108
Volume 45, Number 2, February 2012
- Charles R. Severance:

JavaScript: Designing a Language in 10 Days. 7-8 - Brian M. Gaff, Ralph A. Loren, Elizabeth A. Spinney:

Intellectual Property, Part II. 9-11 - George Lawton:

Cloud Streaming Brings Video to Mobile Devices. 14-16 - Lee Garber:

News Briefs. 17-19 - Simon S. Y. Shim:

Guest Editor's Introduction: The CAP Theorem's Growing Impact. 21-22 - Eric A. Brewer:

Pushing the CAP: Strategies for Consistency and Availability. 23-29 - Seth Gilbert

, Nancy A. Lynch:
Perspectives on the CAP Theorem. 30-36 - Daniel Abadi

:
Consistency Tradeoffs in Modern Distributed Database System Design: CAP is Only Part of the Story. 37-42 - Raghu Ramakrishnan:

CAP and Cloud Data Management. 43-49 - Kenneth P. Birman, Daniel A. Freedman, Qi Huang, Patrick Dowell:

Overcoming CAP with Consistent Soft-State Replication. 50-58 - Gary C. Kessler:

Information Security: New Threats or Familiar Problems? 59-65 - Nuno Antunes

, Marco Vieira
:
Defending against Web Application Vulnerabilities. 66-72 - Justin Jee, Lee Case Klippel, Mahmud Shahriar Hossain, Naren Ramakrishnan, Bud Mishra:

Discovering the Ebb and Flow of Ideas from Text Corpora. 73-77 - Christian Müller-Tomfelde, Morten Fjeld:

Tabletops: Interactive Horizontal Displays for Ubiquitous Computing. 78-81 - Angelos Stavrou

, Jeffrey M. Voas, Tom Karygiannis, Steve Quirolgico:
Building Security into Off-the-Shelf Smartphones. 82-84 - Jimmy Gambier:

An Independent Social Game Company's Perspective. 85-87 - Bo Brinkman

:
The Next Step for Ethics Education Is Enforcing the Code. 88-90 - Francis Hsu:

The Impossible and the Possible. 91-92 - Bob Ward:

Computer Society Names Winners of Three Key Awards. 93-95 - David Alan Grier, Erin Dian Dumbacher:

The New Internationalists. 112
Volume 45, Number 3, March 2012
- Charles R. Severance:

Monash Museum of Computing History. 6-7 - Brian M. Gaff, Thomas J. Smedinghoff, Socheth Sor:

Privacy and Data Security. 8-10 - Lee Garber:

Wi-Fi Races into a Faster Future. 13-16 - Lee Garber:

News Briefs. 18-20 - T. M. Murali:

Guest Editor's Introduction: Computationally Driven Experimental Biology. 22-23 - Michael B. Mayhew

, Xin Guo
, Steven B. Haase
, Alexander J. Hartemink:
Close Encounters of the Collaborative Kind. 24-30 - Mehmet Koyutürk

:
Using Protein Interaction Networks to Understand Complex Diseases. 31-38 - Fabio Vandin, Eli Upfal

, Benjamin J. Raphael:
Algorithms and Genome Sequencing: Identifying Driver Pathways in Cancer. 39-46 - Steven Skiena:

Redesigning Viral Genomes. 47-53 - Lwin Khin Shar

, Hee Beng Kuan Tan:
Defending against Cross-Site Scripting Attacks. 55-62 - Xiaojun Quan, Liu Wenyin, Wenyu Dou

, Hui Xiong, Yong Ge:
Link Graph Analysis for Business Site Selection. 64-69 - Hal Berghel:

WikiLeaks and the Matter of Private Manning. 70-73 - Kirk W. Cameron

, Rong Ge:
Generalizing Amdahl's Law for Power and Energy. 75-77 - Aaron Halfaker

, John Riedl:
Bots and Cyborgs: Wikipedia's Immune System. 79-82 - Cornelius Held, Julia Krumm, Petra Markel, Ralf P. Schenke:

Intelligent Video Surveillance. 83-84 - Bob Ward:

Call and Calendar. 88-89 - David Alan Grier, Erin Dian Dumbacher:

Free Agency. 104
Volume 45, Number 4, April 2012
- Charles R. Severance:

Discovering JavaScript Object Notation. 6-8 - Brian M. Gaff, Brian P. Murphy, Peter J. Cuomo:

Defending Against Patent Infringement. 9-12 - Sixto Ortiz Jr.:

New Approach Keeps Security in Context. 15-17 - Albrecht Schmidt

, Elizabeth F. Churchill:
Interaction Beyond the Keyboard. 21-24 - Jan B. F. van Erp, Fabien Lotte

, Michael Tangermann
:
Brain-Computer Interfaces: Beyond Medical Applications. 26-34 - Hans Gellersen

, Florian Block
:
Novel Interactions on the Keyboard. 36-40 - Andreas Riener

:
Gestural Interaction in Vehicular Applications. 42-47 - Michel Beaudouin-Lafon

, Stéphane Huot, Mathieu Nancel, Wendy E. Mackay, Emmanuel Pietriga
, Romain Primet, Julie Wagner, Olivier Chapuis
, Clément Pillias, James Eagan, Tony Gjerlufsen, Clemens Nylandsted Klokmose:
Multisurface Interaction in the WILD Room. 48-56 - Andrea Bianchi

, Ian Oakley
, Dong-Soo Kwon:
Open Sesame: Design Guidelines for Invisible Passwords. 58-65 - Kai-Hui Chang, Chris Browy:

Parallel Logic Simulation: Myth or Reality? 67-73 - Daniel M. Yellin, Yifat Yulevich, Alexander Pyasic, Avshalom Houri:

Optimized Interactive Processes. 74-81 - Gary Marsden, Edward Cutrell, Matt Jones

, Amit Anil Nanavati
, Nitendra Rajput:
Making Technology Invisible in the Developing World. 82-85 - David C. Hodge:

Increasing Tuition's Affordability. 86-88 - Brian Fitzgerald

:
Software Crisis 2.0. 89-91 - Anthony Patrick Melaragno, Damindra Bandara, Duminda Wijesekera, James Bret Michael:

Securing the ZigBee Protocol in the Smart Grid. 92-94 - Henry Tsai, Kelvin Sung:

Mobile Applications and Museum Visitation. 95-98 - David Alan Grier, Erin Dian Dumbacher:

Learning from the Best. 116
Volume 45, Number 5, May 2012
- Charles R. Severance:

Van Jacobson: Getting NSFNet off the Ground. 6-9 - Brian M. Gaff, Stephen G. Huggard, Gregory W. Carey:

Do I Need A Lawyer? If You Have to Ask, You Probably Do. 10-12 - Neal Leavitt:

Will Power Problems Curtail Processor Progress? 15-17 - Lee Garber:

News Briefs. 18-20 - Roy Want, Bill N. Schilit:

Interactive Digital Signage. 21-24 - Nick Taylor

, Keith Cheverst
:
Supporting Community Awareness with Interactive Displays. 26-32 - Adrian Friday

, Nigel Davies
, Christos Efstratiou:
Reflections on Long-Term Experiments with Public Displays. 34-41 - Timo Ojala, Vassilis Kostakos

, Hannu Kukka, Tommi Heikkinen, Tomas Lindén, Marko Jurmu
, Simo Hosio
, Fabio Kruger, Daniele Zanni:
Multipurpose Interactive Public Displays in the Wild: Three Years Later. 42-49 - Florian Alt

, Jörg Müller, Albrecht Schmidt
:
Advertising on Public Display Networks. 50-56 - Nigel Davies

, Marc Langheinrich
, Rui José
, Albrecht Schmidt
:
Open Display Networks: A Communications Medium for the 21st Century. 58-64 - Jamie Erbes, Hamid R. Motahari Nezhad, Sven Graupner:

The Future of Enterprise IT in the Cloud. 66-72 - Lars Hopland Nestås, Kjell Jørgen Hole:

Building and Maintaining Trust in Internet Voting. 74-80 - Tony Hey

, Dennis Gannon, Jim Pinkelman:
The Future of Data-Intensive Science. 81-82 - Zhiwei Xu:

Measuring Green IT in Society. 83-85 - Hal Berghel:

Breaking the Fourth Wall of Electronic Crime: Blame It on the Thespians. 86-88 - Alessio Malizia

, Kai A. Olsen:
Toward a New Search Paradigm-Can We Learn from Ants? 89-91 - Anil K. Jain, Rong Jin, Jung-Eun Lee:

Tattoo Image Matching and Retrieval. 93-96 - David Alan Grier, Erin Dian Dumbacher:

Teaching the Intangible. 116
Volume 45, Number 6, 2012
- Brian M. Gaff, Gregory J. Ploussios:

Open Source Software. 9-11 - Hong Mei, Gang Huang, Tao Xie:

Internetware: A Software Paradigm for Internet Computing. 26-31 - Mikio Aoyama:

Computing for the Next-Generation Automobile. 32-37 - Lijuan Wang, Yao Qian, Matthew R. Scott

, Gang Chen, Frank K. Soong:
Computer-Assisted Audiovisual Language Learning. 38-47 - William Cheng-Chung Chu, Chao-Tung Yang

, Chih-Wei Lu, Chih-Hung Chang
, Juei-Nan Chen, Pao-Ann Hsiung
, Hahn-Ming Lee:
Cloud Computing in Taiwan. 48-56 - Wing-Kin Sung

:
Bioinformatics Applications in Genomics. 57-63 - Zhenyu Zhang, W. K. Chan

, T. H. Tse
:
Fault Localization Based Only on Failed Runs. 64-71 - Jerome Israel:

Why the FBI Can't Build a Case Management System. 73-80 - Virginia N. L. Franqueira

, Roel J. Wieringa:
Role-Based Access Control in Retrospect. 81-88 - Jeff Munson, Phillip T. Pasqual:

Using Technology in Autism Research: The Promise and the Perils. 89-91 - Devon M. Simmonds:

The Programming Paradigm Evolution. 93-95 - Richard J. Lipton:

Might Turing Have Won a Turing Award? 96-97 - Robert K. Harle, Andy Hopper:

Sports Sensing: An Olympic Challenge for Computing. 98-101 - Rolf Oppliger, Bruno Wildhaber:

Common Misconceptions in Computer and Information Security. 102-104 - David Alan Grier, Erin Dian Dumbacher:

Controlling Share. 128
Volume 45, Number 7, 2012
- Charles R. Severance:

The Art of Teaching Computer Science: Niklaus Wirth. 8-10 - Brian M. Gaff, Richard N. Kimball, Jill M. Hanson:

Raising Capital: Where to Find It, How to Secure It, and Tips on What to Avoid. 11-13 - Michael Gervautz, Dieter Schmalstieg:

Anywhere Interfaces Using Handheld Augmented Reality. 26-31 - Mark R. Mine, Jeroen van Baar, Anselm Grundhöfer, David Rose, Bei Yang:

Projection-Based Augmented Reality in Disney Theme Parks. 32-40 - Ailsa Barry, Graham A. Thomas

, Paul Debenham, Jonathan Trout:
Augmented Reality in a Public Space: The Natural History Museum, London. 42-47 - Mark Billinghurst

, Andreas Dünser
:
Augmented Reality in the Classroom. 56-63 - Daniel E. O'Leary

:
Computer-Based Political Action: The Battle and Internet Blackout over PIPA. 64-72 - Jianyong Chen, Yang Wang, Xiaomin Wang:

On-Demand Security Architecture for Cloud Computing. 73-78 - Hal Berghel:

The OuijAmazon Desktop Metaphor. 80-82 - Eitan Frachtenberg

:
Holistic Datacenter Design in the Open Compute Project. 83-85 - Patrizio Campisi, Daria La Rocca

, Gaetano Scarano
:
EEG for Automatic Person Recognition. 87-89 - Anuradha Uduwage, Joseph A. Konstan

:
The Answer Is Out There: Online Q&A Sites. 90-92 - David Alan Grier, Erin Dian Dumbacher:

Repurposers. 116
Volume 45, Number 8, August 2012
- Charles R. Severance:

Teaching the World: Daphne Koller and Coursera. 8-9 - Brian M. Gaff, Kenneth Choy, Jamie Chan:

Doing Business in China. 11-13 - Lee Garber:

Converged Infrastructure: Addressing the Efficiency Challenge. 17-20 - Stephen W. Keckler, Steven K. Reinhardt:

Massively Multithreaded Computing Systems. 24-25 - John A. Stratton, Christopher I. Rodrigues, I-Jui Sung, Li-Wen Chang, Nasser Anssari, Geng (Daniel) Liu, Wen-mei W. Hwu, Nady Obeid:

Algorithm and Data Optimization Techniques for Scaling to Massively Threaded Systems. 26-32 - Stanley Tzeng, Brandon Lloyd, John D. Owens:

A GPU Task-Parallel Model with Dependency Resolution. 34-41 - Benedict R. Gaster, Lee W. Howes

:
Can GPGPU Programming Be Liberated from the Data-Parallel Bottleneck? 42-52 - Antonino Tumeo

, Simone Secchi, Oreste Villa:
Designing Next-Generation Massively Multithreaded Architectures for Irregular Applications. 53-61 - Stephen Davies, Stacey Aylor Seal, Jesse Hatfield:

Cinefile: A Category-Based Analytic Browser. 62-69 - Lorraine J. Haricombe, L. Ada Emmett

, Perry Alexander:
Open Access: An Evolving Alternative. 70-72 - Victor Ng-Thow-Hing, Sandra Y. Okita:

Playdates with Robots. 73-75 - Franco Zambonelli

:
Toward Sociotechnical Urban Superorganisms. 76-78 - Tom Mens

:
On the Complexity of Software Systems. 79-81 - William H. Boothby, Wolff Heintschel von Heinegg, James Bret Michael, Michael N. Schmitt, Thomas C. Wingfield:

When Is a Cyberattack a Use of Force or an Armed Attack? 82-84 - David Alan Grier, Erin Dian Dumbacher:

The Winner Takes It All. 120
Volume 45, Number 9, September 2012
- Charles R. Severance:

Bertrand Meyer: Software Engineering and the Eiffel Programming Language. 6-8 - Brian M. Gaff, Brian P. Murphy, Ralph A. Loren, Christine A. Dudzik, Lisa Swiszcz:

Patent Reform: New Tools for Challenging Patent Validity as of September 2012. 9-11 - Neal Leavitt:

Are Mobile Payments Ready to Cash in Yet? 15-18 - Kaushik R. Chowdhury

, Dave Cavalcanti, Mostafa El-Said, Tommaso Mazza
, Chittabrata Ghosh:
Modeling and Simulation of Smart and Green Computing Systems. 22-23 - Swades De

, Riya Singhal:
Toward Uninterrupted Operation of Wireless Sensor Networks. 24-30 - Prabhakar T. Venkata, S. N. Akshay Uttama Nambi, R. Venkatesha Prasad, Ignas G. Niemegeers:

Bond Graph Modeling for Energy-Harvesting Wireless Sensor Networks. 31-38 - Murat Kocaoglu

, Derya Malak, Özgür B. Akan:
Fundamentals of Green Communications and Computing: Modeling and Simulation. 40-46 - Sungkap Yeo, Hsien-Hsin S. Lee:

SimWare: A Holistic Warehouse-Scale Computer Simulator. 48-55 - Baris Aksanli

, Jagannathan Venkatesh, Tajana Simunic Rosing:
Using Datacenter Simulation to Evaluate Green Energy Integration. 56-64 - Mahinthan Chandramohan, Hee Beng Kuan Tan:

Detection of Mobile Malware in the Wild. 65-71 - Julian Ohrt, Volker Turau:

Cross-Platform Development Tools for Smartphone Applications. 72-79 - Xiaoqi Yan, Chi-Wing Fu

, Andrew J. Hanson:
Multitouching the Fourth Dimension. 80-88 - Bruce Nordman, Ken Christensen, Alan K. Meier:

Think Globally, Distribute Power Locally: The Promise of Nanogrids. 89-91 - Hal Berghel:

The Dumbing Down of SportPhishing. 92-94 - Karl Ricanek Jr., Chris Boehnen:

Facial Analytics: From Big Data to Law Enforcement. 95-97 - Cliff Lampe, Nicole B. Ellison:

Understanding Facebook: Social Computing Isn't 'Just' Social. 98-100 - Dejan S. Milojicic

, Martin F. Arlitt, Dorée Duncan Seligmann, George K. Thiruvathukal, Christian Timmerer:
Innovation Mashups: Academic Rigor Meets Social Networking Buzz. 101-105 - David Alan Grier, Erin Dian Dumbacher:

It's Complicated. 124
Volume 45, Number 10, October 2012
- Charles R. Severance:

The Apache Software Foundation: Brian Behlendorf. 8-9 - Brian M. Gaff, Karl P. Fryzel:

Starting a Business: Which Entity Structure Is Best for You? 10-12 - Lee Garber:

Using In-Memory Analytics to Quickly Crunch Big Data. 16-18 - Mike Hinchey

, Sooyong Park, Klaus Schmid
:
Building Dynamic Software Product Lines. 22-26 - Jan Bosch, Rafael Capilla

:
Dynamic Variability in Software-Intensive Embedded System Families. 28-35 - Nelly Bencomo, Svein O. Hallsteinsen, Eduardo Santana de Almeida:

A View of the Dynamic Software Product Line Landscape. 36-41 - Luciano Baresi

, Sam Guinea, Liliana Pasquale:
Service-Oriented Dynamic Software Product Lines. 42-48 - Jaejoon Lee

, Gerald Kotonya
, Daniel Robinson:
Engineering Service-Based Dynamic Software Product Lines. 49-55 - Pete Sawyer, Raúl Mazo, Daniel Diaz

, Camille Salinesi, Danny Hughes:
Using Constraint Programming to Manage Configurations in Self-Adaptive Systems. 56-63 - Mark Hedley, Jian (Andrew) Zhang

:
Accurate Wireless Localization in Sports. 64-70 - Moustafa AbdelBaky, Manish Parashar, Hyunjoo Kim, Kirk E. Jordan, Vipin Sachdeva

, James C. Sexton, Hani Jamjoom, Zon-Yin Shae, Gergina Pencheva, Reza Tavakoli, Mary F. Wheeler:
Enabling High-Performance Computing as a Service. 72-80 - Ann E. K. Sobel:

Should Everyone Go to College? 82-83 - James D. Hollan:

Activity-Enriched Computing: Capturing and Mining Activity Histories. 84-87 - Tim Boland, Paul E. Black

:
Juliet 1.1 C/C++ and Java Test Suite. 88-90 - Peter Gruenbaum:

Underrepresented Youth Creating Culturally Relevant Games. 91-93 - Krishna P. C. Madhavan, Mihaela Vorvoreanu, Niklas Elmqvist

, Aditya Johri, Naren Ramakrishnan
, G. Alan Wang
, Ann F. McKenna
:
Portfolio Mining. 95-99 - Bryan Reinicke:

It's 2012, So Why Am I Driving a 1972 Bug? 100-103 - David Alan Grier, Erin Dian Dumbacher:

The Computer in the Mirror. 128
Volume 45, Number 11, 2012
- Brian M. Gaff, Ralph A. Loren, Amy M. DeCloux:

A Brief Overview of the America Invents Act. 8-10 - Doug B. Fridsma:

Electronic Health Records: The HHS Perspective. 24-26 - Inmaculada Carrión Señor, José Luis Fernández-Alemán, Ambrosio Toval:

Personal Health Records: New Means to Safely Handle Health Data? 27-33 - Raik Kuhlisch, Ben Kraufmann, Hannes Restel

:
Electronic Case Records in a Box: Integrating Patient Data in Healthcare Networks. 34-40 - Sujoy Basu, Alan H. Karp, Jun Li, James Pruyne, Jerry Rolia, Sharad Singhal, Jaap Suermondt, Ram Swaminathan:

Fusion: Managing Healthcare Records at Cloud Scale. 42-49 - Kevin Brady, Ram D. Sriram, Bettijoyce Lide, Kathleen Roberts:

Testing the Nation's Healthcare Information Infrastructure: NIST Perspective. 50-57 - Barry Fagin, Dale Skrien:

Debugging on the Shoulders of Giants: Von Neumann's Programs 65 Years Later. 59-68 - Jason L. Dedrick, Jian Tang

, Kenneth L. Kraemer:
China's Indigenous Innovation Policy: Impact on Multi-national R&D. 70-78 - Edward Curry

, Bill Guyon, Charles Sheridan, Brian Donnellan
:
Sustainable IT: Challenges, Postures, and Outcomes. 79-81 - Hal Berghel:

Stratfor or Stratagainst. 82-85 - Anil K. Jain, Karthik Nandakumar:

Biometric Authentication: System Security and User Privacy. 87-92 - Frank Bi, Joseph A. Konstan

:
Customer Service 2.0: Where Social Computing Meets Customer Relations. 93-95
Volume 45, Number 12, December 2012
- John W. Walz

:
Implementing SP7: A Review of Progress in 2012. 6-9 - Charles R. Severance:

Vint Cerf: A Brief History of Packets. 10-12 - Brian M. Gaff, Timothy P. Van Dyck, Elizabeth A. Peters:

Employment Issues Confronting Start-Up Companies. 13-15 - Lee Garber:

Have Java's Security Issues Gotten out of Hand? 18-21 - Gary C. Kessler:

Advancing the Science of Digital Forensics. 25-27 - Joel Young, Kristina Foster, Simson L. Garfinkel

, Kevin D. Fairbanks
:
Distinct Sector Hashes for Target File Detection. 28-35 - Ray Hunt, Sherali Zeadally:

Network Forensics: An Analysis of Techniques, Tools, and Trends. 36-43 - Irfan Ahmed

, Sebastian Obermeier, Martin Naedele, Golden G. Richard III
:
SCADA Systems: Challenges for Forensic Investigators. 44-51 - Yong Wang, Kevin Streff, Sonell Raman:

Smartphone Security Challenges. 52-58 - Aaron Spear, Markus Levy, Mathieu Desnoyers:

Using Tracing to Solve the Multicore System Debug Problem. 60-64 - Rafael Moreno-Vozmediano

, Rubén S. Montero
, Ignacio Martín Llorente:
IaaS Cloud Architecture: From Virtualized Datacenters to Federated Cloud Infrastructures. 65-72 - Naren Sundaravaradan, Naren Ramakrishnan

, David A. Hanauer:
Factorizing Event Sequences. 73-75 - Manfred Lau

, Jun Mitani, Takeo Igarashi:
Digital Fabrication. 76-79 - Arnold Brown, Benjamin Apple, James Bret Michael, Michael A. Schumann:

Atomic-Level Security for Web Applications in a Cloud Environment. 80-83 - Emil Vassev, Mike Hinchey

:
Awareness in Software-Intensive Systems. 84-87 - Brad Hallisey:

Building a Virtual World: The Pipeline and Process. 90-92 - David Alan Grier, Erin Dian Dumbacher:

Work/Play. 116

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














