


default search action
Andriy V. Miranskyy
Person information
- affiliation: Toronto Metropolitan University, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c48]Lei Zhang, Andriy V. Miranskyy:
Automated Flakiness Detection in Quantum Software Bug Reports. QCE 2024: 179-181 - [c47]Andriy V. Miranskyy, Mushahid Khan, Udson C. Mendes:
Comparing Algorithms for Loading Classical Datasets into Quantum Memory. QCE 2024: 234-238 - [d1]Enrique Moguel
, Juan Manuel Murillo
, José García-Alonso
, Johanna Barzen
, Frank Leymann
, Shaukat Ali
, Tao Yue
, Paolo Arcaini
, Ricardo Pérez-Castillo
, Ignacio García Rodríguez de Guzmán
, Mario Piattini
, Antonio Ruiz-Cortés
, Antonio Brogi
, Jianjun Zhao
, Andriy V. Miranskyy
, Manuel Wimmer
:
Prospects for Quantum Software Engineering in the Next Decade - Supplementary material. Zenodo, 2024 - [i41]Juan Manuel Murillo, José García-Alonso, Enrique Moguel, Johanna Barzen, Frank Leymann, Shaukat Ali, Tao Yue, Paolo Arcaini, Ricardo Pérez-Castillo, Ignacio García Rodríguez de Guzmán, Mario Piattini, Antonio Ruiz-Cortés, Antonio Brogi
, Jianjun Zhao, Andriy V. Miranskyy, Manuel Wimmer:
Challenges of Quantum Software Engineering for the Next Decade: The Road Ahead. CoRR abs/2404.06825 (2024) - [i40]Andriy V. Miranskyy, Mushahid Khan, Udson C. Mendes:
Comparing Algorithms for Loading Classical Datasets into Quantum Memory. CoRR abs/2407.15745 (2024) - [i39]Andriy V. Miranskyy, Adam Sorrenti, Viral Thakar:
On Using Quasirandom Sequences in Machine Learning for Model Weight Initialization. CoRR abs/2408.02654 (2024) - [i38]Lei Zhang, Andriy V. Miranskyy:
Automated flakiness detection in quantum software bug reports. CoRR abs/2408.05331 (2024) - [i37]Sarah Sohana, William Pourmajidi, John Steinbacher, Andriy V. Miranskyy:
CloudHeatMap: Heatmap-Based Monitoring for Large-Scale Cloud Systems. CoRR abs/2410.21092 (2024) - [i36]Janakan Sivaloganathan, Ainaz Jamshidi, Andriy V. Miranskyy, Lei Zhang:
Automating Quantum Software Maintenance: Flakiness Detection and Root Cause Analysis. CoRR abs/2410.23578 (2024) - [i35]Mohammad Saiful Islam, Mohamed Sami Rakha, William Pourmajidi, Janakan Sivaloganathan, John Steinbacher, Andriy V. Miranskyy:
Anomaly Detection in Large-Scale Cloud Systems: An Industry Case and Dataset. CoRR abs/2411.09047 (2024) - 2023
- [j16]Lei Zhang
, Andriy V. Miranskyy
, Walid Rjaibi
, Greg Stager, Michael Gray, John Peck:
Making existing software quantum safe: A case study on IBM Db2. Inf. Softw. Technol. 161: 107249 (2023) - [j15]Lei Zhang
, Sean Howard, Tom Montpool, Jessica Moore, Krittika Mahajan, Andriy V. Miranskyy:
Automated data validation: An industrial experience report. J. Syst. Softw. 197: 111573 (2023) - [j14]Paolo Arcaini, Andriy V. Miranskyy:
Report of the Fourth International Workshop on Quantum Software Engineering (Q-SE 2023). ACM SIGSOFT Softw. Eng. Notes 48(4): 64-65 (2023) - [j13]William Pourmajidi, Lei Zhang, John Steinbacher, Tony Erwin, Andriy V. Miranskyy
:
Immutable Log Storage as a Service on Private and Public Blockchains. IEEE Trans. Serv. Comput. 16(1): 356-369 (2023) - [c46]Lei Zhang
, Mahsa Radnejad, Andriy V. Miranskyy:
Identifying Flakiness in Quantum Programs. ESEM 2023: 1-7 - [i34]Lei Zhang, Mahsa Radnejad, Andriy V. Miranskyy:
Identifying Flakiness in Quantum Programs. CoRR abs/2302.03256 (2023) - [i33]William Pourmajidi, Lei Zhang, John Steinbacher, Tony Erwin, Andriy V. Miranskyy:
A Reference Architecture for Observability and Compliance of Cloud Native Applications. CoRR abs/2302.11617 (2023) - [i32]Montgomery Gole, Williams Paul Nwadiugwu, Andriy V. Miranskyy:
On Sarcasm Detection with OpenAI GPT-based Models. CoRR abs/2312.04642 (2023) - 2022
- [c45]Andriy V. Miranskyy, Mushahid Khan, Jean Paul Latyr Faye, Udson C. Mendes:
Quantum computing for software engineering: prospects. QP4SE@ESEC/SIGSOFT FSE 2022: 22-25 - [c44]Andriy V. Miranskyy:
Using Quantum computers to speed up dynamic testing of software. QP4SE@ESEC/SIGSOFT FSE 2022: 26-31 - [i31]Mushahid Khan, Jean Paul Latyr Faye, Udson C. Mendes, Andriy V. Miranskyy:
EP-PQM: Efficient Parametric Probabilistic Quantum Memory with Fewer Qubits and Gates. CoRR abs/2201.07265 (2022) - [i30]Andriy V. Miranskyy, Mushahid Khan, Jean Paul Latyr Faye, Udson C. Mendes:
Quantum Computing for Software Engineering: Prospects. CoRR abs/2203.03575 (2022) - [i29]Andriy V. Miranskyy:
Using Quantum Computers to Speed Up Dynamic Testing of Software. CoRR abs/2209.04860 (2022) - 2021
- [j12]Shin Yoo, Aldeida Aleti, Burak Turhan, Leandro L. Minku, Andriy V. Miranskyy, Çetin Meriçli:
The 8th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering. ACM SIGSOFT Softw. Eng. Notes 46(1): 23-24 (2021) - [j11]Lei Zhang
, Andriy V. Miranskyy
, Walid Rjaibi
:
Quantum Advantage and the Y2K Bug: A Comparison. IEEE Softw. 38(2): 80-87 (2021) - [c43]Jared Rand, Andriy V. Miranskyy:
On Automatic Parsing of Log Records. ICSE (NIER) 2021: 41-45 - [c42]Mohammad Saiful Islam, William Pourmajidi, Lei Zhang
, John Steinbacher, Tony Erwin, Andriy V. Miranskyy:
Anomaly Detection in a Large-Scale Cloud Platform. ICSE (SEIP) 2021: 150-159 - [c41]Janusan Baskararajah, Lei Zhang
, Andriy V. Miranskyy:
Term interrelations and trends in software engineering. ESEC/SIGSOFT FSE 2021: 1471-1474 - [i28]Jared Rand, Andriy V. Miranskyy:
On Automatic Parsing of Log Records. CoRR abs/2102.06320 (2021) - [i27]Andriy V. Miranskyy, Lei Zhang, Javad Doliskani:
On Testing and Debugging Quantum Software. CoRR abs/2103.09172 (2021) - [i26]Mushahid Khan, Andriy V. Miranskyy:
String Comparison on a Quantum Computer Using Hamming Distance. CoRR abs/2106.16173 (2021) - [i25]Janusan Baskararajah, Lei Zhang, Andriy V. Miranskyy:
Term Interrelations and Trends in Software Engineering. CoRR abs/2108.09529 (2021) - [i24]Lei Zhang, Andriy V. Miranskyy, Walid Rjaibi, Greg Stager, Michael Gray, John Peck:
Making Existing Software Quantum Safe: Lessons Learned. CoRR abs/2110.08661 (2021) - 2020
- [c40]Mohammad Saiful Islam, Andriy V. Miranskyy:
Anomaly Detection in Cloud Components. CLOUD 2020: 1-3 - [c39]Andriy V. Miranskyy, Lei Zhang
, Javad Doliskani:
Is your quantum program bug-free? ICSE (NIER) 2020: 29-32 - [i23]Andriy V. Miranskyy, Lei Zhang, Javad Doliskani:
Is Your Quantum Program Bug-Free? CoRR abs/2001.10870 (2020) - [i22]Mohammad Saiful Islam, Andriy V. Miranskyy:
Anomaly Detection in Cloud Components. CoRR abs/2005.08739 (2020) - [i21]William Pourmajidi, Lei Zhang, John Steinbacher, Tony Erwin, Andriy V. Miranskyy:
Immutable Log Storage as a Service on Private and Public Blockchains. CoRR abs/2009.07834 (2020) - [i20]Mohammad Saiful Islam, William Pourmajidi, Lei Zhang, John Steinbacher, Tony Erwin, Andriy V. Miranskyy:
Anomaly Detection in a Large-scale Cloud Platform. CoRR abs/2010.10966 (2020)
2010 – 2019
- 2019
- [j10]Lei Zhang
, Diego Lai, Andriy V. Miranskyy:
The impact of position errors on crowd simulation. Simul. Model. Pract. Theory 90: 45-63 (2019) - [c38]William Pourmajidi, Andriy V. Miranskyy, John Steinbacher, Tony Erwin, David Godwin:
Dogfooding: using IBM cloud services to monitor IBM cloud infrastructure. CASCON 2019: 344-353 - [c37]Nazim H. Madhavji, John Steinbacher, Andriy V. Miranskyy, Tony Erwin, Ahmed Ibrahim, Priyanka P. Naikade, William Pourmajidi, Lei Zhang, Yasmen Wahba:
Taming services for IBM cloud. CASCON 2019: 368-369 - [c36]Andriy V. Miranskyy, Lei Zhang
:
On testing quantum programs. ICSE (NIER) 2019: 57-60 - [c35]William Pourmajidi, Lei Zhang
, John Steinbacher, Tony Erwin, Andriy V. Miranskyy:
Immutable log storage as a service. ICSE (Companion Volume) 2019: 280-281 - [c34]Sravya Polisetty, Andriy V. Miranskyy, Ayse Basar
:
On Usefulness of the Deep-Learning-Based Bug Localization Models to Practitioners. PROMISE 2019: 16-25 - [i19]Lei Zhang, Sean Howard, Tom Montpool, Jessica Moore, Krittika Mahajan, Andriy V. Miranskyy:
RESTORE: Automated Regression Testing for Datasets. CoRR abs/1903.03676 (2019) - [i18]William Pourmajidi, Andriy V. Miranskyy, John Steinbacher, Tony Erwin, David Godwin:
Dogfooding: use IBM Cloud services to monitor IBM Cloud infrastructure. CoRR abs/1907.06094 (2019) - [i17]Sravya Polisetty, Andriy V. Miranskyy, Ayse Bener:
On Usefulness of the Deep-Learning-Based Bug Localization Models to Practitioners. CoRR abs/1907.08588 (2019) - [i16]Lei Zhang, Andriy V. Miranskyy, Walid Rjaibi:
Quantum Advantage and Y2K Bug: Comparison. CoRR abs/1907.10454 (2019) - [i15]William Pourmajidi, Lei Zhang, John Steinbacher, Tony Erwin, Andriy V. Miranskyy:
Immutable Log Storage as a Service. CoRR abs/1908.10944 (2019) - 2018
- [j9]Hongyu Zhang
, Andriy V. Miranskyy, Ayse Basar Bener
:
Editorial: Special Section on Best Papers of PROMISE 2016. Inf. Softw. Technol. 95: 295 (2018) - [j8]Andriy V. Miranskyy
, Zainab Al-zanbouri
, David Godwin, Ayse Basar Bener
:
Database engines: Evolution of greenness. J. Softw. Evol. Process. 30(4) (2018) - [j7]Mayy Habayeb
, Syed Shariyar Murtaza, Andriy V. Miranskyy
, Ayse Basar Bener
:
On the Use of Hidden Markov Model to Predict the Time to Fix Bugs. IEEE Trans. Software Eng. 44(12): 1224-1244 (2018) - [c33]William Pourmajidi, Andriy V. Miranskyy:
Logchain: Blockchain-Assisted Log Storage. IEEE CLOUD 2018: 978-982 - [c32]Sheik Hoque, Andriy V. Miranskyy:
Architecture for Analysis of Streaming Data. IC2E 2018: 263-269 - [c31]Sheik Hoque, Andriy V. Miranskyy:
Online and Offline Analysis of Streaming Data. ICSA Companion 2018: 68-71 - [c30]Mayy Habayeb, Syed Shariyar Murtaza, Andriy V. Miranskyy, Ayse Basar Bener
:
On the use of hidden Markov model to predict the time to fix bugs. ICSE 2018: 700 - [c29]Sedef Akinli Koçak, Gülfem Isiklar Alptekin, Andriy V. Miranskyy, Ayse Bener
, Enzo Cialini:
An Empirical Evaluation of Database Software Features on Energy Consumption. ICT4S 2018: 1-19 - [c28]Mujahid Sultan
, Andriy V. Miranskyy:
Ordering stakeholder viewpoint concerns for holistic enterprise architecture: the W6H framework. SAC 2018: 78-85 - [i14]Sheik Hoque, Andriy V. Miranskyy:
Online and Offline Analysis of Streaming Data. CoRR abs/1805.01021 (2018) - [i13]Sheik Hoque, Andriy V. Miranskyy:
Architecture for Analysis of Streaming Data. CoRR abs/1805.01025 (2018) - [i12]William Pourmajidi, Andriy V. Miranskyy:
Logchain: Blockchain-assisted Log Storage. CoRR abs/1805.08868 (2018) - [i11]William Pourmajidi, John Steinbacher, Tony Erwin, Andriy V. Miranskyy:
On Challenges of Cloud Monitoring. CoRR abs/1806.05914 (2018) - [i10]Lei Zhang, Diego Lai, Andriy V. Miranskyy:
The Impact of Position Errors on Crowd Simulation. CoRR abs/1810.11131 (2018) - [i9]Andriy V. Miranskyy, Lei Zhang:
On Testing Quantum Programs. CoRR abs/1812.09261 (2018) - 2017
- [c27]Parisa Lak, Can Kavaklioglu, Mefta Sadat, Martin Petitclerc, Graham J. Wills, Andriy V. Miranskyy, Ayse Basar Bener:
A probabilistic approach for modelling user preferences in recommender systems: a case study on IBM watson analytics. CASCON 2017: 38-47 - [c26]William Pourmajidi, John Steinbacher, Tony Erwin, Andriy V. Miranskyy:
On Challenges of Cloud Monitoring. CASCON 2017: 259-265 - [c25]Domenic Curro, Konstantinos G. Derpanis, Andriy V. Miranskyy:
Building Usage Profiles Using Deep Neural Nets. ICSE-NIER 2017: 43-46 - [c24]Mefta Sadat, Ayse Basar Bener
, Andriy V. Miranskyy:
Rediscovery datasets: connecting duplicate reports. MSR 2017: 527-530 - [i8]Andriy V. Miranskyy, Zainab Al-zanbouri, David Godwin, Ayse Basar Bener:
Database Engines: Evolution of Greenness. CoRR abs/1701.02344 (2017) - [i7]Domenic Curro, Konstantinos G. Derpanis, Andriy V. Miranskyy:
Building Usage Profiles Using Deep Neural Nets. CoRR abs/1702.07424 (2017) - [i6]Mefta Sadat, Ayse Basar Bener, Andriy V. Miranskyy:
Rediscovery Datasets: Connecting Duplicate Reports. CoRR abs/1703.06337 (2017) - 2016
- [j6]Andriy V. Miranskyy, Abdelwahab Hamou-Lhadj
, Enzo Cialini, Alf Larsson
:
Operational-Log Analysis for Big Data Systems: Challenges and Solutions. IEEE Softw. 33(2): 52-59 (2016) - [c23]Biruk K. Habtemariam, Andriy V. Miranskyy, Ali Miri, Saeed Samet
, Matthew Davison
:
Privacy Preserving Predictive Analytics with Smart Meters. BigData Congress 2016: 190-197 - [c22]Parisa Lak, Mefta Sadat, Carl Julien Barrelet, Martin Petitclerc, Andriy V. Miranskyy, Craig Statchuk, Ayse Basar Bener:
Preliminary investigation on user interaction with IBM watson analytics. CASCON 2016: 218-225 - [c21]Shirin Akbarinasaji, Behjat Soltanifar, Bora Çaglayan, Ayse Basar Bener
, Andriy V. Miranskyy, Asli Filiz, Bryan M. Kramer, Ayse Tosun
:
A metric suite proposal for logical dependency. WETSoM@ICSE 2016: 57-63 - [c20]Sokratis Tsakiltsidis, Andriy V. Miranskyy, Elie Mazzawi:
On Automatic Detection of Performance Bugs. ISSRE Workshops 2016: 132-139 - [i5]Sokratis Tsakiltsidis, Andriy V. Miranskyy, Elie Mazzawi:
Towards Automated Performance Bug Identification in Python. CoRR abs/1607.08506 (2016) - 2015
- [j5]Bora Caglayan, Ayse Tosun Misirli
, Ayse Basar Bener
, Andriy V. Miranskyy:
Predicting defective modules in different test phases. Softw. Qual. J. 23(2): 205-227 (2015) - [c19]Craig Statchuk, Nazim H. Madhavji, Andriy V. Miranskyy, Frank Dehne:
Taming a Tiger: software engineering in the era of big data & continuous development. CASCON 2015: 303-306 - [c18]Nazim H. Madhavji, Andriy V. Miranskyy, Kostas Kontogiannis:
Big Picture of Big Data Software Engineering: With Example Research Challenges. BIGDSE@ICSE 2015: 11-14 - [c17]Bora Caglayan, Burak Turhan
, Ayse Basar Bener
, Mayy Habayeb, Andriy V. Miranskyy, Enzo Cialini:
Merits of Organizational Metrics in Defect Prediction: An Industrial Replication. ICSE (2) 2015: 89-98 - [c16]Burak Turhan
, Ayse Basar Bener
, Rachel Harrison, Andriy V. Miranskyy, Çetin Meriçli, Leandro L. Minku
:
4th International Workshop on Realizing AI Synergies in Software Engineering (RAISE 2015). ICSE (2) 2015: 991-992 - [c15]Mayy Habayeb, Andriy V. Miranskyy, Syed Shariyar Murtaza, Leotis Buchanan, Ayse Bener
:
The Firefox Temporal Defect Dataset. MSR 2015: 498-501 - [c14]Mujahid Sultan
, Andriy V. Miranskyy:
Ordering interrogative questions for effective requirements engineering: The W6H pattern. RePa@RE 2015: 1-8 - [i4]Mujahid Sultan, Andriy V. Miranskyy:
Ordering Interrogative Questions for Effective Requirements Engineering: The W6H Pattern. CoRR abs/1508.01954 (2015) - [i3]Mujahid Sultan, Andriy V. Miranskyy:
Ordering stakeholder viewpoint concerns for holistic and incremental Enterprise Architecture: the W6H framework. CoRR abs/1509.07360 (2015) - 2014
- [j4]Ayse Basar Bener
, Maurizio Morisio, Andriy V. Miranskyy:
Green Software. IEEE Softw. 31(3): 36-39 (2014) - [j3]Ayse Basar Bener
, Andriy V. Miranskyy, Steve Raspudic:
Deploying and Provisioning Green Software. IEEE Softw. 31(3): 76-78 (2014) - [c13]Andriy V. Miranskyy, Bora Caglayan, Ayse Bener
, Enzo Cialini:
Effect of temporal collaboration network, maintenance activity, and experience on defect exposure. ESEM 2014: 27:1-27:8 - [c12]Bora Çaglayan, Ayse Basar Bener
, Andriy V. Miranskyy:
Factors affecting team evolution during software projects. CHASE 2014: 16-23 - [e2]Xavier Franch, Nazim H. Madhavji, P. C. Anitha, Andriy V. Miranskyy:
Proceedings of the 2nd International Workshop on Conducting Empirical Studies in Industry, CESI 2014, Hyderabad, India, June 2, 2014. ACM 2014, ISBN 978-1-4503-2843-2 [contents] - [e1]Burak Turhan, Ayse Basar Bener, Çetin Meriçli, Andriy V. Miranskyy, Leandro L. Minku:
3rd International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering, RAISE 2014, Hyderabad, India, June 3, 2014. ACM 2014, ISBN 978-1-4503-2846-3 [contents] - 2013
- [c11]Bora Caglayan, Ayse Basar Bener
, Andriy V. Miranskyy:
Emergence of developer teams in the collaboration network. CHASE@ICSE 2013: 33-40 - 2012
- [j2]Andriy V. Miranskyy, Matthew Davison
, R. Mark Reesor, Syed Shariyar Murtaza:
Using entropy measures for comparison of software traces. Inf. Sci. 203: 59-72 (2012) - [c10]Bora Caglayan, Ayse Tosun Misirli
, Andriy V. Miranskyy, Burak Turhan
, Ayse Bener
:
Factors characterizing reopened issues: a case study. PROMISE 2012: 1-10 - 2011
- [j1]Zude Li, Nazim H. Madhavji, Syed Shariyar Murtaza, Mechelle Gittens, Andriy V. Miranskyy, David Godwin, Enzo Cialini:
Characteristics of multiple-component defects and architectural hotspots: a large system case study. Empir. Softw. Eng. 16(5): 667-702 (2011) - [c9]Ayse Tosun Misirli
, Bora Çaglayan, Andriy V. Miranskyy, Ayse Bener
, Nuzio Ruffolo:
Different strokes for different folks: a case study on software metrics for different defect categories. WETSoM 2011: 45-51 - [c8]Colin A. Taylor, Andriy V. Miranskyy, Nazim H. Madhavji:
Request-implementation ratio as an indicator for requirements prioritisation imbalance. IWSPM 2011: 3-6 - [i2]Andriy V. Miranskyy, Matthew Davison, Mark Reesor:
Metrics of Risk Associated with Defects Rediscovery. CoRR abs/1107.4016 (2011) - 2010
- [c7]Bora Caglayan, Ayse Tosun
, Andriy V. Miranskyy, Ayse Basar Bener
, Nuzio Ruffolo:
Usage of multiple prediction models based on defect categories. PROMISE 2010: 8 - [i1]Andriy V. Miranskyy, Matthew Davison, Mark Reesor, Syed Shariyar Murtaza:
Using entropy measures for comparison of software traces. CoRR abs/1010.5537 (2010)
2000 – 2009
- 2009
- [c6]Zude Li, Mechelle Gittens, Syed Shariyar Murtaza, Nazim H. Madhavji, Andriy V. Miranskyy, David Godwin, Enzo Cialini:
Analysis of pervasive multiple-component defects in a large software system. ICSM 2009: 265-273 - [c5]Andriy V. Miranskyy, Enzo Cialini, David Godwin:
Selection of customers for operational and usage profiling. DBTest 2009 - 2008
- [c4]Andriy V. Miranskyy, Nazim H. Madhavji, Mechelle Gittens, Matthew Davison
, Mark Wilding, David Godwin, Colin A. Taylor:
SIFT: a scalable iterative-unfolding technique for filtering execution traces. CASCON 2008: 21 - [c3]Colin A. Taylor, Mechelle Gittens, Andriy V. Miranskyy:
A case study in database reliability: component types, usage profiles, and testing. DBTest 2008: 11 - 2007
- [c2]Andriy V. Miranskyy, Nazim H. Madhavji, Mechelle Gittens, Matthew Davison
, Mark Wilding, David Godwin:
An iterative, multi-level, and scalable approach to comparing execution traces. ESEC/SIGSOFT FSE 2007: 537-540 - 2005
- [c1]Andriy V. Miranskyy, Nazim H. Madhavji, Matthew Davison
, Mark Reesor:
Modelling Assumptions and Requirements in the Context of Project Risk. RE 2005: 471-472
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-30 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint