default search action
Yoshiaki Nemoto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [j38]Yoshiaki Nemoto, Kiyoshi Hamaguchi:
Resilient ICT research based on lessons learned from the Great East Japan Earthquake. IEEE Commun. Mag. 52(3): 38-43 (2014) - 2012
- [j37]Yuji Waizumi, Hiroshi Tsunoda, Masashi Tsuji, Yoshiaki Nemoto:
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy. J. Information Security 3(1): 18-24 (2012) - 2011
- [j36]Hiroshi Tsunoda, Hidehisa Nakayama, Kohei Ohta, Akihiro Suzuki, Hiroki Nishiyama, Ryoichi Nagatomi, Kazuo Hashimoto, Yuji Waizumi, Glenn Mansfield Keeni, Yoshiaki Nemoto:
Development of a WLAN based monitoring system for group activity measurement in real-time. J. Commun. Networks 13(2): 86-94 (2011) - 2010
- [j35]Takeshi Matsuda, Hidehisa Nakayama, Xuemin (Sherman) Shen, Yoshiaki Nemoto, Nei Kato:
Gateway Selection Protocol in Hybrid MANET Using DYMO Routing. Mob. Networks Appl. 15(2): 205-215 (2010) - [c53]Hiroki Nishiyama, Ahmed E. A. A. Abdulla, Nirwan Ansari, Yoshiaki Nemoto, Nei Kato:
HYMN to Improve the Longevity of Wireless Sensor Networks. GLOBECOM 2010: 1-5 - [c52]Yoshihiro Ikeda, Hiroki Nishiyama, Nirwan Ansari, Yoshiaki Nemoto, Nei Kato:
Extensions of VCP to Enhance the Performance in High BDP and Wireless Networks. WCNC 2010: 1-6
2000 – 2009
- 2009
- [j34]Xiaodong Lin, Rongxing Lu, Xuemin Shen, Yoshiaki Nemoto, Nei Kato:
Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE J. Sel. Areas Commun. 27(4): 365-378 (2009) - [j33]Kumar Simkhada, Tarik Taleb, Yuji Waizumi, Abbas Jamalipour, Yoshiaki Nemoto:
Combating against internet worms in large-scale networks: an autonomic signature-based solution. Secur. Commun. Networks 2(1): 11-28 (2009) - [j32]Tarik Taleb, Abbas Jamalipour, Yoshiaki Nemoto, Nei Kato:
DEMAPS: A Load-Transition-Based Mobility Management Scheme for an Efficient Selection of MAP in Mobile IPv6 Networks. IEEE Trans. Veh. Technol. 58(2): 954-965 (2009) - [j31]Hidehisa Nakayama, Satoshi Kurosawa, Abbas Jamalipour, Yoshiaki Nemoto, Nei Kato:
A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks. IEEE Trans. Veh. Technol. 58(5): 2471-2481 (2009) - [c51]Hiroshi Tsunoda, Takafumi Maruyama, Kohei Ohta, Yuji Waizumi, Glenn Mansfield Keeni, Yoshiaki Nemoto:
A Prioritized Retransmission Mechanism for Reliable and Efficient Delivery of Syslog Messages. CNSR 2009: 158-165 - [c50]Mostafa Fouda, Tarik Taleb, Mohsen Guizani, Yoshiaki Nemoto, Nei Kato:
On Supporting P2P-Based VoD Services over Mesh Overlay Networks. GLOBECOM 2009: 1-6 - [c49]Kenichi Kashibuchi, Yoshiaki Nemoto, Nei Kato:
Mitigating Performance Anomaly of TFRC in Multi-Rate IEEE 802.11 Wireless LANs. GLOBECOM 2009: 1-6 - [c48]Tarik Taleb, Zubair Md. Fadlullah, Tetsuya Takahashi, Ruhai Wang, Yoshiaki Nemoto, Nei Kato:
Tailoring ELB for Multi-Layered Satellite Networks. ICC 2009: 1-5 - 2008
- [j30]Hiroshi Tsunoda, Kohei Ohta, Atsunori Yamamoto, Nirwan Ansari, Yuji Waizumi, Yoshiaki Nemoto:
Detecting DRDoS attacks by a simple response packet confirmation mechanism. Comput. Commun. 31(14): 3299-3306 (2008) - [j29]Tarik Taleb, Kenichi Kashibuchi, Alessandro Leonardi, Sergio Palazzo, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto:
A Cross-Layer Approach for an Efficient Delivery of TCP/RTP-Based Multimedia Applications in Heterogeneous Wireless Networks. IEEE Trans. Veh. Technol. 57(6): 3801-3814 (2008) - [c47]Yoshifumi Saijo, Takahiro Iwamoto, Kazuto Kobayashi, Satoshi Yamaguchi, Hiroshi Tsunoda, Hidehisa Nakayama, Nei Kato, Yoshiaki Nemoto:
Ultra-Mobile Echo Network in Health Care System. CBMS 2008: 164-166 - [c46]Yutaro Sasaki, Hidehisa Nakayama, Nirwan Ansari, Yoshiaki Nemoto, Nei Kato:
A New Data Gathering Scheme Based on Set Cover Algorithm for Mobile Sinks in WSNs. GLOBECOM 2008: 725-729 - [c45]Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto:
A Reliable Network Identification Method Based on Transition Pattern of Payload Length. GLOBECOM 2008: 1915-1919 - [c44]Hiroshi Tsunoda, Kenjirou Arai, Yuji Waizumi, Nirwan Ansari, Yoshiaki Nemoto:
Detecting Pulsing Denial-of-Service Attacks Based on the Bandwidth Usage Condition. ICC 2008: 1670-1674 - [c43]Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Abbas Jamalipour, Nei Kato, Yoshiaki Nemoto:
Network Application Identification Using Transition Pattern of Payload Length. WCNC 2008: 2633-2638 - [c42]Takeshi Matsuda, Hidehisa Nakayama, Sherman X. Shen, Yoshiaki Nemoto, Nei Kato:
On Gateway Selection Protocol for DYMO-Based MANET. WiMob 2008: 32-37 - [c41]Kenji Miyao, Hidehisa Nakayama, Nirwan Ansari, Yoshiaki Nemoto, Nei Kato:
A reliable topology for efficient key distribution in ad-hoc networks. WOWMOM 2008: 1-5 - 2007
- [j28]Bounpadith Kannhavong, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, Yoshiaki Nemoto:
A study of a routing attack in OLSR-based mobile ad hoc networks. Int. J. Commun. Syst. 20(11): 1245-1261 (2007) - [j27]Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, Yoshiaki Nemoto:
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method. Int. J. Netw. Secur. 5(3): 338-346 (2007) - [j26]Tarik Taleb, Abdelhamid Nafaa, Liam Murphy, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto:
Toward Efficient Service-Level QoS Provisioning in Large-Scale 802.11-Based Networks. IEEE Netw. 21(5): 42-48 (2007) - [j25]Hitoshi Suzuki, Yuji Waizumi, Nei Kato, Yoshiaki Nemoto:
Discrimination of similar characters with a nonlinear compound discriminant function. Syst. Comput. Jpn. 38(11): 36-48 (2007) - [j24]Tarik Taleb, Ehssan Sakhaee, Abbas Jamalipour, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto:
A Stable Routing Protocol to Support ITS Services in VANET Networks. IEEE Trans. Veh. Technol. 56(6): 3337-3347 (2007) - [j23]Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, Abbas Jamalipour:
A survey of routing attacks in mobile ad hoc networks. IEEE Wirel. Commun. 14(5): 85-91 (2007) - [c40]Do Van Giang, Tarik Taleb, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto:
A Fair and Lifetime-Maximum Routing Algorithm for Wireless Sensor Networks. GLOBECOM 2007: 581-585 - [c39]Tarik Taleb, Juan Carlos Fernandez, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato:
A Bandwidth Aggregation-Aware QoS Negotiation Mechanism for Next-Generation Wireless Networks. GLOBECOM 2007: 1912-1916 - [c38]Tarik Taleb, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto:
A Dynamic Service Level Negotiation Mechanism for QoS Provisioning in NGEO Satellite Networks. ICC 2007: 1-6 - [c37]Tarik Taleb, Yuji Ikeda, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato:
An Application-Driven Mobility Management Scheme for Hierarchical Mobile IPv6 Networks. ICC 2007: 320-325 - [c36]Zubair Md. Fadlullah, Tarik Taleb, Nirwan Ansari, Kazuo Hashimoto, Yutaka Miyake, Yoshiaki Nemoto, Nei Kato:
Combating Against Attacks on Encrypted Protocols. ICC 2007: 1211-1216 - [c35]Yuji Waizumi, Masashi Tsuji, Hiroshi Tsunoda, Nirwan Ansari, Yoshiaki Nemoto:
Distributed Early Worm Detection Based on Payload Histograms. ICC 2007: 1404-1408 - [c34]Tarik Taleb, Zubair Md. Fadlullah, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato:
Tracing back attacks against encrypted protocols. IWCMC 2007: 121-126 - [c33]Juan Carlos Fernandez, Tarik Taleb, Nirwan Ansari, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato:
Dynamic QoS Negotiation for Next-Generation Wireless Communications Systems. WCNC 2007: 3227-3231 - [c32]Ehssan Sakhaee, Tarik Taleb, Abbas Jamalipour, Nei Kato, Yoshiaki Nemoto:
A Novel Scheme to Reduce Control Overhead and Increase Link Duration in Highly Mobile Ad Hoc Networks. WCNC 2007: 3972-3977 - [c31]Yuji Waizumi, Yohei Sato, Yoshiaki Nemoto:
A Network-based Anomaly Detection System using Multiple Network Features. WEBIST (1) 2007: 410-413 - [c30]Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto:
A Low Cost Worm Detection Technique based on Flow Payload Similarity. WEBIST (1) 2007: 414-417 - 2006
- [j22]Tarik Taleb, Abbas Jamalipour, Nei Kato, Yoshiaki Nemoto:
Theatre in the Sky: a ubiquitous broadband multimedia-on-demand service over a novel constellation composed of quasi-geostationary satellites. Int. J. Satell. Commun. Netw. 24(3): 215-227 (2006) - [j21]Hiroki Nishiyama, Tarik Taleb, Yoshiaki Nemoto, Abbas Jamalipour, Nei Kato:
Enhancements of T-REFWA to mitigate link error-related degradations in hybrid wired/wireless networks. J. Commun. Networks 8(4): 391-400 (2006) - [j20]Tarik Taleb, Nei Kato, Yoshiaki Nemoto:
REFWA: an efficient and fair congestion control scheme for LEO satellite networks. IEEE/ACM Trans. Netw. 14(5): 1031-1044 (2006) - [c29]Masaru Dobashi, Hidehisa Nakayama, Nei Kato, Yoshiaki Nemoto, Abbas Jamalipour:
Traitor Tracing Technology of Streaming Contents Delivery using Traffic Pattern in Wired/Wireless Environments. GLOBECOM 2006 - [c28]Bounpadith Kannhavong, Hidehisa Nakayama, Nei Kato, Yoshiaki Nemoto, Abbas Jamalipour:
A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks. GLOBECOM 2006 - [c27]Kumar Simkhada, Tarik Taleb, Yuji Waizumi, Abbas Jamalipour, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto:
A Multi-level Security Based Autonomic Parameter Selection Approach for an Effective and Early Detection of Internet Worms. GLOBECOM 2006 - [c26]Tarik Taleb, Daisuke Mashimo, Abbas Jamalipour, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato:
ELB: An Explicit Load Balancing Routing Protocol for Multi-Hop NGEO Satellite Constellations. GLOBECOM 2006 - [c25]Tarik Taleb, Farid Naït-Abdesselam, Abbas Jamalipour, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto:
Design Guidelines for a Global and Self-Managed LEO Satellites-Based Sensor Network. GLOBECOM 2006 - [c24]Hiroshi Tsunoda, Umith Dharmaratna, Nei Kato, Abbas Jamalipour, Yoshiaki Nemoto:
Network Controlled Handover for Improving TCP Performance in LEO Satellite Networks. GLOBECOM 2006 - [c23]Hiroshi Tsunoda, Kohei Ohta, Nei Kato, Yoshiaki Nemoto:
Geographical and Orbital Information Based Mobility Management to Overcome Last-Hop Ambiguity over IP/LEO Satellite Networks. ICC 2006: 1849-1854 - [c22]Tarik Taleb, Hiroki Nishiyama, Abbas Jamalipour, Nei Kato, Yoshiaki Nemoto:
A Fair TCP-Based Congestion Avoidance Approach for One-to-Many Private Networks. ICC 2006: 1921-1926 - [c21]Kumar Simkhada, Tarik Taleb, Yuji Waizumi, Abbas Jamalipour, Nei Kato, Yoshiaki Nemoto:
An Efficient Signature-Based Approach for Automatic Detection of Internet Worms over Large-Scale Networks. ICC 2006: 2364-2369 - [c20]Bounpadith Kannhavong, Hidehisa Nakayama, Nei Kato, Yoshiaki Nemoto, Abbas Jamalipour:
Analysis of the node isolation attack against OLSR-based mobile ad hoc networks. ISCN 2006: 30-35 - [c19]Kenichi Kashibuchi, Tarik Taleb, Abbas Jamalipour, Yoshiaki Nemoto, Nei Kato:
A new smooth handoff scheme for mobile multimedia streaming using RTP dummy packets and RTCP explicit handoff notification. WCNC 2006: 2162-2167 - [c18]Tarik Taleb, Mitsuru Ochi, Abbas Jamalipour, Nei Kato, Yoshiaki Nemoto:
An efficient vehicle-heading based routing protocol for VANET networks. WCNC 2006: 2199-2204 - 2005
- [j19]Tarik Taleb, Nei Kato, Yoshiaki Nemoto:
On-demand media streaming to hybrid wired/wireless networks over quasi-geostationary satellite systems. Comput. Networks 47(2): 287-306 (2005) - [j18]Tarik Taleb, Nei Kato, Yoshiaki Nemoto:
Recent trends in IP/NGEO satellite communication systems: transport, routing, and mobility management concerns. IEEE Wirel. Commun. 12(5): 63-69 (2005) - [c17]Yuji Waizumi, Daisuke Kudo, Nei Kato, Yoshiaki Nemoto:
A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics. CIS (2) 2005: 252-259 - [c16]Tarik Taleb, Hiroki Nishiyama, Nei Kato, Yoshiaki Nemoto:
securing hybrid wired/mobile IP networks from TCP-flooding based denial-of-service attacks. GLOBECOM 2005: 5 - [c15]Tarik Taleb, Tasuku Suzuki, Nei Kato, Yoshiaki Nemoto:
A dynamic and efficient MAP selection scheme for mobile IPv6 networks. GLOBECOM 2005: 5 - [c14]Tarik Taleb, Umith Dharmaratna, Nei Kato, Yoshiaki Nemoto:
A geographical location based satellite selection scheme for a novel constellation composed of quasi-geostationary satellites. ICC 2005: 1464-1468 - [c13]Tarik Taleb, Abbas Jamalipour, Nei Kato, Yoshiaki Nemoto:
IP Traffic Load Distribution in NGEO Broadband Satellite Networks - (Invited Paper). ISCIS 2005: 113-123 - [c12]Kumar Simkhada, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto:
Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures. ISM 2005: 680-685 - [c11]Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, Yoshiaki Nemoto:
A self-adaptive intrusion detection method for AODV-based mobile ad hoc networks. MASS 2005: 773-780 - [c10]Tarik Taleb, Kenichi Kashibuchi, Nei Kato, Yoshiaki Nemoto:
A dummy segment based bandwidth probing technique to enhance the performance of TCP over heterogeneous networks. WCNC 2005: 2400-2405 - 2004
- [j17]Yuichi Uchiyama, Yuji Waizumi, Nei Kato, Yoshiaki Nemoto:
Detecting and Tracing DDoS Attacks in the Traffic Analysis Using Auto Regressive Model. IEICE Trans. Inf. Syst. 87-D(12): 2635-2643 (2004) - [j16]Hiroshi Tsunoda, Kohei Ohta, Nei Kato, Yoshiaki Nemoto:
Supporting IP/LEO satellite networks by handover-independent IP mobility management. IEEE J. Sel. Areas Commun. 22(2): 300-307 (2004) - [j15]Tarik Taleb, Nei Kato, Yoshiaki Nemoto:
An explicit and fair window adjustment method to enhance TCP efficiency and fairness over multihops Satellite networks. IEEE J. Sel. Areas Commun. 22(2): 371-387 (2004) - [c9]Tarik Taleb, Nei Kato, Yoshiaki Nemoto:
A recursive, explicit and fair method to efficiently and fairly adjust TCP windows in satellite networks. ICC 2004: 4268-4274 - 2003
- [j14]Tarik Taleb, Nei Kato, Yoshiaki Nemoto:
Neighbors-buffering-based video-on-demand architecture. Signal Process. Image Commun. 18(7): 515-526 (2003) - 2002
- [j13]Masato Suzuki, Nei Kato, Yoshiaki Nemoto, Hiroshi Ichimura:
Discrimination of similar characters with quadratic compound Mahalanobis function. Syst. Comput. Jpn. 33(5): 11-20 (2002) - 2001
- [c8]Pinai Linwong, Akihiro Fujii, Yoshiaki Nemoto:
Buffer-Size Approximation for the Geo/D/1/K Queue. ICN (2) 2001: 845-853 - 2000
- [j12]Glenn Mansfield, Kohei Ohta, Yohsuke Takei, Nei Kato, Yoshiaki Nemoto:
Towards trapping wily intruders in the large. Comput. Networks 34(4): 659-670 (2000) - [j11]Akira Kanamaru, Kohei Ohta, Nei Kato, Glenn Mansfield, Yoshiaki Nemoto:
A simple packet aggregation technique for fault detection. Int. J. Netw. Manag. 10(4): 215-228 (2000) - [c7]Akira Kanamura, Kohei Ohta, Nei Kato, Glenn Mansfield, Yoshiaki Nemoto:
Evaluation of Simple Packet Aggregation Technique for Fault Detection. ICDCS Workshop on Internet 2000: A88-A94 - [c6]Hoon Lee, HyeJin Kwon, Yoshiaki Nemoto:
Guaranteeing multiple QoSs in differentiated services Internet. ICPADS Workshops 2000: 233-238
1990 – 1999
- 1999
- [j10]Nei Kato, Masato Suzuki, Shinichiro Omachi, Hirotomo Aso, Yoshiaki Nemoto:
A Handwritten Character Recognition System Using Directional Element Feature and Asymmetric Mahalanobis Distance. IEEE Trans. Pattern Anal. Mach. Intell. 21(3): 258-262 (1999) - [j9]Takayuki Yamagata, Akihiro Fujii, Yoshiaki Nemoto:
A multicast routing algorithm. Syst. Comput. Jpn. 30(10): 69-75 (1999) - 1998
- [j8]Akihiro Fujii, Makoto Nakamura, Yoshiaki Nemoto:
A fast sequential distributed synchronization protocol. Syst. Comput. Jpn. 29(12): 11-18 (1998) - [c5]Piya Tanthawichian, Akihiro Fujii, Yoshiaki Nemoto:
Bandwidth Allocation in ATM Networks: Heuristic Approach. ICCCN 1998: 20-25 - 1997
- [j7]Hoon Lee, Yoshiaki Nemoto:
Providing the Statistical QoS Objectives in High-Speed Networks. Comput. Networks ISDN Syst. 29(16): 1919-1931 (1997) - [j6]Nei Kato, Masato Abé, Yoshiaki Nemoto:
A handwritten character recognition system using modified Mahalanobis distance. Syst. Comput. Jpn. 28(1): 46-55 (1997) - [c4]Yuji Waizumi, Nei Kato, Kazuki Saruta, Yoshiaki Nemoto:
High speed rough classification for handwritten characters using hierarchical learning vector quantization. ICDAR 1997: 23-27 - [c3]Kohei Ohta, Takumi Mori, Nei Kato, Hideaki Sone, Glenn Mansfield, Yoshiaki Nemoto:
Divide and Conquer Technique for Network Fault Management. Integrated Network Management 1997: 675-687 - 1996
- [j5]Kohei Ohta, Nei Kato, Glenn Mansfield, Yoshiaki Nemoto:
Configuring a Network Management System for Efficient Operation. Int. J. Netw. Manag. 6(2): 108-118 (1996) - [c2]Glenn Mansfield, M. Ouchi, K. Jayanthi, Y. Kimura, Kohei Ohta, Yoshiaki Nemoto:
Techniques for Automated Network Map Generation Using SNMP. INFOCOM 1996: 473-480 - 1995
- [j4]Akihiro Fujii, Yoshiaki Nemoto:
Evaluation of a causal order protocol in broadcast channel. Syst. Comput. Jpn. 26(8): 1-11 (1995) - 1994
- [j3]Jun Guo, Risaburo Sato, Ning Sun, Yoshiaki Nemoto:
Recognition of handwritten character database ETL9B using pattern transformation method. Syst. Comput. Jpn. 25(11): 58-67 (1994) - [j2]Jun-ichi Kudoh, Goutam Chakraborty, Yoshiaki Nemoto, Norio Shiratori, Hiroshi Kawamura, Seiziro Obata, Shoichi Noguchi:
Multidimensional analysis method for NOAA AVHRR images. IEEE Trans. Geosci. Remote. Sens. 32(4): 949-954 (1994) - 1992
- [c1]Glenn Mansfield, Makoto Murata, Kenichi Higuchi, Krishnamachari J. Yanthi, Basabi Chakraborty, Yoshiaki Nemoto, Shoichi Noguchi:
Network Management In A Large-scale OSI-based Campus Network. NOMS 1992: 566-577 - 1991
- [j1]Yoshiaki Nemoto, Hideo Nishino, Makoto Ono, Hitoshi Mizutamari, Katsuhiko Nishikawa, Kaoru Tanaka:
Japanese Earth Resources Satellite-1 synthetic aperture radar. Proc. IEEE 79(6): 800-809 (1991)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint