default search action
Neeraj Mittal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Amit Anand Tiwari, Samrat Gupta, Efpraxia D. Zamani, Neeraj Mittal, Renu Agarwal:
An Overarching Conceptual Framework for ICT-enabled Responsive Governance. Inf. Syst. Frontiers 26(3): 1161-1182 (2024) - 2023
- [j30]Sarat Chandra Varanasi, Neeraj Mittal, Gopal Gupta:
Locksynth: Deriving Synchronization Code for Concurrent Data Structures with ASP. Theory Pract. Log. Program. 23(4): 812-831 (2023) - [c62]Sahil Dhoked, Wojciech Golab, Neeraj Mittal:
Brief Announcement: On Solving Recoverable Mutual Exclusion Under System-Wide Failures. SPAA 2023: 287-290 - [c61]Sahil Dhoked, Wojciech Golab, Neeraj Mittal:
Modular Recoverable Mutual Exclusion Under System-Wide Failures. DISC 2023: 17:1-17:24 - [i13]Sarat Chandra Varanasi, Neeraj Mittal, Gopal Gupta:
Locksynth: Deriving Synchronization Code for Concurrent Data Structures with ASP. CoRR abs/2305.18225 (2023) - 2022
- [j29]Stéphane Devismes, Neeraj Mittal:
Special issue of SSS 2020. Inf. Comput. 289(Part): 104955 (2022) - 2021
- [c60]Shreyas Gokhale, Sahil Dhoked, Neeraj Mittal:
On group mutual exclusion for dynamic systems. PPoPP 2021: 446-447 - [c59]Sarat Chandra Varanasi, Neeraj Mittal, Gopal Gupta:
Generating Concurrent Programs From Sequential Data Structure Knowledge Using Answer Set Programming. ICLP Technical Communications 2021: 219-233 - [i12]Sahil Dhoked, Neeraj Mittal:
Memory Reclamation for Recoverable Mutual Exclusion. CoRR abs/2103.01538 (2021) - [i11]Sahil Dhoked, Neeraj Mittal:
Adaptive and Fair Transformation for Recoverable Mutual Exclusion. CoRR abs/2110.08308 (2021) - 2020
- [j28]Kenneth Platz, Neeraj Mittal, S. Venkatesan:
Practical concurrent unrolled linked lists using lazy synchronization. J. Parallel Distributed Comput. 139: 110-134 (2020) - [j27]K. Alex Mills, R. Chandrasekaran, Neeraj Mittal:
Algorithms for optimal replica placement under correlated failure in hierarchical failure domains. Theor. Comput. Sci. 809: 482-518 (2020) - [j26]Aravind Natarajan, Arunmoezhi Ramachandran, Neeraj Mittal:
FEAST: A Lightweight Lock-free Concurrent Binary Search Tree. ACM Trans. Parallel Comput. 7(2): 10:1-10:64 (2020) - [c58]Sahil Dhoked, Neeraj Mittal:
An Adaptive Approach to Recoverable Mutual Exclusion. PODC 2020: 1-10 - [e2]Stéphane Devismes, Neeraj Mittal:
Stabilization, Safety, and Security of Distributed Systems - 22nd International Symposium, SSS 2020, Austin, TX, USA, November 18-21, 2020, Proceedings. Lecture Notes in Computer Science 12514, Springer 2020, ISBN 978-3-030-64347-8 [contents] - [i10]Sahil Dhoked, Neeraj Mittal:
An Adaptive Approach to Recoverable Mutual Exlcusion. CoRR abs/2006.07086 (2020) - [i9]Sarat Chandra Varanasi, Neeraj Mittal, Gopal Gupta:
Pointer Data Structure Synthesis from Answer Set Programming Specifications. CoRR abs/2006.07440 (2020) - [i8]Sarat Chandra Varanasi, Neeraj Mittal, Gopal Gupta:
Generating Concurrent Programs From Sequential Data Structure Knowledge. CoRR abs/2011.04045 (2020)
2010 – 2019
- 2019
- [c57]Arunmoezhi Ramachandran, Neeraj Mittal:
Improving efficacy of concurrent internal binary search trees using local recovery. ICDCN 2019: 61-70 - [c56]Kenneth Platz, Neeraj Mittal, S. Venkatesan:
Concurrent Unrolled Skiplist. ICDCS 2019: 1579-1589 - [c55]Sarat Chandra Varanasi, Elmer Salazar, Neeraj Mittal, Gopal Gupta:
Synthesizing Imperative Code from Answer Set Programming Specifications. LOPSTR 2019: 75-89 - 2018
- [c54]Shreyas Gokhale, Neeraj Mittal:
Brief Announcement: Fast and Scalable Group Mutual Exclusion. DISC 2018: 49:1-49:3 - [i7]Shreyas Gokhale, Neeraj Mittal:
Fast and Scalable Group Mutual Exclusion. CoRR abs/1805.04819 (2018) - 2017
- [j25]Aravind Natarajan, Himanshu Chauhan, Neeraj Mittal, Vijay K. Garg:
Efficient abstraction algorithms for predicate detection. Theor. Comput. Sci. 688: 24-48 (2017) - [c53]K. Alex Mills, R. Chandrasekaran, Neeraj Mittal:
Lexico-Minimum Replica Placement in Multitrees. COCOA (2) 2017: 122-137 - [i6]K. Alex Mills, Ramaswamy Chandrasekaran, Neeraj Mittal:
Algorithms for Optimal Replica Placement Under Correlated Failure in Hierarchical Failure Domains. CoRR abs/1701.01539 (2017) - [i5]K. Alex Mills, R. Chandrasekaran, Neeraj Mittal:
Lexico-minimum Replica Placement in Multitrees. CoRR abs/1709.05709 (2017) - 2016
- [j24]Yanyan Zeng, K. Alex Mills, Shreyas Gokhale, Neeraj Mittal, S. Venkatesan, R. Chandrasekaran:
Robust neighbor discovery in multi-hop multi-channel heterogeneous wireless networks. J. Parallel Distributed Comput. 92: 15-34 (2016) - [c52]Arunmoezhi Ramachandran, Neeraj Mittal:
Improving efficacy of internal binary search trees using local recovery. PPoPP 2016: 42:1-42:2 - 2015
- [c51]K. Alex Mills, R. Chandrasekaran, Neeraj Mittal:
On Replica Placement in High-Availability Storage Under Correlated Failure. COCOA 2015: 348-363 - [c50]Arunmoezhi Ramachandran, Neeraj Mittal:
A Fast Lock-Free Internal Binary Search Tree. ICDCN 2015: 37:1-37:10 - [c49]Arunmoezhi Ramachandran, Neeraj Mittal:
CASTLE: fast concurrent internal binary search tree using edge-based locking. PPoPP 2015: 281-282 - [i4]K. Alex Mills, R. Chandrasekaran, Neeraj Mittal:
Algorithms for Replica Placement in High-Availability Storage. CoRR abs/1503.02654 (2015) - [i3]Yanyan Zeng, K. Alex Mills, Shreyas Gokhale, Neeraj Mittal, S. Venkatesan, Ramaswamy Chandrasekaran:
Robust Neighbor Discovery in Multi-Hop Multi-Channel Heterogeneous Wireless Networks. CoRR abs/1505.00267 (2015) - 2014
- [j23]Ramon Novales, Neeraj Mittal, Kamil Saraç:
SKAIT: A parameterized key assignment scheme for confidential communication in resource constrained ad hoc wireless networks. Ad Hoc Networks 20: 163-181 (2014) - [j22]Dennis Kundisch, Neeraj Mittal, Barrie R. Nault:
Research Commentary - Using Income Accounting as the Theoretical Basis for Measuring IT Productivity. Inf. Syst. Res. 25(3): 449-467 (2014) - [j21]Miguel Correia, Neeraj Mittal:
Cloud Computing Dependability: Report and Extended Papers of the Second International Workshop on Dependability Issues in Cloud Computing. ACM SIGOPS Oper. Syst. Rev. 48(2): 1-2 (2014) - [c48]Aravind Natarajan, Neeraj Mittal, Vijay K. Garg:
Online Algorithms to Generate Slices for Regular Temporal Logic Predicates. ICDCN 2014: 165-180 - [c47]Kenneth Platz, Neeraj Mittal, Subbarayan Venkatesan:
Practical Concurrent Unrolled Linked Lists Using Lazy Synchronization. OPODIS 2014: 388-403 - [c46]Aravind Natarajan, Neeraj Mittal:
Fast concurrent lock-free binary search trees. PPoPP 2014: 317-328 - 2013
- [j20]Miguel Correia, Neeraj Mittal:
Dependability issues in cloud computing: extended papers from the 1st international workshop on dependability issues in cloud computing - DISCCO. ACM SIGOPS Oper. Syst. Rev. 47(2): 20-22 (2013) - [j19]Sara Arbab Yazd, Subbarayan Venkatesan, Neeraj Mittal:
Boosting energy efficiency with mirrored data block replication policy and energy scheduler. ACM SIGOPS Oper. Syst. Rev. 47(2): 33-40 (2013) - [c45]Himanshu Chauhan, Vijay K. Garg, Aravind Natarajan, Neeraj Mittal:
A Distributed Abstraction Algorithm for Online Predicate Detection. SRDS 2013: 101-110 - [c44]Aravind Natarajan, Lee Savoie, Neeraj Mittal:
Concurrent Wait-Free Red Black Trees. SSS 2013: 45-60 - [e1]Miguel Correia, Neeraj Mittal:
Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing, DISCCO '13, Braga, Portugal, September 30, 2013. ACM 2013, ISBN 978-1-4503-2248-5 [contents] - [i2]Himanshu Chauhan, Vijay K. Garg, Aravind Natarajan, Neeraj Mittal:
Distributed Abstraction Algorithm for Online Predicate Detection. CoRR abs/1304.4326 (2013) - 2012
- [c43]Sara Arbab Yazd, Subbarayan Venkatesan, Neeraj Mittal:
Energy Efficient Hadoop Using Mirrored Data Block Replication Policy. SRDS 2012: 457-462 - [c42]Aravind Natarajan, Lee Savoie, Neeraj Mittal:
Brief Announcement: Concurrent Wait-Free Red-Black Trees. DISC 2012: 421-422 - 2011
- [j18]Ramon Novales, Neeraj Mittal:
Parameterized key assignment for confidential communication in wireless networks. Ad Hoc Networks 9(7): 1186-1201 (2011) - [c41]Suhel Patel, Kamil Saraç, R. Chandrasekaran, Turgay Korkmaz, Neeraj Mittal:
Relay Assignment in AMT-Based Multicast Content Distribution. CNSR 2011: 263-270 - [c40]Chanaka Liyana Arachchige, S. Venkatesan, R. Chandrasekaran, Neeraj Mittal:
Minimal Time Broadcasting in Cognitive Radio Networks. ICDCN 2011: 364-375 - [c39]Neeraj Mittal, Yanyan Zeng, S. Venkatesan, R. Chandrasekaran:
Randomized Distributed Algorithms for Neighbor Discovery in Multi-hop Multi-channel Heterogeneous Wireless Networks. ICDCS 2011: 57-66 - [c38]Matthew Holiday, Neeraj Mittal, Subbarayan Venkatesan:
Secure Location Verification with Randomly-Selected Base Stations. ICDCS Workshops 2011: 119-122 - [c37]Ehsan Nourbakhsh, T. Ryan Burchfield, S. Venkatesan, Neeraj Mittal, Ravi Prakash:
Enhancing ASSERT: making an accurate testbed friendly. WiNTECH 2011: 3-10 - 2010
- [j17]Neeraj Mittal, Ramon Novales:
Cluster-Based Key Predistribution Using Deployment Knowledge. IEEE Trans. Dependable Secur. Comput. 7(3): 329-335 (2010) - [c36]Tarun Bansal, Neeraj Mittal:
A scalable algorithm for maintaining perpetual system connectivity in dynamic distributed systems. IPDPS 2010: 1-12 - [c35]Aravind Natarajan, Neeraj Mittal:
False conflict reduction in the Swiss Transactional Memory (SwissTM) system. IPDPS Workshops 2010: 1-8 - [c34]Yanyan Zeng, Neeraj Mittal, S. Venkatesan, R. Chandrasekaran:
Fast Neighbor Discovery with Lightweight Termination Detection in Heterogeneous Cognitive Radio Networks. ISPDC 2010: 149-156 - [c33]Ramon Novales, Neeraj Mittal, Kamil Saraç:
SKAIT: A Parameterized Key Assignment Scheme for Wireless Networks. ISPDC 2010: 157-164 - [c32]Ehsan Nourbakhsh, Jeff Dix, Paul Johnson, T. Ryan Burchfield, S. Venkatesan, Neeraj Mittal, Ravi Prakash:
ASSERT: A Wireless Networking Testbed. TRIDENTCOM 2010: 209-218
2000 – 2009
- 2009
- [j16]Neeraj Mittal, Barrie R. Nault:
Research Note - Investments in Information Technology: Indirect Effects and Information Technology Intensity. Inf. Syst. Res. 20(1): 140-154 (2009) - [j15]Neeraj Mittal, Srinivasan Krishnamurthy, R. Chandrasekaran, Subbarayan Venkatesan, Yanyan Zeng:
On neighbor discovery in cognitive radio networks. J. Parallel Distributed Comput. 69(7): 623-637 (2009) - [j14]Neeraj Mittal, Kuppahalli L. Phaneesh, Felix C. Freiling:
Safe termination detection in an asynchronous distributed system when processes may crash and recover. Theor. Comput. Sci. 410(6-7): 614-628 (2009) - [c31]Paul Johnson, Neeraj Mittal:
A Distributed Termination Detection Algorithm for Dynamic Asynchronous Systems. ICDCS 2009: 343-351 - [c30]Paul Johnson, Ehsan Nourbakhsh, T. Ryan Burchfield, Jeff Dix, Ravi Prakash, Subbarayan Venkatesan, Neeraj Mittal:
ASSERT: Advanced wireleSS Environment Research Testbed. SenSys 2009: 297-298 - [c29]Hai Trong Vu, Thuc D. Nguyen, Neeraj Mittal, S. Venkatesan:
PEQ: A Privacy-Preserving Scheme for Exact Query Evaluation in Distributed Sensor Data Networks. SRDS 2009: 189-198 - [c28]Ramon Novales, Neeraj Mittal:
TASK: Template-Based Key Assignment for Confidential Communication in Wireless Networks. SRDS 2009: 209-216 - 2008
- [j13]Srinivasan Krishnamurthy, Mansi Ramakrishnan Thoppian, Srikant Kuppa, Ramaswamy Chandrasekaran, Neeraj Mittal, Subbarayan Venkatesan, Ravi Prakash:
Time-efficient distributed layer-2 auto-configuration for cognitive radio networks. Comput. Networks 52(4): 831-849 (2008) - [j12]Sathya Peri, Neeraj Mittal:
Improving the Efficacy of a Termination Detection Algorithm. J. Inf. Sci. Eng. 24(1): 159-174 (2008) - [j11]Vinay Madenur, Neeraj Mittal:
A Delay-Optimal Group Mutual Exclusion Algorithm for a Tree Network. J. Inf. Sci. Eng. 24(2): 573-583 (2008) - [j10]Neeraj Mittal, Felix C. Freiling, Subbarayan Venkatesan, Lucia Draque Penso:
On termination detection in crash-prone distributed systems with failure detectors. J. Parallel Distributed Comput. 68(6): 855-875 (2008) - [c27]Thuc D. Nguyen, Duc H. M. Nguyen, Bao N. Tran, Hai Trong Vu, Neeraj Mittal:
A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks. ICCCN 2008: 185-190 - [c26]Tarun Bansal, Neeraj Mittal, Subbarayan Venkatesan:
Leader Election Algorithms for Multi-channel Wireless Networks. WASA 2008: 310-321 - [c25]Hai Trong Vu, Ajay Kulkarni, Kamil Saraç, Neeraj Mittal:
WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks. WASA 2008: 491-502 - [p1]Vijay K. Garg, Neeraj Mittal:
Time and State in Asynchronous Distributed Systems. Wiley Encyclopedia of Computer Science and Engineering 2008 - 2007
- [j9]Vijay K. Garg, Chakarat Skawratananond, Neeraj Mittal:
Timestamping messages and events in a distributed system using synchronous communication. Distributed Comput. 19(5-6): 387-402 (2007) - [j8]Neeraj Mittal, Subbarayan Venkatesan, Sathya Peri:
A family of optimal termination detection algorithms. Distributed Comput. 20(2): 141-162 (2007) - [j7]Ranganath Atreya, Neeraj Mittal, Ajay D. Kshemkalyani, Vijay K. Garg, Mukesh Singhal:
Efficient detection of a locally stable predicate in a distributed system. J. Parallel Distributed Comput. 67(4): 369-385 (2007) - [j6]Neeraj Mittal, Prajwal K. Mohan:
A priority-based distributed group mutual exclusion algorithm when group access is non-uniform. J. Parallel Distributed Comput. 67(7): 797-815 (2007) - [j5]Ranganath Atreya, Neeraj Mittal, Sathya Peri:
A Quorum-Based Group Mutual Exclusion Algorithm for a Distributed System with Dynamic Group Set. IEEE Trans. Parallel Distributed Syst. 18(10): 1345-1360 (2007) - [j4]Neeraj Mittal, Alper Sen, Vijay K. Garg:
Solving Computation Slicing Using Predicate Detection. IEEE Trans. Parallel Distributed Syst. 18(12): 1700-1713 (2007) - [c24]Felix C. Freiling, Matthias Majuntke, Neeraj Mittal:
On Detecting Termination in the Crash-Recovery Model. Euro-Par 2007: 629-638 - [c23]Hai Trong Vu, Neeraj Mittal, Subbarayan Venkatesan:
THIS: THreshold security for Information aggregation in Sensor networks. ITNG 2007: 89-95 - [c22]Neeraj Mittal:
Space-Efficient Keying in Wireless Communication Networks. WiMob 2007: 75 - 2006
- [c21]Neeraj Mittal, Kuppahalli L. Phaneesh, Felix C. Freiling:
Safe Termination Detection in an Asynchronous Distributed System When Processes May Crash and Recover. OPODIS 2006: 126-141 - [c20]Felix C. Freiling, Matthias Majuntke, Neeraj Mittal:
Brief Announcement: Termination Detection in an Asynchronous Distributed System with Crash-Recovery Failures. SSS 2006: 572-573 - [c19]Srinivasan Krishnamurthy, R. Chandrasekaran, Neeraj Mittal, Subbarayan Venkatesan:
Brief Announcement: Synchronous Distributed Algorithms for Node Discovery and Configuration in Multi-channel Cognitive Radio Networks. DISC 2006: 572-574 - 2005
- [j3]Neeraj Mittal, Vijay K. Garg:
Techniques and applications of computation slicing. Distributed Comput. 17(3): 251-277 (2005) - [j2]Vijay K. Garg, Neeraj Mittal:
A Critique of Java for Concurrent Programming. IEEE Distributed Syst. Online 6(9) (2005) - [c18]Sathya Peri, Neeraj Mittal:
Monitoring Stable Properties in Dynamic Peer-to-Peer Distributed Systems. FSTTCS 2005: 420-431 - [c17]Felix C. Freiling, Neeraj Mittal, Lucia Draque Penso:
Transformations in Secure and Fault-Tolerant Distributed Computation. GI Jahrestagung (1) 2005: 410-412 - [c16]Ranganath Atreya, Neeraj Mittal:
A Dynamic Group Mutual Exclusion Algorithm Using Surrogate-Quorums. ICDCS 2005: 251-260 - [c15]Neeraj Mittal, Prajwal K. Mohan:
An Efficient Distributed Group Mutual Exclusion Algorithm for Non-Uniform Group Access. IASTED PDCS 2005: 367-372 - [c14]Srinivasan Krishnamurthy, Mansi Ramakrishnan Thoppian, Srikant Kuppa, Subbarayan Venkatesan, Ramaswamy Chandrasekaran, Neeraj Mittal, Ravi Prakash:
Time-Efficient Layer-2 Auto-Configuration for Cognitive Radios. IASTED PDCS 2005: 459-464 - [c13]Subbarayan Venkatesan, Maulin Patel, Neeraj Mittal:
A Distributed Algorithm for Path Restoration in Circuit Switched Communication Networks. SRDS 2005: 226-236 - [c12]Neeraj Mittal, Felix C. Freiling, Subbarayan Venkatesan, Lucia Draque Penso:
Efficient Reduction for Wait-Free Termination Detection in a Crash-Prone Distributed System. DISC 2005: 93-107 - 2004
- [j1]Neeraj Mittal, Vijay K. Garg:
Finding missing synchronization in a distributed computation using controlled re-execution. Distributed Comput. 17(2): 107-130 (2004) - [c11]Sathya Peri, Neeraj Mittal:
On Termination Detection in an Asynchronous Distributed System. PDCS 2004: 209-215 - [c10]Neeraj Mittal, Alper Sen, Vijay K. Garg, Ranganath Atreya:
Finding Satisfying Global States: All for One and One for All. IPDPS 2004 - [c9]Neeraj Mittal, Subbarayan Venkatesan, Sathya Peri:
Message-Optimal and Latency-Optimal Termination Detection Algorithms for Arbitrary Topologies. DISC 2004: 290-304 - 2003
- [c8]Neeraj Mittal, Vijay K. Garg:
Software Fault Tolerance of Distributed Programs Using Computation Slicing. ICDCS 2003: 105- - [c7]Ranganath Atreya, Neeraj Mittal, Vijay K. Garg:
Detecting Locally Stable Predicates Without Modifying Application Messages. OPODIS 2003: 20-33 - [i1]Neeraj Mittal, Vijay K. Garg:
Techniques and Applications of Computation Slicing. CoRR cs.DC/0303010 (2003) - 2001
- [c6]Neeraj Mittal, Vijay K. Garg:
On Detecting Global Predicates in Distributed Computations. ICDCS 2001: 3-10 - [c5]Vijay K. Garg, Neeraj Mittal:
On Slicing a Distributed Computation. ICDCS 2001: 322-329 - [c4]Neeraj Mittal, Hui-I Hsiao:
Database Managed External File Update. ICDE 2001: 557-564 - [c3]Neeraj Mittal, Vijay K. Garg:
Computation Slicing: Techniques and Theory. DISC 2001: 78-92 - 2000
- [c2]Neeraj Mittal, Vijay K. Garg:
Debugging distributed programs using controlled re-execution. PODC 2000: 239-248
1990 – 1999
- 1998
- [c1]Neeraj Mittal, Vijay K. Garg:
Consistency Conditions for Multi-Object Distributed Operations. ICDCS 1998: 582-599
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-09 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint