default search action
Stephen B. Wicker
Person information
- affiliation: Cornell University, Ithaca, NY, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j53]Stephen B. Wicker:
The ethics of zero-day exploits - : the NSA meets the trolley car. Commun. ACM 64(1): 97-103 (2021) - 2020
- [j52]Stephen B. Wicker, Dipayan P. Ghosh:
Reading in the panopticon - : your kindle may be spying on you, but you can't be sure. Commun. ACM 63(5): 68-73 (2020) - [j51]Stephen B. Wicker:
eBook surveillance and the threat to freedom of association. J. Inf. Secur. Appl. 55: 102643 (2020)
2010 – 2019
- 2019
- [c61]Stephen B. Wicker:
eBook Readers, Location Surveillance and the Threat to Freedom of Association. ARES 2019: 94:1-94:7 - 2018
- [j50]Stephen B. Wicker:
Smartphones, contents of the mind, and the fifth amendment. Commun. ACM 61(4): 28-31 (2018) - [j49]Stephen B. Wicker:
Forced Decryption and the Fifth Amendment: A Technical Perspective. Proc. IEEE 106(1): 3-6 (2018) - [c60]Kolbeinn Karlsson, Danny Adams, Gloire Rubambiza, Zangyueyang Xian, Robbert van Renesse, Hakim Weatherspoon, Stephen B. Wicker:
Untethered: Deployable Blockchains for IoT Environments. SoCC 2018: 508 - [c59]Kolbeinn Karlsson, Weitao Jiang, Stephen B. Wicker, Danny Adams, Edwin Ma, Robbert van Renesse, Hakim Weatherspoon:
Vegvisir: A Partition-Tolerant Blockchain for the Internet-of-Things. ICDCS 2018: 1150-1158 - 2017
- [j48]Stephen B. Wicker, Kolbeinn Karlsson:
Internet advertising: technology, ethics, and a serious difference of opinion. Commun. ACM 60(10): 70-79 (2017) - [c58]Kolbeinn Karlsson, Zhiming Shen, Weijia Song, Hakim Weatherspoon, Robbert van Renesse, Stephen B. Wicker:
Towards an emergency edge supercloud. SoCC 2017: 633 - 2016
- [j47]Stephanie M. Santoso, Stephen B. Wicker:
The future of three-dimensional printing: Intellectual property or intellectual confinement? New Media Soc. 18(1): 138-155 (2016) - [c57]Kolbeinn Karlsson, Stephen B. Wicker:
The Effect of Location Granularity on Semantic Location Inferences. HICSS 2016: 2197-2204 - 2015
- [j46]Amber Sami Kubesch, Stephen B. Wicker:
Digital rights management: The cost to consumers. Proc. IEEE 103(5): 726-733 (2015) - [c56]Shion Guha, Stephen B. Wicker:
Do Birds of a Feather Watch Each Other?: Homophily and Social Surveillance in Location Based Social Networks. CSCW 2015: 1010-1020 - [c55]Shion Guha, Stephen B. Wicker:
Spatial subterfuge: an experience sampling study to predict deceptive location disclosures. UbiComp 2015: 1131-1135 - 2014
- [c54]Christian D. Peer, Dominik Engel, Stephen B. Wicker:
Hierarchical key management for multi-resolution load data representation. SmartGridComm 2014: 926-932 - 2013
- [j45]Stephen B. Wicker, Stephanie M. Santoso:
Access to the internet is a human right. Commun. ACM 56(6): 43-46 (2013) - [c53]Xiao-an Wang, Stephen B. Wicker:
Channel estimation and feedback with continuous time domain parameters. GLOBECOM 2013: 4306-4312 - [c52]Dipayan P. Ghosh, Robert J. Thomas, Stephen B. Wicker:
A Privacy-Aware Design for the Vehicle-to-Grid Framework. HICSS 2013: 2283-2291 - [c51]Xiao-an Wang, Stephen B. Wicker:
Channel Estimation and Feedback in OFDM Systems. VTC Spring 2013: 1-5 - 2012
- [j44]Stephen B. Wicker:
The loss of location privacy in the cellular age. Commun. ACM 55(8): 60-68 (2012) - [j43]Hazer Inaltekin, Mung Chiang, H. Vincent Poor, Stephen B. Wicker:
Selfish Random Access over Wireless Channels with Multipacket Reception. IEEE J. Sel. Areas Commun. 30(1): 138-152 (2012) - [j42]Nathaniel J. Karst, Stephen B. Wicker:
On the Rekeying Load in Group Key Distributions Using Cover-Free Families. IEEE Trans. Inf. Theory 58(10): 6667-6671 (2012) - [c50]Dipayan P. Ghosh, Dawn E. Schrader, William D. Schulze, Stephen B. Wicker:
Economic analysis of privacy-aware Advanced Metering Infrastructure adoption. ISGT 2012: 1-4 - 2011
- [j41]Stephen B. Wicker:
Cellular telephony and the question of privacy. Commun. ACM 54(7): 88-98 (2011) - [j40]Stephen B. Wicker, Dawn E. Schrader:
Privacy-Aware Design Principles for Information Networks. Proc. IEEE 99(2): 330-350 (2011) - [c49]Stephen B. Wicker, Robert J. Thomas:
A Privacy-Aware Architecture for Demand Response Systems. HICSS 2011: 1-9 - [c48]Dipayan P. Ghosh, Stephen B. Wicker, Lawrence E. Blume:
Game theoretic analysis of privacy-aware Advanced Metering Infrastructure. ISGT Europe 2011: 1-4 - 2010
- [j39]Mikhail A. Lisovich, Deirdre K. Mulligan, Stephen B. Wicker:
Inferring Personal Information from Demand-Response Systems. IEEE Secur. Priv. 8(1): 11-20 (2010) - [j38]K. J. Ray Liu, Hervé Bourlard, Vikram Krishnamurthy, Alex Pentland, Stephen B. Wicker:
Introduction to the Special Issue on Signal and Information Processing for Social Networks. IEEE J. Sel. Top. Signal Process. 4(4): 673-676 (2010) - [c47]Sergio A. Bermudez, Stephen B. Wicker:
Partial Connectivity of Multi-hop Two-Dimensional Finite Hybrid Wireless Networks. ICC 2010: 1-5 - [c46]Anna Kacewicz, Stephen B. Wicker:
Application of Reed-Muller Codes for Localization of Malicious Nodes. ICC 2010: 1-7
2000 – 2009
- 2009
- [j37]Anna Kacewicz, Stephen B. Wicker:
Redundancy minimizing techniques for robust transmission in wireless networks. J. Commun. Networks 11(6): 564-573 (2009) - [j36]Hazer Inaltekin, Stephen B. Wicker, Mung Chiang, H. Vincent Poor:
On Unbounded Path-Loss Models: Effects of Singularity on Wireless Network Performance. IEEE J. Sel. Areas Commun. 27(7): 1078-1092 (2009) - [c45]Philip Kuryloski, Annarita Giani, Roberta Giannantonio, Katherine Gilani, Raffaele Gravina, Ville-Pekka Seppä, Edmund Y. W. Seto, Victor Shia, Curtis Wang, Posu Yan, Allen Y. Yang, Jari A. K. Hyttinen, Shankar Sastry, Stephen B. Wicker, Ruzena Bajcsy:
DexterNet: An Open Platform for Heterogeneous Body Sensor Networks and its Applications. BSN 2009: 92-97 - [c44]Sergio A. Bermudez, Stephen B. Wicker:
Connectivity of Finite Wireless Networks with Random Communication Range Nodes. ICC 2009: 1-5 - 2008
- [j35]Parv Venkitasubramaniam, Ting He, Lang Tong, Stephen B. Wicker:
Toward an analytical approach to anonymous wireless networking. IEEE Commun. Mag. 46(2): 140-146 (2008) - [j34]Sameer Pai, Sergio A. Bermudez, Stephen B. Wicker, Marci Meingast, Tanya G. Roosta, Shankar Sastry, Deirdre K. Mulligan:
Transactional Confidentiality in Sensor Networks. IEEE Secur. Priv. 6(4): 28-35 (2008) - [j33]Hui Qu, Stephen B. Wicker:
A Combined Localization and Geographic Routing Algorithm for Rapidly-Deployed Wireless Sensor Networks. Int. J. Distributed Sens. Networks 4(1): 44-63 (2008) - [j32]Hui Qu, Stephen B. Wicker:
Co-designed anchor-free localization and location-based routing algorithm for rapidly-deployed wireless sensor networks. Inf. Fusion 9(3): 425-439 (2008) - [j31]Narayan B. Mandayam, Stephen B. Wicker, Jean C. Walrand, Tamer Basar, Jianwei Huang, Daniel Pérez Palomar:
Game Theory in Communication Systems [Guest Editorial]. IEEE J. Sel. Areas Commun. 26(7): 1042-1046 (2008) - [j30]Hazer Inaltekin, Stephen B. Wicker:
The analysis of Nash equilibria of the one-shot random-access game for wireless networks and the behavior of selfish nodes. IEEE/ACM Trans. Netw. 16(5): 1094-1107 (2008) - [c43]Shanshan Jiang, Yanchuan Cao, Sameer Iyengar, Philip Kuryloski, Roozbeh Jafari, Yuan Xue, Ruzena Bajcsy, Stephen B. Wicker:
CareNet: an integrated wireless sensor networking environment for remote healthcare. BODYNETS 2008: 9 - [c42]Anna Kacewicz, Stephen B. Wicker:
Optimizing redundancy using MDS codes and dynamic symbol allocation in mobile ad hoc networks. CISS 2008: 1093-1098 - [c41]Sergio A. Bermudez, Stephen B. Wicker:
On the Connectivity of Finite Wireless Networks with Multiple Base Stations. ICCCN 2008: 875-880 - [c40]Sergio A. Bermudez, Stephen B. Wicker:
Taking advantage of data correlation to control the topology of wireless sensor networks. ICT 2008: 1-6 - [c39]Hazer Inaltekin, Mung Chiang, H. Vincent Poor, Stephen B. Wicker:
On the asymptotic behavior of selfish transmitters sharing a common channel. ISIT 2008: 2026-2030 - [c38]Mikhail A. Lisovich, Sergio A. Bermudez, Stephen B. Wicker:
Reconfiguration in heterogeneous mobile wireless sensor networks. ISWPC 2008: 349-354 - [i2]Hazer Inaltekin, Mung Chiang, Harold Vincent Poor, Stephen B. Wicker:
On the Asymptotic Behavior of Selfish Transmitters Sharing a Common Channel. CoRR abs/0804.4187 (2008) - 2007
- [j29]Xin Zhang, Jun Chen, Stephen B. Wicker, Toby Berger:
Successive Coding in Multiuser Information Theory. IEEE Trans. Inf. Theory 53(6): 2246-2254 (2007) - [c37]Sameer Pai, Philip Kuryloski, Henry Yip, Srikant Yennamandra, Stephen B. Wicker, Kirsten Boehner, Geri Gay:
Networks of Sensors in Public Spaces: Combining Technology with Art. AINA Workshops (2) 2007: 396-402 - [c36]Sameer Pai, Tanya G. Roosta, Stephen B. Wicker, Shankar Sastry:
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust. AINA Workshops (1) 2007: 443-450 - [c35]Hazer Inaltekin, Christina Tavoularis, Stephen B. Wicker:
Event Detection Time for Mobile Sensor Networks Using First Passage Processes. GLOBECOM 2007: 1174-1179 - [c34]Tanya G. Roosta, Sameer Pai, Phoebus Chen, Shankar Sastry, Stephen B. Wicker:
Inherent Security of Routing Protocols in Ad-Hoc and Sensor Networks. GLOBECOM 2007: 1273-1278 - [c33]Christina Tavoularis, Stephen B. Wicker:
Optimal Sleep Strategies with Respect to Traffic Patterns in Wireless Sensor Networks. ICC 2007: 3847-3852 - [c32]Hazer Inaltekin, Stephen B. Wicker:
Random access game over noisy channels with capture effect. MSWiM 2007: 181-188 - [c31]Hazer Inaltekin, Stephen B. Wicker:
The Behavior of Unbounded Path-loss Models and the Effect of Singularity on Computed Network Interference. SECON 2007: 431-440 - [c30]Hazer Inaltekin, Tom Wexler, Stephen B. Wicker:
A Duopoly Pricing Game for Wireless IP Services. SECON 2007: 600-609 - 2006
- [j28]Prince Samar, Stephen B. Wicker:
Link Dynamics and Protocol Design in a Multihop Mobile Environment. IEEE Trans. Mob. Comput. 5(9): 1156-1172 (2006) - [c29]Hui Qu, Stephen B. Wicker:
Anchor-Free Localization in Rapidly-Deployed Wireless Sensor Networks. MASS 2006: 627-632 - [c28]Hazer Inaltekin, Stephen B. Wicker:
The Analysis of a Game Theoretic MAC Protocol for Wireless Networks. SECON 2006: 296-305 - [e2]John A. Stankovic, Phillip B. Gibbons, Stephen B. Wicker, Joseph A. Paradiso:
Proceedings of the Fifth International Conference on Information Processing in Sensor Networks, IPSN 2006, Nashville, Tennessee, USA, April 19-21, 2006. ACM 2006, ISBN 1-59593-334-4 [contents] - 2005
- [j27]Xin Zhang, Stephen B. Wicker:
On the optimal distribution of sensors in a random field. ACM Trans. Sens. Networks 1(2): 301-306 (2005) - [c27]Xin Zhang, Stephen B. Wicker:
Robustness vs. efficiency in sensor networks. IPSN 2005: 225-230 - 2004
- [j26]Jun Chen, Xin Zhang, Toby Berger, Stephen B. Wicker:
An upper bound on the sum-rate distortion function and its corresponding rate allocation schemes for the CEO problem. IEEE J. Sel. Areas Commun. 22(6): 977-987 (2004) - [j25]Bhaskar Krishnamachari, Rung-Hung Gau, Stephen B. Wicker, Zygmunt J. Haas:
Optimal Sequential Paging in Cellular Wireless Networks. Wirel. Networks 10(2): 121-131 (2004) - [c26]Prince Samar, Stephen B. Wicker:
Characterizing the communication links of a node in a mobile ad hoc network. ICC 2004: 4092-4096 - [c25]Xin Zhang, Stephen B. Wicker:
How to distribute sensors in a random field? IPSN 2004: 243-250 - [c24]Prince Samar, Stephen B. Wicker:
On the behavior of communication links of a node in a multi-hop mobile environment. MobiHoc 2004: 145-156 - [c23]Martin Roth, Stephen B. Wicker:
Asymptotic Pheromone Behavior in Swarm Intelligent Manets. MWCN 2004: 335-346 - 2003
- [j24]Bhaskar Krishnamachari, Stephen B. Wicker, Ramón Béjar, Cèsar Fernández:
On the Complexity of Distributed Self-Configuration in Wireless Networks. Telecommun. Syst. 22(1-4): 33-59 (2003) - [c22]Martin Roth, Stephen B. Wicker:
Termite: ad-hoc networking with stigmergy. GLOBECOM 2003: 2937-2941 - [c21]Yurong Chen, Emin Gün Sirer, Stephen B. Wicker:
On Selection of Optimal Transmission Power for Ad hoc Networks. HICSS 2003: 300 - [c20]Bhaskar Krishnamachari, Yasser Mourtada, Stephen B. Wicker:
The energy-robustness tradeoff for routing in wireless sensor networks. ICC 2003: 1833-1837 - [c19]Allen B. MacKenzie, Stephen B. Wicker:
Stability of Multipacket Slotted Aloha with Selfish Users and Perfect Information. INFOCOM 2003: 1583-1590 - 2002
- [j23]Andrea J. Goldsmith, Stephen B. Wicker:
Design challenges for energy-constrained ad hoc wireless networks. IEEE Wirel. Commun. 9(4): 8-27 (2002) - [c18]Bhaskar Krishnamachari, Ramón Béjar, Stephen B. Wicker:
Distributed Problem Solving and the Boundaries of Self-Configuration in Multi-hop Wireless Networks. HICSS 2002: 297 - [c17]Bhaskar Krishnamachari, Deborah Estrin, Stephen B. Wicker:
The Impact of Data Aggregation in Wireless Sensor Networks. ICDCS Workshops 2002: 575-578 - 2001
- [j22]Allen B. MacKenzie, Stephen B. Wicker:
Game theory and the design of self-configuring, adaptive wireless networks. IEEE Commun. Mag. 39(11): 126-131 (2001) - [c16]Allen B. MacKenzie, Stephen B. Wicker:
Game theory in communications: motivation, explanation, and application to power control. GLOBECOM 2001: 821-826 - [c15]Bhaskar Krishnamachari, Stephen B. Wicker, Ramón Béjar:
Phase transition phenomena in wireless ad hoc networks. GLOBECOM 2001: 2921-2925 - [c14]Bhaskar Krishnamachari, Rung-Hung Gau, Stephen B. Wicker, Zygmunt J. Haas:
On the performance of sequential paging for mobile user location. VTC Fall 2001: 92-96 - [c13]Allen B. MacKenzie, Stephen B. Wicker:
Selfish users in Aloha: a game-theoretic approach. VTC Fall 2001: 1354-1357 - 2000
- [j21]Michael Eoin Buckley, Stephen B. Wicker:
The design and performance of a neural network for predicting turbo decoding error with application to hybrid ARQ protocols. IEEE Trans. Commun. 48(4): 566-576 (2000) - [j20]Jong-Il Park, Stephen B. Wicker, Henry L. Owen:
Trellis-based soft-output adaptive equalization techniques for TDMA cellular systems. IEEE Trans. Veh. Technol. 49(1): 83-94 (2000) - [c12]Bhaskar Krishnamachari, Xi Xie, Bart Selman, Stephen B. Wicker:
Analysis of Random Noise and Random Walk Algorithms. CP 2000: 278-290 - [c11]Zygmunt J. Haas, Joseph Y. Halpern, Li Li, Stephen B. Wicker:
A decision-theoretic approach to resource allocation in wireless multimedia networks. DIAL-M 2000: 86-95 - [c10]Xi Xie, Stephen B. Wicker:
Solving Large Scale Channel Allocation Problems with Splitting Algorithms. ICC (1) 2000: 500-504 - [c9]Michael Eoin Buckley, Marcia G. Ramos, Sheila S. Hemami, Stephen B. Wicker:
Perceptually-Based Robust Image Transmission over Wireless Channels. ICIP 2000: 128-131 - [i1]Zygmunt J. Haas, Joseph Y. Halpern, Li Li, Stephen B. Wicker:
A Decision-Theoretic Approach to Resource Allocation in Wireless Multimedia Networks. CoRR cs.NI/0006037 (2000)
1990 – 1999
- 1999
- [j19]Xiao-an Wang, Stephen B. Wicker:
The BCJR Trellis and Trellis Decoders for Some BCH Codes. Appl. Algebra Eng. Commun. Comput. 9(6): 521-546 (1999) - [j18]Michael Eoin Buckley, Stephen B. Wicker:
A neural network for predicting decoder error in turbo decoders. IEEE Commun. Lett. 3(5): 145-147 (1999) - [j17]Thomas L. Tapp, Amjad A. Luna, Xiao-an Wang, Stephen B. Wicker:
Extended Hamming and BCH soft decision decoders for mobile data applications. IEEE Trans. Commun. 47(3): 333-337 (1999) - [j16]Amjad A. Luna, Frédéric M. Fontaine, Stephen B. Wicker:
Iterative maximum-likelihood trellis decoding for block codes. IEEE Trans. Commun. 47(3): 338-342 (1999) - [c8]James J. Kosmach, Stephen B. Wicker:
Reconfigurable two-stage trellis Reed-Solomon decoding. ICC 1999: 451-455 - 1998
- [j15]Daniel J. Costello Jr., Joachim Hagenauer, Hideki Imai, Stephen B. Wicker:
Applications of Error-Control Coding. IEEE Trans. Inf. Theory 44(6): 2531-2560 (1998) - 1997
- [j14]M. Y. Zaidan, Christopher F. Barnes, Stephen B. Wicker:
Use of sigma-trees as constellations in trellis-coded modulation. IEEE Trans. Inf. Theory 43(6): 2005-2012 (1997) - [c7]Jong-Il Park, Stephen B. Wicker, Henry L. Owen:
Soft Output Equalization Techniques for pi/4-DQPSK Moblie Radio. ICC (3) 1997: 1503-1507 - 1996
- [j13]Xiao-an Wang, Stephen B. Wicker:
An artificial neural net Viterbi decoder. IEEE Trans. Commun. 44(2): 165-171 (1996) - [j12]Xiao-an Wang, Stephen B. Wicker:
A soft-output decoding algorithm for concatenated systems. IEEE Trans. Inf. Theory 42(2): 543-553 (1996) - 1995
- [j11]Lars K. Rasmussen, Stephen B. Wicker:
Trellis-coded, type-I hybrid-ARQ protocols based on CRC error-detecting codes. IEEE Trans. Commun. 43(10): 2569-2575 (1995) - [j10]Lars K. Rasmussen, Michael J. Bartz, Stephen B. Wicker:
A comparison of trellis coded and Reed-Solomon coded hybrid-ARQ protocols over slowly fading Rayleigh channels. Wirel. Pers. Commun. 2(4): 393-413 (1995) - [c6]Slim Souissi, Stephen B. Wicker:
Dynamic performance of a random access code combining CDMA system. PIMRC 1995: 628-632 - 1994
- [j9]Michael D. Rice, Stephen B. Wicker:
Adaptive error control for slowly varying channels. IEEE Trans. Commun. 42(234): 917-926 (1994) - [j8]Stephen B. Wicker, Michael J. Bartz:
The design and implementation of type-I and type-II hybrid-ARQ protocols based on first-order Reed-Muller codes. IEEE Trans. Commun. 42(234): 979-987 (1994) - [j7]Stephen B. Wicker, Michael J. Bartz:
Type-II hybrid-ARQ protocols using punctured MDS codes. IEEE Trans. Commun. 42(234): 1431-1440 (1994) - [j6]Michael D. Rice, Stephen B. Wicker:
A sequential scheme for adaptive error control over slowly varying channels. IEEE Trans. Commun. 42(234): 1533-1543 (1994) - [j5]Bruce A. Harvey, Stephen B. Wicker:
Packet combining systems based on the Viterbi decoder. IEEE Trans. Commun. 42(234): 1544-1557 (1994) - [j4]Lars K. Rasmussen, Stephen B. Wicker:
The performance of type-I trellis coded hybrid-ARQ protocols over AWGN and slowly fading channels. IEEE Trans. Inf. Theory 40(2): 418-428 (1994) - [c5]Mohssen Alabbadi, Stephen B. Wicker:
A Digital Signature Scheme Based on Linear Error-correcting Block Codes. ASIACRYPT 1994: 238-248 - [c4]Lars K. Rasmussen, Stephen B. Wicker:
A performance analysis for two TCM code combining diversity receivers. PIMRC 1994: 85-89 - [e1]Andrew Chmora, Stephen B. Wicker:
Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers. Lecture Notes in Computer Science 829, Springer 1994, ISBN 3-540-58265-7 [contents] - 1993
- [c3]Mohssen Alabbadi, Stephen B. Wicker:
Susceptibility of Digital Signature Schemes Based on Error-Correcting Codes to Universal Forgery. Error Control, Cryptology, and Speech Compression 1993: 6-12 - 1992
- [j3]Michael D. Rice, Stephen B. Wicker:
Modified majority logic decoding of cyclic codes in hybrid-ARQ systems. IEEE Trans. Commun. 40(9): 1413-1417 (1992) - 1991
- [j2]Stephen B. Wicker:
Adaptive rate error control through the use of diversity combining and majority-logic decoding in a hybrid-ARQ protocol. IEEE Trans. Commun. 39(3): 380-385 (1991) - [c2]Stephen B. Wicker:
Reed-Solomon Hybrid-ARQ Error Control With Erasure Decoding For Mobile Communication Networks. PIMRC 1991: 58-62 - 1990
- [j1]Stephen B. Wicker:
Modified majority-logic decoders for use in convolutionally encoded hybrid-ARQ systems. IEEE Trans. Commun. 38(3): 263-266 (1990)
1980 – 1989
- 1989
- [c1]Stephen B. Wicker:
An Error Control Technique for High Data Rate Communication Networks. INFOCOM 1989: 594-601
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint