default search action
Peter Herrmann
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c80]Peter Herrmann, Stein Erik Ellevseth:
15th System Analysis and Modelling Conference (SAM 2023). MoDELS (Companion) 2023: 199 - 2022
- [j21]Magnus Karsten Oplenskedal, Peter Herrmann, Amir Taherkordi:
DeepMatch2: A comprehensive deep learning-based approach for in-vehicle presence detection. Inf. Syst. 108: 101927 (2022) - [c79]Gerald Bieber, Dimitri Kraft, Bernd Hölle, Dennis Blenke, Rainer Bader, Peter Herrmann:
Determination of the healing corridor of patients with knee arthroplasty by a motor-powered rollator. PETRA 2022: 390-395 - 2021
- [c78]Magnus Karsten Oplenskedal, Amir Taherkordi, Peter Herrmann:
ATARAXIS: A Deep Learning Approach for Hardwareless In-Vehicle Presence Detection. CogMI 2021: 1-10 - [c77]Ergys Puka, Peter Herrmann:
Mitigating Dead Spots in Cellular Networks with the Hybrid Communication Protocol CAMFLOOP. ITSC 2021: 1041-1048 - [c76]Zeeshan Ali Khan, Peter Herrmann:
Energy-efficient Protection of IoT Networks using Trust Management on the IEEE 802.15.4 Protocol. NTMS 2021: 1-7 - [c75]Gerald Bieber, Niklas Antony, Dimitri Kraft, Bernd Hölle, Dennis Blenke, Peter Herrmann:
Barcode-based Navigation Concept for Autonomous Wheelchairs and Walking Frames. PETRA 2021: 373-378 - 2020
- [c74]Magnus Karsten Oplenskedal, Amir Taherkordi, Peter Herrmann:
DeepMatch: deep matching for in-vehicle presence detection in transportation. DEBS 2020: 97-108 - [c73]Ronal Bejarano, Roope Pääkkönen, Jan Olaf Blech, Ian Peake, Peter Herrmann, Valeriy Vyatkin:
Assessing Long Distance Communication Alternatives for the Remote Control of AGVs. ETFA 2020: 69-76 - [c72]Peter Herrmann, Ergys Puka, Tor Rune Skoglund:
Machine Learning-based Update-time Prediction for Battery-friendly Passenger Information Displays. iSCI 2020: 49-59 - [c71]Ergys Puka, Peter Herrmann, Amir Taherkordi:
Hybrid Context-aware Message Flooding for Dead Spot Mitigation in V2I Communication. VTC Fall 2020: 1-7
2010 – 2019
- 2019
- [j20]Ergys Puka, Peter Herrmann:
Data Dissemination for Vehicles in Temporary Cellular Network Dead Spots. Int. J. Cyber Phys. Syst. 1(2): 38-55 (2019) - [j19]Zeeshan Ali Khan, Peter Herrmann:
Recent Advancements in Intrusion Detection Systems for the Internet of Things. Secur. Commun. Networks 2019: 4301409:1-4301409:19 (2019) - [c70]Jon Arild Ekberg Meyer, Ergys Puka, Peter Herrmann:
Utilizing Connectivity Maps to Accelerate V2I Communication in Cellular Network Dead Spots. IOV 2019: 76-87 - [c69]Magnus Karsten Oplenskedal, Amirhosein Taherkordi, Peter Herrmann:
Automated Product Localization Through Mobile Data Analysis. MDM 2019: 18-26 - [c68]Gerald Bieber, Wencke Chodan, Rainer Bader, Bernd Hölle, Peter Herrmann, Ingo Dreher:
RoRo: a new robotic rollator concept to assist the elderly and caregivers. PETRA 2019: 430-434 - [c67]Ergys Puka, Peter Herrmann:
A Data Dissemination Protocol for Vehicles with Temporary Cellular Network Inaccessibility. WOWMOM 2019: 1-7 - 2018
- [c66]Ergys Puka, Peter Herrmann, Tomas Levin, Christian B. Skjetne:
A way to measure and analyze cellular network connectivity on the norwegian road system. COMSNETS 2018: 595-600 - [c65]Anna Zamansky, Maria Spichkova, Guillermo Rodríguez-Navas, Peter Herrmann, Jan Olaf Blech:
Towards Classification of Lightweight Formal Methods. ENASE 2018: 305-313 - [c64]Amir Taherkordi, Peter Herrmann:
Pervasive Smart Contracts for Blockchains in IoT Systems. ICBTA 2018: 6-11 - [c63]Magnus Karsten Oplenskedal, Peter Herrmann, Jan Olaf Blech, Amir Taherkordi:
Simulation-driven Development of Self-adaptive Transportation Systems. NetSoft 2018: 372-377 - [i4]Anna Zamansky, Maria Spichkova, Guillermo Rodríguez-Navas, Peter Herrmann, Jan Olaf Blech:
Towards Classification of Lightweight Formal Methods. CoRR abs/1807.01923 (2018) - 2017
- [c62]Zeeshan Ali Khan, Johanna Ullrich, Artemios G. Voyiatzis, Peter Herrmann:
A Trust-based Resilient Routing Mechanism for the Internet of Things. ARES 2017: 27:1-27:6 - [c61]Zeeshan Ali Khan, Peter Herrmann:
A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things. AINA 2017: 1169-1176 - [c60]Peter Herrmann, Jan Olaf Blech:
Formal Analysis of Control Software for Cyber-Physical Systems. QRS Companion 2017: 563-564 - [c59]Alexander Svae, Amir Taherkordi, Peter Herrmann, Jan Olaf Blech:
Self-adaptive control in cyber-physical systems: the autonomous train experiment. SAC 2017: 1436-1443 - [i3]Zeeshan Ali Khan, Peter Herrmann:
How to Secure Internet of Things Devices in an Energy Efficient Way. ERCIM News 2017(109) (2017) - 2016
- [j18]Peter Herrmann, Jan Olaf Blech, Fenglin Han, Heinz W. Schmidt:
A Model-Based Toolchain to Verify Spatial Behavior of Cyber-Physical Systems. Int. J. Web Serv. Res. 13(1): 40-52 (2016) - [c58]Simon Hordvik, Kristoffer Øseth, Henrik Heggelund Svendsen, Jan Olaf Blech, Peter Herrmann:
Model-Based Engineering and Spatiotemporal Analysis of Transport Systems. ENASE (Selected Papers) 2016: 44-65 - [c57]Simon Hordvik, Kristoffer Øseth, Jan Olaf Blech, Peter Herrmann:
A Methodology for Model-based Development and Safety Analysis of Transport Systems. ENASE 2016: 91-101 - [c56]Peter Herrmann, Alexander Svae, Henrik Heggelund Svendsen, Jan Olaf Blech:
Collaborative Model-based Development of a Remote Train Monitoring System. ENASE 2016: 383-390 - [c55]Amir Taherkordi, Peter Herrmann, Jan Olaf Blech, Álvaro Fernández:
Service Virtualization for Self-adaptation in Mobile Cyber-Physical Systems. ICSOC Workshops 2016: 56-68 - [c54]Peter Herrmann, Jan Olaf Blech:
Formal Model-Based Development in Industrial Automation with Reactive Blocks. STAF Workshops 2016: 253-261 - 2015
- [c53]Fenglin Han, Jan Olaf Blech, Peter Herrmann, Heinz W. Schmidt:
Model-Based Engineering and Analysis of Space-Aware Systems Communicating via IEEE 802.11. COMPSAC 2015: 638-646 - [c52]Jan Olaf Blech, Peter Herrmann, Ian D. Peake, Heinz W. Schmidt:
Towards a Model-based Toolchain for Remote Configuration and Maintenance of Space-aware Systems. ENASE 2015: 331-336 - [c51]Jan Olaf Blech, Peter Herrmann:
Behavioral Types for Space-aware Systems. ACES-MB&WUCOR@MoDELS 2015: 11-18 - [c50]Jan Olaf Blech, Peter Herrmann:
Behavioral Types for Component-Based Development of Cyber-Physical Systems. SEFM Workshops 2015: 43-52 - [i2]Frank Alexander Kraemer, Peter Herrmann:
Creating Internet of Things Applications from Building Blocks. ERCIM News 2015(101) (2015) - 2014
- [j17]Maria Vasilevskaya, Linda Ariani Gunawan, Simin Nadjm-Tehrani, Peter Herrmann:
Integrating security mechanisms into embedded systems by domain-specific modelling. Secur. Commun. Networks 7(12): 2815-2832 (2014) - [c49]Maria Spichkova, Jan Olaf Blech, Peter Herrmann, Heinz W. Schmidt:
Modeling Spatial Aspects of Safety-Critical Systems with Focus-ST. MoDeVVa@MoDELS 2014: 49-58 - [c48]Fenglin Han, Jan Olaf Blech, Peter Herrmann, Heinz W. Schmidt:
Towards Verifying Safety Properties of Real-Time Probabilistic Systems. FESCA 2014: 1-15 - 2013
- [j16]Vidar Slåtten, Peter Herrmann, Frank Alexander Kraemer:
Model-Driven Engineering of Reliable Fault-Tolerant Systems - A State-of-the-Art Survey. Adv. Comput. 91: 119-205 (2013) - [c47]Linda Ariani Gunawan, Peter Herrmann:
Compositional Verification of Application-Level Security Properties. ESSoS 2013: 75-90 - [c46]Fenglin Han, Peter Herrmann:
Modeling real-time system performance with respect to scheduling analysis. iCAST/UMEDIA 2013: 663-671 - [c45]Fenglin Han, Peter Herrmann, Hien Le:
Modeling and Verifying Real-Time Properties of Reactive Systems. ICECCS 2013: 14-23 - [c44]Sergiy Gladysh, Peter Herrmann:
Modeling Reactive Trust Acquisition Using State Transition Systems. IFIPTM 2013: 247-254 - 2012
- [j15]Fenglin Han, Peter Herrmann:
Remedy of Mixed Initiative Conflicts in Model-based System Engineering. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 47 (2012) - [c43]Linda Ariani Gunawan, Frank Alexander Kraemer, Peter Herrmann:
Behavioral Singletons to Consistently Handle Global States of Security Patterns. DAIS 2012: 73-86 - [c42]Maria Vasilevskaya, Simin Nadjm-Tehrani, Linda Ariani Gunawan, Peter Herrmann:
Security asset elicitation for collaborative models. MDsec@MoDELS 2012: 7 - 2011
- [j14]Máté J. Csorba, Poul E. Heegaard, Peter Herrmann:
Component deployment using parallel ant-nests. Int. J. Auton. Adapt. Commun. Syst. 4(1): 78-99 (2011) - [j13]Linda Ariani Gunawan, Michael Vogel, Frank Alexander Kraemer, Sebastian Schmerl, Vidar Slåtten, Peter Herrmann, Hartmut König:
Modeling a distributed intrusion detection system using collaborative building blocks. ACM SIGSOFT Softw. Eng. Notes 36(1): 1-8 (2011) - [c41]Linda Ariani Gunawan, Frank Alexander Kraemer, Peter Herrmann:
A Tool-Supported Method for the Design and Implementation of Secure Distributed Applications. ESSoS 2011: 142-155 - [c40]Vidar Slåtten, Peter Herrmann:
Contracts for Multi-instance UML Activities. FMOODS/FORTE 2011: 304-318 - [c39]Vidar Slåtten, Frank Alexander Kraemer, Peter Herrmann:
Towards automatic generation of formal specifications to validate and verify reliable distributed systems: a method exemplified by an industrial case study. GPCE 2011: 147-156 - [c38]Rune Sætre, Mohammad Ullah Khan, Erlend Stav, Alfredo Perez Fernandez, Peter Herrmann, Jon Atle Gulla:
Towards Ontology-Driven End-User Composition of Personalized Mobile Services. NLDB 2011: 242-245 - [e3]Frank Alexander Kraemer, Peter Herrmann:
System Analysis and Modeling: About Models - 6th International Workshop, SAM 2010, Oslo, Norway, October 4-5, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6598, Springer 2011, ISBN 978-3-642-21651-0 [contents] - 2010
- [j12]Peter Herrmann, Mozhgan Tavakolifard:
Special issue on trust and privacy in electronic commerce - Editors' introduction. Electron. Commer. Res. 10(3-4): 235-237 (2010) - [c37]Frank Alexander Kraemer, Peter Herrmann:
Reactive Semantics for Distributed UML Activities. FMOODS/FORTE 2010: 17-31 - [c36]Vidar Slåtten, Frank Alexander Kraemer, Peter Herrmann:
Towards a model-driven method for reliable applications: from ideal to realistic transmission semantics. SERENE 2010: 2-11
2000 – 2009
- 2009
- [j11]Antonio Sánchez-Esguevillas, José Jimenez, Belén Carro, Heinz Brüggemann, Peter Herrmann, Ken Young:
Telecommunication solutions for European leadership in telecommunications [Very Large Projects]. IEEE Commun. Mag. 47(3): 18-20 (2009) - [j10]Frank Alexander Kraemer, Vidar Slåtten, Peter Herrmann:
Tool support for the rapid composition, analysis and implementation of reactive services. J. Syst. Softw. 82(12): 2068-2080 (2009) - [c35]Máté J. Csorba, Hein Meling, Poul E. Heegaard, Peter Herrmann:
Foraging for Better Deployment of Replicated Service Components. DAIS 2009: 87-101 - [c34]Linda Ariani Gunawan, Peter Herrmann, Frank Alexander Kraemer:
Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models. FGIT-SecTech 2009: 72-85 - [c33]Mozhgan Tavakolifard, Peter Herrmann, Svein J. Knapskog:
Inferring Trust Based on Similarity with TILLIT. IFIPTM 2009: 133-148 - [c32]Mozhgan Tavakolifard, Peter Herrmann, Pinar Öztürk:
Analogical Trust Reasoning. IFIPTM 2009: 149-163 - [c31]Frank Alexander Kraemer, Peter Herrmann:
Automated Encapsulation of UML Activities for Incremental Development and Verification. MoDELS 2009: 571-585 - [c30]Frank Alexander Kraemer, Vidar Slåtten, Peter Herrmann:
Model-Driven Construction of Embedded Applications Based on Reusable Building Blocks - An Example. SDL Forum 2009: 1-18 - 2008
- [c29]Máté J. Csorba, Poul E. Heegaard, Peter Herrmann:
Adaptable model-based component deployment guided by artificial ants. Autonomics 2008: 15 - [c28]Máté J. Csorba, Poul E. Heegaard, Peter Herrmann:
Cost-Efficient Deployment of Collaborating Components. DAIS 2008: 253-268 - [c27]Mozhgan Tavakolifard, Svein J. Knapskog, Peter Herrmann:
Cross-Situation Trust Reasoning. Web Intelligence/IAT Workshops 2008: 67-71 - [c26]Mozhgan Tavakolifard, Svein J. Knapskog, Peter Herrmann:
Trust transferability among similar contexts. Q2SWinet 2008: 91-97 - [e2]Yücel Karabulut, John Mitchell, Peter Herrmann, Christian Damsgaard Jensen:
Trust Management II - Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway. IFIP Advances in Information and Communication Technology 263, Springer 2008, ISBN 978-0-387-09427-4 [contents] - [i1]Richard A. Kemmerer, Roland Büschkes, Ali Fessi, Hartmut König, Peter Herrmann, Stephen D. Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, Dirk Haage:
08102 Outcome Working Group -- Situational Awareness. Network Attack Detection and Defense 2008 - 2007
- [j9]Frank Alexander Kraemer, Peter Herrmann:
Transforming Collaborative Service Specifications into Efficiently Executable State Machines. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 6 (2007) - [c25]Peter Herrmann, Frank Alexander Kraemer:
Design of Trusted Systems with Reusable Collaboration Models. IFIPTM 2007: 317-332 - [c24]Peter Herrmann, Frank Alexander Kraemer:
Design of Trusted Systems with Reusable Collaboration Models. IFIPTM 2007: 417 - [c23]Frank Alexander Kraemer, Rolv Bræk, Peter Herrmann:
Synthesizing Components with Sessions from Collaboration-Oriented Service Specifications. SDL Forum 2007: 166-185 - 2006
- [j8]Peter Herrmann, Gaby Herrmann:
Security requirement analysis of business processes. Electron. Commer. Res. 6(3-4): 305-335 (2006) - [c22]Frank Alexander Kraemer, Peter Herrmann:
Service Specification by Composition of Collaborations--An Example. IAT Workshops 2006: 129-133 - [c21]Peter Herrmann:
Temporal Logic-Based Specification and Verification of Trust Models. iTrust 2006: 105-119 - [c20]Frank Alexander Kraemer, Peter Herrmann, Rolv Bræk:
Aligning UML 2.0 State Machines and Temporal Logic for the Efficient Execution of Services. OTM Conferences (2) 2006: 1613-1632 - 2005
- [e1]Peter Herrmann, Valérie Issarny, Simon Shiu:
Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings. Lecture Notes in Computer Science 3477, Springer 2005, ISBN 3-540-26042-0 [contents] - 2004
- [j7]Gaby Herrmann, Peter Herrmann:
Introduction: Security and Trust in Electronic Commerce. Electron. Commer. Res. 4(1-2): 5-7 (2004) - [j6]Peter Herrmann, Heiko Krumm:
Trust-Based Monitoring of Component-Structured Software. Prax. Inf.verarb. Kommun. 27(4): 237-245 (2004) - [c19]Peter Herrmann, Lars Wiebusch, Heiko Krumm:
Vertrauensbasierte Laufzeitüberwachung verteilter komponentenstrukturierter E-Commerce-Software. DIMVA 2004: 55-70 - [c18]Günter Graw, Peter Herrmann:
Generation and Enactment of Controllers for Business Architectures Using MDA. EWSA 2004: 148-166 - 2003
- [c17]Peter Herrmann:
Formal Security Policy Verification of Distributed Component-Structured Software. FORTE 2003: 257-272 - [c16]Peter Herrmann:
Trust-Based Protection of Software Component Users and Designers. iTrust 2003: 75-90 - [c15]Günter Graw, Peter Herrmann:
Transformation and Verification of Executable UML Models. CVUML 2003: 3-24 - 2002
- [j5]Peter Herrmann, Heiko Krumm, Olaf Drögehorn, Walter Geisselhardt:
Framework and Tool Support for Formal Verification of Highspeed Transfer Protocol Designs. Telecommun. Syst. 20(3-4): 291-310 (2002) - [j4]Inéz Frerichs, Jose Hinz, Peter Herrmann, Gerald Weisser, Günter Hahn, Michael Quintel, Gerhard Hellige:
Regional Lung Perfusion as Determined by Electrical Impedance Tomography in Comparison with Electron Beam CT Imaging. IEEE Trans. Medical Imaging 21(6): 646-652 (2002) - [c14]Peter Herrmann, Lars Wiebusch, Heiko Krumm:
State-Based Security Policy Enforcement in Component-Based E-Commerce Applications. I3E 2002: 195-209 - 2001
- [c13]Peter Herrmann:
Information Flow Analysis of Component-Structured Applications. ACSAC 2001: 45-54 - [c12]Peter Herrmann, Lars Wiebusch, Heiko Krumm:
Tool-Assisted Security Assessment of Distributed Applications. DAIS 2001: 289-294 - [c11]Peter Herrmann, Heiko Krumm:
Trust-Adapted Enforcement of Security Policies in Distributed Component-Structured Applications. ISCC 2001: 2-8 - 2000
- [j3]Peter Herrmann, Heiko Krumm:
A framework for modeling transfer protocols. Comput. Networks 34(2): 317-337 (2000) - [c10]Günter Graw, Peter Herrmann, Heiko Krumm:
Verification of UML-Based Real-Time System Designs by Means of cTLA. ISORC 2000: 86-95
1990 – 1999
- 1999
- [c9]Günter Graw, Peter Herrmann, Heiko Krumm:
Constraint-oriented formal modelling of OO-systems. DAIS 1999: 345- - [c8]Günter Graw, Peter Herrmann, Heiko Krumm:
Composing Object-Oriented Specifications and Verifications with cTLA. ECOOP Workshops 1999: 318 - [c7]Peter Herrmann, Manfred Noël:
Formale Verifikation eines Reglers für Fahrbahnmarkierungsmaschinen. FBT 1999: 83-92 - [c6]Peter Herrmann, Heiko Krumm:
Formal Hazard Analysis of Hybrid Systems in cTLA. SRDS 1999: 68-77 - 1998
- [b2]Peter Herrmann:
Problemnaher korrektheitssichernder Entwurf von Hochleistungsprotokollen. Technical University of Dortmund, Germany, DUV Informatik, DUV 1998, ISBN 978-3-8244-2101-5, pp. I-XII, 1-276 - [j2]Peter Herrmann, Heiko Krumm:
Protokollspezifikation und -verifikation mit dem Transferprotokoll-Framework. Prax. Inf.verarb. Kommun. 21(2): 79-88 (1998) - [j1]Peter Herrmann, Heiko Krumm:
Modular specification and verification of XTP. Telecommun. Syst. 9(2): 207-221 (1998) - [c5]Olaf Drögehorn, Peter Herrmann:
Werkzeugunterstützte Protokollverifikation mit dem Transferprotokoll-Framework. FBT 1998: 48-59 - [c4]Volker Gruhn, Peter Herrmann, Heiko Krumm:
User-Defined Telecooperation Services. ICPADS 1998: 590-598 - [c3]Peter Herrmann, Günter Graw, Heiko Krumm:
Compositional Specification and Structured Verification of Hybrid Systems in cTLA. ISORC 1998: 335- - 1995
- [c2]Peter Herrmann, Heiko Krumm:
Re-usable verification elements for high-speed transfer protocol configurations. PSTV 1995: 171-186 - 1994
- [c1]Peter Herrmann, Heiko Krumm:
Compositional specification and verification of high-speed transfer protocols. PSTV 1994: 339-346
1980 – 1989
- 1983
- [b1]Peter Herrmann:
Grundlagen einer rechnerunterstützten Investitionsplanung und Wirtschaftlichkeitsrechnung für flexible Fertigung. RWTH Aachen University, Germany, 1983, pp. 1-161
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint