Остановите войну!
for scientists:
default search action
M. Ümit Uyar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j32]Janusz Kusyk, M. Ümit Uyar, Kelvin Ma, Eltan Samoylov, Ricardo Valdez, Joseph Plishka, Sagor E. Hoque, Giorgio Bertoli, Jeffrey Boksiner:
Artificial intelligence and game theory controlled autonomous UAV swarms. Evol. Intell. 14(4): 1775-1792 (2021) - 2020
- [j31]Aydin Saribudak, Adarsha A. Subick, Na Hyun Kim, Joshua A. Rutta, M. Ümit Uyar:
Gene Expressions, Hippocampal Volume Loss, and MMSE Scores in Computation of Progression and Pharmacologic Therapy Effects for Alzheimer's Disease. IEEE ACM Trans. Comput. Biol. Bioinform. 17(2): 608-622 (2020)
2010 – 2019
- 2019
- [c52]Janusz Kusyk, M. Ümit Uyar, Kelvin Ma, Joseph Plishka, Giorgio Bertoli, Jeffrey Boksiner:
AI and Game Theory based Autonomous UAV Swarm for Cybersecurity. MILCOM 2019: 1-6 - [c51]Janusz Kusyk, M. Ümit Uyar, Kelvin Ma, Kevin Budhu, Eltan Samoylov, Joseph Plishka, Giorgio Bertoli, Jeffrey Boksiner, Dilip K. Guha:
Game Theory and Biology Inspired Flight Control for Autonomous UAVs Operating in Contested Environments. Sarnoff Symposium 2019: 1-6 - 2018
- [j30]Janusz Kusyk, M. Ümit Uyar, Cem Safak Sahin:
Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networks. Evol. Intell. 10(3-4): 95-117 (2018) - 2016
- [c50]Aydin Saribudak, Adarsha A. Subick, Joshua A. Rutta, M. Ümit Uyar:
Gene Expression Based Computation Methods for Alzheimer's Disease Progression using Hippocampal Volume Loss and MMSE Scores. BCB 2016: 165-174 - [c49]Aydin Saribudak, Herman Kucharavy, Karen Hubbard, M. Ümit Uyar:
Heterogeneity of colorectal cancer cell positions as a cell viability biometrie. BHI 2016: 21-24 - [c48]Aydin Saribudak, Herman Kucharavy, Karen Hubbard, M. Ümit Uyar:
Quantification of cell apoptosis for in-vitro colorectal cancer cell cultures based on morphological features. BHI 2016: 82-85 - [c47]Aydin Saribudak, Adarsha A. Subick, M. Ümit Uyar:
Computation of Pharmacologic Therapy Effects on Cognitive Abilities of Alzheimer's Disease Patients. BIBE 2016: 129-136 - [p3]Jianmin Zou, Stephen Gundry, M. Ümit Uyar, Janusz Kusyk, Cem Safak Sahin:
Bio-Inspired Topology Control Mechanism for Unmanned Underwater Vehicles. Recent Advances in Computational Intelligence in Defense and Security 2016: 727-752 - 2015
- [j29]Stephen Gundry, Jianmin Zou, M. Ümit Uyar, Cem Safak Sahin, Janusz Kusyk:
Differential evolution-based autonomous and disruption tolerant vehicular self-organization in MANETs. Ad Hoc Networks 25: 454-471 (2015) - [j28]Aydin Saribudak, Stephen Gundry, Jianmin Zou, M. Ümit Uyar:
A gene expression-based mathematical modeling approach for breast cancer tumor growth and shrinkage. Netw. Model. Anal. Health Informatics Bioinform. 4(1): 28 (2015) - [c46]Aydin Saribudak, Yiyu Dong, James Hsieh, M. Ümit Uyar:
Bio-inspired Computation Approach for Tumor Growth with Spatial Randomness Analysis of Kidney Cancer Xenograft Pathology Slides. BICT 2015: 453-460 - [c45]Aydin Saribudak, Yiyu Dong, Stephen Gundry, James Hsieh, M. Ümit Uyar:
Mathematical models of tumor growth using Voronoi tessellations in pathology slides of kidney cancer. EMBC 2015: 4454-4457 - [c44]Aydin Saribudak, Stephen Gundry, Jianmin Zou, M. Ümit Uyar:
Genomic based personalized chemotherapy analysis to support decision systems for breast cancer. MeMeA 2015: 495-500 - 2014
- [c43]Aydin Saribudak, Emir Ganic, Jianmin Zou, Stephen Gundry, M. Ümit Uyar:
Toward Genomic Based Personalized Mathematical Models for Breast Cancer Tumor Growth. BIBE 2014: 115-119 - [c42]Jianmin Zou, Stephen Gundry, Janusz Kusyk, Cem Safak Sahin, M. Ümit Uyar:
Bio-inspired and Voronoi-based Algorithms for Self-positioning of Autonomous Vehicles in Noisy Environments. BICT 2014 - [c41]Jianmin Zou, Stephen Gundry, Emir Ganic, M. Ümit Uyar:
Mathematical models for absorption and efficacy of ovarian cancer treatments. EMBC 2014: 3442-3445 - [c40]Emir Ganic, Stephen Gundry, Jianmin Zou, M. Ümit Uyar:
Evaluation of anti-cancer therapy using in silico analysis of treatments for HER2+ breast cancer. MeMeA 2014: 211-216 - [c39]Levent Onder Yilmaz, Hasan Ates, Zafer Bayraktar, Yakup Kaya, Isa Bostan, Recep Talha Kuyuk, Ibrahim Hökelek, M. Ümit Uyar:
Automated test generation and execution for VPN devices. SIU 2014: 638-641 - 2013
- [j27]Jianmin Zou, Stephen Gundry, Janusz Kusyk, M. Ümit Uyar, Cem Safak Sahin:
3D genetic algorithms for underwater sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 13(1): 10-22 (2013) - [c38]Recep Talha Kuyuk, Hasan Basri Çelebi, Ibrahim Hökelek, Ozgur Oren, Ayhan Yeni, Aydin Saribudak, Fatih Kara, Gokhan Vicil, M. Ümit Uyar:
Interoperability of secure VoIP terminals. BlackSeaCom 2013: 172-176 - [c37]Stephen Gundry, Jianmin Zou, Janusz Kusyk, Cem Safak Sahin, M. Ümit Uyar:
Differential Evolution Based Fault Tolerant Topology Control in MANETs. MILCOM 2013: 864-869 - [c36]Recep Talha Kuyuk, Hasan Basri Çelebi, Ibrahim Hökelek, Ozgur Oren, Ayhan Yeni, Aydin Saribudak, Fatih Kara, Gokhan Vicil, M. Ümit Uyar:
An interoperability testbed for VoIP terminals. SIU 2013: 1-4 - [p2]Janusz Kusyk, Cem Safak Sahin, Jianmin Zou, Stephen Gundry, M. Ümit Uyar, Elkin Urrea:
Game Theoretic and Bio-inspired Optimization Approach for Autonomous Movement of MANET Nodes. Handbook of Optimization 2013: 129-155 - 2012
- [j26]Janusz Kusyk, Elkin Urrea, Cem Safak Sahin, M. Ümit Uyar:
Game Theory and Genetic Algorithm Based Approach for Self Positioning of Autonomous Nodes. Ad Hoc Sens. Wirel. Networks 16(1-3): 93-118 (2012) - [j25]Cem Safak Sahin, M. Ümit Uyar:
Real-time, decentralized and bio-inspired topology control for holonomic autonomous vehicles. Int. J. Intell. Comput. Cybern. 5(3): 359-380 (2012) - [j24]Cem Safak Sahin, Stephen Gundry, M. Ümit Uyar:
Markov Chain Analysis of Self-organizing Mobile Nodes - Self-organizing Mobile Nodes. J. Intell. Robotic Syst. 67(2): 133-153 (2012) - [j23]Cem Safak Sahin, M. Ümit Uyar, Stephen Gundry, Elkin Urrea:
Self Organization for Area Coverage Maximization and Energy Conservation in Mobile Ad Hoc Networks. Trans. Comput. Sci. 15: 49-73 (2012) - [c35]Stephen Gundry, Janusz Kusyk, Jianmin Zou, Cem Safak Sahin, M. Ümit Uyar:
Performance evaluation of differential evolution based topology control method for autonomous MANET nodes. ISCC 2012: 228-233 - [c34]Stephen Gundry, Jianmin Zou, Janusz Kusyk, M. Ümit Uyar, Cem Safak Sahin:
Fault tolerant bio-inspired topology control mechanism for autonomous mobile node distribution in MANETs. MILCOM 2012: 1-6 - [c33]Jianmin Zou, Janusz Kusyk, M. Ümit Uyar, Stephen Gundry, Ceni Safak Sahin:
Bio-inspired and Voronoi-based algorithms for self-positioning autonomous mobile nodes. MILCOM 2012: 1-6 - [c32]Stephen Gundry, Jianmin Zou, Janusz Kusyk, Cem Safak Sahin, M. Ümit Uyar:
Markov chain model for differential evolution based topology control in MANETs. Sarnoff Symposium 2012: 1-5 - [c31]Janusz Kusyk, Jianmin Zou, Stephen Gundry, Cem Safak Sahin, M. Ümit Uyar:
Metrics for performance evaluation of self-positioning autonomous MANET nodes. Sarnoff Symposium 2012: 1-5 - [c30]Jianmin Zou, Stephen Gundry, Janusz Kusyk, Cem Safak Sahin, M. Ümit Uyar:
Particle swarm optimization based topology control mechanism for holonomic unmanned vehicles operating in three-dimensional space. Sarnoff Symposium 2012: 1-5 - [p1]Cem Safak Sahin, Elkin Urrea, M. Ümit Uyar, Stephen Gundry:
A Bio-inspired Approach to Self-organization of Mobile Nodes in Real-Time Mobile Ad Hoc Network Applications. Variants of Evolutionary Algorithms for Real-World Applications 2012: 437-462 - 2011
- [c29]Janusz Kusyk, Jianmin Zou, Cem Safak Sahin, M. Ümit Uyar, Stephen Gundry, Elkin B. Urrea:
A bio-inspired approach combining genetic algorithms and game theory for dispersal of autonomous manet nodes. MILCOM 2011: 1067-1072 - [c28]Stephen Gundry, Jianmin Zou, Janusz Kusyk, M. Ümit Uyar, Cem Safak Sahin, Elkin Urrea:
Genetic algorithms for self-spreading autonomous and holonomic unmanned vehicles in a three-dimensional space. MILCOM 2011: 1073-1078 - 2010
- [j22]Cem Safak Sahin, Elkin Urrea, M. Ümit Uyar, Michael Conner, Giorgio Bertoli, Christian Pizzo:
Design of genetic algorithms for topology control of unmanned vehicles. Int. J. Appl. Decis. Sci. 3(3): 221-238 (2010) - [c27]Cem Safak Sahin, Stephen Gundry, Elkin Urrea, M. Ümit Uyar, Michael Conner, Giorgio Bertoli, Christian Pizzo:
Markov Chain Models for Genetic Algorithm Based Topology Control in MANETs. EvoApplications (2) 2010: 41-50
2000 – 2009
- 2009
- [j21]Elkin Urrea, Cem Safak Sahin, Ibrahim Hökelek, M. Ümit Uyar, Michael Conner, Giorgio Bertoli, Christian Pizzo:
Bio-inspired topology control for knowledge sharing mobile agents. Ad Hoc Networks 7(4): 677-689 (2009) - [j20]Yu Wang, M. Ümit Uyar, Samrat S. Batth, Mariusz A. Fecko:
Fault masking by multiple timing faults in timed EFSM models. Comput. Networks 53(5): 596-612 (2009) - [c26]Cevher Dogan, Cem Safak Sahin, M. Ümit Uyar, Elkin Urrea:
Testbed for Node Communication in MANETs to Uniformly Cover Unknown Geographical Terrain Using Genetic Algorithms. AHS 2009: 273-280 - 2008
- [j19]M. Ümit Uyar, Samrat S. Batth, Yu Wang, Mariusz A. Fecko:
Algorithms for Modeling a Class of Single Timing Faults in Communication Protocols. IEEE Trans. Computers 57(2): 274-288 (2008) - [j18]Samrat S. Batth, M. Ümit Uyar, Yu Wang, Mariusz A. Fecko:
Fault Modeling and Detection Capabilities for EFSM Models. IEEE Trans. Instrum. Meas. 57(6): 1102-1111 (2008) - [j17]Ibrahim Hökelek, M. Ümit Uyar, Mariusz A. Fecko:
On stability analysis of virtual backbone in mobile ad hoc networks. Wirel. Networks 14(1): 87-102 (2008) - [c25]Cem Safak Sahin, Elkin Urrea, M. Ümit Uyar, Michael Conner, Ibrahim Hökelek, Giorgio Bertoli, Christian Pizzo:
Genetic algorithms for self-spreading nodes in MANETs. GECCO 2008: 1141-1142 - [c24]Cevher Dogan, M. Ümit Uyar, Elkin Urrea, Cem Safak Sahin, Ibrahim Hökelek:
Testbed Implementation of Genetic Algorithms for Self Spreading Nodes in MANETs. GEM 2008: 10-16 - [c23]Elkin Urrea, Cem Safak Sahin, M. Ümit Uyar, Michael Conner, Ibrahim Hökelek, Giorgio Bertoli, Christian Pizzo:
Comparative Evaluation of Genetic Algorithms for Force-Based Self-Deployment of Mobile Agents in Manets. GEM 2008: 90-85 - [c22]Kyriacos C. Mouskos, M. Ümit Uyar, Akira Kawaguchi, Neville Parker:
A real-time integrated transport/communication/database architecture to support traffic simulation. MobiQuitous 2008 - 2007
- [c21]Elkin Urrea, Cem Safak Sahin, M. Ümit Uyar, Michael Conner, Hooshang Sharif, Ibrahim Hökelek, Giorgio Bertoli:
Simulation Experiments for Knowledge Sharing Agents Using Genetic Algorithms in MANETs. Artificial Intelligence and Pattern Recognition 2007: 369-376 - [c20]Samrat S. Batth, Elisangela Rodrigues Vieira, Ana R. Cavalli, M. Ümit Uyar:
Specification of Timed EFSM Fault Models in SDL. FORTE 2007: 50-65 - [c19]Elkin Urrea, Cem Safak Sahin, M. Ümit Uyar, Ibrahim Hökelek, Michael Conner, Giorgio Bertoli, Hooshang Sharif, Christian Pizzo:
Uniform Manet Node Distribution for Mobile Agents Using Genetic Algorithms. GEM 2007: 24-30 - [c18]Xuezhou Ma, Selcuk Cevher, M. Ümit Uyar, Mariusz A. Fecko, John Sucec, Sunil Samtani:
Network Planning for Multicast Using Partitioned Virtual User Domains. MMNS 2007: 113-124 - [c17]I. Hkelek, Jianping Zou, M. Ümit Uyar, A. Abdelal, J. Xiao, N. Chakravarthy, Mariusz A. Fecko, Sunil Samtani:
Testbed Experiments of Dynamic Survivable Resource Pooling Using FPGA-Based Robot. WiMob 2007: 65 - 2006
- [j16]Jianping Zou, M. Ümit Uyar, Mariusz A. Fecko, Sunil Samtani:
Throughput models for SCTP with parallel subflows. Comput. Networks 50(13): 2160-2182 (2006) - [j15]Jianping Zou, M. Ümit Uyar, Mariusz A. Fecko, Sunil Samtani:
Performance evaluation of subflow capable SCTP. Comput. Commun. 29(12): 2413-2432 (2006) - [e3]M. Ümit Uyar, Ali Y. Duale, Mariusz A. Fecko:
Testing of Communicating Systems, 18th IFIP TC6/WG6.1 International Conference, TestCom 2006, New York, NY, USA, May 16-18, 2006, Proceedings. Lecture Notes in Computer Science 3964, Springer 2006, ISBN 3-540-34184-6 [contents] - 2005
- [c16]Ibrahim Hökelek, M. Ümit Uyar, Mariusz A. Fecko:
Random-walk based analysis of virtual backbone in manets. Communications and Computer Networks 2005: 132-137 - [c15]M. Ümit Uyar, Yu Wang, Samrat S. Batth, Adriana Wise, Mariusz A. Fecko:
Timing Fault Models for Systems with Multiple Timers. TestCom 2005: 192-208 - [c14]M. Ümit Uyar, Samrat S. Batth, James J. Allen, William H. Chriss, Eva B. Phillips, Diane Somers, Shahank Sarwate:
Testing industrall VoIP implementations: registration for SIP phones. SIIT 2005: 232-241 - 2004
- [j14]M. Ümit Uyar, Jianliang Zheng, Mariusz A. Fecko, Sunil Samtani, Phillip T. Conrad:
Evaluation of architectures for reliable server pooling in wired and wireless environments. IEEE J. Sel. Areas Commun. 22(1): 164-175 (2004) - [j13]Ali Y. Duale, M. Ümit Uyar:
A Method Enabling Feasible Conformance Test Sequence Generation for EFSM Models. IEEE Trans. Computers 53(5): 614-627 (2004) - [c13]Mariusz A. Fecko, Ulas C. Kozat, Sunil Samtani, M. Ümit Uyar, Ibrahim Hökelek:
Dynamic survivable resource pooling in mobile ad-hoc networks. ISCC 2004: 196-201 - [c12]Jianping Zou, M. Ümit Uyar, Mariusz A. Fecko, Sunil Samtani:
Preferential treatment of SCTP subflows: analysis and simulation. ISCC 2004: 810-815 - 2003
- [j12]M. Ümit Uyar, Mariusz A. Fecko, Ali Y. Duale, Paul D. Amer, Adarshpal S. Sethi:
Experience in developing and testing network protocol software using FDTs. Inf. Softw. Technol. 45(12): 815-835 (2003) - [j11]Mariusz A. Fecko, M. Ümit Uyar, Ali Y. Duale, Paul D. Amer:
A technique to generate feasible tests for communications systems with multiple timers. IEEE/ACM Trans. Netw. 11(5): 796-809 (2003) - [c11]Mariusz A. Fecko, M. Ümit Uyar, Ali Y. Duale:
Towards Testing SDL Specifications: Models and Fault Coverage for Concurrent Timers. FORTE 2003: 273-288 - [c10]M. Ümit Uyar, Jianliang Zheng, Mariusz A. Fecko, Sunil Samtani:
Reliable Server Pooling in Highly Mobile Wireless Networks. ISCC 2003: 627-632 - [c9]M. Ümit Uyar, Jianliang Zheng, Mariusz A. Fecko, Sunil Samtani:
Performance Study of Reliable Server Pooling. NCA 2003: 205-214 - 2000
- [j10]Mariusz A. Fecko, M. Ümit Uyar, Paul D. Amer, Adarshpal S. Sethi:
Conformance testing in systems with semicontrollable interfaces. Ann. des Télécommunications 55(1-2): 70-83 (2000) - [j9]Mariusz A. Fecko, M. Ümit Uyar, Paul D. Amer, Adarshpal S. Sethi, Theodore Dzik, R. Menell, Michael McMahon:
A success story of formal description techniques: Estelle specification and test generation for MIL-STD 188-220. Comput. Commun. 23(12): 1196-1213 (2000) - [c8]Ali Y. Duale, M. Ümit Uyar:
Generation of Feasible Test Sequences for EFSM Models. TestCom 2000: 91- - [c7]Mariusz A. Fecko, Paul D. Amer, M. Ümit Uyar, Ali Y. Duale:
Test Generation in the Presence of Conflicting Timers. TestCom 2000: 301-
1990 – 1999
- 1999
- [j8]M. Ümit Uyar, Mariusz A. Fecko, Adarshpal S. Sethi, Paul D. Amer:
Testing protocols modeled as FSMs with timing parameters. Comput. Networks 31(18): 1967-1988 (1999) - 1998
- [j7]M. Ümit Uyar:
Dual-State Augmentation for Minimizing Conformance Test Costs. Comput. Networks 30(14): 1277-1294 (1998) - [c6]Mariusz A. Fecko, M. Ümit Uyar, Adarshpal S. Sethi, Paul D. Amer:
Issues in conformance testing: multiple semicontrollable interfaces. FORTE 1998: 111-126 - 1994
- [j6]M. Ümit Uyar, Anthony P. Reeves:
Fault Reconfiguration for the Near Neighbor Task in a Multistage-Network MIMD System. J. Parallel Distributed Comput. 22(1): 1-15 (1994) - [e2]Richard L. Tenney, Paul D. Amer, M. Ümit Uyar:
Formal Description Techniques, VI, Proceedings of the IFIP TC6/WG6.1 Sixth International Conference on Formal Description Techniques - FORTE '93, Boston, MA, USA, 26-29 October 1993. IFIP Transactions C-22, North-Holland 1994, ISBN 0-444-81773-5 [contents] - 1993
- [c5]David Lee, Krishan K. Sabnani, David M. Kristol, Sanjoy Paul, M. Ümit Uyar:
Conformance Testing of Protocols Specified as Communicating FSMs. INFOCOM 1993: 115-127 - 1992
- [e1]Richard J. Linn Jr., M. Ümit Uyar:
Protocol Specification, Testing and Verification XII, Proceedings of the IFIP TC6/WG6.1 Twelth International Symposium on Protocol Specification, Testing and Verification, Lake Buena Vista, Florida, USA, 22-25 June 1992. IFIP Transactions C-8, North-Holland 1992, ISBN 0-444-89874-3 [contents] - 1991
- [j5]Barry S. Bosik, M. Ümit Uyar:
Finite State Machine Based Formal Methods in Protocol Conformance Testing: From Theory to Implementation. Comput. Networks ISDN Syst. 22(1): 7-33 (1991) - [j4]Alfred V. Aho, Anton T. Dahbura, David Lee, M. Ümit Uyar:
An optimization technique for protocol conformance test generation based on UIO sequences and rural Chinese postman tours. IEEE Trans. Commun. 39(11): 1604-1615 (1991) - 1990
- [j3]Anton T. Dahbura, Krishan K. Sabnani, M. Ümit Uyar:
Formal methods for generating protocol conformance test sequences. Proc. IEEE 78(8): 1317-1326 (1990)
1980 – 1989
- 1989
- [j2]Krishan K. Sabnani, Aleta M. Lapone, M. Ümit Uyar:
An algorithmic procedure for checking safety properties of protocols. IEEE Trans. Commun. 37(9): 940-948 (1989) - [c4]Joseph R. Cavallaro, Christopher D. Near, M. Ümit Uyar:
Fault-tolerant VLSI processor array for the SVD. ICCD 1989: 176-180 - [c3]Anton T. Dahbura, M. Ümit Uyar, Chi W. Yau:
An Optimal Test Sequence for the JTAG/IEEE P1149.1 Test Access Port Controller. ITC 1989: 55-62 - 1988
- [j1]M. Ümit Uyar, Anthony P. Reeves:
Dynamic Fault Reconfiguration in a Mesh-Connected MIMD Environment. IEEE Trans. Computers 37(10): 1191-1205 (1988) - 1985
- [c2]M. Ümit Uyar, Anthony P. Reeves:
Fault Reconfiguration for the Near Neighbor Problem In a Distributed MIMD Environment. ICDCS 1985: 372-379 - [c1]M. Ümit Uyar, Anthony P. Reeves:
Fault Reconfiguration in a Distributed MIMD Environment with a Multiusage Network. ICPP 1985: 798-806
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-10-01 22:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint