default search action
Khaled El Emam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j69]Lamin Juwara, Alaa El-Hussuna, Khaled El Emam:
An evaluation of synthetic data augmentation for mitigating covariate bias in health data. Patterns 5(4): 100946 (2024) - 2022
- [j68]Ali Sepas, Ali Haider Bangash, Omar Alraoui, Khaled El Emam, Alaa El-Hussuna:
Algorithms to anonymize structured medical and healthcare data: A systematic review. Frontiers Bioinform. 2 (2022) - [j67]Adam Kardash, Suzanne Morin, Khaled El Emam:
The Practices and Challenges of Generating Nonidentifiable Data. IEEE Secur. Priv. 20(1): 113-118 (2022) - 2021
- [j66]Jules Polonetsky, Tim Sparapani, Khaled El Emam:
A Review of the Privacy-Enhancing Technologies Software Market. IEEE Secur. Priv. 19(6): 119-122 (2021) - [j65]Khaled El Emam, Lucy Mosquera, Chaoyi Zheng:
Optimizing the synthesis of clinical trial data using sequential trees. J. Am. Medical Informatics Assoc. 28(1): 3-13 (2021) - 2020
- [j64]Khaled El Emam:
Seven Ways to Evaluate the Utility of Synthetic Data. IEEE Secur. Priv. 18(4): 56-59 (2020)
2010 – 2019
- 2018
- [j63]Anthony L. Vaccarino, Moyez Dharsee, Stephen C. Strother, Don Aldridge, Stephen R. Arnott, Brendan Behan, Costas Dafnas, Fan Dong, Kenneth Edgecombe, Rachad El-Badrawi, Khaled El Emam, Tom Gee, Susan G. Evans, Mojib Javadi, Francis Jeanson, Shannon Lefaivre, Kristen Lutz, F. Chris MacPhee, Jordan Mikkelsen, Tom Mikkelsen, Nicholas Mirotchnick, Tanya Schmah, Christa M. Studzinski, Donald T. Stuss, Elizabeth Theriault, Kenneth R. Evans:
Brain-CODE: A Secure Neuroinformatics Platform for Management, Federation, Sharing and Analysis of Multi-Dimensional Neuroscience Data. Frontiers Neuroinformatics 12: 28 (2018) - 2017
- [j62]Geoffrey M. Jacquez, Aleksander Essex, Andrew Curtis, Betsy Kohler, Recinda Sherman, Khaled El Emam, Chen Shi, Andy Kaufmann, Linda Beale, Thomas W. Cusick, Daniel W. Goldberg, Pierre Goovaerts:
Geospatial cryptography: enabling researchers to access private, spatially referenced, human subjects data for cancer control and prevention. J. Geogr. Syst. 19(3): 197-220 (2017) - 2016
- [j61]Khaled El Emam:
Medical Data Privacy Handbook, A. Gkoulalas-Divanis, G. Loukides. Springer International Publishing, Switzerland (2015) 832 pp., ISBN: 978-3-319-23633-9. J. Biomed. Informatics 62: 106 (2016) - [j60]Martin Scaiano, Grant Middleton, Luk Arbuckle, Varada Kolhatkar, Liam Peyton, Moira Dowling, Debbie S. Gipson, Khaled El Emam:
A unified framework for evaluating the risk of re-identification of text de-identification tools. J. Biomed. Informatics 63: 174-183 (2016) - 2015
- [j59]Khaled El Emam, Hanna Farah, Saeed Samet, Aleksander Essex, Elizabeth Jonker, Murat Kantarcioglu, Craig Earle:
A privacy preserving protocol for tracking participants in phase I clinical trials. J. Biomed. Informatics 57: 145-162 (2015) - [c35]Hanna Farah, Daniel Amyot, Khaled El Emam:
Common Length Name Representation: An Efficient Privacy-Preserving Scheme. TELERISE@ICSE 2015: 44-49 - [c34]Hanna Farah, Daniel Amyot, Khaled El Emam:
Efficient Privacy-Preserving Identity Scheme for Electronic Validation of Phase 1 Clinical Trials. MCETECH 2015: 183-196 - 2014
- [c33]Hanna Farah, Daniel Amyot, Khaled El Emam:
Real-World Data Set Parameters and Synthesization for Matching Identity in Clinical Protocols. CBMS 2014: 263-266 - [c32]Hanna Farah, Daniel Amyot, Khaled El Emam:
A Tool for Simple and Efficient Clinical Protocol Evaluation. CBMS 2014: 499-500 - [c31]Fida Kamal Dankar, Khaled El Emam, Stan Matwin:
Efficient Private Information Retrieval for Geographical Aggregation. EUSPN/ICTH 2014: 497-502 - 2013
- [j58]Bradley A. Malin, Khaled El Emam, Christine M. O'Keefe:
Biomedical data privacy: problems, perspectives, and recent advances. J. Am. Medical Informatics Assoc. 20(1): 2-6 (2013) - [j57]Maja van der Velden, Khaled El Emam:
"Not all my friends need to know": a qualitative study of teenage patients, privacy, and social media. J. Am. Medical Informatics Assoc. 20(1): 16-24 (2013) - [j56]Khaled El Emam, Saeed Samet, Luk Arbuckle, Robyn Tamblyn, Craig Earle, Murat Kantarcioglu:
A secure distributed logistic regression protocol for the detection of rare adverse drug events. J. Am. Medical Informatics Assoc. 20(3): 453-461 (2013) - [j55]Khaled El Emam, Fida Kamal Dankar, Angelica Neisa, Elizabeth Jonker:
Evaluating the risk of patient re-identification from adverse drug event reports. BMC Medical Informatics Decis. Mak. 13: 114 (2013) - [j54]Fida Kamal Dankar, Khaled El Emam:
Practicing Differential Privacy in Health Care: A Review. Trans. Data Priv. 6(1): 35-67 (2013) - [c30]Fida Kamal Dankar, Khaled El Emam:
A theoretical model for obfuscating web navigation trails. EDBT/ICDT Workshops 2013: 137-144 - [c29]Victoria Bobicev, Marina Sokolova, Khaled El Emam, Stan Matwin:
Authorship Attribution in Health Forums. RANLP 2013: 74-82 - 2012
- [j53]Fida Kamal Dankar, Khaled El Emam, Angelica Neisa, Tyson Roffey:
Estimating the re-identification risk of clinical data sets. BMC Medical Informatics Decis. Mak. 12: 66 (2012) - [c28]Fida Kamal Dankar, Khaled El Emam:
The application of differential privacy to health data. EDBT/ICDT Workshops 2012: 158-166 - 2011
- [j52]Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, Murat Kantarcioglu, Bradley A. Malin, David L. Buckeridge, Saeed Samet, Craig Earle:
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance. J. Am. Medical Informatics Assoc. 18(3): 212-217 (2011) - [j51]Khaled El Emam, David L. Buckeridge, Robyn Tamblyn, Angelica Neisa, Elizabeth Jonker, Aman Verma:
The re-identification risk of Canadians from longitudinal demographics. BMC Medical Informatics Decis. Mak. 11: 46 (2011) - [j50]Khaled El Emam, David Paton, Fida Kamal Dankar, Günes Koru:
De-identifying a public use microdata file from the Canadian national discharge abstract database. BMC Medical Informatics Decis. Mak. 11: 53 (2011) - 2010
- [j49]Günes Koru, Hongfang Liu, Dongsong Zhang, Khaled El Emam:
Testing the theory of relative defect proneness for closed-source software. Empir. Softw. Eng. 15(6): 577-598 (2010) - [j48]Khaled El Emam:
Risk-Based De-Identification of Health Data. IEEE Secur. Priv. 8(3): 64-67 (2010) - [j47]Khaled El Emam, Emilio Neri, Elizabeth Jonker, Marina Sokolova, Liam Peyton, Angelica Neisa, Teresa Scassa:
The inadvertent disclosure of personal health information through peer-to-peer file sharing programs. J. Am. Medical Informatics Assoc. 17(2): 148-158 (2010) - [j46]Khaled El Emam, Ann Brown, Philip AbdelMalik, Angelica Neisa, Mark Walker, Jim Bottomley, Tyson Roffey:
A method for managing re-identification risk from small geographic areas in Canada. BMC Medical Informatics Decis. Mak. 10: 18 (2010) - [j45]Akif Günes Koru, Khaled El Emam:
The Theory of Relative Dependency: Higher Coupling Concentration in Smaller Modules. IEEE Softw. 27(2): 81-89 (2010) - [c27]Marina Sokolova, Khaled El Emam, Sadrul Chowdhury, Emilio Neri, Sean Rose, Elizabeth Jonker:
Evaluation of Rare Event Detection. Canadian AI 2010: 379-383 - [c26]Fida Kamal Dankar, Khaled El Emam:
A method for evaluating marketer re-identification risk. EDBT/ICDT Workshops 2010
2000 – 2009
- 2009
- [j44]Patricia Kosseim, Khaled El Emam:
Privacy Interests in Prescription Data, Part I: Prescriber Privacy. IEEE Secur. Priv. 7(1): 72-76 (2009) - [j43]Khaled El Emam, Patricia Kosseim:
Privacy Interests in Prescription Data, Part 2: Patient Privacy. IEEE Secur. Priv. 7(2): 75-78 (2009) - [j42]Khaled El Emam, Ann Brown, Philip AbdelMalik:
Model Formulation: Evaluating Predictors of Geographic Area Population Size Cut-offs to Manage Re-identification Risk. J. Am. Medical Informatics Assoc. 16(2): 256-266 (2009) - [j41]Khaled El Emam, Fida Kamal Dankar, Romeo Issa, Elizabeth Jonker, Daniel Amyot, Elise Cogo, Jean-Pierre Corriveau, Mark Walker, Sadrul Chowdhury, Regis Vaillancourt, Tyson Roffey, Jim Bottomley:
Research Paper: A Globally Optimal k-Anonymity Method for the De-Identification of Health Data. J. Am. Medical Informatics Assoc. 16(5): 670-682 (2009) - [j40]Akif Günes Koru, Dongsong Zhang, Khaled El Emam, Hongfang Liu:
An Investigation into the Functional Form of the Size-Defect Relationship for Software Modules. IEEE Trans. Software Eng. 35(2): 293-304 (2009) - [c25]Yu Fu, Akif Günes Koru, Zhiyuan Chen, Khaled El Emam:
A tree-based approach to preserve the privacy of software engineering data and predictive models. PROMISE 2009: 3 - 2008
- [j39]Akif Günes Koru, Khaled El Emam, Dongsong Zhang, Hongfang Liu, Divya Mathew:
Theory of relative defect proneness. Empir. Softw. Eng. 13(5): 473-498 (2008) - [j38]Khaled El Emam:
Heuristics for De-identifying Health Data. IEEE Secur. Priv. 6(4): 58-61 (2008) - [j37]Khaled El Emam, Fida Kamal Dankar:
Research Paper: Protecting Privacy Using k-Anonymity. J. Am. Medical Informatics Assoc. 15(5): 627-637 (2008) - [j36]Khaled El Emam, Akif Günes Koru:
A Replicated Survey of IT Software Project Failures. IEEE Softw. 25(5): 84-90 (2008) - 2007
- [j35]Terence P. Rout, Khaled El Emam, Mario Fusani, Dennis R. Goldenson, Ho-Won Jung:
SPICE in retrospect: Developing a standard for process assessment. J. Syst. Softw. 80(9): 1483-1493 (2007) - 2006
- [p1]Khaled El Emam:
An Overview of Process Improvement in Small Settings. Web Engineering 2006: 261-275 - 2004
- [j34]Khaled El Emam, Anita D. Carleton:
Applications of statistics in software engineering. J. Syst. Softw. 73: 181-182 (2004) - [c24]Grigori Melnik, Khaled El Emam:
Third International Workshop on Empirical Evaluation of Agile Methods ("The Data Workshop"). XP/Agile Universe 2004: 188-189 - 2002
- [j33]Khaled El Emam, Saïda Benlarbi, Nishith Goel, Walcélio L. Melo, Hakim Lounis, Shesh N. Rai:
The Optimal Class Size for Object-Oriented Software. IEEE Trans. Software Eng. 28(5): 494-509 (2002) - [j32]Barbara A. Kitchenham, Shari Lawrence Pfleeger, Lesley Pickard, Peter W. Jones, David C. Hoaglin, Khaled El Emam, Jarrett Rosenberg:
Preliminary Guidelines for Empirical Research in Software Engineering. IEEE Trans. Software Eng. 28(8): 721-734 (2002) - 2001
- [j31]Khaled El Emam, Dennis R. Goldenson, James McCurley, James D. Herbsleb:
Modelling the Likelihood of Software Process Improvement: An Exploratory Study. Empir. Softw. Eng. 6(3): 207-229 (2001) - [j30]Khaled El Emam:
Ethics and Open Source. Empir. Softw. Eng. 6(4): 291-292 (2001) - [j29]Khaled El Emam, Saïda Benlarbi, Nishith Goel, Shesh N. Rai:
Comparing case-based reasoning classifiers for predicting high risk software components. J. Syst. Softw. 55(3): 301-320 (2001) - [j28]Khaled El Emam, Walcélio L. Melo, Javam C. Machado:
The prediction of faulty classes using object-oriented design metrics. J. Syst. Softw. 56(1): 63-75 (2001) - [j27]Khaled El Emam, Ho-Won Jung:
An empirical evaluation of the ISO/IEC 15504 assessment model. J. Syst. Softw. 59(1): 23-41 (2001) - [j26]Ho-Won Jung, Robin Hunter, Dennis R. Goldenson, Khaled El Emam:
Findings from Phase 2 of the SPICE trials. Softw. Process. Improv. Pract. 6(4): 205-242 (2001) - [j25]Oliver Laitenberger, Khaled El Emam, Thomas G. Harbich:
An Internally Replicated Quasi-Experimental Comparison of Checklist and Perspective-Based Reading of Code Documents. IEEE Trans. Software Eng. 27(5): 387-421 (2001) - [j24]Khaled El Emam, Saïda Benlarbi, Nishith Goel, Shesh N. Rai:
The Confounding Effect of Class Size on the Validity of Object-Oriented Metrics. IEEE Trans. Software Eng. 27(7): 630-650 (2001) - [j23]Khaled El Emam, Oliver Laitenberger:
Evaluating Capture-Recapture Models with Two Inspectors. IEEE Trans. Software Eng. 27(9): 851-864 (2001) - [j22]Kevin Strike, Khaled El Emam, Nazim H. Madhavji:
Software Cost Estimation with Incomplete Data. IEEE Trans. Software Eng. 27(10): 890-908 (2001) - [c23]Khaled El Emam:
A Primer on Object-Oriented Measurement. IEEE METRICS 2001: 185- - 2000
- [j21]Khaled El Emam, Dennis R. Goldenson:
An empirical review of software process assessments. Adv. Comput. 53: 319-423 (2000) - [j20]Khaled El Emam, Andreas Birk:
Validating the ISO/IEC 15504 measures of software development process capability. J. Syst. Softw. 51(2): 119-149 (2000) - [j19]Khaled El Emam, Iñigo Garro:
Estimating the extent of standards use: the case of ISO/IEC 15504. J. Syst. Softw. 53(2): 137-143 (2000) - [j18]Oliver Laitenberger, Colin Atkinson, Maud Schlich, Khaled El Emam:
An experimental comparison of reading techniques for defect detection in UML design documents. J. Syst. Softw. 53(2): 183-204 (2000) - [j17]Khaled El Emam, Oliver Laitenberger, Thomas G. Harbich:
The application of subjective estimates of effectiveness to controlling software inspections. J. Syst. Softw. 54(2): 119-136 (2000) - [j16]Xiamong Zhong, Nazim H. Madhavji, Khaled El Emam:
Critical Factors Affecting Personal Software Processes. IEEE Softw. 17(6): 76-83 (2000) - [j15]Lionel C. Briand, Khaled El Emam, Bernd G. Freimut, Oliver Laitenberger:
A Comprehensive Evaluation of Capture-Recapture Models for Estimating Software Defect Content. IEEE Trans. Software Eng. 26(6): 518-540 (2000) - [j14]Khaled El Emam, Andreas Birk:
Validating the ISO/IEC 15504 Measure of Software Requirements Analysis Process Capability. IEEE Trans. Software Eng. 26(6): 541-566 (2000) - [c22]Saïda Benlarbi, Khaled El Emam, Nishith Goel, Shesh N. Rai:
Thresholds for Object-Oriented Measures. ISSRE 2000: 24-39
1990 – 1999
- 1999
- [j13]Khaled El Emam:
Benchmarking Kappa: Interrater Agreement in Software Process Assessments. Empir. Softw. Eng. 4(2): 113-133 (1999) - [c21]Lionel C. Briand, Khaled El Emam, Isabella Wieczorek:
Explaining the Cost of European Space and Military Projects. ICSE 1999: 303-312 - [c20]Lionel C. Briand, Khaled El Emam, Dagmar Surmann, Isabella Wieczorek, Katrina Maxwell:
An Assessment and Comparison of Common Software Cost Estimation Modeling Techniques. ICSE 1999: 313-322 - [c19]Oliver Laitenberger, Marek Leszak, Dieter Stoll, Khaled El Emam:
Quantitative Modeling of Software Reviews in an Industrial Setting. IEEE METRICS 1999: 312- - 1998
- [j12]Pierfrancesco Fusaro, Khaled El Emam, Bob Smith:
The Internal Consistencies of the 1987 SEI Maturity Questionnaire and the SPICE Capability Dimension. Empir. Softw. Eng. 3(2): 179-201 (1998) - [c18]Lionel C. Briand, Khaled El Emam, Oliver Laitenberger, Thomas Fussbroich:
Using Simulation to Build Inspection Efficiency Benchmarks for Development Projects. ICSE 1998: 340-349 - [c17]Lionel C. Briand, Khaled El Emam, Frank Bomarius:
COBRA: A Hybrid Method for Software Cost Estimation, Benchmarking, and Risk Assessment. ICSE 1998: 390-399 - [c16]Lionel C. Briand, Khaled El Emam, Bernd G. Freimut:
A comparison and integration of capture-recapture models and the detection profile method. ISSRE 1998: 32-41 - [c15]Khaled El Emam, Isabella Wieczorek:
The repeatability of code defect classifications. ISSRE 1998: 322-333 - [c14]Khaled El Emam, Jean-Martin Simon, Sonia Rousseau, Eric Jacquet:
Cost Implications of Interrater Agreement for Software Process Assessments. IEEE METRICS 1998: 38-51 - [c13]Khaled El Emam:
The Internal Consistency of the ISO/IEC 15504 Software Process Capability Scale. IEEE METRICS 1998: 72- - [c12]Khaled El Emam:
The Predictive Validity Criterion for Evaluating Binary Classifiers. IEEE METRICS 1998: 235- - 1997
- [j11]Lionel C. Briand, Khaled El Emam, Sandro Morasca:
Reply to ''Comments to the Paper: Briand, El Emam, Morasca: On the Application of Measurement Theory in Software Engineering. Empir. Softw. Eng. 2(3): 317-322 (1997) - [j10]Khaled El Emam, Pierfrancesco Fusaro:
Fraunhofer Institute for Experimental Software Engineering. Softw. Process. Improv. Pract. 3(1): 59-61 (1997) - [j9]Jean-Martin Simon, Khaled El Emam, Sonia Rousseau, Eric Jacquet, Frederic Babey:
The reliability of ISO/IEC PDTR 15504 assessments. Softw. Process. Improv. Pract. 3(3): 177-188 (1997) - [c11]Victor R. Basili, Steven E. Condon, Khaled El Emam, Robert B. Hendrick, Walcélio L. Melo:
Characterizing and Modeling the Cost of Rework in a Library of Reusable Software Components. ICSE 1997: 282-291 - [c10]Khaled El Emam, Dirk Höltje, Nazim H. Madhavji:
Causal Analysis of the Requirements Change Process for a Large System. ICSM 1997: 214-221 - [c9]Lionel C. Briand, Khaled El Emam, Bernd G. Freimut, Oliver Laitenberger:
Quantitative evaluation of capture-recapture models to control software inspections. ISSRE 1997: 234-244 - [c8]Pierfrancesco Fusaro, Khaled El Emam, Bob Smith:
Evaluating the Interrater Agreement of Process Capability Ratings. IEEE METRICS 1997: 2-11 - 1996
- [j8]Lionel C. Briand, Khaled El Emam, Sandro Morasca:
On the application of measurement theory in software engineering. Empir. Softw. Eng. 1(1): 61-88 (1996) - [j7]Khaled El Emam, Nazim H. Madhavji:
An instrument for measuring the success of the requirements engineering process in information systems development. Empir. Softw. Eng. 1(3): 201-240 (1996) - [j6]Khaled El Emam, Soizic Quintin, Nazim H. Madhavji:
User Participation in the Requirements Engineering Process: An Empirical Study. Requir. Eng. 1(1): 4-26 (1996) - [j5]Khaled El Emam, Nazim H. Madhavji:
Does Organizational Maturity Improve Quality? IEEE Softw. 13(5): 109-110 (1996) - [j4]Lionel C. Briand, Khaled El Emam:
Software Engineering R&D group at CRIM. Softw. Process. Improv. Pract. 2(1): 73-74 (1996) - [j3]Khaled El Emam, Dennis R. Goldenson:
An Empirical Evaluation of the Prospective International SPICE Standard. Softw. Process. Improv. Pract. 2(2): 123-148 (1996) - [j2]Khaled El Emam, Barry Shostak, Nazim H. Madhavji:
Centre de Recherche Informatique de Montreal. Softw. Process. Improv. Pract. 2(2): 155-158 (1996) - [j1]Khaled El Emam, Lionel C. Briand, Robert Smith:
Assessor agreement in rating SPICE processes. Softw. Process. Improv. Pract. 2(4): 291-306 (1996) - 1995
- [c7]Graciela Pérez, Khaled El Emam, Nazim H. Madhavji:
Customising Software Process Models. EWSPT 1995: 70-78 - [c6]Khaled El Emam, Nazim H. Madhavji:
A field study of requirements engineering practices in information systems development. RE 1995: 68-80 - [c5]Khaled El Emam, Nazim H. Madhavji:
Measuring the success of requirements engineering processes. RE 1995: 204-213 - 1993
- [c4]Khaled El Emam, Nadir Moukheiber, Nazim H. Madhavji:
An empirical evaluation of the G/Q/M method. CASCON 1993: 265-289 - [c3]Rudolf K. Keller, Richard Lajoie, Nazim H. Madhavji, Tilmann F. W. Bruckhaus, Kamel Toubache, Won-Kook Hong, Khaled El Emam:
A Comprehensive Process Model for Studying Software Process Papers. ICSE 1993: 78-88 - [c2]Khaled El Emam, Nazim H. Madhavji, Kamel Toubache:
Empirically Driven Improvement of Generic Process Models. ISPW 1993: 61-65 - 1992
- [c1]Nazim H. Madhavji, John E. Botsford, Tilmann F. W. Bruckhaus, Khaled El Emam:
Quantitative Measurements based on Process and Context Models. Experimental Software Engineering Issues 1992: 67-72
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint