default search action
Wenchao Zhou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Chaoji Zuo, Miao Qiao, Wenchao Zhou, Feifei Li, Dong Deng:
SeRF: Segment Graph for Range-Filtering Approximate Nearest Neighbor Search. Proc. ACM Manag. Data 2(1): 69:1-69:26 (2024) - [j27]Hua Fan, Dachao Fu, Xu Wang, Jiachi Zhang, Chaoji Zuo, Zhengyi Wu, Miao Zhang, Kang Yuan, Xizi Ni, Huo Guocheng, Wenchao Zhou, Feifei Li, Jingren Zhou:
Towards Millions of Database Transmission Services in the Cloud. Proc. VLDB Endow. 17(12): 4001-4013 (2024) - [j26]Ming Gao, Fengfeng Shu, Wenchao Zhou, Huan Li, Yihui Wu, Yue Wang, Shixun Zhao, Zihan Song:
A Rapid Nanofocusing Method for a Deep-Sea Gene Sequencing Microscope Based on Critical Illumination. Sensors 24(15): 5010 (2024) - [j25]Haoze Song, Wenchao Zhou, Heming Cui, Xiang Peng, Feifei Li:
A survey on hybrid transactional and analytical processing. VLDB J. 33(5): 1485-1515 (2024) - [c49]Ziliang Lai, Fan Cui, Hua Fan, Eric Lo, Wenchao Zhou, Feifei Li:
Occam's Razor for Distributed Protocols. SoCC 2024: 618-636 - [c48]Jianjun Deng, Jianan Lu, Hua Fan, Chaoyang Liu, Shi Cheng, Cuiyun Fu, Wenchao Zhou:
TimeCloth: Fast Point-in-Time Database Recovery in The Cloud. SIGMOD Conference Companion 2024: 214-226 - [c47]Wei Li, Jiachi Zhang, Ye Yin, Yan Li, Zhanyang Zhu, Wenchao Zhou, Liang Lin, Feifei Li:
Flux: Decoupled Auto-Scaling for Heterogeneous Query Workload in Alibaba AnalyticDB. SIGMOD Conference Companion 2024: 255-268 - [i5]Nahid Tushar, Rencheng Wu, Yu She, Wenchao Zhou, Wan Shou:
Robot Tape Manipulation for 3D Printing. CoRR abs/2401.08982 (2024) - 2023
- [j24]Jianying Wang, Tongliang Li, Haoze Song, Xinjun Yang, Wenchao Zhou, Feifei Li, Baoyue Yan, Qianqian Wu, Yukun Liang, Chengjun Ying, Yujie Wang, Baokai Chen, Chang Cai, Yubin Ruan, Xiaoyi Weng, Shibin Chen, Liang Yin, Chengzhong Yang, Xin Cai, Hongyan Xing, Nanlong Yu, Xiaofei Chen, Dapeng Huang, Jianling Sun:
PolarDB-IMCI: A Cloud-Native HTAP Database System at Alibaba. Proc. ACM Manag. Data 1(2): 199:1-199:25 (2023) - [j23]Haoze Song, Wenchao Zhou, Feifei Li, Xiang Peng, Heming Cui:
Rethink Query Optimization in HTAP Databases. Proc. ACM Manag. Data 1(4): 256:1-256:27 (2023) - [j22]Xinjun Yang, Yingqiang Zhang, Hao Chen, Chuan Sun, Feifei Li, Wenchao Zhou:
PolarDB-SCC: A Cloud-Native Database Ensuring Low Latency for Strongly Consistent Reads. Proc. VLDB Endow. 16(12): 3754-3767 (2023) - [j21]Ji-You Li, Jiachi Zhang, Wenchao Zhou, Yuhang Liu, Shuai Zhang, Zhuoming Xue, Ding Xu, Hua Fan, Fangyuan Zhou, Feifei Li:
Eigen: End-to-end Resource Optimization for Large-Scale Databases on the Cloud. Proc. VLDB Endow. 16(12): 3795-3807 (2023) - [c46]Mohammad Javad Amiri, Ziliang Lai, Liana Patel, Boon Thau Loo, Eric Lo, Wenchao Zhou:
Saguaro: An Edge Computing-Enabled Hierarchical Permissioned Blockchain. ICDE 2023: 259-272 - [c45]Ziliang Lai, Hua Fan, Wenchao Zhou, Zhanfeng Ma, Xiang Peng, Feifei Li, Eric Lo:
Knock Out 2PC with Practicality Intact: a High-performance and General Distributed Transaction Protocol. ICDE 2023: 2317-2331 - [i4]Ziliang Lai, Hua Fan, Wenchao Zhou, Zhanfeng Ma, Xiang Peng, Feifei Li, Eric Lo:
Knock Out 2PC with Practicality Intact: a High-performance and General Distributed Transaction Protocol (Technical Report). CoRR abs/2302.12517 (2023) - [i3]Jianying Wang, Tongliang Li, Haoze Song, Xinjun Yang, Wenchao Zhou, Feifei Li, Baoyue Yan, Qianqian Wu, Yukun Liang, Chengjun Ying, Yujie Wang, Baokai Chen, Chang Cai, Yubin Ruan, Xiaoyi Weng, Shibin Chen, Liang Yin, Chengzhong Yang, Xin Cai, Hongyan Xing, Nanlong Yu, Xiaofei Chen, Dapeng Huang, Jianling Sun:
PolarDB-IMCI: A Cloud-Native HTAP Database System at Alibaba. CoRR abs/2305.08468 (2023) - 2022
- [j20]Vinayak R. Krishnamurthy, Laxmi Poudel, Matthew Ebert, Daniel H. Weber, Rencheng Wu, Wenchao Zhou, Ergun Akleman, Zhenghui Sha:
LayerLock: Layer-Wise Collision-Free Multi-Robot Additive Manufacturing Using Topologically Interlocked Space-Filling Shapes. Comput. Aided Des. 152: 103392 (2022) - [j19]Zongzhi Chen, Xinjun Yang, Feifei Li, Xuntao Cheng, Qingda Hu, Zheyu Miao, Rongbiao Xie, Xiaofei Wu, Kang Wang, Zhao Song, Haiqing Sun, Zechao Zhuang, Yuming Yang, Jie Xu, Liang Yin, Wenchao Zhou, Sheng Wang:
CloudJump: Optimizing Cloud Databases for Cloud Storages. Proc. VLDB Endow. 15(12): 3432-3444 (2022) - [c44]Jiachi Zhang, Shi Cheng, Zhihui Xue, Jianjun Deng, Cuiyun Fu, Wenchao Zhou, Sheng Wang, Changcheng Chen, Feifei Li:
ESDB: Processing Extremely Skewed Workloads in Real-time. SIGMOD Conference 2022: 2286-2298 - 2021
- [c43]Wenchao Zhou, Yifan Cai, Yanqing Peng, Sheng Wang, Ke Ma, Feifei Li:
VeriDB: An SGX-based Verifiable Database. SIGMOD Conference 2021: 2182-2194 - [i2]Mohammad Javad Amiri, Ziliang Lai, Liana Patel, Boon Thau Loo, Eric Lo, Wenchao Zhou:
Saguaro: Efficient Processing of Transactions in Wide Area Networks using a Hierarchical Permissioned Blockchain. CoRR abs/2101.08819 (2021) - 2020
- [j18]Ziyang Zhang, Laxmi Poudel, Zhenghui Sha, Wenchao Zhou, Dazhong Wu:
Data-Driven Predictive Modeling of Tensile Behavior of Parts Fabricated by Cooperative 3D Printing. J. Comput. Inf. Sci. Eng. 20(2) (2020) - [j17]Laxmi Poudel, Chandler Blair, Jace McPherson, Zhenghui Sha, Wenchao Zhou:
A Heuristic Scaling Strategy for Multi-Robot Cooperative Three-Dimensional Printing. J. Comput. Inf. Sci. Eng. 20(4) (2020) - [j16]Laxmi Poudel, Wenchao Zhou, Zhenghui Sha:
A Generative Approach for Scheduling Multi-Robot Cooperative Three-Dimensional Printing. J. Comput. Inf. Sci. Eng. 20(6) (2020) - [c42]Zhao Zhang, Wenchao Zhou, Micah Sherr:
Bypassing Tor Exit Blocking with Exit Bridge Onion Services. CCS 2020: 3-16 - [c41]Zhao Zhang, Tavish Vaidya, Kartik Subramanian, Wenchao Zhou, Micah Sherr:
Ephemeral Exit Bridges for Tor. DSN 2020: 253-265 - [c40]Shaobo Wang, Hui Lyu, Jiachi Zhang, Chenyuan Wu, Xinyi Chen, Wenchao Zhou, Boon Thau Loo, Susan B. Davidson, Chen Chen:
Provenance for Probabilistic Logic Programs. EDBT 2020: 145-156
2010 – 2019
- 2019
- [j15]Lijuan Zhao, Hongmei Liu, Wenchao Zhou:
A Study on the Dynamic Transmission Law of Spiral Drum Cutting Coal Rock Based on ANSYS/LS-DYNA Simulation. Complex. 2019: 1482051:1-1482051:14 (2019) - 2018
- [j14]Ang Chen, Chen Chen, Lay Kuan Loh, Yang Wu, Andreas Haeberlen, Limin Jia, Boon Thau Loo, Wenchao Zhou:
Data Center Diagnostics with Network Provenance. IEEE Data Eng. Bull. 41(1): 74-85 (2018) - [j13]Kaiwei Li, Wenchao Zhou, Shuwen Zeng:
Optical Micro/Nanofiber-Based Localized Surface Plasmon Resonance Biosensors: Fiber Diameter Dependence. Sensors 18(10): 3295 (2018) - [j12]Lisa Singh, Amol Deshpande, Wenchao Zhou, Arindam Banerjee, Alex J. Bowers, Sorelle A. Friedler, H. V. Jagadish, George Karypis, Zoran Obradovic, Anil Vullikanti, Wangda Zuo:
NSF BIGDATA PI Meeting - Domain-Specific Research Directions and Data Sets. SIGMOD Rec. 47(3): 32-35 (2018) - [c39]Henri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Bob DiMaiolo, Jingyu Qian, Chirag Shah, Yuankai Zhang, Ang Chen, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou:
DeDoS: Defusing DoS with Dispersion Oriented Software. ACSAC 2018: 712-722 - 2017
- [j11]Yuankai Zhang, Adam O'Neill, Micah Sherr, Wenchao Zhou:
Privacy-preserving Network Provenance. Proc. VLDB Endow. 10(11): 1550-1561 (2017) - [c38]Ang Chen, Yang Wu, Andreas Haeberlen, Boon Thau Loo, Wenchao Zhou:
Data Provenance at Internet Scale: Architecture, Experiences, and the Road Ahead. CIDR 2017 - [c37]Ang Chen, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo:
One Primitive to Diagnose Them All: Architectural Support for Internet Diagnostics. EuroSys 2017: 374-388 - [c36]Yang Wu, Ang Chen, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo:
Automated Bug Removal for Software-Defined Networks. NSDI 2017: 719-733 - [c35]Henri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Nik Sultana, Bowen Wang, Jingyu Qian, Yuankai Zhang, Ang Chen, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou:
A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers. SIGCOMM Posters and Demos 2017: 71-73 - [c34]Chen Chen, Harshal Tushar Lehri, Lay Kuan Loh, Anupam Alur, Limin Jia, Boon Thau Loo, Wenchao Zhou:
Distributed Provenance Compression. SIGMOD Conference 2017: 203-218 - [e1]Semih Salihoglu, Wenchao Zhou, Rada Chirkova, Jun Yang, Dan Suciu:
Proceedings of the 2017 ACM International Conference on Management of Data, SIGMOD Conference 2017, Chicago, IL, USA, May 14-19, 2017. ACM 2017, ISBN 978-1-4503-4197-4 [contents] - 2016
- [j10]Henry Tan, Micah Sherr, Wenchao Zhou:
Data-plane Defenses against Routing Attacks on Tor. Proc. Priv. Enhancing Technol. 2016(4): 276-293 (2016) - [j9]Mingchen Zhao, Wenchao Zhou, Alexander J. T. Gurney, Andreas Haeberlen, Micah Sherr, Boon Thau Loo:
Private and Verifiable Interdomain Routing Decisions. IEEE/ACM Trans. Netw. 24(2): 1011-1024 (2016) - [c33]Ang Chen, Akshay Sriraman, Tavish Vaidya, Yuankai Zhang, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou:
Dispersing Asymmetric DDoS Attacks with SplitStack. HotNets 2016: 197-203 - [c32]Ang Chen, Yang Wu, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo:
The Good, the Bad, and the Differences: Better Network Diagnostics with Differential Provenance. SIGCOMM 2016: 115-128 - [c31]Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David A. Wagner, Wenchao Zhou:
Hidden Voice Commands. USENIX Security Symposium 2016: 513-530 - 2015
- [j8]Chen Chen, Limin Jia, Hao Xu, Cheng Luo, Wenchao Zhou, Boon Thau Loo:
A Program Logic for Verifying Secure Routing Protocols. Log. Methods Comput. Sci. 11(4) (2015) - [c30]Ang Chen, Yang Wu, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo:
Differential Provenance: Better Network Diagnostics with Reference Events. HotNets 2015: 25:1-25:7 - [c29]Yang Wu, Ang Chen, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo:
Automated Network Repair with Meta Provenance. HotNets 2015: 26:1-26:7 - [c28]Calvin Newport, Wenchao Zhou:
The (surprising) computational power of the SDN data plane. INFOCOM 2015: 496-504 - [c27]Chen Chen, Lay Kuan Loh, Limin Jia, Wenchao Zhou, Boon Thau Loo:
Automated verification of safety properties of declarative networking programs. PPDP 2015: 79-90 - 2014
- [j7]Micah Sherr, Harjot Gill, Taher Saeed, Andrew Mao, William R. Marczak, Saravana Soundararajan, Wenchao Zhou, Boon Thau Loo, Matt Blaze:
The design and implementation of the A3 application-aware anonymity platform. Comput. Networks 58: 206-227 (2014) - [c26]Chen Chen, Limin Jia, Hao Xu, Cheng Luo, Wenchao Zhou, Boon Thau Loo:
A Program Logic for Verifying Secure Routing Protocols. FORTE 2014: 117-132 - [c25]Chen Chen, Limin Jia, Wenchao Zhou, Boon Thau Loo:
Proof-based Verification of Software Defined Networks. ONS 2014 - [c24]Anduo Wang, Wenchao Zhou, Brighten Godfrey, Matthew Caesar:
Software-Defined Networks as Databases. ONS 2014 - [c23]Ang Chen, W. Brad Moore, Hanjun Xiao, Andreas Haeberlen, Linh Thi Xuan Phan, Micah Sherr, Wenchao Zhou:
Detecting Covert Timing Channels with Time-Deterministic Replay. OSDI 2014: 541-554 - [c22]Yang Wu, Mingchen Zhao, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo:
Diagnosing missing events in distributed systems with negative provenance. SIGCOMM 2014: 383-394 - [p1]Wenchao Zhou:
Towards a Data-Centric Approach to Attribution in the Cloud. Secure Cloud Computing 2014: 271-301 - 2013
- [j6]Wenchao Zhou, Tao Tao, Boon Thau Loo, Yun Mao:
Declarative secure distributed information systems. Comput. Lang. Syst. Struct. 39(1): 1-24 (2013) - [j5]Todd J. Green, Shan Shan Huang, Boon Thau Loo, Wenchao Zhou:
Datalog and Recursive Query Processing. Found. Trends Databases 5(2): 105-195 (2013) - [j4]Badrish Chandramouli, Suman Nath, Wenchao Zhou:
Supporting Distributed Feed-Following Apps over Edge Devices. Proc. VLDB Endow. 6(13): 1570-1581 (2013) - [c21]Jordan Wilberding, Andrew Yates, Micah Sherr, Wenchao Zhou:
Validating web content with senser. ACSAC 2013: 339-348 - [c20]Yang Wu, Andreas Haeberlen, Wenchao Zhou, Boon Thau Loo:
Answering why-not queries in software-defined networks with negative provenance. HotNets 2013: 3:1-3:7 - [c19]David DeBoer, Wenchao Zhou, Lisa Singh:
Using substructure mining to identify misbehavior in network provenance graphs. GRADES 2013: 6 - 2012
- [b1]Boon Thau Loo, Wenchao Zhou:
Declarative Networking. Synthesis Lectures on Data Management, Morgan & Claypool Publishers 2012, ISBN 978-3-031-00758-3 - [j3]Wenchao Zhou, Suyog Mapara, Yiqing Ren, Yang Li, Andreas Haeberlen, Zachary G. Ives, Boon Thau Loo, Micah Sherr:
Distributed Time-aware Provenance. Proc. VLDB Endow. 6(2): 49-60 (2012) - [j2]Anduo Wang, Limin Jia, Wenchao Zhou, Yiqing Ren, Boon Thau Loo, Jennifer Rexford, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott:
FSR: formal analysis and implementation toolkit for safe interdomain routing. IEEE/ACM Trans. Netw. 20(6): 1814-1827 (2012) - [c18]Chen Chen, Limin Jia, Boon Thau Loo, Wenchao Zhou:
Reduction-based security analysis of Internet routing protocols. ICNP 2012: 1-6 - [c17]Boon Thau Loo, Harjot Gill, Changbin Liu, Yun Mao, William R. Marczak, Micah Sherr, Anduo Wang, Wenchao Zhou:
Recent Advances in Declarative Networking. PADL 2012: 1-16 - [c16]Mingchen Zhao, Wenchao Zhou, Alexander J. T. Gurney, Andreas Haeberlen, Micah Sherr, Boon Thau Loo:
Private and verifiable interdomain routing decisions. SIGCOMM 2012: 383-394 - [c15]Badrish Chandramouli, Joris Claessens, Suman Nath, Ivo Santos, Wenchao Zhou:
RACE: real-time applications over cloud-edge. SIGMOD Conference 2012: 625-628 - 2011
- [c14]Alexander J. T. Gurney, Andreas Haeberlen, Wenchao Zhou, Micah Sherr, Boon Thau Loo:
Having your cake and eating it too: routing security with privacy protections. HotNets 2011: 15 - [c13]Yiqing Ren, Wenchao Zhou, Anduo Wang, Limin Jia, Alexander J. T. Gurney, Boon Thau Loo, Jennifer Rexford:
FSR: formal analysis and implementation toolkit for safe inter-domain routing. SIGCOMM 2011: 440-441 - [c12]Adam Silberstein, Russell Sears, Wenchao Zhou, Brian F. Cooper:
A batch of PNUTS: experiences connecting cloud batch and serving systems. SIGMOD Conference 2011: 1101-1112 - [c11]Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, Andreas Haeberlen, Zachary G. Ives, Boon Thau Loo, Micah Sherr:
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems. SIGMOD Conference 2011: 1323-1326 - [c10]Wenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, Micah Sherr:
Secure network provenance. SOSP 2011: 295-310 - [c9]Wenchao Zhou, Ling Ding, Andreas Haeberlen, Zachary G. Ives, Boon Thau Loo:
TAP: Time-aware Provenance for Distributed Systems. TaPP 2011 - 2010
- [j1]Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Zachary G. Ives, Boon Thau Loo:
Maintaining Recursive Views of Regions and Connectivity in Networks. IEEE Trans. Knowl. Data Eng. 22(8): 1126-1141 (2010) - [c8]Wenchao Zhou, Micah Sherr, William R. Marczak, Zhuoyao Zhang, Tao Tao, Boon Thau Loo, Insup Lee:
Towards a data-centric view of cloud security. CloudDB@CIKM 2010: 25-32 - [c7]Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo, Matt Blaze:
A3: An Extensible Platform for Application-Aware Anonymity. NDSS 2010 - [c6]Wenchao Zhou, Micah Sherr, Tao Tao, Xiaozhou Li, Boon Thau Loo, Yun Mao:
Efficient querying and maintenance of network provenance at internet-scale. SIGMOD Conference 2010: 615-626
2000 – 2009
- 2009
- [c5]William R. Marczak, David Zook, Wenchao Zhou, Molham Aref, Boon Thau Loo:
Declarative Reconfigurable Trust Management. CIDR 2009 - [c4]Wenchao Zhou, Yun Mao, Boon Thau Loo, Martín Abadi:
Unified Declarative Platform for Secure Netwoked Information Systems. ICDE 2009: 150-161 - [c3]Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Zachary G. Ives, Boon Thau Loo:
Recursive Computation of Regions and Connectivity in Networks. ICDE 2009: 1108-1119 - [c2]Wenchao Zhou, Oleg Sokolsky, Boon Thau Loo, Insup Lee:
DMaC: Distributed Monitoring and Checking. RV 2009: 184-201 - [i1]William R. Marczak, David Zook, Wenchao Zhou, Molham Aref, Boon Thau Loo:
Declarative Reconfigurable Trust Management. CoRR abs/0909.1759 (2009) - 2008
- [c1]Wenchao Zhou, Eric Cronin, Boon Thau Loo:
Provenance-aware secure networks. ICDE Workshops 2008: 188-193
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint