default search action
Imtiaz Ahmad
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j82]Ali Kelkawi, Imtiaz Ahmad, Mohammed El-Abd:
Spark-based cooperative coevolution for large scale global optimization. Clust. Comput. 27(2): 1911-1926 (2024) - [j81]Lamis Abdo, Imtiaz Ahmad, Sa'ed Abed:
A smart admission control and cache replacement approach in content delivery networks. Clust. Comput. 27(3): 2427-2445 (2024) - [j80]Ameer Mohammed, Ziad Tariq Muhammad Ali, Imtiaz Ahmad:
Enhancing adversarial robustness with randomized interlayer processing. Expert Syst. Appl. 245: 123085 (2024) - [j79]Adnan Rashid, Ayesha Gauhar, Osman Hasan, Sa'ed Abed, Imtiaz Ahmad:
Formal Verification of Universal Numbers using Theorem Proving. J. Electron. Test. 40(3): 329-345 (2024) - [j78]Ibad Ullah, Nigar Ali, Ihtisham Ul Haq, Imtiaz Ahmad, Mohammed Daher Albalwi, Md. Haider Ali Biswas:
Analysis of COVID-19 Disease Model: Backward Bifurcation and Impact of Pharmaceutical and Nonpharmaceutical Interventions. Int. J. Math. Math. Sci. 2024: 6069996:1-6069996:17 (2024) - [j77]Ziad Ur Rehman, Salah Mahmoud Boulaaras, Rashid Jan, Imtiaz Ahmad, Salma Bahramand:
Computational analysis of financial system through non-integer derivative. J. Comput. Sci. 75: 102204 (2024) - [j76]Imtiaz Ahmad, Muhammad Adnan, Noor Ul Amin, Asif Umer, Adnan Khurshid, Khursheed Aurangzeb, Muhammad Gulistan:
Adaptive and Priority-Based Data Aggregation and Scheduling Model for Wireless Sensor Network. Knowl. Based Syst. 303: 112393 (2024) - [j75]Ziad Tariq Muhammad Ali, Ameer Mohammed, Imtiaz Ahmad:
Vulnerability of Deep Forest to Adversarial Attacks. IEEE Trans. Inf. Forensics Secur. 19: 5464-5475 (2024) - [c14]Albatool Wazzan, Imtiaz Ahmad, Stephen MacNeil, Richard Souvenir:
Context or Clutter? Efficiently Matching Objects Across Scenes. ICMR 2024: 404-413 - 2023
- [j74]Maryam AlJame, Aisha Alnoori, Mohammad Gh. AlFailakawi, Imtiaz Ahmad:
A Spark-Based Parallel Implementation of Arithmetic Optimization Algorithm. Int. J. Appl. Metaheuristic Comput. 14(1): 1-27 (2023) - [j73]Ali Kelkawi, Mohammed El-Abd, Imtiaz Ahmad:
GPU-based cooperative coevolution for large-scale global optimization. Neural Comput. Appl. 35(6): 4621-4642 (2023) - [c13]Zainab Abualhassan, Ehtesham Hassan, Imtiaz Ahmad, Sa'ed Abed:
Epileptic Seizure Detection Using Novel CNN with Residual Connections. IDSTA 2023: 116-125 - 2022
- [j72]Ziad Tariq Muhammad Ali, Ameer Mohammed, Imtiaz Ahmad:
Evaluating Adversarial Robustness of Secret Key-Based Defenses. IEEE Access 10: 34872-34882 (2022) - [j71]Husain Sharaf, Imtiaz Ahmad, Tassos Dimitriou:
Extended Berkeley Packet Filter: An Application Perspective. IEEE Access 10: 126370-126393 (2022) - [j70]Junaid Ahmad, Kifayat Ullah, Imtiaz Ahmad, Muhammad Arshad, Nantapat Jarasthitikulchai, Weerawat Sudsutad:
Some Iterative Approximation Results of F Iteration Process in Banach Spaces. Axioms 11(4): 153 (2022) - [j69]Mohammad Alshayeji, Bader BehBehani, Imtiaz Ahmad:
Spark-based parallel processing whale optimization algorithm. Concurr. Comput. Pract. Exp. 34(4) (2022) - [j68]Sakhi Zaman, Siraj-ul-Islam, Muhammad Munib Khan, Imtiaz Ahmad:
New algorithms for approximation of Bessel transforms with high frequency parameter. J. Comput. Appl. Math. 399: 113705 (2022) - [j67]Imtiaz Ahmad, Mohammad Gh. AlFailakawi, Asayel AlMutawa, Latifa Alsalman:
Container scheduling techniques: A Survey and assessment. J. King Saud Univ. Comput. Inf. Sci. 34(7): 3934-3947 (2022) - [j66]Jassim Al-Fadhli, Ali Jaragh, Mohammad Gh. AlFailakawi, Imtiaz Ahmad:
FP-SMA: an adaptive, fluctuant population strategy for slime mould algorithm. Neural Comput. Appl. 34(13): 11163-11175 (2022) - [j65]Imtiaz Ahmad, Taslima Akter, Zachary Buher, Rosta Farzan, Apu Kapadia, Adam J. Lee:
Tangible Privacy for Smart Voice Assistants: Bystanders' Perceptions of Physical Device Controls. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-31 (2022) - [j64]Sabid Bin Habib Pias, Imtiaz Ahmad, Taslima Akter, Apu Kapadia, Adam J. Lee:
Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and 'Trusted' Platforms. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-30 (2022) - 2021
- [j63]Hala R. Al-Faisal, Imtiaz Ahmad, Ayed A. Salman, Mohammad Gh. Alfailakawi:
Adaptation of Population Size in Sine Cosine Algorithm. IEEE Access 9: 25258-25277 (2021) - [j62]Mohammad Gh. AlFailakawi, Maryam AlJame, Imtiaz Ahmad:
Parallel and Distributed Implementation of Sine Cosine Algorithm on Apache Spark Platform. IEEE Access 9: 77188-77202 (2021) - [j61]Dalal Aloraifan, Imtiaz Ahmad, Ebrahim A. Alrashed:
Deep learning based network traffic matrix prediction. Int. J. Intell. Networks 2: 46-56 (2021) - [j60]Sa'ed Abed, Areej A. Abdelaal, Mohammad H. Alshayeji, Imtiaz Ahmad:
SAT-based and CP-based declarative approaches for Top-Rank-K closed frequent itemset mining. Int. J. Intell. Syst. 36(1): 112-151 (2021) - [j59]Mohamad Khattar Awad, Marwa Hassan Hafez Ahmed, Ali F. Almutairi, Imtiaz Ahmad:
Machine Learning-Based Multipath Routing for Software Defined Networks. J. Netw. Syst. Manag. 29(2): 18 (2021) - [c12]Mousa Al Sulaimi, Imtiaz Ahmad, Mohammad Jeragh:
Deep Image Captioning Survey: A Resource Availability Perspective. FRUCT 2021: 3-13 - 2020
- [j58]Maryam AlJame, Imtiaz Ahmad, Mohammad AlFailakawi:
Apache Spark Implementation of Whale Optimization Algorithm. Clust. Comput. 23(3): 2021-2034 (2020) - [j57]Muhammad Naeem Jan, Nigar Ali, Gul Zaman, Imtiaz Ahmad, Zahir Shah, Poom Kumam:
HIV-1 infection dynamics and optimal control with Crowley-Martin function response. Comput. Methods Programs Biomed. 193: 105503 (2020) - [j56]Hijaz Ahmad, Tufail A. Khan, Predrag S. Stanimirovic, Yu-Ming Chu, Imtiaz Ahmad:
Modified Variational Iteration Algorithm-II: Convergence and Applications to Diffusion Models. Complex. 2020: 8841718:1-8841718:14 (2020) - [j55]Mahmoud Imdoukh, Imtiaz Ahmad, Mohammad Gh. Alfailakawi:
Optimizing scheduling decisions of container management tool using many-objective genetic algorithm. Concurr. Comput. Pract. Exp. 32(5) (2020) - [j54]Mahmoud Imdoukh, Imtiaz Ahmad, Mohammad Gh. AlFailakawi:
Machine learning-based auto-scaling for containerized applications. Neural Comput. Appl. 32(13): 9745-9760 (2020) - [j53]Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, Adam J. Lee:
Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy. Proc. ACM Hum. Comput. Interact. 4(CSCW2): 116:1-116:28 (2020) - [j52]Imtiaz Ahmad, Hijaz Ahmad, Phatiphat Thounthong, Yu-Ming Chu, Clemente Cesarano:
Solution of Multi-Term Time-Fractional PDE Models Arising in Mathematical Biology and Physics by Local Meshless Method. Symmetry 12(7): 1195 (2020)
2010 – 2019
- 2019
- [j51]Sari Sultan, Imtiaz Ahmad, Tassos Dimitriou:
Container Security: Issues, Challenges, and the Road Ahead. IEEE Access 7: 52976-52996 (2019) - [j50]Zahraa N. Abdullah, Imtiaz Ahmad, Iftekhar Hussain:
Segment Routing in Software Defined Networks: A Survey. IEEE Commun. Surv. Tutorials 21(1): 464-486 (2019) - [j49]Yasser H. Khalil, Mohammad Alshayeji, Imtiaz Ahmad:
Distributed Whale Optimization Algorithm based on MapReduce. Concurr. Comput. Pract. Exp. 31(1) (2019) - [j48]Mohammad Gh. AlFailakawi, Mohammed El-Shafei, Imtiaz Ahmad, Ayed A. Salman:
FPGA-based implementation of cuckoo search. IET Comput. Digit. Tech. 13(1): 28-37 (2019) - [j47]Muhammad Ahsan, Imtiaz Ahmad, Masood Ahmad, Iltaf Hussian:
A numerical Haar wavelet-finite difference hybrid method for linear and non-linear Schrödinger equation. Math. Comput. Simul. 165: 13-25 (2019) - [j46]Imtiaz Ahmad, Muhammad Riaz, Muhammad Ayaz, Muhammad Arif, Saeed Islam, Poom Kumam:
Numerical Simulation of Partial Differential Equations via Local Meshless Method. Symmetry 11(2): 257 (2019) - [j45]Imtiaz Ahmad, Muhammad Ahsan, Iltaf Hussain, Poom Kumam, Wiyada Kumam:
Numerical Simulation of PDEs by Local Meshless Differential Quadrature Collocation Method. Symmetry 11(3): 394 (2019) - [c11]Khazam Alhamdan, Tassos Dimitriou, Imtiaz Ahmad:
Attack on a Scheme for Obfuscating and Outsourcing SAT Computations to the Cloud. ICETE (2) 2019: 356-362 - 2018
- [j44]Suood Abdulaziz Al-Roomi, Imtiaz Ahmad, Tassos Dimitriou:
Secure localization using hypothesis testing in wireless networks. Ad Hoc Networks 74: 47-56 (2018) - [j43]Sa'ed Abed, Yasser H. Khalil, Mahdi Modhaffar, Imtiaz Ahmad:
High-performance low-power approximate Wallace tree multiplier. Int. J. Circuit Theory Appl. 46(12): 2334-2348 (2018) - [j42]Zainab AlSaeed, Imtiaz Ahmad, Iftekhar Hussain:
Multicasting in software defined networks: A comprehensive survey. J. Netw. Comput. Appl. 104: 61-77 (2018) - [j41]Mohammed El-Shafei, Imtiaz Ahmad, Mohammad Gh. Alfailakawi:
Hardware accelerator for solving 0-1 knapsack problems using binary harmony search. Int. J. Parallel Emergent Distributed Syst. 33(1): 87-102 (2018) - [c10]Mohammad Gh. Alfailakawi, Imtiaz Ahmad, Sarah Elghandour:
Energy-Efficient Dynamic Data Encoding for Multi-level STT-MRAM. VLSID 2018: 428-433 - 2017
- [j40]Imtiaz Ahmad, Siraj-ul-Islam, Abdul Q. M. Khaliq:
Local RBF method for multi-dimensional partial differential equations. Comput. Math. Appl. 74(2): 292-324 (2017) - [j39]Sa'ed Abed, Imtiaz Ahmad, Mohammad H. Al Shayeji, Sari Sultan:
Automatic verification of single-electron transistor arrays based on multiway decision graphs. IET Circuits Devices Syst. 11(4): 395-403 (2017) - [j38]Imtiaz Ahmad, Mahmoud Imdoukh, Mohammad AlFailakawi:
Extending multi-level STT-MRAM cell lifetime by minimising two-step and hard state transitions in hot bits. IET Comput. Digit. Tech. 11(6): 214-220 (2017) - [j37]Imtiaz Ahmad, Areej Hamouda, Mohammad AlFailakawi:
Odd/Even Invert coding for phase change memory with thermal crosstalk. Microprocess. Microsystems 49: 150-163 (2017) - [j36]Shaikhah AlEbrahim, Imtiaz Ahmad:
Task scheduling for heterogeneous computing systems. J. Supercomput. 73(6): 2313-2338 (2017) - [j35]Anwar Alyatama, Imtiaz Ahmad, Naelah A. Al-Dabbous:
Memory allocation algorithm for cloud services. J. Supercomput. 73(11): 5006-5033 (2017) - [c9]Mariam Safar, Imtiaz Ahmad, Anwar K. Al-Yatama:
Energy-Aware Computation Offloading in Wearable Computing. ICCA 2017: 266-278 - 2016
- [j34]Mohammad AlFailakawi, Imtiaz Ahmad, Suha A. Hamdan:
Harmony-search algorithm for 2D nearest neighbor quantum circuits realization. Expert Syst. Appl. 61: 16-27 (2016) - [j33]Faruk Karaaslan, Imtiaz Ahmad, Aman Ullah:
Bipolar soft groups. J. Intell. Fuzzy Syst. 31(1): 651-662 (2016) - [j32]Mohammed El-Shafei, Imtiaz Ahmad, Mohammad AlFailakawi:
Implementation of harmony search on embedded platform. Microprocess. Microsystems 45: 187-197 (2016) - [j31]Rana W. Alaskar, Imtiaz Ahmad, Anwar Alyatama:
Offline routing and spectrum allocation algorithms for elastic optical networks. Opt. Switch. Netw. 21: 79-92 (2016) - [j30]Eman AlQuraishi, Eman AlDwaisan, Alaa AlSaqaa, Imtiaz Ahmad:
A CUDA-based parallel implementation of a test vectors encoding algorithm in compression-based scan designs. Int. J. Parallel Emergent Distributed Syst. 31(3): 280-293 (2016) - 2015
- [j29]Ayed A. Salman, Imtiaz Ahmad, Mahamed G. H. Omran:
A metaheuristic algorithm to solve satellite broadcast scheduling problem. Inf. Sci. 322: 72-91 (2015) - [j28]Ayed A. Salman, Mahamed G. H. Omran, Imtiaz Ahmad:
Adaptive probabilistic harmony search for binary optimization problems. Memetic Comput. 7(4): 291-316 (2015) - [j27]Mohammad AlFailakawi, Imtiaz Ahmad, Laila AlTerkawi, Suha A. Hamdan:
Depth optimization for topological quantum circuits. Quantum Inf. Process. 14(2): 447-463 (2015) - 2013
- [j26]Ayed A. Salman, Imtiaz Ahmad, Hanaa Al-Rushood, Suha A. Hamdan:
Solving the task assignment problem using Harmony Search algorithm. Evol. Syst. 4(3): 153-169 (2013) - [j25]Mohammad AlFailakawi, Laila AlTerkawi, Imtiaz Ahmad, Suha A. Hamdan:
Line ordering of reversible circuits for linear nearest neighbor realization. Quantum Inf. Process. 12(10): 3319-3339 (2013) - [c8]May Al-Roomi, Ayed A. Salman, Imtiaz Ahmad:
Analyzing MBSA Performance Using NetLogo. EMS 2013: 67-72 - 2012
- [j24]Imtiaz Ahmad, Mohammad Gh. Mohammad, Ayed A. Salman, Suha A. Hamdan:
Broadcast scheduling in packet radio networks using Harmony Search algorithm. Expert Syst. Appl. 39(1): 1526-1535 (2012) - 2010
- [j23]Ayed A. Salman, Imtiaz Ahmad, Mahamed G. H. Omran, Mohammad Gh. Mohammad:
Frequency assignment problem in satellite communications using differential evolution. Comput. Oper. Res. 37(12): 2152-2163 (2010) - [j22]Imtiaz Ahmad, Muhammad K. Dhodhi, Ishfaq Ahmad:
Multiprocessor Scheduling by Simulated Evolution. J. Softw. 5(10): 1128-1136 (2010)
2000 – 2009
- 2008
- [j21]Imtiaz Ahmad, Buthaina Al-Kazemi, A. Shoba Das:
An Efficient Algorithm to Find Broadcast Schedule in Ad Hoc TDMA Networks. J. Comput. Networks Commun. 2008: 712126:1-712126:10 (2008) - 2007
- [j20]Imtiaz Ahmad, A. Shoba Das:
Analysis and Detection Of Errors In Implementation Of SHA-512 Algorithms On FPGAs. Comput. J. 50(6): 728-738 (2007) - 2006
- [j19]Imtiaz Ahmad, Faridah M. Ali, A. Shoba Das:
Synthesis of finite state machines for improved state verification. Comput. Electr. Eng. 32(5): 349-363 (2006) - 2005
- [j18]Imtiaz Ahmad, A. Shoba Das:
Hardware implementation analysis of SHA-256 and SHA-512 algorithms on FPGAs. Comput. Electr. Eng. 31(6): 345-360 (2005) - 2003
- [j17]Imtiaz Ahmad:
HARD: A hypercube embedding algorithm for state assignment of finite state machines. Comput. Electr. Eng. 29(2): 327-356 (2003) - 2002
- [j16]Muhammad K. Dhodhi, Imtiaz Ahmad, Anwar K. Al-Yatama, Ishfaq Ahmad:
An Integrated Technique for Task Matching and Scheduling onto Distributed Heterogeneous Computing Systems. J. Parallel Distributed Comput. 62(9): 1338-1361 (2002) - [j15]Ayed A. Salman, Imtiaz Ahmad, Sabah Al-Madani:
Particle swarm optimization for task assignment problem. Microprocess. Microsystems 26(8): 363-371 (2002) - [c7]Rana Ejaz Ahmed, Robin Cardan, Imtiaz Ahmad:
Pattern-oriented channel assignment (POCA) scheme for cellular systems. VTC Spring 2002: 1059-1063 - 2001
- [j14]Imtiaz Ahmad, A. Shoba Das:
A heuristic algorithm for the minimization of incompletely specified finite state machines. Comput. Electr. Eng. 27(2): 159-172 (2001) - [j13]Imtiaz Ahmad:
A distributed algorithm for finding prime compatibles on network of workstations. Microprocess. Microsystems 25(4): 195-202 (2001) - 2000
- [j12]Imtiaz Ahmad, Muhammad K. Dhodhi, Faridah M. Ali:
TLS: A Tabu Search Based Scheduling Algorithm for Behavioral Synthesis of Functional Pipelines. Comput. J. 43(2): 152-166 (2000) - [j11]Imtiaz Ahmad, Faridah M. Ali, Raza Ul-Mustafa:
An integrated state assignment and flip-flop selection technique for FSM synthesis. Microprocess. Microsystems 24(3): 141-152 (2000)
1990 – 1999
- 1999
- [j10]Muhammad K. Dhodhi, John A. Saghri, Imtiaz Ahmad, Raza Ul-Mustafa:
D-ISODATA: A Distributed Algorithm for Unsupervised Classification of Remotely Sensed Data on Network of Workstations. J. Parallel Distributed Comput. 59(2): 280-301 (1999) - [c6]Imtiaz Ahmad, Raza Ul-Mustafa:
On State Assignment of Finite State Machines Using Hypercube Embedding Approach. ICCD 1999: 608-613 - 1998
- [j9]Faridah M. Ali, Imtiaz Ahmad:
Register-file allocation via graph coloring. Microprocess. Microsystems 21(9): 523-532 (1998) - 1996
- [j8]Khaled Al-Saqabi, Kassem Saleh, Imtiaz Ahmad:
Recovery From Concurrent Failures in Communication Protocols. J. Syst. Softw. 35(1): 55-65 (1996) - [j7]Imtiaz Ahmad, Muhammad K. Dhodhi:
Multiprocessor Scheduling in a Genetic Paradigm. Parallel Comput. 22(3): 395-406 (1996) - 1995
- [j6]Imtiaz Ahmad, Muhammad K. Dhodhi:
On the m-Way Graph Partitioning Problem. Comput. J. 38(3): 237-244 (1995) - [j5]Kassem Saleh, Imtiaz Ahmad, Khaled Al-Saqabi, Anjali Agarwal:
Recovery Approach to the Design of Stabilizing Communication Protocols. Comput. Commun. 18(4): 276-287 (1995) - [j4]Imtiaz Ahmad, Muhammad K. Dhodhi:
Task assignment using a problem-space genetic algorithm. Concurr. Pract. Exp. 7(5): 411-428 (1995) - [j3]Muhammad K. Dhodhi, Imtiaz Ahmad, Robert H. Storer:
SHEMUS: synthesis of heterogeneous multiprocessor systems. Microprocess. Microsystems 19(6): 311-319 (1995) - [j2]Imtiaz Ahmad, Muhammad K. Dhodhi, Kassem Saleh:
An evolutionary technique for local microcode compaction. Microprocess. Microsystems 19(8): 467-474 (1995) - [c5]Muhammad K. Dhodhi, Imtiaz Ahmad, Kassem Saleh:
Task Scheduling Using an Evolutionary Technique. Parallel and Distributed Computing and Systems 1995: 21-23 - 1994
- [j1]Kassem Saleh, Imtiaz Ahmad, Khaled Al-Saqabi, Anjali Agarwal:
An efficient recovery procedure for fault tolerance in distributed systems. J. Syst. Softw. 25(1): 39-50 (1994) - [c4]Muhammad K. Dhodhi, Imtiaz Ahmad, C. Y. Roger Chen:
Synthesis of Application-Specific Multiprocessor Systems. EDAC-ETC-EUROASIC 1994: 671 - 1992
- [c3]Imtiaz Ahmad, C. Y. Roger Chen:
A heuristic for data path synthesis using multiport memories. Great Lakes Symposium on VLSI 1992: 44-51 - 1991
- [c2]Imtiaz Ahmad, C. Y. Roger Chen:
Post-Processor for Data Path Synthesis Using Multiport Memories. ICCAD 1991: 276-279
1970 – 1979
- 1973
- [c1]Jan Polek, Imtiaz Ahmad:
Investigation of the mechanisms for interprocess communication. ACM Annual Conference 1973
Coauthor Index
aka: Mohammad Gh. AlFailakawi
aka: Mohammad Gh. Mohammad
aka: Mohammad Gh. Alfailakawi
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint