default search action
Aakash Ahmad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j32]Mst Shamima Aktar, Peng Liang, Muhammad Waseem, Amjed Tahir, Aakash Ahmad, Beiqi Zhang, Zengyang Li:
Architecture decisions in quantum software systems: An empirical study on Stack Exchange and GitHub. Inf. Softw. Technol. 177: 107587 (2025) - [j31]Xiyu Zhou, Peng Liang, Beiqi Zhang, Zengyang Li, Aakash Ahmad, Mojtaba Shahin, Muhammad Waseem:
Exploring the problems, their causes and solutions of AI pair programming: A study on GitHub and Stack Overflow. J. Syst. Softw. 219: 112204 (2025) - 2024
- [j30]Aakash Ahmad, Ahmed B. Altamimi, Jamal Aqib:
A reference architecture for quantum computing as a service. J. King Saud Univ. Comput. Inf. Sci. 36(6): 102094 (2024) - [j29]Asif Iqbal, Siffat Ullah Khan, Mahmood Niazi, Mamoona Humayun, Najm Us Sama, Arif Ali Khan, Aakash Ahmad:
Advancing database security: a comprehensive systematic mapping study of potential challenges. Wirel. Networks 30(7): 6399-6426 (2024) - [c24]Muhammad Waseem, Teerath Das, Aakash Ahmad, Peng Liang, Tommi Mikkonen:
Issues and Their Causes in WebAssembly Applications: An Empirical Study. EASE 2024: 170-180 - [c23]Muhammad Waseem, Teerath Das, Aakash Ahmad, Peng Liang, Mahdi Fahmideh, Tommi Mikkonen:
ChatGPT as a Software Development Bot: A Project-Based Study. ENASE 2024: 406-413 - [i31]Zeeshan Rasheed, Muhammad Waseem, Aakash Ahmad, Kai-Kristian Kemell, Xiaofeng Wang, Anh Nguyen-Duc, Pekka Abrahamsson:
Can Large Language Models Serve as Data Analysts? A Multi-Agent Assisted Approach for Qualitative Data Analysis. CoRR abs/2402.01386 (2024) - [i30]Muhammad Waseem, Aakash Ahmad, Peng Liang, Muhammad Azeem Akbar, Arif Ali Khan, Iftikhar Ahmad, Manu Setälä, Tommi Mikkonen:
Containerization in Multi-Cloud Environment: Roles, Strategies, Challenges, and Solutions for Effective Implementation. CoRR abs/2403.12980 (2024) - [i29]Bakheet Aljedaani, Aakash Ahmad, Mahdi Fahmideh, Arif Ali Khan, Jun Shen:
An Exploration Study on Developing Blockchain Systems the Practitioners Perspective. CoRR abs/2407.18005 (2024) - [i28]Muhammad Waseem, Tommi Mikkonen, Aakash Ahmad, Muhammad Taimoor Khan, Majid Haghparast, Vlad Stirbu, Peng Liang:
QADL: Prototype of Quantum Architecture Description Language. CoRR abs/2410.19770 (2024) - 2023
- [j28]Muzammil Ahmed, Ahmed B. Altamimi, Wilayat Khan, Mohammad Salih Alsaffar, Aakash Ahmad, Zawar H. Khan, Abdulrahman Alreshidi:
PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using Machine Learning. IEEE Access 11: 61249-61263 (2023) - [j27]Mahdi Fahmideh, John C. Grundy, Aakash Ahmad, Jun Shen, Jun Yan, Davoud Mougouei, Peng Wang, Aditya Ghose, Anuradha Gunawardana, Uwe Aickelin, Babak Abedin:
Engineering Blockchain-based Software Systems: Foundations, Survey, and Future Directions. ACM Comput. Surv. 55(6): 110:1-110:44 (2023) - [j26]Beiqi Zhang, Peng Liang, Xiyu Zhou, Aakash Ahmad, Muhammad Waseem:
Demystifying Practices, Challenges and Expected Features of Using GitHub Copilot. Int. J. Softw. Eng. Knowl. Eng. 33(11&12): 1653-1672 (2023) - [j25]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
An empirical study on secure usage of mobile health apps: The attack simulation approach. Inf. Softw. Technol. 163: 107285 (2023) - [j24]Abdul Razzaq, Aakash Ahmad, Asad Waqar Malik, Mahdi Fahmideh, Rabie A. Ramadan:
Software engineering for internet of underwater things to analyze oceanic data. Internet Things 24: 100893 (2023) - [j23]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
End-users' knowledge and perception about security of clinical mobile health apps: A case study with two Saudi Arabian mHealth providers. J. Syst. Softw. 195: 111519 (2023) - [j22]Arif Ali Khan, Aakash Ahmad, Muhammad Waseem, Peng Liang, Mahdi Fahmideh, Tommi Mikkonen, Pekka Abrahamsson:
Software architecture for quantum computing systems - A systematic review. J. Syst. Softw. 201: 111682 (2023) - [j21]Aakash Ahmad, Asad Waqar Malik, Abdulrahman A. Alshdadi, Wilayat Khan, Maryam Sajjad:
Adaptive Security for Self-Protection of Mobile Computing Devices. Mob. Networks Appl. 28(2): 1-20 (2023) - [j20]Arif Ali Khan, Muhammad Azeem Akbar, Mahdi Fahmideh, Peng Liang, Muhammad Waseem, Aakash Ahmad, Mahmood Niazi, Pekka Abrahamsson:
AI Ethics: An Empirical Study on the Views of Practitioners and Lawmakers. IEEE Trans. Comput. Soc. Syst. 10(6): 2971-2984 (2023) - [c22]Aakash Ahmad, Muhammad Waseem, Peng Liang, Mahdi Fahmideh, Mst Shamima Aktar, Tommi Mikkonen:
Towards Human-Bot Collaborative Software Architecting with ChatGPT. EASE 2023: 279-285 - [c21]Arif Ali Khan, Muhammad Azeem Akbar, Aakash Ahmad, Mahdi Fahmideh, Mohammad Shameem, Valtteri Lahtinen, Muhammad Waseem, Tommi Mikkonen:
Agile Practices for Quantum Software Development: Practitioners' Perspectives. QSW 2023: 9-20 - [c20]Beiqi Zhang, Peng Liang, Xiyu Zhou, Aakash Ahmad, Muhammad Waseem:
Practices and Challenges of Using GitHub Copilot: An Empirical Study. SEKE 2023: 124-129 - [i27]Muhammad Waseem, Peng Liang, Aakash Ahmad, Arif Ali Khan, Mojtaba Shahin, Pekka Abrahamsson, Ali Rezaei Nasab, Tommi Mikkonen:
Understanding the Issues, Their Causes and Solutions in Microservices Systems: An Empirical Study. CoRR abs/2302.01894 (2023) - [i26]Aakash Ahmad, Muhammad Waseem, Peng Liang, Mahdi Fahmideh, Mst Shamima Aktar, Tommi Mikkonen:
Towards Human-Bot Collaborative Software Architecting with ChatGPT. CoRR abs/2302.14600 (2023) - [i25]Beiqi Zhang, Peng Liang, Xiyu Zhou, Aakash Ahmad, Muhammad Waseem:
Practices and Challenges of Using GitHub Copilot: An Empirical Study. CoRR abs/2303.08733 (2023) - [i24]Aakash Ahmad, Muhammad Waseem, Peng Liang, Mahdi Fahmideh, Arif Ali Khan, David Georg Reichelt, Tommi Mikkonen:
Engineering Software Systems for Quantum Computing as a Service: A Mapping Study. CoRR abs/2303.14713 (2023) - [i23]Aakash Ahmad, Ahmed B. Altamimi, Jamal Aqib:
A Reference Architecture for Quantum Computing as a Service. CoRR abs/2306.04578 (2023) - [i22]Beiqi Zhang, Peng Liang, Xiyu Zhou, Aakash Ahmad, Muhammad Waseem:
Demystifying Practices, Challenges and Expected Features of Using GitHub Copilot. CoRR abs/2309.05687 (2023) - [i21]Muhammad Waseem, Teerath Das, Aakash Ahmad, Mahdi Fahmideh, Peng Liang, Tommi Mikkonen:
Using ChatGPT throughout the Software Development Life Cycle by Novice Developers. CoRR abs/2310.13648 (2023) - [i20]Muhammad Waseem, Teerath Das, Aakash Ahmad, Peng Liang, Tommi Mikkonen:
Understanding the Issues and Causes in WebAssembly Application Development: A Mining-based Study. CoRR abs/2311.00646 (2023) - [i19]Xiyu Zhou, Peng Liang, Beiqi Zhang, Zengyang Li, Aakash Ahmad, Mojtaba Shahin, Muhammad Waseem:
On the Concerns of Developers When Using GitHub Copilot. CoRR abs/2311.01020 (2023) - [i18]Mst Shamima Aktar, Peng Liang, Muhammad Waseem, Amjed Tahir, Aakash Ahmad, Beiqi Zhang, Zengyang Li:
Architecture Decisions in Quantum Software Systems: An Empirical Study on Stack Exchange and GitHub. CoRR abs/2312.05421 (2023) - 2022
- [j19]Mahdi Fahmideh, Aakash Ahmad, Ali Behnaz, John Grundy, Willy Susilo:
Software Engineering for Internet of Things: The Practitioners' Perspective. IEEE Trans. Software Eng. 48(8): 2857-2878 (2022) - [c19]Arif Ali Khan, Sher Badshah, Peng Liang, Muhammad Waseem, Bilal Khan, Aakash Ahmad, Mahdi Fahmideh, Mahmood Niazi, Muhammad Azeem Akbar:
Ethics of AI: A Systematic Literature Review of Principles and Challenges. EASE 2022: 383-392 - [c18]Muhammad Waseem, Peng Liang, Aakash Ahmad, Mojtaba Shahin, Arif Ali Khan, Gastón Márquez:
Decision Models for Selecting Patterns and Strategies in Microservices Systems and their Evaluation by Practitioners. ICSE (SEIP) 2022: 135-144 - [c17]Mahdi Fahmideh, Ghassan Beydoun, Madhushi Niluka Bandara, Aakash Ahmad, Arif Ali Khan, Anup Shrestha:
Role of ontologies in beach safety management analytics systems. PACIS 2022: 101 - [c16]Arif Ali Khan, Mahdi Fahmideh, Aakash Ahmad, Muhammad Waseem, Mahmood Niazi, Valtteri Lahtinen, Tommi Mikkonen:
Embracing iterations in Quantum software: a vision. QP4SE@ESEC/SIGSOFT FSE 2022: 11-14 - [c15]Aakash Ahmad, Arif Ali Khan, Muhammad Waseem, Mahdi Fahmideh, Tommi Mikkonen:
Towards Process Centered Architecting for Quantum Software Systems. QSW 2022: 26-31 - [i17]Muhammad Waseem, Peng Liang, Aakash Ahmad, Mojtaba Shahin, Arif Ali Khan, Gastón Márquez:
Decision Models for Selecting Patterns and Strategies in Microservices Systems and their Evaluation by Practitioners. CoRR abs/2201.05825 (2022) - [i16]Arif Ali Khan, Aakash Ahmad, Muhammad Waseem, Peng Liang, Mahdi Fahmideh, Tommi Mikkonen, Pekka Abrahamsson:
Software Architecture for Quantum Computing Systems - A Systematic Review. CoRR abs/2202.05505 (2022) - [i15]Mahdi Fahmideh, Jun Yan, Jun Shen, Aakash Ahmad, Davoud Mougouei, Anup Shrestha:
Knowledge Management for Cloud Computing Field. CoRR abs/2202.07875 (2022) - [i14]Arif Ali Khan, Muhammad Azeem Akbar, Muhammad Waseem, Mahdi Fahmideh, Aakash Ahmad, Peng Liang, Mahmood Niazi, Pekka Abrahamsson:
AI Ethics: Software Practitioners and Lawmakers Points of View. CoRR abs/2207.01493 (2022) - [i13]Arif Ali Khan, Muhammad Azeem Akbar, Aakash Ahmad, Mahdi Fahmideh, Mohammad Shameem, Valtteri Lahtinen, Muhammad Waseem, Tommi Mikkonen:
Agile Practices for Quantum Software Development: Practitioners Perspectives. CoRR abs/2210.09825 (2022) - [i12]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Study on Secure Usage of Mobile Health Apps: The Attack Simulation Approach. CoRR abs/2211.07585 (2022) - 2021
- [j18]Aakash Ahmad, Mahdi Fahmideh, Ahmed B. Altamimi, Iyad A. Katib, Aiiad Albeshri, Abdulrahman Alreshidi, Adwan Alownie Alanazi, Rashid Mehmood:
Software Engineering for IoT-Driven Data Analytics Applications. IEEE Access 9: 48197-48217 (2021) - [j17]Ibrahim Alseadoon, Aakash Ahmad, Adel Alkhalil, Khalid Sultan:
Migration of existing software systems to mobile computing platforms: a systematic mapping study. Frontiers Comput. Sci. 15(2): 152204 (2021) - [j16]Aakash Ahmad, Adel Alkhalil, Ahmed B. Altamimi, Khalid Sultan, Wilayat Khan:
Modernizing Legacy Software as Context - Sensitive and Portable Mobile-Enabled Application. IT Prof. 23(1): 42-50 (2021) - [j15]Wilayat Khan, Aakash Ahmad, Aamir Qamar, Muhammad Kamran, Muhammad Altaf:
SpoofCatch: A Client-Side Protection Tool Against Phishing Attacks. IT Prof. 23(2): 65-74 (2021) - [j14]Aakash Ahmad, Adel Alkhalil, Ahmed B. Altamimi, Khalid Sultan, Wilayat Khan:
Corrections to "Modernizing Legacy Software as Context-Sensitive and Portable Mobile-Enabled Application". IT Prof. 23(3): 110 (2021) - [j13]Chiara Boldrini, Aakash Ahmad, Mahdi Fahmideh, Rabie Ramadan, Mohamed F. Younis:
Special Issue on IoT for Fighting COVID-19. Pervasive Mob. Comput. 77: 101492 (2021) - [c14]Muhammad Waseem, Peng Liang, Mojtaba Shahin, Aakash Ahmad, Ali Rezaei Nasab:
On the Nature of Issues in Five Open Source Microservices Systems: An Empirical Study. EASE 2021: 201-210 - [c13]Aakash Ahmad, Madhushi Niluka Bandara, Mahdi Fahmideh, Henderik A. Proper, Giancarlo Guizzardi, Jeffrey Soar:
An Overview of Ontologies and Tool Support for COVID-19 Analytics. EDOC Workshops 2021: 1-8 - [c12]Muhammad Waseem, Peng Liang, Gastón Márquez, Mojtaba Shahin, Arif Ali Khan, Aakash Ahmad:
A Decision Model for Selecting Patterns and Strategies to Decompose Applications into Microservices. ICSOC 2021: 850-858 - [i11]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
End-Users' Knowledge and Perception about Security of Mobile Health Apps: An Empirical Study. CoRR abs/2101.10412 (2021) - [i10]Aakash Ahmad, Mahdi Fahmideh, Ahmed B. Altamimi, Iyad A. Katib, Aiiad Albeshri, Abdulrahman Alreshidi, Adwan Alanazi, Rashid Mehmood:
Software Engineering for IoT-Driven Data Analytics Applications. CoRR abs/2103.11192 (2021) - [i9]Muhammad Waseem, Peng Liang, Mojtaba Shahin, Aakash Ahmad, Ali Rezaei Nasab:
On the Nature of Issues in Five Open Source Microservices Systems: An Empirical Study. CoRR abs/2104.12192 (2021) - [i8]Mahdi Fahmideh, Jun Yan, Jun Shen, Davoud Mougouei, Yanlong Zhai, Aakash Ahmad:
A Comprehensive Framework for Analyzing IoT Platforms: A Smart City Industrial Experience. CoRR abs/2105.01877 (2021) - [i7]Muhammad Waseem, Peng Liang, Gastón Márquez, Mojtaba Shahin, Arif Ali Khan, Aakash Ahmad:
A Decision Model for Selecting Patterns and Strategies to Decompose Applications into Microservices. CoRR abs/2110.03889 (2021) - [i6]Aakash Ahmad, Madhushi Niluka Bandara, Mahdi Fahmideh, Henderik A. Proper, Giancarlo Guizzardi, Jeffrey Soar:
An Overview of Ontologies and Tool Support for COVID-19 Analytics. CoRR abs/2110.06397 (2021) - 2020
- [j12]Leonardo Horn Iwaya, Aakash Ahmad, Muhammad Ali Babar:
Security and Privacy for mHealth and uHealth Systems: A Systematic Mapping Study. IEEE Access 8: 150081-150112 (2020) - [j11]Maryam Sajjad, Aakash Ahmad, Asad Waqar Malik, Ahmed B. Altamimi, Ibrahim Alseadoon:
Classification and Mapping of Adaptive Security for Mobile Computing. IEEE Trans. Emerg. Top. Comput. 8(3): 814-832 (2020) - [c11]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Study on Developing Secure Mobile Health Apps: The Developers' Perspective. APSEC 2020: 208-217 - [c10]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
Security Awareness of End-Users of Mobile Health Applications: An Empirical Study. MobiQuitous 2020: 125-136 - [i5]Leonardo Horn Iwaya, Aakash Ahmad, Muhammad Ali Babar:
Security and Privacy for mHealth and uHealth Systems: a Systematic Mapping Study. CoRR abs/2006.12069 (2020) - [i4]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Study on Developing Secure Mobile Health Apps: The Developers Perspective. CoRR abs/2008.03034 (2020) - [i3]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
Security Awareness of End-Users of Mobile Health Applications: An Empirical Study. CoRR abs/2008.13009 (2020)
2010 – 2019
- 2019
- [j10]Wilayat Khan, Muhammad Kamran, Aakash Ahmad, Farrukh Aslam Khan, Abdelouahid Derhab:
Formal Analysis of Language-Based Android Security Using Theorem Proving Approach. IEEE Access 7: 16550-16560 (2019) - [j9]Abdulrahman Alreshidi, Aakash Ahmad:
Architecting Software for the Internet of Thing Based Systems. Future Internet 11(7): 153 (2019) - [j8]Abdulrahman Alreshidi, Aakash Ahmad, Ahmed B. Altamimi, Khalid Sultan, Rashid Mehmood:
Software Architecture for Mobile Cloud Computing Systems. Future Internet 11(11): 238 (2019) - 2018
- [j7]Wilayat Khan, Habib Ullah, Aakash Ahmad, Khalid Sultan, Abdullah J. Alzahrani, Sultan Daud Khan, Mohammad Alhumaid, Sultan Abdulaziz:
CrashSafe: a formal model for proving crash-safety of Android applications. Hum. centric Comput. Inf. Sci. 8: 21 (2018) - [j6]Aakash Ahmad, Claus Pahl, Ahmed B. Altamimi, Abdulrahman Alreshidi:
Mining Patterns from Change Logs to Support Reuse-Driven Evolution of Software Architectures. J. Comput. Sci. Technol. 33(6): 1278-1306 (2018) - 2017
- [i2]Aakash Ahmad, Muhammad Ali Babar:
Software Architectures for Robotics Systems: A Systematic Mapping Study. CoRR abs/1701.05453 (2017) - 2016
- [j5]Aakash Ahmad, Muhammad Ali Babar:
Software architectures for robotic systems: A systematic mapping study. J. Syst. Softw. 122: 16-39 (2016) - 2014
- [j4]Aakash Ahmad, Pooyan Jamshidi, Claus Pahl:
Classification and comparison of architecture evolution reuse knowledge - a systematic review. J. Softw. Evol. Process. 26(7): 654-691 (2014) - [c9]Pooyan Jamshidi, Aakash Ahmad, Claus Pahl:
Autonomic resource provisioning for cloud-based software. SEAMS 2014: 95-104 - [c8]Aakash Ahmad, Muhammad Ali Babar:
Towards a pattern language for self-adaptation of cloud-based architectures. WICSA Companion 2014: 1:1-1:6 - [c7]Aakash Ahmad, Muhammad Ali Babar:
A framework for architecture-driven migration of legacy systems to cloud-enabled software. WICSA Companion 2014: 7:1-7:8 - 2013
- [j3]Aakash Ahmad, Pooyan Jamshidi, Claus Pahl, Fawad Khaliq:
A Pattern Language for the Evolution of Component-based Software Architectures. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 59 (2013) - [j2]Aakash Ahmad, Pooyan Jamshidi, Claus Pahl:
A framework for acquisition and application of software architecture evolution knowledge: 14. ACM SIGSOFT Softw. Eng. Notes 38(5): 1-7 (2013) - [j1]Pooyan Jamshidi, Aakash Ahmad, Claus Pahl:
Cloud Migration Research: A Systematic Review. IEEE Trans. Cloud Comput. 1(2): 142-157 (2013) - [c6]Pooyan Jamshidi, Mohammad Ghafari, Aakash Ahmad, Claus Pahl:
A Framework for Classifying and Comparing Architecture-centric Software Evolution Research. CSMR 2013: 305-314 - 2012
- [c5]Aakash Ahmad, Pooyan Jamshidi, Claus Pahl:
Graph-Based Pattern Identification from Architecture Change Logs. CAiSE Workshops 2012: 200-213 - [c4]Aakash Ahmad, Pooyan Jamshidi, Claus Pahl:
Pattern-driven Reuse in Architecture-centric Evolution for Service Software. ICSOFT 2012: 279-284 - [c3]Aakash Ahmad, Pooyan Jamshidi, Muteer Arshad, Claus Pahl:
Graph-based implicit knowledge discovery from architecture change logs. WICSA/ECSA Companion Volume 2012: 116-123 - [i1]Aakash Ahmad, Claus Pahl:
Pat-Evol: Pattern-Driven Reuse in Architecture-Based Evolution for Service Software. ERCIM News 2012(88) (2012) - 2011
- [c2]Aakash Ahmad, Claus Pahl:
Customisable Transformation-Driven Evolution for Service Architectures. CSMR 2011: 373-376 - 2010
- [c1]Aakash Ahmad, Claus Pahl:
Pattern-based customisable transformations for style-based service architecture evolution. CISIM 2010: 371-376
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint