default search action
John C. McEachen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c112]Sean Kennedy, Murali Tummala, John McEachen:
Topological Estimation of Number of Sources in Linear Monocomponent Mixtures. EUSIPCO 2023: 1649-1653 - [c111]Murali Tummala, John McEachen, Edoardo Biagioni:
Introduction to the Minitrack on Cellular and Wireless Networks. HICSS 2023: 6580-6581 - 2022
- [c110]Edoardo Biagioni, John C. McEachen, Murali Tummala:
Introduction to the Minitrack on Cellular and Wireless Networks. HICSS 2022: 1-2 - [c109]Don Barber, Vikram Kanth, Zachary White, John McEachen:
Spatial Frequency Detection of Optical Signals Embedded in the Environment. ITNAC 2022: 185-191 - [c108]Zachary White, Don Barber, Murali Tummala, John McEachen:
A Transmit Diversity Scheme for Multi-pulse Pulse Position Modulated Visible Light Communications. MILCOM 2022: 723-728 - 2021
- [j11]Chad A. Bollmann, Murali Tummala, John C. McEachen:
Resilient real-time network anomaly detection using novel non-parametric statistical tests. Comput. Secur. 102: 102146 (2021) - [c107]Vikram Kanth, John McEachen, Murali Tummala:
Parameter Identification for Malicious Transaction Detection in Blockchain Protocols. BLOCKCHAIN 2021: 54-63 - [c106]Edoardo Biagioni, John C. McEachen, Murali Tummala:
Introduction to the Minitrack on Cellular and Wireless Networks. HICSS 2021: 1 - [c105]Vikram Kanth, John C. McEachen, Murali Tummala:
A Bio-Inspired Trust Framework in Wireless Ad Hoc Networks. HICSS 2021: 1-8 - [c104]Ashley McAbee, Murali Tummala, John C. McEachen:
The use of partially observable Markov decision processes to optimally implement moving target defense. HICSS 2021: 1-10 - [c103]Jamie L. Safar, Murali Tummala, John C. McEachen:
Spectral Graph-based Cyber Worm Detection Using Phantom Components and Strong Node Concept. HICSS 2021: 1-9 - [c102]John Watkins, Murali Tummala, John McEachen:
A Machine Learning Approach to network Security Classification utilizing NetFlow Data. ICSPCS 2021: 1-10 - [c101]Daniel Green, Murali Tummala, John McEachen:
Pulsed Signal Detection Utilizing Wavelet Analysis with a Deep Learning Approach. MILCOM 2021: 396-401 - [c100]Vikram Kanth, Chad A. Bollmann, Murali Tummala, John C. McEachen:
A Novel Adaptable Framework for Covert Communications in Anonymized Protocols. MILCOM 2021: 451-457 - 2020
- [j10]John D. Roth, Murali Tummala, John C. McEachen:
A New Probability Density Function for Minimizing Geometric Dilution of Precision in Location-Aware Wireless Communications. IEEE Access 8: 160461-160479 (2020) - [c99]Peter M. B. Harley, Murali Tummala, John McEachen:
Capacity Estimation for Error Correction Code-based Embedding in Adaptive Rate Wireless Communication Systems. HICSS 2020: 1-10 - [c98]Vikram Kanth, Ashley McAbee, Murali Tummala, John C. McEachen:
Collaborative Intrusion Detection leveraging Blockchain and Pluggable Authentication Modules. HICSS 2020: 1-7 - [c97]John McEachen, Edoardo Biagioni, Murali Tummala:
Introduction to the Minitrack on Cellular and Wireless Networks. HICSS 2020: 1-2 - [c96]Shawn Koss, Carson McAbee, Murali Tummala, John McEachen:
Symbol Generation and Frame Synchronization for Multipulse-Pulse Position Modulation over Optical Channels. ICSPCS 2020: 1-7 - [c95]Jamie L. Safar, Chad A. Bollmann, Murali Tummala, John C. McEachen:
A Novel Lévy-Impulse Mixture Based Connection Model for Computer Network Traffic. ICSPCS 2020: 1-6
2010 – 2019
- 2019
- [j9]John D. Roth, Murali Tummala, John C. McEachen:
Fundamental Implications for Location Accuracy in Ultra-Dense 5G Cellular Networks. IEEE Trans. Veh. Technol. 68(2): 1784-1795 (2019) - [c94]Peter M. B. Harley, Murali Tummala, John C. McEachen:
High-Throughput Covert Channels in Adaptive Rate Wireless Communication Systems. ICEIC 2019: 1-7 - [c93]Edoardo Biagioni, John McEachen, Murali Tummala:
Introduction to the Minitrack on Wireless Networks. HICSS 2019: 1 - [c92]Ashley McAbee, Murali Tummala, John McEachen:
Military Intelligence Applications for Blockchain Technology. HICSS 2019: 1-10 - [c91]Jamie L. Safar, Murali Tummala, John C. McEachen, Chad A. Bollmann:
Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model. ICSPCS 2019: 1-6 - 2018
- [j8]John D. Roth, Murali Tummala, John C. McEachen:
Efficient System Geolocation Architecture in Next-Generation Cellular Networks. IEEE Syst. J. 12(4): 3414-3425 (2018) - [c90]Edoardo Biagioni, John C. McEachen, Murali Tummala:
Introduction to the Minitrack on Wireless Networks. HICSS 2018: 1 - [c89]Chad A. Bollmann, Murali Tummala, John C. McEachen, Jim Scrofani, Mark Kragh:
Techniques to Improve Stable Distribution Modeling of Network Traffic. HICSS 2018: 1-8 - [c88]John D. Roth, Murali Tummala, John McEachen, James Scrofani:
Quantifying Location Privacy in Urban Next-Generation Cellular Networks. HICSS 2018: 1-8 - [c87]Julian D'Orsaneo, Murali Tummala, John McEachen, Bryan Martin:
Analysis of Traffic Signals on an SDN for Detection and Classification of a Man-in-the-Middle Attack. ICSPCS 2018: 1-9 - [c86]Scott Lord, John D. Roth, John McEachen, Murali Tummala:
A Novel Method for Physical-Layer Authentication via Channel State Information. ICSPCS 2018: 1-9 - 2017
- [j7]John D. Roth, Murali Tummala, John C. McEachen, James W. Scrofani:
On Location Privacy in LTE Networks. IEEE Trans. Inf. Forensics Secur. 12(6): 1358-1368 (2017) - [c85]Chad A. Bollmann, Murali Tummala, John C. McEachen:
Representation of positive alpha-stable network traffic through levy mixtures. ACSSC 2017: 1460-1464 - [c84]Edoardo Biagioni, John C. McEachen, Murali Tummala:
Introduction to Wireless Networks Minitrack. HICSS 2017: 1 - [c83]John D. Roth, Murali Tummala, John C. McEachen, James W. Scrofani:
Location Privacy in LTE: A Case Study on Exploiting the Cellular Signaling Plane's Timing Advance. HICSS 2017: 1-8 - [c82]Bryan Martin, Murali Tummala, John C. McEachen:
Multi-homed device detection using clock skew. ICSPCS 2017: 1-9 - 2016
- [j6]John D. Roth, Murali Tummala, John C. McEachen:
A computationally efficient approach for hidden-Markov model-augmented fingerprint-based positioning. Int. J. Syst. Sci. 47(12): 2847-2858 (2016) - [c81]Michail Pothitos, Murali Tummala, James Scrofani, John C. McEachen:
Multi-sensor image fusion and target classification for improved maritime domain awareness. FUSION 2016: 1170-1177 - [c80]Thomas Parker, Jeremy Jones, Joshua Mayberry, Gassium Chanman, Zachary Staples, John C. McEachen, Murali Tummala:
Defensive Cyber Operations in a Software-Defined Network. HICSS 2016: 5561-5568 - [c79]Jacob Boomgaarden, Joshua Corney, Holly Whittaker, George W. Dinolt, John McEachen:
Mobile Konami Codes: Analysis of Android Malware Services Utilizing Sensor and Resource-Based State Changes. HICSS 2016: 5578-5587 - [c78]Edoardo Biagioni, John C. McEachen, Murali Tummala:
Introduction to the Wireless Networks Minitrack. HICSS 2016: 5841 - [c77]Thomas Parker, John C. McEachen:
Cluster Head Selection in Wireless Mobile Ad Hoc Networks Using Spectral Graph Theory Techniques. HICSS 2016: 5851-5857 - [c76]John D. Roth, Murali Tummala, John C. McEachen, James W. Scrofani, Robert A. DeGabriele:
Maximum likelihood geolocation in LTE cellular networks using the timing advance parameter. ICSPCS 2016: 1-10 - [c75]Pornrerk Rerkngamsanga, Murali Tummala, James W. Scrofani, John C. McEachen:
Generalized hough transform for object classification in the maritime domain. SoSE 2016: 1-6 - 2015
- [j5]Robert Severinghaus, Murali Tummala, John C. McEachen:
Networks for Maintaining System-Level Availability for an Exploring Robot. IEEE Syst. J. 9(1): 98-106 (2015) - [c74]Edoardo Biagioni, John C. McEachen, Murali Tummala:
Introduction to Wireless Networks Minitrack. HICSS 2015: 5403 - [c73]Thomas Parker, Jamie Johnson, Murali Tummala, John C. McEachen, James Scrofani:
Analysis of the Robustness Dynamics of Wireless Mobile Ad Hoc Networks via Time Varying Dual Basis Representation. HICSS 2015: 5414-5421 - [c72]Carson McAbee, Murali Tummala, John C. McEachen:
GSM to UMTS Network Handover Vulnerability Testing Using Software-Defined Radio. HICSS 2015: 5422-5431 - [c71]John D. Roth, Murali Tummala, John C. McEachen, James Scrofani, Allison Hunt:
Location Estimation via Sparse Signal Reconstruction in Subsampled Overcomplete Dictionaries for Wireless 4G Networks. HICSS 2015: 5432-5438 - [c70]Jacob Boomgaarden, Joshua Corney, Holly Whittaker, George W. Dinolt, John McEachen:
Challenges in emulating sensor and resource-based state changes for Android malware detection. ICSPCS 2015: 1-10 - [c69]Benjamin Pimentel, Murali Tummala, John C. McEachen:
Passive geolocation of mobile subscribers using a single base station with third party capture. ICSPCS 2015: 1-6 - [c68]John D. Roth, Murali Tummala, John C. McEachen, James W. Scrofani:
On mobile positioning via Cellular Synchronization Assisted Refinement (CeSAR) in LTE and GSM networks. ICSPCS 2015: 1-8 - [c67]James W. Scrofani, Murali Tummala, Donna Miller, Deborah Shifflett, John C. McEachen:
Behavioral detection in the maritime domain. SoSE 2015: 380-385 - 2014
- [c66]Thomas Parker, Jamie Johnson, Murali Tummala, John C. McEachen, James Scrofani:
Identifying congestion in software-defined networks using spectral graph theory. ACSSC 2014: 2010-2014 - [c65]Ashley McAbee, James Scrofani, Murali Tummala, David Garren, John C. McEachen:
Traffic pattern detection using the Hough transformation for anomaly detection to improve maritime domain awareness. FUSION 2014: 1-6 - [c64]Edoardo Biagioni, John C. McEachen, Murali Tummala:
Introduction to Wireless Networks Minitrack. HICSS 2014: 5100 - [c63]John D. Roth, Murali Tummala, John C. McEachen, James Scrofani:
A Scalable Hidden-Markov Model Algorithm for Location-Based Services in WiMAX Networks. HICSS 2014: 5101-5108 - [c62]Tan A. Ngo, Murali Tummala, John C. McEachen:
Optimal Wireless Aerial Sensor Node Positioning for Randomly Deployed Planar Collaborative Beamforming. HICSS 2014: 5122-5128 - [c61]Mark Hofer, John C. McEachen, Murali Tummala:
Vulnerability Analysis of LTE Location Services. HICSS 2014: 5162-5166 - 2013
- [c60]Tan A. Ngo, Murali Tummala, John C. McEachen:
Multicast collaborative beamforming from airborne wireless sensor network. ACSSC 2013: 537-541 - [c59]Edoardo Biagioni, John C. McEachen, Murali Tummala:
Introduction to Wireless Networks Minitrack. HICSS 2013: 5096 - [c58]Robert Severinghaus, Murali Tummala, John C. McEachen:
Availability of Ad Hoc Wireless Networks of Unmanned Ground Vehicles with Group Mobility. HICSS 2013: 5097-5105 - [c57]T. Owens Walker III, Murali Tummala, John C. McEachen:
Optimal Preamble Sampling for Low Power Wireless Networks. HICSS 2013: 5123-5131 - [c56]Jason Q. McClintic, Murali Tummala, John C. McEachen:
Tower Pair Selection for Geolocation in 4G Wireless Networks. HICSS 2013: 5139-5146 - [c55]Agur Adams, Murali Tummala, John C. McEachen, James W. Scrofani:
Source localization and tracking in a Cognitive Radio environment consisting of frequency and spatial mobility. ICSPCS 2013: 1-6 - [c54]Jason Q. McClintic, Murali Tummala, John C. McEachen, James W. Scrofani:
Communications network utility as a function of node entropy. ICSPCS 2013: 1-9 - [c53]Tan A. Ngo, Murali Tummala, John C. McEachen, James W. Scrofani:
Two-stage scheme for geolocation using mobile sensor networks with optimal formations. ICSPCS 2013: 1-5 - [c52]John D. Roth, Murali Tummala, John C. McEachen, James Scrofani:
A configurable fingerprint-based hidden-Markov model for tracking in variable channel conditions. ICSPCS 2013: 1-9 - [c51]Kristofer Tester, James W. Scrofani, Murali Tummala, David Garren, John C. McEachen:
A spatiotemporal clustering approach to maritime domain awareness. ICSPCS 2013: 1-9 - [c50]Jeremy Martin, Danny Rhame, Robert Beverly, John McEachen:
Correlating GSM and 802.11 Hardware Identifiers. MILCOM 2013: 1398-1403 - 2012
- [c49]Robert Severinghaus, Murali Tummala, John C. McEachen:
Performance of asymmetric antenna configurations in polarized channels. ACSCC 2012: 499-503 - [c48]John Zachary, John McEachen:
A new signal primitive for monitoring complex information networks. CogSIMA 2012: 44-50 - [c47]Ryan D. Whitty, Murali Tummala, John C. McEachen:
Precision Geolocation of Mobile WiMax Subscribers Using Timing Adjust Measurements. HICSS 2012: 5639-5648 - [c46]T. Owens Walker III, Murali Tummala, John C. McEachen:
Security Vulnerabilities in Hybrid Flow-Specific Traffic-Adaptive Medium Access Control. HICSS 2012: 5649-5658 - [c45]Ryan Gray, Murali Tummala, John C. McEachen, James W. Scrofani, David Garren:
Identification and classification of Orthogonal Frequency Division Multiple Access signals. ICSPCS 2012: 1-6 - [c44]Jason Henderson, Murali Tummala, John C. McEachen, James W. Scrofani:
Scheme for enhanced tracking of mobile subscribers in a WiMAX network. ICSPCS 2012: 1-4 - [c43]Jason Q. McClintic, Murali Tummala, John C. McEachen:
Correcting refractive dilution of precision in wireless network geolocation estimates. ICSPCS 2012: 1-6 - [c42]Agur Adams, Murali Tummala, John C. McEachen:
Source localization in a cognitive radio environment consisting of frequency and spatial mobility. WOWMOM 2012: 1-6 - 2011
- [j4]T. Owens Walker III, Murali Tummala, John C. McEachen, J. Bret Michael:
Flow-Specific Medium Access for Networked Satellite System. IEEE Syst. J. 5(3): 427-434 (2011) - [c41]Brian Phillips, Murali Tummala, John C. McEachen:
State based single channel selection in multi-channel wireless networks. ACSCC 2011: 1617-1622 - [c40]Benjamin A. Peddicord, Weilian Su, John C. McEachen:
RF loading impact on WCDMA jamming. ICSPCS 2011: 1-10 - [c39]Robert Severinghaus, Murali Tummala, John C. McEachen:
Network formations to bridge or extend wireless sensor networks. ICSPCS 2011: 1-6 - [c38]T. Owens Walker III, Murali Tummala, John C. McEachen:
Non-deterministic preamble sampling periods for low-power listening. ICSPCS 2011: 1-5 - [c37]Leslie Jarvis, John McEachen, Herschel H. Loomis Jr.:
Geolocation of LTE subscriber stations based on the timing advance ranging parameter. MILCOM 2011: 180-187 - [c36]Brian Phillips, Murali Tummala, John C. McEachen:
State based multiple channel selection in multi-channel wireless networks. MILCOM 2011: 1061-1066 - 2010
- [c35]T. Owens Walker III, Murali Tummala, John C. McEachen:
Energy Efficiency of Centralized and Distributed Computation in Unattended Multi-Hop Wireless Sensor Networks for Battlefield Monitoring. HICSS 2010: 1-9 - [c34]T. Owens Walker III, Murali Tummala, John C. McEachen:
A system of systems study of space-based networks utilizing picosatellite formations. SoSE 2010: 1-6
2000 – 2009
- 2009
- [c33]William A. Lintz, John C. McEachen, Murali Tummala:
A Method for Determining Weight Reset Timing in a Wirelessly Networked Array with Independently Mobile Elements. AINA 2009: 914-920 - [c32]William A. Lintz, John C. McEachen, Murali Tummala:
Sensor beamforming with distributed mobile elements in a wireless sensor network. CCECE 2009: 323-328 - [c31]William A. Lintz, John C. McEachen:
A Method for Emphasizing Signal Detection in Wireless Sensor Network Radio Frequency Array Operation. HICSS 2009: 1-10 - [c30]T. Owens Walker III, Murali Tummala, John C. McEachen, J. Bret Michael:
Medium access for hybrid, large-scale wireless networks for missile defense. SoSE 2009: 1-5 - [c29]T. Owens Walker III, Murali Tummala, John C. McEachen:
Traffic-adaptive, flow-specific medium access control for wireless networks. WCNC 2009: 1926-1931 - 2008
- [j3]Patrick J. Vincent, Murali Tummala, John C. McEachen:
A new method for distributing power usage across a sensor network. Ad Hoc Networks 6(8): 1258-1280 (2008) - [c28]Nikolaos Papalexidis, T. Owens Walker, Murali Tummala, John McEachen:
An energy-efficient and distributed approach to beamforming in a wireless sensor network. ACSCC 2008: 878-881 - [c27]Georgios Tsivgoulis, T. Owens Walker, Murali Tummala, John McEachen:
Source localization using random arrays of sensors under multipath fading. ACSCC 2008: 1963-1967 - [c26]T. Owens Walker III, Murali Tummala, John C. McEachen:
Distributed Medium Access Control with Flow-Based Priority for Cooperative Multi-hop Wireless Sensor Networks. HICSS 2008: 493 - [c25]Mickey S. Batson, John C. McEachen, Murali Tummala:
A Method for Fast Radio Frequency Direction Finding Using Wireless Sensor Networks. HICSS 2008: 495 - [c24]John C. McEachen, Juan Casias:
Performance of a Wireless Unattended Sensor Network in a Freshwater Environment. HICSS 2008: 496 - 2007
- [j2]William K. Geissler, John C. McEachen:
Exploiting error control in network traffic for robust, high rate covert channels. Int. J. Electron. Secur. Digit. Forensics 1(2): 180-193 (2007) - [j1]John C. McEachen, Cheng Kah Wai:
An analysis of distributed sensor data aggregation for network intrusion detection. Microprocess. Microsystems 31(4): 263-272 (2007) - [c23]Pore Ghee Lye, John C. McEachen:
A Comparison of Optimized Link State Routing with Traditional Routing Protocols in Marine Wireless Ad-hoc and Sensor Networks. HICSS 2007: 293 - [c22]Patrick J. Vincent, Murali Tummala, John C. McEachen:
Connectivity in Sensor Networks. HICSS 2007: 293 - [c21]Mickey S. Batson, John C. McEachen, Murali Tummala:
A Comparison of Power Management Techniques in Wireless RF Direction Finding Sensor Networks. ICCCN 2007: 1303-1308 - [c20]John C. McEachen, Wang Wei Beng:
Characterization of Traffic in Wireless Sensor Networks. ICON 2007: 437-442 - [c19]Mickey S. Batson, John C. McEachen, Murali Tummala:
Enhanced Collection Methodology for Distributed Wireless Antenna Systems. SoSE 2007: 1-6 - [c18]Patrick J. Vincent, Murali Tummala, John C. McEachen:
A Beamforming Approach for Distributed Wireless Sensor Networks. SoSE 2007: 1-6 - 2006
- [c17]Michael A. Tope, John C. McEachen, Albert C. Kinney:
Ad-Hoc Network Routing Using Co-operative Diversity. AINA (1) 2006: 55-60 - [c16]Michael A. Tope, John C. McEachen, Albert C. Kinney:
Routing Performance of Cooperative Diversity in Ad-Hoc Networks. ISCC 2006: 505-510 - [c15]John C. McEachen, Cheng Kah Wai, Vonda L. Olsavsky:
Aggregating Distributed Sensor Data for Network Intrusion Detection. ISCC 2006: 916-922 - [c14]Patrick J. Vincent, Murali Tummala, John C. McEachen:
A New Method for Distributing Power Usage across a Sensor Network. SECON 2006: 518-526 - [c13]Patrick J. Vincent, Murali Tummala, John C. McEachen:
An energy-efficient approach for information transfer from distributed wireless sensor systems. SoSE 2006: 1-6 - 2005
- [c12]John C. McEachen, John Zachary:
A Novel Approach to Accentuating Anomalous Events in Complex Network Systems. HICSS 2005 - [c11]John C. McEachen, John Zachary:
Real-Time Representation of Network Traffic Behavior for Enhanced Security. ICITA (2) 2005: 214-219 - 2004
- [c10]Sudhamsu Mylavarapu, John C. McEachen, John Zachary, Stefan L. Walch, John S. Marinovich:
Modeling Traffic Flow Using Conversation Exchange Dynamics for Identifying Network Attacks. ECUMN 2004: 317-326 - [c9]John C. McEachen, John Zachary, Daniel W. Ettlich:
Differentiating network conversation flow for intrusion detection and diagnostics. ISCAS (4) 2004: 473-476 - [c8]John Zachary, John C. McEachen, Daniel W. Ettlich:
Conversation Exchange Dynamics for Real-Time Network Monitoring and Anomaly Detection. IWIA 2004: 59-70 - 2003
- [c7]John C. McEachen:
Analysis of self-similarity in an Internet-based multiplayer online game. ICCCN 2003: 211-214 - [c6]J. D. Judd, John C. McEachen, James Bret Michael, Daniel W. Ettlich:
Network stream splitting for intrusion detection. ICON 2003: 525-530 - 2002
- [c5]J. B. Miller, John C. McEachen, Herschel H. Loomis Jr., Michael A. Tope, D. B. Copeland:
An analysis of noise in timing-based communications over local area networks. ISCAS (5) 2002: 1-4 - 2001
- [c4]John McEachen, Abdullah Cay:
Masking compressed video connection utilization in ATM networks. ISCAS (5) 2001: 145-148 - [c3]John C. McEachen, Ow Kong Chung, Lim Chin Thong:
A system level description and model of Signaling System No 7. ISCAS (4) 2001: 258-261 - 2000
- [c2]Abdullah Cay, John McEachen:
Spectral analysis of connection utilization masking in ATM networks. ICASSP 2000: 2801-2804
1990 – 1999
- 1999
- [c1]John C. McEachen, Mickey S. Batson:
Performance analysis of an ATM high-speed network interface. ICECS 1999: 101-104
Coauthor Index
aka: T. Owens Walker
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint