default search action
Dongil Shin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Hunggi Lee, Donghyeon Lee, Jaewook Lee, Dongil Shin:
Efficient Gas Leak Simulation Surrogate Modeling and Super Resolution for Gas Detector Placement Optimization. Comput. Chem. Eng. 181: 108508 (2024) - [j38]Jaeyeong Jeong, Seongmin Park, Joonhyung Lim, Jiwon Kang, Dongil Shin, Dongkyoo Shin:
A Study on Network Anomaly Detection Using Fast Persistent Contrastive Divergence. Symmetry 16(9): 1220 (2024) - 2023
- [j37]Kookjin Kim, Jisoo Jang, Hansol Park, Jaeyeong Jeong, Dongil Shin, Dongkyoo Shin:
Detecting Abnormal Behaviors in Dementia Patients Using Lifelog Data: A Machine Learning Approach. Inf. 14(8): 433 (2023) - [j36]Hansol Park, Kookjin Kim, Dongil Shin, Dongkyoo Shin:
BGP Dataset-Based Malicious User Activity Detection Using Machine Learning. Inf. 14(9): 501 (2023) - 2021
- [j35]Daekyeong Park, Sangsoo Kim, Hyukjin Kwon, Dongil Shin, Dongkyoo Shin:
Host-Based Intrusion Detection Model Using Siamese Network. IEEE Access 9: 76614-76623 (2021) - [j34]Byeong-Jun Min, Jihoon Yoo, Sangsoo Kim, Dongil Shin, Dongkyoo Shin:
Network Anomaly Detection Using Memory-Augmented Deep Autoencoder. IEEE Access 9: 104695-104706 (2021) - [j33]Jihoon Yoo, Byeong-Jun Min, Sangsoo Kim, Dongil Shin, Dongkyoo Shin:
Study on Network Intrusion Detection Method Using Discrete Pre-Processing Method and Convolution Neural Network. IEEE Access 9: 142348-142361 (2021) - [j32]Seongkyu Yeom, Dongil Shin, Dongkyoo Shin:
Scenario-based cyber attack·defense education system on virtual machines integrated by web technologies for protection of multimedia contents in a network. Multim. Tools Appl. 80(26): 34085-34101 (2021) - [j31]Sungjoong Kim, Seongkyu Yeom, Haengrok Oh, Dongil Shin, Dongkyoo Shin:
Automatic Malicious Code Classification System through Static Analysis Using Machine Learning. Symmetry 13(1): 35 (2021) - [j30]Jinsoo Kim, Donghwan Lee, Jaejoon Hwang, Sunghoon Hong, Dongil Shin, Dongkyoo Shin:
Wireless Sensor Network (WSN) Configuration Method to Increase Node Energy Efficiency through Clustering and Location Information. Symmetry 13(3): 390 (2021) - [i1]Dongil Shin, Andrea Cupertino, Matthijs H. J. de Jong, Peter G. Steeneken, Miguel A. Bessa, Richard A. Norte:
Spiderweb nanomechanical resonators via Bayesian optimization: inspired by nature and guided by machine learning. CoRR abs/2108.04809 (2021) - 2020
- [j29]Jonghwa Choi, Sungjoong Kim, Dong-Min Shin, Young-Hwan You, Dongil Shin, Dongkyoo Shin:
Neuro-Feedback System Enhancing the Level of Symmetry in Left and Right Brain Activities. IEEE Access 8: 107969-107976 (2020) - [j28]Sungjoong Kim, Jiwon Kang, Haengrok Oh, Dongil Shin, Dongkyoo Shin:
Operation Framework Including Cyber Warfare Execution Process and Operational Concepts. IEEE Access 8: 109168-109176 (2020) - [j27]Kookjin Kim, Seungjin Lee, Sungjoong Kim, Jaekeun Kim, Dongil Shin, Dongkyoo Shin:
Sensor-Based Deviant Behavior Detection System Using Deep Learning to Help Dementia Caregivers. IEEE Access 8: 136004-136013 (2020)
2010 – 2019
- 2019
- [j26]Hyunseung Kim, Myeongnam Park, Chang Won Kim, Dongil Shin:
Source localization for hazardous material release in an outdoor chemical plant via a combination of LSTM-RNN and CFD simulation. Comput. Chem. Eng. 125: 476-489 (2019) - [j25]Duhoe Kim, Yong-Hyun Kim, Dongil Shin, Dongkyoo Shin:
Fast attack detection system using log analysis and attack tree generation. Clust. Comput. 22(Suppl 1): 1827-1835 (2019) - [j24]Jaeil Lee, Inkyung Jeon, Hyukjin Kwon, Dongil Shin, Dongkyoo Shin:
Erratum to: Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment. J. Real Time Image Process. 16(5): 1883 (2019) - [j23]Duhoe Kim, Dongil Shin, Dongkyoo Shin, Yong-Hyun Kim:
Attack Detection Application with Attack Tree for Mobile System using Log Analysis. Mob. Networks Appl. 24(1): 184-192 (2019) - [c57]Seungjin Lee, Dongil Shin, Dongkyoo Shin:
Sensor-based Abnormal Behavior Detection Using Autoencoder. SoICT 2019: 111-117 - [c56]Jaeyeon Park, Dongil Shin, Dongkyoo Shin, Jaeyoung Lee, Hyungseok Lee:
Design and Implementation of Web Browser Secure Storage for Web Standard Authentication Based on FIDO. SoICT 2019: 229-235 - [c55]Jihoon Yoo, Dongil Shin, Dongkyoo Shin:
Prediction System for Fine Particulate Matter Concentration Index by Meteorological and Air Pollution Material Factors Based on Machine Learning. SoICT 2019: 479-485 - 2018
- [j22]Seongjung Kim, Seongkyu Yeom, Oh-Jin Kwon, Dongil Shin, Dongkyoo Shin:
Ubiquitous Healthcare System for Analysis of Chronic Patients' Biological and Lifelog Data. IEEE Access 6: 8909-8915 (2018) - [j21]Gyeongil Shin, Hosang Yooun, Dongil Shin, Dongkyoo Shin:
Hybrid Feature Selection Method Based on a Naïve Bayes Algorithm that Enhances the Learning Speed while Maintaining a Similar Error Rate in Cyber ISR. KSII Trans. Internet Inf. Syst. 12(12): 5685-5700 (2018) - [j20]Jaeil Lee, Inkyung Jeon, Hyukjin Kwon, Dongil Shin, Dongkyoo Shin:
Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment. J. Real Time Image Process. 14(1): 237-244 (2018) - [j19]Yunjin Nam, Dongkyoo Shin, Dongil Shin:
Personal search system based on android using lifelog and machine learning. Pers. Ubiquitous Comput. 22(1): 201-218 (2018) - [j18]Gyeongil Shin, Hosang Yooun, Dongil Shin, Dongkyoo Shin:
Incremental learning method for cyber intelligence, surveillance, and reconnaissance in closed military network using converged IT techniques. Soft Comput. 22(20): 6835-6844 (2018) - [c54]Doyeon Kim, Dongil Shin, Dongkyoo Shin:
Unauthorized Access Point Detection Using Machine Learning Algorithms for Information Protection. TrustCom/BigDataSE 2018: 1876-1878 - 2017
- [j17]Changhyun Jeon, Oh-Jin Kwon, Dongil Shin, Dongkyoo Shin:
Hand-Mouse Interface Using Virtual Monitor Concept for Natural Interaction. IEEE Access 5: 25181-25188 (2017) - [j16]Dong-Min Shin, Dongil Shin, Dongkyoo Shin:
Development of emotion recognition interface using complex EEG/ECG bio-signal for interactive contents. Multim. Tools Appl. 76(9): 11449-11470 (2017) - [j15]Jaehyun Ahn, Dongil Shin, Kyuho Kim, Jihoon Yang:
Indoor Air Quality Analysis Using Deep Learning with Sensor Data. Sensors 17(11): 2476 (2017) - [c53]Yunjin Nam, Dongkyoo Shin, Dongil Shin:
Life Log Collection and Analysis System Using Mobile Device. CSA/CUTE 2017: 114-119 - [c52]Hyeonsu Youn, Duhoe Kim, Yong-Hyun Kim, Dongkyoo Shin, Dongil Shin:
System Information Comparison and Analysis Technology for Cyber Attacks. CSA/CUTE 2017: 446-451 - [c51]Hyunjung Ji, Donghwa Kim, Dongkyoo Shin, Dongil Shin:
A Study on Comparison of KDD CUP 99 and NSL-KDD Using Artificial Neural Network. CSA/CUTE 2017: 452-457 - [c50]Hyunjung Ji, Gyeongil Shin, Dongil Shin, Dongkyoo Shin:
Study on Customer Rating Using RFM and K-Means. CSA/CUTE 2017: 823-828 - [c49]Doyeon Kim, Dongkyoo Shin, Dongil Shin:
Data Set Construction and Performance Comparison of Machine Learning Algorithm for Detection of Unauthorized AP. CSA/CUTE 2017: 910-914 - [c48]Dong-Min Shin, Yunjin Nam, Dongil Shin, Dongkyoo Shin:
Real-Time Human Depression Diagnosis System Using Brain Wave Analysis. MUE/FutureTech 2017: 412-418 - 2016
- [j14]Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Ching-Nung Yang:
Secure protection of video recorder video in smart car. Int. J. Distributed Sens. Networks 12(12) (2016) - [j13]Doyeob Lee, Dongkyoo Shin, Dongil Shin:
Real-Time Recognition Method of Counting Fingers for Natural User Interface. KSII Trans. Internet Inf. Syst. 10(5): 2363-2374 (2016) - [j12]Dong-Min Shin, Gwanghyung Lee, Dongil Shin, Dongkyoo Shin:
System architecture using human interaction markup language for context awareness in home network. Multim. Tools Appl. 75(23): 15199-15209 (2016) - [j11]Gwanghyung Lee, Dongkyoo Shin, Dongil Shin:
Mouse operation on monitor by interactive analysis of intuitive hand motions. Multim. Tools Appl. 75(23): 15261-15274 (2016) - [c47]Yuqi Yang, Guangzhi Zhang, Rongfang Bie, Sungjoong Kim, Dongil Shin:
Key Techniques of Cross-Language Medical Term Alignment. IIKI 2016: 279-286 - 2014
- [j10]Dong-Min Shin, Dongil Shin, Dongkyoo Shin:
Ubiquitous Health Management System with Watch-Type Monitoring Device for Dementia Patients. J. Appl. Math. 2014: 878741:1-878741:8 (2014) - [j9]Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Raylin Tso, Ching-Nung Yang:
A secret sharing scheme for EBTC using steganography. J. Intell. Manuf. 25(2): 241-249 (2014) - [c46]Gwanghyung Lee, Dongil Shin, Dongkyoo Shin:
Intuitive Hand Motion Recognition and NUI/NUX Framework. FCC 2014: 253-259 - 2013
- [c45]Dong-Min Shin, Dongil Shin, Dongkyoo Shin:
Smart Watch and Monitoring System for Dementia Patients. GPC 2013: 577-584 - [c44]HyunJu Lee, Dongil Shin, Dongkyoo Shin, Soohan Kim:
A Classifier Algorithm Exploiting User's Environmental Context and Bio-signal for U-Home Services. GPC 2013: 594-601 - [c43]Jaewan Shin, Dongkyoo Shin, Dongil Shin:
Predicting of Abnormal Behavior Using Hierarchical Markov Model Based on User Profile in Ubiquitous Environment. GPC 2013: 612-622 - [c42]Guyoun Hwang, Heejun Cho, Dongkyoo Shin, Dongil Shin:
Emotion Recognition Technique Using Complex Biomedical Signal Analysis. GPC 2013: 631-640 - 2012
- [c41]Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Ching-Nung Yang:
A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC. ACIIDS (2) 2012: 129-139 - [c40]HyunJu Lee, Taehyun Kim, Dongkyoo Shin, HeeWon Park, Soohan Kim, Dongil Shin:
Research on a Smart Input Device Using Multimodal Bio-signal Interface. NPC 2012: 565-574 - 2011
- [c39]Cheonshik Kim, Dongkyoo Shin, Dongil Shin:
Data Hiding in a Halftone Image Using Hamming Code (15, 11). ACIIDS (2) 2011: 372-381 - [c38]Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Xinpeng Zhang:
Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications. STA 2011: 130-138 - 2010
- [j8]Dongkyoo Shin, Dongil Shin, Jaewan Shin, Soohan Kim, Seungdong Kim:
Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping. KSII Trans. Internet Inf. Syst. 4(5): 925-938 (2010) - [c37]Jaewan Shin, Dongkyoo Shin, Dongil Shin, Sungmin Her, Soohan Kim, Myungsoo Lee:
Human Movement Detection Algorithm Using 3-Axis Accelerometer Sensor Based on Low-Power Management Scheme for Mobile Health Care System. GPC 2010: 81-90
2000 – 2009
- 2009
- [j7]Dongkyoo Shin, Dongil Shin, Quoc-Cuong Nguyen, Seyoung Park:
Real-Time Tracking of Human Location and Motion using Cameras in a Ubiquitous Smart Home. KSII Trans. Internet Inf. Syst. 3(1): 84-95 (2009) - [c36]My Chau Tu, Dongil Shin, Dongkyoo Shin:
Effective Diagnosis of Heart Disease through Bagging Approach. BMEI 2009: 1-4 - [c35]My Chau Tu, Dongil Shin, Dongkyoo Shin, Jonghwa Choi:
Fundamentals and Design of Smart Home Middleware. CSO (1) 2009: 647-650 - [c34]Taehyun Kim, Dongil Shin, Dongkyoo Shin:
Towards an Emotion Recognition System Based on Biometrics. CSO (1) 2009: 656-659 - [c33]My Chau Tu, Dongil Shin, Dongkyoo Shin:
A Comparative Study of Medical Data Classification Methods Based on Decision Tree and Bagging Algorithms. DASC 2009: 183-187 - [c32]Quoc-Cuong Nguyen, Dongil Shin, Dongkyoo Shin, Juhan Kim:
Real-Time Human Tracker Based on Location and Motion Recognition of User for Smart Home. MUE 2009: 243-250 - 2008
- [c31]Minwoo Son, Dongkyoo Shin, Dongil Shin:
An XML Based User Context Language for Personalized Service in Ubiquitous Digital Library. ALPIT 2008: 367-372 - 2007
- [c30]Jongil Jeong, Byunggul Ryu, Dongil Shin, Dongkyoo Shin:
Integration of Distributed Biological Data Using Modified K-Means Algorithm. PAKDD Workshops 2007: 469-475 - 2006
- [c29]Jongil Jeong, Weehyuk Yu, Dongkyoo Shin, Dongil Shin, Kiyoung Moon, Jaeseung Lee:
Integration of Single Sign-On and Role-Based Access Control Profiles for Grid Computing. APWeb 2006: 880-885 - [c28]Byungyoon Lee, Jonghwa Choi, Dongkyoo Shin, Dongil Shin:
Design and Implementation of a Game Physics Editor Using XML. Edutainment 2006: 696-699 - [c27]Jongil Jeong, Dongil Shin, Chulho Cho, Dongkyoo Shin:
Structural Similarity Mining in Semi-structured Microarray Data for Efficient Storage Construction. OTM Workshops (1) 2006: 720-729 - [c26]Jongil Jeong, Dongil Shin, Dongkyoo Shin:
An XML-Based Security Architecture for Integrating Single Sign-On and Rule-Based Access Control in Mobile and Ubiquitous Web Environments. OTM Workshops (2) 2006: 1357-1366 - [c25]Jonghwa Choi, Dongkyoo Shin, Dongil Shin:
Intelligent Game Agent Based Physics Engine for Intelligent Non Player Characters. PRIMA 2006: 444-454 - [c24]Juyeon Lee, Jonghwa Choi, Dongkyoo Shin, Dongil Shin:
Multi-user Human Tracking Agent for the Smart Home. PRIMA 2006: 502-507 - [c23]Jonghwa Choi, Dongkyoo Shin, Dongil Shin:
Research on Design and Implementation of Adaptive Physics Game Agent for 3D Physics Game. PRIMA 2006: 614-619 - [c22]Minwoo Son, Joonhyung Kim, Dongil Shin, Dongkyoo Shin:
Research on Smart Multi-agent Middleware for RFID-Based Ubiquitous Computing Environment. PRIMA 2006: 787-792 - [c21]Minwoo Son, Dongkyoo Shin, Dongil Shin:
Research on Multi-Agent Service Bundle Middleware for Smart Space. RSKT 2006: 618-625 - [c20]Jonghwa Choi, Dongkyoo Shin, Dongil Shin:
Ubiquitous Intelligent Sensing System for a Smart Home. SSPR/SPR 2006: 322-330 - [c19]Jonghwa Choi, Dongkyoo Shin, Dongil Shin:
Intelligent Pervasive Middleware Based on Biometrics. UIC 2006: 157-165 - [c18]Jonghwa Choi, Soonyong Choi, Dongkyoo Shin, Dongil Shin:
Real-Time Human Tracker Based Location and Motion Recognition for the Ubiquitous Smart Home. UIC 2006: 708-713 - 2005
- [j6]Gunhee Kim, Dongkyoo Shin, Dongil Shin:
Intellectual property management on MPEG-4 video for hand-held device and mobile video streaming service. IEEE Trans. Consumer Electron. 51(1): 139-143 (2005) - [j5]Jonghwa Choi, Dongkyoo Shin, Dongil Shin:
Research and implementation of the context-aware middleware for controlling home appliances. IEEE Trans. Consumer Electron. 51(1): 301-306 (2005) - [c17]Minwoo Son, Soonyong Choi, Dongil Shin, Dongkyoo Shin:
The Design and Implementation of a Location-Aware Service Bundle Manager in Smart Space Environments. EUC Workshops 2005: 248-257 - [c16]Young-Choong Park, Seung-ok Lim, Kwang-sun Choi, KwangMo Jung, Dongil Shin:
Implementation of Hardware and Embedded Software for Stream Gateway Interface Supporting Media Stream Transmissions with Heterogeneous Home Networks. ICESS 2005: 141-149 - [c15]Jonghwa Choi, Dongkyoo Shin, Jinsung Choi, Dongil Shin:
Research on Artificial Intelligence Character Based Physics Engine in 3D Car Game. ICNC (2) 2005: 552-556 - [c14]Jonghwa Choi, Dongkyoo Shin, Dongil Shin:
Research on Design and Implementation of the Artificial Intelligence Agent for Smart Home Based on Support Vector Machine. ICNC (1) 2005: 1185-1188 - [c13]Minwoo Son, Jonghwa Choi, Namhoon Kim, Dongkyoo Shin, Dongil Shin:
Design and Implementation of a Service Bundle Manager for Home Network Middleware. WAIM 2005: 749-754 - 2004
- [j4]Jongil Jeong, Dongkyoo Shin, Dongil Shin:
An XML-based single sign-on scheme supporting mobile and home network service environments. IEEE Trans. Consumer Electron. 50(4): 1081-1086 (2004) - [j3]Gunhee Kim, Dongkyoo Shin, Dongil Shin:
An efficient methodology for multimedia digital rights management on mobile handset. IEEE Trans. Consumer Electron. 50(4): 1130-1134 (2004) - [c12]Jonghwa Choi, Soonyong Choi, Dongkyoo Shin, Dongil Shin:
Research and Implementation of the Context-Aware Middleware Based on Neural Network. AIS 2004: 295-303 - [c11]Jongil Jeong, Dongkyoo Shin, Dongil Shin, Kiyoung Moon:
Java-Based Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Distributed Web Services. APWeb 2004: 891-894 - [c10]Jonghwa Choi, Dongkyoo Shin, Won Heo, Dongil Shin:
Performance Evaluation of Numerical Integration Methods in the Physics Engine. CIS 2004: 238-244 - [c9]Gunhee Kim, Dongkyoo Shin, Dongil Shin:
An Effective Adaptation of Encryption on MPEG-4 Video Streams for Digital Rights Management in an Ubiquitous Computing Environment. EUC 2004: 642-651 - [c8]Gunhee Kim, Dongkyoo Shin, Dongil Shin:
Design of a Middleware and HIML (Human Interaction Markup Language) for Context Aware Services in a Ubiquitous Computing Environment. EUC 2004: 682-691 - [c7]Jongil Jeong, Dongkyoo Shin, Dongil Shin, Hyun-Mok Oh:
A Study on the XML-Based Single Sign-On System Supporting Mobile and Ubiquitous Service Environments. EUC 2004: 903-913 - [c6]Dongil Shin, Dongkyoo Shin, Baek-Ho Sung, Jun-Hong Song:
A Study on the Secure Business Web Service Based on ebXML. ICWE 2004: 575-576 - 2003
- [c5]Dongkyoo Shin, Jongil Jeong, Dongil Shin:
Design and Implementaion of a Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security. GCC (2) 2003: 557-564 - [c4]Dongkyoo Shin, Junil Kim, Dongil Shin:
A Study on the Digital Right Management of MPEG-4 Streams for Digital Video Library. ICADL 2003: 444-455 - 2002
- [j2]Dongkyoo Shin, Dongil Shin:
Design and implementation of the SMIL (Synchronized Multimedia Integration Language) player. IEEE Trans. Consumer Electron. 48(3): 575-578 (2002) - 2000
- [j1]Dongil Shin, Dongkyoo Shin, Eui-Jong Jeong, Jai-Hoon Kim, Sungsoo Kim:
Efficient data broadcast scheme on wireless link errors. IEEE Trans. Consumer Electron. 46(4): 1143-1147 (2000)
1990 – 1999
- 1999
- [c3]Dongil Shin, Dongkyoo Shin, Yongdeok Noh:
Design and Implementation of a JAVA-based Synchronized Multimedia Integration Language Player. PDPTA 1999: 182-186 - 1998
- [c2]Hee Choon Kwon, Jin Ho Jeon, Dae-Joon Hwang, Dongil Shin, Youngho Seo:
Adding asynchronous recording module running on distance video conference followed by an external classroom monitoring system. CATA 1998: 238-241 - 1995
- [c1]Kathleen M. Swigger, Robert P. Brazile, Dongil Shin:
Teaching computer science students how to work together. CSCL 1995: 356-361
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint