default search action
David Mazières
Person information
- affiliation: Stanford University, Department of Computer Science, CA, USA
- affiliation: New York University, Computer Science Department, NY, USA
- affiliation: Massachusetts Institute of Technology, Laboratory for Computer Science, Cambridge, MA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c84]Gina Yuan, Matthew Sotoudeh, David K. Zhang, Michael Welzl, David Mazières, Keith Winstein:
Sidekick: In-Network Assistance for Secure End-to-End Transport Protocols. NSDI 2024 - [c83]Geoffrey Ramseyer, Mohak Goyal, Ashish Goel, David Mazières:
Augmenting Batch Exchanges with Constant Function Market Makers. EC 2024: 986-1016 - [i17]Geoffrey Ramseyer, David Mazières:
Groundhog: Linearly-Scalable Smart Contracting via Commutative Transaction Semantics. CoRR abs/2404.03201 (2024) - 2023
- [c82]Nirvan Tyagi, Arasu Arun, Cody Freitag, Riad Wahby, Joseph Bonneau, David Mazières:
Riggs: Decentralized Sealed-Bid Auctions. CCS 2023: 1227-1241 - [c81]Geoffrey Ramseyer, Ashish Goel, David Mazières:
SPEEDEX: A Scalable, Parallelizable, and Economically Efficient Decentralized EXchange. NSDI 2023: 849-875 - [c80]Emma Dauterman, Danny Lin, Henry Corrigan-Gibbs, David Mazières:
Accountable authentication with privacy protection: The Larch system for universal login. OSDI 2023: 81-98 - [c79]Mohak Goyal, Geoffrey Ramseyer, Ashish Goel, David Mazières:
Finding the Right Curve: Optimal Design of Constant Function Market Makers. EC 2023: 783-812 - [i16]Emma Dauterman, Danny Lin, Henry Corrigan-Gibbs, David Mazières:
Accountable authentication with privacy protection: The Larch system for universal login. CoRR abs/2305.19241 (2023) - [i15]Nirvan Tyagi, Arasu Arun, Cody Freitag, Riad Wahby, Joseph Bonneau, David Mazières:
Riggs: Decentralized Sealed-Bid Auctions. IACR Cryptol. ePrint Arch. 2023: 1336 (2023) - 2022
- [i14]Gina Yuan, David Mazières, Matei Zaharia:
Extricating IoT Devices from Vendor Infrastructure with Karl. CoRR abs/2204.13737 (2022) - [i13]Geoffrey Ramseyer, Mohak Goyal, Ashish Goel, David Mazières:
Batch Exchanges with Constant Function Market Makers: Axioms, Equilibria, and Computation. CoRR abs/2210.04929 (2022) - [i12]Mohak Goyal, Geoffrey Ramseyer, Ashish Goel, David Mazières:
Finding the Right Curve: Optimal Design of Constant Function Market Makers. CoRR abs/2212.03340 (2022) - 2021
- [c78]Jack Tigar Humphries, Kostis Kaffes, David Mazières, Christos Kozyrakis:
A case against (most) context switches. HotOS 2021: 17-25 - [c77]Kostis Kaffes, Jack Tigar Humphries, David Mazières, Christos Kozyrakis:
Syrup: User-Defined Scheduling Across the Stack. SOSP 2021: 605-620 - [i11]Geoffrey Ramseyer, Ashish Goel, David Mazières:
SPEEDEX: A Scalable, Parallelizable, and Economically Efficient Digital EXchange. CoRR abs/2111.02719 (2021) - 2020
- [c76]Emma Dauterman, Henry Corrigan-Gibbs, David Mazières:
SafetyPin: Encrypted Backups with Human-Memorable Secrets. OSDI 2020: 1121-1138 - [c75]Geoffrey Ramseyer, Ashish Goel, David Mazières:
Liquidity in Credit Networks with Constrained Agents. WWW 2020: 2099-2108 - [i10]Emma Dauterman, Henry Corrigan-Gibbs, David Mazières:
SafetyPin: Encrypted Backups with Human-Memorable Secrets. CoRR abs/2010.06712 (2020)
2010 – 2019
- 2019
- [c74]Jack Tigar Humphries, Kostis Kaffes, David Mazières, Christos Kozyrakis:
Mind the Gap: A Case for Informed Request Scheduling at the NIC. HotNets 2019: 60-68 - [c73]Kostis Kaffes, Timothy Chong, Jack Tigar Humphries, Adam Belay, David Mazières, Christos Kozyrakis:
Shinjuku: Preemptive Scheduling for μsecond-scale Tail Latency. NSDI 2019: 345-360 - [c72]Marta Lokhava, Giuliano Losa, David Mazières, Graydon Hoare, Nicolas Barry, Eli Gafni, Jonathan Jove, Rafal Malinowsky, Jed McCaleb:
Fast and secure global payments with Stellar. SOSP 2019: 80-96 - [c71]Emma Dauterman, Henry Corrigan-Gibbs, David Mazières, Dan Boneh, Dominic Rizzo:
True2F: Backdoor-Resistant Authentication Tokens. IEEE Symposium on Security and Privacy 2019: 398-416 - [c70]Giuliano Losa, Eli Gafni, David Mazières:
Stellar Consensus by Instantiation. DISC 2019: 27:1-27:15 - [i9]Geoffrey Ramseyer, Ashish Goel, David Mazières:
Constrained Credit Networks. CoRR abs/1910.02194 (2019) - [i8]Andrea Bittau, Daniel B. Giffin, Mark Handley, David Mazières, Eric W. Smith:
TCP-ENO: Encryption Negotiation Option. RFC 8547: 1-31 (2019) - [i7]Andrea Bittau, Daniel B. Giffin, Mark Handley, David Mazières, Quinn Slack, Eric W. Smith:
Cryptographic Protection of TCP Streams (tcpcrypt). RFC 8548: 1-32 (2019) - 2018
- [i6]Emma Dauterman, Henry Corrigan-Gibbs, David Mazières, Dan Boneh, Dominic Rizzo:
True2F: Backdoor-resistant authentication tokens. CoRR abs/1810.04660 (2018) - 2017
- [j11]Daniel B. Giffin, Amit Levy, Deian Stefan, David Terei, David Mazières, John C. Mitchell, Alejandro Russo:
Hails: Protecting data privacy in untrusted web applications. J. Comput. Secur. 25(4-5): 427-461 (2017) - [j10]Deian Stefan, David Mazières, John C. Mitchell, Alejandro Russo:
Flexible dynamic information flow control in the presence of exceptions. J. Funct. Program. 27: e5 (2017) - [c69]Ali José Mashtizadeh, Tal Garfinkel, David Terei, David Mazières, Mendel Rosenblum:
Towards Practical Default-On Multi-Core Record/Replay. ASPLOS 2017: 693-708 - [c68]Dmitry Kogan, Henri Stern, Ashley Tolbert, David Mazières, Keith Winstein:
The Case For Secure Delegation. HotNets 2017: 15-21 - 2015
- [c67]Ali José Mashtizadeh, Andrea Bittau, Dan Boneh, David Mazières:
CCFI: Cryptographically Enforced Control Flow Integrity. CCS 2015: 941-951 - [c66]Margo I. Seltzer, Mark Miller, David Mazières, Yuanyuan Zhou:
Is achieving security a hopeless quest? SOSP History Day 2015: 13:1 - [c65]Henry Corrigan-Gibbs, Dan Boneh, David Mazières:
Riposte: An Anonymous Messaging System Handling Millions of Users. IEEE Symposium on Security and Privacy 2015: 321-338 - [i5]Henry Corrigan-Gibbs, Dan Boneh, David Mazières:
Riposte: An Anonymous Messaging System Handling Millions of Users. CoRR abs/1503.06115 (2015) - 2014
- [j9]Tom Anderson, Ken Birman, Robert M. Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William H. Lehr, Boon Thau Loo, David Mazières, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo:
A brief overview of the NEBULA future internet architecture. Comput. Commun. Rev. 44(3): 81-86 (2014) - [c64]Deian Stefan, David Mazières:
Building Secure Systems with LIO (Demo). PLAS@ECOOP 2014: 25 - [c63]Amit A. Levy, David Terei, Deian Stefan, David Mazières:
Demo proposal: making web applications -XSafe. Haskell 2014: 91 - [c62]Deian Stefan, Amit Levy, Alejandro Russo, David Mazières:
Building secure systems with LIO (demo). Haskell 2014: 93-94 - [c61]Nikhil Handigol, Brandon Heller, Vimalkumar Jeyakumar, David Mazières, Nick McKeown:
I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks. NSDI 2014: 71-85 - [c60]Deian Stefan, Edward Z. Yang, Petr Marchenko, Alejandro Russo, David Herman, Brad Karp, David Mazières:
Protecting Users by Confining JavaScript with COWL. OSDI 2014: 131-146 - [c59]Edward Z. Yang, David Mazières:
Dynamic space limits for Haskell. PLDI 2014: 588-598 - [c58]Vimalkumar Jeyakumar, Mohammad Alizadeh, Yilong Geng, Changhoon Kim, David Mazières:
Millions of little minions: using packets for low latency network programming and visibility. SIGCOMM 2014: 3-14 - [c57]Andrea Bittau, Adam Belay, Ali José Mashtizadeh, David Mazières, Dan Boneh:
Hacking Blind. IEEE Symposium on Security and Privacy 2014: 227-242 - [i4]Vimalkumar Jeyakumar, Mohammad Alizadeh, Yilong Geng, Changhoon Kim, David Mazières:
Millions of Little Minions: Using Packets for Low Latency Network Programming and Visibility. CoRR abs/1405.7143 (2014) - [i3]Ali José Mashtizadeh, Andrea Bittau, David Mazières, Dan Boneh:
Cryptographically Enforced Control Flow Integrity. CoRR abs/1408.1451 (2014) - 2013
- [c56]Deian Stefan, Pablo Buiras, Edward Z. Yang, Amit Levy, David Terei, Alejandro Russo, David Mazières:
Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling. ESORICS 2013: 718-735 - [c55]Tom Anderson, Ken Birman, Robert M. Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William H. Lehr, Boon Thau Loo, David Mazières, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo:
The NEBULA Future Internet Architecture. Future Internet Assembly 2013: 16-26 - [c54]Vimalkumar Jeyakumar, Mohammad Alizadeh, Changhoon Kim, David Mazières:
Tiny packet programs for low-latency network control and monitoring. HotNets 2013: 8:1-8:7 - [c53]Edward Z. Yang, Deian Stefan, John C. Mitchell, David Mazières, Petr Marchenko, Brad Karp:
Toward Principled Browser Security. HotOS 2013 - [c52]Vimalkumar Jeyakumar, Mohammad Alizadeh, David Mazières, Balaji Prabhakar, Albert G. Greenberg, Changhoon Kim:
EyeQ: Practical Network Performance Isolation at the Edge. NSDI 2013: 297-311 - [c51]Ali José Mashtizadeh, Andrea Bittau, Yifeng Frank Huang, David Mazières:
Replication, history, and grafting in the Ori file system. SOSP 2013: 151-166 - [c50]Pablo Buiras, Amit Levy, Deian Stefan, Alejandro Russo, David Mazières:
A Library for Removing Cache-Based Attacks in Concurrent Information Flow Systems. TGC 2013: 199-216 - 2012
- [c49]David Terei, Simon Marlow, Simon L. Peyton Jones, David Mazières:
Safe haskell. Haskell 2012: 137-148 - [c48]Vimalkumar Jeyakumar, Mohammad Alizadeh, David Mazières, Balaji Prabhakar, Changhoon Kim:
EyeQ: Practical Network Performance Isolation for the Multi-tenant Cloud. HotCloud 2012 - [c47]Deian Stefan, Alejandro Russo, Pablo Buiras, Amit Levy, John C. Mitchell, David Mazières:
Addressing covert termination and timing channels in concurrent information flow systems. ICFP 2012: 201-214 - [c46]Daniel B. Giffin, Amit Levy, Deian Stefan, David Terei, David Mazières, John C. Mitchell, Alejandro Russo:
Hails: Protecting Data Privacy in Untrusted Web Applications. OSDI 2012: 47-60 - [c45]Adam Belay, Andrea Bittau, Ali José Mashtizadeh, David Terei, David Mazières, Christos Kozyrakis:
Dune: Safe User-level Access to Privileged CPU Features. OSDI 2012: 335-348 - [c44]Nikhil Handigol, Brandon Heller, Vimalkumar Jeyakumar, David Mazières, Nick McKeown:
Where is the debugger for my software-defined network? HotSDN@SIGCOMM 2012: 55-60 - [i2]Deian Stefan, Alejandro Russo, John C. Mitchell, David Mazières:
Flexible Dynamic Information Flow Control in the Presence of Exceptions. CoRR abs/1207.1457 (2012) - [i1]David Terei, Simon Marlow, Simon L. Peyton Jones, David Mazières:
Safe Haskell. Adv. Math. Commun. 1 (2012) - 2011
- [j8]John K. Ousterhout, Parag Agrawal, David Erickson, Christos Kozyrakis, Jacob Leverich, David Mazières, Subhasish Mitra, Aravind Narayanan, Diego Ongaro, Guru M. Parulkar, Mendel Rosenblum, Stephen M. Rumble, Eric Stratmann, Ryan Stutsman:
The case for RAMCloud. Commun. ACM 54(7): 121-130 (2011) - [j7]Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, David Mazières:
Making information flow explicit in HiStar. Commun. ACM 54(11): 93-101 (2011) - [c43]Jad Naous, Michael Walfish, Antonio Nicolosi, David Mazières, Michael Miller, Arun Seehra:
Verifying and enforcing network paths with icing. CoNEXT 2011: 30 - [c42]Arjun Roy, Stephen M. Rumble, Ryan Stutsman, Philip Alexander Levis, David Mazières, Nickolai Zeldovich:
Energy management in mobile devices with the cinder operating system. EuroSys 2011: 139-152 - [c41]Deian Stefan, Alejandro Russo, John C. Mitchell, David Mazières:
Flexible dynamic information flow control in Haskell. Haskell 2011: 95-106 - [c40]Deian Stefan, Alejandro Russo, David Mazières, John C. Mitchell:
Disjunction Category Labels. NordSec 2011: 223-239 - 2010
- [j6]Stephen M. Rumble, Ryan Stutsman, Philip Alexander Levis, David Mazières, Nickolai Zeldovich:
Apprehending joule thieves with cinder. Comput. Commun. Rev. 40(1): 106-111 (2010) - [c39]Andrea Bittau, Michael Hamburg, Mark Handley, David Mazières, Dan Boneh:
The Case for Ubiquitous Transport-Level Encryption. USENIX Security Symposium 2010: 403-418
2000 – 2009
- 2009
- [j5]John K. Ousterhout, Parag Agrawal, David Erickson, Christos Kozyrakis, Jacob Leverich, David Mazières, Subhasish Mitra, Aravind Narayanan, Guru M. Parulkar, Mendel Rosenblum, Stephen M. Rumble, Eric Stratmann, Ryan Stutsman:
The case for RAMClouds: scalable high-performance storage entirely in DRAM. ACM SIGOPS Oper. Syst. Rev. 43(4): 92-105 (2009) - [c38]Arun Seehra, Jad Naous, Michael Walfish, David Mazières, Antonio Nicolosi, Scott Shenker:
A Policy Framework for the Future Internet. HotNets 2009 - [c37]Jad Naous, Ryan Stutsman, David Mazières, Nick McKeown, Nickolai Zeldovich:
Delegating network security with more information. WREN 2009: 19-26 - [c36]Stephen M. Rumble, Ryan Stutsman, Philip Alexander Levis, David Mazières, Nickolai Zeldovich:
Apprehending joule thieves with cinder. MobiHeld 2009: 49-54 - 2008
- [c35]Nickolai Zeldovich, Silas Boyd-Wickizer, David Mazières:
Securing Distributed Systems with Information Flow Control. NSDI 2008: 293-308 - 2007
- [j4]Steve Vandebogart, Petros Efstathopoulos, Eddie Kohler, Maxwell N. Krohn, Cliff Frey, David Ziegler, M. Frans Kaashoek, Robert Tappan Morris, David Mazières:
Labels and event processes in the Asbestos operating system. ACM Trans. Comput. Syst. 25(4): 11 (2007) - [c34]Jinyuan Li, David Mazières:
Beyond One-Third Faulty Replicas in Byzantine Fault Tolerant Systems. NSDI 2007 - 2006
- [c33]Michael J. Freedman, Ion Stoica, David Mazières, Scott Shenker:
Group Therapy for Systems: Using Link Attestations to Manage Failures. IPTPS 2006 - [c32]Michael J. Freedman, Karthik Lakshminarayanan, David Mazières:
OASIS: Anycast for Any Service. NSDI 2006 - [c31]Scott Garriss, Michael Kaminsky, Michael J. Freedman, Brad Karp, David Mazières, Haifeng Yu:
RE: Reliable Email. NSDI 2006 - [c30]Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, David Mazières:
Making Information Flow Explicit in HiStar. OSDI 2006: 263-278 - 2005
- [c29]Maxwell N. Krohn, Petros Efstathopoulos, Cliff Frey, M. Frans Kaashoek, Eddie Kohler, David Mazières, Robert Tappan Morris, Michelle Osborne, Steve Vandebogart, David Ziegler:
Make Least Privilege a Right (Not a Privilege). HotOS 2005 - [c28]Siddhartha Annapureddy, Michael J. Freedman, David Mazières:
Shark: Scaling File Servers via Cooperative Caching. NSDI 2005 - [c27]Petros Efstathopoulos, Maxwell N. Krohn, Steve Vandebogart, Cliff Frey, David Ziegler, Eddie Kohler, David Mazières, M. Frans Kaashoek, Robert Tappan Morris:
Labels and event processes in the Asbestos operating system. SOSP 2005: 17-30 - 2004
- [c26]Antonio Nicolosi, David Mazières:
Secure Acknowledgment of Multicast Messages in Open Peer-to-Peer Networks. IPTPS 2004: 259-268 - [c25]Michael J. Freedman, Eric Freudenthal, David Mazières:
Democratizing Content Publication with Coral. NSDI 2004: 239-252 - [c24]Jinyuan Li, Maxwell N. Krohn, David Mazières, Dennis E. Shasha:
Secure Untrusted Data Repository (SUNDR). OSDI 2004: 121-136 - [c23]Maxwell N. Krohn, Michael J. Freedman, David Mazières:
On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution. S&P 2004: 226-240 - [c22]Michael Kaminsky, Eric Peterson, Daniel B. Giffin, Kevin Fu, David Mazières, M. Frans Kaashoek:
REX: Secure, Extensible Remote Execution. USENIX ATC, General Track 2004: 199-212 - 2003
- [c21]Michael J. Freedman, David Mazières:
Sloppy Hashing and Self-Organizing Clusters. IPTPS 2003: 45-55 - [c20]Petar Maymounkov, David Mazières:
Rateless Codes and Big Downloads. IPTPS 2003: 247-255 - [c19]Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis, David Mazières:
Proactive Two-Party Signatures for User Authentication. NDSS 2003 - [c18]Michael Kaminsky, George Savvides, David Mazières, M. Frans Kaashoek:
Decentralized user authentication in a global file system. SOSP 2003: 60-73 - [c17]Nickolai Zeldovich, Alexander Yip, Frank Dabek, Robert Tappan Morris, David Mazières, M. Frans Kaashoek:
Multiprocessor Support for Event-Driven Programs. USENIX ATC, General Track 2003: 239-252 - 2002
- [j3]Kevin Fu, M. Frans Kaashoek, David Mazières:
Fast and secure distributed read-only file system. ACM Trans. Comput. Syst. 20(1): 1-24 (2002) - [j2]Kevin Fu, Michael Kaminsky, David Mazières:
Using SFS for a Secure Network File System. login Usenix Mag. 27(6) (2002) - [c16]Petar Maymounkov, David Mazières:
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. IPTPS 2002: 53-65 - [c15]David Mazières, Dennis E. Shasha:
Building secure file systems out of Byzantine storage. PODC 2002: 108-117 - [c14]Frank Dabek, Nickolai Zeldovich, M. Frans Kaashoek, David Mazières, Robert Tappan Morris:
Event-driven programming for robust software. ACM SIGOPS European Workshop 2002: 186-189 - 2001
- [c13]Marc Waldman, David Mazières:
Tangler: a censorship-resistant publishing system based on document entanglements. CCS 2001: 126-135 - [c12]David Mazières, Dennis E. Shasha:
Don't Trust your File Server. HotOS 2001: 113-118 - [c11]Marc Waldman, David Mazières:
Censorship Resistant Publishing Through Document Entanglements. HotOS 2001: 185 - [c10]Athicha Muthitacharoen, Benjie Chen, David Mazières:
A Low-Bandwidth Network File System. SOSP 2001: 174-187 - [c9]David Mazières:
A Toolkit for User-Level File Systems. USENIX ATC, General Track 2001: 261-274 - 2000
- [b1]David Mazières:
Self-certifying file system. Massachusetts Institute of Technology, Cambridge, MA, USA, 2000 - [c8]Kevin Fu, M. Frans Kaashoek, David Mazières:
Fast and Secure Distributed Read-Only File System. OSDI 2000: 181-196
1990 – 1999
- 1999
- [c7]David Mazières, Michael Kaminsky, M. Frans Kaashoek, Emmett Witchel:
Separating key management from file system security. SOSP 1999: 124-139 - [c6]Niels Provos, David Mazières:
A Future-Adaptable Password Scheme. USENIX ATC, FREENIX Track 1999: 81-91 - 1998
- [c5]David Mazières, M. Frans Kaashoek:
The Design, Implementation and Operation of an Email Pseudonym Server. CCS 1998: 27-36 - [c4]David Mazières, M. Frans Kaashoek:
Escaping the evils of centralized control with self-certifying pathnames. ACM SIGOPS European Workshop 1998: 118-125 - 1997
- [c3]David Mazières, M. Frans Kaashoek:
Secure Applications Need Flexible Operating Systems. Workshop on Hot Topics in Operating Systems 1997: 56-61 - [c2]M. Frans Kaashoek, Dawson R. Engler, Gregory R. Ganger, Héctor M. Briceño, Russell Hunt, David Mazières, Thomas Pinckney, Robert Grimm, John Jannotti, Kenneth Mackenzie:
Application Performance and Flexibility on Exokernel Systems. SOSP 1997: 52-65 - 1996
- [j1]J. Bradley Chen, Yasuhiro Endo, Kee Chan, David Mazières, Antonio Dias, Margo I. Seltzer, Michael D. Smith:
The Measured Performance of Personal Computer Operating Systems. ACM Trans. Comput. Syst. 14(1): 3-40 (1996) - 1995
- [c1]J. Bradley Chen, Yasuhiro Endo, Kee Chan, David Mazières, Antonio Dias, Margo I. Seltzer, Michael D. Smith:
The Measured Performance of Personal Computer Operating Systems. SOSP 1995: 299-313
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint