default search action
Benjamin G. Zorn
Person information
- affiliation: Microsoft Research, USA
Other persons with the same name
- Benjamin Zorn 0002 — BMW Group, Garching, Germany (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2018
- [j30]Daniel W. Barowy, Emery D. Berger, Benjamin G. Zorn:
ExceLint: automatically finding spreadsheet formula errors. Proc. ACM Program. Lang. 2(OOPSLA): 148:1-148:26 (2018) - 2015
- [j29]Thomas Ball, Benjamin G. Zorn:
Teach foundational language principles. Commun. ACM 58(5): 30-31 (2015) - [j28]Sumit Gulwani, José Hernández-Orallo, Emanuel Kitzelmann, Stephen H. Muggleton, Ute Schmid, Benjamin G. Zorn:
Inductive programming meets the real world. Commun. ACM 58(11): 90-99 (2015) - 2014
- [j27]Cole Schlesinger, Karthik Pattabiraman, Nikhil Swamy, David Walker, Benjamin G. Zorn:
Modular protections against non-control data attacks. J. Comput. Secur. 22(5): 699-742 (2014) - 2013
- [j26]Emery D. Berger, Benjamin G. Zorn, Kathryn S. McKinley:
OOPSLA 2002: Reconsidering custom memory allocation. ACM SIGPLAN Notices 48(4S): 46-57 (2013) - 2012
- [j25]Benjamin Zorn:
CACM research highlights annual report. ACM SIGPLAN Notices 47(4a): 11-12 (2012) - [j24]Erez Petrank, Benjamin Zorn:
SIGPLAN professional activities committee report. ACM SIGPLAN Notices 47(4a): 13 (2012) - [j23]Paruj Ratanaworabhan, Martin Burtscher, Darko Kirovski, Benjamin G. Zorn, Rahul Nagpal, Karthik Pattabiraman:
Efficient Runtime Detection and Toleration of Asymmetric Races. IEEE Trans. Computers 61(4): 548-562 (2012) - 2008
- [j22]Gene Novark, Emery D. Berger, Benjamin G. Zorn:
Exterminator: Automatically correcting memory errors with high probability. Commun. ACM 51(12): 87-95 (2008) - 2002
- [j21]Martin Burtscher, Benjamin G. Zorn:
Hybrid Load-Value Predictors. IEEE Trans. Computers 51(7): 759-774 (2002) - 2001
- [j20]Matthew L. Seidl, Benjamin G. Zorn:
Implementing heap-object behavior prediction efficiently and effectively. Softw. Pract. Exp. 31(9): 869-892 (2001) - 2000
- [j19]Thorna O. Humphries, Artur Klauser, Alexander L. Wolf, Benjamin G. Zorn:
An infrastructure for generating and sharing experimental workloads for persistent object systems. Softw. Pract. Exp. 30(4): 387-417 (2000) - 1999
- [j18]Martin Burtscher, Benjamin G. Zorn:
Prediction Outcome History-Based Confidence Estimation for Load Value Prediction. J. Instr. Level Parallelism 1 (1999) - [j17]Benjamin G. Zorn:
Corporate Support and SIGPLAN. ACM SIGPLAN Notices 34(4): 1-2 (1999) - 1998
- [j16]Benjamin G. Zorn:
An Invitation to OOPSLA '98. ACM SIGPLAN Notices 33(8): 1-3 (1998) - [j15]Jonathan E. Cook, Alexander L. Wolf, Benjamin G. Zorn:
A Highly Effective Partition Selection Policy for Object Database Garbage Collection. IEEE Trans. Knowl. Data Eng. 10(1): 153-172 (1998) - [j14]Wayne Citrin, Soraya Ghiasi, Benjamin G. Zorn:
VIPR and the Visual Programming Challenge. J. Vis. Lang. Comput. 9(2): 241-258 (1998) - 1997
- [j13]Brad Calder, Dirk Grunwald, Michael P. Jones, Donald C. Lindsay, James H. Martin, Michael Mozer, Benjamin G. Zorn:
Evidence-Based Static Branch Prediction Using Machine Learning. ACM Trans. Program. Lang. Syst. 19(1): 188-222 (1997) - [j12]Wayne Citrin, Michael Doherty, Benjamin G. Zorn:
A Graphical Semantics for Graphical Transformation Languages. J. Vis. Lang. Comput. 8(2): 147-173 (1997) - 1996
- [j11]Thomas Derby, Robert B. Schnabel, Benjamin G. Zorn:
A New Language Design for Prototyping Numerical Computation. Sci. Program. 5(4): 279-300 (1996) - 1995
- [j10]Stephen J. Sullivan, Benjamin G. Zorn:
Numerical Analysis Using Nonprocedural Paradigms. ACM Trans. Math. Softw. 21(3): 267-298 (1995) - 1994
- [j9]Brigham Bell, Wayne Citrin, Clayton H. Lewis, John Rieman, Robert P. Weaver, Nick Wilde, Benjamin G. Zorn:
Using the Programming Walkthrough to Aid in Programming Language Design. Softw. Pract. Exp. 24(1): 1-25 (1994) - [j8]David Detlefs, Al Dosser, Benjamin G. Zorn:
Memory Allocation Costs in Large C and C++ Programs. Softw. Pract. Exp. 24(6): 527-542 (1994) - [j7]Robert Henderson, Benjamin G. Zorn:
A Comparison of Object-oriented Programming in Four Modern Languages. Softw. Pract. Exp. 24(11): 1077-1095 (1994) - [j6]Benjamin G. Zorn, Dirk Grunwald:
Evaluating Models of Memory Allocation. ACM Trans. Model. Comput. Simul. 4(1): 107-131 (1994) - 1993
- [j5]Benjamin G. Zorn:
The Measured Cost of Conservative Garbage Collection. Softw. Pract. Exp. 23(7): 733-756 (1993) - [j4]Dirk Grunwald, Benjamin G. Zorn:
CustoMalloc: Efficient Synthesized Memory Allocators. Softw. Pract. Exp. 23(8): 851-869 (1993) - 1992
- [j3]Benjamin G. Zorn, Dirk Grunwald:
Empirical Measurements of Six Allocation-intensive C Programs. ACM SIGPLAN Notices 27(12): 71-80 (1992) - 1990
- [j2]Benjamin G. Zorn, Paul N. Hilfinger:
Direct Function Calls in Lisp. LISP Symb. Comput. 3(1): 13-20 (1990) - 1989
- [j1]Benjamin G. Zorn, Kinson Ho, James R. Larus, Luigi Semenzato, Paul N. Hilfinger:
Multiprocessing Extensions in Spur Lisp. IEEE Softw. 6(4): 41-49 (1989)
Conference and Workshop Papers
- 2024
- [c51]Shraddha Barke, Christian Pölitz, Carina Negreanu, Benjamin Zorn, José Cambronero, Andrew D. Gordon, Vu Le, Elnaz Nouri, Nadia Polikarpova, Advait Sarkar, Brian Slininger, Neil Toronto, Jack Williams:
Solving Data-centric Tasks using Large Language Models. NAACL-HLT (Findings) 2024: 626-638 - [c50]Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim:
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models. SP 2024: 1122-1140 - 2023
- [c49]Michael Xieyang Liu, Advait Sarkar, Carina Negreanu, Benjamin G. Zorn, Jack Williams, Neil Toronto, Andrew D. Gordon:
"What It Wants Me To Say": Bridging the Abstraction Gap Between End-User Programmers and Code-Generating Large Language Models. CHI 2023: 598:1-598:31 - [c48]Kasra Ferdowsi, Jack Williams, Ian Drosos, Andrew D. Gordon, Carina Negreanu, Nadia Polikarpova, Advait Sarkar, Benjamin Zorn:
COLDECO: An End User Spreadsheet Inspection Tool for AI-Generated Code. VL/HCC 2023: 82-91 - 2022
- [c47]Advait Sarkar, Carina Negreanu, Ben Zorn, Sruti Srinivasa Ragavan, Christian Pölitz, Andrew D. Gordon:
What is it like to program with artificial intelligence? PPIG 2022: 127-153 - 2019
- [c46]Daan Leijen, Benjamin Zorn, Leonardo de Moura:
Mimalloc: Free List Sharding in Action. APLAS 2019: 244-265 - [c45]Guoqing Harry Xu, Margus Veanes, Michael Barnett, Madan Musuvathi, Todd Mytkowicz, Ben Zorn, Huan He, Haibo Lin:
Niijima: sound and automated computation consolidation for efficient multilingual data-parallel pipelines. SOSP 2019: 306-321 - 2016
- [c44]Ben Stock, Benjamin Livshits, Benjamin G. Zorn:
Kizzle: A Signature Compiler for Detecting Exploit Kits. DSN 2016: 455-466 - 2015
- [c43]Daniel W. Barowy, Sumit Gulwani, Ted Hart, Benjamin G. Zorn:
FlashRelate: extracting relational data from semi-structured spreadsheets using examples. PLDI 2015: 218-228 - [c42]Mikaël Mayer, Gustavo Soares, Maxim Grechkin, Vu Le, Mark Marron, Oleksandr Polozov, Rishabh Singh, Benjamin G. Zorn, Sumit Gulwani:
User Interaction Models for Disambiguation in Programming by Example. UIST 2015: 291-301 - 2012
- [c41]Paruj Ratanaworabhan, Martin Burtscher, Darko Kirovski, Benjamin G. Zorn:
Hardware support for enforcing isolation in lock-based parallel programs. ICS 2012: 301-310 - [c40]Clemens Kolbitsch, Benjamin Livshits, Benjamin G. Zorn, Christian Seifert:
Rozzle: De-cloaking Internet Malware. IEEE Symposium on Security and Privacy 2012: 443-457 - 2011
- [c39]Song Liu, Karthik Pattabiraman, Thomas Moscibroda, Benjamin G. Zorn:
Flikker: saving DRAM refresh-power through critical data partitioning. ASPLOS 2011: 213-224 - [c38]Cole Schlesinger, Karthik Pattabiraman, Nikhil Swamy, David Walker, Benjamin G. Zorn:
Modular Protections against Non-control Data Attacks. CSF 2011: 131-145 - [c37]Frolin S. Ocariza Jr., Karthik Pattabiraman, Benjamin G. Zorn:
JavaScript Errors in the Wild: An Empirical Study. ISSRE 2011: 100-109 - [c36]Charlie Curtsinger, Benjamin Livshits, Benjamin G. Zorn, Christian Seifert:
ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection. USENIX Security Symposium 2011 - 2010
- [c35]Benjamin G. Zorn:
Performance is dead, long live performance! CGO 2010: 1 - [c34]Karthik Pattabiraman, Benjamin G. Zorn:
DoDOM: Leveraging DOM Invariants for Web 2.0 Application Robustness Testing. ISSRE 2010: 191-200 - [c33]Paruj Ratanaworabhan, Benjamin Livshits, Benjamin G. Zorn:
JSMeter: Comparing the Behavior of JavaScript Benchmarks with Real Web Applications. WebApps 2010 - 2009
- [c32]Gene Novark, Emery D. Berger, Benjamin G. Zorn:
Efficiently and precisely locating memory leaks and bloat. PLDI 2009: 397-407 - [c31]Paruj Ratanaworabhan, Martin Burtscher, Darko Kirovski, Benjamin G. Zorn, Rahul Nagpal, Karthik Pattabiraman:
Detecting and tolerating asymmetric races. PPoPP 2009: 173-184 - [c30]Paruj Ratanaworabhan, V. Benjamin Livshits, Benjamin G. Zorn:
NOZZLE: A Defense Against Heap-spraying Code Injection Attacks. USENIX Security Symposium 2009: 169-186 - 2008
- [c29]Vitaliy B. Lvin, Gene Novark, Emery D. Berger, Benjamin G. Zorn:
Archipelago: trading address space for reliability and security. ASPLOS 2008: 115-124 - [c28]Karthik Pattabiraman, Vinod Grover, Benjamin G. Zorn:
Samurai: protecting critical data in unsafe languages. EuroSys 2008: 219-232 - 2007
- [c27]Gene Novark, Emery D. Berger, Benjamin G. Zorn:
Exterminator: automatically correcting memory errors with high probability. PLDI 2007: 1-11 - 2006
- [c26]Emery D. Berger, Benjamin G. Zorn:
DieHard: probabilistic memory safety for unsafe languages. PLDI 2006: 158-168 - 2002
- [c25]Emery D. Berger, Benjamin G. Zorn, Kathryn S. McKinley:
Reconsidering custom memory allocation. OOPSLA 2002: 1-12 - 2001
- [c24]Emery D. Berger, Benjamin G. Zorn, Kathryn S. McKinley:
Composing High-Performance Memory Allocators. PLDI 2001: 114-124 - 2000
- [c23]Martin Burtscher, Benjamin G. Zorn:
Hybridizing and Coalescing Load Value Predictors. ICCD 2000: 81-92 - [c22]Trishul M. Chilimbi, Richard E. Jones, Benjamin G. Zorn:
Designing a Trace Format for Heap Allocation Events. ISMM 2000: 35-49 - 1999
- [c21]Martin Burtscher, Benjamin G. Zorn:
Exploring Last n Value Prediction. IEEE PACT 1999: 66-76 - 1998
- [c20]Dirk Grunwald, Donald C. Lindsay, Benjamin G. Zorn:
Static Methods in Hybrid Branch Prediction. IEEE PACT 1998: 222-229 - [c19]Matthew L. Seidl, Benjamin G. Zorn:
Segregating Heap Objects by Reference Behavior and Lifetime. ASPLOS 1998: 12-23 - [c18]Chandra Krintz, Brad Calder, Han Bok Lee, Benjamin G. Zorn:
Overlapping Execution with Transfer Using Non-Strict Execution for Mobile Programs. ASPLOS 1998: 159-169 - 1997
- [c17]Han Bok Lee, Benjamin G. Zorn:
BIT: A Tool for Instrumenting Java Bytecodes. USENIX Symposium on Internet Technologies and Systems 1997 - 1996
- [c16]Wayne Citrin, Carlos Santiago, Benjamin G. Zorn:
Scalable Interfaces to Support Program Comprehension. WPC 1996: 123-132 - [c15]Jonathan E. Cook, Artur Klauser, Alexander L. Wolf, Benjamin G. Zorn:
Semi-automatic, Self-adaptive Control of Garbage Collection Rates in Object Databases. SIGMOD Conference 1996: 377-388 - 1995
- [c14]Thomas Derby, Robert B. Schnabel, Benjamin Zorn:
The Relationship Between Language Paradigm and Parallelism: The EQ Prototyping Language. LCR 1995: 329-332 - [c13]Brad Calder, Dirk Grunwald, Donald C. Lindsay, James H. Martin, Michael Mozer, Benjamin G. Zorn:
Corpus-Based Static Branch Prediction. PLDI 1995: 79-92 - [c12]David A. Barrett, Benjamin G. Zorn:
Garbage Collection Using a Dynamic Threatening Boundary. PLDI 1995: 301-314 - [c11]Wayne Citrin, Richard Hall, Benjamin G. Zorn:
Programming with Visual Expressions. VL 1995: 294-301 - [c10]Benjamin G. Zorn, Akmal B. Chaudhri:
Object database behavior, benchmarks, and performance: workshop addendum. OOPSLA Addendum 1995: 159-163 - 1994
- [c9]Thomas Derby, Robert B. Schnabel, Benjamin G. Zorn:
EQ: Overview of a New Language Approach for Prototyping Scientific Computation. LCPC 1994: 391-405 - [c8]Jonathan E. Cook, Alexander L. Wolf, Benjamin G. Zorn:
Partition Selection Policies in Object Database Garbage Collection. SIGMOD Conference 1994: 371-382 - [c7]Wayne Citrin, Michael Doherty, Benjamin G. Zorn:
Formal Semantics of Control in a Completely Visual Programming Language. VL 1994: 208-215 - 1993
- [c6]Dirk Grunwald, Gary J. Nutt, Anthony M. Sloane, David A. Wagner, Benjamin G. Zorn:
A Testbed for Studying Parallel Programs and Parallel Execution Architectures. MASCOTS 1993: 95-106 - [c5]Dirk Grunwald, Benjamin G. Zorn, Robert Henderson:
Improving the Cache Locality of Memory Allocation. PLDI 1993: 177-186 - [c4]David A. Barrett, Benjamin G. Zorn:
Using Lifetime Predictors to Improve Memory Allocation Performance. PLDI 1993: 187-196 - 1992
- [c3]Brigham Bell, Wayne Citrin, Clayton H. Lewis, John Rieman, Robert P. Weaver, Nick Wilde, Benjamin G. Zorn:
Addressing the psychology of programming in programming language design. PPIG (1) 1992: 1 - 1990
- [c2]Benjamin G. Zorn:
Comparing Mark-and-Sweep and Stop-and-Copy Garbage Collection. LISP and Functional Programming 1990: 87-98 - 1986
- [c1]George S. Taylor, Paul N. Hilfinger, James R. Larus, David A. Patterson, Benjamin G. Zorn:
Evaluation of the SPUR Lisp Architecture. ISCA 1986: 444-452
Editorship
- 2010
- [e5]Benjamin G. Zorn, Alex Aiken:
Proceedings of the 2010 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2010, Toronto, Ontario, Canada, June 5-10, 2010. ACM 2010, ISBN 978-1-4503-0019-3 [contents] - 2008
- [e4]David Christie, Alan Lee, Onur Mutlu, Benjamin G. Zorn:
4th International Symposium on Workload Characterization (IISWC 2008), Seattle, Washington, USA, September 14-16, 2008. IEEE Computer Society 2008, ISBN 978-1-4244-2778-9 [contents] - 2006
- [e3]Erik R. Altman, Kevin Skadron, Benjamin G. Zorn:
15th International Conference on Parallel Architectures and Compilation Techniques (PACT 2006), Seattle, Washington, USA, September 16-20, 2006. ACM 2006, ISBN 1-59593-264-X [contents] - 2005
- [e2]Brad Calder, Benjamin G. Zorn:
Proceedings of the 2005 workshop on Memory System Performance, Chicago, Illinois, USA, June 12, 2005. ACM 2005, ISBN 1-59593-147-3 [contents] - 1999
- [e1]Barbara G. Ryder, Benjamin G. Zorn:
Proceedings of the 1999 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), Atlanta, Georgia, USA, May 1-4, 1999. ACM 1999, ISBN 1-58113-094-5 [contents]
Informal and Other Publications
- 2024
- [i15]Shraddha Barke, Christian Pölitz, Carina Suzana Negreanu, Benjamin G. Zorn, José Cambronero, Andrew D. Gordon, Vu Le, Elnaz Nouri, Nadia Polikarpova, Advait Sarkar, Brian Slininger, Neil Toronto, Jack Williams:
Solving Data-centric Tasks using Large Language Models. CoRR abs/2402.11734 (2024) - 2023
- [i14]Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim:
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models. CoRR abs/2301.02344 (2023) - [i13]Michael Xieyang Liu, Advait Sarkar, Carina Negreanu, Ben Zorn, Jack Williams, Neil Toronto, Andrew D. Gordon:
"What It Wants Me To Say": Bridging the Abstraction Gap Between End-User Programmers and Code-Generating Large Language Models. CoRR abs/2304.06597 (2023) - [i12]Andrew D. Gordon, Carina Negreanu, José Cambronero, Rasika Chakravarthy, Ian Drosos, Hao Fang, Bhaskar Mitra, Hannah Richardson, Advait Sarkar, Stephanie Simmons, Jack Williams, Ben Zorn:
Co-audit: tools to help humans double-check AI-generated content. CoRR abs/2310.01297 (2023) - [i11]Advait Sarkar, Ian Drosos, Rob DeLine, Andrew D. Gordon, Carina Negreanu, Sean Rintel, Jack Williams, Benjamin G. Zorn:
Participatory prompting: a user-centric research method for eliciting AI assistance opportunities in knowledge workflows. CoRR abs/2312.16633 (2023) - 2022
- [i10]Advait Sarkar, Andrew D. Gordon, Carina Negreanu, Christian Pölitz, Sruti Srinivasa Ragavan, Ben Zorn:
What is it like to program with artificial intelligence? CoRR abs/2208.06213 (2022) - 2020
- [i9]Benjamin Zorn, Tom Conte, Keith Marzullo, Suresh Venkatasubramanian:
Evolving Methods for Evaluating and Disseminating Computing Research. CoRR abs/2007.01242 (2020) - [i8]Kevin Fu, Tadayoshi Kohno, Daniel Lopresti, Elizabeth D. Mynatt, Klara Nahrstedt, Shwetak N. Patel, Debra J. Richardson, Benjamin G. Zorn:
Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things. CoRR abs/2008.00017 (2020) - 2019
- [i7]Daniel W. Barowy, Emery D. Berger, Benjamin G. Zorn:
ExceLint: Automatically Finding Spreadsheet Formula Errors. CoRR abs/1901.11100 (2019) - [i6]Greg Morrisett, Shwetak N. Patel, Jennifer Rexford, Benjamin G. Zorn:
Evolving Academia/Industry Relations in Computing Research: Interim Report. CoRR abs/1903.10375 (2019) - 2017
- [i5]Elizabeth D. Mynatt, Jennifer Clark, Gregory D. Hager, Daniel P. Lopresti, Greg Morrisett, Klara Nahrstedt, George J. Pappas, Shwetak N. Patel, Jennifer Rexford, Helen V. Wright, Benjamin G. Zorn:
A National Research Agenda for Intelligent Infrastructure. CoRR abs/1705.01920 (2017) - [i4]Kevin Fu, Ann W. Drobnis, Greg Morrisett, Elizabeth D. Mynatt, Shwetak N. Patel, Radha Poovendran, Benjamin G. Zorn:
Safety and Security for Intelligent Infrastructure. CoRR abs/1705.02002 (2017) - 2016
- [i3]Klara Nahrstedt, Daniel P. Lopresti, Benjamin G. Zorn, Ann W. Drobnis, Beth Mynatt, Shwetak N. Patel, Helen V. Wright:
Smart Communities Internet of Things. CoRR abs/1604.02028 (2016) - [i2]Rajeev Alur, Emery D. Berger, Ann W. Drobnis, Limor Fix, Kevin Fu, Gregory D. Hager, Daniel P. Lopresti, Klara Nahrstedt, Elizabeth D. Mynatt, Shwetak N. Patel, Jennifer Rexford, John A. Stankovic, Benjamin G. Zorn:
Systems Computing Challenges in the Internet of Things. CoRR abs/1604.02980 (2016) - 2015
- [i1]José Hernández-Orallo, Stephen H. Muggleton, Ute Schmid, Benjamin G. Zorn:
Approaches and Applications of Inductive Programming (Dagstuhl Seminar 15442). Dagstuhl Reports 5(10): 89-111 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-23 00:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint