


default search action
EUC Workshops 2005: Nagasaki, Japan
- Tomoya Enokido, Lu Yan, Bin Xiao, Daeyoung Kim, Yuan-Shun Dai, Laurence Tianruo Yang:

Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings. Lecture Notes in Computer Science 3823, Springer 2005, ISBN 3-540-30803-2
The Second International Symposium on Ubiquitous Intelligence and Smart Worlds (UISW 2005)
Session 1: Smart Environments and Systems I
- Naoharu Yamada, Kenji Sakamoto, Goro Kunito, Kenichi Yamazaki, Satoshi Tanaka:

Human Activity Recognition Based on Surrounding Things. 1-10 - Jingyu Li, Yuanchun Shi:

Baton: A Service Management System for Coordinating Smart Things in Smart Spaces. 11-20 - Thierry Bodhuin, Gerardo Canfora

, Rosa Preziosi, Maria Tortorella:
An Extensible Ubiquitous Architecture for Networked Devices in Smart Living Environments. 21-30 - Ichiro Satoh:

A World Model for Smart Spaces. 31-40
Session 2: Agent Based Smart Computing
- Goreti Marreiros

, Carlos Ramos
, José Neves
:
Dealing with Emotional Factors in Agent Based Ubiquitous Group Decision. 41-50 - Hongliang Gu, Yuanchun Shi, Guangyou Xu, Yu Chen:

A Multi-agent Software Platform Accommodating Location-Awareness for Smart Space. 51-60 - Flora Dilys Salim

, Shonali Krishnaswamy, Seng Wai Loke, Andry Rakotonirainy
:
Context-Aware Ubiquitous Data Mining Based Agent Model for Intersection Safety. 61-70 - Takao Takenouchi, Takahiro Kawamura, Akihiko Ohsuga:

Development of Knowledge-Filtering Agent Along with User Context in Ubiquitous Environment. 71-80
Session 3: Smart Computing Environments
- Alexandre Courbot, Gilles Grimaud, Jean-Jacques Vandewalle, David Simplot-Ryl:

Application-Driven Customization of an Embedded Java Virtual Machine. 81-90 - Min-Sik Jin, Won-Ho Choi, Yoon-Sim Yang, Min-Soo Jung:

A Study on Fast JCVM with New Transaction Mechanism and Caching-Buffer Based on Java Card Objects with a High Locality. 91-100 - Jhing-Fa Wang, Han-Jen Hsu, Jyun-Sian Li:

Intelligent Object Extraction Algorithm Based on Foreground/Background Classification. 101-110 - Tatsuo Takahashi, Satoshi Tanaka, Kenichi Yamazaki, Tadanori Mizuno:

Thin Client Based User Terminal Architecture for Ubiquitous Computing Environment. 111-120 - Ryohei Sagara, Yasue Kishino, Tsutomu Terada

, Tomoki Yoshihisa, Masahiko Tsukamoto, Shojiro Nishio:
An Application Development Environment for Rule-Based I/O Control Devices. 121-130 - Yongyun Cho

, Joohyun Han, Jaeyoung Choi, Chae Woo Yoo:
A uWDL Handler for Context-Aware Workflow Services in Ubiquitous Computing Environments. 131-140
Session 4: Smart Environments and Systems II
- Stanislav Kurkovsky

, Vladimir Zanev, Anatoly Kurkovsky:
SMMART, a Context-Aware Mobile Marketing Application: Experiences and Lessons. 141-150 - Kwang-il Hwang, Won-Hee Lee, Seokhwan Kim, Doo Seop Eom, Kyeong Hur:

Ubiquitous Organizational Information Service Framework for Large Scale Intelligent Environments. 151-160 - Fran Jarnjak, Jinhyung Kim, Yixin Jing, Hoh Peter In, Dongwon Jeong, Doo-Kwon Baik:

TS-U: Temporal-Spatial Methodology for Application Checking of the Systems in the Ubiquitous Environment. 161-170 - Hsuan-Pu Chang, Wen-Chih Chang, Yun-Long Sie, Nigel H. Lin, Chun-Hong Huang, Timothy K. Shih, Qun Jin:

Ubiquitous Learning on Pocket SCORM. 171-179 - Su-Li Chin, Chun-Hong Huang, Chia-Tong Tang, Jason C. Hung:

An Application Based on Spatial-Relationship to Basketball Defensive Strategies. 180-188 - Owen Macindoe, Mary Lou Maher

:
Intrinsically Motivated Intelligent Rooms. 189-197
Session 5: Smart Networking and Protocols I
- Sungbo Seo, Jaewoo Kang, Keun Ho Ryu:

Multivariate Stream Data Reduction in Sensor Network Applications. 198-207 - Mohamed Baqer

, Asad I. Khan
, Zubair A. Baig
:
Implementing a Graph Neuron Array for Pattern Recognition Within Unstructured Wireless Sensor Networks. 208-217 - Dongyu Shi, Jinyuan You, Zhengwei Qi:

Building Graphical Model Based System in Sensor Networks. 218-227 - Cheol-Min Park, Dae-Won Kim, Jun Hwang:

Energy-Aware Broadcasting Method for Wireless Sensor Network. 228-237 - Arjan Durresi, Vamsi Paruchuri

, Mimoza Durresi, Leonard Barolli:
Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks. 238-247
Session 6: Smart Environments and Systems III
- Minwoo Son, Soonyong Choi, Dongil Shin, Dongkyoo Shin:

The Design and Implementation of a Location-Aware Service Bundle Manager in Smart Space Environments. 248-257 - Jae Yeol Lee, Dong Woo Seo:

A Context-Aware and Augmented Reality-Supported Service Framework in Ubiquitous Environments. 258-267 - Dilmurat Tilwaldi, Toshiya Takahashi, Yuichiro Mishima, Jun Sawamoto, Hisao Koizumi:

A Smart Method of Cooperative Learning Including Distant Lectures and Its Experimental Evaluations. 268-277 - Soo Jin Lee, Moon-hae Kim:

u-KoMIPS: A Medical Image Processing System in a Ubiquitous Environment. 278-287 - Sungjune Hong, Sunyoung Han, Kwanho Song:

The Extended PARLAY X for an Adaptive Context-Aware Personalized Service in a Ubiquitous Computing Environment. 288-297 - Wen-Yang Wang, Chih-Chieh Chuang, Yu-Sheng Lai, Ying-Hong Wang:

A Context-Aware System for Smart Home Applications. 298-305
Session 7: Smart Computing
- Shinya Okuda, Shigeo Kaneda, Hirohide Haga:

Human Position/Height Detection Using Analog Type Pyroelectric Sensors. 306-315 - Egil C. Østhus, Per-Oddvar Osland, Lill Kristiansen:

ENME: An ENriched MEdia Application Utilizing Context for Session Mobility; Technical and Human Issues. 316-325 - Huajun Chen, Zhiyong Ye, Zhaohui Wu:

DartDataFlow: Semantic-Based Sensor Grid. 326-334 - Kaori Fujinami, Tatsuo Nakajima:

Sentient Artefacts: Acquiring User's Context Through Daily Objects. 335-344 - Víctor Zamudio, Victor Callaghan

, Jeannette Shiaw-Yuan Chin
:
A Multi-dimensional Model for Task Representation and Allocation in Intelligent Environments. 345-354 - Ismail Khalil Ibrahim, Reinhard Kronsteiner, Gabriele Kotsis

:
Norms Enforcement as a Coordination Strategy in Ubiquitous Environments. 355-364
Session 8: Smart Objects
- Kei Nakanishi, Makoto Setozaki, Jianhua Ma, Runhe Huang:

A Java-Based RFID Service Framework with Semantic Data Binding Between Real and Cyber Spaces. 365-374 - Yusuke Doi, Shirou Wakayama, Masahiro Ishiyama, Satoshi Ozaki, Atsushi Inoue:

Kallima: A Tag-Reader Protocol for Privacy Enhanced RFID System. 375-382 - JuSung Park, Jeonil Kang, DaeHun Nyang:

Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID. 383-392 - Tsung-Hsiang Chang, Chien-Ju Ho, David Chawei Hsu, Yuan-Hsiang Lee, Min-Shieh Tsai, Mu-Chun Wang, Jane Yung-jen Hsu

:
iCane - A Partner for the Visually Impaired. 393-402
Session 9: Security and Fault Tolerance of Smart Systems I
- Dan Feng, Lingfang Zeng

, Fang Wang, Shunda Zhang:
ORAID: An Intelligent and Fault-Tolerant Object Storage Device. 403-412 - Rodrigo Lanka, Kentaro Oda, Takaichi Yoshida:

Architecture Based Approach to Adaptable Fault Tolerance in Distributed Object-Oriented Computing. 413-422 - Jianyong Huang, Jennifer Seberry, Willy Susilo

, Martin W. Bunder:
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. 423-432 - Kenichi Takahashi, Kouichi Sakurai, Makoto Amamiya:

A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability. 433-442
Session 10: Smart Networking and Protocols II
- Giuseppe De Marco, Salvatore Loreto, Leonard Barolli:

Performance Analysis of IP Micro-mobility Protocols in Single and Simultaneous Movements Scenario. 443-451 - Ying-Hong Wang, Hung-Jen Mao, Chih-Hsiao Tsai, Chih-Chieh Chuang:

HMRP: Hierarchy-Based Multipath Routing Protocol for Wireless Sensor Networks. 452-459 - Joongheon Kim, Wonjun Lee, Eunkyo Kim, Joonmo Kim, Choonhwa Lee, Sungjin Kim, Sooyeon Kim:

On Energy-Aware Dynamic Clustering for Hierarchical Sensor Networks. 460-469 - Ji Young Choi, Chung Gu Kang, Yong-Suk Kim

, Kyeong Hur:
Neighbor Node Discovery Algorithm for Energy-Efficient Clustering in Ubiquitious Sensor Networks. 470-479
Session 11: Security and Fault Tolerance of Smart Systems II
- Xinyi Huang, Yi Mu, Willy Susilo

, Fangguo Zhang
, Xiaofeng Chen:
A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. 480-489 - YoungLok Lee, HyungHyo Lee, Seungyong Lee, HeeMan Park, BongNam Noh:

The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate. 490-498 - Chi-yau Lin, Chia-nan Ke, Shao-you Cheng, Jane Yung-jen Hsu, Hao-Hua Chu:

Object Reminder and Safety Alarm. 499-508 - Subhash Bhalla

, Masaki Hasegawa:
Synchronization and Recovery in an Embedded Database System for Read-Only Transactions. 509-518
Session 12: Intelligent Computing
- Qiangfu Zhao:

Learning with Data Streams - An NNTree Based Approach. 519-528 - Kouichi Sakamoto, Qiangfu Zhao:

Generating Smart Robot Controllers Through Co-evolution. 529-537 - Masao Yokota, Genci Capi

:
Integrated Multimedia Understanding for Ubiquitous Intelligence Based on Mental Image Directed Semantic Theory. 538-546
Session 13: Smart Environments and Systems IV
- Hui-Huang Hsu, Timothy K. Shih, Han-Bin Chang, Yi-Chun Liao, Chia-Tong Tang:

Hyper-Interactive Video Browsing by a Remote Controller and Hand Gestures. 547-555 - Marios C. Angelides, Anastasis A. Sofokleous, Christos N. Schizas

:
Mobile Computing with MPEG-21. 556-565 - Binh An Truong, Young-Koo Lee, Sungyoung Lee:

A Unified Context Model: Bringing Probabilistic Models to Context Ontology. 566-575
IFIP International Symposium on Network-Centric Ubiquitous Systems (NCUS 2005)
- Soo-Joong Ghim, Yong-Ik Yoon, Ilkyeun Ra:

A Component-Based Adaptive Model for Context-Awareness in Ubiquitous Computing. 576-585 - Eun-Jun Yoon, Kee-Young Yoo:

Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem. 586-591 - Eric Angaman:

The Wrong Challenge of 'Pervasive Computing': The Paradigm of Sensor-Based Context-Awareness. 592-601 - Mats Neovius:

An Abstract Model for Incentive-Enhanced Trust in P2P Networks. 602-611 - Yuki Yokohata, Hiroshi Sunaga, Hiroyuki Nakamura:

Construction of Credible Ubiquitous P2P Content Exchange Communities. 612-621 - Hyuntae Cho, Yunju Baek:

Location-Based Routing Protocol for Energy Efficiency in Wireless Sensor Networks. 622-631 - Paul Simon Usher, Neil C. Audsley:

Efficient Access of Remote Resources in Embedded Networked Computer Systems. 632-641 - Jaroslaw Domaszewicz, Michal Rój:

Lightweight Ontology-Driven Representations in Pervasive Computing. 642-651 - Eiko Yoneki, Jean Bacon:

Object Tracking Using Durative Events. 652-662 - Yan Annie Ding, David Everitt:

Design of Integrated Routing System for Mobile Ad Hoc Networks Overlaying Peer-to-Peer Applications. 663-672 - Byungil Lee, Howon Kim:

A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control. 673-682 - Kun Myon Choi, Eui-nam Huh, Hyunseung Choo:

Efficient Resource Management Scheme of TCP Buffer Tuned Parallel Stream to Optimize System Performance. 683-692 - Eui-Jik Kim, Meejoung Kim, Sung-Kwan Youm, Seokhoon Choi, Chul-Hee Kang:

Multi-level Service Differentiation Scheme for the IEEE 802.15.4 Sensor Networks. 693-703 - YoungLok Lee, HyungHyo Lee, Seungyong Lee, InSu Kim, BongNam Noh:

Development of Event Manager and Its Application in Jini Environment. 704-713 - Ming-Hui Tsai, Tzu-Chiang Chiang, Yueh-Min Huang:

On Scalability and Mobility Management of Hierarchical Large-Scale Ad Hoc Networks. 714-723 - Xinli Huang, Wenju Zhang, Fanyuan Ma, Yin Li:

Exploring Small-World-Like Topologies Via SplitProber: Turning Power Laws into an Advantage in Unstructured Overlays. 724-733 - Woo-Jae Kim, Joo-Young Baek, Sun-Don Lee, Young-Joo Suh, Yun-Sung Kim, Jin-A Kim:

Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 802.16 System. 734-743 - Tom Chothia, Konstantinos Chatzikokolakis:

A Survey of Anonymous Peer-to-Peer File-Sharing. 744-755 - Giscard Wepiwé, Sahin Albayrak:

A Churn-Resistant Strategy for a Highly Reliable P2P System. 756-765 - Honghao Wang, Yiming Hu:

Building a Peer-to-Peer Overlay for Efficient Routing and Low Maintenance. 766-775 - Lingjun Qin, Dan Feng:

Dynamic Object Assignment in Object-Based Storage Devices. 776-784 - Sameer Tilak, Kenneth Chiu, Nael B. Abu-Ghazaleh

, Tony Fountain:
Dynamic Resource Discovery for Sensor Networks. 785-796 - Ana Isabel González-Tablas Ferreres, Klaus Kursawe, Benjamín Ramos, Arturo Ribagorda:

Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services. 797-806 - Ajay D. Kshemkalyani

:
Predicate Detection Using Event Streams in Ubiquitous Environments. 807-816
The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005)
- Hanping Hu, Yongqiang Chen:

Image Watermarking Technique Based on Two-Dimensional Chaotic Stream Encryption. 817-824 - Fangguo Zhang

, Willy Susilo
, Yi Mu, Xiaofeng Chen:
Identity-Based Universal Designated Verifier Signatures. 825-834 - Xinyi Huang, Yi Mu, Willy Susilo

, Futai Zhang:
Short Designated Verifier Proxy Signature from Pairings. 835-844 - Zhiping Jia, Xinxiao Qiao:

An Embedded Gateway Based on Real-Time Database. 845-853 - Shidi Xu, Yi Mu, Willy Susilo

:
Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks. 854-863 - Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Howon Kim, Kyoil Chung:

Collision Attack on XTR and a Countermeasure with a Fixed Pattern. 864-873 - Takumi Endo, Junichi Miura, Koichi Nanashima, Shoichi Morimoto, Yuichi Goto

, Jingde Cheng:
Security in Persistently Reactive Systems. 874-883 - So-Young Park, Sang-Ho Lee:

ID-Based Access Control and Authority Delegations. 884-893 - Jun Anzai, Tsutomu Matsumoto:

How to Construct Secure Cryptographic Location-Based Services. 894-904 - Hoang Nam Nguyen, Hiroaki Morino:

A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling Load. 905-915 - Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakurai:

Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow. 916-925 - Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee:

Authenticated Public Key Distribution Scheme Without Trusted Third Party. 926-935 - Bok-Min Goi

, Raphael Chung-Wei Phan
, M. U. Siddiqi
:
Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004. 936-944 - Eun Young Choi, Su-Mi Lee, Dong Hoon Lee:

Efficient RFID Authentication Protocol for Ubiquitous Computing Environment. 945-954 - Eun-Jun Yoon, Kee-Young Yoo:

A New Simple Authenticated Key Agreement and Protected Password Change Protocol. 955-964 - Yunho Lee, Kwang-Woo Lee, Seungjoo Kim

, Dongho Won, Hyungkyu Yang:
A Method for Deciding Quantization Steps in QIM Watermarking Schemes. 965-975 - Jung-Taek Seo

, Cheolho Lee, Taeshik Shon, Kyuhyung Cho, Jongsub Moon:
A New DDoS Detection Model Using Multiple SVMs and TRA. 976-985 - Jung-Taek Seo

, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon:
PPF Model with CTNT to Defend Web Server from DDoS Attack. 986-995 - Sooyeon Shin, Taekyoung Kwon:

Efficient Key Agreement for Merging Clusters in Ad-Hoc Networking Environments. 996-1005 - Gunhee Lee

, Wonil Kim, Dong-Kyoo Kim:
An Effective Method for Location Privacy in Ubiquitous Computing. 1006-1015 - Zhaoyu Liu, Peeyush Sharma, Jian Raymond Li:

Integrated Support for Location Aware Security Services in Enterprise Wireless Networks. 1016-1024
The 1st International Workshop on RFID and Ubiquitous Sensor Networks (USN 2005)
Session 1: RFID
- Vinay Deolalikar, John Recker, Malena R. Mesarina, Salil Pradhan:

Optimal Scheduling for Networks of RFID Readers. 1025-1035 - Shailesh M. Birari, Sridhar Iyer:

PULSE: A MAC Protocol for RFID Networks. 1036-1046 - S. Anusha, Sridhar Iyer:

RFIDcover - A Coverage Planning Tool for RFID Networks with Mobile Readers. 1047-1057 - Elaine Lai, Andrew Redfern, Paul K. Wright:

Vibration Powered Battery-Assisted Passive RFID Tag. 1058-1068 - C. Philipp Schloter, Hamid K. Aghajan:

Wireless RFID Networks for Real-Time Customer Relationship Management. 1069-1077 - Yong Hwan Lee, Hee Jung Kim, Byeong-Hee Roh

, Seung W. Yoo, Y. C. Oh:
Tree-Based Classification Algorithm for Heterogeneous Unique Item ID Schemes. 1078-1087 - Sung Jin Choi, Hee Yong Youn:

An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks. 1088-1097
Session 2: USN
- Kyung Tae Kim, Hee Yong Youn:

Energy-Driven Adaptive Clustering Hierarchy (EDACH) for Wireless Sensor Networks. 1098-1107 - Jin Wang, Lei Shu, Jinsung Cho, Young-Koo Lee, Sungyoung Lee, Yonil Zhung:

A Load-Balancing and Energy-Aware Clustering Algorithm in Wireless Ad-Hoc Networks. 1108-1117 - Hyang-tack Lee, Yong-Hyun Jo, Byeong-Hee Roh, Seung W. Yoo:

Energy-Efficient Cluster Reconfiguration with Fair Cluster Formations in Sensor Networks. 1118-1127 - Lynn Choi, Kwangseok Choi, Jungsun Kim, Byung Joon Park:

Virtual Sink Rotation: Low-Energy Scalable Routing Protocol for Ubiquitous Sensor Networks. 1128-1137 - Young-Mi Song, Sung-Hee Lee, Young-Bae Ko:

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions. 1138-1147 - Sangsoo Lee, Daeyoung Kim, Sungjin Ahn

, Noseong Park:
Power-Aware Position Vector Routing for Wireless Sensor Networks. 1148-1156 - Zhao Li, Wei Zhang, Hengchang Liu, Baohua Zhao, Yugui Qu:

Multicast Routing with Minimum Energy Cost and Minimum Delay in Wireless Sensor Networks. 1157-1168 - Yun Kyung Lee, Eui Hyeok Kwon, Jaesung Lim:

Self Location Estimation Scheme Using ROA in Wireless Sensor Networks. 1169-1177 - Yu Gu, Wei Zhang, Hengchang Liu, Baohua Zhao, Yugui Qu:

Energy-Efficient Target Localization Based on a Prediction Model. 1178-1190 - Wonwoo Jung, Sujeong Shin, Sukwon Choi, Hojung Cha:

Reducing Congestion in Real-Time Multi-party-tracking Sensor Network Applications. 1191-1200 - Qi Zhou, Takuya Asaka, Tatsuro Takahashi:

Variable-Radii Method Based on Probing Mechanism (VRPM): An Energy Conservation Method for Wireless Active Sensor Networks. 1201-1210
The International Workshop on Trusted and Autonomic Ubiquitous and Embedded Systems (TAUES 2005)
Session 1: Autonomic Computing
- Satoshi Yamane:

Automata-Theoretic Performance Analysis Method of Soft Real-Time Systems. 1211-1224 - Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo Lee, Sungyoung Lee:

A Component-based Architecture for an Autonomic Middleware Enabling Mobile Access to Grid Infrastructure. 1225-1234 - Roy Sterritt

, Edward Hanna, Patricia O'Hagan:
Autonomic Agents for Survivable Security Systems. 1235-1244 - Roy Sterritt

, Michael G. Hinchey, James L. Rash, Walt Truszkowski, Christopher A. Rouff, Denis Gracanin
:
Towards Formal Specification and Generation of Autonomic Policies. 1245-1254
Session 2: Security
- Fang-Yie Leu, Wei-Jie Yang:

Intrusion Detection with CUSUM for TCP-Based DDoS. 1255-1264 - Yun Ji Na, Il Seok Ko:

A Digital Content Distribution Using a Group-key and Multi-layered Structure Based on Web. 1265-1272 - Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan:

Access Policy Sheet for Access Control in Fine-Grained XML. 1273-1282
Session 3: Dependable Computing
- Kazuki Iwamoto, Tadashi Dohi

, Naoto Kaio
:
Monitoring the Health Condition of a Ubiquitous System: Rejuvenation vs. Recovery. 1283-1292 - Changyeol Choi, Sungsoo Kim:

A Dependability Management Mechanism for Ubiquitous Computing Systems. 1293-1302 - Junichiro Saito, Kenji Imamoto, Kouichi Sakurai:

Reassignment Scheme of an RFID Tag's Key for Owner Transfer. 1303-1312

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














