default search action
John C. Knight
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c90]Jian Xiang, John C. Knight, Kevin J. Sullivan:
Is My Software Consistent with the Real World? HASE 2017: 1-4 - [c89]Ashlie B. Hocking, M. Anthony Aiello, John C. Knight, Nikos Aréchiga:
Input Space Partitioning to Enable Massively Parallel Proof. NFM 2017: 139-145 - 2016
- [j39]John C. Knight, Jack W. Davidson, Anh Nguyen-Tuong, Jason Hiser, Michele Co:
Diversity in Cybersecurity. Computer 49(4): 94-98 (2016) - [c88]Michele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, Westley Weimer, Jonathan Burket, Gregory L. Frazier, Tiffany M. Frazier, Bruno Dutertre, Ian A. Mason, Natarajan Shankar, Stephanie Forrest:
Double Helix and RAVEN: A System for Cyber Fault Tolerance and Recovery. CISRC 2016: 17:1-17:4 - [c87]Jack W. Davidson, Jason D. Hiser, Anh Nguyen-Tuong, Clark L. Coleman, William H. Hawkins, John C. Knight, Benjamin D. Rodes, Ashlie B. Hocking:
A System for the Security Protection of Embedded Binary Programs. DSN Workshops 2016: 234-237 - [c86]Jian Xiang, John C. Knight, Kevin J. Sullivan:
Synthesis of Logic Interpretations. HASE 2016: 114-121 - [c85]Ashlie B. Hocking, M. Anthony Aiello, John C. Knight, Nikos Aréchiga:
Proving Critical Properties of Simulink Models. HASE 2016: 189-196 - [c84]Jonathan C. Rowanhill, John C. Knight:
Domain Arguments in Safety Critical Software Development. ISSRE 2016: 435-444 - [c83]Ashlie B. Hocking, Benjamin D. Rodes, John C. Knight, Jack W. Davidson, Clark L. Coleman:
A Proof Infrastructure for Binary Programs. NFM 2016: 337-343 - [c82]John C. Knight, Jonathan C. Rowanhill:
The Indispensable Role of Rationale in Safety Standards. SAFECOMP 2016: 39-50 - 2015
- [c81]Ashlie B. Hocking, M. Anthony Aiello, John C. Knight:
Static analysis of physical properties in Simulink models. ISSRE Workshops 2015: 8-11 - [c80]John C. Knight, Jonathan C. Rowanhill, M. Anthony Aiello, Kimberly S. Wasson:
A Comprehensive Safety Lifecycle. SAFECOMP Workshops 2015: 38-49 - [c79]John C. Knight, Jonathan C. Rowanhill, Jian Xiang:
A Safety Condition Monitoring System. SAFECOMP Workshops 2015: 83-94 - [c78]Jian Xiang, John C. Knight, Kevin J. Sullivan:
Real-World Types and Their Application. SAFECOMP 2015: 471-484 - 2014
- [c77]Jason Hiser, Anh Nguyen-Tuong, Michele Co, Benjamin D. Rodes, Matthew Hall, Clark L. Coleman, John C. Knight, Jack W. Davidson:
A Framework for Creating Binary Rewriting Tools (Short Paper). EDCC 2014: 142-145 - [c76]Benjamin D. Rodes, John C. Knight:
Speculative Software Modification and its Use in Securing SOUP. EDCC 2014: 210-221 - [c75]Anh Nguyen-Tuong, Jason Hiser, Michele Co, Nathan Kennedy, David Melski, William Ella, David Hyde, Jack W. Davidson, John C. Knight:
To B or not to B: Blessing OS Commands with Software DNA Shotgun Sequencing. EDCC 2014: 238-249 - [c74]Benjamin D. Rodes, John C. Knight, Kimberly S. Wasson:
A security metric based on security arguments. WETSoM 2014: 66-72 - [c73]Ashlie B. Hocking, John C. Knight, M. Anthony Aiello, Shinichi Shiraishi:
Proving Model Equivalence in Model Based Design. ISSRE Workshops 2014: 18-21 - [c72]M. Anthony Aiello, Ashlie B. Hocking, John C. Knight, Jonathan C. Rowanhill:
SCT: A Safety Case Toolkit. ISSRE Workshops 2014: 216-219 - [c71]Ashlie B. Hocking, John C. Knight, M. Anthony Aiello, Shinichi Shiraishi:
Arguing Software Compliance with ISO 26262. ISSRE Workshops 2014: 226-231 - 2013
- [c70]Ewen Denney, Ganesh Pai, Ibrahim Habli, Tim Kelly, John C. Knight:
1st international workshop on assurance cases for software-intensive systems (ASSURE 2013). ICSE 2013: 1505-1506 - [p2]Claire Le Goues, Anh Nguyen-Tuong, Hao Chen, Jack W. Davidson, Stephanie Forrest, Jason Hiser, John C. Knight, Matthew Van Gundy:
Moving Target Defenses in the Helix Self-Regenerative Architecture. Moving Target Defense 2013: 117-149 - [e2]Ewen Denney, Ibrahim Habli, Tim Kelly, John C. Knight, Ganesh Pai:
Proceedings of the 1st International Workshop on Assurance Cases for Software-Intensive Systems, ASSURE '13, San Francisco, California, USA, May 19, 2013. IEEE Computer Society 2013, ISBN 978-1-4673-6324-2 [contents] - 2012
- [j38]Patrick J. Graydon, Ibrahim Habli, Richard Hawkins, Tim Kelly, John C. Knight:
Arguing Conformance. IEEE Softw. 29(3): 50-57 (2012) - [c69]Benjamin D. Rodes, Anh Nguyen-Tuong, Jason Hiser, John C. Knight, Michele Co, Jack W. Davidson:
Defense against Stack-Based Attacks Using Speculative Stack Layout Transformation. RV 2012: 308-313 - 2011
- [c68]John C. Knight:
Diversity. Dependable and Historic Computing 2011: 298-312 - [c67]Raghavendra Rajkumar, Andrew Wang, Jason Hiser, Anh Nguyen-Tuong, Jack W. Davidson, John C. Knight:
Component-Oriented Monitoring of Binaries for Security. HICSS 2011: 1-10 - [c66]Michele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, David R. Cok, Denis Gopan, David Melski, Wenke Lee, Chengyu Song, Thomas Bracewell, David Hyde, Brian Mastropietro:
PEASOUP: preventing exploits against software of uncertain provenance (position paper). SESS@ICSE 2011: 43-49 - [c65]Richard Hawkins, Tim P. Kelly, John C. Knight, Patrick J. Graydon:
A New Approach to creating Clear Safety Arguments. SSS 2011: 3-23 - [p1]David Evans, Anh Nguyen-Tuong, John C. Knight:
Effectiveness of Moving Target Defenses. Moving Target Defense 2011: 29-48 - 2010
- [c64]Patrick J. Graydon, John C. Knight, Xiang Yin:
Practical Limits on Software Dependability: A Case Study. Ada-Europe 2010: 83-96 - [c63]Anh Nguyen-Tuong, Andrew Wang, Jason Hiser, John C. Knight, Jack W. Davidson:
On the effectiveness of the metamorphic shield. ECSA Companion Volume 2010: 170-174 - [c62]Patrick J. Graydon, John C. Knight:
Software Process Synthesis in Assurance Based Development of Dependable Systems. EDCC 2010: 75-84 - [c61]Xiang Yin, John C. Knight:
Formal Verification of Large Software Systems. NASA Formal Methods 2010: 192-201
2000 – 2009
- 2009
- [j37]Daniel W. Williams, Wei Hu, Jack W. Davidson, Jason Hiser, John C. Knight, Anh Nguyen-Tuong:
Security through Diversity: Leveraging Virtual Machine Technology. IEEE Secur. Priv. 7(1): 26-33 (2009) - [c60]Xiang Yin, John C. Knight, Westley Weimer:
Exploiting refactoring in formal verification. DSN 2009: 53-62 - 2008
- [j36]Elisabeth A. Strunk, John C. Knight:
The essential synthesis of problem frames and assurance cases. Expert Syst. J. Knowl. Eng. 25(1): 9-27 (2008) - [c59]Anh Nguyen-Tuong, David Evans, John C. Knight, Benjamin Cox, Jack W. Davidson:
Security through redundant data diversity. DSN 2008: 187-196 - [c58]Xiang Yin, John C. Knight, Elisabeth A. Nguyen, Westley Weimer:
Formal Verification by Reverse Synthesis. SAFECOMP 2008: 305-319 - 2007
- [c57]Patrick J. Graydon, John C. Knight, Elisabeth A. Strunk:
Assurance Based Development of Critical Systems. DSN 2007: 347-357 - [c56]Zach Hill, Jonathan C. Rowanhill, Anh Nguyen-Tuong, Glenn S. Wasson, John C. Knight, Jim Basney, Marty Humphrey:
Meeting virtual organization performance goals through adaptive grid reconfiguration. GRID 2007: 177-184 - [c55]Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill, Jim Basney, Yuliyan Kiryakov, John C. Knight, Anh Nguyen-Tuong, Andrew S. Grimshaw, Marty Humphrey:
Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections. HPCC 2007: 260-272 - 2006
- [j35]John C. Knight, Nancy G. Leveson:
Software and higher education. Commun. ACM 49(1): 160 (2006) - [j34]Elisabeth A. Strunk, John C. Knight:
Dependability through Assured Reconfiguration in Embedded System Software. IEEE Trans. Dependable Secur. Comput. 3(3): 172-187 (2006) - [c54]John C. Knight:
Future Trends of Software Technology and Applications Model-Based Development. COMPSAC (1) 2006: 18 - [c53]Elisabeth A. Strunk, John C. Knight:
The essential synthesis of problem frames and assurance cases. IWAAPF@ICSE 2006: 81-86 - [c52]Patrick J. Graydon, John C. Knight, Elisabeth A. Strunk:
Achieving Dependable Systems by Synergistic Development of Architectures and Assurance Cases. WADS 2006: 362-382 - [c51]Wei Hu, Jason Hiser, Daniel W. Williams, Adrian Filipi, Jack W. Davidson, David Evans, John C. Knight, Anh Nguyen-Tuong, Jonathan C. Rowanhill:
Secure and practical defense against code-injection attacks using software dynamic translation. VEE 2006: 2-12 - 2005
- [j33]John C. Knight:
Focusing software education on engineering. ACM SIGSOFT Softw. Eng. Notes 30(2): 3-5 (2005) - [c50]Elisabeth A. Strunk, John C. Knight, M. Anthony Aiello:
Assured Reconfiguration of Fail-Stop Systems. DSN 2005: 2-11 - [c49]Elisabeth A. Strunk, Xiang Yin, John C. Knight:
Echo: a practical approach to formal verification. FMICS 2005: 44-53 - [c48]Andrew S. Grimshaw, Marty A. Humphrey, John C. Knight, Anh Nguyen-Tuong, Jonathan C. Rowanhill, Glenn S. Wasson, Jim Basney:
The Development of Dependable and Survivable Grids. International Conference on Computational Science (2) 2005: 729-737 - [c47]Kimberly S. Wasson, Kendra N. Schmid, Robyn R. Lutz, John C. Knight:
Using Occurrence Properties of Defect Report Data to Improve Requirements. RE 2005: 253-262 - 2004
- [j32]John C. Knight:
Editorial: AE Introduction. IEEE Trans. Software Eng. 30(1): 1-2 (2004) - [j31]John C. Knight:
Editorial: The State of TSE. IEEE Trans. Software Eng. 30(2): 81- (2004) - [j30]John C. Knight:
Editorial: AE Farewell. IEEE Trans. Software Eng. 30(5): 281- (2004) - [j29]John C. Knight:
Editorial: AE Introduction. IEEE Trans. Software Eng. 30(8): 489-490 (2004) - [c46]John C. Knight:
Focusing Software Education on Engineering. CSEE&T 2004: 2-3 - [c45]Elisabeth A. Strunk, John C. Knight:
Assured Reconfiguration of Embedded Real-Time Software. DSN 2004: 367-376 - [c44]Jonathan C. Rowanhill, Philip E. Varner, John C. Knight:
Efficient Hierarchic Management For Reconfiguration of Networked Information Systems. DSN 2004: 517-526 - [c43]John C. Knight:
An Introduction to Computing System Dependability. ICSE 2004: 730-731 - [c42]William S. Greenwell, Elisabeth A. Strunk, John C. Knight:
Failure Analysis and the Safety-Case Lifecycle. Human Error, Safety and Systems Development 2004: 163-176 - [c41]Riccardo Scandariato, John C. Knight:
The Design and Evaluation of a Defense System for Internet Worms. SRDS 2004: 164-173 - 2003
- [j28]John C. Knight:
Editorial: AE Introduction. IEEE Trans. Software Eng. 29(4): 289 (2003) - [j27]John C. Knight:
Editorial: AE Farewell. IEEE Trans. Software Eng. 29(8): 673 (2003) - [j26]John C. Knight:
New AEIC Introduction and AE Farewell. IEEE Trans. Software Eng. 29(11): 961 (2003) - [c40]John C. Knight, Elisabeth A. Strunk, Kevin J. Sullivan:
Towards a Rigorous Definition of Information System Survivability. DISCEX (1) 2003: 78-89 - [c39]John C. Knight, Jonathan Hill, Philip E. Varner, Premkumar T. Devanbu, Alexander L. Wolf, Dennis Heimbigner:
Willow System Demonstration. DISCEX (2) 2003: 123-125 - [c38]John C. Knight, Elisabeth A. Strunk:
Achieving Critical System Survivability Through Software Architectures. WADS 2003: 51-78 - [c37]John C. Knight:
Computing Systems Dependability. ICSE 2003: 742-743 - [c36]Kimberly S. Wasson, John C. Knight, Elisabeth A. Strunk, Sean R. Travis:
Tools Supporting the Communication of Critical Domain Knowledge in High-Consequence Systems Development. SAFECOMP 2003: 317-330 - 2002
- [j25]John C. Knight:
Desert Island Books. Autom. Softw. Eng. 9(3): 321-334 (2002) - [j24]John C. Knight, Nancy G. Leveson:
Should software engineers be licensed?. Commun. ACM 45(11): 87-90 (2002) - [j23]John C. Knight:
AE Introduction. IEEE Trans. Software Eng. 28(3): 209 (2002) - [j22]John C. Knight:
Editorial: New AE Introduction/Farewell. IEEE Trans. Software Eng. 28(12): 1105 (2002) - [c35]John C. Knight:
Safety critical systems: challenges and directions. ICSE 2002: 547-550 - [c34]John C. Knight:
Dependability of embedded systems. ICSE 2002: 685-686 - [c33]John C. Knight:
Software Challenges in Aviation Systems. SAFECOMP 2002: 106-112 - 2001
- [c32]Chenxi Wang, Jonathan Hill, John C. Knight, Jack W. Davidson:
Protection of Software-Based Survivability Mechanisms. DSN 2001: 193-202 - [c31]John C. Knight:
Erroneous Requirements: A Linguistic Basis for Their Occurrence and an Approach to Their Reduction. HASE 2001: 3 - [c30]John C. Knight, Matthew C. Elder:
Fault Tolerant Distributed Information Systems. ISSRE 2001: 132-137 - [c29]John C. Knight, Kimberly S. Hanks, Sean R. Travis:
Tool Support for Production Use of Formal Techniques. ISSRE 2001: 242-253 - 2000
- [c28]Chenxi Wang, John C. Knight, Matthew C. Elder:
On Computer Viral Infection and the Effect of Immunization. ACSAC 2000: 246-256 - [e1]John C. Knight, David S. Rosenblum:
ACM SIGSOFT Symposium on Foundations of Software Engineering, an Diego, California, USA, November 6-10, 2000, Proceedings. ACM 2000, ISBN 978-1-58113-205-2 [contents]
1990 – 1999
- 1999
- [j21]Susan S. Brilliant, John C. Knight:
Empirical research in software engineering: a workshop. ACM SIGSOFT Softw. Eng. Notes 24(3): 44-52 (1999) - [c27]John C. Knight, P. Thomas Fletcher, Brian R. Hicks:
Tool Support for Production Use of Formal Techniques. World Congress on Formal Methods 1999: 1854 - [c26]Kevin J. Sullivan, John C. Knight, Xing Du, Steve Geist:
Information Survivability Control Systems. ICSE 1999: 184-192 - 1998
- [j20]John C. Knight, Michael F. Dunn:
Software Quality Through Domain-Driven Certification. Ann. Softw. Eng. 5: 293-315 (1998) - [c25]John C. Knight:
Challenges in the Utilization of Formal Methods. FTRTFT 1998: 1-17 - 1997
- [j19]Paul Ammann, Dahlard L. Lukes, John C. Knight:
Applying Data Redundancy to Differential Equation Solvers. Ann. Softw. Eng. 4: 65-77 (1997) - [j18]James C. French, John C. Knight, Allison L. Powell:
Applying Hypertext Structures to Software Documentation. Inf. Process. Manag. 33(2): 219-231 (1997) - [c24]John C. Knight, Luís G. Nakano:
Software Test Techniques for System Fault-Tree Analysis. SAFECOMP 1997: 369-380 - [c23]John C. Knight, Susan S. Brilliant:
Preliminary Evaluation of a Formal Approach to User Interface Specification. ZUM 1997: 329-346 - 1996
- [c22]Kevin J. Sullivan, John C. Knight:
Experience Assessing an Architectural Approach to Large-Scale Systematic Reuse. ICSE 1996: 220-229 - [c21]Allison L. Powell, James C. French, John C. Knight:
A systematic approach to creating and maintaining software documentation. SAC 1996: 201-208 - 1994
- [j17]John C. Knight, Bev Littlewood:
Guest Editors' Introduction: Critical Task of Writing Dependable Software. IEEE Softw. 11(1): 16-20 (1994) - [j16]Paul Ammann, Susan S. Brilliant, John C. Knight:
The Effect of Imperfect Error Detection on Reliability Assessment via Life Testing. IEEE Trans. Software Eng. 20(2): 142-148 (1994) - [c20]John C. Knight, Aaron G. Cass, Antonio M. Fernández, Kevin G. Wika:
Testing a Safety-Critical Application. ISSTA 1994: 199 - [c19]John C. Knight, Jane C. Prey, William A. Wulf:
Undergraduate computer science education: a new curriculum philosophy & overview. SIGCSE 1994: 155-159 - 1993
- [j15]John C. Knight, E. Ann Myers:
An Improved Inspection Technique. Commun. ACM 36(11): 50-61 (1993) - [c18]Michael F. Dunn, John C. Knight:
Automating the Detection of Reusable Parts in Existing Software. ICSE 1993: 381-390 - 1992
- [c17]John C. Knight, Darrell M. Kienzle:
Preliminary Experience Using Z to Specify a Safety-Critical System. Z User Workshop 1992: 109-118 - 1991
- [j14]John C. Knight, E. Ann Myers:
Phased inspections and their implementation. ACM SIGSOFT Softw. Eng. Notes 16(3): 29-35 (1991) - [j13]Dave E. Eckhardt, Alper K. Caglayan, John C. Knight, Larry D. Lee, David F. McAllister, Mladen A. Vouk, John P. J. Kelly:
An Experimental Evaluation of Software Redundancy as a Strategy For Improving Reliability. IEEE Trans. Software Eng. 17(7): 692-702 (1991) - [c16]Michael F. Dunn, John C. Knight:
Software Reuse in an Industrial Setting: A Case Study. ICSE 1991: 329-338 - 1990
- [j12]John C. Knight, Nancy G. Leveson:
A reply to the criticisms of the Knight & Leveson experiment. ACM SIGSOFT Softw. Eng. Notes 15(1): 24-35 (1990) - [j11]Susan S. Brilliant, John C. Knight, Nancy G. Leveson:
Analysis of Faults in an N-Version Software Experiment. IEEE Trans. Software Eng. 16(2): 238-247 (1990) - [j10]Nancy G. Leveson, Stephen S. Cha, John C. Knight, Timothy J. Shimeall:
The Use of Self Checks and Voting in Software Error Detection: An Empirical Study. IEEE Trans. Software Eng. 16(4): 432-443 (1990) - [c15]John C. Knight:
Issues of software reliability in medical systems. CBMS 1990: 153-160 - [c14]Susan S. Brilliant, John C. Knight, Paul Ammann:
On the performance of software testing using multiple versions. FTCS 1990: 408-415 - [c13]John C. Knight:
On the assessment of Ada performance. Working Group on Ada Performance Issues 1990: 1-6
1980 – 1989
- 1989
- [j9]Susan S. Brilliant, John C. Knight, Nancy G. Leveson:
The Consistent Comparison Problem in N-Version Software. IEEE Trans. Software Eng. 15(11): 1481-1485 (1989) - [c12]Samuel T. Gregory, John C. Knight:
On the provision of backward error recovery in production programming languages. FTCS 1989: 506-511 - [c11]John C. Knight, Paul Ammann:
Issues Influencing the Use of N-Version Programming. IFIP Congress 1989: 217-222 - [c10]John C. Knight:
Can Software Faults be Tolerated? (Position Statement). IFIP Congress 1989: 501 - 1988
- [j8]Paul Ammann, John C. Knight:
Data Diversity: An Approach to Software Fault Tolerance. IEEE Trans. Computers 37(4): 418-425 (1988) - [c9]John C. Knight, Marc E. Rouleau:
A new approach to fault tolerance in distributed Ada programs. IRTAW 1988: 123-126 - 1987
- [j7]Susan S. Brilliant, John C. Knight, Nancy G. Leveson:
The consistent comparison problem in N-version software. ACM SIGSOFT Softw. Eng. Notes 12(1): 29-34 (1987) - [j6]John C. Knight, John I. A. Urquhart:
On the Implementation and Use of Ada on Fault-Tolerant Distributed Systems. IEEE Trans. Software Eng. 13(5): 553-563 (1987) - [c8]John C. Knight:
Ada on fault-tolerant distributed systems. IRTAW 1987: 61-63 - [c7]John C. Knight, Marc E. Rouleau:
Analysis of Ada for a crucial distributed application. WADAS 1987: 103-110 - 1986
- [j5]John C. Knight, Nancy G. Leveson:
An Experimental Evaluation of the Assumption of Independence in Multiversion Programming. IEEE Trans. Software Eng. 12(1): 96-109 (1986) - 1985
- [j4]John C. Knight, James L. Russel:
Software Development Tools for Microcontrollers. Softw. Pract. Exp. 15(5): 459-472 (1985) - [c6]John C. Knight, Paul Ammann:
An Experimental Evaluation of Simple Methods for Seeding Program Errors. ICSE 1985: 337-342 - 1983
- [j3]W. Robert Collings, Robert E. Noonan, Samuel T. Gregory, John C. Knight, Roy W. Hamm:
Comprehensive Tools for Assembler Construction. Softw. Pract. Exp. 13(5): 447-451 (1983) - [j2]John C. Knight, Douglas D. Dunlop:
On the Design of a Special-purpose Scientific Programming Language. Softw. Pract. Exp. 13(10): 893-907 (1983) - [j1]Thomas Anderson, John C. Knight:
A Framework for Software Fault Tolerance in Real-Time Systems. IEEE Trans. Software Eng. 9(3): 355-364 (1983) - [c5]J. R. Grierson, B. Cosgrove, Daniel Richert, R. E. Halliwell, Harold Kirk, John C. Knight, John A. McLean, J. M. McGrail, C. O. Newton:
The UK5000 - successful collaborative development of an integrated design system for a 5000 gate CMOS array with built-in test. DAC 1983: 629-636
1970 – 1979
- 1979
- [c4]John C. Knight:
PASCAL Users' forum. ACM Annual Conference 1979: 105 - 1975
- [c3]David S. Cochran, M. K. Gordon, Michael Minkoff, John C. Knight, Gabor T. Herman, Arnold Lent, Peter H. Lutz, Kenneth M. Brown:
SIGNUM a spectrum of mathematical software considerations - 1975 (Paper Session). ACM Annual Conference 1975: 158 - [c2]John C. Knight, William G. Poole Jr., Robert G. Voigt:
System balance analysis for vector computers. ACM Annual Conference 1975: 163-168 - [c1]Victor R. Basili, John C. Knight:
A language design for vector machines. Programming Languages and Compilers for Parallel and Vector Machines 1975: 39-43
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint