default search action
Danny Hendler
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j29]Mirza Ahad Baig, Danny Hendler, Alessia Milani, Corentin Travers:
Long-lived counters with polylogarithmic amortized step complexity. Distributed Comput. 36(1): 29-43 (2023) - [c69]Silvie Levy, Ehud Gudes, Danny Hendler:
A Survey of Security Challenges in Automatic Identification System (AIS) Protocol. CSCML 2023: 411-423 - [c68]Tomer Lev Lehman, Hagit Attiya, Danny Hendler:
Recoverable and Detectable Self-Implementations of Swap. OPODIS 2023: 24:1-24:22 - [c67]Tomer Lev Lehman, Hagit Attiya, Danny Hendler:
Brief Announcement: Recoverable and Detectable Self-Implementations of Swap. DISC 2023: 44:1-44:7 - [i20]Tomer Lev Lehman, Hagit Attiya, Danny Hendler:
Recoverable and Detectable Self-Implementations of Swap. CoRR abs/2308.03485 (2023) - 2022
- [j28]Hagit Attiya, Armando Castañeda, Danny Hendler, Matthieu Perrin:
Separating lock-freedom from wait-freedom at every level of the consensus hierarchy. J. Parallel Distributed Comput. 163: 181-197 (2022) - [c66]Asa Bornstein, Amir Rubin, Danny Hendler:
Machine-Learning Based Objective Function Selection for Community Detection. CSCML 2022: 135-152 - [c65]Yehonatan Fridman, Yaniv Snir, Harel Levin, Danny Hendler, Hagit Attiya, Gal Oren:
Recovery of Distributed Iterative Solvers for Linear Systems Using Non-Volatile RAM. FTXS@SC 2022: 11-23 - [c64]Hagit Attiya, Ohad Ben-Baruch, Panagiota Fatourou, Danny Hendler, Eleftherios Kosmas:
Detectable recovery of lock-free data structures. PPoPP 2022: 262-277 - [d2]Hagit Attiya, Ohad Ben-Baruch, Panagiota Fatourou, Danny Hendler, Eleftherios Kosmas:
Tracking: PPoPP 22 - Detectable Recovery of Lock-Free Data Structures. Version v.1.0.1. Zenodo, 2022 [all versions] - [i19]Asa Bornstein, Amir Rubin, Danny Hendler:
Machine-Learning Based Objective Function Selection for Community Detection. CoRR abs/2203.13495 (2022) - [i18]Yehonatan Fridman, Yaniv Snir, Harel Levin, Danny Hendler, Hagit Attiya, Gal Oren:
NVM-ESR: Using Non-Volatile Memory in Exact State Reconstruction of Preconditioned Conjugate Gradient. CoRR abs/2204.11584 (2022) - 2021
- [j27]Ron Korine, Danny Hendler:
DAEMON: Dataset/Platform-Agnostic Explainable Malware Classification Using Multi-Stage Feature Mining. IEEE Access 9: 78382-78399 (2021) - [c63]Dorel Yaffe, Danny Hendler:
Early Detection of In-Memory Malicious Activity Based on Run-Time Environmental Features. CSCML 2021: 397-404 - [c62]Yehonatan Fridman, Yaniv Snir, Matan Rusanovsky, Kfir Zvi, Harel Levin, Danny Hendler, Hagit Attiya, Gal Oren:
Assessing the Use Cases of Persistent Memory in High-Performance Scientific Computing. FTXS@SC 2021: 11-20 - [c61]Danny Hendler, Adnane Khattabi, Alessia Milani, Corentin Travers:
Upper and Lower Bounds for Deterministic Approximate Objects. ICDCS 2021: 438-448 - [c60]Liad Nahum, Hagit Attiya, Ohad Ben-Baruch, Danny Hendler:
Recoverable and Detectable Fetch&Add. OPODIS 2021: 29:1-29:17 - [c59]Vitaly Aksenov, Ohad Ben-Baruch, Danny Hendler, Ilya Kokorin, Matan Rusanovsky:
Execution of NVRAM Programs with Persistent Stack. PaCT 2021: 117-131 - [c58]Matan Rusanovsky, Hagit Attiya, Ohad Ben-Baruch, Tom Gerby, Danny Hendler, Pedro Ramalhete:
Flat-Combining-Based Persistent Data Structures for Non-volatile Memory. SSS 2021: 505-509 - [d1]Hagit Attiya, Ohad Ben-Baruch, Panagiota Fatourou, Danny Hendler, Eleftherios Kosmas:
PPoPP 22 - Detectable Recovery of Lock-Free Data Structures. Version v.1.0.0. Zenodo, 2021 [all versions] - [i17]Dorel Yaffe, Danny Hendler:
Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features. CoRR abs/2103.16029 (2021) - [i16]Danny Hendler, Adnane Khattabi, Alessia Milani, Corentin Travers:
Upper and Lower Bounds for Deterministic Approximate Objects. CoRR abs/2104.09902 (2021) - [i15]Vitaly Aksenov, Ohad Ben-Baruch, Danny Hendler, Ilya Kokorin, Matan Rusanovsky:
Execution of NVRAM Programs with Persistent Stack. CoRR abs/2105.11932 (2021) - [i14]Yaniv Agman, Danny Hendler:
BPFroid: Robust Real Time Android Malware Detection Framework. CoRR abs/2105.14344 (2021) - [i13]Yehonatan Fridman, Yaniv Snir, Matan Rusanovsky, Kfir Zvi, Harel Levin, Danny Hendler, Hagit Attiya, Gal Oren:
Assessing the Use Cases of Persistent Memory in High-Performance Scientific Computing. CoRR abs/2109.02166 (2021) - 2020
- [c57]Danny Hendler, Shay Kels, Amir Rubin:
AMSI-Based Detection of Malicious PowerShell Code Using Contextual Embeddings. AsiaCCS 2020: 679-693 - [c56]Ohad Ben-Baruch, Danny Hendler, Matan Rusanovsky:
Upper and Lower Bounds on the Space Complexity of Detectable Objects. PODC 2020: 11-20 - [c55]Mirza Ahad Baig, Danny Hendler, Alessia Milani, Corentin Travers:
Long-Lived Snapshots with Polylogarithmic Amortized Step Complexity. PODC 2020: 31-40 - [c54]Hagit Attiya, Ohad Ben-Baruch, Panagiota Fatourou, Danny Hendler, Eleftherios Kosmas:
Tracking in Order to Recover - Detectable Recovery of Lock-Free Data Structures. SPAA 2020: 503-505 - [i12]Ohad Ben-Baruch, Danny Hendler, Matan Rusanovsky:
Upper and Lower Bounds on the Space Complexity of Detectable Object. CoRR abs/2002.11378 (2020) - [i11]Amit Portnoy, Danny Hendler:
Towards Realistic Byzantine-Robust Federated Learning. CoRR abs/2004.04986 (2020) - [i10]Ron Korine, Danny Hendler:
DAEMON: Dataset-Agnostic Explainable Malware Classification Using Multi-Stage Feature Mining. CoRR abs/2008.01855 (2020) - [i9]Matan Rusanovsky, Ohad Ben-Baruch, Danny Hendler, Pedro Ramalhete:
A Flat-Combining-Based Persistent Stack for Non-Volatile Memory. CoRR abs/2012.12868 (2020)
2010 – 2019
- 2019
- [j26]Shlomi Dolev, Anat Eyal, Danny Hendler, Philip Derbeko, Marina Sadetsky:
Upper bounds for multi-level multi-server paging. Inf. Process. Lett. 142: 72-76 (2019) - [c53]Mirza Ahad Baig, Danny Hendler, Alessia Milani, Corentin Travers:
Long-Lived Counters with Polylogarithmic Amortized Step Complexity. DISC 2019: 3:1-3:16 - [e1]Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung:
Cyber Security Cryptography and Machine Learning - Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings. Lecture Notes in Computer Science 11527, Springer 2019, ISBN 978-3-030-20950-6 [contents] - [i8]Amir Rubin, Shay Kels, Danny Hendler:
Detecting Malicious PowerShell Scripts Using Contextual Embeddings. CoRR abs/1905.09538 (2019) - [i7]Hagit Attiya, Ohad Ben-Baruch, Panagiota Fatourou, Danny Hendler, Eleftherios Kosmas:
Tracking in Order to Recover: Recoverable Lock-Free Data Structures. CoRR abs/1905.13600 (2019) - 2018
- [j25]Hagit Attiya, Armando Castañeda, Danny Hendler:
Nontrivial and universal helping for wait-free queues and stacks. J. Parallel Distributed Comput. 121: 1-14 (2018) - [j24]Yehonatan Cohen, Danny Hendler, Amir Rubin:
Detection of malicious webmail attachments based on propagation patterns. Knowl. Based Syst. 141: 67-79 (2018) - [j23]Yehonatan Cohen, Daniel Gordon, Danny Hendler:
Early detection of spamming accounts in large-Scale service provider networks. Knowl. Based Syst. 142: 241-255 (2018) - [j22]Yehonatan Cohen, Danny Hendler:
Scalable Detection of Server-Side Polymorphic Malware. Knowl. Based Syst. 156: 113-128 (2018) - [c52]Danny Hendler, Shay Kels, Amir Rubin:
Detecting Malicious PowerShell Commands using Deep Neural Networks. AsiaCCS 2018: 187-197 - [c51]Hagit Attiya, Ohad Ben-Baruch, Danny Hendler:
Nesting-Safe Recoverable Linearizability: Modular Constructions for Non-Volatile Memory. PODC 2018: 7-16 - [c50]Wojciech M. Golab, Danny Hendler:
Recoverable Mutual Exclusion Under System-Wide Failures. PODC 2018: 17-26 - [c49]Hagit Attiya, Armando Castañeda, Danny Hendler, Matthieu Perrin:
Separating Lock-Freedom from Wait-Freedom. PODC 2018: 41-50 - [c48]Or Ami, Yuval Elovici, Danny Hendler:
Ransomware prevention using application authentication-based file access control. SAC 2018: 1610-1619 - [i6]Danny Hendler, Shay Kels, Amir Rubin:
Detecting Malicious PowerShell Commands using Deep Neural Networks. CoRR abs/1804.04177 (2018) - 2017
- [c47]Tomer Cohen, Danny Hendler, Dennis Potashnik:
Supervised Detection of Infected Machines Using Anti-virus Induced Labels - (Extended Abstract). CSCML 2017: 34-49 - [c46]Wojciech M. Golab, Danny Hendler:
Recoverable Mutual Exclusion in Sub-logarithmic Time. PODC 2017: 211-220 - 2016
- [j21]James Aspnes, Keren Censor-Hillel, Hagit Attiya, Danny Hendler:
Lower Bounds for Restricted-Use Objects. SIAM J. Comput. 45(3): 734-762 (2016) - [c45]Yehonatan Cohen, Danny Hendler, Amir Rubin:
Node-centric detection of overlapping communities in social networks. ASONAM 2016: 1384-1385 - [c44]Danny Hendler:
On the Complexity of Reader-Writer Locks: Extended Abstract. PODC 2016: 315-324 - [c43]Hagit Attiya, Ohad Ben-Baruch, Danny Hendler:
Lower Bound on the Step Complexity of Anonymous Binary Consensus. DISC 2016: 257-268 - [r2]Danny Hendler:
Mellor-Crummey and Scott Mutual Exclusion Algorithm. Encyclopedia of Algorithms 2016: 1256-1260 - [i5]Yehonatan Cohen, Danny Hendler, Amir Rubin:
Node-Centric Detection of Overlapping Communities in Social Networks. CoRR abs/1607.01683 (2016) - 2015
- [j20]Daniel Gordon, Danny Hendler, Aryeh Kontorovich, Lior Rokach:
Local-shapelets for fast classification of spectrographic measurements. Expert Syst. Appl. 42(6): 3150-3158 (2015) - [j19]Daniel Gordon, Danny Hendler, Lior Rokach:
Fast and space-efficient shapelets-based time-series classification. Intell. Data Anal. 19(5): 953-981 (2015) - [c42]Yehonatan Cohen, Danny Hendler:
Birds of a Feather Flock Together: The Accidental Communities of Spammers. ASONAM 2015: 986-993 - [c41]Hagit Attiya, Armando Castañeda, Danny Hendler:
Nontrivial and Universal Helping for Wait-Free Queues and Stacks. OPODIS 2015: 31:1-31:16 - [c40]Hagit Attiya, Danny Hendler, Philipp Woelfel:
Trading Fences with RMRs and Separating Memory Models. PODC 2015: 173-182 - [c39]Ohad Ben-Baruch, Danny Hendler:
The Price of being Adaptive. PODC 2015: 183-192 - [p1]Danny Hendler, Adi Suissa-Peleg:
Scheduling-Based Contention Management Techniques for Transactional Memory. Transactional Memory 2015: 213-227 - 2014
- [j18]Dave Dice, Danny Hendler, Ilya Mirsky:
Software-based contention management for efficient compare-and-swap operations. Concurr. Comput. Pract. Exp. 26(14): 2386-2404 (2014) - [c38]Danny Hendler, Vitaly Khait:
Complexity tradeoffs for read and update operations. PODC 2014: 186-195 - 2013
- [c37]Yehonatan Cohen, Daniel Gordon, Danny Hendler:
Early Detection of Outgoing Spammers in Large-Scale Service Provider Networks. DIMVA 2013: 83-101 - [c36]David Dice, Danny Hendler, Ilya Mirsky:
Lightweight Contention Management for Efficient Compare-and-Swap Operations. Euro-Par 2013: 595-606 - [c35]Hagit Attiya, Danny Hendler, Smadar Levy:
An O(1)-barriers optimal RMRs mutual exclusion algorithm: extended abstract. PODC 2013: 220-229 - [c34]Michael Gorelik, Danny Hendler:
Brief announcement: an asymmetric flat-combining based queue algorithm. PODC 2013: 319-321 - [c33]Danny Hendler, Alex Naiman, Sebastiano Peluso, Francesco Quaglia, Paolo Romano, Adi Suissa:
Exploiting Locality in Lease-Based Replicated Transactional Memory via Task Migration. DISC 2013: 121-133 - [i4]Dave Dice, Danny Hendler, Ilya Mirsky:
Lightweight Contention Management for Efficient Compare-and-Swap Operations. CoRR abs/1305.5800 (2013) - [i3]Danny Hendler, Alex Naiman, Sebastiano Peluso, Francesco Quaglia, Paolo Romano, Adi Suissa:
Exploiting Locality in Lease-Based Replicated Transactional Memory via Task Migration. CoRR abs/1308.2147 (2013) - 2012
- [j17]Anat Bremler-Barr, David Hay, Danny Hendler:
Layered interval codes for TCAM-based classification. Comput. Networks 56(13): 3023-3039 (2012) - [j16]Wojciech M. Golab, Vassos Hadzilacos, Danny Hendler, Philipp Woelfel:
RMR-efficient implementations of comparison primitives using read and write operations. Distributed Comput. 25(2): 109-162 (2012) - [j15]Tomer Heber, Danny Hendler, Adi Suissa:
On the impact of serializing contention management on STM performance. J. Parallel Distributed Comput. 72(6): 739-750 (2012) - [j14]Faith Ellen, Danny Hendler, Nir Shavit:
On the Inherent Sequentiality of Concurrent Objects. SIAM J. Comput. 41(3): 519-536 (2012) - [j13]Anat Bremler-Barr, Danny Hendler:
Space-Efficient TCAM-Based Classification Using Gray Coding. IEEE Trans. Computers 61(1): 18-30 (2012) - [c32]James Aspnes, Hagit Attiya, Keren Censor-Hillel, Danny Hendler:
Lower bounds for restricted-use objects: extended abstract. SPAA 2012: 172-181 - [i2]Daniel Gordon, Danny Hendler, Lior Rokach:
Fast Randomized Model Generation for Shapelet-Based Time Series Classification. CoRR abs/1209.5038 (2012) - 2011
- [j12]Danny Hendler, Philipp Woelfel:
Randomized mutual exclusion with sub-logarithmic RMR-complexity. Distributed Comput. 24(1): 3-19 (2011) - [c31]Gal Bar-Nissan, Danny Hendler, Adi Suissa:
A Dynamic Elimination-Combining Stack Algorithm. OPODIS 2011: 544-561 - [c30]Hagit Attiya, Rachid Guerraoui, Danny Hendler, Petr Kuznetsov, Maged M. Michael, Martin T. Vechev:
Laws of order: expensive synchronization in concurrent algorithms cannot be eliminated. POPL 2011: 487-498 - [c29]Aryeh Kontorovich, Danny Hendler, Eitan Menahem:
Metric Anomaly Detection via Asymmetric Risk Minimization. SIMBAD 2011: 17-30 - [r1]Danny Hendler:
Non-Blocking Algorithms. Encyclopedia of Parallel Computing 2011: 1321-1329 - [i1]Gal Bar-Nissan, Danny Hendler, Adi Suissa:
A Dynamic Elimination-Combining Stack Algorithm. CoRR abs/1106.6304 (2011) - 2010
- [j11]Danny Hendler, Nir Shavit, Lena Yerushalmi:
A scalable lock-free stack algorithm. J. Parallel Distributed Comput. 70(1): 1-12 (2010) - [j10]Wojciech M. Golab, Danny Hendler, Philipp Woelfel:
An O(1) RMRs Leader Election Algorithm. SIAM J. Comput. 39(7): 2726-2760 (2010) - [j9]Anat Bremler-Barr, David Hay, Danny Hendler, Ron M. Roth:
PEDS: A Parallel Error Detection Scheme for TCAM Devices. IEEE/ACM Trans. Netw. 18(5): 1665-1675 (2010) - [j8]Hagit Attiya, Danny Hendler:
Time and Space Lower Bounds for Implementations Using k-CAS. IEEE Trans. Parallel Distributed Syst. 21(2): 162-173 (2010) - [c28]Danny Hendler, Shay Kutten, Erez Michalak:
An Adaptive Technique for Constructing Robust and High-Throughput Shared Objects. OPODIS 2010: 318-332 - [c27]Danny Hendler, Philipp Woelfel:
Adaptive randomized mutual exclusion in sub-logarithmic expected time. PODC 2010: 141-150 - [c26]Walther Maldonado, Patrick Marlier, Pascal Felber, Adi Suissa, Danny Hendler, Alexandra Fedorova, Julia L. Lawall, Gilles Muller:
Scheduling support for transactional memory contention management. PPoPP 2010: 79-90 - [c25]Danny Hendler, Itai Incze, Nir Shavit, Moran Tzafrir:
Flat combining and the synchronization-parallelism tradeoff. SPAA 2010: 355-364 - [c24]Danny Hendler, Itai Incze, Nir Shavit, Moran Tzafrir:
Scalable Flat-Combining Based Synchronous Queues. DISC 2010: 79-93
2000 – 2009
- 2009
- [j7]Danny Hendler, Shay Kutten:
Bounded-wait combining: constructing robust and high-throughput shared objects. Distributed Comput. 21(6): 405-431 (2009) - [j6]Hagit Attiya, Rachid Guerraoui, Danny Hendler, Petr Kuznetsov:
The complexity of obstruction-free implementations. J. ACM 56(4): 24:1-24:33 (2009) - [j5]Danny Hendler:
Book review of synchronization algorithms and concurrent programming by Gadi Taubenfeld (Pearson/Prentice Hall, 2006). SIGACT News 40(1): 47-50 (2009) - [c23]Anat Bremler-Barr, David Hay, Danny Hendler, Ron M. Roth:
PEDS: A Parallel Error Detection Scheme for TCAM Devices. INFOCOM 2009: 1296-1304 - [c22]Anat Bremler-Barr, David Hay, Danny Hendler:
Layered Interval Codes for TCAM-Based Classification. INFOCOM 2009: 1305-1313 - [c21]Tomer Heber, Danny Hendler, Adi Suissa:
On the Impact of Serializing Contention Management on STM Performance. OPODIS 2009: 225-239 - [c20]Danny Hendler, Philipp Woelfel:
Randomized mutual exclusion in O(log N / log log N) RMRs. PODC 2009: 26-35 - 2008
- [j4]Danny Hendler, Nir Shavit:
Solo-valency and the cost of coordination. Distributed Comput. 21(1): 43-54 (2008) - [c19]Nurit Gal-Oz, Ehud Gudes, Danny Hendler:
A Robust and Knot-Aware Trust-Based Reputation Model. IFIPTM 2008: 167-182 - [c18]Shlomi Dolev, Danny Hendler, Adi Suissa:
CAR-STM: scheduling-based collision avoidance and resolution for software transactional memory. PODC 2008: 125-134 - [c17]Hagit Attiya, Danny Hendler, Philipp Woelfel:
Tight RMR lower bounds for mutual exclusion and other problems. PODC 2008: 447 - [c16]Anat Bremler-Barr, David Hay, Danny Hendler, Boris Farber:
Layered interval codes for tcam-based classification. SIGMETRICS 2008: 445-446 - [c15]Hagit Attiya, Danny Hendler, Philipp Woelfel:
Tight rmr lower bounds for mutual exclusion and other problems. STOC 2008: 217-226 - 2007
- [c14]Anat Bremler-Barr, Danny Hendler:
Space-Efficient TCAM-Based Classification Using Gray Coding. INFOCOM 2007: 1388-1396 - [c13]Wojciech M. Golab, Vassos Hadzilacos, Danny Hendler, Philipp Woelfel:
Constant-RMR implementations of CAS and other synchronization primitives using read and write operations. PODC 2007: 3-12 - 2006
- [j3]Danny Hendler, Yossi Lev, Mark Moir, Nir Shavit:
A dynamic-sized nonblocking work stealing deque. Distributed Comput. 18(3): 189-207 (2006) - [j2]Faith Ellen Fich, Danny Hendler, Nir Shavit:
On the inherent weakness of conditional primitives. Distributed Comput. 18(4): 267-277 (2006) - [c12]Wojciech M. Golab, Danny Hendler, Philipp Woelfel:
An O(1) RMRs leader election algorithm. PODC 2006: 238-247 - [c11]Hagit Attiya, Rachid Guerraoui, Danny Hendler, Petr Kouznetsov:
Synchronizing without locks is inherently expensive. PODC 2006: 300-307 - [c10]Danny Hendler, Shay Kutten:
Constructing Shared Objects That Are Both Robust and High-Throughput. DISC 2006: 428-442 - 2005
- [c9]Faith Ellen Fich, Danny Hendler, Nir Shavit:
Linear Lower Bounds on Real-World Implementations of Concurrent Objects. FOCS 2005: 165-173 - [c8]Hagit Attiya, Danny Hendler:
Time and Space Lower Bounds for Implementations Using k-CAS. DISC 2005: 169-183 - 2004
- [b1]Danny Hendler:
Lower and upper bounds for synchronization using real-world primitives. Tel Aviv University, Israel, 2004 - [c7]Faith E. Fich, Danny Hendler, Nir Shavit:
On the inherent weakness of conditional synchronization primitives. PODC 2004: 80-87 - [c6]Danny Hendler, Nir Shavit, Lena Yerushalmi:
A scalable lock-free stack algorithm. SPAA 2004: 206-215 - [c5]Danny Hendler, Yossi Lev, Nir Shavit:
Dynamic Memory ABP Work-Stealing. DISC 2004: 188-200 - 2003
- [c4]Danny Hendler, Nir Shavit:
Operation-valency and the cost of coordination. PODC 2003: 84-91 - 2002
- [c3]Danny Hendler, Nir Shavit:
Non-blocking steal-half work queues. PODC 2002: 280-289 - [c2]Danny Hendler, Nir Shavit:
Work dealing. SPAA 2002: 164-172
1990 – 1999
- 1995
- [j1]Yehuda Afek, Danny Hendler:
On the Comnplexity of Global Computation in the Presence of Link Failures: The General Case. Distributed Comput. 8(3): 115-120 (1995) - 1993
- [c1]Yehuda Afek, Danny Hendler:
On the Complexity of Global Computation in the Presence of Link Failures: The General Case. ISTCS 1993: 160-166
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint