default search action
Aurojit Panda
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c61]Ioanna Tzialla, Jeffery Wang, Jingyi Zhu, Aurojit Panda, Michael Walfish:
Efficient Auditing of Event-driven Web Applications. EuroSys 2024: 1208-1224 - [c60]Lloyd Brown, Emily Marx, Dev Bali, Emmanuel Amaro, Debnil Sur, Ezra Kissel, Inder Monga, Ethan Katz-Bassett, Arvind Krishnamurthy, James Murphy McCauley, Tejas Narechania, Aurojit Panda, Scott Shenker:
An Architecture For Edge Networking Services. SIGCOMM 2024: 645-660 - [i25]Hexu Zhao, Haoyang Weng, Daohan Lu, Ang Li, Jinyang Li, Aurojit Panda, Saining Xie:
On Scaling Up 3D Gaussian Splatting Training. CoRR abs/2406.18533 (2024) - 2023
- [j11]Marjory Blumenthal, Ramesh Govindan, Ethan Katz-Bassett, Arvind Krishnamurthy, James Murphy McCauley, Nick Merrill, Tejas Narechania, Aurojit Panda, Scott Shenker:
Can We Save the Public Internet? Comput. Commun. Rev. 53(3): 18-22 (2023) - [j10]Zhiyuan Dong, Zhaoguo Wang, Xiaodong Zhang, Xian Xu, Changgeng Zhao, Haibo Chen, Aurojit Panda, Jinyang Li:
Fine-Grained Re-Execution for Efficient Batched Commit of Distributed Transactions. Proc. VLDB Endow. 16(8): 1930-1943 (2023) - [c59]Jiawei Liu, Jinkun Lin, Fabian Ruffy, Cheng Tan, Jinyang Li, Aurojit Panda, Lingming Zhang:
NNSmith: Generating Diverse and Valid Test Cases for Deep Learning Compilers. ASPLOS (2) 2023: 530-543 - [c58]Farbod Shahinfar, Sebastiano Miano, Giuseppe Siracusano, Roberto Bifulco, Aurojit Panda, Gianni Antichi:
Disaggregate Applications Along End-Host Data-Path. StudentWorkshop@CoNEXT 2023: 27-28 - [c57]Hugo Sadok, Aurojit Panda, Justine Sherry:
Of Apples and Oranges: Fair Comparisons in Heterogenous Systems Evaluation. HotNets 2023: 1-8 - [c56]Emmanuel Amaro, Stephanie Wang, Aurojit Panda, Marcos K. Aguilera:
Logical Memory Pools: Flexible and Local Disaggregated Memory. HotNets 2023: 25-32 - [c55]Lloyd Brown, Yash Kothari, Akshay Narayan, Arvind Krishnamurthy, Aurojit Panda, Justine Sherry, Scott Shenker:
How I Learned to Stop Worrying About CCA Contention. HotNets 2023: 229-237 - [c54]Farbod Shahinfar, Sebastiano Miano, Giuseppe Siracusano, Roberto Bifulco, Aurojit Panda, Gianni Antichi:
Automatic Kernel Offload Using BPF. HotOS 2023: 143-149 - [c53]Wen Zhang, Aurojit Panda, Scott Shenker:
Access Control for Database Applications: Beyond Policy Enforcement. HotOS 2023: 223-230 - [c52]Hugo Sadok, Nirav Atre, Zhipeng Zhao, Daniel S. Berger, James C. Hoe, Aurojit Panda, Justine Sherry, Ren Wang:
Ensō: A Streaming Interface for NIC-Application Communication. OSDI 2023: 1005-1025 - [i24]Akshay Narayan, Aurojit Panda, Mohammad Alizadeh, Hari Balakrishnan, Arvind Krishnamurthy, Scott Shenker:
Bringing Reconfigurability to the Network Stack. CoRR abs/2311.07753 (2023) - [i23]Tao Wang, Jinkun Lin, Gianni Antichi, Aurojit Panda, Anirudh Sivaraman:
Application-Defined Receive Side Dispatching on the NIC. CoRR abs/2312.04857 (2023) - 2022
- [c51]Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa:
CostCO: An automatic cost modeling framework for secure multi-party computation. EuroS&P 2022: 140-153 - [c50]William Sussman, Emily Marx, Venkat Arun, Akshay Narayan, Mohammad Alizadeh, Hari Balakrishnan, Aurojit Panda, Scott Shenker:
The case for an internet primitive for fault localization. HotNets 2022: 160-166 - [c49]Jinkun Lin, Anqi Zhang, Mathias Lécuyer, Jinyang Li, Aurojit Panda, Siddhartha Sen:
Measuring the Effect of Training Data on Deep Learning Predictions via Randomized Experiments. ICML 2022: 13468-13504 - [c48]Tao Wang, Xiangrui Yang, Gianni Antichi, Anirudh Sivaraman, Aurojit Panda:
Isolation Mechanisms for High-Speed Packet-Processing Pipelines. NSDI 2022: 1289-1305 - [c47]Wen Zhang, Eric Sheng, Michael Alan Chang, Aurojit Panda, Mooly Sagiv, Scott Shenker:
Blockaid: Data Access Policy Enforcement for Web Applications. OSDI 2022: 701-718 - [i22]Wen Zhang, Eric Sheng, Michael Alan Chang, Aurojit Panda, Mooly Sagiv, Scott Shenker:
Blockaid: Data Access Policy Enforcement for Web Applications. CoRR abs/2205.06911 (2022) - [i21]Jinkun Lin, Anqi Zhang, Mathias Lécuyer, Jinyang Li, Aurojit Panda, Siddhartha Sen:
Measuring the Effect of Training Data on Deep Learning Predictions via Randomized Experiments. CoRR abs/2206.10013 (2022) - [i20]Christopher Branner-Augmon, Narek Galstyan, Sam Kumar, Emmanuel Amaro, Amy Ousterhout, Aurojit Panda, Sylvia Ratnasamy, Scott Shenker:
3PO: Programmed Far-Memory Prefetching for Oblivious Applications. CoRR abs/2207.07688 (2022) - [i19]Jiawei Liu, Jinkun Lin, Fabian Ruffy, Cheng Tan, Jinyang Li, Aurojit Panda, Lingming Zhang:
Finding Deep-Learning Compilation Bugs with NNSmith. CoRR abs/2207.13066 (2022) - [i18]Kalev Alpernas, Aurojit Panda, Mooly Sagiv:
This is not the End: Rethinking Serverless Function Termination. CoRR abs/2211.02330 (2022) - [i17]Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa:
CostCO: An automatic cost modeling framework for secure multi-party computation. IACR Cryptol. ePrint Arch. 2022: 332 (2022) - 2021
- [j9]Hari Balakrishnan, Sujata Banerjee, Israel Cidon, David E. Culler, Deborah Estrin, Ethan Katz-Bassett, Arvind Krishnamurthy, James Murphy McCauley, Nick McKeown, Aurojit Panda, Sylvia Ratnasamy, Jennifer Rexford, Michael Schapira, Scott Shenker, Ion Stoica, David L. Tennenhouse, Amin Vahdat, Ellen W. Zegura:
Revitalizing the public internet by making it extensible. Comput. Commun. Rev. 51(2): 18-24 (2021) - [c46]Kalev Alpernas, Aurojit Panda, Leonid Ryzhyk, Mooly Sagiv:
Cloud-Scale Runtime Verification of Serverless Applications. SoCC 2021: 92-107 - [c45]Hugo Sadok, Zhipeng Zhao, Valerie Choung, Nirav Atre, Daniel S. Berger, James C. Hoe, Aurojit Panda, Justine Sherry:
We need kernel interposition over the network dataplane. HotOS 2021: 152-158 - [c44]Wenting Zheng, Ryan Deng, Weikeng Chen, Raluca Ada Popa, Aurojit Panda, Ion Stoica:
Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning. USENIX Security Symposium 2021: 2723-2740 - [i16]Tao Wang, Xiangrui Yang, Gianni Antichi, Anirudh Sivaraman, Aurojit Panda:
Isolation mechanisms for packet-processing pipelines. CoRR abs/2101.12691 (2021) - [i15]Kalev Alpernas, Aurojit Panda, Alexander Rabinovich, Mooly Sagiv, Scott Shenker, Sharon Shoham, Yaron Velner:
Some Complexity Results for Stateful Network Verification. CoRR abs/2106.01030 (2021) - [i14]Michael Alan Chang, Aurojit Panda, Hantao Wang, Yuan-Cheng Tsai, Rahul Balakrishnan, Scott Shenker:
AutoTune: Improving End-to-end Performance and Resource Efficiency for Microservice Applications. CoRR abs/2106.10334 (2021) - [i13]Wenting Zheng, Ryan Deng, Weikeng Chen, Raluca Ada Popa, Aurojit Panda, Ion Stoica:
Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning. IACR Cryptol. ePrint Arch. 2021: 759 (2021) - 2020
- [j8]Anirudh Sivaraman, Thomas Mason, Aurojit Panda, Ravi Netravali, Sai Anirudh-Kondaveeti:
Network architecture in the age of programmability. Comput. Commun. Rev. 50(1): 38-44 (2020) - [j7]Xuan Tang, Teseo Schneider, Shoaib Kamil, Aurojit Panda, Jinyang Li, Daniele Panozzo:
EGGS: Sparsity-Specific Code Generation. Comput. Graph. Forum 39(5): 209-219 (2020) - [c43]Yotam Harchol, Aisha Mushtaq, Vivian Fang, James Murphy McCauley, Aurojit Panda, Scott Shenker:
Making edge-computing resilient. SoCC 2020: 253-266 - [c42]Wen Zhang, Vivian Fang, Aurojit Panda, Scott Shenker:
Kappa: a programming framework for serverless computing. SoCC 2020: 328-343 - [c41]Emmanuel Amaro, Christopher Branner-Augmon, Zhihong Luo, Amy Ousterhout, Marcos K. Aguilera, Aurojit Panda, Sylvia Ratnasamy, Scott Shenker:
Can far memory improve job throughput? EuroSys 2020: 14:1-14:16 - [c40]Tao Wang, Hang Zhu, Fabian Ruffy, Xin Jin, Anirudh Sivaraman, Dan R. K. Ports, Aurojit Panda:
Multitenancy for Fast and Programmable Networks in the Cloud. HotCloud 2020 - [c39]Emmanuel Amaro, Zhihong Luo, Amy Ousterhout, Arvind Krishnamurthy, Aurojit Panda, Sylvia Ratnasamy, Scott Shenker:
Remote Memory Calls. HotNets 2020: 38-44 - [c38]Akshay Narayan, Aurojit Panda, Mohammad Alizadeh, Hari Balakrishnan, Arvind Krishnamurthy, Scott Shenker:
Bertha: Tunneling through the Network API. HotNets 2020: 53-59 - [c37]Yotam Harchol, Dirk Bergemann, Nick Feamster, Eric J. Friedman, Arvind Krishnamurthy, Aurojit Panda, Sylvia Ratnasamy, Michael Schapira, Scott Shenker:
A Public Option for the Core. SIGCOMM 2020: 377-389 - [i12]Michael Alan Chang, Domenic Bottini, Lisa Jian, Pranay Kumar, Aurojit Panda, Scott Shenker:
How to Train your DNN: The Network Operator Edition. CoRR abs/2004.10275 (2020)
2010 – 2019
- 2019
- [j6]James Murphy McCauley, Aurojit Panda, Arvind Krishnamurthy, Scott Shenker:
Thoughts on load distribution and the role of programmable switches. Comput. Commun. Rev. 49(1): 18-23 (2019) - [j5]Kalev Alpernas, Aurojit Panda, Alexander Rabinovich, Mooly Sagiv, Scott Shenker, Sharon Shoham, Yaron Velner:
Some complexity results for stateful network verification. Formal Methods Syst. Des. 54(2): 191-231 (2019) - [c36]James Murphy McCauley, Yotam Harchol, Aurojit Panda, Barath Raghavan, Scott Shenker:
Enabling a permanent revolution in internet architecture. SIGCOMM 2019: 1-14 - [i11]Aurojit Panda:
Certifying Safety when Implementing Consensus. CoRR abs/1903.03501 (2019) - 2018
- [c35]Xiaohe Hu, Arpit Gupta, Nick Feamster, Aurojit Panda, Scott Shenker:
Preserving Privacy at IXPs. APNet 2018: 43-49 - [c34]Anand Padmanabha Iyer, Aurojit Panda, Shivaram Venkataraman, Mosharaf Chowdhury, Aditya Akella, Scott Shenker, Ion Stoica:
Bridging the GAP: towards approximate graph analytics. GRADES/NDA@SIGMOD/PODS 2018: 10:1-10:5 - [c33]Anand Padmanabha Iyer, Aurojit Panda, Mosharaf Chowdhury, Aditya Akella, Scott Shenker, Ion Stoica:
Monarch: Gaining Command on Geo-Distributed Graph Analytics. HotCloud 2018 - [c32]Amin Tootoonchian, Aurojit Panda, Chang Lan, Melvin Walls, Katerina J. Argyraki, Sylvia Ratnasamy, Scott Shenker:
ResQ: Enabling SLOs in Network Function Virtualization. NSDI 2018: 283-297 - [c31]Kalev Alpernas, Roman Manevich, Aurojit Panda, Mooly Sagiv, Scott Shenker, Sharon Shoham, Yaron Velner:
Abstract Interpretation of Stateful Networks. SAS 2018: 86-106 - [c30]Yotam Harchol, Aisha Mushtaq, James Murphy McCauley, Aurojit Panda, Scott Shenker:
CESSNA: Resilient Edge-Computing. MECOMM@SIGCOMM 2018: 1-6 - [c29]Marc Körner, Torsten M. Runge, Aurojit Panda, Sylvia Ratnasamy, Scott Shenker:
Open Carrier Interface: An Open Source Edge Computing Framework. NEAT@SIGCOMM 2018: 27-32 - [c28]Radhika Mittal, Alexander Shpiner, Aurojit Panda, Eitan Zahavi, Arvind Krishnamurthy, Sylvia Ratnasamy, Scott Shenker:
Revisiting network support for RDMA. SIGCOMM 2018: 313-326 - [i10]Radhika Mittal, Alexander Shpiner, Aurojit Panda, Eitan Zahavi, Arvind Krishnamurthy, Sylvia Ratnasamy, Scott Shenker:
Revisiting Network Support for RDMA. CoRR abs/1806.08159 (2018) - 2017
- [b1]Aurojit Panda:
A New Approach to Network Function Virtualization. University of California, Berkeley, USA, 2017 - [j4]Abhiram Balasubramanian, Marek S. Baranowski, Anton Burtsev, Aurojit Panda, Zvonimir Rakamaric, Leonid Ryzhyk:
System Programming in Rust: Beyond Safety. ACM SIGOPS Oper. Syst. Rev. 51(1): 94-99 (2017) - [c27]Aurojit Panda, Mooly Sagiv, Scott Shenker:
Verification in the Age of Microservices. HotOS 2017: 30-36 - [c26]Abhiram Balasubramanian, Marek S. Baranowski, Anton Burtsev, Aurojit Panda, Zvonimir Rakamaric, Leonid Ryzhyk:
System Programming in Rust: Beyond Safety. HotOS 2017: 156-161 - [c25]Aurojit Panda, Wenting Zheng, Xiaohe Hu, Arvind Krishnamurthy, Scott Shenker:
SCL: Simplifying Distributed SDN Control Planes. NSDI 2017: 329-345 - [c24]Aurojit Panda, Ori Lahav, Katerina J. Argyraki, Mooly Sagiv, Scott Shenker:
Verifying Reachability in Networks with Mutable Datapaths. NSDI 2017: 699-718 - [c23]Zafar Ayyub Qazi, Melvin Walls, Aurojit Panda, Vyas Sekar, Sylvia Ratnasamy, Scott Shenker:
A High Performance Packet Core for Next Generation Cellular Networks. SIGCOMM 2017: 348-361 - [c22]Shivaram Venkataraman, Aurojit Panda, Kay Ousterhout, Michael Armbrust, Ali Ghodsi, Michael J. Franklin, Benjamin Recht, Ion Stoica:
Drizzle: Fast and Adaptable Stream Processing at Scale. SOSP 2017: 374-389 - [i9]Kalev Alpernas, Roman Manevich, Aurojit Panda, Mooly Sagiv, Scott Shenker, Sharon Shoham, Yaron Velner:
Modular Safety Verification for Stateful Networks. CoRR abs/1708.05904 (2017) - [i8]Michael Alan Chang, Aurojit Panda, Yuan-Cheng Tsai, Hantao Wang, Scott Shenker:
ThrottleBot - Performance without Insight. CoRR abs/1711.00618 (2017) - 2016
- [j3]Aurojit Panda, James Murphy McCauley, Amin Tootoonchian, Justine Sherry, Teemu Koponen, Sylvia Ratnasamy, Scott Shenker:
Open Network Interfaces for Carrier Networks. Comput. Commun. Rev. 46(1): 5-11 (2016) - [j2]James Murphy McCauley, Zhi Liu, Aurojit Panda, Teemu Koponen, Barath Raghavan, Jennifer Rexford, Scott Shenker:
Recursive SDN for Carrier Networks. Comput. Commun. Rev. 46(4): 1-7 (2016) - [c21]Marco Chiesa, Ilya Nikolaevskiy, Slobodan Mitrovic, Aurojit Panda, Andrei V. Gurtov, Aleksander Madry, Michael Schapira, Scott Shenker:
The quest for resilient (static) forwarding tables. INFOCOM 2016: 1-9 - [c20]Colin Scott, Aurojit Panda, Vjekoslav Brajkovic, George C. Necula, Arvind Krishnamurthy, Scott Shenker:
Minimizing Faulty Executions of Distributed Systems. NSDI 2016: 291-309 - [c19]Aurojit Panda, Sangjin Han, Keon Jang, Melvin Walls, Sylvia Ratnasamy, Scott Shenker:
NetBricks: Taking the V out of NFV. OSDI 2016: 203-216 - [c18]Oded Padon, Kenneth L. McMillan, Aurojit Panda, Mooly Sagiv, Sharon Shoham:
Ivy: safety verification by interactive generalization. PLDI 2016: 614-630 - [c17]Yaron Velner, Kalev Alpernas, Aurojit Panda, Alexander Rabinovich, Mooly Sagiv, Scott Shenker, Sharon Shoham:
Some Complexity Results for Stateful Network Verification. TACAS 2016: 811-830 - [c16]Ethan J. Jackson, Melvin Walls, Aurojit Panda, Justin Pettit, Ben Pfaff, Jarno Rajahalme, Teemu Koponen, Scott Shenker:
SoftFlow: A Middlebox Architecture for Open vSwitch. USENIX ATC 2016: 15-28 - [i7]James Murphy McCauley, Zhi Liu, Aurojit Panda, Teemu Koponen, Barath Raghavan, Jennifer Rexford, Scott Shenker:
Recursive SDN for Carrier Networks. CoRR abs/1605.07734 (2016) - [i6]Aurojit Panda, Ori Lahav, Katerina J. Argyraki, Mooly Sagiv, Scott Shenker:
Verifying Reachability in Networks with Mutable Datapaths. CoRR abs/1607.00991 (2016) - 2015
- [c15]Ignacio Castro, Aurojit Panda, Barath Raghavan, Scott Shenker, Sergey Gorinsky:
Route Bazaar: Automatic Interdomain Contract Negotiation. HotOS 2015 - [c14]Justine Sherry, Peter Xiang Gao, Soumya Basu, Aurojit Panda, Arvind Krishnamurthy, Christian Maciocco, Maziar Manesh, João Martins, Sylvia Ratnasamy, Luigi Rizzo, Scott Shenker:
Rollback-Recovery for Middleboxes. SIGCOMM 2015: 227-240 - [c13]Aurojit Panda, Katerina J. Argyraki, Mooly Sagiv, Michael Schapira, Scott Shenker:
New Directions for Network Verification. SNAPL 2015: 209-220 - [c12]Shoumik Palkar, Chang Lan, Sangjin Han, Keon Jang, Aurojit Panda, Sylvia Ratnasamy, Luigi Rizzo, Scott Shenker:
E2: a framework for NFV applications. SOSP 2015: 121-136 - 2014
- [c11]Wenfei Wu, Li Erran Li, Aurojit Panda, Scott Shenker:
PRAN: Programmable Radio Access Networks. HotNets 2014: 6:1-6:7 - [c10]Shivaram Venkataraman, Aurojit Panda, Ganesh Ananthanarayanan, Michael J. Franklin, Ion Stoica:
The Power of Choice in Data-Aware Cluster Scheduling. OSDI 2014: 301-316 - [c9]Colin Scott, Andreas Wundsam, Barath Raghavan, Aurojit Panda, Andrew Or, Jefferson Lai, Eugene Huang, Zhi Liu, Ahmed El-Hassany, Sam Whitlock, Hrishikesh B. Acharya, Kyriakos Zarifis, Scott Shenker:
Troubleshooting blackbox SDN control software with minimal causal sequences. SIGCOMM 2014: 395-406 - [i5]Marco Chiesa, Ilya Nikolaevskiy, Aurojit Panda, Andrei V. Gurtov, Michael Schapira, Scott Shenker:
Exploring the Limits of Static Failover Routing. CoRR abs/1409.0034 (2014) - [i4]Aurojit Panda, Ori Lahav, Katerina J. Argyraki, Mooly Sagiv, Scott Shenker:
Verifying Isolation Properties in the Presence of Middleboxes. CoRR abs/1409.7687 (2014) - 2013
- [c8]Sameer Agarwal, Barzan Mozafari, Aurojit Panda, Henry Milner, Samuel Madden, Ion Stoica:
BlinkDB: queries with bounded errors and bounded response times on very large data. EuroSys 2013: 29-42 - [c7]Sangjin Han, Norbert Egi, Aurojit Panda, Sylvia Ratnasamy, Guangyu Shi, Scott Shenker:
Network support for resource disaggregation in next-generation datacenters. HotNets 2013: 10:1-10:7 - [c6]Kay Ousterhout, Aurojit Panda, Josh Rosen, Shivaram Venkataraman, Reynold Xin, Sylvia Ratnasamy, Scott Shenker, Ion Stoica:
The Case for Tiny Tasks in Compute Clusters. HotOS 2013 - [c5]Junda Liu, Aurojit Panda, Ankit Singla, Brighten Godfrey, Michael Schapira, Scott Shenker:
Ensuring Connectivity via Data Plane Mechanisms. NSDI 2013: 113-126 - [c4]Aurojit Panda, Colin Scott, Ali Ghodsi, Teemu Koponen, Scott Shenker:
CAP for networks. HotSDN 2013: 91-96 - [i3]Sangjin Han, Aurojit Panda, Sylvia Ratnasamy:
HW Databases, Where art Thou? Tiny Trans. Comput. Sci. 2 (2013) - 2012
- [j1]Sameer Agarwal, Aurojit Panda, Barzan Mozafari, Anand P. Iyer, Samuel Madden, Ion Stoica:
Blink and It's Done: Interactive Queries on Very Large Data. Proc. VLDB Endow. 5(12): 1902-1905 (2012) - [c3]Debayan Gupta, Aaron Segal, Aurojit Panda, Gil Segev, Michael Schapira, Joan Feigenbaum, Jennifer Rexford, Scott Shenker:
A new approach to interdomain routing based on secure multi-party computation. HotNets 2012: 37-42 - [c2]Joan Feigenbaum, Brighten Godfrey, Aurojit Panda, Michael Schapira, Scott Shenker, Ankit Singla:
Brief announcement: on the resilience of routing tables. PODC 2012: 237-238 - [i2]Sameer Agarwal, Aurojit Panda, Barzan Mozafari, Samuel Madden, Ion Stoica:
BlinkDB: Queries with Bounded Errors and Bounded Response Times on Very Large Data. CoRR abs/1203.5485 (2012) - [i1]Joan Feigenbaum, Brighten Godfrey, Aurojit Panda, Michael Schapira, Scott Shenker, Ankit Singla:
On the Resilience of Routing Tables. CoRR abs/1207.3732 (2012)
2000 – 2009
- 2008
- [c1]Daniel S. Heller, Aurojit Panda, Meinolf Sellmann, Justin Yip:
Model Restarts for Structural Symmetry Breaking. CP 2008: 539-544
Coauthor Index
aka: Mooly Sagiv
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 20:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint