default search action
Abdelkarim Erradi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Arash Golabi, Abdelkarim Erradi, Hazim Qiblawey, Ashraf Tantawy, Ahmed Ben Said, Khaled B. Shaban:
Optimal operation of reverse osmosis desalination process with deep reinforcement learning methods. Appl. Intell. 54(8): 6333-6353 (2024) - [j30]Numan Shafi, Muhammad Abdullah, Waheed Iqbal, Abdelkarim Erradi, Faisal Bukhari:
Cdascaler: a cost-effective dynamic autoscaling approach for containerized microservices. Clust. Comput. 27(4): 5195-5215 (2024) - 2023
- [j29]May Bashendy, Ashraf Tantawy, Abdelkarim Erradi:
Intrusion response systems for cyber-physical systems: A comprehensive survey. Comput. Secur. 124: 102984 (2023) - [c56]Sohaila Eltanbouly, Abdelkarim Erradi, Ashraf Tantawy, Ahmed Ben Said, Khaled B. Shaban, Hazim Qiblawey:
LIME: Long-Term Forecasting Model for Desalination Membrane Fouling to Estimate the Remaining Useful Life of Membrane. IEA/AIE (2) 2023: 3-14 - 2022
- [j28]Ali Hamdi, Khaled B. Shaban, Abdelkarim Erradi, Amr Mohamed, Shakila Khan Rumi, Flora D. Salim:
Spatiotemporal data mining: a survey on challenges and open problems. Artif. Intell. Rev. 55(2): 1441-1488 (2022) - [j27]Waheed Iqbal, Abdelkarim Erradi, Muhammad Abdullah, Arif Mahmood:
Predictive Auto-Scaling of Multi-Tier Applications Using Performance Varying Cloud Resources. IEEE Trans. Cloud Comput. 10(1): 595-607 (2022) - [j26]Ahmed Ben Said, Abdelkarim Erradi:
Spatiotemporal Tensor Completion for Improved Urban Traffic Imputation. IEEE Trans. Intell. Transp. Syst. 23(7): 6836-6849 (2022) - [j25]Ashraf Tantawy, Sherif Abdelwahed, Abdelkarim Erradi:
Cyber LOPA: An Integrated Approach for the Design of Dependable and Secure Cyber-Physical Systems. IEEE Trans. Reliab. 71(2): 1075-1091 (2022) - [c55]Rana Aurangzaib, Waheed Iqbal, Muhammad Abdullah, Faisal Bukhari, Faheem Ullah, Abdelkarim Erradi:
Scalable Containerized Pipeline for Real-time Big Data Analytics. CloudCom 2022: 25-32 - 2021
- [j24]Muhammad Abdullah, Waheed Iqbal, Arif Mahmood, Faisal Bukhari, Abdelkarim Erradi:
Predictive Autoscaling of Microservices Hosted in Fog Microdata Center. IEEE Syst. J. 15(1): 1275-1286 (2021) - [j23]Abdelkarim Erradi, Waheed Iqbal, Arif Mahmood, Athman Bouguettaya:
Web Application Resource Requirements Estimation Based on the Workload Latent Features. IEEE Trans. Serv. Comput. 14(6): 1638-1649 (2021) - [c54]Mohamed Nassar, Joseph Khoury, Abdelkarim Erradi, Elias Bou-Harb:
Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems. NTMS 2021: 1-7 - [i10]Ahmed Ben Said, Abdelkarim Erradi:
Spatiotemporal Tensor Completion for Improved Urban Traffic Imputation. CoRR abs/2103.08323 (2021) - [i9]Ali Hamdi, Khaled B. Shaban, Abdelkarim Erradi, Amr Mohamed, Shakila Khan Rumi, Flora D. Salim:
Spatiotemporal Data Mining: A Survey on Challenges and Open Problems. CoRR abs/2103.17128 (2021) - 2020
- [j22]Bilal Iqbal, Waheed Iqbal, Nazar Khan, Arif Mahmood, Abdelkarim Erradi:
Canny edge detection and Hough transform for high resolution video streams using Hadoop and Spark. Clust. Comput. 23(1): 397-408 (2020) - [j21]Ashraf Tantawy, Sherif Abdelwahed, Abdelkarim Erradi, Khaled B. Shaban:
Model-based risk assessment for cyber physical systems security. Comput. Secur. 96: 101864 (2020) - [j20]Abdelkarim Erradi, Yaser Mansouri:
Online cost optimization algorithms for tiered cloud storage services. J. Syst. Softw. 160 (2020) - [j19]Muhammad Abdullah, Waheed Iqbal, Faisal Bukhari, Abdelkarim Erradi:
Diminishing Returns and Deep Learning for Adaptive CPU Resource Allocation of Containers. IEEE Trans. Netw. Serv. Manag. 17(4): 2052-2063 (2020) - [c53]Mohamed Abdou, Abdelkarim Erradi:
Crowd Counting: A Survey of Machine Learning Approaches. ICIoT 2020: 48-54 - [c52]Ahmed Ben Said, Abdelkarim Erradi:
Multiview topological data analysis for crowdsourced service supply-demand gap prediction. IWCMC 2020: 1818-1823 - [i8]Ashraf Tantawy, Abdelkarim Erradi, Sherif Abdelwahed, Khaled B. Shaban:
Model-Based Risk Assessment for Cyber Physical Systems Security. CoRR abs/2005.13738 (2020) - [i7]Ashraf Tantawy, Sherif Abdelwahed, Abdelkarim Erradi:
Cyber LOPA: A New Approach for CPS Safety Design in the Presence of Cyber Attacks. CoRR abs/2006.00165 (2020) - [i6]Ahmed Ben Said, Abdelkarim Erradi, Hussein Aly, Abdelmonem Mohamed:
A deep-learning model for evaluating and predicting the impact of lockdown policies on COVID-19 cases. CoRR abs/2009.05481 (2020) - [i5]Ahmed Ben Said, Abdelkarim Erradi, Hussein Aly, Abdelmonem Mohamed:
Predicting COVID-19 cases using Bidirectional LSTM on multivariate time series. CoRR abs/2009.12325 (2020)
2010 – 2019
- 2019
- [j18]Ahmed Ben Said, Abdelkarim Erradi:
A Probabilistic Approach for Maximizing Travel Journey WiFi Coverage Using Mobile Crowdsourced Services. IEEE Access 7: 82297-82307 (2019) - [j17]Muhammad Abdullah, Waheed Iqbal, Abdelkarim Erradi:
Unsupervised learning approach for web application auto-decomposition into microservices. J. Syst. Softw. 151: 243-257 (2019) - [j16]Ahmed Ben Said, Abdelkarim Erradi, Azadeh Ghari Neiat, Athman Bouguettaya:
A Deep Learning Spatiotemporal Prediction Framework for Mobile Crowdsourced Services. Mob. Networks Appl. 24(3): 1120-1133 (2019) - [j15]Hisham A. Kholidy, Abdelkarim Erradi:
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems. Secur. Commun. Networks 2019: 6816943:1-6816943:15 (2019) - [j14]Shuja-ur-Rehman Baig, Waheed Iqbal, Josep Lluis Berral, Abdelkarim Erradi, David Carrera:
Real-Time Data Center's Telemetry Reduction and Reconstruction Using Markov Chain Models. IEEE Syst. J. 13(4): 4039-4050 (2019) - [j13]Shuja Ur Rehman Baig, Waheed Iqbal, Josep Lluis Berral, Abdelkarim Erradi, David Carrera:
Adaptive Prediction Models for Data Center Resources Utilization Estimation. IEEE Trans. Netw. Serv. Manag. 16(4): 1681-1693 (2019) - [c51]Morteza Safaei Pour, Antonio Mangino, Kurt Friday, Matthias Rathbun, Elias Bou-Harb, Farkhund Iqbal, Khaled B. Shaban, Abdelkarim Erradi:
Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild. ARES 2019: 6:1-6:10 - [c50]Muhammad Abdullah, Waheed Iqbal, Abdelkarim Erradi, Faisal Bukhari:
Learning Predictive Autoscaling Policies for Cloud-Hosted Microservices Using Trace-Driven Modeling. CloudCom 2019: 119-126 - [c49]Ahmed Ben Said, Abdelkarim Erradi:
Deep-Gap: A Deep Learning Framework for Forecasting Crowdsourcing Supply-Demand Gap Based on Imaging Time Series and Residual Learning. CloudCom 2019: 279-286 - [c48]Ashraf Tantawy, Abdelkarim Erradi, Sherif Abdelwahed:
A Modified Layer of Protection Analysis for Cyber-Physical Systems Security. ICSRS 2019: 94-101 - [i4]Ahmed Ben Said, Abdelkarim Erradi:
Deep-Gap: A deep learning framework for forecasting crowdsourcing supply-demand gap based on imaging time series and residual learning. CoRR abs/1911.07625 (2019) - 2018
- [j12]Elias Bou-Harb, Nasir Ghani, Abdelkarim Erradi, Khaled Bashir Shaban:
Passive inference of attacks on CPS communication protocols. J. Inf. Secur. Appl. 43: 110-122 (2018) - [j11]Waheed Iqbal, Abdelkarim Erradi, Arif Mahmood:
Dynamic workload patterns prediction for proactive auto-scaling of web applications. J. Netw. Comput. Appl. 124: 94-107 (2018) - [j10]Khayyam Hashmi, Zaki Malik, Abdelkarim Erradi, Abdelmounaam Rezgui:
QoS Dependency Modeling for Composite Systems. IEEE Trans. Serv. Comput. 11(6): 936-947 (2018) - [c47]Yaser Mansouri, Abdelkarim Erradi:
Cost Optimization Algorithms for Hot and Cool Tiers Cloud Storage Services. IEEE CLOUD 2018: 622-629 - [c46]Ahmed Ben Said, Abdelkarim Erradi, Azadeh Ghari Neiat, Athman Bouguettaya:
Mobile Crowdsourced Sensors Selection for Journey Services. ICSOC 2018: 463-477 - [i3]Ahmed Ben Said, Abdelkarim Erradi, Azadeh Ghari Neiat, Athman Bouguettaya:
A Deep Learning Spatiotemporal Prediction Framework for Mobile Crowdsourced Services. CoRR abs/1809.00811 (2018) - [i2]Ahmed Ben Said, Abdelkarim Erradi, Azadeh Ghari Neiat, Athman Bouguettaya:
Mobile Crowdsourced Sensors Selection for Journey Services. CoRR abs/1812.08877 (2018) - 2017
- [j9]Athman Bouguettaya, Munindar P. Singh, Michael N. Huhns, Quan Z. Sheng, Hai Dong, Qi Yu, Azadeh Ghari Neiat, Sajib Mistry, Boualem Benatallah, Brahim Medjahed, Mourad Ouzzani, Fabio Casati, Xumin Liu, Hongbing Wang, Dimitrios Georgakopoulos, Liang Chen, Surya Nepal, Zaki Malik, Abdelkarim Erradi, Yan Wang, M. Brian Blake, Schahram Dustdar, Frank Leymann, Michael P. Papazoglou:
A service computing manifesto: the next 10 years. Commun. ACM 60(4): 64-72 (2017) - [c45]Abdelkarim Erradi, Bhanu Sharma, Athman Bouguettaya:
Using Financial Options for Pricing of IaaS Cloud Resources. CLOUD 2017: 584-591 - [c44]Tooba Aamir, Athman Bouguettaya, Hai Dong, Sajib Mistry, Abdelkarim Erradi:
Social-Sensor Cloud Service for Scene Reconstruction. ICSOC 2017: 37-52 - [c43]Sajib Mistry, Athman Bouguettaya, Hai Dong, Abdelkarim Erradi:
Probabilistic Qualitative Preference Matching in Long-Term IaaS Composition. ICSOC 2017: 256-271 - [c42]Tooba Aamir, Athman Bouguettaya, Hai Dong, Abdelkarim Erradi, Rachid Hadjidj:
Social-Sensor Cloud Service Selection. ICWS 2017: 508-515 - [c41]Malagalage Sameera Hemangi Jayaratna, Athman Bouguettaya, Hai Dong, A. Kai Qin, Abdelkarim Erradi:
Subjective Evaluation of Market-Driven Cloud Services. ICWS 2017: 516-523 - [c40]Kashif Ali, Hai Dong, Athman Bouguettaya, Abdelkarim Erradi, Rachid Hadjidj:
Sentiment Analysis as a Service: A Social Media Based Sentiment Analysis Framework. ICWS 2017: 660-667 - 2016
- [j8]Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Fabrizio Baiardi:
A risk mitigation approach for autonomous cloud intrusion response system. Computing 98(11): 1111-1135 (2016) - [j7]Vernon Asuncion, Khaled M. Khan, Abdelkarim Erradi, Saleh Alhazbi:
Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming. Int. J. Cooperative Inf. Syst. 25(1): 1650003:1-1650003:37 (2016) - [c39]Abdelkarim Erradi, Hisham A. Kholidy:
An efficient hybrid prediction approach for predicting cloud consumer resource needs. AICCSA 2016: 1-8 - [c38]Sajib Mistry, Athman Bouguettaya, Hai Dong, Abdelkarim Erradi:
Qualitative Economic Model for Long-Term IaaS Composition. ICSOC 2016: 317-332 - 2015
- [j6]Rui Jia, Sherif Abdelwahed, Abdelkarim Erradi:
A Predictive Control Approach for Fault Management of Computing Systems. SIGMETRICS Perform. Evaluation Rev. 43(3): 16-20 (2015) - [c37]Hisham A. Kholidy, Abdelkarim Erradi:
A cost-aware model for risk mitigation in Cloud computing systems. AICCSA 2015: 1-7 - [c36]Mohamed Nassar, Abdelkarim Erradi, Qutaibah M. Malluhi:
A Domain Specific Language for Secure Outsourcing of Computation to the Cloud. EDOC 2015: 134-141 - [c35]Rui Jia, Sherif Abdelwahed, Abdelkarim Erradi:
Towards Proactive Fault Management of Enterprise Systems. ICCAC 2015: 21-32 - [c34]Hussain Aljafer, Khayyam Hashmi, Zaki Malik, Abdelkarim Erradi:
Web service cost optimization. MEDES 2015: 116-120 - 2014
- [j5]Qian Chen, Sherif Abdelwahed, Abdelkarim Erradi:
A Model-Based Validated Autonomic Approach to Self-Protect Computing Systems. IEEE Internet Things J. 1(5): 446-460 (2014) - [c33]Mohamed Nassar, Abdelkarim Erradi, Farida Sabry, Qutaibah M. Malluhi:
A Model Driven Framework for Secure Outsourcing of Computation to the Cloud. IEEE CLOUD 2014: 968-969 - [c32]Vernon Asuncion, Khaled M. Khan, Abdelkarim Erradi, Saleh Alhazbi:
Reasoning about Security Policies of Services Using Answer Set Programming. IEEE SCC 2014: 857-858 - [c31]Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Ahmed M. Yousof, Hisham Arafat Ali:
Online risk assessment and prediction models for Autonomic Cloud Intrusion srevention systems. AICCSA 2014: 715-722 - [c30]Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Abdulrahman Azab:
A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems. DASC 2014: 14-19 - [c29]Hisham A. Kholidy, Ahmed M. Yousof, Abdelkarim Erradi, Sherif Abdelwahed, Hisham Arafat Ali:
A Finite Context Intrusion Prediction Model for Cloud Systems with a Probabilistic Suffix Tree. EMS 2014: 526-531 - [c28]Farida Sabry, Abdelkarim Erradi, Mohamed Nassar, Qutaibah M. Malluhi:
Automatic Generation of Optimized Workflow for Distributed Computations on Large-Scale Matrices. ICSOC 2014: 79-92 - [c27]Seung Hwan Ryu, Abdelkarim Erradi, Khaled M. Khan, Saleh Alhazbi, Boualem Benatallah:
Semantics-Based Approach for Dynamic Evolution of Trust Negotiation Protocols in Cloud Collaboration. ICSOC 2014: 518-526 - [c26]Hisham A. Kholidy, Hala Hassan, Amany M. Sarhan, Abdelkarim Erradi, Sherif Abdelwahed:
QoS Optimization for Cloud Service Composition Based on Economic Model. IoT360 (1) 2014: 355-366 - 2013
- [j4]Khaled M. Khan, Abdelkarim Erradi, Saleh Alhazbi, Jun Han:
Addressing security compatibility for multi-tenant cloud services. Int. J. Comput. Appl. Technol. 47(4): 370-378 (2013) - [c25]Mohamed Nassar, Abdelkarim Erradi, Farida Sabry, Qutaibah M. Malluhi:
Secure Outsourcing of Matrix Operations as a Service. IEEE CLOUD 2013: 918-925 - [c24]Qian Chen, Sherif Abdelwahed, Abdelkarim Erradi:
A model-based approach to self-protection in computing system. CAC 2013: 16:1-16:10 - [c23]Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Fabrizio Baiardi:
HA-CIDS: A Hierarchical and Autonomous IDS for Cloud Systems. CICSyN 2013: 179-184 - [c22]Asim Ali, Rui Jia, Abdelkarim Erradi, Sherif Abdelwahed, Rachid Hadjidj:
Towards Model-based Management of Database Fragmentation. Feedback Computing 2013 - [c21]Abdelkarim Erradi, Hind A. Al-Merekhi, Sajeda Nahia:
Game-Based Micro-learning Approach for Language Vocabulary Acquisition Using LingoSnacks. ICALT 2013: 235-237 - [c20]Mohamed Nassar, Abdelkarim Erradi, Qutaibah M. Malluhi:
Practical and Secure Outsourcing of Matrix Computations to the Cloud. ICDCS Workshops 2013: 70-75 - [c19]Rajat Mehrotra, Sherif Abdelwahed, Abdelkarim Erradi:
A Distributed Control Approach for Autonomic Performance Management in Cloud Computing Environment. UCC 2013: 269-272 - [i1]Hani Abdeen, Osama Shata, Abdelkarim Erradi:
Software Interfaces: On The Impact of Interface Design Anomalies. CoRR abs/1309.7950 (2013) - 2012
- [c18]Abdelkarim Erradi, Sajeda Nahia, Hind A. Al-Merekhi, Lubna Al-kailani:
LingoSnacks: m-Learning platform for language learning. CIST 2012: 149-154 - [c17]Abdelkarim Erradi, Sajeda Nahia, Hind A. Al-Merekhi, Lubna Al-kailani:
ArabicTutor: A multimedia m-Learning platform for learning Arabic spelling and vocabulary. ICMCS 2012: 833-838 - 2011
- [j3]Abdelkarim Erradi:
Policy-based customisation and corrective adaptation of composite web services. Int. J. Bus. Process. Integr. Manag. 5(4): 308-323 (2011)
2000 – 2009
- 2008
- [b1]Abdelkarim Erradi:
Policy-driven framework for manageable and adaptive service-oriented processes. University of New South Wales, Sydney, Australia, 2008 - 2007
- [j2]Abdelkarim Erradi, Piyush Maheshwari:
Policy-driven middleware for adaptive web services composition. Int. J. Bus. Process. Integr. Manag. 2(3): 187-202 (2007) - [c16]Vladimir Tosic, Abdelkarim Erradi, Piyush Maheshwari:
WS-Policy4MASC - A WS-Policy Extension Used in the MASC Middleware. IEEE SCC 2007: 458-465 - [c15]Abdelkarim Erradi, Piyush Maheshwari, Vladimir Tosic:
Policy-Driven Middleware for Manageable and Adaptive Web Services Compositions. BPM (Demos) 2007 - [c14]Abdelkarim Erradi, Piyush Maheshwari, Vladimir Tosic:
WS-Policy based Monitoring of Composite Web Services. ECOWS 2007: 99-108 - [c13]Abdelkarim Erradi, Naveen N. Kulkarni, Piyush Maheshwari:
Service Design Process for Reusable Services: Financial Services Case Study. ICSOC 2007: 606-617 - [c12]Abdelkarim Erradi, Vladimir Tosic, Piyush Maheshwari:
MASC - .NET-Based Middleware for Adaptive Composite Web Services. ICWS 2007: 727-734 - [c11]Abdelkarim Erradi, Piyush Maheshwari:
Enhancing Web Services Performance Using Adaptive Quality of Service Management. WISE 2007: 349-360 - 2006
- [j1]Abdelkarim Erradi, Naveen N. Kulkarni, Sriram Anand:
Service design principles: a case study in modeling services for the securities trading domain. Comput. Syst. Sci. Eng. 21(4) (2006) - [c10]Abdelkarim Erradi, Sriram Anand, Naveen N. Kulkarni:
SOAF: An Architectural Framework for Service Definition and Realization. IEEE SCC 2006: 151-158 - [c9]Abdelkarim Erradi, Sriram Anand, Naveen N. Kulkarni:
Evaluation of Strategies for Integrating Legacy Applications as Services in a Service Oriented Architecture. IEEE SCC 2006: 257-260 - [c8]Abdelkarim Erradi, Piyush Maheshwari, Vladimir Tosic:
Recovery Policies for Enhancing Web Services Reliability. ICWS 2006: 189-196 - [c7]Abdelkarim Erradi, Srinivas Padmanabhuni, Niranjan Varadharajan:
Differential QoS support in Web Services Management. ICWS 2006: 781-788 - [c6]Abdelkarim Erradi, Piyush Maheshwari, Vladimir Tosic:
Policy-Driven Middleware for Self-adaptation of Web Services Compositions. Middleware 2006: 62-80 - 2005
- [c5]Abdelkarim Erradi, Piyush Maheshwari:
wsBus: QoS-Aware Middleware for Reliable Web Services Interactions . EEE 2005: 634-639 - [c4]Abdelkarim Erradi, Piyush Maheshwari:
A Broker-Based Approach for Improving Web Services Reliability. ICWS 2005: 355-362 - [c3]Abdelkarim Erradi, Piyush Maheshwari:
wsBus: a framework for reliable web services interactions. SAC 2005: 1739-1740 - [c2]Robert Steele, William Gardner, Tharam S. Dillon, Abdelkarim Erradi:
XML-Based Declarative Access Control. SOFSEM 2005: 310-319 - 2004
- [c1]Piyush Maheshwari, Trung Nguyen Kien, Abdelkarim Erradi:
QoS-Based Message-Oriented Middleware for Web Services. WISE Workshops 2004: 241-251
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint