default search action
Jens Dietrich 0001
Person information
- affiliation: Victoria University of Wellington, New Zealand
- affiliation (2003 - 2018): Massey University, Palmerston North, New Zealand
- not to be confused with: Jens Dittrich
Other persons with the same name
- Jens Dietrich 0002 — Berlin Institute of Technology, Germany
Refine list
refinements active!
zoomed in on 117 of 117 records
view refined list in
export refined list as
refine by search term
refine by type
- |
- no options
- temporarily not available
refine by coauthor
- no options
- temporarily not available
refine by orcid
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
2020 – today
- 2025
- [j20]Dhanushka Jayasuriya, Samuel Ou, Saakshi Hegde, Valerio Terragni, Jens Dietrich, Kelly Blincoe:
An extended study of syntactic breaking changes in the wild. Empir. Softw. Eng. 30(2): 42 (2025) - 2024
- [j19]Dhanushka Jayasuriya, Valerio Terragni, Jens Dietrich, Kelly Blincoe:
Understanding the Impact of APIs Behavioral Breaking Changes on Client Applications. Proc. ACM Softw. Eng. 1(FSE): 1238-1261 (2024) - [c81]Philip Oliver, Jens Dietrich, Craig Anslow, Michael Homer:
CrashJS: A NodeJS Benchmark for Automated Crash Reproduction. MSR 2024: 75-87 - [c80]Elliott Wen, Jiaxiang Zhou, Xiapu Luo, Giovanni Russello, Jens Dietrich:
Keep Me Updated: An Empirical Study on Embedded JavaScript Engines in Android Apps. MSR 2024: 361-372 - [c79]Mohammad Mahdi Abdollahpour, Jens Dietrich, Patrick Lam:
Enhancing Security through Modularization: A Counterfactual Analysis of Vulnerability Propagation and Detection Precision. SCAM 2024: 94-105 - [c78]Jens Dietrich, Tim White, Mohammad Mahdi Abdollahpour, Elliott Wen, Behnaz Hassanshahi:
BinEq - A Benchmark of Compiled Java Programs to Assess Alternative Builds. SCORED@CCS 2024: 15-25 - [c77]Jens Dietrich, Shawn Rasheed, Alexander Jordan, Tim White:
On the Security Blind Spots of Software Composition Analysis. SCORED@CCS 2024: 77-87 - [i14]Philip Oliver, Jens Dietrich, Craig Anslow, Michael Homer:
CrashJS: A NodeJS Benchmark for Automated Crash Reproduction. CoRR abs/2405.05541 (2024) - [i13]Jens Dietrich, Tim White, Behnaz Hassanshahi, Paddy Krishnan:
Levels of Binary Equivalence for the Comparison of Binaries from Alternative Builds. CoRR abs/2410.08427 (2024) - 2023
- [j18]Amjed Tahir, Shawn Rasheed, Jens Dietrich, Negar Hashemi, Lu Zhang:
Test flakiness' causes, detection, impact and responses: A multivocal review. J. Syst. Softw. 206: 111837 (2023) - [c76]Shawn Rasheed, Jens Dietrich, Amjed Tahir:
On the Effect of Instrumentation on Test Flakiness. AST 2023: 123-127 - [c75]Jens Dietrich, David J. Pearce, Mahin Chandramohan:
On Leveraging Tests to Infer Nullable Annotations. ECOOP 2023: 10:1-10:25 - [c74]Jens Dietrich, Matthias Galster, Markus Luczak-Rösch:
On Retrofitting Provenance for Transparent and Fair Software - Drivers and Challenges. FairWare 2023: 14-21 - [c73]Jens Dietrich, Lijun Chang, Long Qian, Lyndon M. Henry, Catherine McCartin, Bernhard Scholz:
Efficient Sink-Reachability Analysis via Graph Reduction (Extended Abstract). ICDE 2023: 3897-3898 - [c72]Dhanushka Jayasuriya, Valerio Terragni, Jens Dietrich, Samuel Ou, Kelly Blincoe:
Understanding Breaking Changes in the Wild. ISSTA 2023: 1433-1444 - [c71]Elliott Wen, Jens Dietrich:
WasmSlim: Optimizing WebAssembly Binary Distribution via Automatic Module Splitting. SANER 2023: 673-677 - [i12]Matthias Galster, Jens Dietrich:
Towards Understanding Provenance in Industry. CoRR abs/2302.06038 (2023) - [i11]Shawn Rasheed, Jens Dietrich, Amjed Tahir:
On the Effect of Instrumentation on Test Flakiness. CoRR abs/2303.09755 (2023) - [i10]Jens Dietrich, Shawn Rasheed, Alexander Jordan:
On the Security Blind Spots of Software Composition Analysis. CoRR abs/2306.05534 (2023) - 2022
- [j17]Jens Dietrich, Lijun Chang, Long Qian, Lyndon M. Henry, Catherine McCartin, Bernhard Scholz:
Efficient Sink-Reachability Analysis via Graph Reduction. IEEE Trans. Knowl. Data Eng. 34(11): 5321-5335 (2022) - [c70]Li Sui, Shawn Rasheed, Amjed Tahir, Jens Dietrich:
A study of single statement bugs involving dynamic language features. ICPC 2022: 494-498 - [c69]Jens Dietrich, Shawn Rasheed, Amjed Tahir:
Flaky Test Sanitisation via On-the-Fly Assumption Inference for Tests with Network Dependencies. SCAM 2022: 264-275 - [c68]Elliott Wen, Jia Wang, Jens Dietrich:
SecretHunter: A Large-scale Secret Scanner for Public Git Repositories. TrustCom 2022: 123-130 - [c67]Sruthi Venkatanarayanan, Jens Dietrich, Craig Anslow, Patrick Lam:
VizAPI: Visualizing Interactions between Java Libraries and Clients. VISSOFT 2022: 172-176 - [i9]Li Sui, Shawn Rasheed, Amjed Tahir, Jens Dietrich:
A Study of Single Statement Bugs Involving Dynamic Language Features. CoRR abs/2204.00963 (2022) - [i8]Jens Dietrich, Shawn Rasheed, Amjed Tahir:
Flaky Test Sanitisation via On-the-Fly Assumption Inference for Tests with Network Dependencies. CoRR abs/2208.01106 (2022) - [i7]Shawn Rasheed, Amjed Tahir, Jens Dietrich, Negar Hashemi, Lu Zhang:
Test Flakiness' Causes, Detection, Impact and Responses: A Multivocal Review. CoRR abs/2212.00908 (2022) - 2021
- [c66]Shawn Rasheed, Jens Dietrich, Amjed Tahir:
Caught in the Web: DoS Vulnerabilities in Parsers for Structured Data. ESORICS (1) 2021: 67-85 - [c65]Philip Oliver, Michael Homer, Jens Dietrich, Craig Anslow:
A Partial Reproduction of A Guided Genetic Algorithm for Automated Crash Reproduction. ICSME 2021: 684-688 - [i6]Philip Oliver, Michael Homer, Jens Dietrich, Craig Anslow:
A Partial Reproduction of A Guided Genetic Algorithm for Automated Crash Reproduction. CoRR abs/2107.11933 (2021) - 2020
- [j16]Amjed Tahir, Jens Dietrich, Steve Counsell, Sherlock A. Licorish, Aiko Yamashita:
A large scale study on how developers discuss code smells and anti-pattern in Stack Exchange sites. Inf. Softw. Technol. 125: 106333 (2020) - [c64]Jacob Stringer, Amjed Tahir, Kelly Blincoe, Jens Dietrich:
Technical Lag of Dependencies in Major Package Managers. APSEC 2020: 228-237 - [c63]Li Sui, Jens Dietrich, Amjed Tahir, George Fourtounis:
On the recall of static call graph construction in practice. ICSE 2020: 1049-1060 - [c62]Shawn Rasheed, Jens Dietrich:
A Hybrid Analysis to Detect Java Serialisation Vulnerabilities. ASE 2020: 1209-1213 - [c61]Patrick Lam, Jens Dietrich, David J. Pearce:
Putting the semantics into semantic versioning. Onward! 2020: 157-179 - [i5]Patrick Lam, Jens Dietrich, David J. Pearce:
Putting the Semantics into Semantic Versioning. CoRR abs/2008.07069 (2020) - no results
2010 – 2019
- 2019
- [c60]Thilini Bhagya, Jens Dietrich, Hans W. Guesgen:
Generating Mock Skeletons for Lightweight Web-Service Testing. APSEC 2019: 181-188 - [c59]Jens Dietrich, Markus Luczak-Rösch, Elroy Dalefield:
Man vs machine: a study into language identification of stack overflow code snippets. MSR 2019: 205-209 - [c58]Jens Dietrich, David J. Pearce, Jacob Stringer, Amjed Tahir, Kelly Blincoe:
Dependency versioning in the wild. MSR 2019: 349-359 - [c57]Shawn Rasheed, Jens Dietrich, Amjed Tahir:
Laughter in the Wild: A Study Into DoS Vulnerabilities in YAML Libraries. TrustCom/BigDataSE 2019: 342-349 - [c56]Jack Slater, Craig Anslow, Jens Dietrich, Leonel Merino:
CorpusVis - Visualizing Software Metrics at Scale. VISSOFT 2019: 99-109 - [i4]Thilini Bhagya, Jens Dietrich, Hans W. Guesgen:
Generating Mock Skeletons for Lightweight Web-Service Testing. CoRR abs/1910.09159 (2019) - 2018
- [c55]Li Sui, Jens Dietrich, Michael Emery, Shawn Rasheed, Amjed Tahir:
On the Soundness of Call Graph Construction in the Presence of Dynamic Language Features - A Benchmark and Tool Evaluation. APLAS 2018: 69-88 - [c54]Jens Dietrich, François Gauthier, Padmanabhan Krishnan:
Driver Generation for Java EE Web Applications. ASWEC 2018: 121-125 - [c53]Amjed Tahir, Aiko Yamashita, Sherlock A. Licorish, Jens Dietrich, Steve Counsell:
Can you tell me if it smells?: A study on how developers discuss code smells and anti-patterns in Stack Overflow. EASE 2018: 68-78 - [c52]Thilini Bhagya, Jens Dietrich, Hans W. Guesgen, Steve Versteeg:
GHTraffic: A Dataset for Reproducible Research in Service-Oriented Computing. ICWS 2018: 123-130 - [c51]David Baum, Jens Dietrich, Craig Anslow, Richard Müller:
Visualizing Design Erosion: How Big Balls of Mud are Made. VISSOFT 2018: 122-126 - [i3]Thilini Bhagya, Jens Dietrich, Hans W. Guesgen, Steve Versteeg:
GHTraffic: A Dataset for Reproducible Research in Service-Oriented Computing. CoRR abs/1806.03449 (2018) - [i2]David Baum, Jens Dietrich, Craig Anslow, Richard Müller:
Visualizing Design Erosion: How Big Balls of Mud are Made. CoRR abs/1807.06136 (2018) - 2017
- [j15]Jens Dietrich, David J. Pearce, Kamil Jezek, Premek Brada:
Contracts in the Wild: A Study of Java Programs (Artifact). Dagstuhl Artifacts Ser. 3(2): 06:1-06:4 (2017) - [j14]Jens Dietrich, Kamil Jezek, Shawn Rasheed, Amjed Tahir, Alex Potanin:
Evil Pickles: DoS Attacks Based on Object-Graph Engineering (Artifact). Dagstuhl Artifacts Ser. 3(2): 13:1-13:3 (2017) - [j13]An C. Tran, Jens Dietrich, Hans W. Guesgen, Stephen Marsland:
Parallel Symmetric Class Expression Learning. J. Mach. Learn. Res. 18: 64:1-64:34 (2017) - [j12]Jens Dietrich, Henrik Schole, Li Sui, Ewan D. Tempero:
XCorpus - An executable Corpus of Java Programs. J. Object Technol. 16(4): 1:1-24 (2017) - [j11]Kamil Jezek, Jens Dietrich:
API Evolution and Compatibility: A Data Corpus and Tool Evaluation. J. Object Technol. 16(4): 2:1-23 (2017) - [c50]Li Sui, Jens Dietrich, Amjed Tahir:
On the Use of Mined Stack Traces to Improve the Soundness of Statically Constructed Call Graphs. APSEC 2017: 672-676 - [c49]Jens Dietrich, David J. Pearce, Kamil Jezek, Premek Brada:
Contracts in the Wild: A Study of Java Programs. ECOOP 2017: 9:1-9:29 - [c48]Jens Dietrich, Kamil Jezek, Shawn Rasheed, Amjed Tahir, Alex Potanin:
Evil Pickles: DoS Attacks Based on Object-Graph Engineering. ECOOP 2017: 10:1-10:32 - [c47]Jens Dietrich, Li Sui, Shawn Rasheed, Amjed Tahir:
On the construction of soundness oracles. SOAP@PLDI 2017: 37-42 - 2016
- [j10]Kamil Jezek, Jens Dietrich:
Magic with Dynamo - Flexible Cross-Component Linking for Java with Invokedynamic (Artifact). Dagstuhl Artifacts Ser. 2(1): 05:1-05:2 (2016) - [j9]Jens Dietrich, Kamil Jezek, Premek Brada:
What Java developers know about compatibility, and why this matters. Empir. Softw. Eng. 21(3): 1371-1396 (2016) - [c46]Jens Dietrich, Nicholas Hollingum, Bernhard Scholz:
A Note on the Soundness of Difference Propagation. FTfJP@ECOOP 2016: 3 - [c45]Kamil Jezek, Jens Dietrich:
Magic with Dynamo -- Flexible Cross-Component Linking for Java with Invokedynamic. ECOOP 2016: 12:1-12:25 - [c44]Li Sui, Jens Dietrich, Eva Heinrich, Manfred Meyer:
A Web-Based Environment for Introductory Programming based on a Bi-Directional Layered Notional Machine. ITiCSE 2016: 364 - [c43]Francesca Arcelli Fontana, Jens Dietrich, Bartosz Walter, Aiko Yamashita, Marco Zanoni:
Antipattern and Code Smell False Positives: Preliminary Conceptualization and Classification. SANER 2016: 609-613 - [e1]Alex Potanin, Gail C. Murphy, Steve Reeves, Jens Dietrich:
23rd Asia-Pacific Software Engineering Conference, APSEC 2016, Hamilton, New Zealand, December 6-9, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-5575-3 [contents] - 2015
- [j8]Kamil Jezek, Jens Dietrich, Premek Brada:
How Java APIs break - An empirical study. Inf. Softw. Technol. 65: 129-146 (2015) - [c42]Jens Dietrich, Johannes Tandler, Li Sui, Manfred Meyer:
The PrimeGame Revolutions: A cloud-based collaborative environment for teaching introductory programming. ASWEC (2) 2015: 8-12 - [c41]Fergus Hewson, Jens Dietrich, Stephen Marsland:
Performance Regression Testing on the Java Virtual Machine Using Statistical Test Oracles. ASWEC 2015: 18-27 - [c40]Jens Dietrich, Nicholas Hollingum, Bernhard Scholz:
Giga-scale exhaustive points-to analysis for Java in under a minute. OOPSLA 2015: 535-551 - [c39]Tosin Daniel Oyetoyan, Jean-Rémy Falleri, Jens Dietrich, Kamil Jezek:
Circular dependencies and change-proneness: An empirical study. SANER 2015: 241-250 - 2014
- [c38]Hussain A. Al-Mutawa, Jens Dietrich, Stephen Marsland, Catherine McCartin:
On the Shape of Circular Dependencies in Java Programs. Australian Software Engineering Conference 2014: 48-57 - [c37]Jens Dietrich, Kamil Jezek, Premek Brada:
Broken promises: An empirical study into evolution problems in Java programs caused by library upgrades. CSMR-WCRE 2014: 64-73 - [c36]Ines Moosdorf, Adrian Paschke, Alexandru Todor, Jens Dietrich, Hans W. Guesgen:
PRCA - A Parallel Relational Concept Analysis Framework. FCA4AI@ECAI 2014: 66-76 - [c35]Kamil Jezek, Jens Dietrich:
On the Use of Static Analysis to Safeguard Recursive Dependency Resolution. EUROMICRO-SEAA 2014: 166-173 - [i1]Jens Dietrich, Kamil Jezek, Premek Brada:
What Java Developers Know About Compatibility, And Why This Matters. CoRR abs/1408.2607 (2014) - 2013
- [c34]An C. Tran, Hans W. Guesgen, Jens Dietrich, Stephen Marsland:
An Approach to Numeric Refinement in Description Logic Learning for Learning Activities Duration in Smart Homes. AAAI Workshop: Space, Time, and Ambient Intelligence 2013 - [c33]An Cong Tran, Jens Dietrich, Hans W. Guesgen, Stephen Marsland:
Improving Predictive Specificity of Description Logic Learners by Fortification. ACML 2013: 419-434 - [c32]Syed Muhammad Ali Shah, Jens Dietrich, Catherine McCartin:
On the Automation of Dependency-Breaking Refactorings in Java. ICSM 2013: 160-169 - 2012
- [c31]Jens Dietrich, Catherine McCartin, Ewan D. Tempero, Syed M. Ali Shah:
On the Existence of High-Impact Refactoring Opportunities in Programs. ACSC 2012: 37-48 - [c30]Jens Dietrich, Catherine McCartin:
Scalable Motif Detection and Aggregation. ADC 2012: 31-40 - [c29]Syed M. Ali Shah, Jens Dietrich, Catherine McCartin:
Making Smart Moves to Untangle Programs. CSMR 2012: 359-364 - [c28]Jens Dietrich:
Upload your program, share your model. SPLASH 2012: 21-22 - [c27]An C. Tran, Jens Dietrich, Hans W. Guesgen, Stephen Marsland:
An Approach to Parallel Class Expression Learning. RuleML 2012: 302-316 - [c26]Syed Muhammad Ali Shah, Jens Dietrich, Catherine McCartin:
On the Automated Modularisation of Java Programs Using Service Locators. SC@TOOLS 2012: 132-147 - [c25]An C. Tran, Jens Dietrich, Hans W. Guesgen, Stephen Marsland:
Two-way Parallel Class Expression Learning. ACML 2012: 443-458 - 2011
- [j7]Jens Dietrich:
An Ontological Model for Component Collaboration. J. Res. Pract. Inf. Technol. 43(1): 25-40 (2011) - [c24]Graham Jenson, Jens Dietrich, Hans W. Guesgen, Stephen Marsland:
An empirical study into component system evolution. CBSE 2011: 189-192 - 2010
- [j6]Jens Dietrich, Jutta Keller-Herder:
De-Mail - verschlüsselt, authentisch, nachweisbar - Mehr Sicherheit im elektronischen Nachrichtenverkehr. Datenschutz und Datensicherheit 34(5): 299-301 (2010) - [j5]Paul Lyons, An Cong Tran, H. Joe Steinhauer, Stephen Marsland, Jens Dietrich, Hans W. Guesgen:
Exploring the responsibilities of single-inhabitant Smart Homes with Use Cases. J. Ambient Intell. Smart Environ. 2(3): 211-232 (2010) - [c23]Graham Jenson, Jens Dietrich, Hans W. Guesgen:
A Formal Framework to Optimise Component Dependency Resolution. APSEC 2010: 226-233 - [c22]Ewan D. Tempero, Craig Anslow, Jens Dietrich, Ted Han, Jing Li, Markus Lumpe, Hayden Melton, James Noble:
The Qualitas Corpus: A Curated Collection of Java Code for Empirical Studies. APSEC 2010: 336-345 - [c21]Jevon M. Wright, Jens Dietrich:
Non-Monotonic Model Completion in Web Application Engineering. Australian Software Engineering Conference 2010: 45-54 - [c20]Jens Dietrich, Lucia Stewart:
Component Contracts in Eclipse - A Case Study. CBSE 2010: 150-165 - [c19]Graham Jenson, Jens Dietrich, Hans W. Guesgen:
An Empirical Study of the Component Dependency Resolution Search Space. CBSE 2010: 182-199 - [c18]An Cong Tran, Stephen Marsland, Jens Dietrich, Hans W. Guesgen, Paul Lyons:
Use Cases for Abnormal Behaviour Detection in Smart Homes. ICOST 2010: 144-151 - [c17]Jens Dietrich, Catherine McCartin, Ewan D. Tempero, Syed M. Ali Shah:
Barriers to Modularity - An Empirical Study to Assess the Potential for Modularisation of Java Programs. QoSA 2010: 135-150 - no results
2000 – 2009
- 2009
- [j4]Jens Dietrich, Graham Jenson:
Components, Contracts and Vocabularies - Making Dynamic Component Assemblies more Predictable. J. Object Technol. 8(7): 131-148 (2009) - [c16]Jens Dietrich:
On the dynamic composition of complex systems - lessons learned from component-oriented software engineering. EDOCW 2009: 5 - [c15]Jens Dietrich, Dragan Gasevic:
Vocabularies, ontologies and rules for the enterprise. EDOCW 2009: 297-299 - [c14]Vladimir Stantchev, Marten Schönherr, Jens Dietrich:
Layered Government and E-Citizenship: Objectives and Technical Challenges in the EU. ICIW 2009: 614-619 - 2008
- [j3]Jens Dietrich, Nathan Jones, Jevon M. Wright:
Using social networking and semantic web technology in software engineering - Use cases, patterns, and a case study. J. Syst. Softw. 81(12): 2183-2193 (2008) - [c13]Jevon M. Wright, Jens Dietrich:
Survey of Existing Languages to Model Interactive Web Applications. APCCM 2008: 113-123 - [c12]Jens Dietrich, Elizabeth A. Kemp:
Tool Support for Teaching Design Patterns. Australian Software Engineering Conference 2008: 200-208 - [c11]Jens Dietrich, Bastian Schenke, Gerd Wagner:
On Code Generation for Derived Associations. Australian Software Engineering Conference 2008: 347-356 - [c10]Ion-Mircea Diaconescu, Adrian Giurca, Gerd Wagner, Jens Dietrich:
Towards a Mapping from ERDF(S) to Take Vocabulary. KESE 2008 - [c9]Jens Dietrich, Vyacheslav Yakovlev, Catherine McCartin, Graham Jenson, Manfred Duchrow:
Cluster analysis of Java dependency graphs. SOFTVIS 2008: 91-94 - [c8]Jevon M. Wright, Jens Dietrich:
Requirements for Rich Internet Application Design Methodologies. WISE 2008: 106-119 - 2007
- [j2]Jens Dietrich, Chris Elgar:
Towards a web of patterns. J. Web Semant. 5(2): 108-116 (2007) - [c7]Jens Dietrich, Nathan Jones:
Using Social Networking and Semantic Web Technology in Software Engineering--Use Cases, Patterns, and a Case Study. ASWEC 2007: 129-136 - [c6]Jens Dietrich, John G. Hosking, Jonathan Giles:
A Formal Contract Language for Plugin-based Software Engineering. ICECCS 2007: 175-184 - [c5]Jens Dietrich, Jochen Hiller, Bastian Schenke:
Take - A Rule Compiler for Derivation Rules. RuleML 2007: 134-148 - 2005
- [c4]Jens Dietrich, Chris Elgar:
A Formal Description of Design Patterns Using OWL. Australian Software Engineering Conference 2005: 243-250 - [c3]Jens Dietrich, Adrian Paschke:
On the Test-Driven Development and Validation of Business Rules. ISTA 2005: 31-48 - [c2]Adrian Paschke, Martin Bichler, Jens Dietrich:
ContractLog: An Approach to Rule Based Monitoring and Execution of Service Level Agreements. RuleML 2005: 209-217 - 2004
- [c1]Jens Dietrich:
A Rule-Based System for eCommerce Applications. KES 2004: 455-463 - 2003
- [j1]Jens Dietrich, Alexander Kozlenkov, Michael Schroeder, Gerd Wagner:
Rule-based agents for the semantic web. Electron. Commer. Res. Appl. 2(4): 323-338 (2003) - no results
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-26 23:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint