
Emad Shihab
Person information
- affiliation: Rochester Institute of Technology, Department of Software Engineering
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j39]Juan Hoyos
, Rabe Abdalkareem, Suhaib Mujahid, Emad Shihab, Albeiro Espinosa Bedoya:
On the Removal of Feature Toggles. Empir. Softw. Eng. 26(1): 15 (2021) - [j38]Jiakun Liu, Qiao Huang, Xin Xia, Emad Shihab, David Lo, Shanping Li:
An exploratory study on the introduction and removal of different types of technical debt in deep learning frameworks. Empir. Softw. Eng. 26(2): 16 (2021) - [j37]Xiaowei Chen, Rabe Abdalkareem
, Suhaib Mujahid, Emad Shihab, Xin Xia:
Helping or not helping? Why and how trivial packages impact the npm ecosystem. Empir. Softw. Eng. 26(2): 27 (2021) - [j36]Mohamed Elshafei
, Emad Shihab:
Towards Detecting Biceps Muscle Fatigue in Gym Activity Using Wearables. Sensors 21(3): 759 (2021) - [j35]Mohamed Elshafei
, Diego Elias Costa
, Emad Shihab:
On the Impact of Biceps Muscle Fatigue in Human Activity Recognition. Sensors 21(4): 1070 (2021) - [j34]Emad Shihab, Stefan Wagner, Marco Aurélio Gerosa:
Summary of the 2nd International Workshop on Bots in Software Engineering (BotSE 2020). ACM SIGSOFT Softw. Eng. Notes 46(1): 20-22 (2021) - [j33]Rabe Abdalkareem
, Suhaib Mujahid
, Emad Shihab, Juergen Rilling:
Which Commits Can Be CI Skipped? IEEE Trans. Software Eng. 47(3): 448-463 (2021) - [i10]Jiakun Liu, Qiao Huang, Xin Xia, Emad Shihab, David Lo, Shanping Li:
An Exploratory Study on the Introduction and Removal of Different Types of Technical Debt. CoRR abs/2101.03730 (2021) - 2020
- [j32]Rabe Abdalkareem
, Vinicius Oda, Suhaib Mujahid, Emad Shihab:
On the impact of using trivial packages: an empirical case study on npm and PyPI. Empir. Softw. Eng. 25(2): 1168-1204 (2020) - [j31]Ahmad Abdellatif, Khaled Badran, Emad Shihab:
MSRBot: Using bots to answer questions from software repositories. Empir. Softw. Eng. 25(3): 1834-1863 (2020) - [j30]Junxiao Han, Emad Shihab, Zhiyuan Wan, Shuiguang Deng, Xin Xia:
What do Programmers Discuss about Deep Learning Frameworks. Empir. Softw. Eng. 25(4): 2694-2747 (2020) - [j29]Ahmad Abdellatif, Yi Zeng, Mohamed Elshafei, Emad Shihab, Weiyi Shang:
Simplifying the Search of npm Packages. Inf. Softw. Technol. 126: 106365 (2020) - [c53]Jiakun Liu, Qiao Huang, Xin Xia, Emad Shihab, David Lo
, Shanping Li:
Is using deep learning frameworks free?: characterizing technical debt in deep learning frameworks. ICSE-SEIS 2020: 1-10 - [c52]Ahmad Abdellatif, Diego Costa, Khaled Badran, Rabe Abdalkareem, Emad Shihab:
Challenges in Chatbot Development: A Study of Stack Overflow Posts. MSR 2020: 174-185 - [c51]Suhaib Mujahid, Rabe Abdalkareem, Emad Shihab, Shane McIntosh:
Using Others' Tests to Identify Breaking Updates. MSR 2020: 466-476 - [i9]Diego Elias Costa, Suhaib Mujahid, Rabe Abdalkareem, Emad Shihab:
Breaking Type-Safety in Go: An Empirical Study on the Usage of the unsafe Package. CoRR abs/2006.09973 (2020) - [i8]Mahmoud Alfadel, Diego Elias Costa, Mouafak Mokhallalati, Emad Shihab, Bram Adams:
On the Threat of npm Vulnerable Dependencies in Node.js Applications. CoRR abs/2009.09019 (2020) - [i7]Abbas Javan Jafari, Diego Elias Costa, Rabe Abdalkareem, Emad Shihab, Nikolaos Tsantalis:
Dependency Smells in JavaScript Projects. CoRR abs/2010.14573 (2020) - [i6]Ahmad Abdellatif, Khaled Badran, Diego Elias Costa, Emad Shihab:
A Comparison of Natural Language Understanding Platforms for Chatbots in Software Engineering. CoRR abs/2012.02640 (2020)
2010 – 2019
- 2019
- [j28]Md Tajmilur Rahman
, Peter C. Rigby, Emad Shihab:
The modular and feature toggle architectures of Google Chrome. Empir. Softw. Eng. 24(2): 826-853 (2019) - [j27]David Bowes
, Emad Shihab, Burak Turhan
:
Guest editorial: special section on predictive models and data analytics in software engineering. Empir. Softw. Eng. 24(5): 3151-3152 (2019) - [j26]Giancarlo Sierra, Emad Shihab, Yasutaka Kamei:
A survey of self-admitted technical debt. J. Syst. Softw. 152: 70-82 (2019) - [j25]Akbar Dehghani, Omid Sarbishei
, Tristan Glatard, Emad Shihab:
A Quantitative Comparison of Overlapping and Non-Overlapping Sliding Windows for Human Activity Recognition Using Inertial Sensors. Sensors 19(22): 5026 (2019) - [j24]Meng Yan, Xin Xia
, Emad Shihab, David Lo
, Jianwei Yin, Xiaohu Yang
:
Automating Change-Level Self-Admitted Technical Debt Determination. IEEE Trans. Software Eng. 45(12): 1211-1229 (2019) - [c50]George G. Cabral, Leandro L. Minku
, Emad Shihab, Suhaib Mujahid:
Class imbalance evolution and verification latency in just-in-time software defect prediction. ICSE 2019: 666-676 - [c49]Hosein Nourani, Emad Shihab, Omid Sarbishei:
The Impact of Data Reduction on Wearable-Based Human Activity Recognition. PerCom Workshops 2019: 89-94 - [c48]Giancarlo Sierra, Ahmad Tahmid, Emad Shihab, Nikolaos Tsantalis:
Is Self-Admitted Technical Debt a Good Indicator of Architectural Divergences? SANER 2019: 534-543 - [c47]Xinyu Wang, David Lo, Emad Shihab, Xin Xia:
Message from the General Chair, Program Co-Chairs, and Local Chair. SANER 2019: iii-iv - [e5]Emad Shihab, Stefan Wagner:
Proceedings of the 1st International Workshop on Bots in Software Engineering, BotSE@ICSE 2019, Montreal, QC, Canada, May 28, 2019. IEEE / ACM 2019, ISBN 978-1-7281-2262-5 [contents] - [e4]Xinyu Wang, David Lo, Emad Shihab:
26th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2019, Hangzhou, China, February 24-27, 2019. IEEE 2019, ISBN 978-1-7281-0591-8 [contents] - [i5]Akbar Dehghani, Tristan Glatard, Emad Shihab:
Subject Cross Validation in Human Activity Recognition. CoRR abs/1904.02666 (2019) - [i4]Ahmad Abdellatif, Emad Shihab:
MSRBot: Using Bots to Answer Questions from Software Repositories. CoRR abs/1905.06991 (2019) - 2018
- [j23]Qiao Huang, Emad Shihab, Xin Xia
, David Lo
, Shanping Li:
Identifying self-admitted technical debt in open source projects using text mining. Empir. Softw. Eng. 23(1): 418-451 (2018) - [j22]Muhammad Moiz Arif, Weiyi Shang, Emad Shihab:
Empirical study on the discrepancy between performance testing results from virtual and physical environments. Empir. Softw. Eng. 23(3): 1490-1518 (2018) - [j21]Mehran Hassani
, Weiyi Shang, Emad Shihab, Nikolaos Tsantalis:
Studying and detecting log-related issues. Empir. Softw. Eng. 23(6): 3248-3280 (2018) - [j20]Suhaib Mujahid
, Giancarlo Sierra, Rabe Abdalkareem, Emad Shihab, Weiyi Shang:
An empirical study of Android Wear user complaints. Empir. Softw. Eng. 23(6): 3476-3502 (2018) - [j19]Harold Valdivia Garcia, Emad Shihab, Meiyappan Nagappan:
Characterizing and predicting blocking bugs in open source projects. J. Syst. Softw. 143: 44-58 (2018) - [c46]Jailton Coelho, Marco Tulio Valente, Luciana Lourdes Silva, Emad Shihab:
Identifying unmaintained projects in github. ESEM 2018: 15:1-15:10 - [c45]Zhongxin Liu, Qiao Huang, Xin Xia
, Emad Shihab, David Lo
, Shanping Li:
SATD detector: a text-mining-based self-admitted technical debt detection tool. ICSE (Companion Volume) 2018: 9-12 - [c44]Muhammad Moiz Arif, Weiyi Shang, Emad Shihab:
Empirical study on the discrepancy between performance testing results from virtual and physical environments. ICSE 2018: 822 - [c43]Yue Cai Zhu, Emad Shihab, Peter C. Rigby:
Test Re-Prioritization in Continuous Testing Environments. ICSME 2018: 69-79 - [c42]Suhaib Mujahid, Rabe Abdalkareem, Emad Shihab:
Studying Permission Related Issues in Android Wearable Apps. ICSME 2018: 345-356 - [i3]Jailton Coelho, Marco Tulio Valente, Luciana Lourdes Silva, Emad Shihab:
Identifying Unmaintained Projects in GitHub. CoRR abs/1809.04041 (2018) - [i2]Hideaki Hata, Emad Shihab, Graham Neubig:
Learning to Generate Corrective Patches using Neural Machine Translation. CoRR abs/1812.07170 (2018) - 2017
- [j18]Ayse Tosun, Emad Shihab, Yasutaka Kamei:
Erratum to: Studying high impact fix-inducing changes. Empir. Softw. Eng. 22(2): 848 (2017) - [j17]Rabe Abdalkareem, Emad Shihab, Juergen Rilling:
On code reuse from StackOverflow: An exploratory study on Android apps. Inf. Softw. Technol. 88: 148-158 (2017) - [j16]Rabe Abdalkareem, Emad Shihab, Juergen Rilling:
What Do Developers Use the Crowd For? A Study Using Stack Overflow. IEEE Softw. 34(2): 53-60 (2017) - [j15]Everton da S. Maldonado, Emad Shihab
, Nikolaos Tsantalis:
Using Natural Language Processing to Automatically Detect Self-Admitted Technical Debt. IEEE Trans. Software Eng. 43(11): 1044-1062 (2017) - [c41]Suhaib Mujahid
, Giancarlo Sierra, Rabe Abdalkareem, Emad Shihab, Weiyi Shang:
Examining User Complaints of Wearable Apps: A Case Study on Android Wear. MOBILESoft@ICSE 2017: 96-99 - [c40]Everton da S. Maldonado, Rabe Abdalkareem, Emad Shihab, Alexander Serebrenik:
An Empirical Study on the Removal of Self-Admitted Technical Debt. ICSME 2017: 238-248 - [c39]Rabe Abdalkareem, Olivier Nourry, Sultan Wehaibi, Suhaib Mujahid
, Emad Shihab:
Why do developers use trivial packages? an empirical case study on npm. ESEC/SIGSOFT FSE 2017: 385-395 - [e3]Burak Turhan
, David Bowes, Emad Shihab:
Proceedings of the 13th International Conference on Predictive Models and Data Analytics in Software Engineering, PROMISE 2017, Toronto, Canada, November 8, 2017. ACM 2017, ISBN 978-1-4503-5305-2 [contents] - [e2]Federica Sarro, Emad Shihab, Meiyappan Nagappan, Marie Christin Platenius, Daniel Kaimann:
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, WAMA@ESEC/SIGSOFT FSE 2017, Paderborn, Germany, September 5, 2017. ACM 2017, ISBN 978-1-4503-5158-4 [contents] - [i1]Emad Shihab, Akinori Ihara:
Mining Software Repositories:Accomplishments, Challenges andFuture Trends (NII Shonan Meeting 2017-2). NII Shonan Meet. Rep. 2017 (2017) - 2016
- [j14]Ayse Tosun Misirli, Emad Shihab, Yasukata Kamei:
Studying high impact fix-inducing changes. Empir. Softw. Eng. 21(2): 605-641 (2016) - [j13]Christoffer Rosen, Emad Shihab:
What are mobile developers asking about? A large scale study using stack overflow. Empir. Softw. Eng. 21(3): 1192-1223 (2016) - [j12]Xin Xia
, David Lo
, Emad Shihab, Xinyu Wang:
Automated Bug Report Field Reassignment and Refinement Prediction. IEEE Trans. Reliab. 65(3): 1094-1113 (2016) - [c38]Yasutaka Kamei, Everton da S. Maldonado, Emad Shihab, Naoyasu Ubayashi:
Using Analytics to Quantify Interest of Self-Admitted Technical Debt. QuASoQ/TDA@APSEC 2016: 68-71 - [c37]Xin Xia
, David Lo
, Denzil Correa, Ashish Sureka, Emad Shihab:
It Takes Two to Tango: Deleted Stack Overflow Question Prediction with Text and Meta Features. COMPSAC 2016: 73-82 - [c36]Yu Zhao, Feng Zhang, Emad Shihab, Ying Zou, Ahmed E. Hassan:
How Are Discussions Associated with Bug Reworking?: An Empirical Study on Open Source Projects. ESEM 2016: 21:1-21:10 - [c35]Xin Xia
, Emad Shihab, Yasutaka Kamei, David Lo
, Xinyu Wang:
Predicting Crashing Releases of Mobile Applications. ESEM 2016: 29:1-29:10 - [c34]Meiyappan Nagappan, Emad Shihab:
Future Trends in Software Engineering Research for Mobile Apps. FOSE@SANER 2016: 21-32 - [c33]Yasutaka Kamei, Emad Shihab:
Defect Prediction: Accomplishments and Future Challenges. FOSE@SANER 2016: 33-45 - [c32]Sultan Wehaibi, Emad Shihab, Latifa Guerrouj:
Examining the Impact of Self-Admitted Technical Debt on Software Quality. SANER 2016: 179-188 - [p1]Meiyappan Nagappan, Emad Shihab:
Mobile app store analytics. Perspectives on Data Science for Software Engineering 2016: 47-49 - [e1]Meiyappan Nagappan, Federica Sarro, Emad Shihab:
Proceedings of the International Workshop on App Market Analytics, WAMA@SIGSOFT FSE, Seattle, WA, USA, November 14, 2016. ACM 2016, ISBN 978-1-4503-4398-5 [contents] - 2015
- [j11]Xin Xia
, David Lo
, Emad Shihab, Xinyu Wang, Bo Zhou:
Automatic, high accuracy prediction of reopened bugs. Autom. Softw. Eng. 22(1): 75-109 (2015) - [j10]Xin Xia
, David Lo
, Emad Shihab, Xinyu Wang, Xiaohu Yang:
ELBlocker: Predicting blocking bugs with ensemble imbalance learning. Inf. Softw. Technol. 61: 93-106 (2015) - [j9]Hammad Khalid, Emad Shihab, Meiyappan Nagappan, Ahmed E. Hassan:
What Do Mobile App Users Complain About? IEEE Softw. 32(3): 70-77 (2015) - [c31]Everton da S. Maldonado, Emad Shihab:
Detecting and quantifying different types of self-admitted technical Debt. MTD@ICSME 2015: 9-15 - [c30]Daniel E. Krutz, Samuel A. Malachowsky, Emad Shihab:
Examining the effectiveness of using concolic analysis to detect code clones. SAC 2015: 1610-1615 - [c29]Christoffer Rosen, Ben Grawi, Emad Shihab:
Commit guru: analytics and risk prediction of software commits. ESEC/SIGSOFT FSE 2015: 966-969 - [c28]Xin Xia
, David Lo
, Shane McIntosh, Emad Shihab, Ahmed E. Hassan:
Cross-project build co-change prediction. SANER 2015: 311-320 - 2014
- [c27]Xin Xia
, David Lo
, Ming Wen, Emad Shihab, Bo Zhou:
An empirical study of bug report field reassignment. CSMR-WCRE 2014: 174-183 - [c26]Aniket Potdar, Emad Shihab:
An Exploratory Study on Self-Admitted Technical Debt. ICSME 2014: 91-100 - [c25]Emad Shihab:
Practical Software Quality Prediction. ICSME 2014: 639-644 - [c24]Harold Valdivia Garcia, Emad Shihab:
Characterizing and predicting blocking bugs in open source projects. MSR 2014: 72-81 - [c23]Tse-Hsun Chen
, Meiyappan Nagappan, Emad Shihab, Ahmed E. Hassan:
An empirical study of dormant bugs. MSR 2014: 82-91 - [c22]Hammad Khalid, Meiyappan Nagappan, Emad Shihab, Ahmed E. Hassan:
Prioritizing the devices to test your app on: a case study of Android game apps. SIGSOFT FSE 2014: 610-620 - 2013
- [j8]Emad Shihab, Akinori Ihara, Yasutaka Kamei, Walid M. Ibrahim, Masao Ohira, Bram Adams, Ahmed E. Hassan, Ken-ichi Matsumoto:
Studying re-opened bugs in open source software. Empir. Softw. Eng. 18(5): 1005-1042 (2013) - [j7]Emad Shihab, Yasutaka Kamei, Bram Adams, Ahmed E. Hassan:
Is lines of code a good measure of effort in effort-aware models? Inf. Softw. Technol. 55(11): 1981-1993 (2013) - [j6]Grace A. Lewis, Nachiappan Nagappan, Jeff Gray, David S. Rosenblum, Henry Muccini, Emad Shihab:
Report of the 2013 ICSE 1st international workshop on engineering mobile-enabled systems (MOBS 2013): 12. ACM SIGSOFT Softw. Eng. Notes 38(5): 55-58 (2013) - [j5]Yasutaka Kamei, Emad Shihab, Bram Adams, Ahmed E. Hassan, Audris Mockus, Anand Sinha, Naoyasu Ubayashi:
A Large-Scale Empirical Study of Just-in-Time Quality Assurance. IEEE Trans. Software Eng. 39(6): 757-773 (2013) - [c21]Meiyappan Nagappan, Emad Shihab, Ahmed E. Hassan:
Challenges in mobile apps: a multi-disciplinary perspective. CASCON 2013: 378-381 - [c20]Grace A. Lewis
, Jeff Gray, Henry Muccini, Nachiappan Nagappan, David S. Rosenblum, Emad Shihab:
1st international workshop on the engineering of mobile-enabled systems (MOBS 2013). ICSE 2013: 1533-1534 - [c19]Daniel E. Krutz, Emad Shihab:
CCCD: Concolic code clone detection. WCRE 2013: 489-490 - 2012
- [b1]Emad Shihab:
An Exploration of Challenges Limiting Pragmatic Software Defect Prediction. Queen's University at Kingston, Ontario, Canada, 2012 - [c18]Emad Shihab, Christian Bird, Thomas Zimmermann:
The effect of branching strategies on software quality. ESEM 2012: 301-310 - [c17]Emad Shihab, Yasutaka Kamei, Pamela Bhattacharya:
Mining challenge 2012: The Android platform. MSR 2012: 112-115 - [c16]Emad Shihab, Ahmed E. Hassan, Bram Adams, Zhen Ming Jiang:
An industrial study on the risk of software changes. SIGSOFT FSE 2012: 62 - 2011
- [j4]Emad Shihab, Zhen Ming Jiang, Bram Adams, Ahmed E. Hassan, Robert Bowerman:
Prioritizing the creation of unit tests in legacy software systems. Softw. Pract. Exp. 41(10): 1027-1048 (2011) - [c15]Emad Shihab:
Pragmatic prioritization of software quality assurance efforts. ICSE 2011: 1106-1109 - [c14]Emad Shihab, Audris Mockus, Yasutaka Kamei, Bram Adams, Ahmed E. Hassan:
High-impact defects: a study of breakage and surprise defects. SIGSOFT FSE 2011: 300-310 - [c13]Israel Herraiz
, Emad Shihab, Thanh H. D. Nguyen, Ahmed E. Hassan:
Impact of Installation Counts on Perceived Quality: A Case Study on Debian. WCRE 2011: 219-228 - 2010
- [j3]Fengdan Wan, Lin Cai, Emad Shihab, T. Aaron Gulliver:
Admission region of triple-play services in wireless home networks. Comput. Commun. 33(7): 852-859 (2010) - [c12]Emad Shihab, Zhen Ming Jiang, Walid M. Ibrahim, Bram Adams, Ahmed E. Hassan:
Understanding the impact of code and process metrics on post-release defects: a case study on the Eclipse project. ESEM 2010 - [c11]Abram Hindle, Israel Herraiz
, Emad Shihab, Zhen Ming Jiang:
Mining Challenge 2010: FreeBSD, GNOME Desktop and Debian/Ubuntu. MSR 2010: 82-85 - [c10]Walid M. Ibrahim, Nicolas Bettenburg, Emad Shihab, Bram Adams, Ahmed E. Hassan:
Should I contribute to this discussion? MSR 2010: 181-190 - [c9]Emad Shihab, Zhen Ming Jiang, Bram Adams, Ahmed E. Hassan, Robert Bowerman:
Prioritizing Unit Test Creation for Test-Driven Maintenance of Legacy Systems. QSIC 2010: 132-141 - [c8]Zhen Ming Jiang, Alberto Avritzer, Emad Shihab, Ahmed E. Hassan, Parminder Flora:
An Industrial Case Study on Speeding Up User Acceptance Testing by Mining Execution Logs. SSIRI 2010: 131-140 - [c7]Emad Shihab, Akinori Ihara, Yasutaka Kamei, Walid M. Ibrahim, Masao Ohira, Bram Adams, Ahmed E. Hassan, Ken-ichi Matsumoto:
Predicting Re-opened Bugs: A Case Study on the Eclipse Project. WCRE 2010: 249-258
2000 – 2009
- 2009
- [j2]Emad Shihab, Lin Cai, Jianping Pan
:
A Distributed Asynchronous Directional-to-Directional MAC Protocol for Wireless Ad Hoc Networks. IEEE Trans. Veh. Technol. 58(9): 5124-5134 (2009) - [c6]Emad Shihab, Zhen Ming Jiang, Ahmed E. Hassan:
Studying the use of developer IRC meetings in open source projects. ICSM 2009: 147-156 - [c5]Nicolas Bettenburg, Emad Shihab, Ahmed E. Hassan:
An empirical study on the risks of using off-the-shelf techniques for processing mailing list data. ICSM 2009: 539-542 - [c4]Emad Shihab, Nicolas Bettenburg, Bram Adams, Ahmed E. Hassan:
On the Central Role of Mailing Lists in Open Source Projects: An Exploratory Study. JSAI-isAI Workshops 2009: 91-103 - [c3]Emad Shihab, Zhen Ming Jiang, Ahmed E. Hassan:
On the use of Internet Relay Chat (IRC) meetings by developers of the GNOME GTK+ project. MSR 2009: 107-110 - 2008
- [j1]Emad Shihab, Lin Cai, Fengdan Wan, T. Aaron Gulliver, Noel Tin:
Wireless Mesh Networks for In-Home IPTV Distribution. IEEE Netw. 22(1): 52-57 (2008) - [c2]Emad Shihab, Lin Cai, Jianping Pan
:
A Distributed Directional-to-Directional MAC Protocol for Asynchronous Ad Hoc Networks. GLOBECOM 2008: 4971-4975 - 2007
- [c1]Emad Shihab, Fengdan Wan, Lin Cai, T. Aaron Gulliver, Noel Tin:
Performance Analysis of IPTV Traffic in Home Networks. GLOBECOM 2007: 5341-5345
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-04-10 23:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint