


default search action
Richard Hill
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
 [j46]Mahdi Safaei Yaraziz [j46]Mahdi Safaei Yaraziz , Richard Hill , Richard Hill : :
 A Review of Resource Allocation for Maximizing Performance of IoT Systems. IEEE Access 13: 98426-98451 (2025)
 [j45]Mohammadreza Sheikh Fathollahi [j45]Mohammadreza Sheikh Fathollahi , Simon Parkinson , Simon Parkinson , Richard Hill , Richard Hill , Saad Khan , Saad Khan : :
 A survey of deep learning for face presentation attack detection. Neurocomputing 652: 131136 (2025)
 [c77]Michael Lachney [c77]Michael Lachney , Hyein Jee , Hyein Jee , Andrew Lapetina , Andrew Lapetina , Richard Hill , Richard Hill , Madison C. Allen Kuyenga , Madison C. Allen Kuyenga , Aman Yadav , Aman Yadav : :
 K12 Computer Science Teachers' Attitudes Toward a Foundational Assumption of Ethnocomputing. SIGCSE (1) 2025: 638-644
- 2024
 [j44]Rahima Khanam [j44]Rahima Khanam , Muhammad Hussain , Muhammad Hussain , Richard Hill , Richard Hill , Paul Allen , Paul Allen : :
 A Comprehensive Review of Convolutional Neural Networks for Defect Detection in Industrial Applications. IEEE Access 12: 94250-94295 (2024)
 [j43]Mohammad Hijjawi [j43]Mohammad Hijjawi , Faisal Jamil , Faisal Jamil , Harun Jamil , Harun Jamil , Tariq A. A. Alsboui , Tariq A. A. Alsboui , Richard Hill , Richard Hill , Ibrahim A. Hameed , Ibrahim A. Hameed : :
 Optimal smart contracts for controlling the environment in electric vehicles based on an Internet of Things network. Comput. Commun. 224: 192-212 (2024)
 [j42]Hussain Al-Aqrabi, Ahmed Manasrah, Richard Hill [j42]Hussain Al-Aqrabi, Ahmed Manasrah, Richard Hill , Mohammed Q. Shatnawi, Mohammad Sh. Daoud, Hoda Alkhzaimi: , Mohammed Q. Shatnawi, Mohammad Sh. Daoud, Hoda Alkhzaimi:
 Dynamic authentication for intelligent sensor clouds in the Internet of Things. Int. J. Inf. Sec. 23(3): 2003-2021 (2024)
 [j41]Muhammad Ayyaz Ahmad, George Baryannis [j41]Muhammad Ayyaz Ahmad, George Baryannis , Richard Hill , Richard Hill : :
 Defining Complex Adaptive Systems: An Algorithmic Approach. Syst. 12(2): 45 (2024)
 [c76]Andrew Lapetina [c76]Andrew Lapetina , Richard Hill , Richard Hill , Aman Yadav , Aman Yadav , Michael Lachney , Michael Lachney , Madison C. Allen Kuyenga , Madison C. Allen Kuyenga : :
 A Co-Instructional Model to Develop High School CS Teachers in Historically Underrepresented Communities: Building Capacity with a Purpose. RESPECT 2024: 259-264
 [c75]Mahdi Safaei Yaraziz, Richard Hill [c75]Mahdi Safaei Yaraziz, Richard Hill : :
 An Efficient Resource Allocation Model in IIoT Using Federated Reinforcement Learning. UCC 2024: 198-200
 [c74]Hussain Al-Aqrabi, Ahmed Manasrah, Richard Hill [c74]Hussain Al-Aqrabi, Ahmed Manasrah, Richard Hill , Lu Liu, Mohammad Sh. Daoud, Hani Al-Aqrabi: , Lu Liu, Mohammad Sh. Daoud, Hani Al-Aqrabi:
 A Robust Multiparty Authentication Testbed Architecture for the Industrial Internet of Things. UCC 2024: 523-528
 [c73]Titilayo Olabisi Soyoye, Tianhua Chen [c73]Titilayo Olabisi Soyoye, Tianhua Chen , Richard Hill , Richard Hill : :
 Predicting Academic Performance of University Students Using Adaptive Neuro Fuzzy Inference System (ANFIS)- Subtractive Clustering Algorithm (ANFIS-SC): A Case Study in the UK. UKCI 2024: 315-333
- 2023
 [j40]Muhammad Hussain [j40]Muhammad Hussain , Richard Hill , Richard Hill : :
 Custom Lightweight Convolutional Neural Network Architecture for Automated Detection of Damaged Pallet Racking in Warehousing & Distribution Centers. IEEE Access 11: 58879-58889 (2023)
 [j39]Shamaila Iram [j39]Shamaila Iram , Hussain Al-Aqrabi , Hussain Al-Aqrabi , Hafiz Muhammad Shakeel , Hafiz Muhammad Shakeel , Hafiz Muhammad Athar Farid , Hafiz Muhammad Athar Farid , Muhammad Riaz , Muhammad Riaz , Richard Hill , Richard Hill , Prabanchan Vethathir, Tariq A. A. Alsboui , Prabanchan Vethathir, Tariq A. A. Alsboui : :
 An Innovative Machine Learning Technique for the Prediction of Weather Based Smart Home Energy Consumption. IEEE Access 11: 76300-76320 (2023)
 [j38]Muhammad Hussain [j38]Muhammad Hussain , Hussain Al-Aqrabi , Hussain Al-Aqrabi , Muhammad Munawar, Richard Hill , Muhammad Munawar, Richard Hill , Simon Parkinson , Simon Parkinson : :
 Exudate Regeneration for Automated Exudate Detection in Retinal Fundus Images. IEEE Access 11: 83934-83945 (2023)
 [j37]Benjamin Agbo [j37]Benjamin Agbo , Hussain Al-Aqrabi , Hussain Al-Aqrabi , Tariq A. A. Alsboui , Tariq A. A. Alsboui , Muhammad Hussain , Muhammad Hussain , Richard Hill , Richard Hill : :
 Imputation of Missing Clinical Covariates for Downstream Classification Problems. IEEE Access 11: 102935-102943 (2023)
 [c72]Tariq A. A. Alsboui [c72]Tariq A. A. Alsboui , Muhammad Hussain , Muhammad Hussain , Hussain Al-Aqrabi , Hussain Al-Aqrabi , Richard Hill , Richard Hill , Mohammad Hijjawi , Mohammad Hijjawi : :
 A Scalable Decentralized and Lightweight Access Control Framework Using IOTA Tangle for the Internet of Things. IoTBDS 2023: 178-185
 [c71]Titilayo Olabisi Soyoye, Tianhua Chen [c71]Titilayo Olabisi Soyoye, Tianhua Chen , Richard Hill , Richard Hill , Keith McCabe: , Keith McCabe:
 Predicting Academic Performance of University Students Using Machine Learning: A Case Study in the UK. WI/IAT 2023: 431-434
- 2022
 [j36]Hafiz Muhammad Shakeel [j36]Hafiz Muhammad Shakeel , Shamaila Iram , Shamaila Iram , Hussain Al-Aqrabi , Hussain Al-Aqrabi , Tariq A. A. Alsboui , Tariq A. A. Alsboui , Richard Hill , Richard Hill : :
 A Comprehensive State-of-the-Art Survey on Data Visualization Tools: Research Developments, Challenges and Future Domain Specific Visualization Framework. IEEE Access 10: 96581-96601 (2022)
 [j35]Daniella Teixeira [j35]Daniella Teixeira , Simon Linke , Simon Linke , Richard Hill, Martine Maron , Richard Hill, Martine Maron , Berndt van Rensburg: , Berndt van Rensburg:
 Fledge or fail: Nest monitoring of endangered black-cockatoos using bioacoustics and open-source call recognition. Ecol. Informatics 69: 101656 (2022)
 [j34]Benjamin Agbo, Hussain Al-Aqrabi [j34]Benjamin Agbo, Hussain Al-Aqrabi , Richard Hill , Richard Hill , Tariq A. A. Alsboui , Tariq A. A. Alsboui : :
 Missing Data Imputation in the Internet of Things Sensor Networks. Future Internet 14(5): 143 (2022)
 [j33]Muhammad Hussain [j33]Muhammad Hussain , Hussain Al-Aqrabi , Hussain Al-Aqrabi , Muhammad Munawar , Muhammad Munawar , Richard Hill , Richard Hill , Tariq A. A. Alsboui , Tariq A. A. Alsboui : :
 Domain Feature Mapping with YOLOv7 for Automated Edge-Based Pallet Racking Inspections. Sensors 22(18): 6927 (2022)
 [j32]Tariq A. A. Alsboui [j32]Tariq A. A. Alsboui , Richard Hill , Richard Hill , Hussain Al-Aqrabi , Hussain Al-Aqrabi , Hafiz Muhammad Athar Farid , Hafiz Muhammad Athar Farid , Muhammad Riaz , Muhammad Riaz , Shamaila Iram , Shamaila Iram , Hafiz Muhammad Shakeel , Hafiz Muhammad Shakeel , Muhammad Hussain , Muhammad Hussain : :
 A Dynamic Multi-Mobile Agent Itinerary Planning Approach in Wireless Sensor Networks via Intuitionistic Fuzzy Set. Sensors 22(20): 8037 (2022)
 [c70]Tariq A. A. Alsboui [c70]Tariq A. A. Alsboui , Hussain Al-Aqrabi , Hussain Al-Aqrabi , Richard Hill , Richard Hill , Shamaila Iram , Shamaila Iram : :
 An Approach to Privacy-Preserving Distributed Intelligence for the Internet of Things. IoTBDS 2022: 174-182
 [c69]Saad Khan [c69]Saad Khan , Tariq A. A. Alsboui , Tariq A. A. Alsboui , Richard Hill , Richard Hill , Hussain Al-Aqrabi , Hussain Al-Aqrabi : :
 Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network. UbiSec 2022: 534-544
 [c68]Muhammad Hussain [c68]Muhammad Hussain , Tianhua Chen , Tianhua Chen , Sofya Titarenko, Richard Hill , Sofya Titarenko, Richard Hill , Hussain Al-Aqrabi , Hussain Al-Aqrabi : :
 Development of a Convolutional Neural Network Architecture for Production Based Photovoltaic Fault Detection. UKCI 2022: 415-426
- 2021
 [b2]Richard Hill [b2]Richard Hill , Stuart Berry: , Stuart Berry:
 Guide to Industrial Analytics - Solving Data Science Problems for Manufacturing and the Internet of Things. Texts in Computer Science, Springer 2021, ISBN 978-3-030-79103-2, pp. 3-228
 [j31]Tariq A. A. Alsboui [j31]Tariq A. A. Alsboui , Yongrui Qin, Richard Hill , Yongrui Qin, Richard Hill , Hussain Al-Aqrabi , Hussain Al-Aqrabi : :
 An energy efficient multi-mobile agent itinerary planning approach in wireless sensor networks. Computing 103(9): 2093-2113 (2021)
 [j30]Hengshan Zhang [j30]Hengshan Zhang , Yimin Zhou, Tianhua Chen , Yimin Zhou, Tianhua Chen , Richard Hill , Richard Hill , Zhongmin Wang, Yanping Chen: , Zhongmin Wang, Yanping Chen:
 Refinement of weights using attribute support for multiple attribute decision making. J. Comput. Sci. 54: 101440 (2021)
 [j29]Tariq A. A. Alsboui [j29]Tariq A. A. Alsboui , Yongrui Qin, Richard Hill , Yongrui Qin, Richard Hill , Hussain Al-Aqrabi , Hussain Al-Aqrabi : :
 Distributed Intelligence in the Internet of Things: Challenges and Opportunities. SN Comput. Sci. 2(4): 277 (2021)
 [c67]Hafsa Al Ansari, Rupert Ward, Richard Hill [c67]Hafsa Al Ansari, Rupert Ward, Richard Hill : :
 Developing a Learning Analytics Model to Explore Computer Science Student Motivation in the UK. ICALT 2021: 442-444
 [c66]Phil Lane, Richard Hill [c66]Phil Lane, Richard Hill , Stuart Berry: , Stuart Berry:
 Distributing On-Demand Analytics Processing on Heterogeneous Industrial Internet of Things Edge Hardware. iSCI 2021: 62-69
- 2020
 [j28]Tariq A. A. Alsboui [j28]Tariq A. A. Alsboui , Yongrui Qin, Richard Hill , Yongrui Qin, Richard Hill , Hussain Al-Aqrabi , Hussain Al-Aqrabi : :
 Enabling distributed intelligence for the Internet of Things with IOTA and mobile agents. Computing 102(6): 1345-1363 (2020)
 [j27]Reza Montasari, Richard Hill [j27]Reza Montasari, Richard Hill , Simon Parkinson , Simon Parkinson , Alireza Daneshkhah, Amin Hosseinian Far: , Alireza Daneshkhah, Amin Hosseinian Far:
 Hardware-based cyber threats: attack vectors and defence techniques. Int. J. Electron. Secur. Digit. Forensics 12(4): 397-411 (2020)
 [j26]Reza Montasari, Richard Hill [j26]Reza Montasari, Richard Hill , Farshad Montaseri, Hamid Jahankhani, Amin Hosseinian Far: , Farshad Montaseri, Hamid Jahankhani, Amin Hosseinian Far:
 Internet of things devices: digital forensic process and data reduction. Int. J. Electron. Secur. Digit. Forensics 12(4): 424-436 (2020)
 [j25]Reza Montasari, Richard Hill [j25]Reza Montasari, Richard Hill , Simon Parkinson , Simon Parkinson , Pekka Peltola , Pekka Peltola , Amin Hosseinian Far , Amin Hosseinian Far , Alireza Daneshkhah: , Alireza Daneshkhah:
 Digital Forensics: Challenges and Opportunities for Future Studies. Int. J. Organ. Collect. Intell. 10(2): 37-53 (2020)
 [j24]Anju P. Johnson [j24]Anju P. Johnson , Hussain Al-Aqrabi , Hussain Al-Aqrabi , Richard Hill , Richard Hill : :
 Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems. Sensors 20(3): 844 (2020)
 [j23]Hussain Al-Aqrabi [j23]Hussain Al-Aqrabi , Anju P. Johnson , Anju P. Johnson , Richard Hill , Richard Hill , Phil Lane, Tariq A. A. Alsboui , Phil Lane, Tariq A. A. Alsboui : :
 Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT. Sensors 20(7): 1963 (2020)
 [c65]Benjamin Agbo, Yongrui Qin, Richard Hill [c65]Benjamin Agbo, Yongrui Qin, Richard Hill : :
 Best Fit Missing Value Imputation (BFMVI) Algorithm for Incomplete Data in the Internet of Things. IoTBDS 2020: 130-137
 [c64]Tariq A. A. Alsboui [c64]Tariq A. A. Alsboui , Yongrui Qin, Richard Hill , Yongrui Qin, Richard Hill , Hussain Al-Aqrabi , Hussain Al-Aqrabi : :
 Towards a Scalable IOTA Tangle-Based Distributed Intelligence Approach for the Internet of Things. SAI (2) 2020: 487-501
 [p3]Richard Hill [p3]Richard Hill , Hussain Al-Aqrabi , Hussain Al-Aqrabi : :
 Edge Intelligence and the Industrial Internet of Things. Advances in Edge Computing 2020: 178-196
 [i13]Hussain Al-Aqrabi, Phil Lane, Richard Hill: [i13]Hussain Al-Aqrabi, Phil Lane, Richard Hill:
 Performance Evaluation of Multiparty Authentication in 5G IIoT Environments. CoRR abs/2001.06108 (2020)
 [i12]Hussain Al-Aqrabi, Lu Liu, Richard Hill, Nick Antonopoulos: [i12]Hussain Al-Aqrabi, Lu Liu, Richard Hill, Nick Antonopoulos:
 A Multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service. CoRR abs/2002.04047 (2020)
 [i11]Richard Hill: [i11]Richard Hill:
 Blended Learning Content Generation: A Guide for Busy Academics. CoRR abs/2006.03730 (2020)
2010 – 2019
- 2019
 [j22]Reza Montasari [j22]Reza Montasari , Victoria Carpenter , Victoria Carpenter , Richard Hill , Richard Hill : :
 A road map for digital forensics research: a novel approach for establishing the design science research process in digital forensics. Int. J. Electron. Secur. Digit. Forensics 11(2): 194-224 (2019)
 [j21]Reza Montasari [j21]Reza Montasari , Richard Hill, Amin Hosseinian Far , Richard Hill, Amin Hosseinian Far , Farshad Montaseri: , Farshad Montaseri:
 Countermeasures for timing-based side-channel attacks against shared, modern computing hardware. Int. J. Electron. Secur. Digit. Forensics 11(3): 294-320 (2019)
 [c63]Tianhua Chen [c63]Tianhua Chen , Pan Su, Changjing Shang, Richard Hill , Pan Su, Changjing Shang, Richard Hill , Hengshan Zhang, Qiang Shen , Hengshan Zhang, Qiang Shen : :
 Sentiment Classification of Drug Reviews Using Fuzzy-rough Feature Selection. FUZZ-IEEE 2019: 1-6
 [c62]Reza Montasari [c62]Reza Montasari , Richard Hill , Richard Hill : :
 Next-Generation Digital Forensics: Challenges and Future Paradigms. ICGS3 2019
 [c61]Hussain Al-Aqrabi [c61]Hussain Al-Aqrabi , Richard Hill , Richard Hill , Phil Lane, Hamza Aagela: , Phil Lane, Hamza Aagela:
 Securing Manufacturing Intelligence for the Industrial Internet of Things. ICICT (2) 2019: 267-282
 [c60]Benjamin Agbo, Yongrui Qin, Richard Hill [c60]Benjamin Agbo, Yongrui Qin, Richard Hill : :
 Research Directions on Big IoT Data Processing using Distributed Ledger Technology: A Position Paper. IoTBDS 2019: 385-391
 [c59]Tariq A. A. Alsboui [c59]Tariq A. A. Alsboui , Yongrui Qin, Richard Hill , Yongrui Qin, Richard Hill : :
 Enabling Distributed Intelligence in the Internet of Things using the IOTA Tangle Architecture. IoTBDS 2019: 392-398
 [c58]Pekka Peltola [c58]Pekka Peltola , Reza Montasari , Reza Montasari , Fernando Seco, Antonio Ramón Jiménez, Richard Hill , Fernando Seco, Antonio Ramón Jiménez, Richard Hill : :
 Multi-Platform Architecture for Cooperative Pedestrian Navigation Applications. IPIN 2019: 1-8
 [c57]Hussain Al-Aqrabi [c57]Hussain Al-Aqrabi , Anju P. Johnson , Anju P. Johnson , Richard Hill , Richard Hill , Phil Lane , Phil Lane , Lu Liu , Lu Liu : :
 A Multi-layer Security Model for 5G-Enabled Industrial Internet of Things. iSCI 2019: 279-292
 [c56]Daniel Clarke, Hussain Al-Aqrabi [c56]Daniel Clarke, Hussain Al-Aqrabi , Richard Hill , Richard Hill , Pritesh Mistry, Phil Lane , Pritesh Mistry, Phil Lane : :
 Implementing a Lightweight Cloud-Based Process Monitoring Solution for Smart Agriculture. iSCI 2019: 379-391
 [c55]Pritesh Mistry, Phil Lane, Paul Allen [c55]Pritesh Mistry, Phil Lane, Paul Allen , Hussain Al-Aqrabi , Hussain Al-Aqrabi , Richard Hill , Richard Hill : :
 Condition Monitoring of Motorised Devices for Smart Infrastructure Capabilities. iSCI 2019: 392-403
 [c54]Hussain Al-Aqrabi [c54]Hussain Al-Aqrabi , Anju P. Johnson , Anju P. Johnson , Richard Hill , Richard Hill : :
 Dynamic Multiparty Authentication using Cryptographic Hardware for the Internet of Things. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 21-28
 [i10]Hussain Al-Aqrabi, Richard Hill: [i10]Hussain Al-Aqrabi, Richard Hill:
 Dynamic Multiparty Authentication of Data Analytics Services within Cloud Environments. CoRR abs/1901.03051 (2019)
 [i9]Hussain Al-Aqrabi, Richard Hill: [i9]Hussain Al-Aqrabi, Richard Hill:
 A Secure Connectivity Model for Internet of Things Analytics Service Delivery. CoRR abs/1901.03052 (2019)
 [i8]Phil Lane, Richard Hill: [i8]Phil Lane, Richard Hill:
 Towards Optimised Data Transport and Analytics for Edge Computing. CoRR abs/1901.03054 (2019)
 [i7]Hussain Al-Aqrabi, Richard Hill: [i7]Hussain Al-Aqrabi, Richard Hill:
 A Scalable Model for Secure Multiparty Authentication. CoRR abs/1901.03056 (2019)
 [i6]Hussain Al-Aqrabi, Richard Hill, Phil Lane, Hamza Aagela: [i6]Hussain Al-Aqrabi, Richard Hill, Phil Lane, Hamza Aagela:
 Securing Manufacturing Intelligence for the Industrial Internet of Things. CoRR abs/1901.07284 (2019)
 [i5]Hussain Al-Aqrabi, Lu Liu, Richard Hill, Nick Antonopoulos: [i5]Hussain Al-Aqrabi, Lu Liu, Richard Hill, Nick Antonopoulos:
 Cloud BI: Future of Business Intelligence in the Cloud. CoRR abs/1901.08151 (2019)
- 2018
 [j20]Muhammad Usman Yaseen [j20]Muhammad Usman Yaseen , Ashiq Anjum , Ashiq Anjum , Omer F. Rana , Omer F. Rana , Richard Hill , Richard Hill : :
 Cloud-based scalable object detection and classification in video streams. Future Gener. Comput. Syst. 80: 286-298 (2018)
 [j19]Reza Montasari [j19]Reza Montasari , Amin Hosseinian Far , Amin Hosseinian Far , Richard Hill , Richard Hill , Farshad Montaseri, Mak Sharma, Shahid Shabbir: , Farshad Montaseri, Mak Sharma, Shahid Shabbir:
 Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware? Int. J. Organ. Collect. Intell. 8(2): 32-59 (2018)
 [c53]Marc Stringer, Colin Jones, Richard Hill, Mohit Dalvi, Colin Johnson, Jeremy Walton [c53]Marc Stringer, Colin Jones, Richard Hill, Mohit Dalvi, Colin Johnson, Jeremy Walton : :
 A Hybrid-Resolution Earth System Model. eScience 2018: 268-269
 [c52]Hussain Al-Aqrabi [c52]Hussain Al-Aqrabi , Richard Hill , Richard Hill : :
 Dynamic Multiparty Authentication of Data Analytics Services Within Cloud Environments. HPCC/SmartCity/DSS 2018: 742-749
 [c51]Hussain Al-Aqrabi [c51]Hussain Al-Aqrabi , Richard Hill , Richard Hill : :
 A Secure Connectivity Model for Internet of Things Analytics Service Delivery. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 9-16
 [c50]Hussain Al-Aqrabi [c50]Hussain Al-Aqrabi , Richard Hill , Richard Hill : :
 A Scalable Model for Secure Multiparty Authentication. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 17-22
 [e6]Simon Parkinson [e6]Simon Parkinson , Andrew Crampton , Andrew Crampton , Richard Hill , Richard Hill : :
 Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach. Computer Communications and Networks, Springer 2018, ISBN 978-3-319-92623-0 [contents]
- 2017
 [j18]Jia Liu, Longli Liu, Yong Xue [j18]Jia Liu, Longli Liu, Yong Xue , Jing Dong, Yincui Hu, Richard Hill , Jing Dong, Yincui Hu, Richard Hill , Jie Guang, Chi Li , Jie Guang, Chi Li : :
 Grid workflow validation using ontology-based tacit knowledge: A case study for quantitative remote sensing applications. Comput. Geosci. 98: 46-54 (2017)
 [c49]Dharmendra Shadija, Mo Rezai, Richard Hill [c49]Dharmendra Shadija, Mo Rezai, Richard Hill : :
 Towards an understanding of microservices. ICAC 2017: 1-6
 [c48]Richard Hill [c48]Richard Hill , Dharmendra Shadija, Mo Rezai: , Dharmendra Shadija, Mo Rezai:
 Enabling Community Health Care with Microservices. ISPA/IUCC 2017: 1444-1450
 [c47]Richard Hill [c47]Richard Hill , James Devitt , James Devitt , Ashiq Anjum , Ashiq Anjum , Muhammad K. Ali: , Muhammad K. Ali:
 Towards In-Transit Analytics for Industry 4.0. iThings/GreenCom/CPSCom/SmartData 2017: 810-817
 [c46]Yongrui Qin, Richard Hill [c46]Yongrui Qin, Richard Hill : :
 Message from the UCIoT 2017 Workshop Co-Chairs. UCC (Companion") 2017: 187-188
 [c45]Dharmendra Shadija, Mo Rezai, Richard Hill [c45]Dharmendra Shadija, Mo Rezai, Richard Hill : :
 Microservices: Granularity vs. Performance. UCC (Companion") 2017: 215-220
 [e5]Shao Ying Zhu, Sandra Scott-Hayward, Ludovic Jacquin, Richard Hill: [e5]Shao Ying Zhu, Sandra Scott-Hayward, Ludovic Jacquin, Richard Hill:
 Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications. Computer Communications and Networks, Springer 2017, ISBN 978-3-319-64652-7 [contents]
 [i4]Dharmendra Shadija, Mo Rezai, Richard Hill: [i4]Dharmendra Shadija, Mo Rezai, Richard Hill:
 Towards an Understanding of Microservices. CoRR abs/1709.06912 (2017)
 [i3]Richard Hill, Dharmendra Shadija, Mo Rezai: [i3]Richard Hill, Dharmendra Shadija, Mo Rezai:
 Enabling Community Health Care with Microservices. CoRR abs/1709.07037 (2017)
 [i2]Dharmendra Shadija, Mo Rezai, Richard Hill: [i2]Dharmendra Shadija, Mo Rezai, Richard Hill:
 Microservices: Granularity vs. Performance. CoRR abs/1709.09242 (2017)
 [i1]Richard Hill, James Devitt, Ashiq Anjum, Muhammad K. Ali: [i1]Richard Hill, James Devitt, Ashiq Anjum, Muhammad K. Ali:
 Towards In-Transit Analytics for Industry 4.0. CoRR abs/1710.04121 (2017)
- 2016
 [c44]Muhammad Usman Yaseen [c44]Muhammad Usman Yaseen , Muhammad Sarim Zafar, Ashiq Anjum , Muhammad Sarim Zafar, Ashiq Anjum , Richard Hill , Richard Hill : :
 High Performance Video Processing in Cloud Data Centres. SOSE 2016: 152-161
- 2015
 [j17]Ahsan Ikram, Ashiq Anjum [j17]Ahsan Ikram, Ashiq Anjum , Richard Hill , Richard Hill , Nick Antonopoulos, Lu Liu , Nick Antonopoulos, Lu Liu , Stelios Sotiriadis: , Stelios Sotiriadis:
 Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurr. Comput. Pract. Exp. 27(8): 1966-1984 (2015)
 [j16]Hussain Al-Aqrabi [j16]Hussain Al-Aqrabi , Lu Liu , Lu Liu , Richard Hill , Richard Hill , Nick Antonopoulos: , Nick Antonopoulos:
 Cloud BI: Future of business intelligence in the Cloud. J. Comput. Syst. Sci. 81(1): 85-96 (2015)
 [c43]Marcello Trovati [c43]Marcello Trovati , Richard Hill , Richard Hill , Nik Bessis , Nik Bessis : :
 A Non-genuine Message Detection Method Based on Unstructured Datasets. 3PGCIC 2015: 597-600
 [c42]Oladotun Omosebi, Stelios Sotiriadis, Eleana Asimakopoulou, Nik Bessis [c42]Oladotun Omosebi, Stelios Sotiriadis, Eleana Asimakopoulou, Nik Bessis , Marcello Trovati , Marcello Trovati , Richard Hill , Richard Hill : :
 Designing a Subscription Service for Earthquake Big Data Analysis from Multiple Sources. 3PGCIC 2015: 601-604
 [c41]Richard Hill: [c41]Richard Hill:
 Dealing with cyber security threats: International cooperation, ITU, and WCIT. CyCon 2015: 119-134
 [c40]José M. García-Campos [c40]José M. García-Campos , Daniel Gutiérrez-Reina, Sergio L. Toral Marín, Nik Bessis , Daniel Gutiérrez-Reina, Sergio L. Toral Marín, Nik Bessis , Federico Barrero , Federico Barrero , Eleana Asimakopoulou, Richard Hill , Eleana Asimakopoulou, Richard Hill : :
 Performance Evaluation of Reactive Routing Protocols for VANETs in Urban Scenarios Following Good Simulation Practices. IMIS 2015: 1-8
 [c39]Marcello Trovati [c39]Marcello Trovati , Aniello Castiglione , Aniello Castiglione , Nik Bessis , Nik Bessis , Richard Hill , Richard Hill : :
 A Kuramoto Model Based Approach to Extract and Assess Influence Relations. ISICA 2015: 464-473
 [c38]Richard Hill: [c38]Richard Hill:
 Challenging an E-voting System in Court - An Experience Report. VoteID 2015: 161-171
 [p2]Dominic Davies-Tagg, Ashiq Anjum [p2]Dominic Davies-Tagg, Ashiq Anjum , Richard Hill , Richard Hill : :
 A Platform for Analytics on Social Networks Derived from Organisational Calendar Data. Big-Data Analytics and Cloud Computing 2015: 147-165
 [e4]Marcello Trovati [e4]Marcello Trovati , Richard Hill , Richard Hill , Ashiq Anjum , Ashiq Anjum , Shao Ying Zhu, Lu Liu , Shao Ying Zhu, Lu Liu : :
 Big-Data Analytics and Cloud Computing - Theory, Algorithms and Applications. Springer 2015, ISBN 978-3-319-25311-4 [contents]
- 2014
 [c37]Anthony Smith, Stuart Berry, Richard Hill [c37]Anthony Smith, Stuart Berry, Richard Hill : :
 Matching Services with Users in Opportunistic Network Environments. CISIS 2014: 30-37
 [c36]Hussain Al-Aqrabi [c36]Hussain Al-Aqrabi , Lu Liu , Lu Liu , Richard Hill , Richard Hill , Nick Antonopoulos: , Nick Antonopoulos:
 A Multi-layer Hierarchical Inter-cloud Connectivity Model for Sequential Packet Inspection of Tenant Sessions Accessing BI as a Service. HPCC/CSS/ICESS 2014: 498-505
- 2013
 [b1]Richard Hill [b1]Richard Hill , Laurie Hirsch, Peter Lake, Siavash Moshiri: , Laurie Hirsch, Peter Lake, Siavash Moshiri:
 Guide to Cloud Computing - Principles and Practice. Computer Communications and Networks, Springer 2013, ISBN 978-1-4471-4602-5, pp. i-xxi, 1-278
 [j15]Stelios Sotiriadis, Nik Bessis [j15]Stelios Sotiriadis, Nik Bessis , Nick Antonopoulos, Richard Hill , Nick Antonopoulos, Richard Hill : :
 Meta-scheduling algorithms for managing inter-cloud interoperability. Int. J. High Perform. Comput. Netw. 7(3): 156-172 (2013)
 [j14]Richard Hill: [j14]Richard Hill:
 WCIT: failure or success, impasse or way forward? Int. J. Law Inf. Technol. 21(3): 313-328 (2013)
 [j13]Saad Liaquat Kiani, Ashiq Anjum, Nik Bessis [j13]Saad Liaquat Kiani, Ashiq Anjum, Nik Bessis , Richard Hill , Richard Hill , Michael Knappmeyer: , Michael Knappmeyer:
 Energy conservation in mobile devices and applications: A case for context parsing, processing and distribution in clouds. Mob. Inf. Syst. 9(1): 1-17 (2013)
 [c35]Don-Anthony Dasilva, Stelios Sotiriadis, Richard Hill [c35]Don-Anthony Dasilva, Stelios Sotiriadis, Richard Hill , Nick Antonopoulos, Nik Bessis , Nick Antonopoulos, Nik Bessis : :
 Evaluating the Use of Automation in the Virtual Datacentre for Improved Efficiency. 3PGCIC 2013: 457-460
 [c34]Hussain Al-Aqrabi [c34]Hussain Al-Aqrabi , Lu Liu , Lu Liu , Richard Hill , Richard Hill , Lei Cui, Jianxin Li: , Lei Cui, Jianxin Li:
 Faceted Search in Business Intelligence on the Cloud. GreenCom/iThings/CPScom 2013: 842-849
 [c33]Hussain Al-Aqrabi [c33]Hussain Al-Aqrabi , Lu Liu , Lu Liu , Richard Hill , Richard Hill , Zhijun Ding, Nick Antonopoulos: , Zhijun Ding, Nick Antonopoulos:
 Business Intelligence Security on the Clouds: Challenges, Solutions and Future Directions. SOSE 2013: 137-144
 [e3]Nik Bessis [e3]Nik Bessis , Fatos Xhafa, Dora Varvarigou, Richard Hill, Maozhen Li: , Fatos Xhafa, Dora Varvarigou, Richard Hill, Maozhen Li:
 Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence. Studies in Computational Intelligence 460, Springer 2013, ISBN 978-3-642-34951-5 [contents]
- 2012
 [j12]Quan Shi, Yanghua Xiao, Nik Bessis [j12]Quan Shi, Yanghua Xiao, Nik Bessis , Yiqi Lu, Yaoliang Chen, Richard Hill , Yiqi Lu, Yaoliang Chen, Richard Hill : :
 Optimizing K2 trees: A case for validating the maturity of network of practices. Comput. Math. Appl. 63(2): 427-436 (2012)
 [j11]Richard Hill [j11]Richard Hill , Nick Antonopoulos, Stuart Berry: , Nick Antonopoulos, Stuart Berry:
 Peer-to-peer networks and collective intelligence: the case for agency. Int. J. Grid Util. Comput. 3(4): 233-241 (2012)
 [j10]Ashiq Anjum [j10]Ashiq Anjum , Richard Hill , Richard Hill , Richard McClatchey , Richard McClatchey , Nik Bessis , Nik Bessis , Andrew Branson: , Andrew Branson:
 Glueing grids and clouds together: a service-oriented approach. Int. J. Web Grid Serv. 8(3): 248-265 (2012)
 [j9]Zhenxing Liu, Lu Liu [j9]Zhenxing Liu, Lu Liu , James Hardy , James Hardy , Ashiq Anjum , Ashiq Anjum , Richard Hill , Richard Hill , Nick Antonopoulos: , Nick Antonopoulos:
 Dot-base62x: building a compact and user-friendly text representation scheme of ipv6 addresses for cloud computing. J. Cloud Comput. 1: 3 (2012)
 [c32]Saad Liaquat Kiani, Ashiq Anjum [c32]Saad Liaquat Kiani, Ashiq Anjum , Nik Bessis , Nik Bessis , Richard Hill , Richard Hill : :
 Large-Scale Context Provisioning: A Use-Case for Homogenous Cloud Federation. CISIS 2012: 241-248
 [c31]Sarah Carter, Martin Smith, Suveena Bali, Stelios Sotiriadis, Nik Bessis [c31]Sarah Carter, Martin Smith, Suveena Bali, Stelios Sotiriadis, Nik Bessis , Richard Hill , Richard Hill : :
 The Use of Crowdsourcing to Aid Quest Design in Games. EIDWT 2012: 302-305
 [c30]Ezinwa Okoro, Stelios Sotiriadis, Nik Bessis [c30]Ezinwa Okoro, Stelios Sotiriadis, Nik Bessis , Richard Hill , Richard Hill : :
 Customized Profile Accessibility and Privacy for Users of Social Networks. EIDWT 2012: 306-310
 [c29]Thomas Stimpson, Lu Liu [c29]Thomas Stimpson, Lu Liu , Jianjun Zhang, Richard Hill , Jianjun Zhang, Richard Hill , Weining Liu, Yongzhao Zhan: , Weining Liu, Yongzhao Zhan:
 Assessment of security and vulnerability of home wireless networks. FSKD 2012: 2133-2137
 [c28]Hussain Al-Aqrabi [c28]Hussain Al-Aqrabi , Lu Liu , Lu Liu , Richard Hill , Richard Hill , Nick Antonopoulos: , Nick Antonopoulos:
 Taking the Business Intelligence to the Clouds. HPCC-ICESS 2012: 953-958
 [c27]John Panneerselvam [c27]John Panneerselvam , Lu Liu , Lu Liu , Richard Hill , Richard Hill , Yongzhao Zhan, Weining Liu: , Yongzhao Zhan, Weining Liu:
 An Investigation of the Effect of Cloud Computing on Network Management. HPCC-ICESS 2012: 1794-1799
 [c26]Charlie Baker, Ashiq Anjum [c26]Charlie Baker, Ashiq Anjum , Richard Hill , Richard Hill , Nik Bessis , Nik Bessis , Saad Liaquat Kiani: , Saad Liaquat Kiani:
 Improving Cloud Datacentre Scalability, Agility and Performance Using OpenFlow. INCoS 2012: 20-27
 [c25]Hussain Al-Aqrabi [c25]Hussain Al-Aqrabi , Lu Liu , Lu Liu , Jie Xu, Richard Hill , Jie Xu, Richard Hill , Nick Antonopoulos, Yongzhao Zhan: , Nick Antonopoulos, Yongzhao Zhan:
 Investigation of IT Security and Compliance Challenges in Security-as-a-Service for Cloud Computing. ISORC Workshops 2012: 124-129
- 2011
 [j8]Anthony Smith, Richard Hill [j8]Anthony Smith, Richard Hill : :
 Measuring Efficiency in Opportunistic Ad Hoc Networks. J. Interconnect. Networks 12(3): 189-203 (2011)
 [c24]Anthony Smith, Richard Hill [c24]Anthony Smith, Richard Hill : :
 Towards a Framework for the Evaluation of Efficient Provisioning in Opportunistic Ad Hoc Networks. 3PGCIC 2011: 32-36
 [c23]Ashiq Anjum, Nik Bessis [c23]Ashiq Anjum, Nik Bessis , Richard Hill , Richard Hill , Richard McClatchey , Richard McClatchey , Irfan Habib, Kamran Soomro, Peter Bloodsworth, Andrew Branson: , Irfan Habib, Kamran Soomro, Peter Bloodsworth, Andrew Branson:
 Provenance Management for Neuroimaging Workflows in neuGrid. 3PGCIC 2011: 67-74
 [c22]Richard Hill [c22]Richard Hill , Nick Antonopoulos, Nik Bessis , Nick Antonopoulos, Nik Bessis : :
 Towards an Understanding of Peer Rationality and Collective Intelligence. CISIS 2011: 385-390
 [c21]Quan Shi, Yanghua Xiao, Nik Bessis [c21]Quan Shi, Yanghua Xiao, Nik Bessis , Yiqi Lu, Yaoliang Chen, Richard Hill , Yiqi Lu, Yaoliang Chen, Richard Hill : :
 Towards a Maturity Model for Networks of Practice: A Case of K2 Tree Optimization. EIDWT 2011: 1-5
 [c20]Ashiq Anjum [c20]Ashiq Anjum , Richard Hill , Richard Hill , Richard McClatchey , Richard McClatchey : :
 Gluing Grids and Clouds Together: A Service-Oriented Approach. EIDWT 2011: 55-62
 [c19]Zhenxing Liu, Lu Liu [c19]Zhenxing Liu, Lu Liu , Richard Hill , Richard Hill , Yongzhao Zhan: , Yongzhao Zhan:
 Base62x: An alternative approach to Base64 for non-alphanumeric characters. FSKD 2011: 2667-2670
 [c18]Richard Hill [c18]Richard Hill , Dharmendra Shadija: , Dharmendra Shadija:
 Internationalising the Computing Curricula: A Peircian Approach. ICCS 2011: 406-413
 [c17]Saad Liaquat Kiani, Ashiq Anjum [c17]Saad Liaquat Kiani, Ashiq Anjum , Nik Bessis , Nik Bessis , Richard Hill , Richard Hill , Michael Knappmeyer: , Michael Knappmeyer:
 Context Parsing, Processing and Distribution in Clouds. INCoS 2011: 141-148
 [c16]Zhenxing Liu, Lu Liu [c16]Zhenxing Liu, Lu Liu , James Hardy , James Hardy , Ashiq Anjum, Richard Hill , Ashiq Anjum, Richard Hill , Nick Antonopoulos: , Nick Antonopoulos:
 Dot-base62x: A Compact Textual Representation of IPv6 Address for Clouds. UCC 2011: 427-432
 [e2]Simon Andrews, Simon Polovina, Richard Hill [e2]Simon Andrews, Simon Polovina, Richard Hill , Babak Akhgar: , Babak Akhgar:
 Conceptual Structures for Discovering Knowledge - 19th International Conference on Conceptual Structures, ICCS 2011, Derby, UK, July 25-29, 2011. Proceedings. Lecture Notes in Computer Science 6828, Springer 2011, ISBN 978-3-642-22687-8 [contents]
- 2010
 [c15]Martin Watmough, Simon Polovina [c15]Martin Watmough, Simon Polovina , Babak Khazaeri, Richard Hill , Babak Khazaeri, Richard Hill : :
 Future Supply Chain Processes and Data for Collective Intelligence. 3PGCIC 2010: 179-185
 [c14]Richard Hill [c14]Richard Hill , Nikos Antonopoulos: , Nikos Antonopoulos:
 Peer-to-Peer Networks and Collective Intelligence: The Case for Agency. 3PGCIC 2010: 357-362
 [c13]Richard Hill [c13]Richard Hill : :
 Conceptual Structures for Reasoning Enterprise Agents. ICCS 2010: 191-194
 [c12]Ivan Launders, Simon Polovina, Richard Hill: [c12]Ivan Launders, Simon Polovina, Richard Hill:
 Semantics and Pragmatics in Enterprise Architecture Through Transaction Agent Modelling. ICISO 2010: 285-291
 [c11]Richard Hill [c11]Richard Hill : :
 Agency and the Virtual Campus: The TrAM Approach. INCoS 2010: 8-15
 [c10]Richard Hill [c10]Richard Hill : :
 Computational Intelligence and Emerging Data Technologies. INCoS 2010: 449-454
2000 – 2009
- 2009
 [j7]Simon Polovina [j7]Simon Polovina , Richard Hill , Richard Hill : :
 A Transactions Pattern for Structuring Unstructured Corporate Information in Enterprise Applications. Int. J. Intell. Inf. Technol. 5(2): 33-47 (2009)
- 2008
 [c9]Richard Hill, Simon Polovina: [c9]Richard Hill, Simon Polovina:
 An Automated Conceptual Catalogue for the Enterprise. ICCS Supplement 2008: 99-106
- 2007
 [p1]Richard Hill [p1]Richard Hill : :
 Capturing and Specifying Multiagent Systems for the Management of Community Healthcare. Advanced Computational Intelligence Paradigms in Healthcare (1) 2007: 127-163
 [e1]Uta Priss [e1]Uta Priss , Simon Polovina, Richard Hill , Simon Polovina, Richard Hill : :
 Conceptual Structures: Knowledge Architectures for Smart Applications, 15th International Conference on Conceptual Structures, ICCS 2007, Sheffield, UK, July 22-27, 2007, Proceedings. Lecture Notes in Computer Science 4604, Springer 2007, ISBN 978-3-540-73680-6 [contents]
- 2006
 [j6]Martin D. Beer, Richard Hill: [j6]Martin D. Beer, Richard Hill:
 Building a Community Care Demonstrator with JADE Semantic Agents. Int. Trans. Syst. Sci. Appl. 1(1): 1-14 (2006)
 [j5]Gang Lu, Yong Yan [j5]Gang Lu, Yong Yan , Mike Colechin, Richard Hill: , Mike Colechin, Richard Hill:
 Monitoring of oscillatory characteristics of pulverized coal flames through image processing and spectral analysis. IEEE Trans. Instrum. Meas. 55(1): 226-231 (2006)
 [c8]Richard Hill [c8]Richard Hill , Simon Polovina , Simon Polovina , Dharmendra Shadija: , Dharmendra Shadija:
 Transaction Agent Modelling: From Experts to Concepts to Multi-Agent Systems. ICCS 2006: 247-259
 [c7]Martin D. Beer, Richard Hill [c7]Martin D. Beer, Richard Hill : :
 Using Multi-agent Systems to Manage Community Care. KES (2) 2006: 1240-1247
 [c6]Tiana Razafimbelo, Simon Polovina, Richard Hill: [c6]Tiana Razafimbelo, Simon Polovina, Richard Hill:
 Can the Pragmatic Web Assist Search Engine Optimisation? PragWeb 2006: 81-96
- 2005
 [c5]Richard Hill [c5]Richard Hill , Simon Polovina , Simon Polovina , Martin D. Beer: , Martin D. Beer:
 Improving AOSE with an Enriched Modelling Framework. AOSE 2005: 94-108
 [c4]Steven Willmott, Martin D. Beer, Richard Hill, Dominic A. P. Greenwood, Monique Calisti, Ian D. Mathieson, Lin Padgham, Christine Reese, Kolja Lehmann, Thorsten Scholz, M. Omair Shafiq: [c4]Steven Willmott, Martin D. Beer, Richard Hill, Dominic A. P. Greenwood, Monique Calisti, Ian D. Mathieson, Lin Padgham, Christine Reese, Kolja Lehmann, Thorsten Scholz, M. Omair Shafiq:
 NETDEMO: openNet networked agents demonstration. AAMAS 2005: 129-130
 [c3]Richard Hill [c3]Richard Hill , Simon Polovina, Martin D. Beer: , Simon Polovina, Martin D. Beer:
 From concepts to agents: towards a framework for multi-agent system modelling. AAMAS 2005: 1155-1156
 [c2]Simon Polovina [c2]Simon Polovina , Richard Hill , Richard Hill : :
 Enhancing the Initial Requirements Capture of Multi-Agent Systems Through Conceptual Graphs. ICCS 2005: 439-452
- 2003
 [j4]Martin D. Beer, Richard Hill, Wei Huang, Andrew Sixsmith: [j4]Martin D. Beer, Richard Hill, Wei Huang, Andrew Sixsmith:
 An agent-based architecture for managing the provision of community care - the INCA (Intelligent Community Alarm) experience. AI Commun. 16(3): 179-192 (2003)
 [c1]Martin D. Beer, Richard Hill, Andrew Sixsmith: [c1]Martin D. Beer, Richard Hill, Andrew Sixsmith:
 Deploying an agent-based architecture for the management of community care. AAMAS 2003: 932-933
- 2002
 [j3]Richard Hill: [j3]Richard Hill:
 To the Editor: Letters. D Lib Mag. 8(1) (2002)
1990 – 1999
- 1997
 [j2]Richard Hill: [j2]Richard Hill:
 Electronic Commerce, World Wide Web, Minitel and EDI. Inf. Soc. 13(1): 33-41 (1997)
1970 – 1979
- 1978
 [j1]Gordon Bell, Alan Kotok, Thomas N. Hastings, Richard Hill: [j1]Gordon Bell, Alan Kotok, Thomas N. Hastings, Richard Hill:
 The Evolution of the DECsystem 10. Commun. ACM 21(1): 44-63 (1978)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from  to the list of external document links (if available).
 to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the  of the Internet Archive (if available).
 of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from  ,
,  , and
, and  to record detail pages.
 to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from  and
 and  to record detail pages.
 to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from  .
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-28 23:16 CET by the dblp team
 all metadata released as open data under CC0 1.0 license
 all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID







