default search action
Mark G. Karpovsky
Person information
- affiliation: Boston University, MA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2019
- [j52]Lake Bu, Mark G. Karpovsky, Michel A. Kinsy:
Bulwark: Securing implantable medical devices communication channels. Comput. Secur. 86: 498-511 (2019) - [j51]Lake Bu, Mark G. Karpovsky, Michel A. Kinsy:
Design of reliable storage and compute systems with lightweight group testing based non-binary error correction codes. IET Comput. Digit. Tech. 13(3): 140-153 (2019) - 2016
- [j50]Zhen Wang, Mark G. Karpovsky, Lake Bu:
Design of Reliable and Secure Devices Realizing Shamir's Secret Sharing. IEEE Trans. Computers 65(8): 2443-2455 (2016) - 2015
- [j49]Osnat Keren, Mark G. Karpovsky:
Relations Between the Entropy of a Source and the Error Masking Probability for Security-Oriented Codes. IEEE Trans. Commun. 63(1): 206-214 (2015) - 2014
- [j48]Mark G. Karpovsky, Zhen Wang:
Design of Strongly Secure Communication and Computation Channels by Nonlinear Error Detecting Codes. IEEE Trans. Computers 63(11): 2716-2728 (2014) - [j47]Mark G. Karpovsky, Lev B. Levitin, Mehmet Mustafa:
Optimal Turn Prohibition for Deadlock Prevention in Networks With Regular Topologies. IEEE Trans. Control. Netw. Syst. 1(1): 74-85 (2014) - 2012
- [j46]Zhen Wang, Mark G. Karpovsky, Ajay Joshi:
Secure Multipliers Resilient to Strong Fault-Injection Attacks Using Multilinear Arithmetic Codes. IEEE Trans. Very Large Scale Integr. Syst. 20(6): 1036-1048 (2012) - [j45]Zhen Wang, Mark G. Karpovsky, Ajay Joshi:
Nonlinear Multi-Error Correction Codes for Reliable MLC nand Flash Memories. IEEE Trans. Very Large Scale Integr. Syst. 20(7): 1221-1234 (2012) - 2011
- [j44]Konrad J. Kulikowski, Mark G. Karpovsky:
Robust correction of repeating errors by non-linear codes. IET Commun. 5(16): 2317-2327 (2011) - 2010
- [j43]Zhen Wang, Mark G. Karpovsky, Konrad J. Kulikowski:
Design of Memories with Concurrent Error Detection and Correction by Nonlinear SEC-DED Codes. J. Electron. Test. 26(5): 559-580 (2010) - [j42]Lev B. Levitin, Mark G. Karpovsky, Mehmet Mustafa:
Minimal Sets of Turns for Breaking Cycles in Graphs Modeling Networks. IEEE Trans. Parallel Distributed Syst. 21(9): 1342-1353 (2010) - 2007
- [j41]Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin:
Robust codes and robust, fault-tolerant architectures of the Advanced Encryption Standard. J. Syst. Archit. 53(2-3): 139-149 (2007) - 2006
- [j40]Lev B. Levitin, Mark G. Karpovsky, Mehmet Mustafa, Lev Zakrevski:
A New Algorithm for Finding Minimal Cycle-Breaking Sets of Turns in a Graph. J. Graph Algorithms Appl. 10(2): 387-420 (2006) - [j39]Iiro S. Honkala, Mark G. Karpovsky, Lev B. Levitin:
On robust and dynamic identifying codes. IEEE Trans. Inf. Theory 52(2): 599-612 (2006) - 2004
- [j38]Mark G. Karpovsky, Radomir S. Stankovic, Claudio Moraga:
Spectral Techniques in Binary and Multiple-Valued Switching Theory: A Review of Results in the Decade 1991-2000. J. Multiple Valued Log. Soft Comput. 10(3): 261-286 (2004) - [j37]Mark G. Karpovsky, Alexander Taubin:
New Class of Nonlinear Systematic Error Detecting Codes. IEEE Trans. Inf. Theory 50(8): 1818-1820 (2004) - 2003
- [j36]Iiro S. Honkala, Mark G. Karpovsky, Simon Litsyn:
Cycles identifying vertices and edges in binary hypercubes and 2-dimensional tori. Discret. Appl. Math. 129(2-3): 409-419 (2003) - [j35]Mark G. Karpovsky, Radomir S. Stankovic, Jaakko Astola:
Reduction of Sizes of Decision Diagrams by Autocorrelation Functions. IEEE Trans. Computers 52(5): 592-606 (2003) - [j34]Mark G. Karpovsky, Lev B. Levitin, Ari Trachtenberg:
Data verification and reconciliation with generalized error-control cod. IEEE Trans. Inf. Theory 49(7): 1788-1793 (2003) - [j33]David Starobinski, Mark G. Karpovsky, Lev Zakrevski:
Application of network calculus to general topologies using turn-prohibition. IEEE/ACM Trans. Netw. 11(3): 411-421 (2003) - 1999
- [j32]Mark G. Karpovsky, Krishnendu Chakrabarty, Lev B. Levitin, Dimiter R. Avresky:
On the Covering of Vertices for Fault Diagnosis in Hypercubes. Inf. Process. Lett. 69(2): 99-103 (1999) - 1998
- [j31]Mark G. Karpovsky, Krishnendu Chakrabarty, Lev B. Levitin:
On a New Class of Codes for Identifying Vertices in Graphs. IEEE Trans. Inf. Theory 44(2): 599-611 (1998) - [j30]Mark G. Karpovsky:
Integrated On-Line and Off-Line Error Detection Mechanisms in the Coding Theory Framework. VLSI Design 5(4): 313-331 (1998) - 1997
- [j29]Debaleena Das, Mark G. Karpovsky:
Exhaustive and Near-Exhaustive Memory Testing Techniques and their BIST Implementations. J. Electron. Test. 10(3): 215-229 (1997) - 1996
- [j28]Mark G. Karpovsky, Vyacheslav N. Yarmolik:
Transparent random access memory testing for pattern sensitive faults. J. Electron. Test. 9(3): 251-266 (1996) - 1995
- [j27]Mark G. Karpovsky, Tatyana D. Roziner, Claudio Moraga:
Fault Detection in Multiprocessor Systems and Array Processors. IEEE Trans. Computers 44(3): 383-393 (1995) - 1994
- [j26]Mark G. Karpovsky, Lev B. Levitin, Feodor S. Vainstein:
Diagnosis by Signature Analysis of Test Responses. IEEE Trans. Computers 43(2): 141-152 (1994) - 1993
- [j25]Mark G. Karpovsky, Saeed M. Chaudhry:
Design of Self-Diagnostic Boards by Multiple Signature Analysis. IEEE Trans. Computers 42(9): 1035-1044 (1993) - 1992
- [j24]Tatyana D. Roziner, Mark G. Karpovsky:
Multidimensional fourier transforms by systolic architectures. J. VLSI Signal Process. 4(4): 343-354 (1992) - 1991
- [j23]Prawat Nagvajara, Mark G. Karpovsky, Lev B. Levitin:
Pseudorandom Testing for Boundary-Scan Design with Built-In Self-Test. IEEE Des. Test Comput. 8(3): 58-65 (1991) - 1990
- [j22]Mark G. Karpovsky, Prawat Nagvajara:
Optimal Robust Compression of Test Responses. IEEE Trans. Computers 39(1): 138-141 (1990) - [j21]Dhiraj K. Pradhan, Sandeep K. Gupta, Mark G. Karpovsky:
Aliasing Probability for Multiple Input Signature Analyzer. IEEE Trans. Computers 39(4): 586-591 (1990) - [j20]Tatyana D. Roziner, Mark G. Karpovsky, Lazar A. Trachtenberg:
Fast Fourier transforms over finite groups by multiprocessor systems. IEEE Trans. Acoust. Speech Signal Process. 38(2): 226-240 (1990) - 1989
- [j19]T. Raju Damarla, Mark G. Karpovsky:
Fault Detection in Combinational Networks by Reed-Muller Transforms. IEEE Trans. Computers 38(6): 788-797 (1989) - [j18]Mark G. Karpovsky, Prawat Nagvajara:
Optimal codes for minimax criterion on error detection. IEEE Trans. Inf. Theory 35(6): 1299-1305 (1989) - 1988
- [j17]Sudhakar M. Reddy, Kewal K. Saluja, Mark G. Karpovsky:
A Data Compression Technique for Built-In Self-Test. IEEE Trans. Computers 37(9): 1151-1156 (1988) - 1987
- [j16]Mark G. Karpovsky:
Multilevel Logical Networks. IEEE Trans. Computers 36(2): 215-226 (1987) - 1986
- [j15]Mark G. Karpovsky, Lazar A. Trachtenberg:
Statistical and computational performance of a class of generalized Wiener filters. IEEE Trans. Inf. Theory 32(2): 303-307 (1986) - 1985
- [j14]Gérard D. Cohen, Mark G. Karpovsky, H. F. Mattson Jr., James R. Schatz:
Covering radius - Survey and recent results. IEEE Trans. Inf. Theory 31(3): 328-343 (1985) - 1983
- [j13]Mark G. Karpovsky, Lev B. Levitin:
Detection and identification of input/output stuck-at and bridging faults in combinational and sequential VLSI networks by universal tests. Integr. 1(2-3): 211-232 (1983) - [j12]Mark G. Karpovsky:
Universal Tests for Detection of Input/Output Stuck-At and Bridging Faults. IEEE Trans. Computers 32(12): 1194-1198 (1983) - 1981
- [j11]Mark G. Karpovsky:
An Approach for Error Detection and Error Correction in Distributed Systems Computing Numerical Functions. IEEE Trans. Computers 30(12): 947-953 (1981) - [j10]Mark G. Karpovsky:
Weight distribution of translates, covering radius, and perfect codes correcting errors of given weights. IEEE Trans. Inf. Theory 27(4): 462-471 (1981) - 1980
- [j9]Mark G. Karpovsky, Stephen Y. H. Su:
Detection and Location of Input and Feedback Bridging Faults Among Input and Output Lines. IEEE Trans. Computers 29(6): 523-527 (1980) - 1979
- [j8]Mark G. Karpovsky, Eliezer A. Trachtenberg:
Fourier Transform over Finite Groups for Error Detection and Error Correction in Computation Channels. Inf. Control. 40(3): 335-358 (1979) - [j7]Mark G. Karpovsky:
On the weight distribution of binary linear codes (Corresp.). IEEE Trans. Inf. Theory 25(1): 105-109 (1979) - 1978
- [j6]Mark G. Karpovsky, V. D. Milman:
On subspaces contained in subsets of finite homogeneous spaces. Discret. Math. 22(3): 273-280 (1978) - [j5]Mark G. Karpovsky, V. D. Milman:
Coordinate density of sets of vectors. Discret. Math. 24(2): 177-184 (1978) - 1977
- [j4]Mark G. Karpovsky:
Harmonic Analysis over Finite Commutative Groups in Linearization Problems For Systems of Logical Functions. Inf. Control. 33(2): 142-165 (1977) - [j3]Mark G. Karpovsky, Eliezer A. Trachtenberg:
Some Optimization Problems for Convolution Systems over Finite Groups. Inf. Control. 34(3): 227-247 (1977) - [j2]Mark G. Karpovsky:
Error Detection in Digital Devices and Computer Programs with the Aid of Linear Recurrent Equations Over Finite Commutativs Groups. IEEE Trans. Computers 26(3): 208-218 (1977) - [j1]Mark G. Karpovsky:
Fast Fourier Transforms on Finite Non-Abelian Groups. IEEE Trans. Computers 26(10): 1028-1030 (1977)
Conference and Workshop Papers
- 2017
- [c56]Lake Bu, Mark G. Karpovsky:
A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices. ICISSP 2017: 233-242 - 2016
- [c55]Lake Bu, Mark G. Karpovsky:
A hybrid self-diagnosis mechanism with defective nodes locating and attack detection for parallel computing systems. IOLTS 2016: 245-250 - 2015
- [c54]Lake Bu, Mark G. Karpovsky, Zhen Wang:
New byte error correcting codes with simple decoding for reliable cache design. IOLTS 2015: 200-205 - 2014
- [c53]Pei Luo, Andy Yu-Lun Lin, Zhen Wang, Mark G. Karpovsky:
Hardware Implementation of Secure Shamir's Secret Sharing Scheme. HASE 2014: 193-200 - 2013
- [c52]Shizun Ge, Zhen Wang, Pei Luo, Mark G. Karpovsky:
Secure memories resistant to both random errors and fault injection attacks using nonlinear error correction codes. HASP@ISCA 2013: 5 - 2012
- [c51]Zhen Wang, Mark G. Karpovsky:
Reliable and secure memories based on algebraic manipulation correction codes. IOLTS 2012: 146-149 - 2011
- [c50]Zhen Wang, Mark G. Karpovsky, Ajay Joshi:
Influence of metallic tubes on the reliability of CNTFET SRAMs: error mechanisms and countermeasures. ACM Great Lakes Symposium on VLSI 2011: 359-362 - [c49]Zhen Wang, Mark G. Karpovsky:
Algebraic manipulation detection codes and their applications for design of secure cryptographic devices. IOLTS 2011: 234-239 - 2010
- [c48]Osnat Keren, Ilya Levin, Mark G. Karpovsky:
Duplication Based One-to-Many Coding for Trojan HW Detection. DFT 2010: 160-166 - [c47]Zhen Wang, Mark G. Karpovsky, Ajay Joshi:
Reliable MLC NAND flash memories based on nonlinear t-error-correcting codes. DSN 2010: 41-50 - [c46]Zhen Wang, Mark G. Karpovsky:
Robust FSMs for cryptographic devices resilient to strong fault injection attacks. IOLTS 2010: 240-245 - 2009
- [c45]Zhen Wang, Mark G. Karpovsky, Konrad J. Kulikowski:
Replacing linear Hamming codes by robust nonlinear codes results in a reliability improvement of memories. DSN 2009: 514-523 - [c44]Zhen Wang, Mark G. Karpovsky, Berk Sunar, Ajay Joshi:
Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes. ICICS 2009: 47-62 - [c43]Zhen Wang, Mark G. Karpovsky, Berk Sunar:
Multilinear codes for robust error detection. IOLTS 2009: 164-169 - [c42]Samary Baranov, Ilya Levin, Osnat Keren, Mark G. Karpovsky:
Designing fault tolerant FSM by nano-PLA. IOLTS 2009: 229-234 - [c41]Lev B. Levitin, Mark G. Karpovsky, Mehmet Mustafa:
Deadlock prevention by turn prohibition in interconnection networks. IPDPS 2009: 1-7 - 2008
- [c40]Konrad J. Kulikowski, Zhen Wang, Mark G. Karpovsky:
Comparative Analysis of Robust Fault Attack Resistant Architectures for Public and Private Cryptosystems. FDTC 2008: 41-50 - [c39]Konrad J. Kulikowski, Vyas Venkataraman, Zhen Wang, Alexander Taubin, Mark G. Karpovsky:
Asynchronous balanced gates tolerant to interconnect variability. ISCAS 2008: 3190-3193 - 2006
- [c38]Gunnar Gaubatz, Berk Sunar, Mark G. Karpovsky:
Non-linear Residue Codes for Robust Public-Key Arithmetic. FDTC 2006: 173-184 - [c37]Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin:
Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection. FDTC 2006: 185-195 - [c36]Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin:
DPA on Faulty Cryptographic Hardware and Countermeasures. FDTC 2006: 211-222 - [c35]Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin:
Power Attacks on Secure Hardware Based on Early Propagation of Data. IOLTS 2006: 131-138 - 2005
- [c34]Alexander B. Smirnov, Alexander Taubin, Ming Su, Mark G. Karpovsky:
An Automated Fine-Grain Pipelining Using Domino Style Asynchronous Library. ACSD 2005: 68-76 - [c33]Konrad J. Kulikowski, Ming Su, Alexander B. Smirnov, Alexander Taubin, Mark G. Karpovsky, Daniel MacDonald:
Delay Insensitive Encoding and Power Analysis: A Balancing Act. ASYNC 2005: 116-125 - [c32]Radomir S. Stankovic, Mark G. Karpovsky:
Remarks on Calculation of Autocorrelation on Finite Dyadic Groups by Local Transformations of Decision Diagrams. EUROCAST 2005: 301-310 - 2004
- [c31]Mark G. Karpovsky, Konrad J. Kulikowski, Alexander Taubin:
Differential Fault Analysis Attack Resistant Architectures for the Advanced Encryption Standard. CARDIS 2004: 177-192 - [c30]Mark G. Karpovsky, Konrad J. Kulikowski, Alexander Taubin:
Robust Protection against Fault-Injection Attacks on Smart Cards Implementing the Advanced Encryption Standard. DSN 2004: 93-101 - [c29]Francesco De Pellegrini, David Starobinski, Mark G. Karpovsky, Lev B. Levitin:
Scalable Cycle-Breaking Algorithms for Gigabit Ethernet Backbones. INFOCOM 2004: 2175-2184 - [c28]Mark G. Karpovsky, Radomir S. Stankovic, Jaakko Astola:
Construction of linearly transformed planar BDD by Walsh coefficients. ISCAS (4) 2004: 517-520 - 2002
- [c27]Ilya Levin, Vladimir Ostrovsky, Sergey Ostanin, Mark G. Karpovsky:
Self-checking sequential circuits with self-healing ability. ACM Great Lakes Symposium on VLSI 2002: 71-76 - [c26]David Starobinski, Mark G. Karpovsky, Lev Zakrevski:
Application of Network Calculus to General Topologies using Turn-Prohibition. INFOCOM 2002: 1151-1159 - [c25]Ilya Levin, Vladimir Sinelnikov, Mark G. Karpovsky, Sergey Ostanin:
Sequential Circuits Applicable for Detecting Different Types of Faults. IOLTW 2002: 44- - [c24]Mark G. Karpovsky, Mehmet Mustafa, R. Mathur:
Fault Tolerant Unicast Wormhole Routing in Irregular Computer Networks. IASTED PDCS 2002: 637-642 - 2001
- [c23]Iiro S. Honkala, Mark G. Karpovsky, Simon Litsyn:
On the Identification of Vertices and Edges Using Cycles. AAECC 2001: 308-314 - [c22]Ilya Levin, Vladimir Sinelnikov, Mark G. Karpovsky:
Synthesis of ASM-based Self-Checking Controllers. DSD 2001: 87-93 - [c21]Parag K. Lala, Mark G. Karpovsky:
An Approach for Designing On-Line Testable State Machines. IOLTW 2001: 135 - [c20]Mark G. Karpovsky, Radomir S. Stankovic, Claudio Moraga:
Spectral Techniques in Binary and Multiple-Valued Switching Theory. ISMVL 2001: 41-48 - 1999
- [c19]Lev Zakrevski, Mark G. Karpovsky:
Fault-tolerant Message Routing in Computer Networks. PDPTA 1999: 2279-2286 - 1998
- [c18]Lev Zakrevski, Mark G. Karpovsky:
Fault-Tolerant Message Routing for Multiprocessors. IPPS/SPDP Workshops 1998: 714-730 - 1995
- [c17]Mark G. Karpovsky, Ad J. van de Goor, V. N. Yarmolik:
Pseudo-exhaustive word-oriented DRAM testing. ED&TC 1995: 126-132 - 1994
- [c16]E. P. Kalosha, Vyacheslav N. Yarmolik, Mark G. Karpovsky:
Signature Testability of PLA. FPL 1994: 335-337 - [c15]Mark G. Karpovsky, Vyacheslav N. Yarmolik:
Transparent Memory Testing for Pattern-Sensitive Faults. ITC 1994: 860-869 - 1993
- [c14]Mark G. Karpovsky, Saeed M. Chaudhry, Lev B. Levitin, Claudio Moraga:
Detection and Location of Given Sets of Errors by Nonbinary Linear Codes. Algebraic Coding 1993: 172-193 - 1992
- [c13]Mark G. Karpovsky, Saeed M. Chaudhry, Lev B. Levitin:
Multiple Signature Analysis: A Framework for Built-In Self-Diagnostic. FTCS 1992: 112-119 - [c12]Prawat Nagvajara, Mark G. Karpovsky:
Coset error detection in BIST design. VTS 1992: 79-83 - [c11]Mark G. Karpovsky, Saeed M. Chaudhry:
Built-in self-diagnostic by space-time compression of test responses. VTS 1992: 149-154 - 1991
- [c10]Prawat Nagvajara, Mark G. Karpovsky:
Built-In Self-Diagnostic Read-Only-Memories. ITC 1991: 695-703 - [c9]Mark G. Karpovsky, Sandeep K. Gupta, Dhiraj K. Pradhan:
Aliasing and Diagnosis Probability in MISR and STUMPS Using a General Error Model. ITC 1991: 828-839 - [c8]Prawat Nagvajara, Mark G. Karpovsky, Lev B. Levitin:
Efficient test generation for built-in self-test boundary-scan template. VTS 1991: 277-284 - 1990
- [c7]Mark G. Karpovsky, Lev B. Levitin, Feodor S. Vainstein:
Identification of faulty processing elements by space-time compression of test responses. ITC 1990: 638-647 - 1988
- [c6]Mark G. Karpovsky, Prawat Nagvajara:
Board-Level Diagnosis by Signature Analysis. ITC 1988: 47-53 - 1984
- [c5]Mark G. Karpovsky, Rodney Van Meter:
An approach to the testing of microprocessors. DAC 1984: 196-202 - 1983
- [c4]Kewal K. Saluja, Mark G. Karpovsky:
Testing Computer Hardware through Data Compression in Space and Time. ITC 1983: 83-88 - 1982
- [c3]Mark G. Karpovsky:
Universal Tests Detecting Input/Output Faults in Almost All Devices. ITC 1982: 52-57 - 1980
- [c2]Mark G. Karpovsky, Stephen Y. H. Su:
Detecting bridging and stuck-at faults at input and output pins of standard digital components. DAC 1980: 494-505 - 1977
- [c1]Mark G. Karpovsky, Eliezer A. Trachtenberg:
Linear Checking Equations and Error-Correcting Capability for Computation Channels. IFIP Congress 1977: 619-623
Parts in Books or Collections
- 2012
- [p1]Kahraman D. Akdemir, Zhen Wang, Mark G. Karpovsky, Berk Sunar:
Design of Cryptographic Devices Resilient to Fault Injection Attacks Using Nonlinear Robust Codes. Fault Analysis in Cryptography 2012: 171-199
Informal and Other Publications
- 2014
- [i1]Pei Luo, Andy Yu-Lun Lin, Zhen Wang, Mark G. Karpovsky:
Hardware Implementation of Secure Shamir's Secret Sharing Scheme. IACR Cryptol. ePrint Arch. 2014: 887 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint