default search action
Mohammad Ali Maddah-Ali
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j53]Naeimeh Omidvar, Seyed Mohammad Hosseini, Mohammad Ali Maddah-Ali:
Hybrid-order distributed SGD: Balancing communication overhead, computational complexity, and convergence rate for distributed learning. Neurocomputing 599: 128020 (2024) - [j52]Sepehr Ghazinoory, Amirhosein Mardani, Mohammad Ali Maddah-Ali, Gholamali Montazer:
A blockchain-powered e-cognocracy model for democratic decision making. Inf. Syst. E Bus. Manag. 22(2): 209-246 (2024) - [j51]Hadi Reisizadeh, Mohammad Ali Maddah-Ali, Soheil Mohajer:
Cache-Aided K-User Broadcast Channels With State Information at Receivers. IEEE Trans. Inf. Theory 70(4): 2518-2537 (2024) - [c85]Mohammad-Reza Rahmani, Mohammad Hossein Yassaee, Mohammad Ali Maddah-Ali, Mohammad Reza Aref:
Fundamental Limits of Distributed Covariance Matrix Estimation Under Communication Constraints. ICML 2024 - [c84]Mohammad Ali Maddah-Ali, Soheil Mohajer:
Few-Shot Channel-Agnostic Analog Coding: A Near-Optimal Scheme. ISIT 2024: 617-622 - [c83]Hanzaleh Akbari Nodehi, Viveck R. Cadambe, Mohammad Ali Maddah-Ali:
Game of Coding: Beyond Trusted Majorities. ISIT 2024: 2850-2855 - [i80]Hanzaleh Akbari Nodehi, Viveck R. Cadambe, Mohammad Ali Maddah-Ali:
Game of Coding: Beyond Trusted Majorities. CoRR abs/2401.16643 (2024) - [i79]Mohammad Ali Maddah-Ali, Soheil Mohajer:
Few-Shot Channel-Agnostic Analog Coding: A Near-Optimal Scheme. CoRR abs/2401.17419 (2024) - [i78]Parsa Moradi, Mohammad Ali Maddah-Ali:
NeRCC: Nested-Regression Coded Computing for Resilient Distributed Prediction Serving Systems. CoRR abs/2402.04377 (2024) - [i77]Parsa Moradi, Behrooz Tahmasebi, Mohammad Ali Maddah-Ali:
Coded Computing: A Learning-Theoretic Framework. CoRR abs/2406.00300 (2024) - 2023
- [j50]Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali, Songze Li, Giuseppe Caire:
SwiftAgg+: Achieving Asymptotically Optimal Communication Loads in Secure Aggregation for Federated Learning. IEEE J. Sel. Areas Commun. 41(4): 977-989 (2023) - [j49]Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali:
Berrut Approximated Coded Computing: Straggler Resistance Beyond Polynomial Computing. IEEE Trans. Pattern Anal. Mach. Intell. 45(1): 111-122 (2023) - [c82]Mahsa Bastankhah, Krishnendu Chatterjee, Mohammad Ali Maddah-Ali, Stefan Schmid, Jakub Svoboda, Michelle Yeo:
R2: Boosting Liquidity in Payment Channel Networks with Online Admission Control. FC (1) 2023: 309-325 - [c81]Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, Fisher Yu:
Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities. SP 2023: 126-145 - [i76]Hadi Reisizadeh, Mohammad Ali Maddah-Ali, Soheil Mohajer:
Cache-Aided K-User Broadcast Channels with State Information at Receivers. CoRR abs/2301.04753 (2023) - [i75]Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali, Giuseppe Caire:
Byzantine-Resistant Secure Aggregation for Federated Learning Based on Coded Computing and Vector Commitment. CoRR abs/2302.09913 (2023) - [i74]Nastaran Abadi Khooshemehr, Mohammad Ali Maddah-Ali:
Vers: fully distributed Coded Computing System with Distributed Encoding. CoRR abs/2304.05691 (2023) - 2022
- [j48]Mohammad Ali Maddah-Ali, Salman Avestimehr, Ravi Tandon, Changho Suh, Ayfer Özgür, Chao Tian, Tara Javidi, Giuseppe Caire:
Guest Editorial. IEEE J. Sel. Areas Inf. Theory 3(2): 161 (2022) - [c80]Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali, Songze Li, Giuseppe Caire:
SwiftAgg: Communication-Efficient and Dropout-Resistant Secure Aggregation for Federated Learning with Worst-Case Security Guarantees. ISIT 2022: 103-108 - [c79]Amir Masoud Jafarpisheh, Mahtab Mirmohseni, Mohammad Ali Maddah-Ali:
Distributed Attribute-based Private Access Control. ISIT 2022: 2856-2861 - [i73]Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali, Songze Li, Giuseppe Caire:
SwiftAgg: Communication-Efficient and Dropout-Resistant Secure Aggregation for Federated Learning with Worst-Case Security Guarantees. CoRR abs/2202.04169 (2022) - [i72]Amir Masoud Jafarpisheh, Mahtab Mirmohseni, Mohammad Ali Maddah-Ali:
Distributed Attribute-based Private Access Control. CoRR abs/2202.04696 (2022) - [i71]Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali, Songze Li, Giuseppe Caire:
SwiftAgg+: Achieving Asymptotically Optimal Communication Load in Secure Aggregation for Federated Learning. CoRR abs/2203.13060 (2022) - [i70]Ertem Nusret Tas, David Tse, Fisher Yu, Sreeram Kannan, Mohammad Ali Maddah-Ali:
Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities. CoRR abs/2207.08392 (2022) - [i69]Mahsa Bastankhah, Krishnendu Chatterjee, Mohammad Ali Maddah-Ali, Stefan Schmid, Jakub Svoboda, Michelle Yeo:
Online Admission Control and Rebalancing in Payment Channel Networks. CoRR abs/2209.11936 (2022) - [i68]Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, Fisher Yu:
Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities. IACR Cryptol. ePrint Arch. 2022: 932 (2022) - 2021
- [j47]Reza Moosavi, Saeedeh Parsaeefard, Mohammad Ali Maddah-Ali, Vahid Shah-Mansouri, Babak Hossein Khalaj, Mehdi Bennis:
Energy efficiency through joint routing and function placement in different modes of SDN/NFV networks. Comput. Networks 200: 108492 (2021) - [j46]Saeid Sahraei, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Interactive Verifiable Polynomial Evaluation. IEEE J. Sel. Areas Inf. Theory 2(1): 317-325 (2021) - [j45]Ali Rahimi, Mohammad Ali Maddah-Ali:
Multi-Party Proof Generation in QAP-Based zk-SNARKs. IEEE J. Sel. Areas Inf. Theory 2(3): 931-941 (2021) - [j44]Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali:
Optimal Communication-Computation Trade-Off in Heterogeneous Gradient Coding. IEEE J. Sel. Areas Inf. Theory 2(3): 1002-1011 (2021) - [j43]Ali Khalesi, Mahtab Mirmohseni, Mohammad Ali Maddah-Ali:
The Capacity Region of Distributed Multi-User Secret Sharing. IEEE J. Sel. Areas Inf. Theory 2(3): 1057-1071 (2021) - [j42]Ahmed Roushdy Elkordy, Songze Li, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Compressed Coded Distributed Computing. IEEE Trans. Commun. 69(5): 2773-2783 (2021) - [j41]Mahdi Jafari Siavoshani, Seyed Pooya Shariatpanahi, Mohammad Ali Maddah-Ali:
Private Information Retrieval for a Multi-Message Scenario With Private Side Information. IEEE Trans. Commun. 69(5): 3235-3244 (2021) - [j40]Behrooz Tahmasebi, Mohammad Ali Maddah-Ali, Seyed Abolfazl Motahari:
The Capacity of Associated Subsequence Retrieval. IEEE Trans. Inf. Theory 67(2): 790-804 (2021) - [j39]Hanzaleh Akbari Nodehi, Mohammad Ali Maddah-Ali:
Secure Coded Multi-Party Computation for Massive Matrix Operations. IEEE Trans. Inf. Theory 67(4): 2379-2398 (2021) - [j38]Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali:
CodedSketch: A Coding Scheme for Distributed Computation of Approximated Matrix Multiplication. IEEE Trans. Inf. Theory 67(6): 4185-4196 (2021) - [j37]Nastaran Abadi Khooshemehr, Mohammad Ali Maddah-Ali:
Fundamental Limits of Distributed Linear Encoding. IEEE Trans. Inf. Theory 67(12): 7985-7998 (2021) - [j36]Ehsan Tohidi, Saeedeh Parsaeefard, Mohammad Ali Maddah-Ali, Babak Hossein Khalaj, Alberto Leon-Garcia:
Near-Optimal Robust Virtual Controller Placement in 5G Software Defined Networks. IEEE Trans. Netw. Sci. Eng. 8(2): 1687-1697 (2021) - [j35]Ehsan Tohidi, Saeedeh Parsaeefard, Ali Akbar Hemmati, Mohammad Ali Maddah-Ali, Babak Hossein Khalaj, Alberto Leon-Garcia:
Distributed Controller-Switch Assignment in 5G Networks. IEEE Trans. Netw. Serv. Manag. 18(2): 2193-2207 (2021) - [c78]Nastaran Abadi Khooshemehr, Mohammad Ali Maddah-Ali:
The Discrepancy Attack on Polyshard-ed Blockchains. ISIT 2021: 2672-2677 - [i67]Nastaran Abadi Khooshemehr, Mohammad Ali Maddah-Ali:
The Discrepancy Attack on Polyshard-ed Blockchains. CoRR abs/2102.02867 (2021) - [i66]Ali Rahimi, Mohammad Ali Maddah-Ali:
Multi-Party Proof Generation in QAP-based zk-SNARKs. CoRR abs/2103.01344 (2021) - [i65]Ali Khalesi, Mahtab Mirmohseni, Mohammad Ali Maddah-Ali:
The Capacity Region of Distributed Multi-User Secret Sharing. CoRR abs/2103.01568 (2021) - [i64]Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali:
Optimal Communication-Computation Trade-Off in Heterogeneous Gradient Coding. CoRR abs/2103.01589 (2021) - [i63]Zeta Avarikioti, Mahsa Bastankhah, Mohammad Ali Maddah-Ali, Krzysztof Pietrzak, Jakub Svoboda, Michelle Yeo:
Route Discovery in Private Payment Channel Networks. IACR Cryptol. ePrint Arch. 2021: 1539 (2021) - 2020
- [j34]Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Straggler Mitigation in Distributed Matrix Multiplication: Fundamental Limits and Optimal Coding. IEEE Trans. Inf. Theory 66(3): 1920-1933 (2020) - [c77]Nastaran Abadi Khooshemehr, Mohammad Ali Maddah-Ali:
Fundamental Limits of Distributed Encoding. ISIT 2020: 798-803 - [c76]Behrooz Tahmasebi, Mohammad Ali Maddah-Ali:
Private Function Computation. ISIT 2020: 1118-1123 - [c75]Saeid Sahraei, Mohammad Ali Maddah-Ali, Salman Avestimehr:
Interactive Verifiable Polynomial Evaluation. ISIT 2020: 2843-2848 - [c74]Seyed Reza Hoseini Najarkolaei, Mohammad Ali Maddah-Ali, Mohammad Reza Aref:
Coded Secure Multi-Party Computation for Massive Matrices with Adversarial Nodes. IWCIT 2020: 1-6 - [i62]Hamidreza Ehteram, Mohammad Taha Toghani, Mohammad Ali Maddah-Ali:
BlockMarkchain: A Secure Decentralized Data Market with a Constant Load on the Blockchain. CoRR abs/2003.11424 (2020) - [i61]Hamidreza Ehteram, Mohammad Ali Maddah-Ali, Mahtab Mirmohseni:
Corella: A Private Multi Server Learning Approach based on Correlated Queries. CoRR abs/2003.12052 (2020) - [i60]Naeimeh Omidvar, Mohammad Ali Maddah-Ali, Hamed Mahdavi:
A Hybrid-Order Distributed SGD Method for Non-Convex Optimization to Balance Communication Overhead, Computational Complexity, and Convergence Rate. CoRR abs/2003.12423 (2020) - [i59]Nastaran Abadi Khooshemehr, Mohammad Ali Maddah-Ali:
Fundamental Limits of Distributed Encoding. CoRR abs/2004.00811 (2020) - [i58]Seyed Reza Hoseini Najarkolaei, Mohammad Ali Maddah-Ali, Mohammad Reza Aref:
Coded Secure Multi-Party Computation for Massive Matrices with Adversarial Nodes. CoRR abs/2004.04985 (2020) - [i57]Reza Moosavi, Saeedeh Parsaeefard, Mohammad Ali Maddah-Ali, Vahid Shah-Mansouri, Babak Hossein Khalaj, Mehdi Bennis:
Energy Efficiency Through Joint Routing and Function Placement in Different Modes of SDN/NFV Networks. CoRR abs/2007.13230 (2020) - [i56]Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali:
Berrut Approximated Coded Computing: Straggler Resistance Beyond Polynomial Computing. CoRR abs/2009.08327 (2020) - [i55]Amir Ziashahabi, Mohammad Ali Maddah-Ali, Abbas Heydarnoori:
Bias-Resistant Social News Aggregator Based on Blockchain. CoRR abs/2010.10083 (2020)
2010 – 2019
- 2019
- [j33]Navid Naderializadeh, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Cache-Aided Interference Management in Wireless Cellular Networks. IEEE Trans. Commun. 67(5): 3376-3387 (2019) - [j32]Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Characterizing the Rate-Memory Tradeoff in Cache Networks Within a Factor of 2. IEEE Trans. Inf. Theory 65(1): 647-663 (2019) - [j31]Mohammad Ali Maddah-Ali, Urs Niesen:
Cache-Aided Interference Channels. IEEE Trans. Inf. Theory 65(3): 1714-1724 (2019) - [j30]Borna Kananian, Mohammad Ali Maddah-Ali, Babak Hossein Khalaj:
K-User Interference Channels With Backhaul Cooperation: DoF vs. Backhaul Load Trade-Off. IEEE Trans. Inf. Theory 65(11): 7253-7267 (2019) - [c73]Ehsan Tohidi, Saeedeh Parsaeefard, Mohammad Ali Maddah-Ali, Babak Hossein Khalaj, Alberto Leon-Garcia:
Controller-Switch Assignment in 5G Networks. 5G World Forum 2019: 40-45 - [c72]Hadi Reisizadeh, Mohammad Ali Maddah-Ali, Soheil Mohajer:
Cache-Aided Two-User Broadcast Channels with State Information at Receivers. ISIT 2019: 16-20 - [c71]Ali Gholami, Mohammad Ali Maddah-Ali, Seyed Abolfazl Motahari:
Private Shotgun DNA Sequencing. ISIT 2019: 171-175 - [c70]Mohammad Hossein Mousavi, Mohammad Ali Maddah-Ali, Mahtab Mirmohseni:
Private Inner Product Retrieval for Distributed Machine Learning. ISIT 2019: 355-359 - [c69]Hadi Reisizadeh, Mohammad Ali Maddah-Ali, Soheil Mohajer:
Subspace Coding for Coded Caching: Decentralized and Centralized Placements Meet for Three Users. ISIT 2019: 677-681 - [c68]Seyed Pooya Shariatpanahi, Jingjing Zhang, Osvaldo Simeone, Babak Hossein Khalaj, Mohammad Ali Maddah-Ali:
Cloud-Aided Interference Management with Cache-Enabled Edge Nodes and Users. ISIT 2019: 737-741 - [c67]Behrooz Tahmasebi, Mohammad Ali Maddah-Ali:
Private Sequential Function Computation. ISIT 2019: 1667-1671 - [c66]Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali:
CodedSketch: Coded Distributed Computation of Approximated Matrix Multiplication. ISIT 2019: 2489-2493 - [c65]Ali Gholami, Mohammad Ali Maddah-Ali, Seyed Abolfazl Motahari:
Private Shotgun DNA Sequencing: A Structured Approach. IWCIT 2019: 1-6 - [i54]Seyed Pooya Shariatpanahi, Jingjing Zhang, Osvaldo Simeone, Babak Hossein Khalaj, Mohammad Ali Maddah-Ali:
Cloud-Aided Interference Management with Cache-Enabled Edge Nodes and Users. CoRR abs/1901.06698 (2019) - [i53]Mohammad Hossein Mousavi, Mohammad Ali Maddah-Ali, Mahtab Mirmohseni:
Private Inner Product Retrieval for Distributed Machine Learning. CoRR abs/1902.06319 (2019) - [i52]Ali Gholami, Mohammad Ali Maddah-Ali, Seyed Abolfazl Motahari:
Private Shotgun DNA Sequencing: A Structured Approach. CoRR abs/1904.00800 (2019) - [i51]Saeid Sahraei, Mohammad Ali Maddah-Ali, Salman Avestimehr:
Interactive Verifiable Polynomial Evaluation. CoRR abs/1907.04302 (2019) - [i50]Behrooz Tahmasebi, Mohammad Ali Maddah-Ali:
Private Sequential Function Computation. CoRR abs/1908.01204 (2019) - [i49]Hanzaleh Akbari Nodehi, Mohammad Ali Maddah-Ali:
Secure Coded Multi-Party Computation for Massive Matrix Operations. CoRR abs/1908.04255 (2019) - 2018
- [j29]Mohammad Ali Tahmasbi Nejad, Saeedeh Parsaeefard, Mohammad Ali Maddah-Ali, Toktam Mahmoodi, Babak Hossein Khalaj:
vSPACE: VNF Simultaneous Placement, Admission Control and Embedding. IEEE J. Sel. Areas Commun. 36(3): 542-557 (2018) - [j28]Behrooz Tahmasebi, Mohammad Ali Maddah-Ali, Saeedeh Parsaeefard, Babak Hossein Khalaj:
Optimum Transmission Delay for Function Computation in NFV-Based Networks: The Role of Network Coding and Redundant Computing. IEEE J. Sel. Areas Commun. 36(10): 2233-2245 (2018) - [j27]Songze Li, Mohammad Ali Maddah-Ali, Qian Yu, Amir Salman Avestimehr:
A Fundamental Tradeoff Between Computation and Communication in Distributed Computing. IEEE Trans. Inf. Theory 64(1): 109-128 (2018) - [j26]Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
The Exact Rate-Memory Tradeoff for Caching With Uncoded Prefetching. IEEE Trans. Inf. Theory 64(2): 1281-1296 (2018) - [j25]Yaoqing Yang, Siheng Chen, Mohammad Ali Maddah-Ali, Pulkit Grover, Soummya Kar, Jelena Kovacevic:
Fast Temporal Path Localization on Graphs via Multiscale Viterbi Decoding. IEEE Trans. Signal Process. 66(21): 5588-5603 (2018) - [c64]Behrooz Tahmasebi, Abolfazl S. Motahari, Mohammad Ali Maddah-Ali:
On the Identifiability of Parameters in the Population Stratification Problem: A Worst-Case Analysis. ISIT 2018: 1051-1055 - [c63]Hanzaleh Akbari Nodehi, Mohammad Ali Maddah-Ali:
Limited-Sharing Multi-Party Computation for Massive Matrix Operations. ISIT 2018: 1231-1235 - [c62]Hadi Reisizadeh, Mohammad Ali Maddah-Ali, Soheil Mohajer:
Erasure Coding for Decentralized Coded Caching. ISIT 2018: 1715-1719 - [c61]Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Straggler Mitigation in Distributed Matrix Multiplication: Fundamental Limits and Optimal Coding. ISIT 2018: 2022-2026 - [c60]Songze Li, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Compressed Coded Distributed Computing. ISIT 2018: 2032-2036 - [c59]Behrooz Tahmasebi, Mohammad Ali Maddah-Ali, Abolfazl S. Motahari:
Genome-Wide Association Studies: Information Theoretic Limits of Reliable Learning. ISIT 2018: 2231-2235 - [c58]Hanzaleh Akbari Nodehi, Seyed Reza Hoseini Najarkolaei, Mohammad Ali Maddah-Ali:
Entangled Polynomial Coding in Limited-Sharing Multi-Party Computation. ITW 2018: 1-5 - [c57]Seyed Pooya Shariatpanahi, Mahdi Jafari Siavoshani, Mohammad Ali Maddah-Ali:
Multi-Message Private Information Retrieval with Private Side Information. ITW 2018: 1-5 - [c56]Behrooz Tahmasebi, Mohammad Ali Maddah-Ali, Seyed Abolfazl Motahari:
Information Theory of Mixed Population Genome-Wide Association Studies. ITW 2018: 1-5 - [c55]Mahtab Mirmohseni, Mohammad Ali Maddah-Ali:
Private function retrieval. IWCIT 2018: 1-6 - [c54]Behrooz Tahmasebi, Mohammad Ali Maddah-Ali, Seyed Abolfazl Motahari:
Information theoretic limits of learning of the causal features in a linear model. IWCIT 2018: 1-6 - [i48]Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Straggler Mitigation in Distributed Matrix Multiplication: Fundamental Limits and Optimal Coding. CoRR abs/1801.07487 (2018) - [i47]Songze Li, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Compressed Coded Distributed Computing. CoRR abs/1805.01993 (2018) - [i46]Seyed Pooya Shariatpanahi, Mahdi Jafari Siavoshani, Mohammad Ali Maddah-Ali:
Multi-Message Private Information Retrieval with Private Side Information. CoRR abs/1805.11892 (2018) - [i45]Behrooz Tahmasebi, Mohammad Ali Maddah-Ali, Saeedeh Parsaeefard, Babak Hossein Khalaj:
Optimum Transmission Delay for Function Computation in NFV-based Networks: the role of Network Coding and Redundant Computing. CoRR abs/1807.03337 (2018) - [i44]Borna Kananian, Mohammad Ali Maddah-Ali, Babak Hossein Khalaj:
K-User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade-Off. CoRR abs/1807.08646 (2018) - [i43]Behrooz Tahmasebi, Mohammad Ali Maddah-Ali, Seyed Abolfazl Motahari:
Genome-Wide Association Studies: Information Theoretic Limits of Reliable Learning. CoRR abs/1808.03708 (2018) - [i42]Tayyebeh Jahani-Nezhad, Mohammad Ali Maddah-Ali:
CodedSketch: A Coding Scheme for Distributed Computation of Approximated Matrix Multiplications. CoRR abs/1812.10460 (2018) - 2017
- [j24]Songze Li, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Coding for Distributed Fog Computing. IEEE Commun. Mag. 55(4): 34-40 (2017) - [j23]Urs Niesen, Mohammad Ali Maddah-Ali:
Coded Caching With Nonuniform Demands. IEEE Trans. Inf. Theory 63(2): 1146-1158 (2017) - [j22]David T. H. Kao, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Blind Index Coding. IEEE Trans. Inf. Theory 63(4): 2076-2097 (2017) - [j21]Navid Naderializadeh, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Fundamental Limits of Cache-Aided Interference Management. IEEE Trans. Inf. Theory 63(5): 3092-3107 (2017) - [j20]Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr, Yan Zhu:
Binary Fading Interference Channel With No CSIT. IEEE Trans. Inf. Theory 63(6): 3565-3578 (2017) - [j19]Songze Li, Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
A Scalable Framework for Wireless Distributed Computing. IEEE/ACM Trans. Netw. 25(5): 2643-2654 (2017) - [c53]Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Coded fourier transform. Allerton 2017: 494-501 - [c52]Songze Li, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Architectures for coded mobile edge computing. FWC 2017: 1-6 - [c51]Yaoqing Yang, Siheng Chen, Mohammad Ali Maddah-Ali, Pulkit Grover, Soummya Kar, Jelena Kovacevic:
Fast path localization on graphs via multiscale Viterbi decoding. ICASSP 2017: 4114-4118 - [c50]Navid Naderializadeh, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Cache-aided interference management in wireless cellular networks. ICC 2017: 1-7 - [c49]Qian Yu, Songze Li, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
How to optimally allocate resources for coded distributed computing? ICC 2017: 1-7 - [c48]Songze Li, Sucha Supittayapornpong, Mohammad Ali Maddah-Ali, Salman Avestimehr:
Coded TeraSort. IPDPS Workshops 2017: 389-398 - [c47]Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Characterizing the rate-memory tradeoff in cache networks within a factor of 2. ISIT 2017: 386-390 - [c46]Navid Naderializadeh, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
On the optimality of separation between caching and delivery in general cache networks. ISIT 2017: 1232-1236 - [c45]Borna Kananian, Mohammad Ali Maddah-Ali, Seyed Pooya Shariatpanahi, Babak H. Khalaj:
Characterization of degrees of freedom versus receivers backhaul load in K-user interference channel. ISIT 2017: 1431-1435 - [c44]Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
The exact rate-memory tradeoff for caching with uncoded prefetching. ISIT 2017: 1613-1617 - [c43]Songze Li, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Communication-aware computing for edge processing. ISIT 2017: 2885-2889 - [c42]Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Communication-optimal coding designs for caching networks. ITW 2017: 6-10 - [c41]Qian Yu, Mohammad Ali Maddah-Ali, Salman Avestimehr:
Polynomial Codes: an Optimal Design for High-Dimensional Coded Matrix Multiplication. NIPS 2017: 4403-4413 - [i41]Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Characterizing the Rate-Memory Tradeoff in Cache Networks within a Factor of 2. CoRR abs/1702.04563 (2017) - [i40]Songze Li, Sucha Supittayapornpong, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Coded TeraSort. CoRR abs/1702.04850 (2017) - [i39]Songze Li, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Coding for Distributed Fog Computing. CoRR abs/1702.06082 (2017) - [i38]Qian Yu, Songze Li, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
How to Optimally Allocate Resources for Coded Distributed Computing? CoRR abs/1702.07297 (2017) - [i37]Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Polynomial Codes: an Optimal Design for High-Dimensional Coded Matrix Multiplication. CoRR abs/1705.10464 (2017) - [i36]Songze Li, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Communication-Aware Computing for Edge Processing. CoRR abs/1706.07523 (2017) - [i35]Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Coded Fourier Transform. CoRR abs/1710.06471 (2017) - [i34]Mahtab Mirmohseni, Mohammad Ali Maddah-Ali:
Private Function Retrieval. CoRR abs/1711.04677 (2017) - 2016
- [j18]Mohammad Ali Maddah-Ali, Urs Niesen:
Coding for caching: fundamental limits and practical challenges. IEEE Commun. Mag. 54(8): 23-29 (2016) - [j17]Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Approximate Capacity Region of the MISO Broadcast Channels With Delayed CSIT. IEEE Trans. Commun. 64(7): 2913-2924 (2016) - [j16]Nikhil Karamchandani, Urs Niesen, Mohammad Ali Maddah-Ali, Suhas N. Diggavi:
Hierarchical Coded Caching. IEEE Trans. Inf. Theory 62(6): 3212-3229 (2016) - [j15]Ramtin Pedarsani, Mohammad Ali Maddah-Ali, Urs Niesen:
Online Coded Caching. IEEE/ACM Trans. Netw. 24(2): 836-845 (2016) - [c40]Songze Li, Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Coded distributed computing: Fundamental limits and practical challenges. ACSSC 2016: 509-513 - [c39]Songze Li, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Coded Distributed Computing: Straggling Servers and Multistage Dataflows. Allerton 2016: 164-171 - [c38]Seyed Rasoul Etesami, Mohammad Ali Maddah-Ali:
Design cost versus access cost trade-off in distributed storage systems: A combinatorial approach. ACC 2016: 5322-5327 - [c37]Songze Li, Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Poster Abstract: A Scalable Coded Computing Framework for Edge-Facilitated Wireless Distributed Computing. SEC 2016: 79-80 - [c36]Songze Li, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
A Unified Coding Framework for Distributed Computing with Straggling Servers. GLOBECOM Workshops 2016: 1-6 - [c35]Songze Li, Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Edge-Facilitated Wireless Distributed Computing. GLOBECOM 2016: 1-7 - [c34]Borna Kananian, Mohammad Ali Maddah-Ali, Seyed Pooya Shariatpanahi, Babak Hossein Khalaj:
Collaboration alignment in distributed interference management in uplink cellular systems. ISIT 2016: 1456-1460 - [c33]Songze Li, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Fundamental tradeoff between computation and communication in distributed computing. ISIT 2016: 1814-1818 - [c32]Navid Naderializadeh, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Fundamental limits of cache-aided interference management. ISIT 2016: 2044-2048 - [i33]Navid Naderializadeh, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Fundamental Limits of Cache-Aided Interference Management. CoRR abs/1602.04207 (2016) - [i32]Songze Li, Mohammad Ali Maddah-Ali, Qian Yu, Amir Salman Avestimehr:
A Fundamental Tradeoff between Computation and Communication in Distributed Computing. CoRR abs/1604.07086 (2016) - [i31]Songze Li, Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
A Scalable Framework for Wireless Distributed Computing. CoRR abs/1608.05743 (2016) - [i30]Songze Li, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
A Unified Coding Framework for Distributed Computing with Straggling Servers. CoRR abs/1609.01690 (2016) - [i29]Qian Yu, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
The Exact Rate-Memory Tradeoff for Caching with Uncoded Prefetching. CoRR abs/1609.07817 (2016) - 2015
- [j14]Vasilis Ntranos, Mohammad Ali Maddah-Ali, Giuseppe Caire:
Cellular Interference Alignment. IEEE Trans. Inf. Theory 61(3): 1194-1217 (2015) - [j13]Vasilis Ntranos, Mohammad Ali Maddah-Ali, Giuseppe Caire:
Cellular Interference Alignment: Omni-Directional Antennas and Asymmetric Configurations. IEEE Trans. Inf. Theory 61(12): 6663-6679 (2015) - [j12]Mohammad Ali Maddah-Ali, Urs Niesen:
Decentralized Coded Caching Attains Order-Optimal Memory-Rate Tradeoff. IEEE/ACM Trans. Netw. 23(4): 1029-1040 (2015) - [c31]Songze Li, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Coded MapReduce. Allerton 2015: 964-971 - [c30]David T. H. Kao, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Blind index coding over wireless channels: the value of repetition coding. ICC 2015: 2066-2071 - [c29]Urs Niesen, Mohammad Ali Maddah-Ali:
Coded caching for delay-sensitive content. ICC 2015: 5559-5564 - [c28]Mohammad Ali Maddah-Ali, Urs Niesen:
Cache-aided interference channels. ISIT 2015: 809-813 - [c27]Vasilis Ntranos, Mohammad Ali Maddah-Ali, Giuseppe Caire:
Cooperation alignment for distributed interference management. ISIT 2015: 874-878 - [c26]David T. H. Kao, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Blind index coding. ISIT 2015: 2371-2375 - [i28]David T. H. Kao, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Blind Index Coding. CoRR abs/1504.06018 (2015) - [i27]Vasilis Ntranos, Mohammad Ali Maddah-Ali, Giuseppe Caire:
Cooperation Alignment for Distributed Interference Management. CoRR abs/1510.01367 (2015) - [i26]Mohammad Ali Maddah-Ali, Urs Niesen:
Cache-Aided Interference Channels. CoRR abs/1510.06121 (2015) - [i25]Songze Li, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Coded MapReduce. CoRR abs/1512.01625 (2015) - 2014
- [j11]Mohammad Ali Maddah-Ali, Urs Niesen:
Fundamental Limits of Caching. IEEE Trans. Inf. Theory 60(5): 2856-2867 (2014) - [j10]Abolfazl Seyed Motahari, Shahab Oveis Gharan, Mohammad Ali Maddah-Ali, Amir Keyvan Khandani:
Real Interference Alignment: Exploiting the Potential of Single Antenna Systems. IEEE Trans. Inf. Theory 60(8): 4799-4810 (2014) - [j9]Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Capacity Results for Binary Fading Interference Channels With Delayed CSIT. IEEE Trans. Inf. Theory 60(10): 6093-6130 (2014) - [c25]Ramtin Pedarsani, Mohammad Ali Maddah-Ali, Urs Niesen:
Online coded caching. ICC 2014: 1878-1883 - [c24]Urs Niesen, Mohammad Ali Maddah-Ali:
Coded caching with nonuniform demands. INFOCOM Workshops 2014: 221-226 - [c23]Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Communication through collisions: Opportunistic utilization of past receptions. INFOCOM 2014: 2553-2561 - [c22]Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Binary Fading Interference Channel with No CSIT. ISIT 2014: 666-670 - [c21]Vasileios Ntranos, Mohammad Ali Maddah-Ali, Giuseppe Caire:
Cellular interference alignment. ISIT 2014: 1598-1602 - [c20]David T. H. Kao, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Align-and-forward relaying for two-hop erasure broadcast channels. ISIT 2014: 1932-1936 - [c19]Nikhil Karamchandani, Urs Niesen, Mohammad Ali Maddah-Ali, Suhas N. Diggavi:
Hierarchical coded caching. ISIT 2014: 2142-2146 - [i24]Vasileios Ntranos, Mohammad Ali Maddah-Ali, Giuseppe Caire:
Cellular Interference Alignment. CoRR abs/1402.3119 (2014) - [i23]Nikhil Karamchandani, Urs Niesen, Mohammad Ali Maddah-Ali, Suhas N. Diggavi:
Hierarchical Coded Caching. CoRR abs/1403.7007 (2014) - [i22]Vasileios Ntranos, Mohammad Ali Maddah-Ali, Giuseppe Caire:
Cellular Interference Alignment: Omni-Directional Antennas and Asymmetric Configurations. CoRR abs/1404.6512 (2014) - [i21]Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Binary Fading Interference Channel with No CSIT. CoRR abs/1405.0203 (2014) - [i20]Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Approximate Capacity of the Two-User MISO Broadcast Channel with Delayed CSIT. CoRR abs/1405.1143 (2014) - [i19]Vasileios Ntranos, Mohammad Ali Maddah-Ali, Giuseppe Caire:
On Uplink-Downlink Duality for Cellular IA. CoRR abs/1407.3538 (2014) - [i18]Urs Niesen, Mohammad Ali Maddah-Ali:
Coded Caching for Delay-Sensitive Content. CoRR abs/1407.4489 (2014) - 2013
- [j8]Urs Niesen, Mohammad Ali Maddah-Ali:
Interference Alignment: From Degrees of Freedom to Constant-Gap Capacity Approximations. IEEE Trans. Inf. Theory 59(8): 4855-4888 (2013) - [c18]Mohammad Ali Maddah-Ali, Urs Niesen:
Decentralized coded caching attains order-optimal memory-rate tradeoff. Allerton 2013: 421-427 - [c17]Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Approximate capacity of the two-user MISO Broadcast Channel with delayed CSIT. Allerton 2013: 1136-1143 - [c16]Mohammad Ali Maddah-Ali, Urs Niesen:
Fundamental limits of caching. ISIT 2013: 1077-1081 - [i17]Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Capacity Results for Binary Fading Interference Channels with Delayed CSIT. CoRR abs/1301.5309 (2013) - [i16]Mohammad Ali Maddah-Ali, Urs Niesen:
Decentralized Caching Attains Order-Optimal Memory-Rate Tradeoff. CoRR abs/1301.5848 (2013) - [i15]Urs Niesen, Mohammad Ali Maddah-Ali:
Coded Caching with Nonuniform Demands. CoRR abs/1308.0178 (2013) - [i14]Ramtin Pedarsani, Mohammad Ali Maddah-Ali, Urs Niesen:
Online Coded Caching. CoRR abs/1311.3646 (2013) - [i13]Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Communication Through Collisions: Opportunistic Utilization of Past Receptions. CoRR abs/1312.0116 (2013) - 2012
- [j7]Mohammad Ali Maddah-Ali, David N. C. Tse:
Completely Stale Transmitter Channel State Information is Still Very Useful. IEEE Trans. Inf. Theory 58(7): 4418-4431 (2012) - [c15]Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Binary fading interference channel with delayed feedback. ISIT 2012: 1882-1886 - [c14]Urs Niesen, Mohammad Ali Maddah-Ali:
Interference alignment: From degrees-of-freedom to constant-gap capacity approximations. ISIT 2012: 2077-2081 - [c13]Ravi Tandon, Mohammad Ali Maddah-Ali, Antonia M. Tulino, H. Vincent Poor, Shlomo Shamai:
On fading broadcast channels with partial channel state information at the transmitter. ISWCS 2012: 1004-1008 - [i12]Mohammad Ali Maddah-Ali, Urs Niesen:
Fundamental Limits of Caching. CoRR abs/1209.5807 (2012) - 2011
- [c12]Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Interference channel with binary fading: Effect of delayed network state information. Allerton 2011: 894-901 - [i11]Urs Niesen, Mohammad Ali Maddah-Ali:
Interference Alignment: From Degrees-of-Freedom to Constant-Gap Capacity Approximations. CoRR abs/1112.4879 (2011) - 2010
- [c11]Mohammad Ali Maddah-Ali, David Tse:
Completely stale transmitter channel state information is still very useful. Allerton 2010: 1188-1195 - [c10]Mohammad Ali Maddah-Ali, David Tse:
Interference neutralization in distributed lossy source coding. ISIT 2010: 166-170 - [c9]Mohammad Ali Maddah-Ali:
On the degrees of freedom of the compound MISO broadcast channels with finite states. ISIT 2010: 2273-2277 - [c8]Soroush Akhlaghi, Ehsan Rahimi, Mohammad Ali Maddah-Ali:
How much feedback is required to achieve the degrees of freedom in ergodic X channel? PIMRC 2010: 2370-2374 - [i10]Abolfazl S. Motahari, Shahab Oveis Gharan, Mohammad Ali Maddah-Ali, Amir K. Khandani:
Real Interference Alignment. CoRR abs/1001.3403 (2010) - [i9]Soroush Akhlaghi, Mohammad Ali Maddah-Ali, Ehsan Rahimi:
A Fixed Precoding Approach to Achieve the Degrees of Freedom in X channel. CoRR abs/1006.3385 (2010) - [i8]Mohammad Ali Maddah-Ali, David Tse:
Completely Stale Transmitter Channel State Information is Still Very Useful. CoRR abs/1010.1499 (2010)
2000 – 2009
- 2009
- [j6]Mohammad Ali Maddah-Ali, Amin Mobasher, Amir K. Khandani:
Fairness in multiuser systems with polymatroid capacity region. IEEE Trans. Inf. Theory 55(5): 2128-2138 (2009) - [c7]Mohammad Ali Maddah-Ali, David N. C. Tse:
Approximating the rate-distortion region of the distributed source coding for three jointly Gaussian tree-structured sources. ISIT 2009: 1468-1472 - [c6]Amin Mobasher, Mohammad Ali Maddah-Ali, Amir K. Khandani:
Selective Mapping for channel inversion precoding in multiple-antenna broadcast systems. ISIT 2009: 1679-1683 - [i7]Abolfazl S. Motahari, Shahab Oveis Gharan, Mohammad Ali Maddah-Ali, Amir K. Khandani:
Forming Pseudo-MIMO by Embedding Infinite Rational Dimensions Along a Single Real Line: Removing Barriers in Achieving the DOFs of Single Antenna Systems. CoRR abs/0908.2282 (2009) - [i6]Mohammad Ali Maddah-Ali:
The Degrees of Freedom of the Compound MIMO Broadcast Channels with Finite States. CoRR abs/0909.5006 (2009) - 2008
- [j5]Mohammad Ali Maddah-Ali, Mehdi Ansari Sadrabadi, Amir K. Khandani:
Broadcast in MIMO Systems Based on a Generalized QR Decomposition: Signaling and Performance Analysis. IEEE Trans. Inf. Theory 54(3): 1124-1138 (2008) - [j4]Mohammad Ali Maddah-Ali, Abolfazl S. Motahari, Amir K. Khandani:
Communication Over MIMO X Channels: Interference Alignment, Decomposition, and Performance Analysis. IEEE Trans. Inf. Theory 54(8): 3457-3470 (2008) - 2007
- [b1]Mohammad Ali Maddah-Ali:
Communication over MIMO Multi-User Systems: Signalling and Fairness. University of Waterloo, Ontario, Canada, 2007 - [j3]Mehdi Ansari Sadrabadi, Mohammad Ali Maddah-Ali, Amir K. Khandani:
On the Capacity of Time-Varying Channels With Periodic Feedback. IEEE Trans. Inf. Theory 53(8): 2910-2915 (2007) - [j2]Masoud Ebrahimi, Mohammad Ali Maddah-Ali, Amir K. Khandani:
Throughput Scaling Laws for Wireless Networks With Fading Channels. IEEE Trans. Inf. Theory 53(11): 4250-4254 (2007) - [c5]Mohammad Ali Maddah-Ali, Hajar Mahdavi-Doost, Amir K. Khandani:
Optimal Order of Decoding for Max-Min Fairness in K-User Memoryless Interference Channels. ISIT 2007: 2866-2870 - [i5]Masoud Ebrahimi, Mohammad Ali Maddah-Ali, Amir K. Khandani:
Throughput Scaling Laws for Wireless Networks with Fading Channels. CoRR abs/0707.1912 (2007) - [i4]Masoud Ebrahimi, Mohammad Ali Maddah-Ali, Amir K. Khandani:
Throughput Scaling Laws for Wireless Networks with Fading Channels. CoRR abs/cs/0701093 (2007) - [i3]Mohammad Ali Maddah-Ali, Hajar Mahdavi-Doost, Amir K. Khandani:
Optimal Order of Decoding for Max-Min Fairness in K-User Memoryless Interference Channels. CoRR abs/cs/0701118 (2007) - [i2]Mehdi Ansari Sadrabadi, Mohammad Ali Maddah-Ali, Amir K. Khandani:
On The Capacity Of Time-Varying Channels With Periodic Feedback. CoRR abs/cs/0703144 (2007) - 2006
- [j1]Mohammad Ali Maddah-Ali, Amir K. Khandani:
A new non-orthogonal space-time code with low decoding complexity. IEEE Trans. Wirel. Commun. 5(5): 1115-1121 (2006) - [c4]Masoud Ebrahimi, Mohammad Ali Maddah-Ali, Amir K. Khandani:
Power Allocation and Asymptotic Achievable Sum-Rates in Single-Hop Wireless Networks. CISS 2006: 498-503 - [c3]Mohammad Ali Maddah-Ali, Amin Mobasher, Amir K. Khandani:
Using Polymatroid Structures to Provide Fairness in Multiuser Systems. ISIT 2006: 158-162 - [c2]Mohammad Ali Maddah-Ali, Abolfazl S. Motahari, Amir K. Khandani:
Signaling over MIMO Multi-Base Systems: Combination of Multi-Access and Broadcast Schemes. ISIT 2006: 2104-2108 - [i1]Mohammad Ali Maddah-Ali, Amin Mobasher, Amir K. Khandani:
Fairness in Multiuser Systems with Polymatroid Capacity Region. CoRR abs/cs/0606099 (2006) - 2000
- [c1]Mohamad Hajirostam, Mohammad Ali Maddah-Ali, A. Haft-Baradaran, M. T. Kilani, Seid Mehdi Fakhraie, M. Sharif-Khani, Omid Shoaei:
Kalman-filtering timing recovery scheme for orthogonal frequency domain multiplexing (OFDM) systems. ICASSP 2000: 2681-2684
Coauthor Index
aka: Salman Avestimehr
aka: Babak H. Khalaj
aka: Amir Keyvan Khandani
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint