default search action
David J. Pym
Person information
- affiliation: University College London, Department of Computer Science
- affiliation: University of Aberdeen, Scotland, UK
- affiliation: Hewlett-Packard Laboratories, Bristol, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]Albesë Demjaha, David J. Pym, Tristan Caulfield, Simon Parkin:
'The trivial tickets build the trust': a co-design approach to understanding security support interactions in a large university. J. Cybersecur. 10(1) (2024) - [i22]Timo Eckhardt, David J. Pym:
Base-extension Semantics for Modal Logic. CoRR abs/2401.13597 (2024) - [i21]Didier Galmiche, Timo Lang, David J. Pym:
Minimalistic System Modelling: Behaviours, Interfaces, and Local Reasoning. CoRR abs/2401.16109 (2024) - [i20]Alexander V. Gheorghiu, Tao Gu, David J. Pym:
Inferentialist Resource Semantics. CoRR abs/2402.09217 (2024) - [i19]Alexander V. Gheorghiu, Tao Gu, David J. Pym:
A Note on the Practice of Logical Inferentialism. CoRR abs/2403.10546 (2024) - [i18]Alexander V. Gheorghiu, Tao Gu, David J. Pym:
A Note on an Inferentialist Approach to Resource Semantics. CoRR abs/2405.06491 (2024) - [i17]Marius-Constantin Ilau, Tristan Caulfield, David J. Pym:
Co-designing heterogeneous models: a distributed systems approach. CoRR abs/2407.07656 (2024) - 2023
- [j48]Alexander V. Gheorghiu, David J. Pym:
Semantical Analysis of the Logic of Bunched Implications. Stud Logica 111(4): 525-571 (2023) - [c64]Manuela-Luminita Bujorianu, Tristan Caulfield, David J. Pym, Rafael Wisniewski:
From MDP to POMDP and Back: Safety and Compositionality. ECC 2023: 1-6 - [c63]Alexander V. Gheorghiu, Tao Gu, David J. Pym:
Proof-Theoretic Semantics for Intuitionistic Multiplicative Linear Logic. TABLEAUX 2023: 367-385 - [i16]Alexander V. Gheorghiu, David J. Pym:
Defining Logical Systems via Algebraic Constraints on Proofs. CoRR abs/2301.02125 (2023) - [i15]Alexander V. Gheorghiu, David J. Pym:
Proof-theoretic Semantics and Tactical Proof. CoRR abs/2301.02302 (2023) - [i14]Henry R. K. Skeoch, David J. Pym:
Pricing cyber-insurance for systems via maturity models. CoRR abs/2302.04734 (2023) - [i13]David J. Pym, Eike Ritter, Edmund Robinson:
Categorical Proof-Theoretic Semantics. CoRR abs/2302.09031 (2023) - [i12]Alexander V. Gheorghiu, Tao Gu, David J. Pym:
Proof-theoretic Semantics for Intuitionistic Multiplicative Linear Logic. CoRR abs/2306.05106 (2023) - [i11]Tao Gu, Alexander V. Gheorghiu, David J. Pym:
Proof-theoretic Semantics for the Logic of Bunched Implications. CoRR abs/2311.16719 (2023) - 2022
- [j47]Albesë Demjaha, Simon Parkin, David J. Pym:
The boundedly rational employee: Security economics for behaviour intervention support in organizations. J. Comput. Secur. 30(3): 435-464 (2022) - [i10]Alexander V. Gheorghiu, David J. Pym:
Negation-as-Failure in the Base-extension Semantics for Intuitionistic Propositional Logic. CoRR abs/2210.05336 (2022) - [i9]Alexander V. Gheorghiu, David J. Pym:
From Proof-theoretic Validity to Base-extension Semantics for Intuitionistic Propositional Logic. CoRR abs/2210.05344 (2022) - [i8]Alexander V. Gheorghiu, David J. Pym:
Semantical Analysis of the Logic of Bunched Implications. CoRR abs/2210.05348 (2022) - 2021
- [c62]Tristan Caulfield, Marius-Constantin Ilau, David J. Pym:
Engineering Ecosystem Models: Semantics and Pragmatics. SimuTools 2021: 236-258 - [c61]Tristan Caulfield, Marius-Constantin Ilau, David J. Pym:
Meta-modelling for Ecosystems Security. SimuTools 2021: 259-283 - [c60]Adrian Baldwin, Tristan Caulfield, Marius-Constantin Ilau, David J. Pym:
Modelling Organizational Recovery. SimuTools 2021: 284-314 - [c59]Albesë Demjaha, David J. Pym, Tristan Caulfield:
Found in Translation: Co-design for Security Modelling. STAST 2021: 108-128 - 2020
- [c58]Paul Brunet, David J. Pym:
Pomsets with Boxes: Protection, Separation, and Locality in Concurrent Kleene Algebra. FSCD 2020: 8:1-8:16 - [c57]David J. Pym, Will Venters:
Modelling Interfaces and Things Within the Decentralized Ecosystems of the Internet of Things. ICIS 2020
2010 – 2019
- 2019
- [j46]Christos Ioannidis, David J. Pym, Julian Williams, Iffat Gheyas:
Resilience in information stewardship. Eur. J. Oper. Res. 274(2): 638-653 (2019) - [j45]Simon Docherty, David J. Pym:
Stone-Type Dualities for Separation Logics. Log. Methods Comput. Sci. 15(1) (2019) - [j44]Didier Galmiche, Pierre Kimmel, David J. Pym:
A substructural epistemic resource logic: theory and modelling applications. J. Log. Comput. 29(8): 1251-1287 (2019) - [j43]David J. Pym:
Resource semantics: logic as a modelling technology. ACM SIGLOG News 6(2): 5-41 (2019) - [c56]Albese Demjaha, Tristan Caulfield, M. Angela Sasse, David J. Pym:
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes. EuroS&P Workshops 2019: 192-201 - [c55]Thomas Cattermole, Simon Docherty, David J. Pym, M. Angela Sasse:
Asset-Oriented Access Control: Towards a New IoT Framework. IOT 2019: 31:1-31:4 - [c54]Albesë Demjaha, Simon Parkin, David J. Pym:
You've Left Me No Choices: Security Economics to Inform Behaviour Intervention Support in Organizations. STAST 2019: 66-86 - [e1]George Cybenko, David J. Pym, Barbara Fila:
5th International Workshop on Graphical Models for Security, held in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC 2018, Oxford, UK, July 8, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11086, Springer 2019, ISBN 978-3-030-15464-6 [contents] - [i7]Didier Galmiche, Pierre Kimmel, David J. Pym:
A Substructural Epistemic Resource Logic: Theory and Modelling Applications. CoRR abs/1909.07296 (2019) - [i6]Paul Brunet, David J. Pym:
Pomsets with Boxes: Protection, Separation, and Locality in Concurrent Kleene Algebra. CoRR abs/1910.14384 (2019) - 2018
- [j42]Simon Docherty, David J. Pym:
Intuitionistic Layered Graph Logic: Semantics and Proof Theory. Log. Methods Comput. Sci. 14(4) (2018) - [j41]Didier Galmiche, David J. Pym:
Preface. J. Log. Comput. 28(4): 629-630 (2018) - [j40]Gabrielle Anderson, David J. Pym:
Trust domains in system models: algebra, logic, utility, and combinators. J. Log. Comput. 28(4): 665-703 (2018) - [c53]Simon Docherty, David J. Pym:
Modular Tableaux Calculi for Separation Theories. FoSSaCS 2018: 441-458 - [c52]Jonathan M. Spring, David J. Pym:
Towards Scientific Incident Response. GameSec 2018: 398-417 - [c51]Simon Docherty, David J. Pym:
A Stone-type Duality Theorem for Separation Logic Via its Underlying Bunched Logics. MFPS 2018: 101-118 - 2017
- [j39]Fredrik Dahlqvist, David J. Pym:
Coalgebraic completeness-via-canonicity for distributive substructural logics. J. Log. Algebraic Methods Program. 93: 1-22 (2017) - [j38]Adrian Baldwin, Iffat Gheyas, Christos Ioannidis, David J. Pym, Julian Williams:
Contagion in cyber security attacks. J. Oper. Res. Soc. 68(7): 780-791 (2017) - [j37]Matthew Collinson, Kevin McDonald, David J. Pym:
Layered graph logic as an assertion language for access control policy models. J. Log. Comput. 27(1): 41-80 (2017) - [j36]Matthew Collinson, Kevin McDonald, Simon Docherty, David J. Pym:
Erratum to: A substructural logic for layered graphs. J. Log. Comput. 27(1): 413-414 (2017) - [j35]Gabrielle Anderson, David J. Pym:
A Substructural Modal Logic of Utility. J. Log. Comput. 27(5): 1421-1464 (2017) - [c50]Tristan Caulfield, Christos Ioannidis, David J. Pym:
The U.S. Vulnerabilities Equities Process: An Economic Perspective. GameSec 2017: 131-150 - [c49]Didier Galmiche, Pierre Kimmel, David J. Pym:
A Substructural Epistemic Resource Logic. ICLA 2017: 106-122 - [c48]Simon Docherty, David J. Pym:
Intuitionistic Layered Graph Logic. IJCAI 2017: 4816-4820 - [c47]Jonathan M. Spring, Tyler Moore, David J. Pym:
Practicing a Science of Security: A Philosophy of Science Perspective. NSPW 2017: 1-18 - [i5]Simon Docherty, David J. Pym:
Intuitionistic Layered Graph Logic: Semantics and Proof Theory. CoRR abs/1702.05795 (2017) - [i4]Simon Docherty, David J. Pym:
Stone-Type Dualities for Separation Logics. CoRR abs/1710.03021 (2017) - 2016
- [j34]Tyler Moore, David J. Pym, Michel van Eeten:
Introduction. J. Cybersecur. 2(1): 1-2 (2016) - [j33]Tyler Moore, David J. Pym:
Editorial. J. Cybersecur. 2(2): 119-120 (2016) - [j32]Gabrielle Anderson, David J. Pym:
A calculus and logic of bunched resources and processes. Theor. Comput. Sci. 614: 63-96 (2016) - [j31]Jean-René Courtault, Didier Galmiche, David J. Pym:
A logic of separating modalities. Theor. Comput. Sci. 637: 30-58 (2016) - [c46]Simon Docherty, David J. Pym:
Intuitionistic Layered Graph Logic. IJCAR 2016: 469-486 - [c45]Tristan Caulfield, Christos Ioannidis, David J. Pym:
Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper). Financial Cryptography 2016: 271-279 - [c44]Tristan Caulfield, Christos Ioannidis, David J. Pym:
On the Adoption of Privacy-enhancing Technologies. GameSec 2016: 175-194 - [c43]Gabrielle Anderson, Guy McCusker, David J. Pym:
A Logic for the Compliance Budget. GameSec 2016: 370-381 - 2015
- [j30]Tyler Moore, David J. Pym:
Welcome from the Editors-in-Chief. J. Cybersecur. 1(1): 1-2 (2015) - [j29]Tristan Caulfield, David J. Pym:
Improving Security Policy Decisions with Models. IEEE Secur. Priv. 13(5): 34-41 (2015) - [c42]Fredrik Dahlqvist, David J. Pym:
Completeness via Canonicity for Distributive Substructural Logics: A Coalgebraic Perspective. RAMiCS 2015: 119-135 - [c41]Tristan Caulfield, David J. Pym:
Modelling and simulating systems security policy. SimuTools 2015: 9-18 - [i3]Fredrik Dahlqvist, David J. Pym:
Completeness via canonicity for distributive substructural logics: a coalgebraic perspective. CoRR abs/1508.04940 (2015) - 2014
- [j28]David J. Pym, Eike Ritter, Edmund Robinson:
A proof-theoretic analysis of the classical propositional matrix method. J. Log. Comput. 24(1): 283-301 (2014) - [j27]Matthew Collinson, Kevin McDonald, David J. Pym:
A substructural logic for layered graphs. J. Log. Comput. 24(4): 953-988 (2014) - [c40]Tristan Caulfield, David J. Pym, Julian Williams:
Compositional Security Modelling - Structure, Economics, and Behaviour. HCI (24) 2014: 233-245 - 2013
- [c39]Bob Duncan, David J. Pym, Mark Whittington:
Developing a Conceptual Framework for Cloud Security Assurance. CloudCom (2) 2013: 120-125 - [c38]Gabrielle Anderson, Matthew Collinson, David J. Pym:
Utility-based Decision-making in Distributed Systems Modelling. TARK 2013 - [c37]Gabrielle Anderson, Matthew Collinson, David J. Pym:
Trust Domains: An Algebraic, Logical, and Utility-Theoretic Approach. TRUST 2013: 232-249 - [i2]Gabrielle Anderson, Matthew Collinson, David J. Pym:
Utility-based Decision-making in Distributed Systems Modelling. CoRR abs/1310.6405 (2013) - 2012
- [j26]Christos Ioannidis, David J. Pym, Julian Williams:
Information security trade-offs and optimal patching policies. Eur. J. Oper. Res. 216(2): 434-444 (2012) - [c36]Matthew Collinson, David J. Pym, Barry Taylor:
A Framework for Modelling Security Architectures in Services Ecosystems. ESOCC 2012: 64-79 - [c35]Adrian Baldwin, Iffat Gheyas, Christos Ioannidis, David J. Pym, Julian Williams:
Contagion in Cybersecurity Attacks. WEIS 2012 - 2011
- [c34]Adrian Baldwin, David J. Pym, Martin Sadler, Simon Shiu:
Information Stewardship in Cloud Ecosystems: Towards Models, Economics, and Delivery. CloudCom 2011: 784-791 - [c33]Christos Ioannidis, David J. Pym, Julian Williams:
Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic Approach. WEIS 2011 - [c32]Christos Ioannidis, David J. Pym, Julian Williams:
Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic Approach. WEIS (Springer Volume) 2011: 171-191 - 2010
- [j25]Matthew Collinson, David J. Pym:
Algebra and logic for access control. Formal Aspects Comput. 22(2): 83-104 (2010) - [j24]Matthew Collinson, David J. Pym:
Erratum to: Algebra and logic for access control. Formal Aspects Comput. 22(3-4): 483-484 (2010) - [j23]David J. Pym, Martin Sadler:
Information Stewardship in Cloud Computing. Int. J. Serv. Sci. Manag. Eng. Technol. 1(1): 50-67 (2010) - [c31]David J. Pym:
Modal Location-Resource-Process Logic for Access Control. LAM@LICS 2010: 2 - [c30]Matthew Collinson, Brian Monahan, David J. Pym:
Semantics for structured systems modelling and simulation. SimuTools 2010: 34 - [c29]Adam Beautement, David J. Pym:
Structured Systems Economics for Security Management. WEIS 2010
2000 – 2009
- 2009
- [j22]Matthew Collinson, Brian Monahan, David J. Pym:
A Logical and Computational Theory of Located Resource. J. Log. Comput. 19(6): 1207-1244 (2009) - [j21]Matthew Collinson, David J. Pym:
Algebra and logic for resource-based systems modelling. Math. Struct. Comput. Sci. 19(5): 959-1027 (2009) - [c28]Christos Ioannidis, David J. Pym, Julian Williams:
Investments and Trade-offs in the Economics of Information Security. Financial Cryptography 2009: 148-166 - [p1]Adam Beautement, Robert Coles, Jonathan Griffin, Christos Ioannidis, Brian Monahan, David J. Pym, M. Angela Sasse, Mike Wonham:
Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security. Managing Information Risk and the Economics of Security 2009: 141-163 - 2008
- [j20]Matthew Collinson, David J. Pym, Edmund Robinson:
Bunched polymorphism. Math. Struct. Comput. Sci. 18(6): 1091-1132 (2008) - [c27]Adam Beautement, Robert Coles, Jonathan Griffin, Christos Ioannidis, Brian Monahan, David J. Pym, M. Angela Sasse, Mike Wonham:
Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security. WEIS 2008 - 2007
- [j19]Matthew Collinson, David J. Pym, Chris M. N. Tofts:
Errata for Formal Aspects of Computing (2006) 18: 495-517 and their consequences. Formal Aspects Comput. 19(4): 551-554 (2007) - [j18]Carsten Führmann, David J. Pym:
On categorical models of classical logic and the Geometry of Interaction. Math. Struct. Comput. Sci. 17(5): 957-1027 (2007) - [c26]Guy McCusker, David J. Pym:
A Games Model of Bunched Implications. CSL 2007: 573-588 - [c25]Jean Paul Degabriele, David J. Pym:
Economic aspects of a utility computing service. GridNets 2007: 27 - [c24]Jonathan Griffin, Brian Monahan, David J. Pym, Mike Wonham, Mike Yearworth:
Assessing the Value of Investments in Network Security Operations: A Systems Analytics Approach. WEIS 2007 - [c23]David J. Pym, Chris M. N. Tofts:
Systems Modelling via Resources and Processes: Philosophy, Calculus, Semantics, and Logic. Computation, Meaning, and Logic 2007: 545-587 - 2006
- [j17]David J. Pym, Chris M. N. Tofts:
A Calculus and logic of resources and processes. Formal Aspects Comput. 18(4): 495-517 (2006) - [j16]David J. Pym:
Editorial. J. Log. Comput. 16(1): 1-3 (2006) - [c22]Matthew Collinson, David J. Pym:
Bunching for Regions and Locations. MFPS 2006: 171-197 - 2005
- [j15]David J. Pym:
Editorial. J. Log. Comput. 15(6): 819 (2005) - [j14]Didier Galmiche, Daniel Méry, David J. Pym:
The semantics of BI and resource tableaux. Math. Struct. Comput. Sci. 15(6): 1033-1088 (2005) - [c21]Matthew Collinson, David J. Pym, Edmund Robinson:
On Bunched Polymorphism. CSL 2005: 36-50 - [c20]David J. Pym, Eike Ritter:
A games semantics for reductive logic and proof-search. GALOP@ETAPS 2005: 107-123 - 2004
- [b2]David J. Pym, Eike Ritter:
Reductive logic and proof-search - proof theory, semantics, and control. Oxford logic guides 45, Oxford University Press 2004, ISBN 978-0-19-852633-9, pp. I-XV, 1-208 - [j13]David J. Pym, Peter W. O'Hearn, Hongseok Yang:
Possible worlds and resources: the semantics of BI. Theor. Comput. Sci. 315(1): 257-305 (2004) - [c19]Carsten Führmann, David J. Pym:
On the Geometry of Interaction for Classical Logic. LICS 2004: 211-220 - 2003
- [j12]David J. Pym:
Editorial. J. Log. Comput. 13(5): 633-638 (2003) - [j11]David J. Pym:
Forthcoming Papers. J. Log. Comput. 13(5): 799-800 (2003) - [j10]James Harland, David J. Pym:
Resource-distribution via Boolean constraints. ACM Trans. Comput. Log. 4(1): 56-90 (2003) - 2002
- [b1]David J. Pym:
The semantics and proof theory of the logic of bunched implications. Applied logic series 26, Kluwer 2002, ISBN 978-1-4020-0745-3, pp. I-XLIX, 1-287 - [j9]Samin S. Ishtiaq, David J. Pym:
Kripke Resource Models of a Dependently-typed, Bunched λ-calculus. J. Log. Comput. 12(6): 1061-1104 (2002) - [c18]Didier Galmiche, Daniel Méry, David J. Pym:
Resource Tableaux. CSL 2002: 183-199 - 2001
- [c17]Pablo A. Armelín, David J. Pym:
Bunched Logic Programming. IJCAR 2001: 289-304 - 2000
- [j8]Eike Ritter, David J. Pym, Lincoln A. Wallen:
Proof-terms for classical and intuitionistic resolution. J. Log. Comput. 10(2): 173-207 (2000) - [j7]Didier Galmiche, David J. Pym:
Proof-search in type-theoretic languages: an introduction. Theor. Comput. Sci. 232(1-2): 5-53 (2000) - [j6]Eike Ritter, David J. Pym, Lincoln A. Wallen:
On the intuitionistic force of classical search. Theor. Comput. Sci. 232(1-2): 299-333 (2000) - [c16]James Harland, David J. Pym, Michael Winikoff:
Forward and Backward Chaining in Linear Logic. ARW 2000 - [c15]James Harland, David J. Pym, Michael Winikoff:
Forward and Backward Chaining in Linear Logic. Workshop on Type-Theoretic Languages: Proof Search and Semantics 2000: 1-16 - [c14]David J. Pym:
Notes Towards a Semantics for Proof-search. Workshop on Type-Theoretic Languages: Proof Search and Semantics 2000: 1-18 - [i1]James Harland, David J. Pym:
Resource-distribution via Boolean constraints. CoRR cs.LO/0012018 (2000)
1990 – 1999
- 1999
- [j5]Peter W. O'Hearn, David J. Pym:
The logic of bunched implications. Bull. Symb. Log. 5(2): 215-244 (1999) - [c13]Samin S. Ishtiaq, David J. Pym:
Kripke Resource Models of a Dependently-Typed, Bunched lambda-Calculus. CSL 1999: 235-249 - [c12]David J. Pym:
On Bunched Predicate Logic. LICS 1999: 183-192 - 1998
- [j4]Samin S. Ishtiaq, David J. Pym:
A Relevant Analysis of Natural Deduction. J. Log. Comput. 8(6): 809-838 (1998) - [c11]David J. Pym:
Logic Programming with Bunched Implications. Proof Search in Type-Theoretic Languages@CADE 1998: 1-24 - 1997
- [c10]James Harland, David J. Pym:
Resource-Distribution via Boolean Constraint (Extended Abstract). CADE 1997: 222-236 - 1996
- [c9]James Harland, David J. Pym, Michael Winikoff:
Programming in Lygon: An Overview. AMAST 1996: 391-405 - [c8]James Harland, David J. Pym, Michael Winikoff:
Programming in Lygon: A System Demonstration. AMAST 1996: 599 - [c7]Eike Ritter, David J. Pym, Lincoln A. Wallen:
Proof-Terms for Classical and Intuitionistic Resolution (Extended Abstract). CADE 1996: 17-31 - [c6]Eike Ritter, David J. Pym, Lincoln A. Wallen:
On the Intuitionistic Force of Classical Search (Extended Abstract). TABLEAUX 1996: 295-311 - 1995
- [j3]David J. Pym:
A note on the proof theory of the lambda-II-calculus. Stud Logica 54(2): 199-230 (1995) - [c5]James Harland, David J. Pym, Michael Winikoff:
Programming in Lygon: A Brief Overview. ILPS 1995: 636 - 1994
- [j2]David J. Pym, James Harland:
A Uniform Proof-Theoretic Investigation of Linear Logic Programming. J. Log. Comput. 4(2): 175-207 (1994) - 1992
- [j1]David J. Pym:
A Unification Algorithm for the lambda-Pi-Calculus. Int. J. Found. Comput. Sci. 3(3): 333-378 (1992) - [c4]David J. Pym, Lincoln A. Wallen:
Logic Programming via Proof-valued Computations. ALPUK 1992: 253-262 - [c3]James Harland, David J. Pym:
On Resolution in Fragments of Classical Linear Logic. LPAR 1992: 30-41 - 1991
- [c2]James Harland, David J. Pym:
The Uniform Proof-Theoretic Foundation of Linear Logic Programming. ISLP 1991: 304-318 - 1990
- [c1]David J. Pym, Lincoln A. Wallen:
Investigations into Proof-Search in a System of First-Order Dependent Function Types. CADE 1990: 236-250
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint