


default search action
IEEE Computer, Volume 42, 2009
Volume 42, Number 1, January 2009
- Susan K. Land:

A Leadership Challenge in 2009. 6-8 - David Alan Grier:

Politics in Play. 9-12 - Neal Leavitt:

Is Cloud Computing Really Ready for Prime Time? 15-20 - Linda Dailey Paulson:

Start-up Unveils Flexible Supercomputing Approach. 21-24 - Richard T. Kouzes

, Gordon A. Anderson, Stephen T. Elbert
, Ian Gorton, Deborah K. Gracio
:
The Changing Paradigm of Data-Intensive Computing. 26-34 - Ian Bird, Bob Jones, Kerk F. Kee:

The Organization and Management of Grid Infrastructures. 36-46 - Naren Ramakrishnan

, Upinder S. Bhalla
, John J. Tyson:
Computing with Proteins. 47-56 - Mark A. Hanson, Harry C. Powell Jr., Adam T. Barth, Kyle Ringgenberg, Benton H. Calhoun, James H. Aylor, John C. Lach:

Body Area Sensor Networks: Challenges and Opportunities. 58-65 - Amar Gupta

:
The 24-Hour Knowledge Factory: Can It Replace the Graveyard Shift? 66-73 - Brian Berenbach, Manfred Broy:

Professional and Ethical Dilemmas in Software Engineering. 74-80 - Kirk W. Cameron

:
Green Introspection. 101-103 - Eyhab Al-Masri, Qusay H. Mahmoud

:
Web Service Discovery and Client Goals. 104-107 - Perry Alexander:

Rosetta: Standardization at the System Level. 108-110 - Jim Hendler

:
Web 3.0 Emerging. 111-113 - W. Neville Holmes:

The Credit Crunch and the Digital Bite. 114-116
Volume 42, Number 2, February 2009
- David Alan Grier:

Scanning the Horizon. 8-11 - Steven J. Vaughan-Nichols:

Will Mobile Computing's Future Be Location, Location, Location? 14-17 - George Lawton:

Users Take a Close Look at Visual Analytics. 19-22 - Linda Dailey Paulson:

W3C Adopts Web-Accessibility Specifications. 23-26 - Andrew S. Grimshaw, Mark M. Morgan, Duane Merrill, Hiro Kishimoto, Andreas Savva, David Snelling, Chris Smith, Dave Berry:

An Open Grid Services Architecture Primer. 27-34 - Carlos E. Caicedo

, James B. D. Joshi, Summit R. Tuladhar:
IPv6 Security Challenges. 36-42 - Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky

, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee:
Dynamic Trust Management. 44-52 - Halvard Skogsrud, Hamid R. Motahari Nezhad, Boualem Benatallah

, Fabio Casati:
Modeling Trust Negotiation for Web Services. 54-61 - Kristof Beyls, Erik H. D'Hollander:

Refactoring for Data Locality. 62-71 - Veronica Liesaputra, Ian H. Witten

, David Bainbridge
:
Creating and Reading Realistic Electronic Books. 72-81 - Matt Adcock, Jaewoo Chung, Chris Schmandt:

Are We There Yet? User-Centered Temporal Awareness. 97-99 - Dong-hyun Lee, Keun Lee, Sooyong Park, Mike Hinchey

:
A Survival Kit: Adaptive Hardware/Software Codesign Life-Cycle Model. 100-102 - Chris Swain:

Who Needs a Publisher ... or a Retailer or a Marketer? 103-105 - Abbe Mowshowitz, Nanda Kumar:

And Then There Were Three. 106-108
Volume 42, Number 3, March 2009
- David Alan Grier:

Virtual Walls. 8-10 - George Lawton:

WDM-PONs Hold Promise for the Long Haul. 13-16 - David Geer:

Networks on Processors Improve On-Chip Communications. 17-20 - Linda Dailey Paulson:

News Briefs. 21-24 - Behrooz Parhami:

Puzzling Problems in Computer Engineering. 26-29 - Gary Marchionini

, Ryen W. White:
Information-Seeking Support Systems [Guest Editors' Introduction]. 30-32 - Peter Pirolli:

Powers of 10: Modeling Complex Information-Seeking Systems at Multiple Scales. 33-40 - Ed H. Chi:

Information Seeking Can Be Social. 42-46 - Gene Golovchinsky

, Pernilla Qvarfordt, Jeremy Pickens:
Collaborative Information Seeking. 47-51 - m. c. schraefel

:
Building Knowledge: What's beyond Keyword Search? 52-59 - Diane Kelly, Susan T. Dumais, Jan O. Pedersen:

Evaluation Challenges and Directions for Information-Seeking Support Systems. 60-66 - Daniel M. Russell:

Industry-Academic Relationships. 67-68 - Denis L. Baggi, Goffredo Haus

:
IEEE 1599: Music Encoding and Interaction. 84-87 - Wayne H. Wolf:

Cyber-physical Systems. 88-89 - Itamar Arel, Scott C. Livingston:

Beyond the Turing Test. 90-91 - Rajan Samtani:

Ongoing Innovation in Digital Watermarking. 92-94 - Klaus-Dieter Lange

:
Identifying Shades of Green: The SPECpower Benchmarks. 95-97 - W. Neville Holmes:

The Automation of Originality. 98-100
Volume 42, Number 4, April 2009
- Bob Ward:

Elsewhere in the CS. 4-5 - Letters. 6-7

- David Alan Grier:

Top of the News. 10-13 - 32 and 16 Years Ago. 14-15

- Neal Leavitt:

Complex-Event Processing Poised for Growth. 17-20 - Sixto Ortiz Jr.:

Securing the Internet's Routing Infrastructure. 21-23 - Linda Dailey Paulson:

Technique Makes Strong Encryption Easier to Use. 24-27 - Seong Oun Hwang:

How Viable Is Digital Rights Management?. 28-34 - Edward Walker:

The Real Cost of a CPU Hour. 35-41 - Christof Ebert, Capers Jones:

Embedded Software: Facts, Figures, and Future. 42-52 - Hesham Shokry, Mike Hinchey

:
Model-Based Verification of Embedded Software. 53-59 - Gregory V. Chockler

, Rachid Guerraoui
, Idit Keidar, Marko Vukolic:
Reliable Distributed Storage. 60-67 - Alejandro Figueroa

, Günter Neumann, John Atkinson
:
Searching for Definitional Answers on the Web Using Surface Patterns. 68-76 - Bookshelf. 81

- Bob Ward:

CRA Survey Counts New PhDs. 87-92 - Bob Ward:

Call and Calendar. 93-94 - Josh C. Bongard:

Biologically Inspired Computing. 95-98 - Rajesh Krishna Balan, Narayan Ramasubbu

:
The Digital Wallet: Opportunities and Prototypes. 100-102 - Michael Zyda, Marc Spraragen, Balakrishnan Ranganathan:

Testing Behavioral Models with an Online Game. 103-105 - Jim Buckley

:
Requirements-Based Visualization Tools for Software Maintenance and Evolution. 106-108 - Peggy Israel Doerschuk, Jiangjiang Liu, Judith Mann:

Increasing Participation of Females and Underrepresented Minorities in Computing. 110-113 - Kai A. Olsen:

In-House Programming Is Not Passe: Automating Originality. 114-116
Volume 42, Number 5, May 2009
- Elsewhere in the CS. 4-5

- David Alan Grier:

The Dictator and the Web Design. 6-8 - 32 and 16 Years Ago. 9-10

- Steven J. Vaughan-Nichols:

Vendors Draw up a New Graphics-Hardware Approach. 11-13 - George Lawton:

The Changing Face of Open Source. 14-17 - Linda Dailey Paulson:

The Changing World of Outsourcing. 18-21 - Nathanael Paul, Andrew S. Tanenbaum

:
Trustworthy Voting: From Machine to System. 23-29 - Piotr Pacyna, Anthony M. Rutkowski, Amardeo Sarma, Kenji Takahashi:

Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems. 30-32 - David W. Chadwick

, George Inman:
Attribute Aggregation in Federated Identity Management. 33-40 - Paul Madsen, Hiroki Itoh:

Challenges to Supporting Federated Assurance. 42-49 - Federica Paci

, Rodolfo Ferrini, Andrea Musci, Kevin Steuer Jr., Elisa Bertino:
An Interoperable Approach to Multifactor Identity Verification. 50-57 - Gabriel López, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta

, Joao Girão:
A SWIFT Take on Identity Management. 58-65 - Manuel Barranco

, Julián Proenza
, Luís Almeida
:
Boosting the Robustness of Controller Area Networks: CANcentrate and ReCANcentrate. 66-73 - Bob Ward:

Computer Society Connection. 79-83 - Bookshelf. 86

- Kirk W. Cameron

:
The Road to Greener IT Pastures. 87-89 - Ken Birman

, Jared Cantwell, Daniel A. Freedman, Qi Huang, Petko Nikolov, Krzysztof Ostrowski:
Edge Mashups for Service-Oriented Collaboration. 90-94 - Ali El Kateeb:

Hardware Reconfiguration Capability for Third-Generation Sensor Nodes. 95-97 - Bernard J. Jansen

, Theresa Flaherty
, Ricardo Baeza-Yates
, Lee Hunter, Brendan Kitts, Jamie Murphy
:
The Components and Impact of Sponsored Search. 98-101 - W. Neville Holmes:

The Design of Government. 102-104
Volume 42, Number 6, June 2009
- Computer Highlights Society Magazines. 4-5

- Letters. 6-7

- David Alan Grier:

Marking the Fall of Sparrows. 9-12 - 32 and 16 Years Ago. 13-14

- David Geer:

The Future of Mobile VoIP in the Enterprise. 15-18 - George Lawton:

On the Trail of the Conficker Worm. 19-22 - Linda Dailey Paulson:

Materials Breakthrough Could Eliminate Bootups. 23-25 - Rolf Oppliger, Ruedi Rytz, Thomas Holderegger:

Internet Banking: Client-Side Attacks and Protection Mechanisms. 27-33 - Awais Rashid

, John Weckert, Richard Lucas:
Software Engineering Ethics in a Digital World. 34-41 - Amela Karahasanovic, Petter Bae Brandtzæg

, Jeroen Vanattenhoven
, Bram Lievens, Karen Torben Nielsen, Jo Pierson:
Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications. 42-49 - Wolter Pieters, André van Cleeff:

The Precautionary Principle in a World of Digital Dependencies. 50-56 - Tetsuo Tamai:

Social Impact of Information System Failures. 58-65 - Donald Gotterbarn

, Keith W. Miller
:
The Public is the Priority: Making Decisions Using the Software Engineering Code of Ethics. 66-73 - Bob Ward:

IEEE Foundation Gives Away More Than $300, 000. 78-79 - Bob Ward:

Call and Calendar. 80-81 - Bookshelf. 85

- Sunny Consolvo, James A. Landay, David W. McDonald:

Designing for Behavior Change in Everyday Life. 86-89 - Emil Vassev, Mike Hinchey

:
ASSL: A Software Engineering Approach to Autonomic Computing. 90-93 - Alexander Yates:

Extracting World Knowledge from the Web. 94-97 - Jungwoo Ryoo

, Phillip A. Laplante, Rick Kazman:
In Search of Architectural Patterns for Software Security. 98-100 - Atanas Radenski:

Expanding Computing as an Academic Service Discipline. 101-104
Volume 42, Number 7, July 2009
- Elsewhere in the CS. 4-5

- David Alan Grier:

The Character of Play. 7-9 - 32 and 16 Years Ago. 10-11

- Sixto Ortiz Jr.:

IEEE 802.11n: The Road Ahead. 13-15 - Linda Dailey Paulson:

Software-Based Networking Approach Could Help Internet Research. 16-19 - Carl K. Chang:

Reversing the Bipolar Drift. 20-24 - Muhammad Ali Babar, Ian Gorton:

Software Architecture Review: The State of Practice. 26-32 - Oliver Bimber:

Visual Effects and Beyond. 33-34 - Doug Roble, Nafees Bin Zafar:

Don't Trust Your Eyes: Cutting-Edge Visual Effects. 35-41 - Graham A. Thomas

, Oliver Grau:
Virtual Graphics for Broadcast Production. 42-47 - Xubo Yang, Milo K. Yip, Xiaoyue Xu:

Visual Effects in Computer Games. 48-56 - Scott Trowbridge, Christopher B. Stapleton:

Melting the Boundaries Between Fantasy and Reality. 57-62 - Brian Whitworth, Tong Liu:

Channel E-mail: A Sociotechnical Response to Spam. 63-72 - Bookshelf. 77

- Bob Ward:

Computer Society Presents Technical Awards. 81-84 - Bob Ward:

Call and Calendar. 85 - Gerald T. Lane:

Best Practices for Standards Communities. 86-87 - V. S. Subrahmanian:

Mining Online Opinions. 88-90 - Amip Shah, Tom Christian, Chandrakant D. Patel, Cullen E. Bash

, Ratnesh K. Sharma:
Assessing ICT's Environmental Impact. 91-93 - Henry E. Schaffer, Samuel F. Averitt, Marc I. Hoit

, Aaron Peeler, Eric D. Sills
, Mladen A. Vouk:
NCSU's Virtual Computing Lab: A Cloud Computing Solution. 94-97 - W. Neville Holmes:

Agility and Respect. 98-100
Volume 42, Number 8, August 2009
- Elsewhere in the CS. 4-5

- Letters. 6-7

- David Alan Grier:

Welcome to the Family. 8-10 - 32 and 16 Years Ago. 11-12

- Steven J. Vaughan-Nichols:

Game-Console Makers Battle over Motion-Sensitive Controllers. 13-15 - Linda Dailey Paulson:

Caching Scheme Could Boost Developing World's Internet Access. 16-18 - Charles Rich:

Building Task-Based User Interfaces with ANSI/CEA-2018. 20-27 - Naren Ramakrishnan

:
The Pervasiveness of Data Mining asnd Machine Learning. 28-29 - Yehuda Koren, Robert M. Bell, Chris Volinsky:

Matrix Factorization Techniques for Recommender Systems. 30-37 - Andreas Krause

, Carlos Guestrin:
Optimizing Sensing: From Water to the Web. 38-45 - Ross D. King

, Jem J. Rowland, Wayne Aubrey, Maria Liakata
, Magdalena Markham, Larisa N. Soldatova, Ken E. Whelan, Amanda Clare
, Mike Young, Andrew Sparkes, Stephen G. Oliver, Pinar Pir:
The Robot Scientist Adam. 46-54 - Tao Xie, Suresh Thummalapenta, David Lo

, Chao Liu:
Data Mining for Software Engineering. 55-62 - John C. Lach, Vinu Vijay Kumar:

Application-Specific Product Generics. 64-74 - IEEE President-Elect Candidates Address Computer Society Concerns. 79-84

- Bob Ward:

Benjamin Wah Wins 2008 Kanai Award. 85-89 - Bob Ward:

Call and Calendar. 90-92 - Bookshelf. 93

- Rick Kuhn, Raghu Kacker, Yu Lei, Justin Hunter:

Combinatorial Software Testing. 94-96 - Naren Ramakrishnan

, Debprakash Patnaik, Vandana Sreedharan:
Temporal Process Discovery in Many Guises. 97-101 - Sorel Reisman

:
Using Learning Objects to Affect Educational Outcomes. 102-104 - John Viega:

Cloud Computing and the Common Man. 106-108 - Maurice Chu:

Natural and Implicit Interaction Systems. 109-111 - Noel E. Sharkey:

The Robot Arm of the Law Grows Longer. 113-116
Volume 42, Number 9, September 2009
- Computer Highlights Society Magazines. 4-5

- Letters to the Editor. 6-7

- David Alan Grier:

Data of the Night. 8-11 - 32 and 16 Years Ago. 12-13

- George Lawton:

Routing Faces Dramatic Changes. 15-17 - Linda Dailey Paulson:

HP Announces Breakthrough in Affordable, Flexible Displays. 18-21 - Simon Moncrieff, Svetha Venkatesh

, Geoff A. W. West:
Dynamic Privacy in Public Surveillance. 22-28 - Jean-Raymond Abrial:

Faultless Systems: Yes We Can!. 30-36 - Sue Black, Paul Boca, Jonathan P. Bowen

, Jason Gorman, Mike Hinchey
:
Formal Versus Agile: Survival of the Fittest. 37-45 - Bertrand Meyer, Arno Fiva, Ilinca Ciupa, Andreas Leitner, Yi Wei, Emmanuel Stapf:

Programs That Test Themselves. 46-55 - Daniel E. Cooke, J. Nelson Rushton:

Taking Parnas's Principles to the Next Level: Declarative Language Design. 56-63 - Bashar Nuseibeh

, Charles B. Haley, Craig J. Foster
:
Securing the Skies: In Requirements We Trust. 64-72 - Bob Ward:

IEEE Computer Society Election. 73-80 - Bob Ward:

Call and Calendar. 81-82 - Bookshelf. 83

- Sumi Helal

:
University-Industry Synergy: An Eclectic Dialog for Revised Relationships. 88-89 - Vishnu S. Pendyala

, Simon S. Y. Shim:
The Web as the Ubiquitous Computer. 90-92 - Sandeep K. Shukla

:
Model-Driven Engineering and Safety-Critical Embedded Software. 93-95 - Doug Vogel, Michiel van Genuchten, Carol S. Saunders:

IS Innovation: Thinking Beyond the Silo. 96-98 - Krishna Kant:

Toward a Science of Power Management. 99-101 - W. Neville Holmes:

Music, Sociality, and Digital Technology. 102-104
Volume 42, Number 10, October 2009
- Computer Highlights Society Magazines. 4-5

- Letters. 6-7

- David Alan Grier:

The Marketplace of Ideas. 8-11 - 32 and 16 Years Ago. 12-13

- David Geer:

The OS Faces a Brave New World. 15-17 - Researchers Develop Application to Identify Ancient Documents. 18-20

- Gordon S. Blair, Nelly Bencomo, Robert B. France:

Models@ run.time. 22-27 - Shahar Maoz

:
Using Model-Based Traces as Runtime Models. 28-36 - Carlos Cetina

, Pau Giner, Joan Fons
, Vicente Pelechano
:
Autonomic Computing through Reuse of Variability Models at Runtime: The Case of Smart Homes. 37-43 - Brice Morin, Olivier Barais

, Jean-Marc Jézéquel
, Franck Fleurey, Arnor Solberg
:
Models@ Run.time to Support Dynamic Adaptation. 44-51 - John C. Georgas

, André van der Hoek, Richard N. Taylor:
Using Architectural Models to Manage and Visualize Runtime Adaptation. 52-60 - Tony Gjerlufsen, Mads Ingstrup, Jesper Wolff, Olsen Olsen:

Mirrors of Meaning: Supporting Inspectable Runtime Models. 61-68 - Kenneth Hoste, Lieven Eeckhout:

A Methodology for Analyzing Commercial Processor Performance Numbers. 70-76 - Ahmed Abbasi

, Hsinchun Chen:
A Comparison of Tools for Detecting Fake Websites. 78-86 - Bookshelf. 92

- Bob Ward:

Computer Society Awards Recognize Excellence. 93-95 - Bob Ward:

Call and Calendar. 96 - Yaw Anokwa, Carl Hartung, Waylon Brunette

, Gaetano Borriello, Adam Lerer:
Open Source Data Collection in the Developing World. 97-99 - Peter B. Henderson:

Ubiquitous Computational Thinking. 100-102 - Nikolaos Petrakos, George W. Dinolt, James Bret Michael, Pantelimon Stanica

:
Cube-Type Algebraic Attacks on Wireless Encryption Protocols. 103-105 - Tiziana Margaria

, Bernhard Steffen:
Continuous Model-Driven Engineering. 106-109 - Luis Fernández Sanz

:
Personal Skills for Computing Professionals. 110-112
Volume 42, Number 11, November 2009
- Computer Highlights Society Magazines. 4-5

- Letters. 6-7

- David Alan Grier:

Bad Alignment. 8-11 - 32 and 16 Years Ago. 12-13

- Neal Leavitt:

Anonymization Technology Takes a High Profile. 15-18 - Linda Dailey Paulson:

System Takes New Approach to Speech Search. 20-23 - Adolfy Hoisie, Vladimir Getov

:
Extreme-Scale Computing. 24-26 - Josep Torrellas:

Architectures for Extreme-Scale Computing. 28-35 - Yuichiro Ajima, Shinji Sumimoto, Toshiyuki Shimizu:

Tofu: A 6D Mesh/Torus Interconnect for Exascale Computers. 36-40 - Kevin J. Barker

, Kei Davis
, Adolfy Hoisie, Darren J. Kerbyson, Michael Lang
, Scott Pakin
, José Carlos Sancho
:
Using Performance Modeling to Design Large-Scale Systems. 42-49 - Michael Wilde, Ian T. Foster, Kamil Iskra

, Peter H. Beckman, Zhao Zhang, Allan Espinosa, Mihael Hategan
, Ben Clifford
, Ioan Raicu
:
Parallel Scripting for Applications at the Petascale and Beyond. 50-60 - David Donofrio, Leonid Oliker, John Shalf

, Michael F. Wehner
, Chris Rowen, Jens Krueger, Shoaib Kamil, Marghoob Mohiyuddin:
Energy-Efficient Computing for Extreme-Scale Science. 62-71 - Munindar P. Singh

, Amit K. Chopra
, Nirmit Desai:
Commitment-Based Service-Oriented Architecture. 72-79 - Bob Ward:

Society Supports Software Engineering PE Examination. 87-89 - Bookshelf. 92

- Shel Finkelstein:

Managing Interns. 93-95 - Miguel Carrero:

Innovation for the Web 2.0 Era. 96-98 - Kirk W. Cameron

:
My IT Carbon Footprint. 99-101 - Harry L. Reif, Richard G. Mathieu:

Global Trends in Computing Accreditation. 102-104 - W. Neville Holmes:

Truth and Breadth, Clarity and Depth in Algebra. 106-108
Volume 42, Numner 12, December 2009
- Computer Highlights Society Magazines. 4-5

- Letters to the Editor. 6-8

- Susan K. Land:

Implementing Organizational Strategies: Progress Made in 2009. 9-11 - David Alan Grier:

Honor Among Thieves. 12-15 - 32 and 16 Years Ago. 16-17

- Steven J. Vaughan-Nichols:

Augmented Reality: No Longer a Novelty? 19-22 - Linda Dailey Paulson:

Programming Language Enables Creative Visualization. 23-25 - Wu-chun Feng, Pavan Balaji:

Tools and Environments for Multicore and Many-Core Architectures. 26-27 - Scott Schneider, Jae-Seung Yeom

, Dimitrios S. Nikolopoulos
:
Programming Multiprocessors with Explicitly Managed Memory Hierarchies. 28-34 - Chirag Dave, Hansang Bae, Seung-Jai Min, Seyong Lee

, Rudolf Eigenmann, Samuel P. Midkiff
:
Cetus: A Source-to-Source Compiler Infrastructure for Multicores. 36-42 - Nathan R. Tallent, John M. Mellor-Crummey

:
Identifying Performance Bottlenecks in Work-Stealing Computations. 44-50 - Terence Kelly, Yin Wang, Stéphane Lafortune

, Scott A. Mahlke:
Eliminating Concurrency Bugs with Control Engineering. 52-60 - Sergio L. Toral Marín

, Manuel Vargas
, Federico Barrero
:
Embedded Multimedia Processors for Road-Traffic Parameter Estimation. 61-68 - Bob Ward:

Reisman Voted 2010 Computer Society President-Elect. 69-70 - Bob Ward:

Miura Wins Cray Award. 71-73 - Bookshelf. 82

- Andrea Apolloni, V. S. Anil Kumar, Madhav V. Marathe, Samarth Swarup:

Computational Epidemiology in a Connected World. 83-86 - Yang Li:

Beyond Pinch and Flick: Enriching Mobile Gesture Interaction. 87-89 - Alexander J. Beecroft, James Bret Michael:

Passive Fingerprinting of Network Reconnaissance Tools. 91-93 - Gregory W. Hislop:

The Inevitability of Teaching Online. 94-96 - Manfred Broy, Mario Gleirscher

, Stefano Merenda, Doris Wild, Peter Kluge, Wolfgang Krenzer:
Toward a Holistic and Standardized Automotive Architecture Description. 98-101 - Simone Santini

:
Simplifying Humans. 102-104

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














