


default search action
26th AINA 2012: Fukuoka, Japan
- Leonard Barolli, Tomoya Enokido, Fatos Xhafa, Makoto Takizawa:

IEEE 26th International Conference on Advanced Information Networking and Applications, AINA, 2012 , Fukuoka, Japan, March 26-29, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-0714-7
Keynotes
- Shoichi Noguchi:

The Design Principle of the Robust Communication System under the Great Disaster Environment. 1-4 - David Taniar:

High Performance Database Processing. 5-6 - Fatos Xhafa:

Data Replication and Synchronization in P2P Collaborative Systems. 7
Internet Computing and Web Applications
- Yi Chen, Ajit Narayanan, Shaoning Pang

, Ban Tao:
Malicioius Software Detection Using Multiple Sequence Alignment and Data Mining. 8-14 - Sijin He

, Li Guo, Yike Guo
, Chao Wu, Moustafa Ghanem
, Rui Han:
Elastic Application Container: A Lightweight Approach for Cloud Resource Provisioning. 15-22 - Shin Tezuka, Ryuya Uda, Kenichi Okada:

ADEC: Assured Deletion and Verifiable Version Control for Cloud Storage. 23-30 - Sachiko Nakagawa, Naoto Ohyama, Kazuaki Sakaguchi, Hisashi Nakayama, Noboru Igarashi, Ryota Tsunoda, Shogo Shimizu, Masahiko Narita, Yuka Kato

:
A Distributed Service Framework for Integrating Robots with Internet Services. 31-37
Wireless Mesh Networks
- Sanjay Kumar Dhurandher, Isaac Woungang, Kirti Kumar, Mamta Joshi, Monika Verma:

A Rate Adaptive Admission Control Protocol for Multimedia Wireless Mesh Networks. 38-43 - Byoungheon Shin, Seon-Yeong Han, Dongman Lee:

Dynamic Link Quality Aware Routing Protocol for Multi-radio Wireless Mesh Networks. 44-50 - Chien-Yu Wu, Hann-Jang Ho, Sing-Ling Lee, Shu-Jye Chang:

Energy-Aware Link Scheduling Algorithms to Maximize Life Cycle of Relay Nodes on IEEE 802.16e Mesh Networks. 51-58 - Jie Zhou, Jiannong Cao

, Jun Zhang, Chisheng Zhang, Yao Yu:
Analysis and Countermeasure for Wormhole Attacks in Wireless Mesh Networks on a Real Testbed. 59-66
Dependable and Fault Tolerant Systems
- Minoru Uehara:

Design and Implementation of Mesh RAID with Multiple Parities in Virtual Large-Scale Disks. 67-72 - Darko Petrovic, André Schiper:

Implementing Virtual Machine Replication: A Case Study Using Xen and KVM. 73-80 - Hanane Abdeldjelil, Noura Faci, Zakaria Maamar

, Djamal Benslimane:
A Diversity-Based Approach for Managing Faults in Web Services. 81-88 - Noriki Uchida, Kazuo Takahata, Yoshitaka Shibata, Norio Shiratori:

A Large Scale Robust Disaster Information System Based on Never Die Network. 89-96
Vehicular Networks and Applications
- Chung-Ming Huang, Tzu-Hua Lin, Cheng-Hsiu Chang:

The Proactive Member-Centric Routing Protocol Using the Several Strategy (PMCS) for the Fleet Scenario in the Hybrid VANET. 97-104 - Naruhiro Kusumine, Susumu Ishihara

:
Abiding Regional Data Distribution Using Relay and Random Network Coding on VANETs. 105-112 - Jason Barnes, Vamsi Paruchuri

:
Optimal Phase Ordering of Traffic Signals to Reduce Stopped Delay. 113-119
Energy-Efficient Wireless Networks
- Stefan Föll, Klaus Herrmann, Kurt Rothermel:

Energy-Efficient Update Protocols for Mobile User Context. 120-127 - Yuan-Po Chi, Hsung-Pin Chang

:
TARS: An Energy-Efficient Routing Scheme for Wireless Sensor Networks with Mobile Sinks and Targets. 128-135 - Patrick Baier, Frank Dürr

, Kurt Rothermel:
PSense: Reducing Energy Consumption in Public Sensing Systems. 136-143 - Subhasis Dash

, Amulya Ratna Swain
, Anuja Ajay
:
Reliable Energy Aware Multi-token Based MAC Protocol for WSN. 144-151
Intelligent Systems and Applications
- Khamisi Kalegele

, Hideyuki Takahashi, Johan Sveholm, Kazuto Sasai, Gen Kitagata, Tetsuo Kinoshita
:
On-demand Data Numerosity Reduction for Learning Artifacts. 152-159 - Sheng-Tzong Cheng, Ju-Hsien Chou:

Fuzzy-Based Actuators Controlling for Minimizing Power Consumption in Cyber-physical System. 160-166 - Hongzhi Liu

, Zhonghai Wu, D. Frank Hsu:
Combination of Multiple Retrieval Systems Using Rank-Score Function and Cognitive Diversity. 167-174
Distributed Database and Data Mining
- Hisashi Koga, Masayuki Oguri, Toshinori Watanabe:

MIXED-LSH: Reduction of Remote Accesses in Distributed Locality-Sensitive Hashing Based on L1-distance. 175-182 - Viet Phan-Luong:

Auto Determining Parameters in Class-Association Mining. 183-190 - Qian Wu, Feilong Tang, Li Li, Leonard Barolli, Ilsun You, Yi Luo, Huakang Li:

Recommendation of More Interests Based on Collaborative Filtering. 191-198 - Jason Thompson, J. Wenny Rahayu, Torab Torabi:

An Interactive Region-Based Filter for Moving Objects Datasets: Making Sense of Chaos. 199-206
Communication Protocols
- Yuan-Cheng Lai, Yen-Hung Chen

, Ching-Neng Lai:
A Channel Quality Aware Algorithm for IEEE 802.16 Uplink Burst Construction. 207-214 - Satoshi Utsumi, Salahuddin Muhammad Salim Zabir:

Utilization-based Congestion Control: Improvement of Friendliness with TCP over Wireless Links. 215-220 - Yan-Jing Wu, Tsang-Ling Sheu, I-Chieh Lin:

A Bandwidth Negotiation Scheduling for Prioritized Traffic in MMR Networks. 221-228 - Prasanthi Sreekumari, Sang-Hwa Chung, Yong-Hyun Jo:

A New Loss Recovery Algorithm for Increasing the Performance of TCP Over Wireless Mesh Networks. 229-236
Pervasive/Ubiquitous Computing and Services
- Quang Tran Minh, Muhammad Ariff Baharudin, Eiji Kamioka

:
Uncertain Low Penetration Rate - A Practical Issue in Mobile Intelligent Transportation Systems. 237-244 - Daijiro Komaki, Takahiro Hara, Shojiro Nishio:

How Does Mobile Context Affect People's Web Search Behavior?: A Diary Study of Mobile Information Needs and Search Behaviors. 245-252 - Jiantao Wang, Kam-yiu Lam

, Song Han, Sang Hyuk Son, Aloysius K. Mok:
On Co-scheduling of Periodic Update and Application Transactions with Fixed Priority Assignment for Real-Time Monitoring. 253-260 - Quan Jia Cheng, Joseph Kee-Yin Ng

, Kevin Chin Yiu Shum:
A Wireless LAN Location Estimation System Using Center of Gravity as an Algorithm Selector for Enhancing Location Estimation. 261-268
Intelligent Computing and Networks
- Li-Yeh Chuang, Cheng-Yi Chiang, Cheng-Hong Yang:

A Quantum Genetic Algorithm for Operon Prediction. 269-275 - Yeim-Kuan Chang, Chao-Yen Chien:

Layer Partitioned Search Tree for Packet Classification. 276-282 - Li-Yeh Chuang, Li-Wei Huang, Cheng-Hong Yang:

Chaos Embedded Particle Swarm Optimization for Tag Single Nucleotide Polymorphism Selection. 283-288 - Daniel L. Kovacs, Wuyungerile Li, Naoki Fukuta

, Takashi Watanabe
:
Mixed Observability Markov Decision Processes for Overall Network Performance Optimization in Wireless Sensor Networks. 289-298
Communication Systems
- Fatos Xhafa

, Junzi Sun, Admir Barolli, Makoto Takizawa
, Kazunori Uchida:
Evaluation of Genetic Algorithms for Single Ground Station Scheduling Problem. 299-306 - Yuncheng Zhu, Akihiro Nakao

:
Upload Cache in Edge Networks. 307-313 - Ming-Feng Chang, Chi-Hua Chen

:
Temporary Call-Back Telephone Number Service. 314-318 - Raymond Peterkin, Dan Ionescu:

An Architecture for Heterogeneous Data Dissemination Using IMS. 319-325
Distributed Systems and Networking
- Damien Imbs, Michel Raynal:

Trying to Unify the LL/SC Synchronization Primitive and the Notion of a Timed Register. 326-330 - Konstantin Mikhaylov

, Jouni Tervonen
:
Experimental Evaluation of Alkaline Batteries's Capacity for Low Power Consuming Applications. 331-337 - Markus Aleksy

, Axel Korthaus
:
Time-Dependent Execution Pattern. 338-343 - Hiroshi Umeo:

Realizing Global Synchronizations for Locally-Connected Two-Dimensional Rectangle Cellular Arrays. 344-351
Semantics Computing and Networks
- Mohamed Amin Sakka, Bruno Defude

, Jorge Tellez:
A Semantic Framework for the Management of Enriched Provenance Logs. 352-359 - Julian Schütte

:
Goal-Based Policies for Self-Protecting Systems. 360-367 - Annie Ibrahim Rana, Brendan Jennings

:
Semantic Uplift of Monitoring Data to Select Policies to Manage Home Area Networks. 368-375 - Vivek Natarajan, Sencun Zhu, Mudhakar Srivatsa, Jeff Opper:

Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-hoc Networks. 376-383
Ad Hoc Networks and Routing
- Elis Kulla, Makoto Ikeda, Tetsuya Oda, Leonard Barolli, Fatos Xhafa

, Aleksander Biberaj:
Evaluation of a MANET Testbed in Outdoor Bridge Environment Using BATMAN Routing Protocol. 384-390 - Po-Jen Chuang, Po-Hsun Yen, Ting-Yi Chu:

Efficient Route Discovery and Repair in Mobile Ad-hoc Networks. 391-398 - Chhagan Lal

, Vijay Laxmi
, Manoj Singh Gaur:
A Node-Disjoint Multipath Routing Method Based on AODV Protocol for MANETs. 399-405 - Deepali Arora, Eamon Millman, Stephen W. Neville:

Assessing the Expected Performance of the OLSR Routing Protocol for Denser Urban Core Ad Hoc Network Deployments. 406-414
P2P Networks and Applications
- Khalid Ashraf, Rachid Anane

, Behzad Bordbar:
File Management in a Mobile DHT-based P2P Environment. 415-422 - Kazuma Kadowaki, Satoshi Fujita:

Collaborative Admission Control Scheme for Group-Based P2P Contents Sharing Systems. 423-430 - S. M. Saif Shams, Paal E. Engelstad, Amund Kvalbein:

On Randomness in ISP-friendly P2P Applications. 431-437 - Nicolas Hidalgo

, Erika Rosas, Luciana Arantes
, Olivier Marin
, Pierre Sens
, Xavier Bonnaire:
Optimized Range Queries for Large Scale Networks. 438-445
Wireless Sensor Networks and Applications
- Sunil Kumar Vuppala, Animikh Ghosh, Ketan A. Patil, Kumar Padmanabh

:
A Scalable WSN Based Data Center Monitoring Solution with Probabilistic Event Prediction. 446-453 - Tetsuya Oda, Admir Barolli, Evjola Spaho

, Fatos Xhafa
, Leonard Barolli, Makoto Takizawa
, Kazunori Uchida:
Effect of Population Size for Node Placement in WMNs Considering Giant Component and Number of Covered Users Parameters. 454-459 - Ikjune Yoon, Dong Kun Noh

, Dongeun Lee, Rony Teguh
, Toshihisa Honma, Heonshik Shin:
Reliable Wildfire Monitoring with Sparsely Deployed Wireless Sensor Networks. 460-466
Mobile Networks and Applications
- Muhammad Qasim Khan

, Steinar Hidle Andresen:
Zero Scanning Time for 802.11 Networks by Using Media Independent Information Server (MIIS). 467-473 - Liang Zhou, Xiaohui Li, Yongqiang Hei, Weiyi Yin:

Channel Orthogonalization (CO) and its Combination with THP (CO-THP) for Multiuser MIMO Systems. 474-478 - Sheetal Jadhav, Haibo Zhang

, Zhiyi Huang:
MOS-based Handover Protocol for Next Generation Wireless Networks. 479-486 - Muhammad Ariff Baharudin, Quang Tran Minh, Eiji Kamioka

:
Evaluations of Ant Colony Optimization Inspired SCTP Optimal Path Selection Using E-model. 487-494
Trust and Security
- Dong Hao, Kouichi Sakurai:

A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Networks. 495-502 - Nitin Chiluka, Nazareno Andrade, Dimitra Gkorou, Johan A. Pouwelse

:
Personalizing EigenTrust in the Face of Communities and Centrality Attack. 503-510 - Sadegh Dorri Nogoorani

, Rasool Jalili:
Uncertainty in Probabilistic Trust Models. 511-517 - Sazia Parvin

, Farookh Khadeer Hussain:
Trust-Based Security for Community-Based Cognitive Radio Networks. 518-525
Cloud Computing and Systems
- Ding-Jie Huang, Kai-Ting Yang, Chien-Chun Ni, Wei-Chung Teng, Tien-Ruey Hsiang, Yuh-Jye Lee

:
Clock Skew Based Client Device Identification in Cloud Environments. 526-533 - Lingfang Zeng

, Bharadwaj Veeravalli, Xiaorong Li:
ScaleStar: Budget Conscious Scheduling Precedence-Constrained Many-task Workflow Applications in Cloud. 534-541 - William Voorsluys, Rajkumar Buyya:

Reliable Provisioning of Spot Instances for Compute-intensive Applications. 542-549 - Ricky K. K. Ma, Cho-Li Wang:

Lightweight Application-Level Task Migration for Mobile Cloud Computing. 550-557
Communication Networks and Routing
- Xiangyang Jin, Thomas Kunz, Ivan Stojmenovic:

Multi-retransmission Route Discovery Schemes for Ad Hoc Wireless Networks with a Realistic Physical Layer. 558-565 - Ching-Fang Hsu, Tzu-Huan Tang:

On Multicast Routing with Traffic Grooming in Light-Trail Networks. 566-572 - Muhammad Siraj Rathore

, Markus Hidell, Peter Sjödin:
PC-based Router Virtualization with Hardware Support. 573-580 - Donghong Qin, Jiahai Yang, Zhuolin Liu, Jessie Hui Wang, Bin Zhang, Wei Zhang:

AMIR: Another Multipath Interdomain Routing. 581-588
QoS and Service Oriented Architecture
- Miroslav Zivkovic, Joost W. Bosman, Hans van den Berg, Rob van der Mei, Hendrik B. Meeuwissen, Rudesindo Núñez-Queija

:
Run-time Revenue Maximization for Composite Web Services with Response Time Commitments. 589-596 - Tadateru Ohkawara, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa

:
Completable Quorums of Multimedia Objects. 597-604 - Quang Hieu Vu, Tran Vu Pham, Hong Linh Truong

, Schahram Dustdar
, Rasool Asal:
DEMODS: A Description Model for Data-as-a-Service. 605-612 - Simone A. Ludwig:

Applying Particle Swarm Optimization to Quality-of-Service-Driven Web Service Composition. 613-620
Mobile and Ad Hoc Networks
- Makoto Ikeda, Elis Kulla, Masahiro Hiyama, Leonard Barolli, Makoto Takizawa

:
Impact of Multi-flow Traffic in Wireless Mobile Ad-hoc Networks. 621-628 - Evjola Spaho

, Makoto Ikeda, Leonard Barolli, Fatos Xhafa
, Aleksander Biberaj, Jiro Iwashige:
Performance Comparison of DSDV and DYMO Protocols for Vehicular Ad Hoc Networks. 629-634 - Shyr-Kuen Chen, Pi-Chung Wang

:
Shortcut Anycast Tree Routing in MANETs. 635-640 - Dang-Quang Bui, Won-Joo Hwang:

Proportionally Quasi-fair Scheduling Optimization in Wireless Ad Hoc Networks. 641-648
Multimedia and Social Networking
- Joseph C. Tsai, Timothy K. Shih, Kanoksak Wattanachote, Kuan-Ching Li

:
Video Editing Using Motion Inpainting. 649-654 - Leila Weitzel

, Paulo Quaresma
, José Palazzo M. de Oliveira
:
Evaluating Quality of Health Information Sources. 655-662 - Makoto Kikkawa, Ginga Kamei, Ken-ichi Okada:

Instruction for Remote MR Cooperative Work with Captured Still Worker's View Video. 663-670 - Hiroaki Nishino, Yuki Fukakusa, Akari Hatano, Tsuneo Kagawa, Kouichi Utsumiya:

A Tangible Information Explorer Using Vibratory Touch Screen. 671-677
Authentication and Secure Systems
- Toan-Thinh Truong, Minh Tran, Anh Duc Duong:

Robust Mobile Device Integration of a Fingerprint Biometric Remote Authentication Scheme. 678-685 - Danilo Valeros Bernardo, Doan B. Hoang:

Compositional Logic for Proof of Correctness of Proposed UDT Security Mechanisms. 686-694 - Amlan Jyoti Choudhury, Hyotaek Lim, Hoon-Jae Lee:

An Efficient FPGA Design of PingPong-128 Stream Cipher for Secure Computing. 695-700 - Po-Jen Chuang, Yi-Ping Liao:

Efficient and Secure Cross-Realm Client-to-Client Password-Authenticated Key Exchange. 701-708
Wireless Sensor Networks
- Tao Yang, Tetsuya Oda, Leonard Barolli, Jiro Iwashige, Arjan Durresi, Fatos Xhafa

:
Investigation of Packet Loss in Mobile WSNs for AODV Protocol and Different Radio Models. 709-715 - Junichi Honda, Kazunori Uchida:

Analysis of Field Intensity Distribution in Inhomogeneous Propagation Environment. 716-723 - Tianzhen Cheng, Ping Li, Sencun Zhu:

An Algorithm for Jammer Localization in Wireless Sensor Networks. 724-731 - Karel Heurtefeux

, Fabrice Valois:
Is RSSI a Good Choice for Localization in Wireless Sensor Network? 732-739
Cryptographic Techniques and Systems
- Hsiao-Ying Lin, Shiuan-Tzuo Shen, Wen-Guey Tzeng, Bao-Shuh Paul Lin:

Toward Data Confidentiality via Integrating Hybrid Encryption Schemes and Hadoop Distributed File System. 740-747 - Shang-Ming Jen, Tse-Lin Lai, Chia-Yu Lu, Jar-Ferr Yang:

Knapsack Cryptosystems and Unreliable Reliance on Density. 748-754 - Munetoshi Iwakiri, Ta Minh Thanh:

Fundamental Incomplete Cryptography Method to Digital Rights Management Based on JPEG Lossy Compression. 755-762 - Munetoshi Iwakiri, Ta Minh Thanh:

Incomplete Cryptography Method Using Invariant Huffman Code Length to Digital Rights Management. 763-770
P2P and Scalable Systems
- Jun'ichi Shimada, Kei Ohnishi, Hitomi Tamura

, Yuji Oie:
Inducing Scale-Free Characteristics of Dynamic Unstructured P2P Networks. 771-778 - Davi da Silva Böger, Joni da Silva Fraga, Eduardo Adílio Pelinson Alchieri, Michelle S. Wangham

:
Intrusion-Tolerant Shared Memory through a P2P Overlay Segmentation. 779-786 - Yusuke Gotoh, Tomoki Yoshihisa, Hideo Taniguchi, Masanori Kanazawa, J. Wenny Rahayu, Yi-Ping Phoebe Chen

:
A Scheduling Method for Node Relay-based Webcast Considering Reconnection. 787-794 - Hoai Son Nguyen, Yasuo Tan, Yoichi Shinoda:

Building Distributed Attribute-Value Trees on DHT-based Networks. 795-802
Wireless Sensor Networks and Systems
- Jeongcheol Lee, Hosung Park, Seungmin Oh, Yongbin Yim, Sang-Ha Kim

:
A Radio-disjoint Geographic Multipath Routing in Wireless Sensor Networks. 803-809 - Haosong Gou, Younghwan Yoo:

A Low Cost Reliable Data Transmission Protocol over Multipath in Wireless Sensor Networks. 810-816 - Seungmin Oh, Yongbin Yim, Jeongcheol Lee, Hosung Park, Sang-Ha Kim

:
A Reliable Communication Strategy for Real-Time Data Dissemination in Wireless Sensor Networks. 817-823 - Chih-Yung Cheng, Chi-Cheng Chuang, Ray-I Chang

:
Three-Dimensional Location-Based IPv6 Addressing for Wireless Sensor Networks in Smart Grid. 824-831
Communication Systems and Networks
- Ilpo Järvinen, Aaron Yi Ding, Aki Nyrhinen, Markku Kojo:

Harsh RED: Improving RED for Limited Aggregate Traffic. 832-840 - Jiseon Lee, Hyeonmok Ko, Cheeha Kim:

Distributed Reservation-Based MAC Protocol for UWB WiMedia MAC. 841-845 - Lei Jing, Zixue Cheng, Yinghui Zhou:

Delay Guaranteed Media Access Control for Wireless Home Automation Networks. 846-853
Scalable and Secure Computing
- Mohsen Amini Salehi, Bahman Javadi, Rajkumar Buyya:

Preemption-aware Admission Control in a Virtualized Grid Federation. 854-861 - Yingjie Sheng, Yongzhong Zhang, Jianhua Yang:

Mining Network Traffic Efficiently to Detect Stepping-Stone Intrusion. 862-867 - Apichat Taweesiriwate, Bundit Manaskasemsak, Arnon Rungsawang:

Web Spam Detection Using Link-Based Ant Colony Optimization. 868-873 - Stelios Sotiriadis, Nik Bessis

, Fatos Xhafa
, Nick Antonopoulos:
From Meta-computing to Interoperable Infrastructures: A Review of Meta-schedulers for HPC, Grid and Cloud. 874-883
Wireless Networks
- Masahiro Hiyama, Elis Kulla, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:

Experimental Results of a MANET Testbed in a Mixed Environment Considering Horizontal and Vertical Topologies. 884-889 - Ngoc-Thai Pham, Won-Joo Hwang, Nak Woon Sung:

Scheduling and Flow Control for Delay Guarantees in Multi-hop Wireless Networks. 890-897 - Thong Huynh, Ngoc-Thai Pham, Won-Joo Hwang, Fabrice Theoleyre

:
Stochastic Optimization for Minimum Outage in Cooperative Ad-hoc Network. 898-905 - Hiroyuki Suzuki, Akio Koyama:

Implementation and Evaluation of a Real Object-Oriented Communication Method for Ad-hoc Networks. 906-911
Energy-Efficient and Green Computing
- Tomoya Enokido, Makoto Takizawa

:
An Extended Power Consumption Model for Distributed Applications. 912-919 - Takuro Inoue, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa

:
Algorithms for Selecting Energy-Efficient Storage Servers in Storage and Computation Oriented Applications. 920-927 - Wei Meng, Yi Wang, Chengchen Hu, Keqiang He, Jun Li, Bin Liu:

Greening the Internet Using Multi-frequency Scaling Scheme. 928-935
Dependable Systems and Autonomic Computing
- Nils Müllner, Oliver E. Theel, Martin Fränzle

:
Combining Decomposition and Reduction for State Space Analysis of a Self-Stabilizing System. 936-943 - Fan-Hsun Tseng

, Chi-Yuan Chen, Li-Der Chou, Tin Yu Wu, Han-Chieh Chao
:
A Study on Coverage Problem of Network Planning in LTE-Advanced Relay Networks. 944-950 - Hisashi Iwamoto, Yuji Yano, Yasuto Kuroda, Koji Yamamoto, Shingo Ata, Kazunari Inoue:

Deterministic High Density Packet-Buffer System for Low Cost Network Systems. 951-956

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














