526.1K(top 0.1%)
papers
4.7M(top 1%)
citations
496(top 1%)
h-index
827(top 1%)
g-index
501.0K
all documents
24.6K
doc citations

Top Articles

#TitleJournalYearCitations
1U-Net: Convolutional Networks for Biomedical Image SegmentationLecture Notes in Computer Science201527,139
2Microsoft COCO: Common Objects in ContextLecture Notes in Computer Science201412,775
3SSD: Single Shot MultiBox DetectorLecture Notes in Computer Science201611,879
4CBAM: Convolutional Block Attention ModuleLecture Notes in Computer Science20187,331
5Scheduling Algorithms for Multiprogramming in a Hard-Real-Time EnvironmentJournal of the ACM19737,074
6Authoritative sources in a hyperlinked environmentJournal of the ACM19996,521
7Visualizing and Understanding Convolutional NetworksLecture Notes in Computer Science20145,890
8Encoder-Decoder with Atrous Separable Convolution for Semantic Image SegmentationLecture Notes in Computer Science20185,282
9Robust principal component analysis?Journal of the ACM20114,536
10Perceptual Losses for Real-Time Style Transfer and Super-ResolutionLecture Notes in Computer Science20164,037
11Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer SystemsLecture Notes in Computer Science20013,986
12Identity-Based Encryption from the Weil PairingLecture Notes in Computer Science20013,953
13Z3: An Efficient SMT SolverLecture Notes in Computer Science20083,666
14Identity Mappings in Deep Residual NetworksLecture Notes in Computer Science20163,665
15Ensemble Methods in Machine LearningLecture Notes in Computer Science20003,642
16`` Direct Search'' Solution of Numerical and Statistical ProblemsJournal of the ACM19613,455
17End-to-End Object Detection with TransformersLecture Notes in Computer Science20203,432
18Impossibility of distributed consensus with one faulty processJournal of the ACM19853,214
19A Machine-Oriented Logic Based on the Resolution PrincipleJournal of the ACM19652,951
20UNet++: A Nested U-Net Architecture for Medical Image SegmentationLecture Notes in Computer Science20182,913
21A Calculus of Communicating SystemsLecture Notes in Computer Science19802,799
22A Fast Elitist Non-dominated Sorting Genetic Algorithm for Multi-objective Optimization: NSGA-IILecture Notes in Computer Science20002,772
23Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programmingJournal of the ACM19952,443
24Fuzzy Identity-Based EncryptionLecture Notes in Computer Science20052,424
25The Sybil AttackLecture Notes in Computer Science20022,402
263D U-Net: Learning Dense Volumetric Segmentation from Sparse AnnotationLecture Notes in Computer Science20162,388
27Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsLecture Notes in Computer Science19962,328
28Firefly Algorithms for Multimodal OptimizationLecture Notes in Computer Science20092,322
29DBpedia: A Nucleus for a Web of Open DataLecture Notes in Computer Science20072,317
30Machine Learning for High-Speed Corner DetectionLecture Notes in Computer Science20062,310
31Learning a Deep Convolutional Network for Image Super-ResolutionLecture Notes in Computer Science20142,310
32The String-to-String Correction ProblemJournal of the ACM19742,288
33BigtableACM Transactions on Computer Systems20082,262
34A threshold of ln n for approximating set coverJournal of the ACM19982,240
35Parameter selection in particle swarm optimizationLecture Notes in Computer Science19982,169
36ShuffleNet V2: Practical Guidelines for Efficient CNN Architecture DesignLecture Notes in Computer Science20182,162
37Stacked Hourglass Networks for Human Pose EstimationLecture Notes in Computer Science20162,160
38Open, Closed, and Mixed Networks of Queues with Different Classes of CustomersJournal of the ACM19752,130
39Aspect-oriented programmingLecture Notes in Computer Science19972,119
40Fibonacci heaps and their uses in improved network optimization algorithmsJournal of the ACM19872,024
41Multiscale vessel enhancement filteringLecture Notes in Computer Science19982,012
42Indoor Segmentation and Support Inference from RGBD ImagesLecture Notes in Computer Science20122,011
43A Computing Procedure for Quantification TheoryJournal of the ACM19601,986
44Bundle Adjustment — A Modern SynthesisLecture Notes in Computer Science20001,968
45Image Super-Resolution Using Very Deep Residual Channel Attention NetworksLecture Notes in Computer Science20181,935
46A logic of authenticationACM Transactions on Computer Systems19901,934
47Distributed snapshotsACM Transactions on Computer Systems19851,933
48Theoretical Improvements in Algorithmic Efficiency for Network Flow ProblemsJournal of the ACM19721,922
49BRIEF: Binary Robust Independent Elementary FeaturesLecture Notes in Computer Science20101,883
50The part-time parliamentACM Transactions on Computer Systems19981,881
51An optimal algorithm for approximate nearest neighbor searching fixed dimensionsJournal of the ACM19981,875
52Fully-Convolutional Siamese Networks for Object TrackingLecture Notes in Computer Science20161,871
53Modeling Relational Data with Graph Convolutional NetworksLecture Notes in Computer Science20181,839
54Unreliable failure detectors for reliable distributed systemsJournal of the ACM19961,830
55Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets LearningLecture Notes in Computer Science20051,797
56The click modular routerACM Transactions on Computer Systems20001,785
57Reaching Agreement in the Presence of FaultsJournal of the ACM19801,720
58A desicion-theoretic generalization of on-line learning and an application to boostingLecture Notes in Computer Science19951,697
59An Algorithm for Subgraph IsomorphismJournal of the ACM19761,696
60Public Key Encryption with Keyword SearchLecture Notes in Computer Science20041,692
61A Technique for the Numerical Solution of Certain Integral Equations of the First KindJournal of the ACM19621,689
62XNOR-Net: ImageNet Classification Using Binary Convolutional Neural NetworksLecture Notes in Computer Science20161,683
63Gaussian Processes in Machine LearningLecture Notes in Computer Science20041,679
64Activity Recognition from User-Annotated Acceleration DataLecture Notes in Computer Science20041,670
65A Discriminative Feature Learning Approach for Deep Face RecognitionLecture Notes in Computer Science20161,634
66Practical byzantine fault tolerance and proactive recoveryACM Transactions on Computer Systems20021,628
67Kademlia: A Peer-to-Peer Information System Based on the XOR MetricLecture Notes in Computer Science20021,623
68Short Signatures from the Weil PairingLecture Notes in Computer Science20011,595
69LSD-SLAM: Large-Scale Direct Monocular SLAMLecture Notes in Computer Science20141,571
70Temporal Segment Networks: Towards Good Practices for Deep Action RecognitionLecture Notes in Computer Science20161,555
71A New Method of Interpolation and Smooth Curve Fitting Based on Local ProceduresJournal of the ACM19701,544
72Ant Colony Optimization and Swarm IntelligenceLecture Notes in Computer Science20041,528
73Sequential Operations in Digital Picture ProcessingJournal of the ACM19661,524
74Accelerating the Super-Resolution Convolutional Neural NetworkLecture Notes in Computer Science20161,494
75Estimating attributes: Analysis and extensions of RELIEFLecture Notes in Computer Science19941,491
76CornerNet: Detecting Objects as Paired KeypointsLecture Notes in Computer Science20181,483
77PRESENT: An Ultra-Lightweight Block CipherLecture Notes in Computer Science20071,467
78Two-Frame Motion Estimation Based on Polynomial ExpansionLecture Notes in Computer Science20031,455
79A new approach to the maximum-flow problemJournal of the ACM19881,452
80Linear Cryptanalysis Method for DES CipherLecture Notes in Computer Science19941,446
81High Accuracy Optical Flow Estimation Based on a Theory for WarpingLecture Notes in Computer Science20041,424
82Integer Programming Formulation of Traveling Salesman ProblemsJournal of the ACM19601,421
83How to construct random functionsJournal of the ACM19861,417
84Correlation Power Analysis with a Leakage ModelLecture Notes in Computer Science20041,405
85An Extensible SAT-solverLecture Notes in Computer Science20041,392
86End-to-end arguments in system designACM Transactions on Computer Systems19841,388
87P-Complete Approximation ProblemsJournal of the ACM19761,379
88PRISM 4.0: Verification of Probabilistic Real-Time SystemsLecture Notes in Computer Science20111,371
89Towards a Better Understanding of Context and Context-AwarenessLecture Notes in Computer Science19991,360
90Learnability and the Vapnik-Chervonenkis dimensionJournal of the ACM19891,358
91Face Recognition with Local Binary PatternsLecture Notes in Computer Science20041,354
92A Theorem on Boolean MatricesJournal of the ACM19621,321
93How bad is selfish routing?Journal of the ACM20021,317
94On Single Image Scale-Up Using Sparse-RepresentationsLecture Notes in Computer Science20121,303
95Efficient Identity-Based Encryption Without Random OraclesLecture Notes in Computer Science20051,298
96A Survey on Deep Transfer LearningLecture Notes in Computer Science20181,295
97Implementing remote procedure callsACM Transactions on Computer Systems19841,290
98Flower Pollination Algorithm for Global OptimizationLecture Notes in Computer Science20121,289
99Certificateless Public Key CryptographyLecture Notes in Computer Science20031,283
100Colorful Image ColorizationLecture Notes in Computer Science20161,279