1.1K(top 0.1%)
papers
17.8K(top 1%)
citations
57(top 1%)
h-index
96(top 1%)
g-index
1.6K
all documents
22.7K
doc citations
2.4K
citing journals

Top Articles

#TitleJournalYearCitations
1Routing with Guaranteed Delivery in Ad Hoc Wireless NetworksWireless Networks2001871
2A review and evaluation of intraurban air pollution exposure modelsJournal of Exposure Science and Environmental Epidemiology2005868
3Routing with guaranteed delivery in ad hoc wireless networks1999528
4Object Detection in 20 Years: A SurveyProceedings of the IEEE2023431
5Power consumption in packet radio networksTheoretical Computer Science2000336
6Gathering of asynchronous robots with limited visibilityTheoretical Computer Science2005319
7Arbitrary pattern formation by asynchronous, anonymous, oblivious robotsTheoretical Computer Science2008166
8Mapping and identification of a potential candidate gene for a novel maturity locus, E10, in soybeanTheoretical and Applied Genetics2017162
9PIPE: a protein-protein interaction prediction engine based on the re-occurring short polypeptide sequences between known interacting protein pairsBMC Bioinformatics2006157
10Why phishing still works: User strategies for combating phishing attacksInternational Journal of Human Computer Studies2015156
11Macroscopic effects of microscopic forces between agents in crowd modelsPhysica A: Statistical Mechanics and Its Applications2007153
12SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements2013137
13Generalized pursuit learning schemes: new families of continuous and discretized learning automataIEEE Transactions on Systems, Man, and Cybernetics2002136
14Answer sets for consistent query answering in inconsistent databasesTheory and Practice of Logic Programming2003134
15Asynchronous deterministic rendezvous in graphsTheoretical Computer Science2006132
16On the false-positive rate of Bloom filtersInformation Processing Letters2008127
17Output-Sensitive Algorithms for Computing Nearest-Neighbour Decision BoundariesDiscrete and Computational Geometry2005126
18From artificial evolution to computational evolution: a research agendaNature Reviews Genetics2006124
19Continuous and discretized pursuit learning schemes: various algorithms and their comparisonIEEE Transactions on Systems, Man, and Cybernetics2001122
20Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication MechanismIEEE Transactions on Dependable and Secure Computing2012120
21Domain Adaptation With Neural Embedding MatchingIEEE Transactions on Neural Networks and Learning Systems2020116
22Biologically plausible visual homing methods based on optical flow techniquesConnection Science2005113
23Scalar aggregation in inconsistent databasesTheoretical Computer Science2003104
24Approximating the unsatisfiability threshold of random formulasRandom Structures and Algorithms199899
25Tree exploration with little memoryJournal of Algorithms200494
26Optimal movement of mobile sensors for barrier coverage of a planar regionTheoretical Computer Science200990
27Distributed and adaptive traffic signal control within a realistic traffic simulationEngineering Applications of Artificial Intelligence201389
28A toolset for performance engineering and software design of client-server systemsPerformance Evaluation199587
29The Kohonen network incorporating explicit statistics and its application to the travelling salesman problemNeural Networks199987
30The Evolution of System-Call Monitoring200887
31A brief taxonomy and ranking of creative prototype reduction schemesPattern Analysis and Applications200383
32Fault-tolerant scheduling policy for grid computing systems083
33A Generic Attack on Checksumming-Based Software Tamper Resistance083
34Solving large FPT problems on coarse-grained parallel machinesJournal of Computer and System Sciences200381
35Carry-free addition of recoded binary signed-digit numbersIEEE Transactions on Computers198879
36Discretized estimator learning automataIEEE Transactions on Systems, Man, and Cybernetics199279
37Supervised Segmentation of Un-Annotated Retinal Fundus Images by SynthesisIEEE Transactions on Medical Imaging201979
38Self-deployment of mobile sensors on a ringTheoretical Computer Science200878
39On embedding an outer-planar graph in a point setComputational Geometry: Theory and Applications200277
40Learning Automata-Based Solutions to the Nonlinear Fractional Knapsack Problem With Applications to Optimal Resource AllocationIEEE Transactions on Systems, Man, and Cybernetics200776
41Continuous learning automata solutions to the capacity assignment problemIEEE Transactions on Computers200075
42Zero-Shot Classification with Discriminative Semantic Representation Learning201774
43Optimal Parallel Merging and Sorting Without Memory ConflictsIEEE Transactions on Computers198772
44Searching for a black hole in arbitrary networks: optimal mobile agents protocolsDistributed Computing200672
45HARP: A tableau-based theorem proverJournal of Automated Reasoning198871
46Using a Personal Device to Strengthen Password Authentication from an Untrusted ComputerLecture Notes in Computer Science200771
47Stochastic learning-based weak estimation of multinomial random variables and its applications to pattern recognition in non-stationary environmentsPattern Recognition200670
48User interface design affects security: patterns in click-based graphical passwordsInternational Journal of Information Security200970
49SCALABLE PARALLEL COMPUTATIONAL GEOMETRY FOR COARSE GRAINED MULTICOMPUTERSInternational Journal of Computational Geometry and Applications199669
50Comparing Anomaly Detection Techniques for HTTPLecture Notes in Computer Science200769