# | Title | Journal | Year | Citations |
---|
1 | Routing with Guaranteed Delivery in Ad Hoc Wireless Networks | Wireless Networks | 2001 | 871 |
2 | A review and evaluation of intraurban air pollution exposure models | Journal of Exposure Science and Environmental Epidemiology | 2005 | 868 |
3 | Routing with guaranteed delivery in ad hoc wireless networks | | 1999 | 528 |
4 | Object Detection in 20 Years: A Survey | Proceedings of the IEEE | 2023 | 431 |
5 | Power consumption in packet radio networks | Theoretical Computer Science | 2000 | 336 |
6 | Gathering of asynchronous robots with limited visibility | Theoretical Computer Science | 2005 | 319 |
7 | Arbitrary pattern formation by asynchronous, anonymous, oblivious robots | Theoretical Computer Science | 2008 | 166 |
8 | Mapping and identification of a potential candidate gene for a novel maturity locus, E10, in soybean | Theoretical and Applied Genetics | 2017 | 162 |
9 | PIPE: a protein-protein interaction prediction engine based on the re-occurring short polypeptide sequences between known interacting protein pairs | BMC Bioinformatics | 2006 | 157 |
10 | Why phishing still works: User strategies for combating phishing attacks | International Journal of Human Computer Studies | 2015 | 156 |
11 | Macroscopic effects of microscopic forces between agents in crowd models | Physica A: Statistical Mechanics and Its Applications | 2007 | 153 |
12 | SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements | | 2013 | 137 |
13 | Generalized pursuit learning schemes: new families of continuous and discretized learning automata | IEEE Transactions on Systems, Man, and Cybernetics | 2002 | 136 |
14 | Answer sets for consistent query answering in inconsistent databases | Theory and Practice of Logic Programming | 2003 | 134 |
15 | Asynchronous deterministic rendezvous in graphs | Theoretical Computer Science | 2006 | 132 |
16 | On the false-positive rate of Bloom filters | Information Processing Letters | 2008 | 127 |
17 | Output-Sensitive Algorithms for Computing Nearest-Neighbour Decision Boundaries | Discrete and Computational Geometry | 2005 | 126 |
18 | From artificial evolution to computational evolution: a research agenda | Nature Reviews Genetics | 2006 | 124 |
19 | Continuous and discretized pursuit learning schemes: various algorithms and their comparison | IEEE Transactions on Systems, Man, and Cybernetics | 2001 | 122 |
20 | Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism | IEEE Transactions on Dependable and Secure Computing | 2012 | 120 |
21 | Domain Adaptation With Neural Embedding Matching | IEEE Transactions on Neural Networks and Learning Systems | 2020 | 116 |
22 | Biologically plausible visual homing methods based on optical flow techniques | Connection Science | 2005 | 113 |
23 | Scalar aggregation in inconsistent databases | Theoretical Computer Science | 2003 | 104 |
24 | Approximating the unsatisfiability threshold of random formulas | Random Structures and Algorithms | 1998 | 99 |
25 | Tree exploration with little memory | Journal of Algorithms | 2004 | 94 |
26 | Optimal movement of mobile sensors for barrier coverage of a planar region | Theoretical Computer Science | 2009 | 90 |
27 | Distributed and adaptive traffic signal control within a realistic traffic simulation | Engineering Applications of Artificial Intelligence | 2013 | 89 |
28 | A toolset for performance engineering and software design of client-server systems | Performance Evaluation | 1995 | 87 |
29 | The Kohonen network incorporating explicit statistics and its application to the travelling salesman problem | Neural Networks | 1999 | 87 |
30 | The Evolution of System-Call Monitoring | | 2008 | 87 |
31 | A brief taxonomy and ranking of creative prototype reduction schemes | Pattern Analysis and Applications | 2003 | 83 |
32 | Fault-tolerant scheduling policy for grid computing systems | | 0 | 83 |
33 | A Generic Attack on Checksumming-Based Software Tamper Resistance | | 0 | 83 |
34 | Solving large FPT problems on coarse-grained parallel machines | Journal of Computer and System Sciences | 2003 | 81 |
35 | Carry-free addition of recoded binary signed-digit numbers | IEEE Transactions on Computers | 1988 | 79 |
36 | Discretized estimator learning automata | IEEE Transactions on Systems, Man, and Cybernetics | 1992 | 79 |
37 | Supervised Segmentation of Un-Annotated Retinal Fundus Images by Synthesis | IEEE Transactions on Medical Imaging | 2019 | 79 |
38 | Self-deployment of mobile sensors on a ring | Theoretical Computer Science | 2008 | 78 |
39 | On embedding an outer-planar graph in a point set | Computational Geometry: Theory and Applications | 2002 | 77 |
40 | Learning Automata-Based Solutions to the Nonlinear Fractional Knapsack Problem With Applications to Optimal Resource Allocation | IEEE Transactions on Systems, Man, and Cybernetics | 2007 | 76 |
41 | Continuous learning automata solutions to the capacity assignment problem | IEEE Transactions on Computers | 2000 | 75 |
42 | Zero-Shot Classification with Discriminative Semantic Representation Learning | | 2017 | 74 |
43 | Optimal Parallel Merging and Sorting Without Memory Conflicts | IEEE Transactions on Computers | 1987 | 72 |
44 | Searching for a black hole in arbitrary networks: optimal mobile agents protocols | Distributed Computing | 2006 | 72 |
45 | HARP: A tableau-based theorem prover | Journal of Automated Reasoning | 1988 | 71 |
46 | Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer | Lecture Notes in Computer Science | 2007 | 71 |
47 | Stochastic learning-based weak estimation of multinomial random variables and its applications to pattern recognition in non-stationary environments | Pattern Recognition | 2006 | 70 |
48 | User interface design affects security: patterns in click-based graphical passwords | International Journal of Information Security | 2009 | 70 |
49 | SCALABLE PARALLEL COMPUTATIONAL GEOMETRY FOR COARSE GRAINED MULTICOMPUTERS | International Journal of Computational Geometry and Applications | 1996 | 69 |
50 | Comparing Anomaly Detection Techniques for HTTP | Lecture Notes in Computer Science | 2007 | 69 |