84(top 1%)
papers
1.4K(top 2%)
citations
18(top 2%)
h-index
37(top 1%)
g-index
182
all documents
2.4K
doc citations
658
citing journals

Top Articles

#TitleJournalYearCitations
1Collecting Large, Richly Annotated Facial-Expression Databases from MoviesIEEE MultiMedia2012476
2Static facial expression analysis in tough conditions: Data, evaluation protocol and benchmark2011307
3Robust statistical modeling using the Birnbaum‐Saunders‐t distribution applied to insuranceApplied Stochastic Models in Business and Industry201285
4Is strategy being implemented through projects? Contrary evidence from a leader in New Public ManagementInternational Journal of Project Management201260
5Cocyclic Hadamard Matrices and Hadamard Groups Are EquivalentJournal of Algebra199755
6Sub-Shot-Noise laser Doppler Anemometry with Amplitude-Squeezed LightPhysical Review Letters199747
7Emotion Recognition Using the Emotiv EPOC DeviceLecture Notes in Computer Science201246
8A master solution of the quantum Yang–Baxter equation and classical discrete integrable equationsAdvances in Theoretical and Mathematical Physics201245
9Conflict and identity shape shifting in an online financial communityInformation Systems Journal200940
10Password Entropy and Password Quality201040
11Elliptic gamma-function and multi-spin solutions of the Yang–Baxter equationNuclear Physics B201240
12Bounded Influence Estimation in the Mixed Linear ModelJournal of the American Statistical Association199737
13An approach for automatically measuring facial activity in depressed subjects200936
14Contemporary project portfolio management: Reflections on the development of an Australian Competency Standard for Project Portfolio ManagementInternational Journal of Project Management201335
15A novel image watermarking scheme using Extreme Learning Machine201234
16Impact of restrictive composition policy on user password choicesBehaviour and Information Technology201133
17Little Design Up-Front: A Design Science Approach to Integrating Usability into Agile Requirements EngineeringLecture Notes in Computer Science200931
18RFID Technology and Crowded Event Management200830
19Sources of variation in linking corporate social responsibility and financial performanceSocial Responsibility Journal201230
20Superposition formulas for exterior differential systemsAdvances in Mathematics200929
21CRiSP: An Instrument for Assessing Student Perceptions of Classroom Response SystemsJournal of Science Education and Technology201526
22An optimal sphere and two large margins approach for novelty detection201024
23A Novel Spam Email Detection System Based on Negative Selection200923
24Calculation of cocyclic matricesJournal of Pure and Applied Algebra199622
25Remote multimodal biometric authentication using bit priority-based fragile watermarking200821
26Measuring risk takingEducational Studies in Mathematics199120
27Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange201020
28Instructor perceptions of using a mobile-phone-based free classroom response system in first-year statistics undergraduate coursesInternational Journal of Mathematical Education in Science and Technology201220
29Clonal Selection Algorithm for ClassificationLecture Notes in Computer Science201119
30Inter-organisational information systems assimilation: an empirical evaluation in light of the diffusion of innovation theoryInternational Journal of Business Information Systems201119
31Tetrahedron Equation and Quantum R Matrices for Spin Representations of $${B^{(1)}_n}$$ B n ( 1 ) , $${D^{(1)}_n}$$ D n ( 1 ) and $${D^{(2)}_{n+1}}$$ D n + 1 ( 2 )Communications in Mathematical Physics201319
32Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features201018
33Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks200917
34Regression based automatic face annotation for deformable model buildingPattern Recognition201117
35Limited seasonality effects on blood lead for a small cohort of female adults and childrenScience of the Total Environment200015
36Human speaker identification of known voices transmitted through different user interfaces and transmission channels201315
37Exact solutions of the Hairsine–Rose precipitation-driven erosion model for a uniform grain-sized soilJournal of Hydrology201014
38Human identification with electroencephalogram (EEG) signal processing201214
39Similarity normalization for speaker verification by fuzzy fusionPattern Recognition200013
40Facial Performance Transfer via Deformable Models and Parametric CorrespondenceIEEE Transactions on Visualization and Computer Graphics201213
41Incorporating structural improvement into resource allocation for business process execution planningConcurrency Computation Practice and Experience201313
42Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks201012
43Fusion of handwritten numeral classifiers based on fuzzy and genetic algorithms011
44Quantum Cryptography for Wireless Network Communications200911
45Face Gender Recognition Based on 2D Principal Component Analysis and Support Vector Machine201011
46Blind Video Tamper Detection Based on Fusion of Source Features201111
47Resource management in large distributed systemsOperating Systems Review (ACM)199010
48Developing Intelligent Agent Applications with JADE and JESSLecture Notes in Computer Science200810
49Antenna Polarization as Complementarities on RSSI Based Location Identification200910
50Fuzzy controller for a dynamic window in elliptic curve cryptography wireless networks for scalar multiplication201010