About
Technology
Issues
FAQ
Search
Profile
Top Authors
Prolific Authors
Top Journals
Main Disciplines
Main Topics
Most Cited Articles
Scientometrics
Avg Impact Factor
★★
Articles
★★★
Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Schools
›
Faculty of Information Sciences and Engineering
›
top-articles
Faculty of Information Sciences and Engineering
84
(top 1%)
papers
1.4K
(top 2%)
citations
18
(top 2%)
h
-index
37
(top 1%)
g
-index
182
all documents
2.4K
doc citations
658
citing journals
Top Articles
#
Title
Journal
Year
Citations
1
Collecting Large, Richly Annotated Facial-Expression Databases from Movies
IEEE MultiMedia
2012
476
2
Static facial expression analysis in tough conditions: Data, evaluation protocol and benchmark
2011
307
3
Robust statistical modeling using the Birnbaum‐Saunders‐
t
distribution applied to insurance
Applied Stochastic Models in Business and Industry
2012
85
4
Is strategy being implemented through projects? Contrary evidence from a leader in New Public Management
International Journal of Project Management
2012
60
5
Cocyclic Hadamard Matrices and Hadamard Groups Are Equivalent
Journal of Algebra
1997
55
6
Sub-Shot-Noise laser Doppler Anemometry with Amplitude-Squeezed Light
Physical Review Letters
1997
47
7
Emotion Recognition Using the Emotiv EPOC Device
Lecture Notes in Computer Science
2012
46
8
A master solution of the quantum Yang–Baxter equation and classical discrete integrable equations
Advances in Theoretical and Mathematical Physics
2012
45
9
Conflict and identity shape shifting in an online financial community
Information Systems Journal
2009
40
10
Password Entropy and Password Quality
2010
40
11
Elliptic gamma-function and multi-spin solutions of the Yang–Baxter equation
Nuclear Physics B
2012
40
12
Bounded Influence Estimation in the Mixed Linear Model
Journal of the American Statistical Association
1997
37
13
An approach for automatically measuring facial activity in depressed subjects
2009
36
14
Contemporary project portfolio management: Reflections on the development of an Australian Competency Standard for Project Portfolio Management
International Journal of Project Management
2013
35
15
A novel image watermarking scheme using Extreme Learning Machine
2012
34
16
Impact of restrictive composition policy on user password choices
Behaviour and Information Technology
2011
33
17
Little Design Up-Front: A Design Science Approach to Integrating Usability into Agile Requirements Engineering
Lecture Notes in Computer Science
2009
31
18
RFID Technology and Crowded Event Management
2008
30
19
Sources of variation in linking corporate social responsibility and financial performance
Social Responsibility Journal
2012
30
20
Superposition formulas for exterior differential systems
Advances in Mathematics
2009
29
21
CRiSP: An Instrument for Assessing Student Perceptions of Classroom Response Systems
Journal of Science Education and Technology
2015
26
22
An optimal sphere and two large margins approach for novelty detection
2010
24
23
A Novel Spam Email Detection System Based on Negative Selection
2009
23
24
Calculation of cocyclic matrices
Journal of Pure and Applied Algebra
1996
22
25
Remote multimodal biometric authentication using bit priority-based fragile watermarking
2008
21
26
Measuring risk taking
Educational Studies in Mathematics
1991
20
27
Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange
2010
20
28
Instructor perceptions of using a mobile-phone-based free classroom response system in first-year statistics undergraduate courses
International Journal of Mathematical Education in Science and Technology
2012
20
29
Clonal Selection Algorithm for Classification
Lecture Notes in Computer Science
2011
19
30
Inter-organisational information systems assimilation: an empirical evaluation in light of the diffusion of innovation theory
International Journal of Business Information Systems
2011
19
31
Tetrahedron Equation and Quantum R Matrices for Spin Representations of $${B^{(1)}_n}$$ B n ( 1 ) , $${D^{(1)}_n}$$ D n ( 1 ) and $${D^{(2)}_{n+1}}$$ D n + 1 ( 2 )
Communications in Mathematical Physics
2013
19
32
Digital Video Tamper Detection Based on Multimodal Fusion of Residue Features
2010
18
33
Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks
2009
17
34
Regression based automatic face annotation for deformable model building
Pattern Recognition
2011
17
35
Limited seasonality effects on blood lead for a small cohort of female adults and children
Science of the Total Environment
2000
15
36
Human speaker identification of known voices transmitted through different user interfaces and transmission channels
2013
15
37
Exact solutions of the Hairsine–Rose precipitation-driven erosion model for a uniform grain-sized soil
Journal of Hydrology
2010
14
38
Human identification with electroencephalogram (EEG) signal processing
2012
14
39
Similarity normalization for speaker verification by fuzzy fusion
Pattern Recognition
2000
13
40
Facial Performance Transfer via Deformable Models and Parametric Correspondence
IEEE Transactions on Visualization and Computer Graphics
2012
13
41
Incorporating structural improvement into resource allocation for business process execution planning
Concurrency Computation Practice and Experience
2013
13
42
Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks
2010
12
43
Fusion of handwritten numeral classifiers based on fuzzy and genetic algorithms
0
11
44
Quantum Cryptography for Wireless Network Communications
2009
11
45
Face Gender Recognition Based on 2D Principal Component Analysis and Support Vector Machine
2010
11
46
Blind Video Tamper Detection Based on Fusion of Source Features
2011
11
47
Resource management in large distributed systems
Operating Systems Review (ACM)
1990
10
48
Developing Intelligent Agent Applications with JADE and JESS
Lecture Notes in Computer Science
2008
10
49
Antenna Polarization as Complementarities on RSSI Based Location Identification
2009
10
50
Fuzzy controller for a dynamic window in elliptic curve cryptography wireless networks for scalar multiplication
2010
10
site/software ©
exaly
; All materials licenced under
CC by-SA
.