# | Title | Journal | Year | Citations |
---|
1 | Fiji: an open-source platform for biological-image analysis | Nature Methods | 2012 | 47,818 |
2 | Highly multiplexed imaging of tumor tissues with subcellular resolution by mass cytometry | Nature Methods | 2014 | 1,430 |
3 | Visual Odometry [Tutorial] | IEEE Robotics and Automation Magazine | 2011 | 1,123 |
4 | The Balanced Accuracy and Its Posterior Distribution | IEEE Robotics and Automation Magazine | 2010 | 784 |
5 | D2-Net: A Trainable CNN for Joint Description and Detection of Local Features | IEEE Robotics and Automation Magazine | 2019 | 608 |
6 | Do you Need a Blockchain? | IEEE Robotics and Automation Magazine | 2018 | 525 |
7 | A Probabilistic Approach to Collaborative Multi-Robot Localization | Autonomous Robots | 2000 | 507 |
8 | The LRU-K page replacement algorithm for database disk buffering | Autonomous Robots | 1993 | 502 |
9 | Visual Odometry : Part II: Matching, Robustness, Optimization, and Applications | IEEE Robotics and Automation Magazine | 2012 | 464 |
10 | Approximate Bayesian Computation | PLoS Computational Biology | 2013 | 449 |
11 | USAC: A Universal Framework for Random Sample Consensus | IEEE Transactions on Pattern Analysis and Machine Intelligence | 2013 | 435 |
12 | OFMC: A symbolic model checker for security protocols | International Journal of Information Security | 2005 | 423 |
13 | The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols | Lecture Notes in Computer Science | 2008 | 392 |
14 | A Multi-view Stereo Benchmark with High-Resolution Images and Multi-camera Videos | Lecture Notes in Computer Science | 2017 | 391 |
15 | Benchmarking 6DOF Outdoor Visual Localization in Changing Conditions | Lecture Notes in Computer Science | 2018 | 367 |
16 | AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation | Lecture Notes in Computer Science | 2018 | 362 |
17 | Efficient & Effective Prioritized Matching for Large-Scale Image-Based Localization | IEEE Transactions on Pattern Analysis and Machine Intelligence | 2017 | 348 |
18 | Automated Security Protocol Analysis With the AVISPA Tool | Electronic Notes in Theoretical Computer Science | 2006 | 298 |
19 | A mechanism for asymmetric segregation of age during yeast budding | Nature | 2008 | 298 |
20 | D-ADMM: A Communication-Efficient Distributed Algorithm for Separable Optimization | IEEE Transactions on Signal Processing | 2013 | 284 |
21 | Image-Based Localization Using LSTMs for Structured Feature Correlation | IEEE Transactions on Signal Processing | 2017 | 280 |
22 | Glaucoma detection using entropy sampling and ensemble learning for automatic optic cup and disc segmentation | Computerized Medical Imaging and Graphics | 2017 | 278 |
23 | Still Flowing: Approaches to Traffic Flow and Traffic Jam Modeling | Operations Research | 2003 | 269 |
24 | The LRU-K page replacement algorithm for database disk buffering | SIGMOD Record | 1993 | 261 |
25 | The CAFA challenge reports improved protein function prediction and new functional annotations for hundreds of genes through experimental screens | Genome Biology | 2019 | 261 |
26 | Time synchronization in ad hoc networks | Genome Biology | 2001 | 256 |
27 | InLoc: Indoor Visual Localization with Dense Matching and View Synthesis | Genome Biology | 2018 | 255 |
28 | Crowdsourcing the creation of image segmentation algorithms for connectomics | Frontiers in Neuroanatomy | 2015 | 248 |
29 | Tools and Benchmarks for Automated Log Parsing | Frontiers in Neuroanatomy | 2019 | 240 |
30 | Simulating facial surgery using finite element models | Frontiers in Neuroanatomy | 1996 | 232 |
31 | Machine learning for real-time prediction of complications in critical care: a retrospective study | Lancet Respiratory Medicine,the | 2018 | 226 |
32 | Revealing household characteristics from smart meter data | Energy | 2014 | 218 |
33 | Resolving the Ortholog Conjecture: Orthologs Tend to Be Weakly, but Significantly, More Similar in Function than Paralogs | PLoS Computational Biology | 2012 | 217 |
34 | Network Discovery and Verification | IEEE Journal on Selected Areas in Communications | 2006 | 216 |
35 | TAK1 Suppresses a NEMO-Dependent but NF-κB-Independent Pathway to Liver Cancer | Cancer Cell | 2010 | 207 |
36 | Early prediction of circulatory failure in the intensive care unit using machine learning | Nature Medicine | 2020 | 204 |
37 | Computational pathology: Challenges and promises for tissue analysis | Computerized Medical Imaging and Graphics | 2011 | 202 |
38 | Current Methods for Automated Filtering of Multiple Sequence Alignments Frequently Worsen Single-Gene Phylogenetic Inference | Systematic Biology | 2015 | 200 |
39 | Standardized benchmarking in the quest for orthologs | Nature Methods | 2016 | 198 |
40 | Parallel implementation of the TRANSIMS micro-simulation | Parallel Computing | 2001 | 193 |
41 | CoV-Spectrum: analysis of globally shared SARS-CoV-2 data to identify and characterize new variants | Bioinformatics | 2022 | 191 |
42 | Comparative Evaluation of Hand-Crafted and Learned Local Features | Bioinformatics | 2017 | 190 |
43 | Decoding the perception of pain from fMRI using multivariate pattern analysis | NeuroImage | 2012 | 177 |
44 | Cancer genetics-guided discovery of serum biomarker signatures for diagnosis and prognosis of prostate cancer | Proceedings of the National Academy of Sciences of the United States of America | 2011 | 175 |
45 | Efficient and Generalized Group Signatures | Lecture Notes in Computer Science | 1997 | 174 |
46 | Support vector machine regression (LS-SVM)—an alternative to artificial neural networks (ANNs) for the analysis of quantum chemistry data? | Physical Chemistry Chemical Physics | 2011 | 174 |
47 | Partial Sum Minimization of Singular Values in Robust PCA: Algorithm and Applications | IEEE Transactions on Pattern Analysis and Machine Intelligence | 2016 | 172 |
48 | Player Simulation and General Adversary Structures in Perfect Multiparty Computation | Journal of Cryptology | 2000 | 169 |
49 | Main-memory hash joins on multi-core CPUs: Tuning to the underlying hardware | Journal of Cryptology | 2013 | 168 |
50 | Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications | Lecture Notes in Computer Science | 2009 | 161 |