403(top 1%)
papers
7.9K(top 1%)
citations
44(top 1%)
h-index
74(top 1%)
g-index
809
all documents
12.1K
doc citations
1.8K
citing journals

Top Articles

#TitleJournalYearCitations
1Vehicular Ad Hoc Networks: A New Challenge for Localization-Based SystemsComputer Communications2008457
2Do deep features generalize from everyday objects to remote sensing and aerial scenes domains?2015412
3Deep Representations for Iris, Face, and Fingerprint Spoofing DetectionIEEE Transactions on Information Forensics and Security2015405
4Geographic and Opportunistic Routing for Underwater Sensor NetworksIEEE Transactions on Computers2016264
5Propedia: a database for protein–peptide identification based on a hybrid clustering algorithmBMC Bioinformatics2021261
6Scheduling in sports: An annotated bibliographyComputers and Operations Research2010219
7Survey on wireless sensor network devices0195
8What’s in a GitHub Star? Understanding Repository Starring Practices in a Social Coding PlatformJournal of Systems and Software2018177
9Multi-scale gray level co-occurrence matrices for texture descriptionNeurocomputing2013160
10DRINA: A Lightweight and Reliable Routing Approach for In-Network Aggregation in Wireless Sensor NetworksIEEE Transactions on Computers2013160
11A genetic programming framework for content-based image retrievalPattern Recognition2009145
12Face Spoofing Detection Through Visual Codebooks of Spectral Temporal CubesIEEE Transactions on Image Processing2015141
13USE: A Universal, Scalable, and Efficient Clocking Scheme for QCAIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems2016132
14SkeleMotion: A New Representation of Skeleton Joint Sequences based on Motion Information for 3D Action Recognition2019116
15Dynamic Multicontext Segmentation of Remote Sensing Images Based on Convolutional NetworksIEEE Transactions on Geoscience and Remote Sensing2019102
16Joint admission control and resource allocation in virtualized serversJournal of Parallel and Distributed Computing201091
17Using Visual Rhythms for Detecting Video-Based Facial Spoof AttacksIEEE Transactions on Information Forensics and Security201591
18“What is a good digital library?” – A quality model for digital librariesInformation Processing and Management200786
19RefDiff: Detecting Refactorings in Version Histories201783
20Protein cutoff scanning: A comparative analysis of cutoff dependent and cutoff free methods for prospecting contacts in proteinsProteins: Structure, Function and Bioinformatics200980
21A Hybrid Multiobjective Evolutionary Approach for Improving the Performance of Wireless Sensor NetworksIEEE Sensors Journal201180
22Iterated local search heuristics for the Vehicle Routing Problem with Cross-DockingExpert Systems With Applications201480
23Learning Deep Off-the-Person Heart Biometrics RepresentationsIEEE Transactions on Information Forensics and Security201880
24Swarm Coordination Based on Smoothed Particle Hydrodynamics TechniqueIEEE Transactions on Robotics201376
25Adaptive Normalization: A novel data normalization approach for non-stationary time series201074
26A General VNS heuristic for the traveling salesman problem with time windowsDiscrete Optimization201071
27Divergence Analysis and Optimizations201171
28Localization Prediction in Vehicular Ad Hoc NetworksIEEE Communications Surveys and Tutorials201871
29Extracting Software Product Lines: A Case Study Using Conditional Compilation201167
30Linear Sequence-to-Sequence AlignmentIEEE Transactions on Pattern Analysis and Machine Intelligence201064
31Image retrieval using multiple evidence rankingIEEE Transactions on Knowledge and Data Engineering200461
32Phero-trail: a bio-inspired location service for mobile underwater sensor networksIEEE Journal on Selected Areas in Communications201061
33An efficient and layout‐independent automatic license plate recognition system based on the YOLO detectorIET Intelligent Transport Systems202161
34Integer programming techniques for the nurse rostering problemAnnals of Operations Research201660
35Coordinating the use of GPU and CPU for improving performance of compute intensive applications200959
36Partial discharge signal denoising with spatially adaptive wavelet thresholding and support vector machinesElectric Power Systems Research201159
37Cutoff Scanning Matrix (CSM): structural classification and function prediction by protein inter-residue distance patternsBMC Genomics201158
38Extracting relative thresholds for source code metrics201458
39Simple and Space-Efficient Minimal Perfect Hash FunctionsLecture Notes in Computer Science200756
40A novel void node recovery paradigm for long-term underwater sensor networksAd Hoc Networks201555
41Design of experiments (DoE) to develop and to optimize nanoparticles as drug delivery systemsEuropean Journal of Pharmaceutics and Biopharmaceutics202155
42A biased random-key genetic algorithm for routing and wavelength assignmentJournal of Global Optimization201154
43On the design of resilient heterogeneous wireless sensor networks based on small world conceptsComputer Networks201053
44On the design and capacity planning of a wireless local area network051
45Exploiting ConvNet Diversity for Flooding IdentificationIEEE Geoscience and Remote Sensing Letters201851
46A general data fusion architecture200350
47Video-Based Face Spoofing Detection through Visual Rhythm Analysis201250
48Algorithms for Wireless CapacityIEEE/ACM Transactions on Networking201450
49On the evaluation of code smells and detection toolsJournal of Software Engineering Research and Development201750
50Scheduling nodes in wireless sensor networks: a Voronoi approach200349