| 1 | Comparative genomics of the lactic acid bacteria | Proceedings of the National Academy of Sciences of the United States of America | 2006 | 1,373 |
| 2 | What we talk about when we talk about context | Personal and Ubiquitous Computing | 2003 | 1,079 |
| 3 | Motor Schema — Based Mobile Robot Navigation | International Journal of Robotics Research | 1989 | 764 |
| 4 | Why we blog | Communications of the ACM | 2004 | 720 |
| 5 | Voltage scheduling problem for dynamically variable voltage processors | | 1998 | 623 |
| 6 | Remarkable Interkingdom Conservation of Intron Positions and Massive, Lineage-Specific Intron Loss and Gain in Eukaryotic Evolution | Current Biology | 2003 | 437 |
| 7 | SourcererCC | | 2016 | 400 |
| 8 | A probabilistic remark on algebraic program testing | Information Processing Letters | 1978 | 352 |
| 9 | Secure Distributed Key Generation for Discrete-Log Based Cryptosystems | Journal of Cryptology | 2006 | 341 |
| 10 | Identifying gene-disease associations using centrality on a literature mined gene-interaction network | Bioinformatics | 2008 | 334 |
| 11 | (null) | BMC Evolutionary Biology | 2003 | 328 |
| 12 | Integrating behavioral, perceptual, and world knowledge in reactive navigation | Robotics and Autonomous Systems | 1990 | 324 |
| 13 | Evaluating the use of the Web for tourism marketing: a case study from New Zealand | Tourism Management | 2002 | 296 |
| 14 | A Review on Technical and Clinical Impact of Microsoft Kinect on Physical Therapy and Rehabilitation | Journal of Medical Engineering | 2014 | 243 |
| 15 | Security in the wild: user strategies for managing security as an everyday, practical problem | Personal and Ubiquitous Computing | 2004 | 240 |
| 16 | Automatic generation of linear-time algorithms from predicate calculus descriptions of problems on recursively constructed graph families | Algorithmica | 1992 | 219 |
| 17 | Accurate Prediction of Protein Disordered Regions by Mining Protein Structure Data | Data Mining and Knowledge Discovery | 2005 | 192 |
| 18 | Molecular Communication: Modeling Noise Effects on Information Rate | IEEE Transactions on Nanobioscience | 2009 | 190 |
| 19 | Towards an understanding of the role of experience in the evolution from novice to expert | International Journal of Man-Machine Studies | 1983 | 177 |
| 20 | (null) | Data Mining and Knowledge Discovery | 2003 | 173 |
| 21 | Extensive gene gain associated with adaptive evolution of poxviruses | Proceedings of the National Academy of Sciences of the United States of America | 2003 | 170 |
| 22 | Downscaling of Daily Rainfall Occurrence over Northeast Brazil Using a Hidden Markov Model | Journal of Climate | 2004 | 170 |
| 23 | An experimental card game for teaching software engineering processes | Journal of Systems and Software | 2005 | 161 |
| 24 | A novel image steganography technique based on quantum substitution boxes | Optics and Laser Technology | 2019 | 153 |
| 25 | Multiprocessor Organization—a Survey | ACM Computing Surveys | 1977 | 152 |
| 26 | Construction and application of dynamic protein interaction network based on time course gene expression data | Proteomics | 2013 | 150 |
| 27 | Propagation and amplification of molecular information using a photoresponsive molecular switch | Supramolecular Chemistry | 2009 | 143 |
| 28 | Factors affecting adoption of electronic commerce technologies by SMEs: an Australian study | Journal of Small Business and Enterprise Development | 2003 | 142 |
| 29 | A nanosensory device fabricated on a liposome for detection of chemical signals | Biotechnology and Bioengineering | 2010 | 141 |
| 30 | SLIC_SVM based leaf diseases saliency map extraction of tea plant | Computers and Electronics in Agriculture | 2019 | 134 |
| 31 | Construction of fractal objects with iterated function systems | Computer Graphics | 1985 | 131 |
| 32 | AND/OR search spaces for graphical models | Artificial Intelligence | 2007 | 117 |
| 33 | COVID Symptoms, Symptom Clusters, and Predictors for Becoming a Long-Hauler Looking for Clarity in the Haze of the Pandemic | Clinical Nursing Research | 2022 | 113 |
| 34 | Efficient quantum-based security protocols for information sharing and data protection in 5G networks | Future Generation Computer Systems | 2019 | 112 |
| 35 | Mapping Human Vulnerability to Extreme Heat: A Critical Assessment of Heat Vulnerability Indices Created Using Principal Components Analysis | Environmental Health Perspectives | 2020 | 108 |
| 36 | Artificial intelligence (AI) and machine learning (ML) based decision support systems in mental health: An integrative review | International Journal of Mental Health Nursing | 2023 | 104 |
| 37 | Collaborative help in chronic disease management | | 2012 | 102 |
| 38 | A hybrid fuzzy brain-storm optimization algorithm for the classification of brain tumor MRI images | Journal of Ambient Intelligence and Humanized Computing | 2020 | 99 |
| 39 | Using Learning to Facilitate the Evolution of Features for Recognizing Visual Concepts | Evolutionary Computation | 1996 | 96 |
| 40 | An encryption protocol for NEQR images based on one-particle quantum walks on a circle | Quantum Information Processing | 2019 | 95 |
| 41 | Why do people oppose mask wearing? A comprehensive analysis of U.S. tweets during the COVID-19 pandemic | Journal of the American Medical Informatics Association: JAMIA | 2021 | 91 |
| 42 | Real-time DDoS attack detection using FPGA | Computer Communications | 2017 | 89 |
| 43 | Properties that characterize LOGCFL | Journal of Computer and System Sciences | 1991 | 87 |
| 44 | A user sensitive subject protection approach for book search service | Journal of the Association for Information Science and Technology | 2020 | 86 |
| 45 | Learning Probabilistic Models for Contour Completion in Natural Images | International Journal of Computer Vision | 2007 | 85 |
| 46 | Automatic image annotation by incorporating feature hierarchy and boosting to scale up SVM classifiers | | 2006 | 84 |
| 47 | Privacy in pervasive environments: next generation labeling protocols | Personal and Ubiquitous Computing | 2004 | 83 |
| 48 | Log Space Recognition and Translation of Parenthesis Languages | Journal of the ACM | 1977 | 82 |
| 49 | Organizational Memory as Objects, Processes, and Trajectories: An Examination of Organizational Memory in Use | Computer Supported Cooperative Work | 2004 | 81 |
| 50 | A Numerical Approach to Genetic Programming for System Identification | Evolutionary Computation | 1995 | 80 |