# | Title | Journal | Year | Citations |
---|
1 | SLIC Superpixels Compared to State-of-the-Art Superpixel Methods | IEEE Transactions on Pattern Analysis and Machine Intelligence | 2012 | 7,142 |
2 | Central pattern generators for locomotion control in animals and robots: A review | Neural Networks | 2008 | 1,493 |
3 | Experiment-Driven Characterization of Full-Duplex Wireless Systems | IEEE Transactions on Wireless Communications | 2012 | 1,426 |
4 | Securing vehicular ad hoc networks | Journal of Computer Security | 2007 | 1,290 |
5 | Salient Region Detection and Segmentation | | 2008 | 610 |
6 | Threshold Saturation via Spatial Coupling: Why Convolutional LDPC Ensembles Perform So Well over the BEC | IEEE Transactions on Information Theory | 2011 | 518 |
7 | Information-Theoretic Regret Bounds for Gaussian Process Optimization in the Bandit Setting | IEEE Transactions on Information Theory | 2012 | 475 |
8 | Executable cell biology | Nature Biotechnology | 2007 | 470 |
9 | The Evolution of Research on Computer-Supported Collaborative Learning | | 2009 | 339 |
10 | High dynamic range image rendering with a retinex-based adaptive filter | IEEE Transactions on Image Processing | 2006 | 299 |
11 | Design and characterization of a CMOS 3-D image sensor based on single photon avalanche diodes | IEEE Journal of Solid-State Circuits | 2005 | 293 |
12 | On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks | | 2008 | 284 |
13 | AmphiBot I: an amphibious snake-like robot | Robotics and Autonomous Systems | 2005 | 265 |
14 | Secure positioning of wireless devices with application to sensor networks | | 0 | 263 |
15 | Acoustic echoes reveal room shape | Proceedings of the National Academy of Sciences of the United States of America | 2013 | 220 |
16 | TraNS | Mobile Computing and Communications Review | 2008 | 217 |
17 | Polar Codes are Optimal for Lossy Source Coding | IEEE Transactions on Information Theory | 2010 | 216 |
18 | On selfish behavior in CSMA/CA networks | | 0 | 208 |
19 | The mechanics of CSCL macro scripts | International Journal of Computer-Supported Collaborative Learning | 2008 | 206 |
20 | Optimal Power Control, Scheduling, and Routing in UWB Networks | IEEE Journal on Selected Areas in Communications | 2004 | 194 |
21 | A parsimonious model of mobile partitioned networks with clustering | | 2009 | 189 |
22 | Exact and approximate algorithms for the extension of embedded processor instruction sets | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | 2006 | 177 |
23 | Information flow decomposition for network coding | IEEE Transactions on Information Theory | 2006 | 170 |
24 | Efficient Broadcasting Using Network Coding | IEEE/ACM Transactions on Networking | 2008 | 166 |
25 | Programmable central pattern generators: an application to biped locomotion control | | 0 | 164 |
26 | Editing in Style: Uncovering the Local Semantics of GANs | | 2020 | 161 |
27 | Hebbian plasticity requires compensatory processes on multiple timescales | Philosophical Transactions of the Royal Society B: Biological Sciences | 2017 | 151 |
28 | Digital epidemiology: what is it, and where is it going? | Life Sciences, Society and Policy | 2018 | 141 |
29 | Color image dehazing using the near-infrared | | 2009 | 140 |
30 | Rate performance objectives of multihop wireless networks | IEEE Transactions on Mobile Computing | 2004 | 139 |
31 | The temporal paradox of Hebbian learning and homeostatic plasticity | Current Opinion in Neurobiology | 2017 | 138 |
32 | Integer-Forcing Linear Receivers | IEEE Transactions on Information Theory | 2014 | 131 |
33 | Exploring New Search Algorithms and Hardware for Phylogenetics: RAxML Meets the IBM Cell | Journal of Signal Processing Systems | 2007 | 128 |
34 | DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots | IEEE Transactions on Mobile Computing | 2006 | 127 |
35 | Connectivity vs capacity in dense ad hoc networks | | 0 | 125 |
36 | Stretching transactional memory | | 2009 | 124 |
37 | SenGuard: Passive user identification on smartphones using multiple sensors | | 2011 | 121 |
38 | Energy-aware traffic engineering | | 2010 | 118 |
39 | DeepFly3D, a deep learning-based approach for 3D limb and appendage tracking in tethered, adult Drosophila | ELife | 2019 | 118 |
40 | Early evidence of effectiveness of digital contact tracing for SARS-CoV-2 in Switzerland | Swiss Medical Weekly | 2020 | 114 |
41 | Sampling Curves With Finite Rate of Innovation | IEEE Transactions on Signal Processing | 2014 | 113 |
42 | Finding instabilities in the community structure of complex networks | Physical Review E | 2005 | 109 |
43 | Database Replication Using Generalized Snapshot Isolation | | 0 | 108 |
44 | Higher Order SVD Analysis for Dynamic Texture Synthesis | IEEE Transactions on Image Processing | 2008 | 105 |
45 | Online trajectory generation in an amphibious snake robot using a lamprey-like central pattern generator model | Proceedings - IEEE International Conference on Robotics and Automation | 2007 | 100 |
46 | Group Testing With Probabilistic Tests: Theory, Design and Application | IEEE Transactions on Information Theory | 2011 | 100 |
47 | Secure Localization with Hidden and Mobile Base Stations | | 2006 | 93 |
48 | Linear Local Models for Monocular Reconstruction of Deformable Surfaces | IEEE Transactions on Pattern Analysis and Machine Intelligence | 2011 | 92 |
49 | The Boolean Solution to the Congested IP Link Location Problem: Theory and Practice | | 2007 | 90 |
50 | Reed–Muller Codes Achieve Capacity on Erasure Channels | IEEE Transactions on Information Theory | 2017 | 89 |