994(top 1%)
papers
23.9K(top 1%)
citations
73(top 1%)
h-index
124(top 1%)
g-index
1.2K
all documents
27.7K
doc citations
2.6K
citing journals

Top Articles

#TitleJournalYearCitations
1On the Sensitivity of Mean-Variance-Efficient Portfolios to Changes in Asset Means: Some Analytical and Computational ResultsReview of Financial Studies1991827
2Universal Computation by Quantum WalkPhysical Review Letters2009755
3Meta-omics analysis of elite athletes identifies a performance-enhancing microbe that functions via lactate metabolismNature Medicine2019534
4Demonstration of Blind Quantum ComputingScience2012390
5A Signal Processing Perspective on Hyperspectral Unmixing: Insights from Remote SensingIEEE Signal Processing Magazine2014374
6A Meet-in-the-Middle Algorithm for Fast Synthesis of Depth-Optimal Quantum CircuitsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems2013353
7Quantum Algorithm for Data FittingPhysical Review Letters2012337
8A Taxonomy of Pairing-Friendly Elliptic CurvesJournal of Cryptology2010333
9On the cut polytopeMathematical Programming1986297
10On the Relationship Between Continuous- and Discrete-Time Quantum WalkCommunications in Mathematical Physics2010257
11Everything You Always Wanted to Know About LOCC (But Were Afraid to Ask)Communications in Mathematical Physics2014248
12Combinatorial properties of frameproof and traceability codesIEEE Transactions on Information Theory2001233
13Partially finite convex programming, Part I: Quasi relative interiors and duality theoryMathematical Programming1992232
14The Landscape of Genetic Content in the Gut and Oral Human MicrobiomeCell Host and Microbe2019230
15Accelerated Multiplicative Updates and Hierarchical ALS Algorithms for Nonnegative Matrix FactorizationNeural Computation2012223
16Fast and Robust Recursive Algorithmsfor Separable Nonnegative Matrix FactorizationIEEE Transactions on Pattern Analysis and Machine Intelligence2014219
17On the Contrast in Visual Cryptography SchemesJournal of Cryptology1999209
18ON OPTIMAL QUANTUM CODESInternational Journal of Quantum Information2004209
19Quantum algorithms for algebraic problemsReviews of Modern Physics2010201
20Algorithm for cardinality-constrained quadratic optimizationComputational Optimization and Applications2009194
21Acyclic coloring of graphsRandom Structures and Algorithms1991189
22Active set algorithms for isotonic regression; A unifying frameworkMathematical Programming1990174
23Semidefinite Programming Relaxations for the Quadratic Assignment ProblemJournal of Combinatorial Optimization1998172
24Solving Euclidean Distance Matrix Completion Problems Via Semidefinite ProgrammingComputational Optimization and Applications1999170
25Hamiltonian Simulation with Nearly Optimal Dependence on all Parameters2015170
26Constructing elliptic curve isogenies in quantum subexponential timeJournal of Mathematical Cryptology2014162
27A recipe for semidefinite relaxation for (0,1)-quadratic programmingJournal of Global Optimization1995161
28Experiments in quadratic 0–1 programmingMathematical Programming1989159
29Quantum to Classical Transition for Random WalksPhysical Review Letters2003156
30Reconstruction of ancient microbial genomes from the human gutNature2021152
31Comparison of musical sequencesComputers and the Humanities1990151
32Hamiltonian Learning and Certification Using Quantum ResourcesPhysical Review Letters2014149
33Simulation of quantum circuits by low-rank stabilizer decompositionsQuantum - the Open Journal for Quantum Science0144
34Domination in graphs with minimum degree twoJournal of Graph Theory1989141
35Robust online Hamiltonian learningNew Journal of Physics2012139
36Low-density MDS codes and factors of complete graphsIEEE Transactions on Information Theory1999137
37Power Quality Disturbance Classification Using the Inductive Inference ApproachIEEE Transactions on Power Delivery2004134
38Bit-parallel finite field multiplier and squarer using polynomial basisIEEE Transactions on Computers2002132
39Quantum walks driven by many coinsPhysical Review A2003132
40Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed PixelsDesigns, Codes, and Cryptography2002129
41Another Look at "Provable Security"Journal of Cryptology2007128
42Sensitivity Analysis for Mean-Variance Portfolio ProblemsManagement Science1991121
43Quantum random walks with decoherent coinsPhysical Review A2003121
44Elliptic curve cryptosystems and their implementationJournal of Cryptology1993118
45A class of nonconvex functions and mathematical programmingBulletin of the Australian Mathematical Society1988116
46The trust region subproblem and semidefinite programming*Optimization Methods and Software2004112
47Clique Tree Inequalities and the Symmetric Travelling Salesman ProblemMathematics of Operations Research1986109
48Approximate Quantum Cloning with Nuclear Magnetic ResonancePhysical Review Letters2002108
49Field inversion and point halving revisitedIEEE Transactions on Computers2004105
50Steiner trees, connected domination and strongly chordal graphsNetworks1985104