Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. P N Belhumeur, J P Hespanha, D J Kriegman.
    Eigenfaces vs. Fisherfaces: Recognition using class-specific linear projection. Trans. Pat. Anal. Mach. Intell, 1997
    1061
  2. R S Sutton.
    Learning to predict by the method of temporal difference. Machine Learning, 1988
    1044
  3. Michael Burrows, Martín Abadi, Roger Needham.
    A logic of authentication. ACM Transactions on Computer Systems, 1990
    1039
  4. W Hoeffding.
    Probability inequalities for sums of bounded random variables. Journal of American Statistical Association, 1963
    1037
  5. L Lamport, R Shostak, M Pease.
    The Byzantine Generals problem. ACM Trans. Program. Lang. Syst, 1982
    1032
  6. D L Parnas.
    On the criteria to be used in decomposing systems into modules. Communications of the ACM, 1972
    1024
  7. Mark Crovella, Azer Bestavros.
    Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes. In Proceedings of SIGMETRICS’96: The ACM International Conference on Measurement and Modelling of Computer Systems, 1996
    1009
  8. E A Emerson.
    Temporal and modal logics. Handbook of Theoret. Comput. Sci., volume B, 1990
    1004
  9. D Chaum.
    Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 1981
    1001
  10. G C Necula.
    Proof-carrying code. In 24th Symposium on Principles of Programming Languages, POPL’97, 1997
    1000
  11. Rosalind W Picard.
    Affective Computing. 1997
    992
  12. T Cootes, K Walker, C Taylor.
    View-based active appearance models. in IEEE Conf. on Automatic Face and Gesture Recognition, 2000
    982
  13. J Padhye, V Firoiu, D Towsley, J Kurose.
    Modeling TCP Throughput: A Simple Model and its Empirical Validation. In Proc. ACM SIGCOMM, 1998
    980
  14. G Lakoff, M Johnson.
    Metaphors we live by. University of Chicago Press. Chicago: the child. London: Routledge & Kegan, 1980
    979
  15. M Faloutsos, P Faloutsos, C Faloutsos.
    On Power-Law Relationships of the Internet Topology. Computer Comm. Rev, 1999
    979
  16. Czes̷law Byliński.
    Functions from a set to a set. Formalized Mathematics, 1990
    975
  17. M Wooldridge, N R Jennings.
    Intelligent Agents: Theory and Practice. Knowledge Engineering Review, 1995
    972
  18. Scott Shaobing Chen, David L Donoho, Michael A Saunders.
    Atomic decomposition by basis pursuit. SIAM Journal on Scientific Computing, 1999
    971
  19. H Hoppe.
    Progressive meshes. In Proc. of the 23rd Annual Conf. on Computer Graphics and Interactive Techniques, 1996
    971
  20. L Davis.
    Ed.”Handbook of Genetic Algorithms. International Journal of Computer Science and Security, Volume (1): Issue, 1991
    969
  21. A Hyvärinen, J Karhunen, E Oja.
    Independent Component Analysis. 2001
    968
  22. A Demers, S Keshav, S Shenker.
    Analysis and simulation of a fair queueing algorithm. SIGCOMM ’89: Symposium proceedings on Communications architectures & protocols, 1989
    966
  23. Edmund Woronowicz.
    Relations and their basic properties. Formalized Mathematics, 1990
    964
  24. E W Dijkstra.
    A note on two problems in connexion with graphs. Numerische Mathematik, 2004
    963
  25. Y -H Chu, S G Rao, H Zhang.
    A Case for End System Multicast. Proc. of ACM SIGMETRICS, 2000
    962
  26. George A Miller.
    WordNet: A Lexical Database for English. Communications of the ACM, 1995
    960
  27. David G Lowe.
    Object recognition from local scale-invariant features. In Proc. of the International Conference on Computer Vision ICCV, Corfu, 1999
    958
  28. C Berrou, A Glavieux, P Thitimasjshima.
    Near Shannon Limit Error-Correcting Coding and Decoding. Turbo Codes,”Proceedings of the IEEE International Conference on Communications, 1993
    957
  29. Gregor Kiczales, Erik Hilsdale, Jim Hugunin, Mik Kersten, Jeffrey Palm, William G Griswold.
    An overview of AspectJ. In Proceedings of the European Conference on ObjectOriented Programming (ECOOP, 2001
    954
  30. S H Muggleton.
    Inductive Logic Programming. 1992
    952
  31. P Bahl, V Padmanabhan.
    RADAR: An In-building RF-based User Location and Tracking System. In INFOCOM 2000, 0
    951
  32. S C Woo, M Ohara, E Torrie, J P Singh, A Gupta.
    The splash-2 programs: characterization and methodological considerations. SIGARCH Comput. Archit. News, 1995
    941
  33. Sally Floyd, Steven McCanne Van Jacobson, Lixia Zhang, Ching-Gung Liu.
    A reliable multicast framework for light-weight sessions and application level framing. In Proceedings of SIGCOMM, 1995
    941
  34. R J Barro, X Sala-i-Martin.
    Economic Growth. 1995
    927
  35. R S Sandhu.
    Role-Based Access Control Models. IEEE Computer, 1996
    922
  36. Dragovic Barham, Hand Fraser, Harris.
    Xen and the art of virtualization. 2003
    922
  37. A Blum, T Mitchell.
    Combining labeled and unlabeled data with co-training. In Proceedings ofthe Eleventh Annual Conference on Computational Learning Theory, 1998
    918
  38. J Ziv, A Lempel.
    A universal algorithm for sequential data compression. IEEE Trans. Info. Theory, 1977
    917
  39. T Finin, R Fritzson.
    KQML as an Agent Communication Language. In Proceedings of the Third International Conference on Information and Knowledge Management (CIKM’94, 1994
    917
  40. G J Foschini, M J Gans.
    On Limits of Wireless Communications in a Fading Environment When Using Multiple Antennas. Wireless Personal Communications, 1998
    916
  41. R Want, A Hopper, V Falcao, J Gibbsons.
    The Active Badge location System. ACM Transactions on Information System, 1992
    915
  42. S E Deering, D R Cheriton.
    Multicast Routing in Datagram Internetworks and extended LANs. ACM Transactions on Computer Systems, 1990
    914
  43. T Hastie, R Tibshirani.
    Generalized additive models. 1990
    913
  44. T von Eicken, D E Culler, S C Goldstein, K E Schauser.
    Active messages: a mechanism for integrated communication and computation. In International Symposium on Computer Architecture, 1992
    911
  45. S Saroiu, K P Gummadi, S D Gribble.
    A measurement study of peer-to-peer file sharing systems. in Multimedia Computing and Networking (MMCN, 2002
    907
  46. K Mani Chandy, Leslie Lamport.
    Distributed Snapshots: Determining Global States of Distributed Systems. ACM Transactions on Computer Systems, 1985
    906
  47. K Papineni, S Roukos, T Ward, Zhu.
    W.: Bleu: a method for automatic evaluation of machine translation. In: 40th Meeting of the Association for Computational Linguistics, 2002
    902
  48. Barbara J Grosz, Candace L Sidner.
    Attention, intentions, and the structure of discourse. Computational Linguistics, 1986
    897
  49. B E Boser, I M Guyon, V N Vapnik.
    A training algorithm for optimal margin classifiers. In COLT, 1992
    896
  50. W Wren, A Azarbaygaui, T Darrell, Pentland.
    A.: Pfinder: realtime tracking of the human body. IEEE Trans. Pattern Anal. Mach. Intell, 1997
    895
  51. R Agrawal, R Srikant.
    Mining Sequential Patterns. In Proceedings of the 11th International Conference on Data Engineering, 1995
    895
  52. M LEVOY, P M HANRAHAN.
    Light field rendering. In SIGGRAPH, 1996
    894
  53. P PERONA, J MALIK.
    Scale-space and edge detection using anisotropic diffusion. IEEE Trans. Pattern Anal. Mach. Intell, 1990
    891
  54. M W Moskewicz, C F Madigan, Y Zhao, L Zhang, S Malik.
    Engineering an efficient SAT solver. In Proceedings of the 38th Design Automation Conference, 2001
    891
  55. G Wiederhold.
    Mediation in the Architecture of Future Information Systems. IEEE Computer, 1992
    888
  56. Andrew D Birrell, Bruce Jay Nelson.
    Implementing Remote Procedure Calls. In SOSP ’83: Proceedings of the ninth ACM symposium on Operating Systems Principles, 1983
    883
  57. W Heinzelman, A Chandrakasan, H Balakrishnan.
    Energy-efficient communication protocol for wireless sensor networks. in the Proceeding of the Hawaii International Conference System Sciences, 2000
    883
  58. D W Aha, D Kibler, M K Albert.
    Instancebased learning algorithms. 1991
    882
  59. L Zhang, S Deering, D Estrin, S Shenker, D Zappala.
    Rsvp: A new resource reservation protocol. In IEEE Network, 1993
    882
  60. R Milner.
    A theory of type polymorphism in programming. Journal of Computer and System Sciences, 1978
    870
  61. D Dolev, A Yao.
    On the security of public key protocols. Information Theory, IEEE Transactions on, 1983
    869
  62. A K Jain, M N Murty, P J Flynn.
    Data clustering: A review. ACM Computing Surveys, 1999
    865
  63. J J Kistler, M Satyanarayanan.
    Disconnected Operation in the Coda File System. ACM Transactions on Computer Systems, 1992
    864
  64. S Madden, M J Franklin, J M Hellerstein, W Hong.
    Tag: a tiny aggregation service for ad-hoc sensor networks. SIGOPS Operating System Review, 2002
    861
  65. G F Cooper, Herskovits.
    E.: A bayesian method for the induction of probabilistic networks from data. Machine Learning 9, 1992
    860
  66. J L Barron, D J Fleet, S S Beauchemin.
    Performance of optical flow techniques. International Journal of Computer Vision, 1994
    858
  67. Shafi Goldwasser, Silvio Micali, Charles Rackoff.
    The knowledge complexity of interactive proof-systems. Proceedings of 17th Symposium on the Theory of Computation, 1985
    854
  68. Jerome Friedman, Trevor Hastie, Robert Tibshirani.
    Additive logistic regression: a statistical view of boosting (With discussion and a rejoinder by the authors. 2000. ET AL.: ACCURATE REGRESSION PROCEDURES FOR AAMS 11, 0
    851
  69. N J Boden.
    Myrinet - A gigabit per second local area network. IEEE Micro, 1995
    848
  70. Kai Li, Paul Hudak.
    Memory Coherence in Shared Virtual Memory Systems. In Proceedings of the 5th ACM Symposium on Principles of Distributed Computing (PODC, 1986
    847
  71. Norbert Beckmann, Hans-Peter Kriegel, Ralf Schneider, Bernhard Seeger.
    The R*-tree: an efficient and robust access method for points and rectangles. SIGMOD Rec, 1990
    846
  72. A W M Smeulders, M Worring, S Santini, A Gupta, R Jain.
    Content-Based Image Retrieval at the End of the Early Years. IEEE Trans. on Pattern Analysis And Machine Intelligence, 2000
    846
  73. D G Andersen, H Balakrishnan, M F Kaashoek, R Morris.
    Resilient Overlay Networks. In Proc. 18th ACM Symposium on Operating Systems Principles (SOSP, 2001
    846
  74. P F Brown, S A Della Pietra, V J Della Pietra, R L Mercer.
    The mathematics of statistical machine translation: Parameter estimation. Computational Linguistics, 1993
    845
  75. J R Douceur.
    The Sybil Attack. In IPTPS ’01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, 2002
    842
  76. J Han, J Pei, Y Yin.
    Mining Frequent Patterns without Candidate Generation. Proc. ACM SIGMOD, 2000
    839
  77. A Gelman, J Carlin, H Stern, D Rubin.
    Bayesian data analysis. 2004
    838
  78. J Kubiatowicz, D Bindel, Y Chen, S Czerwinski, P Eaton, D Geels, R Gummadi, S Rhea, H Weatherspoon, W Weimer, C Wells, B Zhao.
    OceanStore: An architecture for global-scale persistent storage. ACM SIGPLAN Notices, 0
    837
  79. P Burt, Adelson.
    E.: The Laplacian pyramid as a compact image code. IEEE Transactions on Communication, 1981
    836
  80. A Blum, M L Furst.
    Fast planning through planning graph analysis. Artificial Intelligence, 1997
    834
  81. D Gelernter.
    Generative communication in Linda. ACM Computing Surveys, 1985
    832
  82. R Dechter, I Meiri, J Pearl.
    Temporal constraint networks. Artificial Intelligence, 1991
    831
  83. P Resnick, N Iacovou, M Suchak, P Bergstrom, J Riedl.
    Grouplens: An open architecture for collaborative filtering of netnews. In Proceedings of the ACM conference on Computer supported cooperative work, 1994
    830
  84. Y Boykov, O Veksler, R Zabih.
    Fast approximate energy minimization via graph cuts. IEEE TPAMI, 2001
    825
  85. M Abadi, L Cardelli.
    A Theory of Objects. 1996
    823
  86. D Brooks, V Tiwari, M Martonosi.
    Wattch: A framework for architectural-level power analysis and optimizations. in Proceedings of the 27th Annual ACM/IEEE International Symposium on Computer Architecture, 2000
    815
  87. V Tarokh, N Seshadri, A R Calderbank.
    Space-Time Codes for High Data Rate Wireless Communications: Performance criterion and code construction. IEEE Trans. Information Theory, V, 1998
    811
  88. S Kullback.
    Information Theory and Statistics. In COLING, 1968
    808
  89. F Sebastiani.
    Machine learning in automated text categorization. ACM Computing Surveys, 2002
    807
  90. A Berger, V Della Pietra, S Della Pietra.
    A maximum entropy approach to natural language processing. Computational Linguistics, 1996
    806