Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. K Mikolajczyk, C Schmid.
    A performance evaluation of local descriptors. IEEE Trans. Pattern Anal, 2005
  2. E M Clarke.
    Automatic verification of finite–state concurrent systems. Lecture Notes in Computer Science, 1994
  3. P Resnick, N Iacovou, M Suchak, P Bergstrom, J Riedl.
    GroupLens: an open architecture for collaborative filtering of Netnews. Proceedings of the ACM 1994 Conference on Computer Supported Cooperative Work(CSCW’94, 1994
  4. A W M Smeulders, M Worring, S Santini, A Gupta, R Jain.
    Contentbased image retrieval at the end of the early years. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000
  5. Michael C Jensen.
    Agency costs of free cash flow, corporate finance, and takeovers. American Economic Review, 1986
  6. D Boneh, M Franklin.
    Identity-based Encryption from the WeilPairings. In Proceedings of CRYPTO 2001, Springer-Verlag, LNCS2139, 2001
  7. R Want, A Hopper, V Falcao, J Gibbons.
    The Active Badge Location System. ACM Transactions on Information Systems, 1992
  8. M Crovella, A Bestavros.
    Self-Similarity in World Wide Web traffic, Evidence and Possible cause. In Proceeding of ACM SIGMETRICS ’96, 1996
  9. M Wooldridge, N R Jennings.
    Intelligent agents: theory and practice. The Knowledge Engineering Review, 1995
  10. R Mehra, E C Prescott.
    The Equity Premium: A Puzzle. Journal of Monetary Economics, 1985
  11. Eugene Fama, F, Kenneth R French.
    The Cross-Section of Expected Stock Returns. Journal of Finance, 1992
  12. Zinaida Trybulec.
    Properties of subsets. Formalized Mathematics, 1990
  13. T ElGamal.
    A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 1985
  14. I Foster, C Kesselman, J Nick, S.
    The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration. Tuecke, Open Grid Service Infrastructure WG, Global Grid Forum, 2002
  15. M Isard, A Blake.
    Condensation – conditional density propagation for visual tracking. International Journal of Computer Vision, 1998
  16. Joseph A Schumpeter.
    Capitalism, socialism, and democracy. 1942
  17. C Wren, A Azarbayejani, T Darrell, A Pentland.
    Pfinder: Real-Time Tracking of the Human Body. IEEE Trans. Pattern Analysis and Machine Intelligence, 1997
  18. J Ziv, A Lempel.
    A universal algorithm for sequential data compression. IEEE Transactions on Information Theory, 1977
  19. J R Douceur.
    The Sybil Attack. In Proceedings of IPTPS, 2002
  20. R Ahlswede, N Cai, S R Li, R W Yeung.
    Network Information Flow. IEEE Transactions on Information Theory, 2000
  21. G Kiczales, E Hilsdale, J Hugunin, M Kersten, J Palm, W G Griswold.
    An overview of AspectJ. In ECOOP, 2001
  22. M Burrows, M Abadi, R M Needham.
    A logic of authentication. ACM Transactions on Computing Systems, 1990
  23. S Woo, M Ohara, E Torrie, J Singh, A Gupta.
    The SPLASH-2 programs: characterization and methodological considerations. Proceedings. 22nd Annual International Symposium on, 1995
  24. R S Sandhu, E J Coyne, H L Feinstein, C E Youman.
    Role-based access control models. in IEEE Computer, 1996
  25. M Ester, H-P Kriegel, J Sander, X Xu.
    A density-based algorithm for discovering clusters in large spatial databases with noise. In Proc. ACM KDD, 1996
  26. M Moskewicz, C Madigan, S Malik.
    Chaff: Engineering an efficient sat solver. In Proceedings of Design Automation Conference, 2001
  27. J Padhye, V Firoiu, D Towsley, J Krusoe.
    Modeling TCP throughput: A simple model and its empirical validation. In ACM Computer Communications Review: Proceedings of SIGCOMM 1998, 1998
  28. A K Dixit, J E Stiglitz.
    Monopolistic competition and optimum product diversity. American Economic Review, 1977
  29. Hugues Hoppe.
    Progressive meshes. In SIGGRAPH ’96 Proc, 1996
  30. A Ng, M Jordan, Y Weiss.
    On Spectral Clustering: Analysis and an Algorithm. In Advances in Neural Information Processing Systems, ed. T Dietterich, S Becker and Z Ghahramani, 2002
  31. H and Ullmer Ishii, B.
    Tangible Bits: towards seamless interfaces between people, bits and atoms. Proceedings of CHI ‘97, Conference on human factors in computing systems, 1997
  32. A Bell, T Sejnowski.
    An Information-Maximization Approach to Blind Separation. and Blind Deconvolution,” Neural Computation, 1995
  33. Samuel Madden, Michael J Franklin, Joseph M Hellerstein, Wei Hong.
    Tag: a tiny aggregation service for ad-hoc sensor networks. SIGOPS Oper. Syst. Rev, 0
  34. P Jones M J Viola.
    Robust Real-Time Face Detection. International Journal of Computer Vision, 0
  35. A Mainwaring, D Culler, J Polastre, R Szewczyk, J Anderson.
    Wireless sensor networks for habitat monitoring. In: Proc. of the 1st ACM Int’l Workshop on Wireless Sensor Networks and Applications (WSNA 2002, 2002
  36. E Allen Emerson.
    Temporal and Modal Logic. Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics, 1990
  37. J Breese.
    Empirical analysis of predictive algorithms for collaborative filtering. Proceedings of the 14th Annual Conference on Uncertainty in Artificial Intelligence (UAI-98, 1998
  38. Yang hua Chu, Sanjay G Rao, Hui Zhang.
    A case for end system multicast. in ACM Sigmetrics, 2000
  39. George Necula.
    Proof-carrying code. In 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1997
  40. M Levoy, P Hanrahan.
    Light field rendering. Computer Graphics, 1996
  41. S L Lauritzen.
    Graphical models. 1996
  42. R E Kass, A E Raftery.
    Bayes Factors. Journal of the American Statistical Association, 1995
  43. J N Laneman, D N C Tse, G W Wornell.
    Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transactions on Information Theory, 2004
  44. A L Berger, S A Della Pietra, V J Della Pietra.
    A Maximum Entropy approach to natural language processing. Computational Linguistics, 1996
  45. I Nonaka, H Takeuchi.
    A Theory of Organizational Knowledge Creation. International Journal of Technology Management, 1996
  46. W Ye, J Heidemann, D Estrin.
    An energy-efficient mac protocol for wireless sensor networks. Proceedings of the 21st International Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM, 2002
  47. S Mallat, Z Zhang.
    Matching pursuit with timefrequency dictionaries. IEEE Trans. Sig. Proc, 1993
  48. A Demers, S Keshav, S Shenker.
    Analysis and simulation of a fair queueing algorithm. In Proceedings of the ACM SIGCOMM Conference, 1989
  49. B Schölkopf, A Smola, K-R Müller.
    Nonlinear component analysis as a kernel eigenvalue problem. Neural Computation, 1998
  50. V Caselles, R, G Sapiro.
    Geodesic active contours. International Journal of Computer Vision, 1997
  51. D Aha, D Kibler.
    Instance-Based Learning Algorithms. Machine Learning, 1991
  52. A Bandura.
    Self-efficacy: Towards a unifying theory of behavioral change. Psychological Review, 1977
  53. R Kohavi, G H John.
    Wrappers for feature subset selection. Artificial Intelligence, 1997
  54. D Dolev, A Yao.
    On the security of public key protocols. IEEE Transactions on Information Theory, 1983
  55. M M Carhart.
    On Persistence in Mutual Fund Performance. Journal of Finance, 1997
  56. D Scharstein, R Szeliski.
    A taxonomy and evaluation of dense two-frame stereo correspondence algorithms. In Proc. IEEE Int. Conf. on Computer Vision (ICCV, 0
  57. A G Murzin, S E Brenner, T Hubbard, C Chothia.
    SCOP: a structural classification of proteins database for the investigation of sequences and structures. J.Mol.Biol, 1995
  58. S Saroiu, P K Gummadi, S D Gribble.
    A Measurement Study of Peer-to-Peer File Sharing Systems. In Proceedings of the Multimedia Computing and Networking (MMCN, 2002
  59. J L Barron, D J Fleet, S S Beauchemin.
    Performance of optical flow techniques. International Journal of Computer Vision, 1994
  60. Stewart Myers.
    The determinants of corporate borrowing. Journal of Financial Economics, 1977
  61. David Brooks, Vivek Tiwari, Margaret Martonosi.
    Wattch: A framework for architectural-level power analysis and optimizations. In Proceedings of the 27th Annual International Symposium on Computer Architecture, 2000
  62. V Tarokh, H Jafarkhani, A R Calderbank.
    Space-time block codes from orthogonal designs. IEEE Transactions on Information Theory, 1999
  63. Erhard Rahm, Philip A Bernstein.
    A survey of approaches to automatic schema matching. VLDB Journal, 0
  64. S Verdu.
    Multiuser Detection. 1998
  65. J R Anderson.
    The architecture of cognition. 1983
  66. L Itti, C Koch, E Niebur.
    A Model of Saliency-Based Visual Attention for Rapid Scene Analysis. IEEE Trans. PAMI, 1998
  67. J Mayfield, Y Labrou, T Finin.
    Evaluating KQML as an agent communication language. Intelligent Agents II, 1995
  68. J Kittler, M Hatef, R Duin, J Matas.
    On combining classifiers. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1998
  69. Barbara Grosz, Candy L Sidner.
    Attention, intentions and the structure of discourse. Computational linguistics, 1986
  70. U Fischbacher.
    Z-tree: Zürich toolbox for readymade economic experiments. Experimental Economics, 2007
  71. P J Burt, E H Adelson.
    The Laplacian pyramid as a compact image code. IEEE Trans. Commun, 1983
  72. I Bratko, S Muggleton.
    Applications of inductive logic programming. Communications of the ACM, 1995
  73. Robert J Barro.
    Economic Growth in a Cross Section of Countries. Quarterly Journal of Economics 106, 1991
  74. S Goldwasser, S Micali, C Rackoff.
    The Knowledge Complexity of Interactive Proof Systems. SIAM Journal on Computing, 1989
  75. R E Tarjan.
    Depth-first search and linear graph algorithms. SIAM Journal on Computing, 1972
  76. K M Chandy, L Lamport.
    Distributed snapshots: determining global states of distributed systems. ACM Transactions on Computing Systems, 1985
  77. J Pustejovsky.
    The Generative Lexicon. 1995
  78. Norbery Beckmann, Hans-Peter Kriegel, Ralf Schneider, Bernhard Seeger.
    The R-tree: An efficient and robust access method for points and rectangles. In Proceedings of the 1990 ACM-SIGMOD Conference, 1990
  79. R Milner, J Parrow, D Walker.
    A calculus of mobile processes. I and II. Information and Computation, 1992
  80. K Mikolajczyk, C Schmid.
    Scale & affine invariant interest point detectors. IJCV, 0
  81. W W Cohen.
    Fast effective rule induction. In Machine Learning: Proceedings of the Twelfth International Conference. Lake Tahoe, 1995
  82. E M Royer, C-K Toh.
    A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers. Commun, 1999
  83. D G Andersen, H Balakrishnan, M F K R Morris.
    Resilient overlay networks. In Operating Systems Review, 2001
  84. Czesław Byliński.
    Functions from a set to a set. Formalized Mathematics, 1990
  85. Y Yang, J O Pedersen.
    A comparative study on feature selection in text categorization. Proc. 14th International Conference on Machine Learning (ICML’97, 1997
  86. A Tversky, D Kahneman.
    Advances in prospect theory: Cumulative representation of uncertainty. J. Risk Uncertainty, 1992
  87. S Floyd, V Jacobson, C-G Liu, S McCanne, L Zhang.
    A reliable multicast framework for light-weight sessions and application level framing. IEEE/ACM Transactions on Networking, 1997
  88. I Ajzen.
    The theory of planned behavior. Organizational Behavior and Human Decision Processes, 1991
  89. B Wernerfelt.
    A resource-based view of the firm. Strategic Management Journal, 1984
  90. S Ghemawat, H Gobioff, S Leung.
    The Google file system. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, 2003
  91. S E Deering, D R Cheriton.
    Multicast Routing in Datagram Internetworks and Extended LANs newblock. In ACM SIGCOMM’88 and, 0
  92. A Blum, M Furst.
    Fast Planning Through Planning Graph Analysis. In Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, 1995