Most Cited Computer Science Articles
This list is generated from documents in the CiteSeer^{x} database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeer^{x} database, since the database is continuously updated.
All Years
 1990
 1991
 1992
 1993
 1994
 1995
 1996
 1997
 1998
 1999
 2000
 2001
 2002
 2003
 2004
 2005
 2006
 2007
 2008
 2009
 2010
 2011
 2012
 2013
 2014
 2015

A performance evaluation of local descriptors. IEEE Trans. Pattern Anal, 20051248

Automatic verification of finite–state concurrent systems. Lecture Notes in Computer Science, 19941245

GroupLens: an open architecture for collaborative filtering of Netnews. Proceedings of the ACM 1994 Conference on Computer Supported Cooperative Work(CSCW’94, 19941245

Contentbased image retrieval at the end of the early years. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20001244

Agency costs of free cash flow, corporate finance, and takeovers. American Economic Review, 19861243

Identitybased Encryption from the WeilPairings. In Proceedings of CRYPTO 2001, SpringerVerlag, LNCS2139, 20011240

The Active Badge Location System. ACM Transactions on Information Systems, 19921233

SelfSimilarity in World Wide Web traffic, Evidence and Possible cause. In Proceeding of ACM SIGMETRICS ’96, 19961233

Intelligent agents: theory and practice. The Knowledge Engineering Review, 19951229

The Equity Premium: A Puzzle. Journal of Monetary Economics, 19851228

The CrossSection of Expected Stock Returns. Journal of Finance, 19921228

Properties of subsets. Formalized Mathematics, 19901227

A publickey cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 19851227

The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration. Tuecke, Open Grid Service Infrastructure WG, Global Grid Forum, 20021227

Condensation – conditional density propagation for visual tracking. International Journal of Computer Vision, 19981225

Capitalism, socialism, and democracy. 19421219

Pfinder: RealTime Tracking of the Human Body. IEEE Trans. Pattern Analysis and Machine Intelligence, 19971219

A universal algorithm for sequential data compression. IEEE Transactions on Information Theory, 19771217

The Sybil Attack. In Proceedings of IPTPS, 20021217

Network Information Flow. IEEE Transactions on Information Theory, 20001216

An overview of AspectJ. In ECOOP, 20011213

A logic of authentication. ACM Transactions on Computing Systems, 19901209

The SPLASH2 programs: characterization and methodological considerations. Proceedings. 22nd Annual International Symposium on, 19951205

Rolebased access control models. in IEEE Computer, 19961205

A densitybased algorithm for discovering clusters in large spatial databases with noise. In Proc. ACM KDD, 19961204

Chaff: Engineering an efficient sat solver. In Proceedings of Design Automation Conference, 20011203

Modeling TCP throughput: A simple model and its empirical validation. In ACM Computer Communications Review: Proceedings of SIGCOMM 1998, 19981198

Monopolistic competition and optimum product diversity. American Economic Review, 19771186

Progressive meshes. In SIGGRAPH ’96 Proc, 19961186

On Spectral Clustering: Analysis and an Algorithm. In Advances in Neural Information Processing Systems, ed. T Dietterich, S Becker and Z Ghahramani, 20021184

Tangible Bits: towards seamless interfaces between people, bits and atoms. Proceedings of CHI ‘97, Conference on human factors in computing systems, 19971184

An InformationMaximization Approach to Blind Separation. and Blind Deconvolution,” Neural Computation, 19951174

Tag: a tiny aggregation service for adhoc sensor networks. SIGOPS Oper. Syst. Rev, 01173

Robust RealTime Face Detection. International Journal of Computer Vision, 01172

Wireless sensor networks for habitat monitoring. In: Proc. of the 1st ACM Int’l Workshop on Wireless Sensor Networks and Applications (WSNA 2002, 20021172

Temporal and Modal Logic. Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics, 19901171

Empirical analysis of predictive algorithms for collaborative filtering. Proceedings of the 14th Annual Conference on Uncertainty in Artificial Intelligence (UAI98, 19981169

A case for end system multicast. in ACM Sigmetrics, 20001162

Proofcarrying code. In 24th ACM SIGPLANSIGACT Symposium on Principles of Programming Languages, 19971161

Light field rendering. Computer Graphics, 19961160

Graphical models. 19961160

Bayes Factors. Journal of the American Statistical Association, 19951159

Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transactions on Information Theory, 20041159

A Maximum Entropy approach to natural language processing. Computational Linguistics, 19961152

A Theory of Organizational Knowledge Creation. International Journal of Technology Management, 19961151

An energyefficient mac protocol for wireless sensor networks. Proceedings of the 21st International Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM, 20021148

Matching pursuit with timefrequency dictionaries. IEEE Trans. Sig. Proc, 19931145

Analysis and simulation of a fair queueing algorithm. In Proceedings of the ACM SIGCOMM Conference, 19891145

Nonlinear component analysis as a kernel eigenvalue problem. Neural Computation, 19981143

Geodesic active contours. International Journal of Computer Vision, 19971142

InstanceBased Learning Algorithms. Machine Learning, 19911140

Selfefficacy: Towards a unifying theory of behavioral change. Psychological Review, 19771139

MUSCLE: Multiple sequence alignment with high accuracy and high throughput. Nucleic Acids Res, 20041130

Wrappers for feature subset selection. Artificial Intelligence, 19971130

On the security of public key protocols. IEEE Transactions on Information Theory, 19831129

On Persistence in Mutual Fund Performance. Journal of Finance, 19971126

A taxonomy and evaluation of dense twoframe stereo correspondence algorithms. In Proc. IEEE Int. Conf. on Computer Vision (ICCV, 01125

A Measurement Study of PeertoPeer File Sharing Systems. In Proceedings of the Multimedia Computing and Networking (MMCN, 20021120

Performance of optical flow techniques. International Journal of Computer Vision, 19941119

The determinants of corporate borrowing. Journal of Financial Economics, 19771115

Wattch: A framework for architecturallevel power analysis and optimizations. In Proceedings of the 27th Annual International Symposium on Computer Architecture, 20001115

Spacetime block codes from orthogonal designs. IEEE Transactions on Information Theory, 19991115

A survey of approaches to automatic schema matching. VLDB Journal, 01112

Multiuser Detection. 19981107

The architecture of cognition. 19831106

A Model of SaliencyBased Visual Attention for Rapid Scene Analysis. IEEE Trans. PAMI, 19981102

Evaluating KQML as an agent communication language. Intelligent Agents II, 19951096

On combining classifiers. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19981096

Attention, intentions and the structure of discourse. Computational linguistics, 19861095

Ztree: Zürich toolbox for readymade economic experiments. Experimental Economics, 20071094

The Laplacian pyramid as a compact image code. IEEE Trans. Commun, 19831094

Applications of inductive logic programming. Communications of the ACM, 19951093

Economic Growth in a Cross Section of Countries. Quarterly Journal of Economics 106, 19911092

The Knowledge Complexity of Interactive Proof Systems. SIAM Journal on Computing, 19891084

Depthfirst search and linear graph algorithms. SIAM Journal on Computing, 19721084

Distributed snapshots: determining global states of distributed systems. ACM Transactions on Computing Systems, 19851076

The Generative Lexicon. 19951065

Federated database systems for managing distributed, heterogeneous and autonomous databases. ACM Computing Surveys, 19901065

The Rtree: An efficient and robust access method for points and rectangles. In Proceedings of the 1990 ACMSIGMOD Conference, 19901060

A calculus of mobile processes. I and II. Information and Computation, 19921058

Scale & affine invariant interest point detectors. IJCV, 01053

Fast effective rule induction. In Machine Learning: Proceedings of the Twelfth International Conference. Lake Tahoe, 19951053

A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers. Commun, 19991050

Resilient overlay networks. In Operating Systems Review, 20011050

Functions from a set to a set. Formalized Mathematics, 19901048

A comparative study on feature selection in text categorization. Proc. 14th International Conference on Machine Learning (ICML’97, 19971047

Advances in prospect theory: Cumulative representation of uncertainty. J. Risk Uncertainty, 19921046

A reliable multicast framework for lightweight sessions and application level framing. IEEE/ACM Transactions on Networking, 19971046

The theory of planned behavior. Organizational Behavior and Human Decision Processes, 19911044

A simple, fast, and accurate algorithm to estimate large phylogenies by maximum likelihood. Systematic Biology, 20031042

A resourcebased view of the firm. Strategic Management Journal, 19841041

The Google file system. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, 20031040

Mediators in the architecture of future information systems. IEEE Computer, 01032

Multicast Routing in Datagram Internetworks and Extended LANs newblock. In ACM SIGCOMM’88 and, 01028

Fast Planning Through Planning Graph Analysis. In Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, 19951027