Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. S Belongie, J Malik, J Puzicha.
    Shape matching and object recognition using shape contexts. IEEE PAMI, 0
    803
  2. J R Koza.
    Genetic programming. 1992
    801
  3. D Boneh, M Franklin.
    Identity-based encryption from the weil pairings. Advances in Cryptology-Asiacrypt 2001, LNCS 2248, 2001
    797
  4. M Rosenblum, J Ousterhout.
    The Design and Implementation of a Log-Structured File System. ACM Trans. Comput. Syst, 1992
    796
  5. M GARLAND, P S HECKBERT.
    Surface simplification using quadric error metrics. In Proceedings of ACM SIGGRAPH, 1997
    793
  6. A Mainwaring, J Polastre, R Szewczyk, D Culler, J Anderson, “Wireless.
    sensor networks for habitat monitoring. Proc of WSNA, 2002
    787
  7. W W Cohen.
    Fast effective rule induction. In: Proceedings 12th International Conference on Machine Learning, 1995
    786
  8. D R Jefferson.
    Virtual time. ACM TOPLAS, 1985
    784
  9. E Rahm, P A Bernstein.
    A Survey of Approaches to Automatic Schema Matching. VLDB J, 2001
    782
  10. J Dean, S Ghemawat.
    MapReduce: Simplified data processing on large clusters. In OSDI ’04, 2004
    781
  11. J R Quinlan.
    Learning logical definitions from relations. Machine Learning, 1990
    781
  12. T R Golub, D K Slonim, P Tamayo, C Huard, M Gaasenbeek, J P Mesirov, H Coller, M L Loh, J R Downing, M A Caligiuri, C D Bloomfield, E S Lander.
    Molecular classification of cancer: Class discovery and class prediction by gene expression monitoring. Science, 1999
    779
  13. Vicent Caselles, Ron Kimmel, Guillermo Sapiro.
    Geodesic active contours. IJCV, 1997
    771
  14. I Clarke, O Sandberg, B Wiley, T W Hong.
    Freenet: A distributed anonymous information storage and retrieval system. In PET, 2000
    768
  15. Tanenbaum.
    Modern Operating Systems. 1992
    767
  16. F Dabek, M Kaashoek, D Karger, R Morris, I Stoica.
    Wide-area cooperative storage with CFS. ACM SIGOPS Operating Systems Review, 2001
    766
  17. Leslie Lamport.
    The temporal logic of actions. In ACM Transactions on Programming Languages and Systems, 1994
    761
  18. M Este, H-P Kriegel, J Sander, X Xu.
    A density-based algorithm for discovering clusters in large spatial databases with noise. in 2nd ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 1996
    758
  19. M E J Newman.
    The structure and function of complex networks. SIAM Review, 0
    758
  20. J Howard, M Kazar, S Nichols, D Nichols, M Satyanarayanan, R Sidebotham, M West.
    Scale and Performance in a Distributed File System. ACM Transactions on Computer Systems (TOCS, 1988
    757
  21. B Schölkopf, A Smola, K-R Müller.
    Nonlinear component analysis as a kernel eigenvalue problem. Neural Computation, 1998
    755
  22. R Reiter.
    A Theory of Diagnosis from First Principles. Elsevier Science Publishers B.V. (North-Holland, 1987
    752
  23. H A Rowley, S Baluja, T Kanade.
    Neural network‐based face detection. Proceedings CVPR 96, 1996 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1996
    747
  24. M Goemans, D Williamson.
    Improved approximation algorithms for maximum cut and satisfiability problems. Journal of the Association of Computing Machinery, 1995
    743
  25. R Kohavi, John.
    G.H.: Wrappers for feature subset selection. Artifical Intelligence, 1997
    743
  26. M Herlihy, J Wing.
    Linearizability: A correctness condition for concurrent objects. A CM Trunsactions on Programming Languages and Systems, 1990
    743
  27. Wei Ye, John Heidemann, Deborah Estrin.
    An energy-efficient MAC protocol for wireless sensor networks. In Proceedings of the IEEE Infocom, 2002
    742
  28. Ron Cytron, Jeanne Ferrante, Barry K Rosen, Mark N Wegman, F Kenneth Zadeck.
    Efficiently computing static single assignment form and the control dependence graph. ACM Transactions on Programming Languages and Systems, 1991
    741
  29. Jeanne Ferrante, Karl J Ottenstein, Joe D Warren.
    The program dependence graph and its use in optimization. ACM Transactions on Programming Languages and Systems, 1987
    738
  30. J Jaffar, J-L Lassez.
    Constraint Logic Programming. In: 14th Annual ACM Symposium on Principles of Programming Languages, 1987
    736
  31. D L Donoho.
    Compressed sensing. IEEE Trans. Inform. Theory, 2006
    735
  32. D Heckerman, D Geiger, D M Chickering.
    Learning Bayesian networks: The combination of knowledge and statistical data. Machine Learning, 1995
    734
  33. A Van Gelder, K A Ross, J S Schlipf.
    The well-founded semantics for general logic programs. JACM, 1991
    734
  34. D Harel, D Kozen, J Tiuryn.
    Dynamic Logic. Verification of Digital and Hybrid Systems, volume 170 of NATO ASI Series F: Computer and Systems Sciences, 2000
    731
  35. M Blaze, J Feigenbaum, J Lacy.
    Decentralized Trust Management. In Proceedings of the IEEE Symposium on Security and Privacy, 1996
    731
  36. V D Park, M S Corson.
    A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks. Proc. lNFOCOM '97, 1997
    731
  37. C LEE, M POTKONJAK, W H MANGIONE-SMITH.
    Mediabench: a tool for evaluating and synthesizing multimedia and communicatons systems. In Proceedings of the 30th annual ACM/IEEE Int. Sym. on Microarchitecture. MICRO 30. IEEE Computer Society, 1997
    731
  38. E M Royer, C-K Toh.
    A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Personal Communications, 1999
    730
  39. I F Akyildiz, W Su, Y Sankarasu bramaniam, E Cayirci.
    Wireless sensor networks: A survey. Computer Networks J, 0
    730
  40. J Saltzer, D Reed, D Clark.
    End-to-end arguments in system design. ACM Transactions on Computer Systems, 1984
    730
  41. F J Och, Ney.
    H.: A systematic comparison of various statistical alignment models. Computational Linguistics, 2003
    728
  42. Anand S Rao, Michael P Georgeff.
    Modeling rational agents within a BDIarchitecture. 1991
    728
  43. J Kittler, M Hatef, R P Duin, J Matas.
    On combining classifiers. IEEE Trans. on PAMI, 1998
    728
  44. Krystian Mikolajczyk, Cordelia Schmid.
    A performance Evaluation of Local Descriptors. PAMI, 0
    727
  45. Luca Cardelli, Peter Wegner.
    On understanding types, data abstraction, and polymorphism. ACM Computing Surveys, 1985
    726
  46. D Estrin, R Govindan, J Heidemann.
    Kumar S.: Next Century Challenges: Scalable Coordination in Sensor Networks. In: Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom99, 1999
    725
  47. L Cardelli, A Gordon.
    Mobile Ambients. Theoretical Computer Science, 2000
    719
  48. G K Wallace.
    The JPEG Still Picture Compression Standard. IEEE Transactions on Consumer Electronics, 1991
    718
  49. Y Yang, J O Pedersen.
    A Comparative Study on Feature Selection in Text Categorization. In International Conference on Machine Learning, 1997
    718
  50. S J GORTLER, R GRZESZCZUK, R SZELISKI, M F COHEN.
    The lumigraph. In Computer graphics and interactive techniques, SIGGRAPH’96, 1996
    716
  51. L E Kavraki, P ˇSvestka, J C Latombe, M H Overmars.
    Probabilistic roadmaps for path planning in high-dimensional configuration spaces. IEEE Trans. Robot. Automat, 1996
    716
  52. A SAID, W A PEARLMAN.
    MEMBER S.: A new fast and efficient image codec based on set partitioning in hierarchical trees. IEEE Transactions on Circuits and Systems for Video Technology 6, 1996
    715
  53. M S Arulampalam, S Maskell, N Gordon, T Clapp.
    A tutorial on particle filters for online nonlinear, non-Gaussian Bayesian tracking. IEEE Transactions on Signal Processing, 2002
    712
  54. N Dershowitz, J P Jouannaud.
    Rewrite systems. In Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics (B, 1990
    711
  55. J Pustejovsky.
    The generative lexicon. 1995
    710
  56. A Ng, M Jordan, Y Weiss.
    On spectral clustering: Analysis and an algorithm. 0
    708
  57. I H Witten, A Moffat, T C Bell.
    Managing Gigabytes - Compressing and Indexing Documents and Images. 1999
    708
  58. R A BROOKS.
    Intelligence without reason. In Proceedings of the 12th International Joint Conference on Artificial Intelligence, 1991
    708
  59. M KIFER, G LAUSEN, J WU.
    Logical Foundations of Object-Oriented and Frame-Based Languages. Journal of the ACM, 1995
    703
  60. Czeslaw Byli'nski.
    Some basic properties of sets. Formalized Mathematics, 1990
    700
  61. H Balakrishnan, V N Padmanabhan, S Seshan, R H Katz.
    A comparison of mechanisms for improving TCP performance over wireless links. IEEE/ACM Trans. Netw, 1997
    698
  62. J Jaffar, M J Maher.
    Constraint logic programming: A survey. 1994
    698
  63. Martín Abadi, Andrew D Gordon.
    A calculus for cryptographic protocols: the spi calculus. in [AG97]. Martín Abadi and, 1999
    695
  64. F R Kschischang, B J Frey, H A Loeliger.
    Factor Graphs and the Sum-Product Algorithm. IEEE Trans. on Information Theory, 2001
    694
  65. L Breslau, P Cao, L Fan, G Phillips, S Shenker.
    Web caching and zipf-like distributions: Evidence and implications. In INFOCOM, 1999
    694
  66. N Dalal, B Triggs.
    Histograms of oriented gradients for human detection. In CVPR, 2005
    691
  67. A AND EUSTACE SRIVASTAVA, A.
    ATOM: A system for building customized program analysis tools. In Proceedings of the ACM SIGPLAN ’94 Conference on Programming Language Design and Implementation. Association of Computing Machinery, 1994
    690
  68. E Kohler, R Morris, B Chen, J Jannotti, M Kaashoek.
    The Click modular router. in ACM Trans. Comp. Sys, 2000
    690
  69. L BREIMAN.
    Random Forests. Machine Learning, 0
    688
  70. S Goldwasser, S Micali, R L Rivest.
    A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput, 1988
    687
  71. Black Blake, Davies Carlson, Weiss Wang.
    An Architecture for Differentiated Services. 1998
    687
  72. R E Kass, A E Raftery.
    Bayes factors. Journal of the American Statistical Association, 1995
    685
  73. D Scharstein, R Szeliski.
    A taxonomy and evaluation of dense two-frame stereo correspondence algorithms. Int. J. Comput. Vision, 2002
    684
  74. R Albert, A Barabási.
    Statistical mechanics of complex networks. Reviews of modern physics, 2002
    683
  75. M Gelfond, V Lifschitz.
    Classical negation in logic programs and disjunctive databases. New Generation Computing, 1991
    679
  76. P Clark, Niblett.
    T.: The CN2 induction algorithm. Machine Learning, 1989
    679
  77. Ora Lassila, Ralph Swick.
    Resource Description Framework (RDF) Model and Syntax Specification. W3C Recommendation, 1999
    679
  78. P Barford, M Crovella.
    Generating representative web workloads for network and server performance evaluation. in Proc. SIGMETRICS’98/PERFORMANCE’98, 1998
    677
  79. D Marr, E Hildreth.
    Theory of edge detection. Proceedings of the Royal Society of London. Series B. Biological Sciences, 1980
    676
  80. S Verdu.
    Multiuser Detection. 1998
    675
  81. W Freeman, E Adelson.
    The design and use of steerable filters. IEEE TPAMI, 1991
    674
  82. M E Wolf, M S Lam.
    A data locality optimizing algorithm. In Proc. SIGPLAN conf. on programming language design and implementation (pp. 30–43, 1991
    673
  83. J R Anderson.
    The Architecture of Cognition. 1983
    671
  84. S Floyd, K Fall.
    Promoting the use of end-to-end congestion control in the internet. IEEE/ACM Trans. Netw, 1999
    669