Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. K Mikolajczyk, C Schmid.
    A performance evaluation of local descriptors. IEEE Trans. Pattern Anal, 2005
    1248
  2. E M Clarke.
    Automatic verification of finite–state concurrent systems. Lecture Notes in Computer Science, 1994
    1245
  3. P Resnick, N Iacovou, M Suchak, P Bergstrom, J Riedl.
    GroupLens: an open architecture for collaborative filtering of Netnews. Proceedings of the ACM 1994 Conference on Computer Supported Cooperative Work(CSCW’94, 1994
    1245
  4. A W M Smeulders, M Worring, S Santini, A Gupta, R Jain.
    Contentbased image retrieval at the end of the early years. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000
    1244
  5. Michael C Jensen.
    Agency costs of free cash flow, corporate finance, and takeovers. American Economic Review, 1986
    1243
  6. D Boneh, M Franklin.
    Identity-based Encryption from the WeilPairings. In Proceedings of CRYPTO 2001, Springer-Verlag, LNCS2139, 2001
    1240
  7. R Want, A Hopper, V Falcao, J Gibbons.
    The Active Badge Location System. ACM Transactions on Information Systems, 1992
    1233
  8. M Crovella, A Bestavros.
    Self-Similarity in World Wide Web traffic, Evidence and Possible cause. In Proceeding of ACM SIGMETRICS ’96, 1996
    1233
  9. M Wooldridge, N R Jennings.
    Intelligent agents: theory and practice. The Knowledge Engineering Review, 1995
    1229
  10. R Mehra, E C Prescott.
    The Equity Premium: A Puzzle. Journal of Monetary Economics, 1985
    1228
  11. Eugene Fama, F, Kenneth R French.
    The Cross-Section of Expected Stock Returns. Journal of Finance, 1992
    1228
  12. Zinaida Trybulec.
    Properties of subsets. Formalized Mathematics, 1990
    1227
  13. T ElGamal.
    A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 1985
    1227
  14. I Foster, C Kesselman, J Nick, S.
    The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration. Tuecke, Open Grid Service Infrastructure WG, Global Grid Forum, 2002
    1227
  15. M Isard, A Blake.
    Condensation – conditional density propagation for visual tracking. International Journal of Computer Vision, 1998
    1225
  16. Joseph A Schumpeter.
    Capitalism, socialism, and democracy. 1942
    1219
  17. C Wren, A Azarbayejani, T Darrell, A Pentland.
    Pfinder: Real-Time Tracking of the Human Body. IEEE Trans. Pattern Analysis and Machine Intelligence, 1997
    1219
  18. J Ziv, A Lempel.
    A universal algorithm for sequential data compression. IEEE Transactions on Information Theory, 1977
    1217
  19. J R Douceur.
    The Sybil Attack. In Proceedings of IPTPS, 2002
    1217
  20. R Ahlswede, N Cai, S R Li, R W Yeung.
    Network Information Flow. IEEE Transactions on Information Theory, 2000
    1216
  21. G Kiczales, E Hilsdale, J Hugunin, M Kersten, J Palm, W G Griswold.
    An overview of AspectJ. In ECOOP, 2001
    1213
  22. M Burrows, M Abadi, R M Needham.
    A logic of authentication. ACM Transactions on Computing Systems, 1990
    1209
  23. S Woo, M Ohara, E Torrie, J Singh, A Gupta.
    The SPLASH-2 programs: characterization and methodological considerations. Proceedings. 22nd Annual International Symposium on, 1995
    1205
  24. R S Sandhu, E J Coyne, H L Feinstein, C E Youman.
    Role-based access control models. in IEEE Computer, 1996
    1205
  25. M Ester, H-P Kriegel, J Sander, X Xu.
    A density-based algorithm for discovering clusters in large spatial databases with noise. In Proc. ACM KDD, 1996
    1204
  26. M Moskewicz, C Madigan, S Malik.
    Chaff: Engineering an efficient sat solver. In Proceedings of Design Automation Conference, 2001
    1203
  27. J Padhye, V Firoiu, D Towsley, J Krusoe.
    Modeling TCP throughput: A simple model and its empirical validation. In ACM Computer Communications Review: Proceedings of SIGCOMM 1998, 1998
    1198
  28. A K Dixit, J E Stiglitz.
    Monopolistic competition and optimum product diversity. American Economic Review, 1977
    1186
  29. Hugues Hoppe.
    Progressive meshes. In SIGGRAPH ’96 Proc, 1996
    1186
  30. A Ng, M Jordan, Y Weiss.
    On Spectral Clustering: Analysis and an Algorithm. In Advances in Neural Information Processing Systems, ed. T Dietterich, S Becker and Z Ghahramani, 2002
    1184
  31. H and Ullmer Ishii, B.
    Tangible Bits: towards seamless interfaces between people, bits and atoms. Proceedings of CHI ‘97, Conference on human factors in computing systems, 1997
    1184
  32. A Bell, T Sejnowski.
    An Information-Maximization Approach to Blind Separation. and Blind Deconvolution,” Neural Computation, 1995
    1174
  33. Samuel Madden, Michael J Franklin, Joseph M Hellerstein, Wei Hong.
    Tag: a tiny aggregation service for ad-hoc sensor networks. SIGOPS Oper. Syst. Rev, 0
    1173
  34. P Jones M J Viola.
    Robust Real-Time Face Detection. International Journal of Computer Vision, 0
    1172
  35. A Mainwaring, D Culler, J Polastre, R Szewczyk, J Anderson.
    Wireless sensor networks for habitat monitoring. In: Proc. of the 1st ACM Int’l Workshop on Wireless Sensor Networks and Applications (WSNA 2002, 2002
    1172
  36. E Allen Emerson.
    Temporal and Modal Logic. Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics, 1990
    1171
  37. J Breese.
    Empirical analysis of predictive algorithms for collaborative filtering. Proceedings of the 14th Annual Conference on Uncertainty in Artificial Intelligence (UAI-98, 1998
    1169
  38. Yang hua Chu, Sanjay G Rao, Hui Zhang.
    A case for end system multicast. in ACM Sigmetrics, 2000
    1162
  39. George Necula.
    Proof-carrying code. In 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1997
    1161
  40. M Levoy, P Hanrahan.
    Light field rendering. Computer Graphics, 1996
    1160
  41. S L Lauritzen.
    Graphical models. 1996
    1160
  42. R E Kass, A E Raftery.
    Bayes Factors. Journal of the American Statistical Association, 1995
    1159
  43. J N Laneman, D N C Tse, G W Wornell.
    Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transactions on Information Theory, 2004
    1159
  44. A L Berger, S A Della Pietra, V J Della Pietra.
    A Maximum Entropy approach to natural language processing. Computational Linguistics, 1996
    1152
  45. I Nonaka, H Takeuchi.
    A Theory of Organizational Knowledge Creation. International Journal of Technology Management, 1996
    1151
  46. W Ye, J Heidemann, D Estrin.
    An energy-efficient mac protocol for wireless sensor networks. Proceedings of the 21st International Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM, 2002
    1148
  47. S Mallat, Z Zhang.
    Matching pursuit with timefrequency dictionaries. IEEE Trans. Sig. Proc, 1993
    1145
  48. A Demers, S Keshav, S Shenker.
    Analysis and simulation of a fair queueing algorithm. In Proceedings of the ACM SIGCOMM Conference, 1989
    1145
  49. B Schölkopf, A Smola, K-R Müller.
    Nonlinear component analysis as a kernel eigenvalue problem. Neural Computation, 1998
    1143
  50. V Caselles, R, G Sapiro.
    Geodesic active contours. International Journal of Computer Vision, 1997
    1142
  51. D Aha, D Kibler.
    Instance-Based Learning Algorithms. Machine Learning, 1991
    1140
  52. A Bandura.
    Self-efficacy: Towards a unifying theory of behavioral change. Psychological Review, 1977
    1139
  53. R Kohavi, G H John.
    Wrappers for feature subset selection. Artificial Intelligence, 1997
    1130
  54. D Dolev, A Yao.
    On the security of public key protocols. IEEE Transactions on Information Theory, 1983
    1129
  55. M M Carhart.
    On Persistence in Mutual Fund Performance. Journal of Finance, 1997
    1126
  56. D Scharstein, R Szeliski.
    A taxonomy and evaluation of dense two-frame stereo correspondence algorithms. In Proc. IEEE Int. Conf. on Computer Vision (ICCV, 0
    1125
  57. A G Murzin, S E Brenner, T Hubbard, C Chothia.
    SCOP: a structural classification of proteins database for the investigation of sequences and structures. J.Mol.Biol, 1995
    1123
  58. S Saroiu, P K Gummadi, S D Gribble.
    A Measurement Study of Peer-to-Peer File Sharing Systems. In Proceedings of the Multimedia Computing and Networking (MMCN, 2002
    1120
  59. J L Barron, D J Fleet, S S Beauchemin.
    Performance of optical flow techniques. International Journal of Computer Vision, 1994
    1119
  60. Stewart Myers.
    The determinants of corporate borrowing. Journal of Financial Economics, 1977
    1115
  61. David Brooks, Vivek Tiwari, Margaret Martonosi.
    Wattch: A framework for architectural-level power analysis and optimizations. In Proceedings of the 27th Annual International Symposium on Computer Architecture, 2000
    1115
  62. V Tarokh, H Jafarkhani, A R Calderbank.
    Space-time block codes from orthogonal designs. IEEE Transactions on Information Theory, 1999
    1115
  63. Erhard Rahm, Philip A Bernstein.
    A survey of approaches to automatic schema matching. VLDB Journal, 0
    1112
  64. S Verdu.
    Multiuser Detection. 1998
    1107
  65. J R Anderson.
    The architecture of cognition. 1983
    1106
  66. L Itti, C Koch, E Niebur.
    A Model of Saliency-Based Visual Attention for Rapid Scene Analysis. IEEE Trans. PAMI, 1998
    1102
  67. J Mayfield, Y Labrou, T Finin.
    Evaluating KQML as an agent communication language. Intelligent Agents II, 1995
    1096
  68. J Kittler, M Hatef, R Duin, J Matas.
    On combining classifiers. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1998
    1096
  69. Barbara Grosz, Candy L Sidner.
    Attention, intentions and the structure of discourse. Computational linguistics, 1986
    1095
  70. U Fischbacher.
    Z-tree: Zürich toolbox for readymade economic experiments. Experimental Economics, 2007
    1094
  71. P J Burt, E H Adelson.
    The Laplacian pyramid as a compact image code. IEEE Trans. Commun, 1983
    1094
  72. I Bratko, S Muggleton.
    Applications of inductive logic programming. Communications of the ACM, 1995
    1093
  73. Robert J Barro.
    Economic Growth in a Cross Section of Countries. Quarterly Journal of Economics 106, 1991
    1092
  74. S Goldwasser, S Micali, C Rackoff.
    The Knowledge Complexity of Interactive Proof Systems. SIAM Journal on Computing, 1989
    1084
  75. R E Tarjan.
    Depth-first search and linear graph algorithms. SIAM Journal on Computing, 1972
    1084
  76. K M Chandy, L Lamport.
    Distributed snapshots: determining global states of distributed systems. ACM Transactions on Computing Systems, 1985
    1076
  77. J Pustejovsky.
    The Generative Lexicon. 1995
    1065
  78. Norbery Beckmann, Hans-Peter Kriegel, Ralf Schneider, Bernhard Seeger.
    The R-tree: An efficient and robust access method for points and rectangles. In Proceedings of the 1990 ACM-SIGMOD Conference, 1990
    1060
  79. R Milner, J Parrow, D Walker.
    A calculus of mobile processes. I and II. Information and Computation, 1992
    1058
  80. K Mikolajczyk, C Schmid.
    Scale & affine invariant interest point detectors. IJCV, 0
    1053
  81. W W Cohen.
    Fast effective rule induction. In Machine Learning: Proceedings of the Twelfth International Conference. Lake Tahoe, 1995
    1053
  82. E M Royer, C-K Toh.
    A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers. Commun, 1999
    1050
  83. D G Andersen, H Balakrishnan, M F K R Morris.
    Resilient overlay networks. In Operating Systems Review, 2001
    1050
  84. Czesław Byliński.
    Functions from a set to a set. Formalized Mathematics, 1990
    1048
  85. Y Yang, J O Pedersen.
    A comparative study on feature selection in text categorization. Proc. 14th International Conference on Machine Learning (ICML’97, 1997
    1047
  86. A Tversky, D Kahneman.
    Advances in prospect theory: Cumulative representation of uncertainty. J. Risk Uncertainty, 1992
    1046
  87. S Floyd, V Jacobson, C-G Liu, S McCanne, L Zhang.
    A reliable multicast framework for light-weight sessions and application level framing. IEEE/ACM Transactions on Networking, 1997
    1046
  88. I Ajzen.
    The theory of planned behavior. Organizational Behavior and Human Decision Processes, 1991
    1044
  89. B Wernerfelt.
    A resource-based view of the firm. Strategic Management Journal, 1984
    1041
  90. S Ghemawat, H Gobioff, S Leung.
    The Google file system. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, 2003
    1040
  91. S E Deering, D R Cheriton.
    Multicast Routing in Datagram Internetworks and Extended LANs newblock. In ACM SIGCOMM’88 and, 0
    1028
  92. A Blum, M Furst.
    Fast Planning Through Planning Graph Analysis. In Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, 1995
    1027