Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. D Gibson, J Kleinberg, P Raghavan.
    Inferring web communities from link topology. In ACM Con-ference on Hypertext and Hypermedia, 1998
    293
  2. J B A Maintz, M A Viergever.
    A survey of medical image registration. Medical Image Analysis, 1998
    292
  3. van der Aalst.
    W.M.: The Application of Petri Nets to Workflow Management. The Journal of Circuits, Systems and Computers, 1998
    290
  4. N Jennings, M Wooldridge.
    Applications of intelligent agents. In Agent Technology: Foundations, Applications and Markets, 1998
    289
  5. L C Evans.
    Partial Differential Equations. 1998
    289
  6. W Sweldens.
    The lifting scheme: A construction of second generation wavelets. SIAM J. Math. Anal, 1998
    285
  7. M Craven, D DiPasquo, D Freitag, A McCallum, T Mitchell, K Nigam, S Slattery.
    Learning to extract symbolic knowledge from the world wide web. 1998
    285
  8. D G Clarke, J M Potter, J Noble.
    Ownership types for flexible alias protection. In Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA, 1998
    278
  9. E Horvitz, J Breese, D Heckerman, D Hovel, K Rommelse.
    The Lumiere Project: Bayesian User Modeling for Inferring the Goals and Needs of Software Users. Proceedings of UAI, 1998
    277
  10. E F Fama.
    Market efficiency, long-term returns, and behavioral finance. Journal of Financial Economics, 1998
    275
  11. Elan Amir, Steven McCanne, Randy Katz.
    An active service framework and its application to real-time multimedia transcoding. ACM Computer Communication Review, 1998
    275
  12. O Zamir, O Etzioni.
    Web document clustering: A feasibility demonstration. SIGIR, 1998
    274
  13. S Parsons, C Sierra, N R Jennings.
    Agents that reason and negotiate by arguing. Journal of Logic and Computation, 1998
    272
  14. David L Detlefs, K Rustan M Leino, Greg Nelson, James B Saxe.
    Extended static checking. 1998
    272
  15. R G Rajan, L Zingales.
    Financial dependence and growth. American Economic Review, 1998
    272
  16. Sergey Brin.
    Extracting patterns and relations from the world wide web. In Proc. of WebDB Workshop at 6th International Conference on Extending Database Technology, 1998
    272
  17. C P Gomes, B Selman, H Kautz.
    Boosting combinatorial search through randomization. In Proceedings of National Conference on Artificial Intelligence, 1998
    270
  18. Z J Haas, M R Pearlman.
    The Zone Routing Protocol (ZRP) for ad hoc networks. IETF Internet draft, 1998
    267
  19. C Labovitz, R Malan, F Jahanian.
    Internet Routing Instability. IEEE/ACM Trans. Networking, 1998
    267
  20. F J Provost, T Fawcett, R Kohavi.
    The case against accuracy estimation for comparing induction algorithms. In Proceedings of the 15th International Conference on Machine Learning (ICML, 1998
    267
  21. Y Wang, Q fan Zhu.
    Error control and concealment for video communication: A review. in Proceedings of the IEEE, 1998
    267
  22. V S Pai, M Aron, G Banga, M Svendsen, P Druschel, W Zwaenepoel, E Nahum.
    Locality-aware request distribution in cluster-based network servers. SIGPLAN Not, 1998
    266
  23. W Lee, S Stolfo.
    Data mining approaches for intrusion detection. In USENIX Security Symposium, 1998
    263
  24. D Lewis.
    Naive (bayes) at forty: The independence assumption in information retrieval. Lecture Notes in Computer Science, 1998
    261
  25. Paul Debevec.
    Rendering synthetic objects into real scenes: Bridging traditional and image-based graphics with global illumination and high dynamic range photography. In Proceedings of SIGGRAPH 98, Computer Graphics Proceedings, Annual Conference Series, 1998
    261
  26. J Nonnenmacher, E W Biersack, D Towsley.
    ParityBased Loss Recovery for Reliable Multicast Trasmission. IEEE/ACM Transactions on Networking (TON, 1998
    261
  27. C Cardoso, “Blind.
    signal separation: statistical principles. Proceedings of the IEEE, 1998
    259
  28. Z Zhang.
    Determining the epipolar geometry and its uncertainty: A review. International Journal of Computer Vision, 1998
    258
  29. M J F Gales.
    Maximum Likelihood Linear Transformations for HMM-Based Speech Recognition. Computer Speech and Language, 1998
    258
  30. M N NELSON, B B WELCH, J K OUSTERHOUT.
    Caching in the Sprite network file system. ACM Trans. Comput. Syst, 1998
    258
  31. P N Belhumeur, D J Kriegman.
    What is the set of images of an object under all possible illumination conditions. International Journal of Computer Vision (IJCV, 1998
    256
  32. W W Cohen, R E Schapire, Y Singer.
    Learning to order things. In Proceedings of the 1997 conference on Advances in neural information processing systems 10 table of contents, 1998
    256
  33. Hinrich Schütze.
    Automatic word sense discrimination. Computational Linguistics, 1998
    256
  34. Todd M Austin.
    DIVA: A Reliable Substrate for Deep Submicron Microarchitecture Design. In Proceedings of the International Symposium on Microarchitecture, 1998
    254
  35. S Abiteboul, O M Duschka.
    Complexity of answering queries using materialized views. In PODS, 1998
    252
  36. M S Crouse, R D Nowak, R G Baraniuk.
    Wavelet-based statistical signal processing using hidden Markov models. IEEE Trans. Signal Processing, 1998
    252
  37. S CHAKRABARTI, B DOM, D GIBSON, J KLEINBERG, P RAGHAVAN, S RAJAGOPALAN.
    Automatic resource compilation by analyzing hyperlink structure and associated text. In Proceedings of the International/World Wide Web Conference (WWW, 1998
    250
  38. T Sander, C F Tschudin.
    Protecting Mobile Agents Against Malicious Hosts. Agents and Security, Springer LNCS 1419, 1998
    249
  39. D Mosberger, T Jin.
    httperf – A Tool for Measuring Web Server Performance. In Proceedings of the SIGMETRICS Workshop on Internet Server Performance, 1998
    249
  40. Nicholas Barberis, Shleifer, Vishny.
    A model of investor sentiment. Journal of Financial Economics, 1998
    249
  41. T Ishihara, H Yasuura.
    Voltage scheduling problem for dynamically variable voltage processors. In Proc. Int. Symp. Low Power Electronics & Design, 1998
    246
  42. J Cho, H Garcia-Molina, L Page.
    Efficient Crawling Through URL Ordering. Seventh International World-Wide Web Conference, 1998
    246
  43. S A Hofmeyr, S Forrest, A Somayaji.
    Intrusion detection using sequences of system calls. Journal of Computer Security, 1998
    244
  44. George C Necula, Peter Lee.
    The design and implementation of a certifying compiler. In Proceedings of PLDI, 1998
    243
  45. C Claus, C Boutilier.
    The dynamics of reinforcement learning in cooperative multiagent systems. In Proceedings of the Fifteenth National Conference on Artificial Intelligence, 1998
    243
  46. R RAZ.
    A parallel repetition theorem. SIAM J. Comput, 1998
    241
  47. L KOBBELT, S CAMPAGNA, J VORSATZ, H-P SEIDEL.
    Interactive multi-resolution modeling on arbitrary meshes. In Proceedings of ACM SIGGRAPH, 1998
    240
  48. T K Ho.
    The random subspace method for constructing decision forests. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1998
    240
  49. R J McEliece, D J C MacKay, J F Cheng.
    Turbo decoding as an instance of Pearl’s belief propagation algorithm. IEEE J. Selected Areas in Communication, 1998
    240
  50. R T Ng, L V S Lakshmanan, J Han, A Pang.
    Exploratory mining and pruning optimizations of constrained association rules. In SIGMOD, 1998
    238
  51. R RASKAR, G WELCH, M CUTTS, A LAKE, L STESIN, H FUCHS.
    The office of the future : A unified approach to image-based modeling and spatially immersive displays. In SIGGRAPH Conference Proceedings, 1998
    237
  52. M FLATT, S KRISHNAMURTHI, M FELLEISEN.
    Classes and mixins. In Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages. POPL ’98. ACM, 1998
    236
  53. J Hu, M P Wellman.
    Multiagent Reinforcement Learning: Theoretical Framework and an Algorithm. in Proceedings of the International Conference on Machine Learning (ICML-98, 1998
    236
  54. T A Henzinger, P W Kopke, A Puri, P Varaiya.
    What’s decidable about hybrid automata. Journal of Computer and System Sciences, 1998
    234
  55. P Faratin, C Sierra, N Jennings.
    Negotiation decision functions for autonomous agents. Robotics and Autonomous Systems, Vol, 1998
    233
  56. Christopher M Bishop, Markus Svensén, Christopher K I Williams.
    GTM: the generative topographic mapping. Neural Computation, 1998
    233
  57. M Frigo, C E Leiserson, K H Randall.
    The Implementation of the Cilk-5 Multithreaded Language. In Proc. of PLDI,pages 212–223, 1998
    232
  58. Y Rubner, C Tomasi, L Guibas.
    A Metric for Distributions with Applications To Image Databases. In Proceedings of the IEEE ICCV, 1998
    231
  59. O Shehory, S Kraus.
    Methods for task allocation via agent coalition formation. Artificial Intelligence, 1998
    230
  60. R J Anderson, F A P Petitcolas.
    On The Limits of Steganography. IEEE Journal of Selected Area in Communications, 1998
    229
  61. M Rabin.
    Psychology and economics. Journal of Economic Literature, 1998
    229
  62. G Taubin, J Rossignac.
    Geometric compression through topological surgery. in Proceedings of the 25th Annual Conference on Computer Graphics and Interactive Techniques (SIGGRAPH ’98, 1998
    227
  63. L Breiman.
    Arcing classifiers. Annals of Statistics, 1998
    227
  64. I Horrocks.
    Using an expressive description logic: FaCT or fiction. Principles of Knowledge Representation and Reasoning. Proceedings of the Sixth International Conference (KR'98, 1998
    227
  65. M Yokoo, E H Durfee, T Ishida, K Kuwabara.
    The distributed constraint satisfaction problem: Formalization and algorithms. IEEE Transactions on Knowledge and DATA Engineering, 1998
    226
  66. T Pering, T Burd, R Brodersen.
    The Simulation and Evaluation of Dynamic Voltage Scaling Algorithms. Proceedings of International Symposium on Low Power Electronics and Design, 1998
    225
  67. S Manne, A Klauser, D Grunwald.
    Pipeline gating: speculation control for energy reduction. In Int’l Symp. Computer Architecture, 1998
    225
  68. C ROSE, M F COHEN, B BODENHEIMER.
    Verbs and adverbs: Multidimensional motion interpolation. In IEEE Computer Graphics and Applications, 1998
    224
  69. N Garg, J Könemann.
    Faster and simpler algorithms for multicommodity ow and other fractional packing problems. In FOCS'98: Proceedings of the 39th Annual IEEE Symposium on Foundations of Computer Science, 1998
    223
  70. P W Wolniansky, G J Foschini, G D Golden, R A Valenzuela.
    VBLAST: An architecture for realizing very high data ra tes over the rich-scattering wireless channel. in Proc. URSI Int. Symp. Signals, Systems and Electronics, 1998
    223
  71. Xavier Boyen, Daphne Koller.
    Tractable inference for complex stochastic processes. In Proc. Conference on Uncertainty in Artificial Intelligence (UAI, 1998
    222
  72. J-A Meyer, P Husbands, I Harvey.
    Evolutionary Robotics: A. Survey of Applications and Problems. Eighth European Workshop on Learning Robots, 1998
    221
  73. John K Ousterhout.
    Scripting: Higher-level programming for the 21st century. IEEE Computer, 1998
    221
  74. F A P Petitcolas, R J Anderson, M G Kuhn.
    Attacks on copyright marking systems. Information Hiding, Second International Workshop, IH ˇ S98, 1998
    221
  75. I D Baxter, A Yahin, L Moura, M Sant'Anna, L Bier.
    Clone Detection Using Abstract Syntax Trees. ICSM '98. 1998
    219
  76. D Boneh, J Shaw.
    Collusion-secure fingerprinting for digital data. IEEE Transaction on Information Theory, 1998
    219
  77. D Florescu, A Levy, A Mendelzon.
    Database techniques for the World-Wide Web: a survey. SIGMOD Rec, 1998
    219
  78. P CIGNONI, C ROCCHINI, R Metro SCOPIGNO.
    Measuring error on simplified surfaces. Computer Graphics Forum, 1998
    218
  79. K Karplus, C Barrett, R Hughey.
    Hidden Markov Models for detecting remote protein homologies. Bioinformatics, 1998
    217
  80. D Calvanese, G De Giacomo, M Lenzerini.
    On the decidability of query containment under constraints. In PODS, 1998
    217
  81. Yair Bartal.
    On approximating arbitrary metrices by tree metrics. In STOC’98: Proceedings of the 30th Annual ACM Symposium on Theory of Computing, 1998
    217
  82. J H VAN HATEREN, A VAN DER SCHAAF.
    Independent component filters of natural images compared with simple cells in primary visual cortex. Proceedings of the Royal Society B, 1998
    216
  83. Michael Reed, Paul Syverson, David Goldschlag.
    Anonymous connections and onion routing. In IEEE Journal on Selected Areas in Communication Special Issue on Copyright and Privacy Protection, 1998
    215
  84. N Heintze, J G Riecke.
    The SLam calculus: programming with secrecy and integrity. In Principles of Programming Languages (POPL ’98, 1998
    213
  85. S Guha, S Khuller.
    Approximation algorithms for connected dominating sets. Algorithmica, 1998
    213
  86. P Wurman, M Wellman, W Walsh.
    The Michigan Internet AuctionBot: A configurable auction server for human and software agents”, The second international conference. on Autonomous agents, Minneapolis – MN – USA, 1998
    212
  87. S Birchfield.
    Elliptical head tracking using intensity gradients and color histograms. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR, 1998
    212
  88. J D Salehi, Z Zhang, J Kurose, D Towsley.
    Supporting stored video: reducing rate variability and end-to-end resource requirements through optimal smoothing. IEEE/ACM Trans. on Networking, 1998
    211
  89. M Reichert, P Dadam.
    ADEPT flex - supporting dynamic changes of workflows without losing control. Journal of Intelligent Information Systems, 1998
    210
  90. H L Bodlaender.
    A partial k-arboretum of graphs with bounded treewidth. Theor. Comput. Sci, 1998
    209
  91. N R Jennings, S Parsons, P Noriega, C Sierra.
    On argumentation-based negotiation. In Proceedings of the International Workshop on Multi-Agent Systems, 1998
    208
  92. J Greggory Steffan, Todd C Mowry.
    The potential for using thread-level data speculation to facilitate automatic parallelization. In Proc. of the 4th International Symposium on High-Performance Computer Architecture, 1998
    207