Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. T Odean.
    Are Investors Reluctant to Realize Their Losses. Journal of Finance, 1998
    433
  2. O Goldreich, S Goldwasser, D Ron.
    Property testing and its connection to learning and approximation. Journal of the ACM, 1998
    432
  3. L Paulson.
    The inductive approach to verifying cryptographic protocols. J. Computer Security, 1998
    432
  4. N Jennings, K Sycara, M Woolridge.
    A roadmap of agent research and development. Journal of Autonomous Agents and Multi-Agent Systems, 1998
    429
  5. Krishna Bharat, Monika R Henzinger.
    Improved Algorithms for Topic Distillation in Hyperlinked Environments. In Proceedings of the 21st International ACM SIGIR Conference on Research and Development in Information Retrieval, 1998
    428
  6. W Sweldens.
    The Lifting Scheme: A Construction of Second Generation Wavelets. S.I.A.M. J. Math. Anal, 1998
    426
  7. D D Clark, W Fang.
    Explicit allocation of best-effort packet delivery service. IEEE/ACM Trans. Networking, 1998
    425
  8. Dahlia Malkhi, Michael Reiter.
    Byzantine quorum systems. Distributed Computing, 1998
    424
  9. K Czajkowski, I Foster, N Karonis, C Kesselman, S Martin, W Smith, S Tuecke.
    A resource management architecture for metacomputing systems. in The 4th Workshop on Job Scheduling Strategies for Parallel Processing, 1998
    424
  10. A Edelman, T Arias, S Smith.
    The geometry of algorithms with orthogonality constraints. SIAM J. Matrix Anal. Appl, 1998
    424
  11. T Frühwirth.
    Theory and practice of constraint handling rules. J. Log. Program, 1998
    421
  12. P W Wolniansky, G J Foschini, G D Golden, R A Valenzuela.
    V-BLAST: an architecture for realizing very high data rates over the rich-scattering wireless channel. in Proc. URSI International Symposium on Signals, Systems and Electronics, 1998
    417
  13. Tommi S Jaakkola, David Haussler.
    Exploiting generative models in discriminative classifiers. Advances in Neural Information Processes Systems 11, 1998
    415
  14. W M P van der Aalst.
    The application of Petri nets to workflow management. The Journal of Circuits, Systems and Computers, 1998
    412
  15. Hinrich Schutze.
    Automatic word sense discrimination. Computational Linguistics, 1998
    411
  16. J Byers, M Luby, M Mitzenmacher, A Rege.
    Digital fountain approach to reliable distribution of bulk data. In ACM SIGCOMM’98, 1998
    408
  17. J Shade, S Gortler, L-W He, R Szeliski.
    Layered depth images. Computer Graphics, 1998
    406
  18. S Chakrabarti, B Dom, P Indyk.
    Enhanced hypertext categorization using hyperlinks. In SIGMOD, 1998
    406
  19. Roberto J Bayardo.
    Jr.: Efficiently Mining Long Patterns from Databases. SIGMOD Conference, 1998
    403
  20. T K Ho.
    ªThe Random Subspace Method for Constructing Decision Forests,º. IEEE Trans. Pattern Analysis and Machine Intelligence, 1998
    393
  21. D Filmer, L Pritchett.
    Estimating wealth effects without expenditure data - or tears: an application to educational enrolments. in states of India. Policy Research Working Paper No. 1 994, World, 1998
    389
  22. C Bregler, J Malik.
    Tracking people with twists and exponential maps. In Computer Vision and Pattern Recognition, 1998
    386
  23. T M Cover.
    Comments on broadcast channels. IEEE Trans. Inf. Theory, 1998
    383
  24. T H Davenport, L Prusak.
    Working Knowledge. 1998
    379
  25. D J Wetherall, J V Guttag, D L Tennehouse.
    ANTS: a Toolkit for Building and Dynamically Deploying Network Protocols. In IEEE OPENARCH’98, 1998
    377
  26. T G Andersen, Bollerslev Tim.
    Answering the Skeptics: Yes, Standard Volatility Models Do Provide Accurate Forecasts. International Economic Review, 1998
    376
  27. R Raman, M Livny, M Solomon.
    Matchmaking: Distributed resource management for high throughput computing. In: Proceedings of the Seventh IEEE International Symposium on High Performance Distributed Computing, 1998
    376
  28. N Amenta, M Bern, M Kamvysselis.
    A New Voronoi-based Surface Reconstruction. In SIGGRAPH 98, 1998
    371
  29. D Gibson, J M Kleinberg, P Raghavan.
    Inferring web communities from link topology. In UK Conference on Hypertext, 1998
    371
  30. Sergey Brin.
    Extracting patterns and relations from the World Wide Web. In Proceedings of the WebDB Workshop at the 6th International Conference on Extending Database Technology (EDBT, 1998
    369
  31. N JENNINGS, M WOOLRIDGE.
    Applications of Intelligent Agents. Westfield College. University of London, UK, 1998
    366
  32. S Chu, J DeRisi, M Eisen, J Mulholland, D Botstein.
    The transcriptional program of sporulation in budding yeast. Science 282: 699. 1998
    364
  33. L Vicisano, L Rizzo, J Crowcroft.
    Tcp-like congestion control for layered multicast data transfer. In IEEE INFOCOM’98, 1998
    363
  34. M Frigo, C Leiserson, K Randall.
    The implementation of the cilk-5 multithreaded language. In SIGPLAN Conference on Programming Language Design and Implementation, 1998
    360
  35. G Bracha, M Odersky, D Stoutamire, P Wadler.
    Making the future safe for the past: adding genericity to the Java programming language. In OOPSLA ’98, 1998
    359
  36. O Zamir, O Etzioni.
    Web Document Clustering: A Feasibility Demonstration. in Proc. 21st Annu. Int. ACM SIGIR Conf, 1998
    359
  37. P Debevec.
    Rendering Synthetic Objects Into Real Scenes: Bridging Traditional and Image-Based Graphics With Global Illumination and High Dynamic Range. Photography”, Proceedings of SIGGRAPH 98, Computer Graphics Proceedings, Annual Conference Series, 1998
    357
  38. N Amenta, M Bern.
    Surface Reconstruction by Voronoi Filtering. 14th ACM Symposium on computational Geometry, 1998
    357
  39. C Torrance, C T Compo.
    A practical guide to wavelet analysis. Bulletin of the American Meteorological Society, 1998
    357
  40. T Ishihara, H Yauura.
    Voltage scheduling problem for dynamically variable voltage processors. In Proc. of The International Symposium on Low Power Electronics and Design, 1998
    353
  41. F Provost, R Kohavi, T Fawcett.
    The case against accuracy estimation for comparing induction algorithms. In Proceedings of ICML-98, 1998
    351
  42. W Lee, S J Stolfo.
    Data Mining Approaches for Intrusion Detection. In Proceedings of the 7th USENIX Security Symposium, 1998
    350
  43. D Clarke, J M Potter, J Noble.
    Ownership types for flexible alias protection. In OOPSLA, 1998
    348
  44. http research microsoft comhorvitzvista htm Horvitz, E Breese, J S Heckerman, D Hovel, D Rommelse, K.
    The Lumiere Project: Bayesian user modeling for inferring the goals and needs of software users. Fourteenth Conference on Uncertainty in Artificial Intelligence, 1998
    345
  45. Bob G Witmer, Michael J Singer.
    Measuring Presence in Virtual Environments: A Presence Questionnaire. Presence, Teleoperators, and Virtual Environments, 1998
    342
  46. R J McEliece, D J C MacKay, J Cheng.
    Turbo decoding as an instance of Pearl’s belief propagation algorithm. IEEE J. Select. Areas Comm, 1998
    340
  47. M S Crouse, R D Nowak, R G Baranuik.
    WaveletBased Statistical Signal Processing Using Hidden Markov Models. IEEE Trans. on Signal Proc, 1998
    338
  48. Y Rubner, C Tomasi, L J Guibas.
    A metric for distributions with applications to image databases. in ICCV ’98: Proceedings of the Sixth International Conference on Computer Vision, 1998
    334
  49. R J Anderson, F A P Petitcolas.
    On The Limits of Steganography. IEEE journal of selected areas in communications, 1998
    333
  50. C P Gomes, B Selman, H Kautz.
    Boosting combinatorial search through randomization. In Proceedings of the National Conference on Artificial Intelligence, 1998
    329
  51. S Parsons, C Sierra, N Jennings.
    Agents that reason and negotiate by arguing. Journal of Logic and Computation, 1998
    328
  52. G Rudebush, L Svensson.
    Policy rules for inflation targeting. National Bureau of Economics Research Working Paper, 1998
    328
  53. M Z Win, R A Scholtz.
    Impulse radio: how it works. IEEE Communications Letters, 1998
    328
  54. J Platt.
    Sequential minimal optimization: A fast algorithm for training support vector machines. Advances in Kernel Methods - Support Vector Learning. JLCL Gu et al, 1998
    328
  55. Michael H Rothkopf, Aleksander Pekeč, Ronald M Harstad.
    Computationally manageable combinatorial auctions. Management Science, 1998
    327
  56. J C LAGARIAS, J A REEDS, M H WRIGHT, P E WRIGHT.
    Convergence properties of the Nelder-Mead simplex method in low dimensions. SIAM Journal on Optimization, 1998
    325
  57. C Claus, C Boutilier.
    The dynamics of reinforcement learning in cooperative multi-agent systems. In Proceedings of the 15th International Conference on Artificial Intelligence, 1998
    323
  58. S A Hofmeyr, S Forrest, A Somayaji.
    Intrusion Detection using sequences of system calls. In Journal of Computer Security, 1998
    322
  59. E R Sirri, P Tufano.
    Costly Search and Mutual Fund Flows. Journal of Finance, 1998
    321
  60. J Cho, H Garcia-Molina, L Page.
    Efficient crawling through URL ordering. in: Proceedings of the Seventh 674 World Wide Web Conference, 1998
    321
  61. R C Feenstra.
    Integration of trade and disintegration of production in the global economy. Journal of Economic Perspectives, 1998
    318
  62. C Labovitz, R G Malan, F Jahanian.
    Internet routing instability. Proceedings of the ACM/IEEE Transactions on Networking, 1998
    316
  63. M Reichert, P Dadam.
    ADEPT flex – supporting dynamic changes of workflows without losing control. J Intell Inform Sys, 1998
    316
  64. A Barron, J Rissanen, B Yu.
    The minimum description length principle in coding and modeling. IEEE Trans. Inform. Theory, 1998
    315
  65. S-I Amari.
    Natural gradient works efficiently in learning. Neural Computation, 1998
    313
  66. J Nonnenmacher, E W Biersack, D Towsley.
    Parity-Based Loss Recovery for Reliable Multicast Transmission. IEEE/ACM Transactions on Networking, 1998
    311
  67. David L Detlefs, K Rustan M Leino, Greg Nelson.
    Extended static checking. 1998
    310
  68. Gregory G Raleigh, John M Cioffi.
    Spatio-temporal coding for wireless communication. IEEE Trans. Inform. Theory, 1998
    308
  69. David Mosberger, Tai Jin.
    httperf – a tool for measuring web server performance. In Proceedings 1998 Workshop on Internet Server Performance (WISP, 1998
    308
  70. E Biglieri, J Proakis, S Shamai.
    Fading channels: Informationtheoretic and communications aspects,” Information Theory. IEEE Transactions on, 1998
    307
  71. C Papageoriou, M Oren, T Poggio.
    A general framework for object detection. in Proceedings of International Conference on Computer Vision (ICCV'98, 1998
    307
  72. Edward Witten.
    Anti de Sitter space and holography. 1998
    306
  73. I Foster, C Kesselman.
    The Globus project: A status report. In Proceedings of the Heterogeneous Computing Workshop, 1998
    306
  74. O Shehory, S Kraus.
    Methods for task allocation via agent coalition formation. Artificial Intelligence, 1998
    303
  75. M Keel, T Tao.
    Endpoint Strichartz Estimates. Amer. J. Math, 1998
    302
  76. R Raskar, G Welch, M Cutts, A Lake, L Stesin, H Fuchs.
    The office of the future: A unified approach to image-based modeling and spatially immersive displays. Computer Graphics (Proc. SIGGRAPH, 1998
    301
  77. V Pai, M Aron, G Banga, M Svendsen, P Druschel, W Zwaenepoel, E Nahum.
    Locality-aware request distribution in cluster-based network servers. ASPLOS-VIII. 1998
    301
  78. M SAGIV, T REPS, R WILHELM.
    Solving shape-analysis problems in languages with destructive updating. ACM Trans. Program. Lang. Syst, 1998
    301
  79. C M Bishop, M Svensén, C K I Williams.
    GTM: The Generative Topographic Mapping. Neural Computation, 1998
    301
  80. M J Black, G Sapiro, D Marimont, D Heeger.
    Robust anisotropic diffusion. IEEE Transactions on Image Processing, 1998
    300
  81. S Abiteboul, O Duschka.
    Complexity of answering queries using materialized views. In Proc. of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS, 1998
    300
  82. S Benedetto, D Divsalar, G Montorsi, F Pollara.
    Serial concatenation of interleaved codes: Performance analysis, design, and iterative decoding. IEEE Trans. Inform. Theory, 1998
    299
  83. Junling Hu, Michael P Wellman.
    Multiagent reinforcement learning: theoretical framework and an algorithm. In Proc. 15th International Conf. on Machine Learning, 1998
    298
  84. J H van Hateren, A van der Schaaf.
    Independent component filters of natural images compared with simple cells in primary visual cortex. Proc R Soc Lond B Biol Sci, 1998
    297
  85. T Hastie, R Tibshirani.
    Classification by Pairwise Coupling. The Annals of Statistics, Vol 26, Number, 1998
    296