Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. Y Freund, R Schapire.
    Large margin classification using the perceptron algorithm. Machine Learning, 1999
    293
  2. T IGARASHI, S MATSUOKA, TANAKA.
    H.: Teddy: a sketching interface for 3d freeform design. In Proceedings of the 26th annual conference on Computer graphics and interactive techniques, 1999
    285
  3. Y Rui, T S Huang, S F Chang.
    Image retrieval: Current techniques, promising directions, and open issues. J. Vis. Commun. Image Represen, 1999
    285
  4. T L Marzetta, B M Hochwald.
    Capacity of a mobile multipleantenna communication link in Rayleigh flat fading. IEEE Trans. Inf. Th, 1999
    281
  5. C Warrender, S Forrest, B Pearlmutter.
    Detecting intrusions using system calls: Alternative data models. In IEEE Symposium on Security and Privacy, 1999
    278
  6. F Pfenning, Schürmann.
    C.: System description: Twelf — A meta-logical framework for deductive systems. Automated Deduction, CADE 16: 16th International Conference on Automated Deduction. Volume 1632 of Lecture Notes in Artificial Intelligence, 1999
    274
  7. A Whitten, J Tygar.
    Why Johnny Can’t Encrypt: A Usability Evaluation. of PGP 5.0,” Proc. 8th USENIX Security Symp., USENIX, 1999
    274
  8. David Haussler.
    Convolution Kernels on Discrete Structures. 1999
    273
  9. Mary Elaine Califf, Raymond J Mooney.
    Relational learning of patternmatch rules for information extraction. In Proceedings of the Sixteenth National Conference on Artificial Intelligence (AAAI-99, 1999
    271
  10. La Porta, R Lopez-de Silanes, F Shleifer, A.
    Corporate ownership around the world. Journal of Finance, 1999
    270
  11. D Bikel, R Schwartz, R Weischedel.
    An algorithm that learns what’s in a name. Machine Learning, 1999
    268
  12. A EDELMAN, T ARIAS, S T SMITH.
    The geometry of algorithms with orthogonality constraints. SIAM J. Matrix Anal. Appl, 1999
    267
  13. H Xi, F Pfenning.
    Dependent types in practical programming. In ACM Symposium on Principles of Programming Languages (POPL’99, 1999
    267
  14. N Amenta, M Bern.
    Surface reconstruction by voronoi filtering. Discrete and Computational Geometry, 1999
    265
  15. G Kaminsky, C Reinhart.
    The twin crises: the causes of banking and balance-of-payments problems. American Economic Review, 1999
    265
  16. G Banavar, T Chandra, B Mukherjee, J Nagarajarao, R Strom, D Sturman.
    An efficient multicast protocol for content-based publish- subscribe systems. In ICDCS, 1999
    264
  17. I Foster, C Kesselman.
    The Globus project: a status report. Future Generation Computer Systems, 1999
    264
  18. A Ben-Dor, R Shamir.
    Yakhini Z: Clustering gene expression patterns. J Comput Biol, 1999
    262
  19. A Gionis, P Indyk, R Motwani.
    Similarity search in high dimensions via hashing. In VLDB ’99: Proceedings of the 25th International Conference on Very Large Data Bases, 1999
    261
  20. Chad Carson, Megan Thomas, Serge Belongie, Joseph Hellerstein, Jitendra Malik.
    Blobworld: a System for Region-based Image Indexing and Retrieval. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1999
    261
  21. E M Royer, C E Perkins.
    Multicast operation of the ad hoc on-demand distance vector routing protocol. in Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM, 1999
    260
  22. E Horvitz.
    Principles of mixed-initiative user interfaces. In Proc. of ACM Conference on Human Factors in Computing Systems (CHI’99, 1999
    258
  23. N Pasquier, Y Bastide, R Taouil, L Lakhal.
    Discovering frequent closed itemsets for association rules. In ICDT, 1999
    258
  24. I Stoica, H Zhang.
    Providing Guaranteed Services Without Per Flow Management. Proceedings of SIGCOMM’99, 1999
    257
  25. Y Weiss.
    Segmentation using eigenvectors: A unifying view. In Proceedings of the International Conference on Computer Vision (ICCV, 1999
    257
  26. M Ankerst, M M Breunig, H-P Kriegel, J Sander.
    OPTICS: Ordering points to identify the clustering structure. in SIGMOD ’99: Proceedings of the 1999 ACM SIGMOD International Conference on Management of data, 1999
    254
  27. R Kumar, P Raghavan, S Rajagopalan, A Tomkins.
    Trawling the web for emerging cyber-communities. Computer Networks, 1999
    254
  28. Tova Milo, Dan Suciu.
    Index structures for path expressions. Proc. ICDT, 1999
    253
  29. M Dorigo, G Di Caro.
    The Ant Colony Optimization meta-heuristic. New Ideas in Optimization, 1999
    252
  30. I Niemelä.
    Logic programs with stable model semantics as a constraint programming paradigm. Annals of Mathematics and Artificial Intelligence, 1999
    251
  31. J M Kleinberg, R Kumar, P Raghavan, S Rajagopalan, A S Tomkins.
    The web as a graph: measurements, models, and methods. In Proceedings of the 5th annual international conference on Computing and combinatorics, 1999
    251
  32. R Sivakumar, P Sinha, V Bharghaven.
    CEDAR: a Core-Extraction Distributed Ad hoc Routing algorithm. IEEE Journal on Selected Areas in Communications, 1999
    250
  33. M Dorigo, G A Di Caro, L M Gambardella.
    Ant algorithms for discrete optimization. Artificial Life, 1999
    249
  34. M B Dwyer, G S Avrunin, J C Corbett.
    Patterns in property specifications for finite-state verification. In ACM International Conference on Software Engineering (ICSE, 1999
    248
  35. R Alur, T A Henzinger.
    Reactive modules. Formal Methods in System Design, 1999
    246
  36. A Wolman, G Voelker, N Sharma, N Cardwell, A Karlin, H Levy.
    On the scale and performance of cooperative web proxy caching. in SOSP, 1999
    245
  37. Yuzo Fujishima, Kevin Leyton-Brown, Yoav Shoham.
    Taming the computational complexity of combinatorial auctions: Optimal and approximate approaches. In 16th International Joint Conference on Artificial Intelligence, 1999
    244
  38. J Gutmann, K Konolige.
    Incremental mapping of large cyclic environments. Proceedings of IEEE International Symposium on Computational Intelligence in Robotics and Automation, 1999
    244
  39. S Lawrence, C L Giles, Bollacker.
    K.: Digital libraries and autonomous citation indexing. IEEE Computer Society Press, 1999
    241
  40. Steven E Czerwinski, Ben Y Zhao, Todd D Hodes, Anthony D Joseph, Randy H Katz.
    An architecture for a secure service discovery service. In Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, pages 24 – 35, 1999
    241
  41. P Somol, P Pudil, J Novovicova, P Paclik.
    Adaptive floating search methods in feature selection. Pattern Recognition Letter, 1999
    239
  42. D Rueckert, L I Sonoda, C Hayes, D L G Hill, M O Leach, D J Hawkes.
    Non-rigid registration using free-form deformations: Application to breast MR images. IEEE Trans. Medical Imaging, 1999
    239
  43. V S PAI, P DRUSCHEL, W ZWAENEPOEL.
    Flash: an efficient and portable web server. In Proceedings of the annual conference on USENIX Annual Technical Conference, 1999
    238
  44. Jong-Deok Choi, Manish Gupta, Mauricio Serrano, Vugranam C Sreedhar, Sam Midkiff.
    Escape analysis for Java. In Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA, 1999
    238
  45. P Artzner, F Delbaen, J M Eber, D Heath.
    Coherent measures of risk. Mathematical Finance, 1999
    236
  46. E Zitzler.
    Evolutionary Algorithms for Multiobjective Optimization: Methods and Applications, Doctoral Dissertation, Swiss Federal Institut of Technology Zurich,Tik-Schriftenreihe nr. Babes¸-Bolyai” University, Faculty of Mathematics and Computer Science, 1 M. Kogălniceanu Street, RO-3400 Cluj-Napoca, Romania E-mail address: ddumitr|cgrosan|moltean@cs.ubbcluj.ro, 1999
    236
  47. D Fox, W Burgard, F Dellaert, S Thrun.
    Monte Carlo Localization: Efficient Position Estimation for Mobile Robots. In AAAI, 1999
    236
  48. S Savage, A Collins, E Hoffman, J Snell, T Anderson.
    The end-to-end effects of internet path selection. in Proc. of ACM SIGCOMM, 1999
    234
  49. J ROSSIGNAC.
    Edgebreaker: Connectivity compression for triangle meshes. IEEE Transactions on Visualization and Computer Graphics, 1999
    233
  50. H Balakrishnan, H S Rahul, S Seshan.
    An integrated congestion management architecture for Internet hosts. SIGCOMM Comput. Commun. Rev, 1999
    233
  51. K Messer, J Matas, J Kittler, J Luettin, G Maitre.
    XM2VTSdb: The extended m2vts database. in Proc. 2nd Conf. on Audio and Video-based Biometric Personal Verification, 1999
    232
  52. D Fox, W Burgard, S Thrun.
    Markov localization for mobile robots in dynamic environments. Journal of Artificial Intelligence Research, 1999
    232
  53. J Flinn, M Satyanarayanan.
    Energy-aware adaptation for mobile applications. In Proceedings of the seventeenth ACM symposium on Operating systems principles, SOSP ’99, 1999
    231
  54. G Hjaltason, H Samet.
    Distance Browsing in Spatial Databases. In TODS, 1999
    230
  55. J Wu, H Li.
    On calculating connected dominating set for efficient routing in ad hoc wireless networks. In Proceedings of the 3rd international workshop on Discrete algorithms and methods for mobile computing and communications, DIALM ’99, 1999
    230
  56. E Riloff, R Jones.
    Learning Dictionaries for Information Extraction by Multi-Level Bootstrapping. In Proceedings of AAAI-99, 1999
    230
  57. S Decker, M Erdmann, D Fensel, R Studer.
    Ontobroker: Ontology based access to distributed and semi-structured information. Proceedings of TC2/WG 2.6 8th Working Conference on Database Semantics (DS-8, 1999
    229
  58. S Mika, G Ratsch, J Weston, B Scholkopf, K R Mullers.
    Fisher discriminant analysis with kernels. In Neural Networks for Signal Processing IX, 1999. Proceedings of the 1999 IEEE Signal Processing Society Workshop, 1999
    228
  59. J K AGGARWAL, Q CAI.
    Human motion analysis: A review. CVIU, 1999
    227
  60. D H Albonesi.
    Selective cache ways: On-demand cache resource allocation. In Proceedings of the 32nd International Symposium on Microarchitecture, 1999
    226
  61. A Biere, A Cimatti, E Clarke, M Fujita, Y Zhu.
    Symbolic model checking using SAT procedures instead of BDDs. in Proc. of Design Automation Conf. (DAC, 1999
    226
  62. D Martin, A Cheyer, D Moran.
    The Open Agent Architecture: A framework for building distributed software systems. Applied Artificial Intelligence, 1999
    224
  63. L Massoulié, J W Roberts.
    Bandwidth sharing: objectives and algorithms. In Proc. of IEEE INFOCOM, 1999
    224
  64. R Dechter.
    Bucket elimination: A unifying framework for reasoning. Artifical Intelligence, 1999
    221
  65. M Arenas, L E Bertossi, J Chomicki.
    Consistent query answers in inconsistent databases. In PODS, 1999
    220
  66. Jim Waldo.
    The JINI Architecture for Network-centric Computing. Comm. of the ACM, 1999
    219
  67. A B Downey.
    Using Pathchar to Estimate Internet Link Characteristics. SIGMETRICS Performance Evaluation Review, 1999
    219
  68. P Agarwal, J Erickson.
    Geometric range searching and its relatives. Contemporary Mathematics, 1999
    218
  69. S Lu, V Bharghavan, R Srikant.
    Fair scheduling in wireless packet networks. IEEE/ACM Trans. Netw, 1999
    217
  70. C Y M Qiao.
    Optical Burst switching (obs) - a new paradigm for an optical internet. Journal of High Speed Networks, 1999
    216
  71. Pedro Domingos.
    MetaCost: a general method for making classifiers cost-sensitive. Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1999
    215
  72. Zhengyou Zhang.
    Flexible camera calibration by viewing a plane from unknown orientations. International Journal ofComputer Vision,1:666. 97 A.24, 26,46, 53,87 Bajaj,Rashmi 17 Barshan,Billur 18 Bay,H.30, 33 Beeson,Patrick7,24, 26, 27 Beis,J.32 Bibby, C.26 Bouguet, Jean-Yves 49 Bradley,N. A.85 Brodie, M A18 Caglioti, Vincenzo 28 Cao,Dongwei 48 Chatfield,A.18 Civera,J.7, 26 Clemente, L.A.25 C, 1999
    215
  73. C Kidd.
    The Aware Home: a Living Laboratory for Ubiquitous Computing Research. Proceedings of the Second International Workshop on Cooperative Buildings—CoBuild, 1999
    214
  74. A Berger, J Lafferty.
    Information retrieval as statistical translation. In Proceedings of SIGIR, 1999
    213
  75. D Card.
    The Causal Effect of Education on Earnings. in O. Ashenfelter and D. Card, Handbook of Labor Economics, Vol 3, Elsevier – North, 1999
    213
  76. K S Beyer, J Goldstein, R Ramakrishnan, U Shaft.
    When is “nearest neighbor” meaningful. In ICDT ’99: Proceedings of the 7th International Conference on Database Theory, 1999
    212
  77. X Hong, M Gerla, G Pei, C-C Chiang.
    A group mobility model for ad hoc wireless networks. in ACM/IEEE MSWiM, 1999
    212
  78. A Feldmann, A C Gilbert, P Huang, W Willinger.
    Dynamics of IP traffic, A study of the role of variability and the impact of control. in Proc. ACM/Sigcomm’99, 1999
    212
  79. W Cohen, Y Singer.
    Context-sensitive learning methods for text categorization. ACM Transactions on Information Systems, 1999
    211
  80. M Fernandez A Deutsch, D Suciu.
    Storing semistructured data with STORED. In proceedings of the ACM SIGMOD International Conference on Management of Data, 1999
    211
  81. J Rekimoto, Saitoh.
    M.: Augmented surfaces: a spatially continuous work space for hybrid computing environments. In: Proceedings of CHI 1999, 1999
    209
  82. J Whaley, M Rinard.
    Compositional pointer and escape analysis for java programs. SIGPLAN Not, 1999
    209
  83. W Burgard, A B Cremers, D Fox, D Haehnel, G Lakemeyer, D Schulz, W Steiner, S Thrun.
    Experiences with an interactive museum tour-guide robot. Artificial Intelligence, 1999
    209
  84. Y Azar, A Z Broder, A R Karlin, E Upfal.
    Balanced allocations. SIAM J. Comput, 1999
    208
  85. W Lee, S Stolfo, K Mok.
    A data mining framework for building intrusion detection models. In Proceedings of IEEE Symposium on Security and Privacy, 1999
    208
  86. M K Aguilera, R E Strom, D C Sturman, M Astley, T D Chandra.
    Matching events in a content-based subscription system. In PODC, 1999
    207
  87. T Richardson, Q Stafford-Fraser, K Wood, A Hopper.
    Virtual network computing. IEEE Internet Computing, 1999
    205
  88. R Cáceres, N Duffield, J Horowitz, D Towsley.
    Multicast-based inference of network-internal loss characteristics. IEEE Trans. Info. Theory, 1999
    205
  89. E Kranakis, H Singh, J Urrutia.
    Compass routing on geometric networks. In Proc. of the 11th Canadian Conference on Computational Geometry, 1999
    202
  90. K Nigam, J Lafferty, A McCallum.
    Using maximum entropy for text classification. 1999
    200
  91. J Platt.
    Sequential minimal optimization: A fast algorithm for training support vector machines. Advances in Kernel Methods-Support Vector Learning, 1999
    199
  92. F Och, C Tillmann, H Ney.
    Improved alignment models for statistical machine translation. in ‘Proc. of the Joint SIGDAT Conf. on Empirical Methods in Natural Language Processing and Very Large Corpora, 1999
    198
  93. G Karypis, R Aggarwal, V Kumar, S Shekhar.
    Multilevel hypergraph partitioning: Application in vlsi domain. IEEE Transactions on VLSI Systems, 1999
    198
  94. M Yajnik, S B Moon, J F Kurose, D F Towsley.
    Measurement and modeling of the temporal dependence in packet loss. In IEEE INFOCOM’99, 1999
    198
  95. X Xiao, L Ni.
    Internet QoS: a big picture. IEEE Netw, 1999
    197