Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. E Agichtein, L Gravano.
    Snowball: Extracting relations from large plain-text collections. In Proceedings of ICDL, 2000
    388
  2. Geert Bekaert, Campbell Harvey.
    Foreign Speculators and Emerging Equity Markets. Journal of Finance, 2000
    386
  3. S Ceri, P Fraternali, A Bongio.
    Web Modeling Language (WebML): a modeling language for designing Web sites. Computer Networks, 2000
    378
  4. Gh Păun.
    Computing with membranes. Journal of Computer and System Sciences, 2000
    376
  5. C Labovitz, A Ahuja, A Bose, F Jahanian.
    Delayed Internet Routing Convergence. In Proceedings of ACM Sigcomm, 2000
    372
  6. R Avnur, J Hellerstein.
    Eddies: continuously adaptive query processing. In Proc. of ACM SIGMOD 2000, 2000
    365
  7. D Wagner, J S Foster, E A Brewer, A Aiken.
    A first step towards automated detection of buffer overrun vulnerabilities. In Network and Distributed System Security Symposium, 2000
    361
  8. Da-Shan Shiu, G J Foschini, M J Gans, J M Kahn.
    Fading correlation and its effect on the capacity of multielement antenna systems. IEEE Transactions on Communications, 2000
    360
  9. K Cheverst, N Davies, K Mitchell, A Friday, C Efstratiou.
    Developing a Context-aware Electronic Tourist Guide: Some Issues and Experiences. in Proceedings of the ACM CHI 2000. The, 2000
    360
  10. Dawson Engler, Benjamin Chelf, Andy Chou, Seth Hallem.
    Checking system rules using system-specific, programmer-written compiler extensions. In Proceedings of Fourth Usenix Symposium on Operating Systems Design and Implementation, 2000
    352
  11. Bernhard Schölkopf, Alex J Smola, Robert C Williamson, Peter L Bartlett.
    New support vector algorithms. Neural Comput, 2000
    350
  12. W Aiello, F Chung, L Lu.
    A random graph model for massive graphs. In Proc. of the ACM Symposium on Theory of Computing (STOC, 2000
    349
  13. S Classens, S Djankov, L H P Lang.
    The Separation of Ownership and Control in East Asian corporations. Journal of Financial Economics, 2000
    348
  14. N Barberis.
    Investing for the Long Run when Returns are Predictable. Journal of Finance, 2000
    347
  15. P Carns, W Ligon, R Ross, R Thakur.
    PVFS: A parallel file system for Linux clusters. In Proceedings of the 4th Annual Linux Showcase and Conference, 2000
    346
  16. R Sutton, D McAllester, S Singh, Y Mansour.
    Policy Gradient Methods for Reinforcement Learning with Function Approximation. In NIPS 13, 2000
    346
  17. M Bellare, D Pointcheval, Rogaway.
    P.: Authenticated key exchange secure against dictionary attacks. Proc. EUROCRYPT 2000, LNCS, 2000
    346
  18. R Govindan, H Tangmunarunkit.
    Heuristics for Internet Map Discovery. IEEE Infocom, 2000
    345
  19. M M Breunig, H-P Kriegel, R T Ng, J Sander.
    LOF: Identifying density-based local outliers. Proc. of the ACM SIGMOD Int’l Conference on Management of Data, 2000
    343
  20. Martı́n Abadi, Phillip Rogaway.
    Reconciling two views of cryptography (the computational soundness of formal encryption. In TCS ’00: Proceedings of the International Conference IFIP on Theoretical Computer Science, 2000
    342
  21. B Mobasher, R Cooley, J Srivastava.
    Automatic personalization based on Web usage mining. Communications of the ACM, 2000
    341
  22. H Sidenbladh, M J Black, D J Fleet.
    Stochastic tracking of 3d human figures using 2d image motion. In ECCV, Vol.2, 2000
    339
  23. M Z Win, R A Scholtz.
    Ultra-Wide Bandwidth TimeHopping Spread-Spectrum Impulse Radio for Wireless Multiple-Access. Communication”, IEEE Trans. on Comm, 2000
    338
  24. B Fortz, M Thorup.
    Internet Traffic Engineering by Optimizing OSPF Weights, proc. of IEEE INFOCOM’00, 2000
    337
  25. Koen Claessen, John Hughes.
    Quickcheck: A lightweight tool for random testing of haskell programs. In ICFP 2000, 2000
    329
  26. N Ban, P Nissen, J Hansen, P B Moore, T A Steitz.
    The complete atomic structure of the large ribosomal subunit at 2.4 A resolution, Science 289. 2000
    327
  27. Olivier Chapelle, Vladimir Vapnik.
    Choosing multiple parameters for support vector machines. AT&T Labs, 2000
    326
  28. Y Zhang, W Lee.
    Intrusion Detection in Wireless Ad Hoc Networks. Proceedings of the 6th International Conference on Mobile Computing and Networking, 2000
    324
  29. La Porta, R Lopez-de-Silanes, F Shleifer, A Vishny, R.
    Investor protection and corporate governance. Journal of Financial Economics, 3–28.McConnell, J.J., Ozbilgin, M., Wahal, S, 2000
    321
  30. P Stone, M M Veloso.
    Multiagent systems: A survey from a machine learning perspective. Autonomous Robots, 2000
    319
  31. K Järvelin, J Kekäläinen.
    Ir evaluation methods for retrieving highly relevant documents. In SIGIR ’00: Proceedings of the 23rd annual international ACM SIGIR conference on Research and development in information retrieval, 2000
    319
  32. C Manski.
    Economic analysis of social interactions. Journal of Economic Perspectives, 2000
    319
  33. P Domingos, G Hulten.
    Mining High-Speed Data Streams. ACM SIGKDD Conference, 2000
    318
  34. J L Herlocker, J A Konstan, J Riedl.
    Explaining collaborative filtering recommendations. In Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work, 2000
    313
  35. Hanspeter Pfister, Matthias Zwicker, Jeroen van Baar, Markus Gross.
    Surfels: Surface elements as rendering primitives. Siggraph 2000, Computer Graphics Proceedings, 2000
    306
  36. J-S Gutmann, K Konolige.
    Incremental mapping of large cyclic environments. Proc. CIRA, 2000
    304
  37. M Figeiredo, A Jain.
    Unsupervised learning of finite mixture models. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000
    303
  38. S Antoy, R Echahed, M Hanus.
    A Needed Narrowing Strategy. Journal of the ACM, 2000
    303
  39. E Scheirer.
    and M.Slaney, “Construction and Evaluation of a robust multifeature speech/music discriminator. in Proc.Int.Conf on. Acoustics, Speech and Signal Processing, 2000
    302
  40. R Filman, D Friedman.
    Aspect-Oriented Programming is Quantification and Obliviousness. In Workshop on Advanced Separation of Concerns (OOPSLA 2000, 2000
    301
  41. J Padhye, V Firoiu, D F Towsley, J F Kurose.
    Modeling TCP Reno performance: a simple model and its empirical validation. IEEE/ACM Transactions on Networking, 2000
    300
  42. Gary King, Michael Tomz, Jason Wittenberg.
    Making the Most of Statistical Analyses: Improving Interpretation and Presentation. American Journal of Political Science, 2000
    299
  43. E Fehr, S Gächter.
    Cooperation and punishment in public goods experiments. American Economic Review, 2000
    298
  44. M Weber, M Welling, P Perona.
    Unsupervised Learning of Models for Recognition. In ECCV, 2000
    297
  45. V Agarwal, M Hrishikesh, S Keckler, D Burger.
    Clock Rate Versus IPC: The End of the Road for Conventional Microarchitectures. In Proc. of the 27th Intl. Symp. on Comp. Arch, 2000
    296
  46. F Bacchus, F Kabanza.
    Using temporal logics to express search control knowledge for planning. Artificial Intelligence, 2000
    295
  47. D Pelleg, A Moore.
    X-means: Extending k-means with efficient estimation of the number of clusters. In International Conference on Machine Learning, 2000
    295
  48. W Bolosky, J Douceur, D Ely, M Theimer.
    Feasibility of a serverless distributed file system deployed on an existing set of desktop pcs. In Proc. of Sigmetrics, 2000
    294
  49. J Cowie, Y Wilks.
    Information extraction. eds, ‘Handbook of Natural Language Processing, 2000
    286
  50. R Kosala, H Blockeel.
    Web Mining Research : A Survey. in ACM SIGKDD, 2000
    285
  51. M Lewicki, T Sejnowski.
    Learning overcomplete representations. Neural Computation, 2000
    285
  52. J Platt, N Cristianini, J Shawe-Taylor.
    Large margin DAGs for multiclass classification. Adv. Neur. Inform. Process. Syst, 2000
    285
  53. Kristin J Forbes.
    A Reassessment of the Relationship Between Inequality and Growth. American Economic Review, 2000
    283
  54. M Yokoo, K Hirayama.
    Distributed Constraint Satisfaction Problems. 2000
    282
  55. R J Barro.
    Inequality and Growth in a Panel of Countries. Journal of Economic Growth, 2000
    281
  56. B Ullmer, H Ishii.
    Emerging Frameworks for Tangible User Interfaces. IBM System Journal, Volume 39, Numbers 3, 2000
    280
  57. S Dumais, H Chen.
    Hierarchical classification of web content. In Proceedings of the 23rd ACM SIGIR Conference, 2000
    280
  58. A van Deursen, P Klint, J Visser.
    Domain-Specific Languages: An Annotated Bibliography. ACM SIGPLAN Notices, 2000
    280
  59. A Saltelli, K Chan, E M Scott.
    Sensitivity Analysis. 2000
    280
  60. B Brumitt, B Meyers, J Krumm, A Shafer Kern, S.
    EasyLiving: Technologies for Intelligent Environments. In: Proceedings of the Intl. Conf. on Handheld and Ubiquitous Computing, 2000
    280
  61. S Thrun, W Burgard, D Fox.
    A real-time algorithm for mobile robot mapping with applications to multi-robot and 3d mapping. In Proc. of the IEEE Int. Conf. on Robotics and Automation (ICRA 2000, 2000
    279
  62. A Snoeren, H Balakrishnan.
    An end-to-end approach to host mobility. in Proc. ACM MOBICOM, 2000
    277
  63. E P Klement, R Mesiar, E Pap.
    Triangular Norms. 2000
    275
  64. A K McCallum, K Nigam, L Ungar.
    Efficient clustering of high-dimensional data sets with application to reference matching. In Proceedings of the Sixth International Conference on Knowledge Discovery and Data Mining (KDD-2000, 2000
    273
  65. A Perrig, R Canetti, D Tygar, D Song.
    Efficient Authentication and Signing of Multicast Streams over Lossy Channels. in Proc. of IEEE Security and Privacy Symposium S&P 2000, 2000
    273
  66. L Benini, A Bogliolo, G D Micheli.
    A Survey of Design Techniques for System-Level Dynamic Power Management. IEEE Transactions on VLSI Systems, 2000
    271
  67. Z Zhang, S Schwartz, L Wagner, W Miller.
    A greedy algorithm for aligning DNA sequences. J. Comput. Biol, 2000
    271
  68. S Guha, N Mishra, R Motwani, L O’Callaghan.
    Clustering Data Streams. IEEE FOCS Conference, 2000
    270
  69. A Doucet, J de Freitas, K Murphy, S Russell.
    Rao blackwellised particle filtering for dynamic bayesian networks. In Proc. of the Conference on Uncertainty in Artificial Intelligence (UAI, 2000
    268
  70. D Shmoys.
    Approximation algorithms for facility location problems. In Proceedings of Approximation Algorithms for Combinatorial Optimization (APPROX, 2000
    268
  71. Gosling Bollella, Dibble Brosgol, Hardin Furr, Turnbull.
    The Real-Time Specification for Java. 2000
    267
  72. P H S Torr, A Zisserman.
    MLESAC: A new robust estimator with application to estimating image geometry. Computer Vision and Image Understanding, 2000
    266
  73. M K Kerr, M Martin, G A Churchill.
    Analysis of variance for gene expression microarray data. J. Comput. Biol, 2000
    265
  74. K Tieu, P Viola.
    Boosting image retrieval. In Proc. IEEE Conf. on Computer Vision and Pattern Recognition, volume I, 2000
    262
  75. N Nisan.
    Bidding and allocation in combinatorial auctions. in EC ’00: Proceedings of the 2nd ACM conference on electronic, 2000
    262
  76. S G Chang, B Yu, M Vetterli.
    Adaptive wavelet thresholding for image denoising and compression. IEEE Transactions on Image Processing, 2000
    262
  77. Cormac Flanagan, Stephen N Freund.
    Type-based race detection for Java. In Proc. of the ACM SIGPLAN ’00 Conference on Program Language Design and Implementation (PLDI, 2000
    261
  78. A Snavely, D M Tullsen.
    Symbiotic Jobscheduling for a Simultaneous Multithreading Processor. In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000
    261
  79. L Breslau, D Fall, K Floyd, S Heidemann, J Helmy, A Huang, P McCanne, S Varadhan, K Yu.
    Advances in network simulation. IEEE Computer, 2000
    260
  80. A Baumberg.
    Reliable feature matching across widely separated views. In IEEE Conference on Computer Vision and Pattern Recognition, 2000
    260
  81. Akihiro Inokuchi, Takashi Washio, Hiroshi Motoda.
    An apriori-based algorithm for mining frequent substructures from graph data. In Proceedings of the Principles of Data Mining and Knowledge Discovery, 4th European Conference (PKDD, 2000
    260
  82. B Hochwald, T Marzetta.
    Unitary space-time modulation for multiple-antenna communications in Rayleigh flat fading. IEEE Trans. Inform. Theory, 2000
    258
  83. R T Rockafellar, S Uryasev.
    Optimization of conditional value-at-risk. Journal of Risk, 2000
    258
  84. Y A Ivanov, A F Bobick.
    Recognition of Visual Activities and Interactions by Stochastic Parsing. IEEE Trans. Pattern Analysis and Machine Intelligence, 2000
    258
  85. C Diot, B Levine, B Lyles, H Kassem, D Balensiefen.
    Deployment issues for the ip multicast service and architecture. IEEE Network, 2000
    258
  86. L E O Svensson.
    Open-Economy Inflation Targeting. Journal of International Economics, 2000
    257
  87. G Ateniese, J Camenisch, M Joye, G Tsudik.
    A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In Advances in Cryptology – CRYPTO 2000, 2000
    255