Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. F Cali, M Conti, E Gregori.
    Dynamic Tuning of the IEEE 802.11 Protocol to Achieve a Theoretical Throughput Limit. IEEE/ACM Transactions on Networking, 2000
    234
  2. F, F Kabanza.
    Using temporal logics to express search control knowledge for planning. Artificial Intelligence, 2000
    233
  3. R E Levine, N Loayza, T Beck.
    Financial Intermediation and Growth: Causality and Causes. Journal of Monetary Economics, 2000
    233
  4. O Kupferman, M Y Vardi, Wolper.
    P.: An automata-theoretic approach to branching-time model checking. Journal of the ACM, 2000
    232
  5. Benjamin C Pierce, David N Turner.
    Pict: A programming language based on the pi-calculus. In Proof, Language and Interaction: Essays in Honour of Robin Milner, 2000
    231
  6. D Duffie, J Pan, K Singleton.
    Transform analysis and asset pricing for affine jumpdiffusions. Econometrica, 2000
    229
  7. M E Leventon, W E L Grimson, O Faugeras.
    Statistical shape influence in geodesic active contours. Hilton Head Island, SC, 2000
    227
  8. R Neal.
    Markov chain sampling methods for Dirichlet process mixture models. Journal of Computational and Graphical Statistics, 2000
    223
  9. D Pointcheval, J Stern.
    Security arguments for digital signatures and blind Signatures. International Journal of Computer Science and Security Volume(4): Issue(1). 105 Rao, K.A.Ajmath, P.Vasudeva Reddy & T.Gowri, 2000
    220
  10. Barry Brumitt, Brian Meyers, John Krumm, Amanda Kern, Steven Shafer.
    EasyLiving: Technologies for Intelligent Environments”, Microsoft Research. HUC 2000, LNCS 1927, 2000
    217
  11. S Guha, N Mishra, R Motwani, L O’Callaghan.
    Clustering data streams. In 41st Symposium on Foundations of Computer Science (FOCS’00). IEEE Computer Society, 2000
    216
  12. C Flanagan, S N Freund.
    Type-Based Race Detection for Java. In PLDI, 2000
    216
  13. G Bekaert, C R Harvey.
    Foreign speculators and emerging equity markets. Journal of Finance, 2000
    215
  14. S Thrun, W Burgard, D Fox.
    A real-time algorithm for mobile robot mapping with applications to multi-robot and 3d mapping. In IEEE International Conference on Robotics and Automation, 2000
    212
  15. W MATUSIK, C BUEHLER, R RASKAR, S J GORTLER, L MCMILLAN.
    Image-based visual hulls. SIGGRAPH, 2000
    212
  16. K Tieu, P Viola.
    Boosting image retrieval. In Proceedings ieee conf. on, 2000
    211
  17. W Johnson, J Rickel, J Lester.
    Animated Pedagogical Agents: Face-to-Face Interaction in Interactive Learning Environments. Int. J. Artif. Int. Educ, 2000
    211
  18. S Dumais, H Chen.
    Hierarchical classification of Web content. In Proceedings of the 23rd annual international ACM SIGIR, 2000
    210
  19. Lee Breslau, Deborah Estrin, Kevin Fall, Sally Floyd, John Heidemann, Ahmed Helmy, Polly Huang, Steven McCanne, Kannan Varadhan, Ya Xu, Haobo Yu.
    Advances in network simulation. IEEE Computer, 2000
    210
  20. M Weber, M Welling, P Perona.
    Unsupervised learning of models for recognition. 2000
    209
  21. A Snoeren, H Balakrishnan.
    An end-to-end approach to host mobility. in Proc. ACM MOBICOM, 2000
    209
  22. T Erickson, W A Kellogg.
    Social translucence. an approach to designing systems that support social processes. ACM Transactions on Computer–Human Interaction, 2000
    209
  23. J Pei, J Han, R Mao.
    CLOSET: An Efficient Algorithm for Mining Frequent Closed Item sets. Proc. ACM SIGMOD Workshop Research Issues in Data Mining and Knowledge Discovery, 2000
    209
  24. Y Zhang, V Paxson, S Shenker.
    The stationarity of internet path properties. Routing, loss, and throughput,” ACIRI, Tech. Rep, 2000
    207
  25. Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik.
    A practical and provably secure coalition-resistant group signature scheme. In Proc. of Crypto 2000, volume 1880 of LNCS, 2000
    206
  26. J Portilla, E P Simoncelli.
    A parametric texture model based on joint statistics of complex wavelet coefficients. Int. J. Comput. Vis, 2000
    204
  27. A Perrig, R Canetti, D Song, D Tygar.
    Efficient authentication and signing of multicast streams over lossy channels. in Proc. IEEE Symp. Security and Privacy, 2000
    203
  28. D L McGuinness, R Fikes, J Rice, S Wilder.
    An Environment for Merging and Testing Large Ontologies. In: Proceedings of the Seventh International Conference on Principles of Knowledge Representation and Reasoning (KR2000, 2000
    202
  29. B Kuipers.
    The spatial semantic hierarchy. Artificial Intelligence, 2000
    202
  30. Y Zhang, W Lee.
    Intrusion Detection in Wireless Ad Hoc Networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (ACM MobiCom’00, 2000
    202
  31. Bruce Tesar, Paul Smolensky.
    Learnability in Optimality Theory. 2000
    201
  32. J L Herlocker, J A Konstan, J Riedl.
    Explaining collaborative filtering recommendations. ACM Conference on Computer-Supported Cooperative Work (CSCW, 2000
    198
  33. M Breunig, H-P Kriegel, R Ng, J Sander.
    LOF: Identifying Density-Based Local Outliers. In: Proceedings of ACM SIGMOD International Conference on the Management of Data (SIGMOD00, 2000
    197
  34. Arnaud Doucet, Nando de Freitas, Kevin Murphy, Stuart Russell.
    RaoBlackwellised particle filtering for dynamic Bayesian networks. In Proceedings of the Sixteenth Annual Conference on Uncertainty in Artificial Intelligence (UAI-00, 2000
    197
  35. A K McCallum, K Nigam, L H Ungar.
    Efficient clustering of high-dimensional data sets with application to reference matching. In Proc. of SIGKDD, 2000
    196
  36. C Diot, B N Levine, B Lyles, H Kassem, D Balensiefen.
    Deployment issues for the IP multicast service and architecture. IEEE Network, 2000
    195
  37. D Roselli, J Lorch, T Anderson.
    A comparison of file system workloads. in Proceedings of the annual conference on USENIX Annual Technical Conference. USENIX Association, 2000
    194
  38. B KRISHNAMURTHY, J WANG.
    On network-aware clustering of web clients. In Proceedings of ACM SIGCOMM, 2000
    193
  39. N Kushmerick.
    Wrapper Induction: Efficiency and Expressiveness. Artificial Intelligence, 2000
    190
  40. J Platt, N Cristianini, J Shawe-Taylor.
    Large margin dags for multiclass classification. Advances in Neural Information Processing Systems, 12:547 – 553, 2000
    190
  41. D Shiu, G J Foschini, M J Gans.
    Fading correlation and its effects on the capacity of multielement antenna systems. IEEE Transactions on Communications, 2000
    189
  42. J Odell, H Parunak, B Bauer.
    Extending UML for Agents. In Proc. of Agent-Oriented Information Systems Workshop, 2000
    187
  43. D Chamberlin, J Robie, D Florescu.
    Quilt: an XML query language for heterogeneous data sources. Lecture Notes in Computer Science, 2000
    186
  44. M Craven, D DiPasquo, D Freitag, A McCallum, T Mitchell, K Nigam, S Slattery.
    Learning to construct knowledge bases from the World Wide Web. Artificial Intelligence, 2000
    186
  45. R Dingledine, M J Freedman, D Molnar.
    The Free Haven project: Distributed anonymous storage service. In PET, 2000
    185
  46. J Hollan, E Hutchins, D Kirsh.
    Distributed cognition: Toward a new foundation of human-computer interaction research. ACM Transactions on Computer-Human Interaction, 2000
    185
  47. R Kosala, H Blockeel.
    Web Mining Research: A Survey. In ACM SIGKDD Explorations, 2000
    184
  48. Dan Pelleg, Andrew Moore.
    X-means: Extending k-means withefficient estimation of the number of clusters. In Proceedings of the Seventeenth International Conference on Machine Learning, Palo Alto,CA, 2000
    184
  49. Daniel S Bernstein, Shlomo Zilberstein, Neil Immerman.
    The complexity of decentralized control of markov decision processes. In Proc. of UAI-2000, 2000
    183
  50. A van Deursen, P Klint, J Visser.
    Domain-Specific Languages: An Annotated Bibliography. ACM SIGPLAN Notices, 2000
    182
  51. T Arts, J Giesl.
    Termination of Term Rewriting using Dependency Pairs. Theor. Comput. Sci, 2000
    180
  52. Antonio Carzaniga, David S Rosenblum, Alexander L Wolf.
    Achieving scalability and expressiveness in an internet-scale event notification service. In Proceedings of the 19th ACM Symposium on Principles of Distributed Computing, 2000
    180
  53. G Flake, S Lawrence, C Giles.
    Efficient identification of web communities. In Proceedings of the 6th ACM SIGKDD conference, 2000
    180
  54. Giuseppe De Giacomo, Yves Lesperance, Hector J Levesque.
    Congolog, a concurrent programming language based on the situation calculus. Artificial Intelligence, 2000
    179
  55. T Kohonen, S Kaski, K Lagus, J Salojärvi, J Honkela, V Paatero, A Saarela.
    Self-organization of a massive document collection. IEEE Transactions on Neural Networks, 2000
    179
  56. B M Hochwald, T L Marzetta.
    Unitary space-time modulation for multiple-antenna communications in rayleigh at fading. IEEE transactions on Information Theory, 2000
    178
  57. R Kumar, P Raghavan, S Rajagopalan, D Sivakumar, A Tomkins, E Upfal.
    Stochastic models for the web graph. In 41th IEEE Symposium On Foundations of Computer Science (FOCS, 2000
    177
  58. Manuvir Das.
    Unification-based pointer analysis with directional assignments. In Programming Languages Design and Implementation (PLDI, 2000
    177
  59. M BRAND, A HERTZMANN.
    Style machines. In Proceedings of ACM ACM SIGGRAPH, 2000
    176
  60. N Barberis.
    Investing for the Long Run when Returns are Predictable. The Journal of Finance, 2000
    176
  61. L A Barroso.
    Piranha: A Scalable Architecture Based on Single-Chip Multiprocessing. Proc. 27th ACM Int’l Symp. Computer Architecture, ACM, 2000
    175
  62. D LIE, C THEKKATH, M MITCHELL, P LINCOLN, D BONEH, J MITCHELL, M HOROWITZ.
    Architectural support for copy and tamper resistant software. In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX, 2000
    175
  63. S K Reinhardt, S S Mukherjee.
    Transient fault detection via simultaneous multithreading. In Proc. of the 27th ISCA, 2000
    174
  64. Andrew C Myers, Barbara Liskov.
    Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology, 2000
    174
  65. A Inokuchi, T Washio.
    An Apriori-Based Algorithm for Mining Frequent Substructures from Graph Data. PKDD '00: Proceedings of the 4th European Conference on Principles of Data Mining and Knowledge Discovery, 2000
    173
  66. W H Winsborough, K E Seamons, V E Jones.
    Automated trust negotiation. In Proceedings of DARPA Information Survivability Conference and Exposition (Hilton Head, SC, Jan. 2000), 88–102. DOI= http://doi.acm.org/ 10.1109/DISCEX.2000.824965, 2000
    173
  67. N G Duffield, M Grossglauser.
    Trajectory sampling for direct traffic observation. in Proc. ACM SIGCOMM, 2000
    172
  68. H Casanova, G Obertelli, F Berman, R Wolski.
    The apples parameter sweep template: user-level middleware for the grid. In Supercomputing ’00: Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM, 2000
    171
  69. B Bonet, H Ge.
    ner. Planning with incomplete information as heuristic search in belief space. In Proc. 5th International Conference onArti cial Intelligence Planning and Scheduling, 2000
    171
  70. James Gosling, Bill Joy, Guy Steele, Gilad Bracha.
    The Java Language Specification, Second Edition. 2000
    171
  71. H Zang, J P Jue, B Mukherjee.
    A review of routing and wavelength assignment approaches for wavelength-routed optical WDM networks. Optical Networks Magazine, 2000
    171
  72. R Bohlin, L E Kavraki.
    Path planning using Lazy PRM. In Proc. IEEE Int. Conf. Robot. Autom. (ICRA, 2000
    171
  73. P Cousot, R Cousot.
    Temporal abstract interpretation. In Conference Record of the Twentyseventh Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2000
    170
  74. S Kent, C Lynn, K Seo.
    Secure Border Gateway Protocol (S-BGP. IEEE Journal on Selected Areas in Communications, 2000
    170
  75. A Snavely, D M Tullsen.
    Symbiotic jobscheduling for a simultaneous multithreading processor. In Proceedings of ASPLOS, 2000
    170
  76. A SCHÖDL, R SZELISKI, D SALESIN, I ESSA.
    Video textures. In Proc. of ACM SIGGRAPH, ACM, 2000
    169
  77. A Medina, I Matta, J Byers.
    On the origin of power laws in Internet topologies. ACM Computer Communication Review, 2000
    169
  78. N Amenta, S Choi, T Dey, N Leekha.
    A simple algorithm for homeomorphic surface reconstruction. In ACM Symposium on Computational Geometry, 2000
    168
  79. D Beeferman, A Berger.
    Agglomerative Clustering of a Search Engine Query Log. Proc. ACM SIGKDD, 2000
    168
  80. N Cardwell, S Savage, T Anderson.
    Modeling tcp latency. In INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, 2000
    168
  81. M Bellare, C Namprempre.
    Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In ASIACRYPT 2000, volume 1976 of LNCS, 2000
    167
  82. G Berry.
    The foundations of Esterel. In Proof, Language and Interaction: Essays in Honour of Robin Milner, 2000
    165
  83. K Kuetzer, S Malik, R Newton, J M Rabaey, A Sangiovanni-Vincentelli.
    System-level design: Orthogonalization of concerns and platform-based design. IEEE Trans. Computer-Aided Design Int. Circuits Syst, 2000
    165
  84. V Shoup.
    Practical threshold signatures. In EUROCRYPT, 2000
    165
  85. Andrew Y Ng, Michael Jordan.
    PEGASUS: A policy search method for large MDPs and POMDPs. In Proc. Conference on Uncertainty in Artificial Intelligence (UAI, 2000
    163
  86. N Nisan, A Ronen.
    Computationally Feasible VCG Mechanisms. In Proceedings of the 2nd ACM Conference on Electronic Commerce (EC, 2000
    163
  87. G Robins, A Zelikovsky.
    Improved Steiner tree approximation in graphs. Proceedings of the tenth annual ACMSIAM Symposium on Discrete Algorithms (SODA, 2000
    163
  88. R Alur, K Etessami, M Yannakakis.
    Inference of Message Sequence Charts. Proc. 22nd Intl. Conf. on Software Engineering (ICSE’00, 2000
    162
  89. Bashar Nuseibeh, Steve Easterbrook.
    Requirements Engineering: A Roadmap. In Proceedings of the Conference on the Future of Software Engineering (ICSE, 2000
    161