Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. Rajeev Motwani.
    Approximate frequency counts over data streams. proceedings of the 28th VLDB conference, 2002
    342
  2. A D Wood, J A Stankovic.
    Denial of Service in Sensor Networks. Computer, 2002
    341
  3. M Jain, C Dovrolis.
    End-to-end available bandwidth: measurement methodology, dynamics, and relation with TCP throughput. In Proceedings of the 2002 SIGCOMM conference, 2002
    340
  4. M Castro, B Liskov.
    Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems, 2002
    338
  5. S Narayanan, S A McIlraith.
    Simulation, verification and automated composition of web services. In WWW ’02: Proceedings of the 11th international conference on World Wide Web, 2002
    336
  6. B Hassibi, B M.
    Hochwald “High-rate codes that are linear in space and time. IEEE Transactions on Information Theory, 2002
    333
  7. Cristian Estan, George Varghese.
    New directions in traffic measurement and accounting. In SIGCOMM, 2002
    330
  8. P Auer, N Cesa-Bianchi, Y Freund, R Schapire.
    The Non-Stochastic Multi-Armed Bandit Problem. SIAM Journal on Computing, 2002
    329
  9. C Boyapati, R Lee, M Rinard.
    Ownership types for safe programming: Preventing data races and deadlocks. In OOPSLA, ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications, 2002
    327
  10. M J Freedman, R Morris.
    A Peer-to-Peer Anonymizing Network Layer. in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS, 2002
    327
  11. W Thies, M Karczmarek, S P Amarasinghe.
    StreaMIT: A Language for Streaming Applications. Proceedings of the International Conference on Compiler Construction, 2002
    327
  12. J Lerner, J Tirole.
    Some simple economics of open source. Journal of Industrial Economics, 2002
    322
  13. Cynthia C Breazeal.
    Designing Sociable Robots. 2002
    322
  14. G Duffee.
    Term premia and interest rate forecasts in affine models. Journal of Finance, 2002
    322
  15. U Braginsky, U Estrin.
    Rumour routing algorithm for sensor networks. in Firs, ACU lnrematio~l Workhop on Wrelcrr Sensor Nework and Applicotionr, 2002
    321
  16. L Sweeney.
    Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty Fuzziness and Knowledge-based Systems, 2002
    320
  17. P Shivakumar, M Kistler, W Keckler, D Burger, L Alvisi.
    Modeling the effect of technology trends on the soft error rate of combinational logic. Proceedings Int’l Conference on Dependable Systems and Networks, 2002
    319
  18. F Durand, J Dorsey.
    Fast bilateral filtering for the display of high-dynamic-range images. ACM Transactions on Graphics (TOG, 2002
    317
  19. D Malkhi, M Naor, D Ratajczak.
    Viceroy: A scalable and dynamic emulation of the butterfly. in ACM PODC’02, 2002
    315
  20. P Barreto, H Y Kim, B Lynn, M Scott.
    Efficient Algorithms for Pairing-based Cryptosystems. In Advances in Cryptology- CRYPTO 2002, Springer-Verlag, LNCS 2442, 2002
    313
  21. G Ammons, R Bodik, J R Larus.
    Mining specification. In PLDI’02, 2002
    313
  22. J Ioannidis, S M Bellovin.
    Implementing Pushback: Router-Based Defense Against DDoS Attacks. In Proceedings of the Network and Distributed System Security Symposium (NDSS, 2002
    311
  23. S Hangal, M S Lam.
    Tracking down software bugs using automatic anomaly detection. In ICSE’02, 2002
    309
  24. S Thrun.
    Robotic mapping: A survey. Exploring Artificial Intelligence in the New Millenium, 2002
    308
  25. R C Shah, J M Rabaey.
    Energy Aware Routing for Low Energy Ad Hoc Sensor Networks. in IEEE Wireless Communications and Networking Conference (WCNC, 2002
    307
  26. S Ratnasamy, M Handley, R Karp, S Shenker.
    Topologicallyaware overlay construction and server selection. in IEEE INFOCOM 2002, 2002
    306
  27. F Zhao, J Shin, J Reich.
    Information-Driven Dynamic Sensor Collaboration for Tracking Applications. In IEEE Signal Processing Magazine, 2002
    305
  28. N Li, J C Mitchell, W H Winsborough.
    Design of a role-based trust-management framework. in Proceedings of IEEE Symposium on Security and Privacy, 2002
    304
  29. J Kleinberg.
    Bursty and hierarchical structure in streams. In KDD, 2002
    301
  30. N Bruno, N Koudas, D Srivastava.
    Holistic twig joins: Optimal XML pattern matching. In SIGMOD, 2002
    297
  31. J Lee, J Chai, P Reitsma, J Hodgins, N Pollard.
    Interactive control of avatars animated with human motion data. 2002
    296
  32. G Doretto, Soatto.
    S.: Editable dynamic textures. 2002
    295
  33. X GU, S J GORTLER, H HOPPE.
    Geometry images. In SIGGRAPH, 2002
    294
  34. A Doan, J Madhavan, P Domingos, A Halevy.
    Learning to map between ontologies on the semantic web. In Proceedings of the World-Wide Web Conference (WWW-2002, 2002
    292
  35. S Verdú.
    Spectral efficiency in the wideband regime. IEEE Trans. Inf. Theory, 2002
    291
  36. B Krishnamachari, D Estrin, S Wicker.
    The impact of data aggregation in wireless sensor networks. In Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops, 2002
    290
  37. Wolfgang Nejdl, Boris Wolf, Changtao Qu, Stefan Decker, Michael Sintek, Ambjoern Naeve, Mikael Nilsson, Matthias Palmer, Tore Risch.
    Edutella: A p2p networking infrastructure based on rdf. In In Proceedings of the 11th World Wide Web Conference — WWW-11, 2002
    288
  38. A SCHMIDT, F WASS, M KERSTEN, M J CAREY, I MANOESCU, R BUSSE.
    Xmark: A benchmark for xml data management. In Proceedings of the 28th International Conference on Very Large Data Bases, 2002
    285
  39. D Moore, C Shannon, J Brown.
    Code-red: a case study on the spread and victims of an internet worm. In SIGCOMM Internet Measurement Workshop (IMW2002, 2002
    284
  40. S Saroiu, K Gummadi, R Dunn, S Gribble, H Levy.
    An analysis of internet content delivery systems. in OSDI’02, 2002
    284
  41. D Ravichandran, E Hovy.
    Learning surface text patterns for a question answering system. In Proceedings of ACL-02, 2002
    283
  42. Ratul Mahajan, David Wetherall, Tom Anderson.
    Understanding BGP misconfiguration. In SIGCOMM ’02: Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, 2002
    281
  43. W M P van der Aalst, A H M ter Hofstede, B Kiepuszewski, A P Barros.
    Workflow patterns. Faculty of IT, Queensland University of Technology, 2002
    280
  44. V Kiriansky, D Bruening, S Amarasinghe.
    Secure Execution Via Program Shepherding. In Proceedings of the 11th USENIX Security Symposium, 2002
    280
  45. H Kitano.
    Systems biology: a brief overview. Science, 2002
    279
  46. D Fensel, C Bussler.
    The Web Service Modeling Framework WSMF. Electronic Commerce Research and Applications, 2002
    279
  47. R Fattal, D Lischinski, M Werman.
    Gradient Domain High Dynamic Range. Compression,”ACM Transactions on Graphics (Proc. ACM SIGGRAPH, 2002
    279
  48. N Duffy, M Collins.
    Convolution kernels for natural language. Advances in Neural Information Processing Systems 14, 2002
    278
  49. N Guarino, C Welty.
    Evaluating Ontological Decisions with OntoClean. Communications of the ACM, 2002
    277
  50. J Hannemann, G Kiczales.
    Design pattern implementation in Java and AspectJ. In Proc. of OOPSLA, volume 37 of ACM SIGPLAN Notices, 2002
    276
  51. P L Bartlett, S Mendelson.
    Rademacher and gaussian complexities risk bounds and structural results. In Journal of Machine Learning, 2002
    273
  52. P S Adler, S W Kwon.
    Social capital: Prospects for a new concept. Academy of Management Review, 2002
    273
  53. J H Stock, J H Wright, M Yogo.
    A survey of Weak Instruments and Weak Identification in Generalized Method of Moments. Journal of Business and Economic Statistics, 2002
    273
  54. D Kotz, K Essien.
    Analysis of A Campus-wide Wireless Network. In Proceedings of ACM Mobicom, 2002
    272
  55. Sean Quinlan, Sean Dorward.
    Venti: A new approach to archival storage. In Proceedings of the Conference on File and Storage Technologies, FAST ’02, 2002
    271
  56. P Dayan.
    Motivated reinforcement learning. Advances in Neural Information Processing Systems 14, 2002
    271
  57. A Muthitacharoen, R Morris, T Gil, I B Chen.
    Ivy: A read/write peer-to-peer file system. In Proceedings of the 5th USENIX Symposium on Operating Systems Design and Implementation, 2002
    271
  58. A Gangemi, N Guarino, C Masolo, A Oltramari, R Oltramari, L Schneider.
    Sweetening Ontologies with DOLCE. In Proc. of 13th Int. Conf. on Knowledge Engineering and Knowledge Management, 2002
    268
  59. E Cohen, S Shenker.
    Replication strategies in unstructured peer-to-peer networks. In Proc. of ACM SIGCOMM, 2002
    267
  60. Sabine Brants, Stefanie Dipper, Silvia Hansen, Wolfgang Lezius, George Smith.
    The TIGER treebank. In Proceedings of the Workshop on Treebanks and Linguistic Theories. Sozopol, 2002
    264
  61. A Evfimievski, R Srikant, R Agrawal, J Gehrke.
    Privacy preserving mining of association rules. in: Proceedings of the Eighth Conference on Knowledge Discovery and Data Mining (KDD’02, 2002
    264
  62. P Barford, J Kline, D Plonka, A Ron.
    A Signal Analysis of Network Traffic Anomalies. In Proceedings of 2nd ACM Internet Measurement Conference, 2002
    263
  63. Moses Charikar.
    Similarity estimation techniques from rounding algorithms. in ACM Symposium on Theory of Computing, 2002
    263
  64. A Howard, M Mataric, G Sukhatme.
    Mobile sensor network deployment using potential fields: A distributed, scalable solution to the area coverage problem. Distributed Autonomous Robotic Systems, 2002
    263
  65. D Ganesan, B Krishnamachari, A Woo, D Culler, D Estrin, S Wicker.
    Complex Behavior at Scale: An Experimental Study of Low-Power Wireless Sensor Networks. 2002
    263
  66. R L Hsu, M Abdel-Mottaleb, A K Jain.
    Face detection in color images. IEEE Trans. Pattern Anal. Mach. Intell, 2002
    260
  67. B P Gerkey, M J Mataric.
    Sold!: Auction methods for multirobot coordination. IEEE Transactions on Robotics, 2002
    260
  68. Changkyu Kim, Doug Burger, Stephen W Keckler.
    An adaptive, non-uniform cache structure for wire-delay dominated on-chip caches. in ASPLOS X, 2002
    258
  69. J Bang-Jensen, G Gutin.
    Digraphs: theory, algorithms and applications. 2002
    257
  70. P Carr, H Geman, D B Madan, M Yor.
    The Fine Structure of Asset Returns: An Empirical Investigation. Journal of Business, 2002
    256
  71. E J Keogh.
    Exact indexing of dynamic time warping. In Proceedings of the International Conference on Very Large Data Bases, 2002
    256
  72. Shurug Al-Khalifa, H V Jagadish, Jignesh M Patel, Yuqing Wu, Nick Koudas, Divesh Srivastava.
    Structural Joins: A Primitive for Efficient XML Query Pattern Matching. In Proc. ICDE, 2002
    256
  73. P Perez, C Hue, J Vermaak, M Gangnet.
    Color-Based Probabilistic Tracking. Proc. European Conf. Computer Vision, 2002
    256
  74. Gaurav Bhalotia, Arvind Hulgeri, Soumen Chakrabarti Charuta, S Sudarshan.
    Keyword searching and browsing in databases using BANKS. In Proceedings of the 18th International Conference on Data Engineering (ICDE, 2002
    256
  75. Glen Jeh, Jennifer Widom.
    SimRank: A measure of structural-context similarity. In Proceedings of the Eighth International Conference on Knowledge Discovery and Data Mining (KDD, 2002
    255
  76. A Serjantov, G Danezis.
    Towards an Information Theoretic Metric for Anonymity. Dingledine and Syverson (Eds.), Designing Privacy Enhancing Technologies, LNCS 2482, 2002
    254
  77. E Goldberg, Y Novikov.
    BerkMin: A fast and robust SAT-solver. In Proceedings of the 2002 Design, Automation and Test in Europe Conference and Exposition - DATE 2002, 2002
    254
  78. R Bridson, R Fedkiw, J Anderson.
    Robust treatment of collisions, contact and friction for cloth animation. ACM Trans. Graph. (SIGGRAPH Proc, 2002
    253
  79. Daron Acemoglu, Simon Johnson, James A Robinson.
    Reversal of Fortune: Geography and Institutions in the Making of the Modern World Income Distribution." Quarterly. Journal of Economics, 2002
    253
  80. D Acemoglu.
    Technical change, inequality and the labor market. Journal of Economic Literature, 2002
    252
  81. Dirk Balfanz, D K Smetters, Paul Stewart, H Chi Wong.
    Talking to strangers: Authentication in ad-hoc wireless networks. In Symposium on Network and Distributed Systems Security (NDSS ’02, 2002
    251
  82. S Agrawal, S Chaudhuri, G Das.
    DBXplorer: A system for keyword-based search over relational databases. In Proceedings of ICDE, 2002
    250
  83. C Holt, S Laury.
    Risk aversion and incentive effects. American Economic Review, 2002
    249
  84. N Cristianini, J Shawe-Taylor, A Elissee, J Kandola.
    On kernel-target alignment, in. Ghahramani (Eds.), Advances in Neural Information Processing Systems 14, 2002
    248
  85. B Sadeghi, V Kanodia, A Sabharwal, E Knightly.
    Opportunistic media access for multirate ad-hoc networks. in ACM MOBICOM, 2002
    247
  86. P Domingos, M Richardson.
    Mining knowledge-sharing sites for viral marketing, in. Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002
    246
  87. D Clark, J Wroclawski, K Sollins, R Braden.
    Tussle in Cyberspace: Defining tomorrow’s Internet. In SIGCOMM, 2002
    246