Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. E Damiani, S De Capitani di Vimercati, S Paraboschi, P Samarati, F Violante.
    A reputation-based approach for choosing reliable resources in peer-to-peer networks. Proceedings of the 9th ACM conference on Computer and Communications Security, 2002
    157
  2. J CASTRO, M KOLP, J MYOPOULOS.
    Towards requirements-driven information systems engineering: the Tropos project. In Information Systems, 2002
    157
  3. D Garlan, D Siewiorek, A Smailagic, P Steenkiste.
    Project Aura: Toward Distraction-Free Pervasive Computing. IEEE Pervasive Computing, 2002
    156
  4. P Kingsbury, Palmer.
    M.: From Treebank to Propbank. In: Third International Conference on Language Resources and Evaluation, LREC-2002, Las Palmas, Canary Islands, 2002
    155
  5. J Aldrich, C Chambers, D Notkin.
    ArchJava: Connecting Software Architecture to Implementation. In International Conference on Software Engineering (ICSE, 2002
    155
  6. H Edelsbrunner, D Letscher, A Zomorodian.
    Topological persistence and simplification. Discrete Comp. Geo, 2002
    154
  7. K Hildrum, J D Kubiatowicz, S Rao, B Y Zhao.
    Distributed object location in a dynamic network. In Proceedings of the Fourteenth ACM Symposium on Parallel Algorithms and Architectures, 2002
    154
  8. D Wagner, P Soto.
    Mimicry attacks on host-based intrusion detection systems. In CCS ’02: Proceedings of the 9th ACM conference on Computer and communications security, 2002
    154
  9. L Popa, Y Velegrakis, R J Miller, M A Hernandez, R Fagin.
    Translating Web Data. In VLDB, 2002
    154
  10. M Mitzenmacher.
    Compressed bloom filters. IEEE/ACM Transactions on Networking, 2002
    154
  11. S Sarawagi, A Bhamidipaty.
    Interactive deduplication using active learning. In KDD, 2002
    153
  12. R Agrawal, J Kiernan, R Srikant, Y Xu.
    Hippocratic databases. In VLDB, 2002
    153
  13. G Jeh, J Widom.
    SimRank: A Measure of Structural-Context Similarity. Proc. ACM SIGKDD ’02, 2002
    153
  14. T Griffin, F B Shepherd, G Wilfong.
    The stable paths problem and interdomain routing. IEEE/ACM Trans. Netw, 2002
    153
  15. Sitaram Iyer, Antony Rowstron, Peter Druschel.
    Squirrel: A decentralized peer-to-peer web cache. In PODC, 2002
    152
  16. J CHOI, K LEE, A LOGINOV, R O’CALLAHAN, V SARKAR, M SRIDHARAN.
    Efficient and precise datarace detection for multithreaded object-oriented programs. In Proceedings of the ACM Conference on Programming Language Design and Implementation, 2002
    152
  17. P A Bernstein, F Giunchiglia, A Kementsietsidis, J Mylopoulis, L Serafini, Zaihrayeu.
    I.: Data Management for Peer-to-Peer Computing: A Vision. In: Workshop on the Web and Databases (WebDB'02). Madison, 2002
    152
  18. A Ladd, K Bekris, G Marceau, A Rudys, L Kavraki, D Wallach.
    Robotics-based location sensing using wireless ethernet. 2002
    151
  19. C Y Chan, P Felber, M N Garofalakis, R Rastogi.
    Efficient filtering of XML documents with XPath expressions. In Proc. 18th ICDE, 2002
    151
  20. R I, M Tennenholtz.
    R-max – a general polynomial time algorithm for near-optimal reinforcement learning. Journal of Machine Learning Research, 2002
    151
  21. Patrick Pantel, Dekang Lin.
    Discovering word senses from text. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002
    150
  22. D Kossmann, F Ramsak, S Rost.
    Shooting stars in the sky: an online algorithm for skyline queries. In VLDB Conf, 2002
    150
  23. P Perez, C Hue, J Vermaak, M Ganget.
    Color-based probabilistic tracking. In ECCV, 2002
    150
  24. A Van Lamsweerde.
    Goal-oriented requirements engineering: A guided tour. In Requirements Engineering, 2001. Proceedings. Fifth IEEE International Symposium on, 2002
    150
  25. J Lerner, J Tirole.
    Some Simple Economics of Open Source. Journal of Industrial Economics, 2002
    149
  26. M Bowling, M Veloso.
    Multiagent learning using a variable learning rate. Artificial Intelligence, 2002
    147
  27. R Rajwar, J R Goodman.
    Transactional lock-free execution of lockbased programs. in Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS X), ACM, 2002
    146
  28. F Plasil, S Visnovsky.
    Behavior Protocols for Software Components. IEEE Transactions on Software Engineering, 2002
    146
  29. A Balachandran, G M Voelker, P Bahl, P V Rangan.
    Characterizing User Behavior and Network Performance in a Public Wireless LAN. In Proceedings ofACM SIGMETRICS, 2002
    146
  30. H Weatherspoon, J Kubiatowicz.
    Erasure coding vs. replication: A quantitative comparison. In Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS 2002, 2002
    146
  31. M Musuvathi, D Y W Park, A Chou, D R Engler, D Dill.
    CMC: A pragmatic approach to model checking real code. In Operating System Design and Implementation (OSDI, 2002
    146
  32. M Gastpar, M Vetterli.
    On the Capacity of Wireless Networks: The Relay Case. In Proc. IEEE INFOCOM 2002, 2002
    145
  33. J Esparza, S Römer, Vogler.
    W.: An improvement of McMillan’s unfolding algorithm. Formal Methods in System Design, 2002
    144
  34. Ted Briscoe, John Carroll.
    Robust accurate statistical annotation of general text. In Proc. of the 3rd LREC. Las Palmas, Gran Canaria, 2002
    144
  35. D Evans, D Larochelle.
    Improving security using extensible lightweight static analysis. IEEE Software, 2002
    144
  36. V Hristidis, Y Papakonstantinou.
    Discover: Keyword search in relational databases. VLDB, 2002
    144
  37. J-S Gutmann, D Fox.
    An experimental comparison of localization methods continued. Proceedings of the 2002 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS, 2002
    144
  38. M P Robillard, G C Murphy.
    Concern Graphs: Finding and Describing Concerns Using Structural. Program Dependencies, International Conference on Software Engineering, 406‐416. 320 Robillard, 2002
    143
  39. H Hacigümü¸s, B Iyer, C Li, S Mehrotra.
    Executing sql over encrypted data in the database-service-provider model. Computer Science, 2002
    142
  40. H Tangmunarunkit, R Govindan, S Jamin, S Shenker, W Willinger.
    Network topology generators: degree-based vs. structural. In SIGCOMM, 2002
    142
  41. V Raghunathan, C Schurgers, Park Sung, M Srivastava.
    Energy-aware wireless microsensor networks. IEEE Signal Processing Magazine, 2002
    142
  42. A Dobra, M Garofalakis, J Gehrke, R Rastogi.
    Processing complex aggregate queries over data streams. In ACM SIGMOD International Conf. on Management of Data (SIGMOD’02). ACM, 2002
    142
  43. Alvin E Roth, Axel Ockenfels.
    LastMinute Bidding and the Rules for Ending Second-Price Auctions: Evidence from eBay and. Amazon Auctions on the Internet.” American Economic Review, 2002
    141
  44. G Gentry, A Silverberg.
    Hierarchical ID-based cryptography. in Proc. ASIACRYPT. LNCS, 2002
    141
  45. David V Pynadath, Milind Tambe.
    The communicative multiagent team decision problem: Analyzing teamwork theories and models. Journal of Artificial Intelligence Research, 2002
    141
  46. E Sit, R Morris.
    Security considerations for peer-topeer distributed hash tables. In IPTPS ’01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, 2002
    140
  47. J Rexford, J Wang, Z Xiao, Y Zhang.
    BGP routing stability of popular destinations. In IMW ’02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, 2002
    140
  48. M B Taylor, J Kim, J Miller, D Wentzlaff, F Ghodrat, B Greenwald, H Hoffman, P Johnson, J-W Lee, W Lee, A Ma, A Saraf, M Seneski, N Shnidman, V Strumpen, M Frank, S Amarasinghe, A Agarwal.
    The raw microprocessor: A computational fabric for software circuits and general-purpose programs. IEEE Micro, 2002
    140
  49. D Thain, T Tannenbaum, M Livny.
    Condor and the grid. Grid Computing: Making the Global Infrastructure a Reality, 2002
    140
  50. A Dhodapkar, J E Smith.
    Managing multi-configuration hardware via dynamic working set analysis. In 29th Annual International Symposium on Computer Architecture, 2002
    139
  51. D Stiliadis C Dovrolis, P Ramanathan.
    Proportional differentiated services: Delay differentiation and packet scheduling. IEEE/ACM Transactions on Networking, 2002
    139
  52. A J Lipton, H Fujiyoshi, Patil.
    R.S.: Moving target classification and tracking from real-time video on-road vehicle detection: a review. In: Proceedings of the IEEE workshop on applications of computer vision, 2002
    139
  53. L P Murray Cox, C D, B D Noble.
    Pastiche: Making backup cheap and easy. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation, 2002
    139
  54. H Yan Li, T Wang.
    Motion Texture: A two-level statistical model for character motion synthesis. ACM Transaction on Graphics, 2002
    138
  55. M L Littman, R Sutton, S Singh.
    Predictive representations of state. 2002
    137
  56. P B Gibbons, Y Matias, V Poosala.
    Fast incremental maintenance of approximate histograms. ACM Trans. Database Syst, 2002
    137
  57. K Ashcraft, D Engler.
    Using programmer-written compiler extensions to catch security holes. In Proceedings of the 23rd IEEE Symposium on Security and Privacy, 2002
    137
  58. M Fahndrich, R DeLine.
    Adoption and focus: practical linear types for imperative programming. SIGPLAN Not, 2002
    137
  59. Constantine P Sapuntzakis, Ramesh Chandra, Ben Pfaff, Jim Chow, Monica S Lam, Mendel Rosenblum.
    Optimizing the Migration of Virtual Computers. In Proceedings of the 5 th Symposium on Operating Systems Design and Implementation (OSDI, 2002
    137
  60. P Pietzuch, J Bacon.
    Hermes: A Distributed Event-Based Middleware Architecture. Proceedings of 22nd International Conference on Distributed Computing Systems Workshops (ICDCSW ’02, 2002
    137
  61. G Antoniol, G Canfora, G Casazza, A De Lucia, E Merlo.
    Recovering traceability links between code and Documentation. IEEE Transactions on Software Engineering, 2002
    136
  62. L Zhou, F B Schneider, Van.
    Renesse, R.: Coca: A secure distributed online certification authority. ACM Trans. Comput. Syst, 2002
    136
  63. P Sinha, T Nandagopal, N Venkitaraman, R Sivakumar, V Bharghavan.
    WTCP: a reliable transport protocol for wireless widearea networks. Wireless Networks. 2002
    136
  64. G Miklau, D Suciu.
    Containment and equivalence for an XPath fragment. In PODS, 2002
    135
  65. R Davies, T Cootes C Twining, C Taylor.
    A minimum description length approach to statistical shape modelling. IEEE Trans. on Medical Imaging, 2002
    135
  66. Mohammed J Zaki.
    Efficiently mining frequent trees in a forest. In KDD, 2002
    134
  67. B Awerbuch, D Holmer, C Nita-Rotaru, H Rubens.
    An on-demand secure routing protocol resilient to byzantine failures. In ACM WiSe, 2002
    134
  68. Steven Osman, Dinesh Subhraveti, Gong Su, Jason Nieh.
    The Design and Implementation of Zap: A System for Migrating Computing Environments. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI, 2002
    133
  69. B Yang, H Garcia-Molina.
    Improving Search in Peer-to-Peer Networks. Proc. 22nd Int’l Conf. Distributed Computing Systems (ICDCS ’05, 2002
    133
  70. P-N TAN, V KUMAR, J SRIVASTAVA.
    Selecting the right interestingness measure for association patterns. In Proceedings of the Eighth International Conference on Knowledge Discovery and Data Mining, 2002
    133
  71. E D Dolan, J J Moré.
    Benchmarking optimization software with performance profiles. Math. Programming, 2002
    133
  72. Gary Charness, Matthew Rabin.
    Understanding Social Preferences with Simple Tests. Quarterly Journal of Economics, 2002
    132
  73. Ian Clarke, Scott G Miller, Theodore W Hong, Oskar Sandberg, Brandon Wiley.
    Protecting free expression online with freenet. IEEE Internet Computing, January/February, 2002
    132
  74. B Yang, H Garcia-Molina.
    Efficient Search in Peer-to-Peer Networks. In Proceedings of the 22nd International Conference on. Distributed Computing Systems, 2002
    131
  75. M Vlachos, G Kollio, D Gunopulos.
    Discovering Similar Multidimensional Trajectories. 18th IEEE Int. Conf. on Data Engineering (ICDE, 2002
    131
  76. H Pasula, B Marthi, B Milch, S Russell, I Shpitser.
    Identity uncertainty and citation matching. In NIPS, 2002
    130
  77. B Zhang, S Jamin, L Zhang.
    Host Multicast: A Framework for Delivering Multicast To End Users. In Proc. of IEEE INFOCOM, 2002
    130
  78. M Richardson, P Domingos.
    Mining knowledge-sharing sites for viral marketing. In 8th ACM SIGKDD, 2002
    130
  79. D Rubenstein, J Kurose, D Towsley.
    Detecting shared congestion of flows via end-to-end measurement. IEEE/ACM ToN, 2002
    130
  80. S Capkuny, L Buttyan, J-P Hubaux.
    Self-organized public-key management for mobile ad hoc networks. 2002
    130
  81. K Crary, S Weirich, G Morrisett.
    Intensional polymorphism in type erasure semantics. Journal of Functional Programming, 2002
    130
  82. E ESKIN, A ARNOLD, M PRERAU, L PORTNOY, S STOLFO.
    A geometric framework for unsupervised anomaly detection. In Proceedings of the Conference on Applications of Data Mining in Computer Security. Kluwer Academics, 2002
    129
  83. Tim Sheard, Simon Peyton Jones.
    Template meta-programming for haskell. In Haskell ’02: Proceedings of the 2002 ACM SIGPLAN workshop on Haskell, 2002
    129
  84. R I Kondor, J D Lafferty.
    Diffusion kernels on graphs and other discrete input spaces. In ICML ’02: Proceedings of the Nineteenth International Conference on Machine Learning, 2002
    129
  85. A Tanay, R Sharan, R Shamir.
    Discovering statistically significant biclusters in gene expression data. IJCSIT) International Journal of Computer Science and Information Technologies, 2002
    129
  86. M S Bartlett, J R Movellan, T J Sejnowski.
    Face recognition by independent component analysis. IEEE Transactions on Neural Networks, 2002
    128
  87. C Lutz.
    Description Logics with Concrete Domains-A Survey. In: Advances in Modal Logic, King’s College Publications, 2002
    128
  88. Yunyue Zhu, Dennis.
    Shasha; StatStream: Statistical Monitoring of Thousands of Data Streams. in Real Time; Int'l Conf. on Very Large Data Bases, 2002
    128
  89. A Czumaj, B Vocking.
    Tight bounds for worst-case equilibria. In SODA, 2002
    128
  90. C U Saraydar, N B Mandayam, D J.
    Goodman: “Efficient power control via pricing in wireless data networks. IEEE Trans. Communications, 2002
    128
  91. J A Jones, M J Harrold, J Stasko.
    Visualization of Test Information to Assist Fault Localization. Proc. 24th Int’l Conf. Software Eng, 2002
    127
  92. J N Liebeherr, M Nahas, W Si.
    Application-layer multicasting with Delaunay triangulation overlays. IEEE Journal on Selected Areas in Communications, 2002
    127