Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. C Bettstetter, G Resta, P Santi.
    The node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Trans. Mobile Comput, 2003
    184
  2. David Oppenheimer, Archana Ganapathi, David A Patterson.
    Why do Internet services fail, and what can be done about it. Proceedings of the 4th Usenix Symposium on Internet Technologies and Systems, 2003
    183
  3. R Cheng, D V Kalashnikov, S Prabhakar.
    Evaluating probabilistic queries over imprecise data. In SIGMOD, 2003
    181
  4. S Dumais, E Cutrell, J Cadiz, G Jancke, R Sarin, D C Robbins.
    Stuff i’ve seen: a system for personal information retrieval and re-use. In Proceedings of ACM SIGIR conference on Research and development in information retrieval, 2003
    181
  5. J Pineau, G Gordon, S Thrun.
    Point-based value iteration: An anytime algorithm for POMDPs. In Proceedings of IJCAI’03, 2003
    181
  6. A Sendonaris, E Erkip, B Aazhang.
    User Cooperation Diversity Part I: System Description. IEEE Trans. on Communications, 2003
    180
  7. I S Dhillon, S Mallela, D S Modha.
    Information-theoretical co-clustering. In SIGKDD, 2003
    178
  8. S Chaki, E Clarke, A Groce, S Jha, H Veith.
    Modular verification of software components. in C. In International Conference on Software Engineering (ICSE, 2003
    178
  9. C Tang, Z Xu, S Dwarkadas.
    Peer-to-peer information retrieval using selforganizing semantic overlay networks. in: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM, 2003
    178
  10. Fabian Kuhn, Roger Wattenhofer, Yan Zhang, Aaron Zollinger.
    Geometric adhoc routing: of theory and practice. 2003
    175
  11. N Li, B N Grosof, J Feigenbaum.
    Delegation Logic: A logicbased approach to distributed authorization. ACM TISSEC, 2003
    174
  12. M Hucka, A Finney, H M Sauro, H Bolouri, J C Doyle, H Kitano, A P Arkin, B J Bornstein, D Bray, A CornishBowden.
    The systems biology markup language (SBML): a medium for representation and exchange of biochemical network models. Bioinformatics, 2003
    174
  13. S Floyd.
    HighSpeed TCP for large congestion windows. IETF Internet Draft, 2003
    174
  14. W R MARK, R S GLANVILLE, K AKELEY, M J KILGARD.
    Cg: a system for programming graphics hardware in a C-like language. ACM Transactions on Graphics, 2003
    174
  15. B Hassibi, B M Hochwald.
    How much training is needed in multiple-antenna wireless links. IEEE Trans. on Inf. Theory, 2003
    173
  16. V Ribeiro, R Riedi, R Baraniuk, J Navratil, L Cottrell.
    pathChirp: Efficient Available Bandwidth Estimation for Network Paths. Proceedings of Passive and Active Measurements (PAM) workshop, 2003
    172
  17. George Danezis, Roger Dingledine, Nick Mathewson.
    Mixminion: Design of a type III anonymous remailer protocol. In Proceedings, 2003 IEEE Symposium on Security and Privacy, 2003
    172
  18. M Bilenko, R J Mooney.
    Adaptive duplicate detection using learnable string similarity measures. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-2003, 2003
    170
  19. U Shankar N Sastry, D Wagner.
    Secure verification of location claims. In WiSe ’03: Proceedings of the 2nd ACM workshop on Wireless security, 2003
    170
  20. D Boneh, C Gentry, B Lynn, H Shacham.
    Aggregate and verifiably encrypted signatures from bilinear maps. in Proc. EUROCRYPT, ser. LNCS, 2003
    168
  21. M Balazinska, P Castro.
    Characterizing Mobility and Network Usage in a Corporate Wireless Local-Area Network. In 1st International Conference on Mobile Systems, Applications, and Services (MobiSys, 2003
    167
  22. Jia Li, James Z Wang.
    Automatic linguistic indexing of pictures by a statistical modeling approach. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003
    165
  23. K Crammer, Y Singer.
    Ultraconservative online algorithms for multiclass problems. The Journal of Machine Learning Research, 2003
    163
  24. X Wang, G Xing, Y Zhang, C Lu, R Pless, C Gill.
    Integrated coverage and connectivity configuration in wireless sensor networks. In ACM Sensys’03, 2003
    161
  25. P Reynolds, A Vahdat.
    Efficient Peer-to-Peer Keyword Searching. Proc. ACM/IFIP/USENIX Int’l Middleware Conf. (Middleware, 2003
    160
  26. Y Sankarasubramaniam.
    ESRT: event-to-sink reliable transport in wireless sensor networks. in Proc. of MobiHoc, 2003
    160
  27. K Toutanova, D Klein, C Manning, Y Singer.
    Featurerich Part-of-Speech tagging with a cyclic dependency network. in Proceedings of HLT-NAACL, 2003
    159
  28. T Funkhouser, P Min, M Kazhdan, J Chen, A Halderman, D Dobkin, D Jacobs.
    A search engine for 3D models. ACM Transactions on Graphics, 2003
    159
  29. J Strauss, D Katabi, F Kaashoek.
    A measurement study of available bandwidth estimation tools. In Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, 2003
    158
  30. S Bhatkar, D C DuVarney, R Sekar.
    Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proceedings of the 12th USENIX Security Symposium, 2003
    158
  31. P K Agarwal, L Arge, J Erickson.
    Indexing moving points. Journal of Computer and System Sciences, 2003
    158
  32. R Agrawal, A Evfimievski, R Srikant.
    Information sharing across private databases. In SIGMOD, 2003
    156
  33. A Arasu, H Garcia-Molina.
    Extracting structured data from Web pages. SIGMOD-03. 2003
    155
  34. C Olston, J Jiang, J Widom.
    Adaptive filters for continuous queries over distributed data streams. In SIGMOD Conf, 2003
    154
  35. P Bouquet, F Giunchiglia, F v Harmelen, L Serafini, H Stuckenschmidt.
    COWL: Contextualizing Ontologies. In Proceedings of the Second International Semantic Web Conference, 2003
    154
  36. R Kumar, K I Farkas, N P Jouppi, P Ranganathan, D M Tullsen.
    Single-ISA Heterogeneous Multi-core Architectures: The Potential for Processor Power Reduction. in Proceedings of the 36th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-36, 2003
    154
  37. V Rajendran, K Obraczka, J J Garcia-Luna-Aceves.
    Energy-Efficient Collision-Free Medium Access Control for Wireless Sensor Networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003
    153
  38. M Castro, P Druschel, A-M Kermarrec, A Nandi, A Rowstron, A Singh.
    SplitStream: High-Bandwidth Content Distribution in a Cooperative Environment. In Proc. of ACM SOSP, 2003
    153
  39. T Sherwood, S Sair, B Calder.
    Phase tracking and prediction. In 30th Annual International Symposium on Computer Architecture, 2003
    153
  40. Samuel T King, Peter M Chen.
    Backtracking intrusions. In Proceedings of the Symposium on Operating Systems Principles (SOSP, 2003
    153
  41. T He, J A Stankovic, C Lu, T Abdelzaher.
    SPEED: A Stateless Protocol for Real-Time Communication. in Sensor Networks, in: Proc. IEEE Int. Conf. on Distributed Computing Systems, 2003
    152
  42. T Fong, I Nourbakhsh.
    A survey of socially interactive robots. Robotics and Autonomous Systems, Special issue on Socially Interactive Robots, 2003
    152
  43. C Aggarwal, J Han, J Wang, P Yu.
    A Framework for Clustering Evolving Data Streams. Proc. 29th Int'l Conf.Very Large Data Bases (VLDB, 2003
    151
  44. R E Wunderlich, T F Wenisch, B Falsafi, J C Hoe.
    SMARTS: Accelerating Microarchitecture Simulation via Rigorous Statistical Sampling. Proc. Int’l. Symp. Computer Architecture (ISCA, 2003
    151
  45. A P Jardosh, E M Belding-Royer, K C Almeroth, S Suri.
    Toward realistic mobility models for mobile ad hoc networks. in Proceedings of ACM MOBICOM, 2003
    151
  46. A Y Halevy, Z Ives, D Suciu, I Tatarinov.
    Schema Mediation in Peer Data Management Systems. In Proceedings of the 19th International Conference on Data Engineering, 2003
    151
  47. T Joachims.
    Transductive learning via spectral graph partitioning. In Proc. of the International Conference on Machine Learning (ICML03, 2003
    150
  48. Yasemin Altun, Ioannis Tsochantaridis, Thomas Hofmann.
    Hidden Markov support vector machines. In International Conference on Machine Learning, 2003
    150
  49. F Kaashoek, D R Karger.
    Koorde: A Simple Degree-Optimal Distributed Hash Table. In Peer-to-Peer Systems II, 2003
    149
  50. N Nystrom, M R Clarkson, A C Myers.
    Polyglot: An extensible compiler framework for Java. In Compiler Construction (CC, 2003
    147
  51. K Langendoen, N Reijers.
    Distributed localization in wireless sensor networks: a quantitative comparison. Comput. Networks, 2003
    147
  52. S Kunniyur, R Srikant.
    End-to-end congestion control schemes: utility functions, random losses and ECN marks. IEEE/ACM Trans. on Networking, 2003
    147
  53. S D Kamvar, M T Schlosser, H Garcia-Molina.
    The EigenTrust Algorithm for Reputation Management. in P2P Networks”, Proceedings of the 12th International World Wide Web Conference WWW’2003, 2003
    146
  54. M Herlihy, V Luchangco, M Moir.
    Obstruction-free synchronization: Double-ended queues as an example. In Proceedings of the 23rd International Conference on Distributed Computing Systems, 2003
    145
  55. F Kuhn, R Wattenhofer, A Zollinger.
    Worst-case optimal and average-case efficient geometric ad-hoc routing. In ACM MobiHoc, 2003
    144
  56. X Yan, J Han.
    Closegraph: mining closed frequent graph patterns. In KDD, 2003
    143
  57. K L McMillan.
    Interpolation and SAT-Based Model Checking. In: CAV ’03. LNCS, 2003
    142
  58. K Czarnecki, Helsen.
    S.: Classification of model transformation approaches. In: Proceedings of the 2nd OOPSLA Workshop on Generative Techniques in the Context of the Model Driven Architecture, 2003
    142
  59. A Juels, R L Rivest, M Szydlo.
    The blocker tag: Selective blocking of RFID tags for consumer privacy. 8th ACM Conference on Computer and Communications Security, 2003
    141
  60. N Li, W H Winsborough, J C Mitchell.
    Distributed credential chain discovery in trust management. Journal of Computer Security, 2003
    141
  61. D Nau, O Ilghami, U Kuter, J W Murdock, D Wu, F Yaman.
    Shop2: An HTN planning system. Journal of Artificial Intelligence Research, 2003
    141
  62. S Khurshid, C S Pasareanu, W Visser.
    Generalized symbolic execution for model checking and testing. In Tools and Algorithms for Construction and Analysis of Systems (TACAS, 2003
    140
  63. S Bandyopahyay, E J Coyle.
    An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks. Porc. of INFOCOM, 2003
    140
  64. C Kreibich, J Crowcroft.
    Honeycomb: Creating intrusion detection signatures using honeypots. In 2nd Workshop on Hot Topics in Networks (HotNets-II, 2003
    140
  65. Z M Mao, J Rexford, J Wang, R H Katz.
    Towards an accurate AS-level traceroute tool. in Proc. ACM SIGCOMM, 2003
    139
  66. H Akkary, R Rajwar, S Srinivasan.
    Checkpoint Processing and Recovery: Towards Scalable Large Instruction Window Processors. In Proc. 36th Intl. Symp. on Microarchitecture, 2003
    139
  67. S Toumpis, A Goldsmith.
    Capacity Regions for Wireless Ad Hoc Networks. IEEE Trans. on Wireless Communications, 2003
    139
  68. S Raghavan, H Garcia-Molina.
    Representing web graphs. In ICDE, 2003
    139
  69. F M Cuenca-Acuna, C Peery, R P Martin, T D Nguyen.
    PlanetP: Using Gossiping to Build Content Addressable Peer-to-Peer Information Sharing Communities. in Twelfth IEEE International Symposium on High Performance Distributed Computing (HPDC-12, 2003
    138
  70. S Shakkottai, R Srikant, N Shroff.
    Unreliable sensor grids: Coverage, connectivity and diameter. Proc. IEEE InfoCom (InfoCom’03, 2003
    138
  71. A Fabrikant, A Luthera, E Maneva, C Papadimitriou, S Shenker.
    On a network creation game. In Proc 22nd Symp Principles of Distributed Computing (PODC’03, 2003
    138
  72. D J Love, R W H Jr, T Strohmer.
    Grassmannian beamforming for multiple-input multiple-output wireless systems. IEEE Trans. Inform. Theory, 2003
    137
  73. T Ho, R Koetter, M Medard, D Karger, M Effros.
    The Benefits of Coding over Routing in a Randomized Setting. in Proc. of IEEE International Symposium on Information Theory (ISIT, 2003
    136
  74. G S KC, A D KEROMYTIS, V PREVELAKIS.
    Countering Code-Injection Attacks With Instruction-Set Randomization. In Proceedings of the 10 th ACM Conference on Computer and Communications Security (CCS, 2003
    136
  75. P A Parrilo.
    Semidefinite programming relaxations for semialgebraic problems. Mathematical Programming B, 2003
    135
  76. John H Gennari, Mark A Musen, Ray W Fergerson, William E Grosso, Monica Crubézy, Henrik Eriksson, Natalya F Noy, Samson W Tu.
    The evolution of Protégé: an environment for knowledge-based systems development. International Journal of Human-Computer Studies, 2003
    135
  77. V Benzaken, G Castagna, A Frisch.
    CDuce: An XML-centric general-purpose language. In Proc. ICFP, 2003
    134
  78. C ESTAN, S SAVAGE, G VARGHESE.
    Automatically inferring patterns of resource consumption in network traffic. In Proceedings of SIGCOMM’03, 2003
    134
  79. Hari Balakrishnan, M Frans Kaashoek, David Karger, Robert Morris, Ion Stoica.
    Looking up data in p2p systems. Communications of the ACM, 2003
    134
  80. X He, P Niyogi.
    Locality preserving projections. in NIPS, 2003
    134
  81. V R Konda, J N Tsitsiklis.
    On actor-critic algorithms. SIAM Journal on Control and Optimization, 2003
    133
  82. Dan Klein, Christopher D Manning.
    Fast exact inference with a factored model for natural language parsing. In In Advances in Neural Information Processing Systems 15 (NIPS, 2003
    133
  83. Roberto Grossi, Ankur Gupta, Jeffrey Scott Vitter.
    High-order entropycompressed text indexes. In Proc. 14th ACM-SIAM symposium on Discrete algorithms, SODA’03, 2003
    133
  84. Ellen Riloff, Janyce Wiebe.
    Learning extraction patterns for subjective expressions. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP, 2003
    133
  85. Regina Barzilay, Lillian Lee.
    Learning to paraphrase: An unsupervised approach using multiplesequence alignment. In Proceedings of HLT/NAACL, 2003
    133
  86. A Y Halevy, Z G Ives, P Mork, I Tatarinov.
    Piazza: Data Management Infrastructure for Semantic Web Applications. In International World Wide Web Conference (WWW, 2003
    133
  87. J N Laneman, G W Wornell.
    Distributed Space-Time-Coded Protocols for Exploiting Cooperative Diversity in Wireless Networks. IEEE Transactions on Information Theory, 2003
    133