Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. Jeffrey Considine, Feifei Li, George Kollios, John Byers.
    Approximate aggregation techniques for sensor databases. In ICDE ’04: Proceedings of the 20th International Conference on Data Engineering, 2004
    260
  2. A Mathes.
    Folksonomies: Cooperative classification and communication through shared metadata. University of Illinois Urbana-Champaign, 2004
    259
  3. J Jung, V Paxson, A Berger, H Balakrishnan.
    Fast Portscan Detection Using Sequential Hypothesis Testing. In Proceedings of 2004 IEEE Symposium on Security and Privacy, 2004
    259
  4. P Dourish.
    What we talk about when we talk about context. Personal and Ubiquitous Computing. 8(1, 2004
    257
  5. M Dufwenberg, G Kirchsteiger.
    A theory of sequential reciprocity. Games and Economic Behavior, 2004
    256
  6. P Bahl, R Chandra, J Dunagan.
    SSCH: slotted seeded channel hopping for capacity improvement in IEEE 802.11 ad-hoc wireless networks. In MobiCom ’04: Proceedings of the 10th annual international conference on Mobile computing and networking, 2004
    253
  7. T Pedersen, S Patwardhan, J Michelizzi.
    WordNet::Similarity – Measuring the Relatedness of Concepts. Paper presented at the. Proceedings of Fifth Annual Meeting of the North American Chapter of the Association of Computational Linguistics (NAACL, 2004
    252
  8. J Newsome, R Shi, D Song, A Perrig.
    The sybil attack in sensor networks: Analysis and defenses. In Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN, 2004
    252
  9. M O Jackson.
    A survey of models of network formation: Stability and efficiency. Group Formation in Economics: Networks, Clubs and Coalitions, 2004
    249
  10. G E Crooks, G Hon, J M Chandonia, S E Brenner.
    WebLogo: a sequence logo generator. Genome Res, 2004
    249
  11. Michel Galley, Mark Hopkins, Kevin Knight, Daniel Marcu.
    What‟s in a translation rule. In Proc. of HLT-NAACL 2004, 2004
    245
  12. F B Viégas, M Wattenberg, D Kushal.
    Studying cooperation and conflict between authors with history flow visualizations. CHI Letters, 2004
    245
  13. V Shnayder, M Hempstead, B Chen, G Werner-Allen, M Welsh.
    Simulating the power consumption of large-scale sensor network applications. ACM SenSys, 2004
    243
  14. Sanjeev Arora, Satish Rao, Umesh Vazirani.
    Expander flows, geometric embeddings and graph partitioning. In Proceedings of ACM STOC, 2004
    241
  15. Urvoy-Keller Izal, Felber Biersack, Hamra, Garc’esErice.
    Dissecting bittorrent: Five months in a torrent’s lifetime. In PAM, 2004
    241
  16. G W Harrison, J A List.
    Field experiments. Journal of Economic Literature, 2004
    239
  17. Craig Boutilier, Ronen I Brafman, Carmel Domshlak, Holger H Hoos, David Poole.
    Cp-nets: A tool for representing and reasoning with conditional ceteris paribus preference statements. JAIR, 2004
    239
  18. J Stankovic Perrig.
    D.Wagners, “Security in wireless sensor networks. Communications of the ACM, Volume 47, Issue, 2004
    239
  19. X Sala-i-Martin, G Doppelhofer, R I Miller.
    Determinants of Long-Term Growth: A Bayesian Averaging of Classical Estimates (BACE) Approach. American Economic Review, 2004
    238
  20. D Boneh, G di Crescenzo, R Ostrovsky, G Persiano.
    Public key encryption with keyword search. Proc. Eurocrypt’04, 2004
    237
  21. A AGARWALA, M DONTCHEVA, M AGRAWALA, S DRUCKER, A COLBURN, B CURLESS, D SALESIN, M COHEN.
    Interactive digital photomontage. ACM Trans. Graph, 2004
    236
  22. J Nivre, J Hall, J Nilsson.
    Memory-based dependency parsing. In Proc. of CoNLL, 2004
    235
  23. P Hell, J Nešetřil.
    Graphs and Homomorphisms. Oxford Lecture Series in Mathematics and Its Applications 28, 2004
    235
  24. A D Keromytis, V Misra, D Rubenstein.
    SOS: Secure overlay services. Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary (LCN’05) 0-7695-2421-4/05 $20.00 © 2005 IEEE, 2004
    235
  25. D Cabric, S M Mishra, R W Brodersen.
    Implementation issues in spectrum sensing for cognitive radios. in Proc. IEEE Asilomar Conf. on Signals, Syst., Computers, 2004
    234
  26. L Hu, D Evans.
    Localisation for mobile sensor networks. In Tenth International Conference on Mobile Computing and Networking (MobiCom, 2004
    234
  27. X He, P Niyogi.
    Locality preserving projections. Advances in Neural Information Processing Systems 16, 2004
    233
  28. R Draves, J Padhye, B Zill.
    Comparison of routing metrics for static multi-hop wireless networks. in Proceedings of the 2004 conference on Applications, technologies, architectures, and, 2004
    232
  29. K Okuma, A Taleghani, N de Freitas.
    A Boosted Particle Filter: Multitarget Detection and Tracking. In the proceedings of ECCV04, 2004
    231
  30. Edmund M Clarke, Daniel Kroening, Flavio Lerda.
    A Tool for Checking ANSI-C Programs. In TACAS, 2004
    230
  31. E Giunchiglia, J Lee, V Lifschitz, N McCain, Turner.
    H.: Nonmonotonic causal theories. Arti Intelligence, 2004
    230
  32. Suman Nath, Phillip B Gibbons, Srinivasan Seshan, Zachary R Anderson.
    Synopsis diffusion for robust aggregation in sensor networks. In SenSys ’04: Proceedings of the 2nd Conference on Embedded networked sensor systems, 2004
    228
  33. Lawrence M Ausubel.
    An Efficient Ascending-Bid Auction for Multiple Objects. American Economic Review, 2004
    227
  34. T A Henzinger, R Jhala, R Majumdar, K L McMillan.
    Abstractions from proofs. In Proc. POPL, 2004
    226
  35. M Freedman, K Nissim, B Pinkas.
    Ecient private matching and set intersection. In International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 04, 2004
    224
  36. P Shilane, P Min, M Kazhdan, T Funkhouser.
    The princeton shape benchmark. IEEE International Conference on Shape Modeling and Applications, 2004
    222
  37. T Eiter, T Lukasiewicz, R Schindlauer, H Tompits.
    Combining answer set programming with description logics for the semantic web. In Proc. KR’04, 2004
    220
  38. A Arora, P Dutta, S Bapat, V Kulathumani.
    et al., “A line in the sand: A wireless sensor network for target detection, classification,and tracking. Computer Networks (Elsevier, 2004
    219
  39. G Edward Suh, J W Lee, D Zhang, S Devadas.
    Secure Program Execution via Dynamic Information Flow Tracking. In Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-XI, 2004
    218
  40. R Rifkin, A Klautau.
    In defense of one-vs-all classification. The Journal of Machine Learning Research, 2004
    218
  41. S Tatikonda, S K Mitter.
    Control under communications constraints. IEEE Trans. Autom. Control, 2004
    218
  42. K Wang, S Stolfo.
    Anomalous payload-based network intrusion detection. In Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID), Sophia Antipolis, 2004
    218
  43. E Anshelevich, A Dasgupta, J Kleinberg, É Tardos, T Wexler, T Roughgarden.
    The Price of Stability for Network Design with Fair Cost Allocation. In Proc. of the 45th IEEE Symp. on Foundations of Computer Science (FOCS ’04, 2004
    218
  44. L Xiao, S Boyd.
    Fast Linear Iterations for Distributed Averaging. System and Control Letters, 2004
    217
  45. Ran Canetti, Shai Halevi, Jonathan Katz.
    Chosen-ciphertext security from identity-based encryption. In Advances in Cryptology–Eurocrypt 2004, 2004
    216
  46. Philipp Koehn.
    Statistical significance tests for machine translation evaluation. In Proceedings of EMNLP 2004, 2004
    216
  47. M FELDMAN, K LAI, I STOICA, J CHUANG.
    Robust Incentive Techniques for Peer-to-Peer Networks. In ACM Conference on Electronic Commerce (EC'04, 2004
    216
  48. X He, R S Zemel, M A Carreira-Perpinan.
    Multiscale conditional random fields for image labeling. In Proc. IEEE CVPR, 2004
    215
  49. C Flanagan, S N Freund.
    Atomizer: a dynamic atomicity checker for multithreaded programs. In 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL, 2004
    215
  50. O Yilmaz, S Rickard.
    Blind separation of speech mixtures via time-frequency masking. IEEE Transactions on Signal Processing, 2004
    214
  51. B P Gerkey, M J Mataric.
    A formal analysis and taxonomy of task allocation in multi-robot systems. International Journal of Robotics Research, 2004
    213
  52. R Apweiler, A Bairoch, C H Wu, W C Barker, B Boeckmann, S Ferro, E Gasteiger, H Huang, R Lopez, M Magrane, M J Martin, D A Natale, C O’Donovan, N Redaschi, L S Yeh.
    UniProt: the Universal Protein knowledgebase. Nucleic Acids Res. 2004
    212
  53. F Lin, Y Zhao.
    ASSAT: Computing answer sets of a logic program by sat solvers. Artif. Intell, 2004
    212
  54. D Malan, M Welsh, M Smith.
    A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In Proceedings of IEEE Conference on Sensor and Ad Hoc Communications and Networks (SECON, 2004
    210
  55. W Yu, W Rhee, S Boyd, J M Cioffi.
    Iterative water-filling for Gaussian vector multiple-access channels. IEEE Trans. Info. Theory, 2004
    209
  56. T F Wu, C J Lin, R C Weng.
    Probability Estimates for Multi-class Classification by Pairwise Coupling. In The Journal of Machine Learning Research, 2004
    209
  57. R Szewczyk, J Polastre, A Mainwaring, D Culler.
    Lessons from a sensor network expedition. in EWSN, 2004
    209
  58. N PROVOS.
    A virtual honeypot framework. In Proceedings of the 12th USENIX Security Symposium, 2004
    209
  59. Y Lee, M Kim, J Han, Yeom KH, S Lee.
    MicroRNA genes are transcribed by RNA polymerase II. EMBO J, 2004
    209
  60. S Basu, M Bilenko, R J Mooney.
    A probabilistic framework for semi-supervised clustering. ACM KDD, 2004
    208
  61. T Elbatt, A Ephremides.
    Joint scheduling and power control for wireless ad hoc networks. IEEE Trans. on Wireless Communications, 2004
    208
  62. I Cohen, J Chase, M Goldszmidt, T Kelly, J Symons.
    Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control. In Proceedings of the Sixth USENIX Symposium in Operating Systems Design and Implementation (OSDI 2004, 2004
    207
  63. S-M Kim, E Hovy.
    Determining the sentiment of opinions. Coling, 2004
    206
  64. D Nistér, O Naroditsky, J Bergen.
    Visual odometry. in Proceedings of the IEEE International Conference on Computer Vision and Pattern Recognition, 2004
    205
  65. K Römer, F Mattern.
    The design space of wireless sensor networks. IEEE Transactions on Wireless Communications, 2004
    205
  66. W Du, J Deng, Y S Han, S Chen, P K Varshney.
    A key management scheme for wireless sensor networks using deployment knowledge. in Proc. of the IEEE INFOCOM 2004, 2004
    205
  67. W Yu, J M Cioffi.
    Sum Capacity of Gaussian Vector Broadcast Channels. IEEE Transactions on Information Theory, 2004
    203
  68. P Antràs, E Helpman.
    Global Sourcing. Journal of Political Economy, 2004
    203
  69. A Andreeva, D Howorth, S E Brenner, T J P Hubbard, C Chothia, A G Murzin.
    SCOP database in 2004: refinements integrate structure and sequence family data. Nucleic Acids Res. 2004
    201
  70. M Philipose, K P Fishkin, M Perkowitz, D J Patterson, D Hahnel, D Fox, H Kautz.
    Inferring activities from interactions with objects. IEEE Pervasive Computing: Mobile and Ubiquitous Systems, 2004
    201
  71. K Whitehouse, C Sharp, E Brewer, D Culler.
    Hood: a neighborhood abstraction for sensor networks. In Proceedings of MobiSys’04, 2004
    199
  72. J Camenisch, A Lysyanskaya.
    Signature Schemes and Anonymous Credentials from Bilinear Maps. In Advances in Cryptology - CRYPTO, 2004
    198
  73. M Bilenko, S Basu, R Mooney.
    Integrating constraints and metric learning in semi-supervised clustering. In International Conference on Machine Learning, 2004
    196
  74. Mukund Deshpande, George Karypis.
    Item-based top-n recommendation algorithms. ACM Trans. Inf. Syst, 2004
    195
  75. L Hammond, V Wong, M Chen, B D Carlstrom, J D Davis, B Hertzberg, K P Manohar.
    Transactional memory coherence and consistency. In International Symposium on Computer Architecture (ISCA, 2004
    194
  76. V Lavrenko, R Manmatha, J Jeon.
    A model for learning the semantics of pictures. in Proc. of NIPS 03, 2004
    193
  77. X Fu, T Bultan, J Su.
    Analysis of Interacting BPEL Web Services. In Proc. of WWW’04, ACM, 2004
    192
  78. R M Shiffrin, K Borner.
    Mapping knowledge domains. Proc. Natl. Acad. Sci. USA, 2004
    192
  79. Thomas Strang, Claudia Linnhoff-Popien.
    A context modeling survey. Proc. of the First International Workshop on Advanced Context Modelling, Reasoning and Management, 2004
    191
  80. Gang Zhou, Tian He, Sudha Krishnamurthy, John A Stankovic.
    Impact of radio irregularity on wireless sensor networks. In MobiSys ’04: Proceedings of the 2nd international conference on Mobile systems, applications, and services, 2004
    191
  81. D Bertsimas, M Sim.
    The Price of Robustness. Operations Research, 2004
    190
  82. Sunita Sarawagi, William W Cohen.
    Semi-Markov conditional random fields for information extraction. In Bottou L Saul LK, Weiss Y, editor, Advances in Neural Information Processing Systems 17, 2004
    190
  83. J McCarthy, P Wright.
    Technology as Experience. 2004
    189
  84. J I Hong, J A Landay.
    An architecture for privacy-sensitive ubiquitous computing. In MobiSys ’04: Proceedings of the 2nd international conference on Mobile systems, applications, and services, 2004
    189
  85. D Kotz, C Newport, R Gray, J Liu, Y Yuan, C Elliott.
    Experimental evaluation of wireless simulation assumptions. 2004
    189
  86. A Criminisi, P Perez, K Toyama.
    Region Filling and Object Removal by Exemplar-Based Image Inpainting. IEEE Transactions Image Processing, 2004
    189
  87. W Ludwig, O Strunk, R Westram, L Richter, H Meier, Y Kumar, A Buchner, T Lai, S Steppi.
    ARB: a software environment for sequence data. Jobb G., Förster W., Brettske I., Gerber S., Ginhart A.W., Gross O., Grumann S., Hermann S., Jost R., König A., Liss T., Lüßmann R., May M., Björn N., Reichel B., Strehlow R., Stamatakis A., Stuckmann N., Vilbig A., Lenke M., Ludwig T., Bode A., Schle, 2004
    189