Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. E Cooke, F Jahanian, D McPherson.
    The zombie roundup: Understanding, detecting, and disrupting botnets. In SRUTI 2005, 2005
    108
  2. V Pai, K Kumar, K Tamilmani, V Sambamurthy, A E Mohr.
    Chainsaw: Eliminating trees from overlay multicast. In IPTPS, 2005
    108
  3. B Leibe, E Seemann, B Schiele.
    Pedestrian detection in crowded scenes. Proc. of the International Conference on Computer Vision and Pattern Recognition (CVPR, 2005
    108
  4. Franz Baader, Ian Horrocks, Ulrike Sattler.
    Description Logics as Ontology Languages for the Semantic Web. Mechanizing Mathematical Reasoning: Essays in Honor of Jörg Siekmann on the Occasion of His 60th Birthday, number 2605 in Lecture Notes in Artificial Intelligence, 2005
    105
  5. S Boyd, A Ghosh, B Prabhakar.
    Shah D.: Gossip Algorithms: Design, Analysis, and Applications. In: Proceedings of IEEE International Conference on Computer Communication (Infocom05, 2005
    105
  6. T Wilson, J Wiebe, P Hoffmann.
    Recognizing contextual polarity in phrase-level sentiment analysis. Proceedings of the Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, 2005
    105
  7. B E Aydemir, A Bohannon, M Fairbairn, J N Foster, B C Pierce, P Sewell, D Vytiniotis, G Washburn, S Weirich, Zdancewic.
    S.: Mechanized metatheory for the masses: The PoplMark challenge. Theorem Proving in Higher Order Logics: 18th International Conference, TPHOLs 2005. Volume 3603 of Lecture Notes in Computer Science, 2005
    104
  8. D S Batory.
    Feature models, grammars, and propositional formulas. In SPLC, volume 3714 of LNCS, 2005
    104
  9. M Zhang, K Asanovic.
    Victim replication: Maximizing capacity while hiding wire delay in tiled chip multiprocessors. in In Proceedings of the 32nd Annual International Symposium on Computer Architecture, 2005
    104
  10. R Fonseca, S Ratnasamy, D Culler, S Shenker, I Stoica.
    Beacon vector routing: Scalable point-to-point routing in wireless sensornets. In In NSDI, 2005
    103
  11. A McCallum, A Corrada-Emmanuel, X Wang.
    Topic and role discovery in social networks. In Proceedings of the 19th international joint conference on Artificial intelligence, 2005
    103
  12. T Griffiths, Z Ghahramani.
    Infinite latent feature models and the Indian buffet process. Advances in Neural Information Processing Systems, 2005
    103
  13. Y Zhao, G Karypis, U Fayyad.
    Hierarchical clustering algorithms for document datasets. Data Mining and Knowledge Discovery, 2005
    103
  14. B Wong, A Slivkins, E G Sirer.
    Meridian: A lightweight network location service without virtual coordinates. in Proc. ACM SIGCOMM, 2005
    102
  15. D Hoiem, A Efros, M Hebert.
    Putting objects in perspective. In CVPR, 2005
    102
  16. D Anguelov, P Srinivasan, D Koller, S Thrun, J Rodgers, J Davis.
    Scape: shape completion and animation of people. ACM Trans. Graph, 2005
    102
  17. M Kodialam, T Nandagopal.
    Characterizing the capacity region in multi-radio multi-channel wireless mesh networks. In Proc. of ACM MobiCom, 2005
    102
  18. M Wainwright, T Jaakkola, A Willsky.
    A new class of upper bounds on the log partition function. IEEE Trans. Info. Theory, 2005
    102
  19. J Polastre, J Hui, P Levis, J Zhao, D Culler, S Shenker, I Stoica.
    A unifying link abstraction for wireless sensor networks. In SenSys ’05: Proceedings of the 3rd international conference on Embedded networked sensor systems, 2005
    101
  20. E Sudderth, A Torralba, W T Freeman, W Willsky.
    Learning hierarchical models of scenes, objects, and parts. In IEEE Intl. Conf. on Computer Vision, 2005
    101
  21. M Franklin, A Halevy, D Maier.
    From databases to dataspaces: a new abstraction for information management. ACM Sigmod Record, 2005
    101
  22. Dan Boneh, Xavier Boyen, Eu-Jin Goh.
    Hierarchical Identity Based Encryption with Constant Size Ciphertext. In Proc. of Advances in Cryptology - EUROCRYPT 2005, 2005
    100
  23. J M McCune, A Perrig, M K Reiter.
    Seeing-isbelieving: Using camera phones for human-verifiable authentication. In Proceedings of the IEEE Symposium on Security and Privacy, 2005
    100
  24. T Roughgarden.
    Selfish routing and the price of anarchy. 2005
    100
  25. M T J Spaan, N Vlassis.
    Perseus: Randomized point-based value iteration for POMDPs. Journal of Artificial Intelligence Research, 2005
    100
  26. C G M Snoek, M Worring.
    Multimodal video indexing: A review of the stateof-the-art. Multimedia Tools and Applications, 2005
    100
  27. D Hoiem, A Efros, M Hebert.
    Geometric context from a single image. In IEEE Intl. Conf. on Computer Vision, 2005
    100
  28. Matthew J Parkinson, Gavin M Bierman.
    Separation logic and abstraction. In POPL, 2005
    100
  29. S Chen, J Xu, E C Sezer, P Gauriar, R K Iyer.
    Non-control-data attacks are realistic threats. In 14 th USENIX Security Symposium, 2005
    99
  30. A LaMarca, Y Chawathe, S Consolvo, J Hightower, I Smith, J Scott, T Sohn, J Howard, J Hughes, F Potter, J Tabert, P Powledge, G Botriello, Schilit.
    B.: Place lab: Device positioning using radio beacons in the wild. In: Proceedings of the third International Conference on Pervasive Compiting Pervasive, 2005
    97
  31. I Horrocks, U Sattler.
    A Tableaux Decision Procedure for SHOIQ. In Proc. IJCAI 2005, 2005
    97
  32. Chris Quirk, Arul Menezes, Colin Cherry.
    Dependency treelet translation: Syntactically informed phrasal smt. In Proceedings of ACL 2005, 2005
    97
  33. C Bizer, J J Carroll, P Hayes, P.
    Stickler.Named Graphs, Provenance and Trust. Proceedings of the 14th international conference on World Wide Web, 2005
    97
  34. P Cimiano, J Völker.
    Text2Onto - a framework for ontology learning and data-driven change discovery. In Proc. 10th Int. Conf. on Applications of Natural Language to Information Systems, 2005
    97
  35. P Dutta, M Grimmer, A Arora, S Bibyk, D Culler.
    Design of a wireless sensor network platform for detecting rare, random, and ephemeral events. In Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN), Special Track on Platform Tools and Design Methods for Networked Embedded Sensors, 2005
    97
  36. T Karagiannis, K Papagiannaki, M Faloutsos.
    BLINC: multilevel traffic classification in the dark. SIGCOMM Comput. Commun. Rev, 2005
    96
  37. X Carreras, L Màrquez.
    Introduction to the CoNLL-2005 shared task: Semantic role labeling. In Proceedings of the Ninth Conference on Computational Natural Language Learning (CoNLL-2005, 2005
    95
  38. K Xu, Z-L Zhang, S Bhattacharyya.
    Profiling Internet Backbone Traffic: Behavior Models and Applications. In ACM Special Interest group on Data Communication, 2005
    95
  39. J H Andrews, L C Briand, Y Labiche.
    Is Mutation an Appropriate Tool for Testing Experiments. Proceedings of the 27th International Conference on Software Engineering (ICSE, 2005
    95
  40. M Benzi, G H Golub, J Liesen.
    Numerical solution of saddle point problems. Acta Numer, 2005
    95
  41. L Huang, Chiang.
    D.: Better k-best parsing. In: Proceedings of the 9th International Workshop on Parsing Technologies (IWPT, 2005
    94
  42. R G Sargent.
    Verification and validation of simulation models. In Proc. of the 37th conference on winter simulation, 2005
    94
  43. K Sundaresan, V Anantharaman, H-Y Hsieh, R Sivakumar.
    ATP: A Reliable Transport Protocol for Ad Hoc Networks. IEEE Transactions on Mobile Computing, 2005
    93
  44. A Quattoni, M Collins, T Darrel.
    Conditional random fields for object recognition. In NIPS, 2005
    93
  45. P Hui, A Chaintreau, J Scott, R Gass, J Crowcroft, C Diot.
    Pocket switched networks and human mobility in conference environments. in Proceedings of ACM SIGCOMM workshop on Delay Tolerant Networking (WDTN, 2005
    93
  46. A Kalai, S Vempala.
    Efficient algorithms for online decision problems. J. Comput. Syst. Sci, 2005
    93
  47. Virendra J Marathe, William N Scherer, Michael L Scott.
    Adaptive software transactional memory. In Proc. of the 2005 International Symposium on Distributed Computing, 2005
    93
  48. B C M Fung, K Wang, P S Yu.
    Top-down specialization for information and privacy preservation. In Proc. of the 21st IEEE International Conference on Data Engineering (ICDE 2005, 2005
    93
  49. M Christodorescu, S Jha, S A Seshia, D Song, R E Bryant.
    Semantics-aware malware detection. In IEEE Symposium on Security and Privacy (S&P ’05, 2005
    92
  50. J Madhavan, P Bernstein, A Doan, A Halevy.
    Corpus-based schema matching. In Proceedings of ICDE, 2005
    92
  51. V Benjamin Livshits, Thomas Zimmermann.
    Dynamine: Finding common error patterns by mining software revision histories. In Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC/FSE, 2005
    91
  52. S Kandula, D Katabi, M Jacob, A Berger.
    Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds. In Proceedings of the 2nd USENIX Symposium on Networked Systems Design & Implementation (NSDI’05, 2005
    91
  53. J Sivic, B C Russell, A A Efros, A Zisserman, W T Freeman.
    Discovering object categories in image collections. 2005
    91
  54. M Püschel, J M F Moura, J Johnson, D Padua, M Veloso, B Singer, J Xiong, F Franchetti, A Gacic, Y Voronenko, K Chen, R W Johnson, N Rizzolo.
    SPIRAL: Code generation for DSP transforms. Proc. IEEE, 2005
    91
  55. Y Jin, J Branke.
    Evolutionary optimization in uncertain environments: a survey. IEEE Trans. Evol. Comput, 2005
    91
  56. C Allan, P Avgustinov, A S Christensen, L Hendren, S Kuzins, O Lhoták, O de Moor, D Sereni, G Sittampalam, J Tibble.
    Adding trace matching with free variables to AspectJ. In ACM Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA, 2005
    91
  57. G Christodoulou, E Koutsoupias.
    The price of anarchy of finite congestion games. In STOC, 2005
    90
  58. U Straccia.
    A fuzzy description logic for the semantic web. In Capturing Intelligence: Fuzzy Logic and the Semantic Web, 2005
    90
  59. E L Lloyd, R Liu, M V Marathe, R Ramanathan, S S Ravi.
    BAlgorithmic aspects of topology control problems for ad hoc networks,[ Mobile Netw. Appl, 2005
    90
  60. Andrés Bruhn, Joachim Weickert, Christoph Schnörr.
    Lucas/kanade meets horn/schunck: combining local and global optic flow methods. International Journal of Computer Vision, 2005
    89
  61. A Arora, R Ramnath, E Ertin, P Sinha, S Bapat, V Naik, V Kulathumani, H Zhang, H Cao, M Sridharan, S Kumar, N Seddon, C Anderson, T Herman, N Trivedi, C Zhang, M Nesterenko, R Shah, S Kulkarni, M Arumugam, L Wang, M Gouda, Y Choi, D Culler, P Dutta, C Sharp, G Tolle, M Grimmer, B Ferriera, K Parker.
    ExScal: Elements of extreme scale wireless sensor network. In Proceedings of the International Conference on RealTime and Embedded Computing Systems and Applications (RTCSA, 2005
    89
  62. Z Zhang, H Zha.
    Principal manifolds and nonlinear dimensionality reduction via tangent space alignment. SIAM Journal on Scientific Computing, 2005
    88
  63. A Petcu, B Faltings.
    A scalable method for multiagent constraint optimization. Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, 2005
    87
  64. M C Martin, V B Livshits, M S Lam.
    Finding application errors and security flaws using PQL: a program query language. in OOPSLA, 2005
    87
  65. I McCowan, D Gatica-Perez, S Bengio, G Lathoud, M Barnard, D Zhang.
    Automatic analysis of multimodal group actions in meetings. IEEE Trans. Pattern Anal. Mach. Intell, 2005
    87
  66. O Chapelle, A Zien.
    Semi-supervised classification by low density separation. In AISTAT 2005, 2005
    87
  67. D Metzler, W B Croft.
    A Markov random field model for term dependencies. In Proc. of SIGIR, 2005
    86
  68. M J Neely, E Modiano, C-P Li.
    Fairness and optimal stochastic control for heterogeneous networks. Infocom, 2005
    86
  69. A Joshi, S King, G Dunlap, P Chen.
    Detecting past and present intrusions through vulnerability-specific predicates. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, 2005
    86
  70. C Bannard, Callison-Burch.
    C.: Paraphrasing with bilingual parallel corpora. In: 43rd Annual Meeting on Association for Computational Linguistics, 2005
    85
  71. J Winn, N Jojic.
    Locus: Learning object classes with unsupervised segmentation. In IEEE Intl. Conf. on Computer Vision, 2005
    85
  72. R Alur, P Cerny, G Gupta, P Madhusudan, W Nam, A Srivastava.
    Synthesis of Interface Specifications for Java Classes. In Proceedings of POPL’05 (32nd ACM Symposium on Principles of Programming Languages, 2005
    84
  73. M Müller, B Heidelberger, M Teschner, M Gross.
    Meshless deformations based on shape matching. ACM Trans. Graph, 2005
    84
  74. V B Livshits, M S Lam.
    Finding security vulnerabilities in java applications with static analysis. In Proceedings of the 14th conference on USENIX Security Symposium. USENIX Association, 2005
    84
  75. C Pacheco, M D Ernst.
    Eclat: Automatic generation and classification of test inputs. in 19th European Conference Object-Oriented Programming, 2005
    84
  76. A Haeberlen, A Mislove, P Druschel.
    Glacier: Highly durable, decentralized storage despite massive correlated failures. In NSDI, 2005
    83
  77. U Hustadt, B Motik, U Sattler.
    Data complexity of reasoning in very expressive description logics. In Proc. 19th International Joint Conference on Artificial Intelligence (IJCAI’05, 2005
    83
  78. B Parno, A Perrig, V Gligor.
    Distributed detection of node replication attacks in sensor networks. in Proc. IEEE Symp. Security and Privacy, 2005
    83
  79. U Lee, Z Liu, J Cho.
    Automatic identification of user goals in Web search. In Proc. of the 14th Int. Conf. on the World Wide Web, 2005
    83
  80. J Bicket.
    Bit-rate selection in wireless networks. Master’s thesis, MIT, 2005
    83
  81. E I Altman, B Brooks, A Resti, A Sironi.
    The link between default and recovery rates: theory, empirical evidence, and implications. Journal of Business, 2005
    83
  82. Y Yu, T Rodeheffer, W Chen.
    RaceTrack: efficient detection of data race conditions via adaptive tracking. In Proceedings of the 20th ACM Symposium onOperating Systems Principles (SOSP ’05, 2005
    82
  83. M Musolesi, S Hailes, C Mascolo.
    Adaptive routing for intermittently connected mobile ad hoc networks. in Proceedings of WoWMoM 2005, 2005
    82
  84. Cai-Nicolas Ziegler, Sean M McNee, Joseph A Konstan, Georg Lausen.
    Improving recommendation lists through topic diversification. In WWW ’05: Proceedings of the 14th international conference on World Wide Web, 2005
    82
  85. E Gal, S Toledo.
    Algorithms and data structures for flash memories. ACM Comput. Surv, 2005
    82
  86. Janyce Wiebe, Theresa Wilson, Claire Cardie.
    Annotating expressions of opinions and emotions in language. Language Resources and Evaluation (formerly. Computers and the Humanities), 39(2/3):164– 210. Theresa Wilson, Paul Hoffmann, Swapna Somasundaran, Jason Kessler, Janyce Wiebe, Yejin Choi, Claire Cardie, Ellen Riloff, and Siddharth Patwardhan, 2005
    82
  87. C Krugel, E Kirda, D Mutz, W Robertson, G Vigna.
    Polymorphic Worm Detection Using Structural Information of Executables. In Proceedings of the 8 th International Symposium on Recent Advances in Intrusion Detection (RAID, 2005
    82
  88. X Dong, A Halevy, J Madhavan.
    Reference reconciliation in complex information spaces. In SIGMOD, 2005
    82
  89. B Urgaonkar, G Pacifici, P Shenoy, M Spreitzer, A Tantawi.
    An Analytical Model for Multi-tier Internet Services and Its Applications. In SIGMETRICS, 2005
    82
  90. C C Aggarwal.
    On k-anonymity and the curse of dimensionality. In VLDB, 2005
    81
  91. B GEDIK, L LIU.
    Location privacy in mobile systems: A personalized anonymization model. In Proc. IEEE ICDCS, 2005
    81
  92. P Stone, R S Sutton, G Kuhlmann.
    Reinforcement learning for RoboCup-soccer keepaway. Adaptive Behavior, 2005
    81
  93. H K Zhao.
    Fast Sweeping Method for Eikonal Equations. Math. Comp, 2005
    81