Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. D J Abadi, Y Ahmad, M Balazinska, U Çetintemel, M Cherniack, J-H Hwang, W Lindner, A S Maskey, A Rasin, E Ryvkina, N Tatbul, Y Xing, S Zdonik.
    The Design of the Borealis Stream Processing Engine. In CIDR, 2005
    207
  2. R Pike, S Dorward, R Griesemer, S Quinlan.
    Interpreting the data: Parallel analysis with sawzall. Scientific Programming, 2005
    206
  3. M M K Martin, D J Sorin, B M Beckmann, M R Marty, M Xu, A R Alameldeen, K E Moore, M D Hill, D A Wood.
    Multifacet’s general executiondriven multiprocessor simulator (GEMS) toolset. Computer Architecture News, 2005
    206
  4. M Ehrgott.
    Multicriteria Optimization. 2005
    204
  5. A Berger, N Miller, R Rajan, J Stein, M Petersen.
    Does Function Follow Organizational Form? Evidence From the Lending Practices of Large and Small Banks. Journal of Financial Economics, 2005
    203
  6. G Tolle, J Polastre, R Szewczyk, D Culler, N Turner, K Tu, S Burgess, T Dawson, P Buonadonna, D Gay, W Hong.
    A macroscope in the redwoods. In SenSys ’05: Proceedings of the 3rd international, 2005
    201
  7. E K Lua, J Crowcroft, M Pias, R Sharma, S Lim.
    A Survey and Comparison of Peer-to-Peer Overlay Networks Schemes. IEEE Communications Surveys and Tutorials, 2005
    201
  8. D Metzler, W B Croft.
    A Markov random field model for term dependencies. In Proc. 28th Ann. Int. ACM SIGIR Conf. on Research and Development in Information Retrieval, 2005
    200
  9. M Sharif, B Hassibi.
    On the Capacity of MIMO Broadcast Channel with Partial Side Information. IEEE Trans. on Inform. Theory, 2005
    199
  10. A W Moore, D Zuev.
    Internet Traffic Classification Using Bayesian Analysis Techniques. in SIGMETRIC05, 2005
    198
  11. G Bekaert, C H Harvey, C Lundblad.
    Does financial liberalization spur growth. Journal of Financial Economics, 2005
    198
  12. M Benzi, G H Golub, J Liesen.
    Numerical solution of saddle point problems. Acta Numerica, 2005
    198
  13. R Rogerson, R Shimer, R Wright.
    Search-Theoretic Models of the Labor Market: A Survey. Journal of Economic Literature, 2005
    197
  14. M Jelasity, A Montresor, Babaoglu.
    O.: Gossip-based aggregation in large dynamic networks. ACM Transactions on Computer Systems, 2005
    196
  15. P Hui, A Chaintreau, J Scott, R Gass, J Crowcroft, C Diot.
    Pocket switched networks and human mobility in conference environments. in Proceedings of the ACM SIGCOMM Workshop on Delay-Tolerant Networking (WDTN’05, 2005
    196
  16. X Wang, Y L Yin, H Yu.
    Finding Collisions in the Full SHA-1. In Advances in Cryptology – CRYPTO 2005, LNCS, 2005
    195
  17. T Roughgarden.
    Selfish Routing and the Price of Anarchy. 2005
    194
  18. Zoltán Gyöngyi, Hector Garcia-Molina.
    Web spam taxonomy. In First International Workshop on Adversarial Information Retrieval on the Web, 2005
    194
  19. Filip Radlinski, Thorsten Joachims.
    Query chains: learning to rank from implicit feedback. In KDD, 2005
    193
  20. B Leibe, E Seemann, B Schiele.
    Pedestrian detection in crowded scenes. In CVPR, 2005
    193
  21. M Raya, J P.
    Hubaux, “The Security of Vehicular Ad Hoc Networks. Proc. ACM SASN, 2005
    192
  22. F Jurie, B Triggs.
    Creating efficient codebooks for visual recognition. Proc. ICCV, 2005
    192
  23. S Rhea, B Godfrey, B Karp, J Kubiatowicz, S Ratnasamy, S Shenker, I Stoica, H Yu.
    OpenDHT: a public DHT service and its uses. In SIGCOMM ’05: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, 2005
    191
  24. Yasushi Saito, Marc Shapiro.
    Optimistic replication. ACM Comput. Surv, 2005
    191
  25. A Høst-Madsen, J Zhang.
    Capacity bounds and power allocation for wireless relay channels. IEEE Transactions on Information Theory, 2005
    190
  26. N H Vaidya, A Dugar, S Gupta, P Bahl.
    Distributed fair scheduling in a wireless LAN. IEEE Transactions on Mobile Computing, 2005
    189
  27. Abhijit Banerjee, Shawn Cole, Esther Duflo, Leigh Linden.
    Remedying Education: Evidence from Two Randomized Experiments. in India.” NBER Working Paper no, 2005
    186
  28. C-N Ziegler, S M McNee, J A Konstan, G Lausen.
    Improving recommendation lists through topic diversification. In WWW, 2005
    184
  29. G Gereffi, J Humphrey, T Sturgeon.
    The Governance of Global Value Chains. Review of International Political Economy, 2005
    184
  30. H Do, S G Elbaum, G Rothermel.
    Supporting controlled experimentation with testing techniques: An infrastructure and its potential impact. Empirical Software Engineering: An International Journal, 2005
    182
  31. D Anguelov, P Srinivasan, D Koller, S Thrun, J Rodgers, J Davis.
    SCAPE: Shape completion and animation of people. in Proceedings of the 32nd International Conference on Computer Graphics and Interactive Techniques (SIGGRAPH, 2005
    182
  32. M S FLOATER, K HORMANN.
    Surface parameterization: a tutorial and survey. In Advances in, 2005
    180
  33. B T Loo, T Condie, J M Hellerstein, P Maniatis, T Roscoe, I Stoica.
    Implementing declarative overlays. In SOSP, 2005
    180
  34. D Hoiem, A A Efros, M Hebert.
    Geometric context from a single image. In ICCV, 2005
    180
  35. D Boneh, X Boyen, E Goh.
    Hierarchical Identity Based Encryption with Constant Size Ciphertext. Proc. Ann. Int’l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT, 2005
    179
  36. B Liu, M Hu, J Cheng.
    Opinion observer: Analyzing and comparing opinions on the web. In Proceedings of the 14th international world wide web conference (WWW-2005, 2005
    177
  37. B Taskar, V Chatalbashev, D Koller, C Guestrin.
    Learning structured prediction models: A large margin approach. In Proceedings of the International Conference on Machine Learning, 2005
    176
  38. A Sahai, B Waters.
    Fuzzy identity-based encryption. In Eurocrypt, 2005
    176
  39. K Q Weinberger, L K Saul.
    Unsupervised learning of image manifolds by semidefinite programming. Laboratory, College of Computer Science, Sichuan University, 2005
    176
  40. T Dohmen, A Falk, D Huffman, U Sunde, J Schupp, G G Wagner.
    Individual Risk Attitudes: New Evidence from a Large, Representative, Experimentally-Validated Survey. IZA Discussion Paper, 2005
    175
  41. Z Tu, X Chen, A Yuille, S Zhu.
    Image parsing: unifying segmentation, detection and recognition. 2005
    174
  42. D Calvanese, G De Giacomo, D Lembo, M Lenzerini, R Rosati.
    Dllite: Tractable description logics for ontologies. In Proc. of AAAI, 2005
    172
  43. M Franklin, A Halevy, D Maier.
    From databases to dataspaces: a new abstraction for information management. SIGMOD Rec, 2005
    172
  44. S P Boyd, A Ghosh, B Prabhakar, Shah.
    D.: Gossip algorithms: design, analysis and applications. In: Proceedings of the IEEE Conference on Computer Communications (INFOCOM, 2005
    168
  45. H Cleve, A Zeller.
    Locating causes of program failures. 27th International Conference on Software Engineering, 2005
    167
  46. Jia Yu, Rajkumar Buyya.
    A Taxonomy of Workflow Management Systems for Grid Computing. Draft) Proceedings of the 6th International Workshop on Middleware for Grid Computing (MGC'08) held at the ACM/IFIP/USENIX 9th International Middleware Conference, 2005
    167
  47. A McCallum, A Corrada-Emmanuel, X Wang.
    Topic and role discovery in social networks. In 19th Joint Conference on Artificial Intelligence, 2005
    167
  48. Nir Ailon, Moses Charikar, Alantha Newman.
    Aggregating inconsistent information: ranking and clustering. In STOC, 2005
    166
  49. A Blum, C Dwork, F McSherry, K Nissim.
    Practical privacy: the SuLQ framework. In PODS, 2005
    166
  50. R DHAMIJA, J D TYGAR.
    The battle against phishing: Dynamic security skins. In ACM Symposium on Usable Security and Privacy (SOUPS ’05, 2005
    165
  51. M J Neely, E Modiano, C Li.
    Fairness and optimal stochastic control for heterogeneous networks. IEEE Infocom, 2005
    165
  52. A Gulli, Signorini.
    A.: The indexable web is more than 11.5 billion pages. In: International World Wide Web Conference, 2005
    165
  53. S Voulgaris, D Gavidia, M van Steen.
    CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays. Journal of Network and Systems Management, 2005
    164
  54. X Yang, D Wetherall, T Anderson.
    A DoS-Limiting Network Architecture. In Proc. of SIGCOMM, 2005
    163
  55. S T King, G W Dunlap, P M Chen.
    Debugging operating systems with time-traveling virtual machines. In Proceedings of the annual conference on USENIX Annual Technical Conference, ATEC ’05, 2005
    163
  56. J Winn, N Jojic.
    Locus: Learning object classes with unsupervised segmentation. In IEEE International Conference on Computer Vision, 2005
    163
  57. M Wainwright, T Jaakkola, A Willsky.
    A new class of upper bounds on the log partition function. IEEE Transactions on Information Theory, 2005
    163
  58. B M Hochwald, C B Peel, A L Swindlehurst.
    A vectorperturbation technique for near-capacity multiantenna multiuser communication-Part II: Perturbation. IEEE Transactions on Communications, 2005
    162
  59. W Xu, W Trappe, Y Zhang, T Wood.
    The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international, 2005
    162
  60. E Cooke, F Jahanian, D McPherson.
    The Zombie roundup: understanding, detecting, and disrupting botnets. In SRUTI, 2005
    161
  61. J M McCune, A Reiter Perring, K &M.
    Seeing-is-believing: Using camera phones for human-verifiable authentication. Security & Privacy IEEE Symposium, 2005
    161
  62. Y Shavitt, E Shir.
    DIMES: Let the Internet measure itself. SIGCOMM Comput. Commun. Rev, 2005
    161
  63. N Patwari, J N Ash, S Kyperountas, A O Hero R L Moses, N S.
    Correal: “Locating the nodes: cooperative localization in wireless sensor networks. IEEE Signal Processing Magazine, 2005
    161
  64. C B Do, M S Mahabhashyam, M Brudno, S Batzoglou.
    ProbCons: Probabilistic consistency-based multiple sequence alignment. Genome Res, 2005
    161
  65. S Banerjee, A Lavie.
    METEOR: An Automatic Metric for MT Evaluation with Improved Correlation with Human Judgments. In Proceedings of Workshop on Intrinsic and Extrinsic Evaluation Measures for MT and/or Summarization at the 43th Annual Meeting of the Association of Computational Linguistics (ACL-2005, 2005
    161
  66. Dan Boneh, Eu-Jin Goh, Kobbi Nissim.
    Evaluating 2-DNF formulas on ciphertexts. In Theory of Cryptography, 2005
    160
  67. C A Micchelli, M Pontil, T Evgeniou.
    Learning multiple tasks with kernel methods. 2005
    160
  68. Jason D Williams, Pascal Poupart, Steve Young.
    Partially observable markov decision processes with continuous observations for dialogue management. in Proceedings of the 6th SigDial Workshop on Discourse and Dialogue, 2005
    159
  69. Steven J Murdoch, George Danezis.
    Low-cost traffic analysis of Tor. In Proceedings of the 2005 IEEE Symposium on Security and Privacy. IEEE CS, 2005
    159
  70. L Danon, A Díaz-Guilera, J Duch, A Arenas.
    Comparing community structure identification. Journal of Statistical Mechanics, 2005
    159
  71. A Nguyen-tuong, S Guarnieri, D Greene, J Shirley, D Evans.
    Automatically hardening web applications using precise tainting. in 20th IFIP International Information Security Conference, 2005
    159
  72. A LaMarca, Y Chawathe, S Consolvo, J Hightower, I Smith, J Scott, T Sohn, J Howard, J Hughes, F Potter, J Tabert, P Powledge, G Borriello, B Schilit.
    Place lab: Device positioning using radio beacons in the wild. in Proceedings of the 3rd International Conference on Pervasive Computing (Pervasive, 2005
    158
  73. A G Ramm.
    Inverse problems. 2005
    157
  74. Jeremy J Carroll, Christian Bizer, Pat Hayes, Patrick Stickler.
    Named Graphs, Provenance and Trust. In Proceedings of the 14th International World Wide Web Conference (WWW2005, 2005
    157
  75. Cormac Flanagan, Patrice Godefroid.
    Dynamic partial-order reduction for model checking software. POPL, 2005
    157
  76. Z Fu, H Luo, P Zerfos, S Lu, L Zhang, M Gerla.
    The Impact of Multihop Wireless Channel on TCP Performance. IEEE Transactions on Mobile Computing, 2005
    157
  77. T Karagiannis, K Papagiannaki, M Faloutsos.
    BLINC: multilevel traffic classification in the dark. In Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2005
    156
  78. Sonja Lyubomirsky, Laura King, Ed Diener.
    The Benefits of Frequent Positive Affect: Does Happiness Lead to Success. Psychological Bulletin, 2005
    156
  79. Liang Huang, David Chiang.
    Better k-best parsing. In Proc. 9th Int. Workshop on Parsing Technologies, 2005
    156
  80. Ben S Bernanke, Kenneth N Kuttner.
    What Explains the Stock Markets Reaction to Federal Reserve Policy. Journal of Finance, 2005
    155
  81. M CHRISTODORESCU, S JHA, S A SESHIA, D SONG, R E BRYANT.
    Semantics-aware malware detection. In Proceedings of the 2005 IEEE Symposium on Security and Privacy (Oakland 2005, 2005
    154
  82. J Aldrich.
    Open modules: Modular reasoning about advice. In 19th ECOOP, 2005
    154
  83. E B Sudderth, A Torralba, W T Freeman, A S Willsky.
    Learning hierarchical models of scenes, objects and parts. In International Conference on Computer Vision (ICCV 2005, 2005
    153
  84. N Feamster, H Balakrishnan.
    Detecting BGP Configuration Faults with Static Analysis. In Proc. 2nd Symposium on Networked Systems Design and Implementation (NSDI, 2005
    152
  85. J Cocco, F Gomes, P Maenhout.
    Consumption and Portfolio Choice over the Life-Cycle. Review of Financial Studies, 2005
    152
  86. J A Machado, J Mata.
    Counterfactual Decomposition of Changes in Wage Distributions using Quantile Regression. Journal of Applied Econometrics, 2005
    152
  87. S Chen, J Xu, E C Sezer, P Gauriar, R K Iyer.
    Non-ControlData Attacks Are Realistic Threats. In Proceedings of the USENIX Security Symposium, 2005
    152