Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. J Chang, G S Sohi.
    Cooperative caching for chip multiprocessors. in Proceedings of the 33rd annual international symposium on Computer Architecture, ISCA ’06, 2006
    88
  2. S Banerjee, S Lee, B Bhattacharjee, A Srinivasan.
    Resilient multicast using overlays. In IEEE/ACM Transactions on Networking, 2006
    87
  3. A AGARWAL, B TRIGGS.
    Recovering 3D human pose from monocular images. IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI, 2006
    87
  4. M Bernardine Dias, R Zlot, N Kalra, A Stentz.
    Market-based multirobot coordination: A survey and analysis. Proceedings of the IEEE, 2006
    86
  5. S Lu, J Tucek, F Qin, Y Zhou.
    Avio: Detecting atomicity violations via access interleaving invariants. In Twelfth International Conference on Architecture Support for Programming Languages and Operating Systems (ASPLOS ’06, 2006
    85
  6. A Cox, C Xia, N Fang.
    Microstereolithography: A Review. Proceeding of the 1st International Conference on Micromanufacturing, 2006
    85
  7. E Berger, B Zorn.
    Diehard: Probabilistic memory safety for unsafe languages. In ACM SIGPLAN Conference on Programming Language Design and Implementation, 2006
    85
  8. Y-M Wang, D Beck, X Jiang, R Roussev, C Verbowski, S Chen, S King.
    Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites that Exploit Browser Vulnerabilities. In Proceedings of the Symposium on Network and Distributed System Security (NDSS, 2006
    82
  9. Peter-Pike Sloan, Jesse Hall, John Hart, John Snyder.
    Clustered principal components for precomputed radiance transfer. In GH ’06: Proceedings of the 21st ACM SIGGRAPH/EUROGRAPHICS symposium on Graphics hardware, 2006
    82
  10. Alexander Budanitsky, Graeme Hirst.
    Evaluating wordnet-based measures of lexical semantic relatedness. Computational Linguists, 2006
    81
  11. M K Qureshi, Y N Patt.
    Utility-based cache partitioning: A low-overhead, high-performance, runtime mechanism to partition shared caches. In Proceedings of the International Symposium on Microarchitecture, 2006
    81
  12. J Davis, M Goadrich.
    The relationship between precision-recall and ROC curves. In Proceedings of 23rd International Conference on Machine Learning (ICML-2006, 2006
    80
  13. N L Binkert, R G Dreslinski, L R Hsu, K T Lim, A G Saidi, S K Reinhardt.
    The M5 Simulator: Modeling Networked Systems. IEEE Micro Magazine, 2006
    79
  14. P Pietzuch, J Ledlie, J Shneidman, M Roussopoulos, M Welsh, M Seltzer.
    Network-aware operator placement for stream-processing systems. In ICDE, 2006
    79
  15. P Boncz, T Grust, M van Keulen, S Manegold, J Rittinger, J Teubner.
    MonetDB/XQuery: a fast XQuery processor powered by a relational engine. In SIGMOD, 2006
    78
  16. Mark Steedman, Jason Baldridge.
    Combinatory Categorial Grammar. Encyclopedia of Language and Linguistics, 2006
    78
  17. H Lee, A Battle, R Raina, A Y Ng.
    Efcient sparse coding algorithms. In NIPS, 2006
    78
  18. C Reis, R Mahajan, M Rodrig, D Wetherall, J Zahorjan.
    Measurement-based models of delivery and interference in static wireless networks. In SIGCOMM, 2006
    78
  19. C Kemp, J Tenenbaum, T Griffiths, T Yamada, N Ueda.
    Learning systems of concepts with an infinite relational model. In Proceedings of the national conference on artificial intelligence: Vol. 21 (p. 381). Menlo Park, 2006
    78
  20. M S Lew, N Sebe, C Djeraba, R Jain.
    Content-based multimedia information retrieval: State of the art and challenges. ACM Trans. Multimedia Comput. Commun. Appl, 2006
    77
  21. S Thrun.
    The robot that won the DARPA Grand Challenge. J. of Field Robotics, 2006
    77
  22. G Păun.
    Introduction to membrane computing. Applications of Membrane Computing, 2006
    77
  23. V Lepetit, P Fua.
    Keypoint Recognition Using Randomized Trees. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2006
    76
  24. D Holten.
    Hierarchical edge bundles: Visualization of adjacency relations in hierarchical data. IEEE Transactions on Visualization and Computer Graphics, 2006
    75
  25. Cristian Estan, George Varghese, Michael E Fisk.
    Bitmap algorithms for counting active flows on high-speed links. IEEE/ACM Trans. Netw, 2006
    75
  26. H Yu, A Vahdat.
    The costs and limits of availability for replicated services. ACM Transactions on Computer Systems, 2006
    75
  27. W Ye, F Silva, J Heidemann.
    Ultra-low duty cycle mac with scheduled channel polling. In SenSys ’06: Proceedings of the 4th international conference on Embedded networked sensor systems, 2006
    74
  28. D Blei, M Jordan.
    Variational inference for Dirichlet process mixtures. Bayesian Analysis, 2006
    74
  29. E M Airoldi, D M Blei, S E Fienberg, E P Xing.
    Mixed membership stochastic block models for relational data with application to protein-protein interactions. In Proceedings of the international biometrics society annual meeting, 2006
    74
  30. K ADAMS, O AGESEN.
    A comparison of software and hardware techniques for x86 virtualization. SIGOPS Oper. Syst. Rev, 2006
    74
  31. B-G Chun, F Dabek, A Haeberlen, E Sit, H Weatherspoon, M F Kaashoek, J Kubiatowicz, Morris.
    R.: Efficient replica maintenance for distributed storage systems. In: NSDI’06: Proceedings of the 3rd conference on Networked Systems Design & Implementation, 2006
    74
  32. A Beygelzimer, S Kakade, J Langford.
    Cover trees for nearest neighbor. In ICML, 2006
    73
  33. D Chu, A Deshpande, J M Hellerstein, W Hong.
    Approximate data collection in sensor networks using probabilistic models. in Proc. of the Int. Conf. on Data Eng. (ICDE, 2006
    73
  34. F Gomez, J Schmidhuber, R Miikkulainen.
    Efficient non-linear control through neuroevolution. Proceeding of the European Conference on Machine Learning, number 4212 in LNAI, 2006
    73
  35. J Blitzer, R McDonald, F Pereira.
    Domain adaptation with structural correspondence learning. 2006
    73
  36. E J Candés, L Demanet, D L Donoho, L Ying.
    Fast discrete curvelet transforms. SIAM Multiscale Model. Simul, 2006
    72
  37. S Dobzinski, M Schapira.
    An improved approximation algorithm for combinatorial auctions with submodular bidders. In Proceedings 17th Annual ACM-SIAM Symposium on Discrete Algorithms, 2006
    72
  38. J Anvik, L Hiew, G Murphy.
    Who should fix this bug. In Proceedings of the 28th international conference on Software engineering (ICSE’06, 2006
    72
  39. M T Goodrich, M Sirivianos, J Solis, G Tsudik, E Uzun.
    Loud and clear: Human-verifiable authentication based on audio. In International Conference on Distributed Computing (ICDCS, 2006
    71
  40. C-T Chu, S K Kim, Y-A Lin, Y Yu, G R Bradski, A Y Ng, K Olukotun.
    Map-reduce for machine learning on multicore. In NIPS, 2006
    71
  41. S T King, P M Chen, Y-M Wang, C Verbowski, H J Wang, J R Lorch.
    SubVirt: Implementing Malware with Virtual Machines. In Proceedings of the IEEE Symposium on Security and Privacy, 2006
    71
  42. P Liang, A Bouchard-Côté, D Klein, Taskar.
    B.: An End-to-end Discriminative Approach to Machine Translation. In: 21st International Conference on Computational Linguistics and 44th Annual Meeting of the Association for Computational Linguistics, 2006
    71
  43. P Reynolds, C Killian, J L Wiener, J C Mogul, M A Shah, A Vahdat.
    Pip: detecting the unexpected in distributed systems. in Proceedings of USENIX NSDI, 2006
    70
  44. Muffy Calder, Stephen Gilmore, Jane Hillston.
    Modelling the influence of RKIP on the ERK signalling pathway using the stochastic process algebra PEPA. In Transactions on Computational Systems Biology VII, number 4230 in LNCS, 2006
    70
  45. T JANHUNEN, I NIEMELÄ, D SEIPEL, P SIMONS, J YOU.
    Unfolding partiality and disjunctions in stable model semantics. ACM Transactions on Computational Logic, 2006
    70
  46. M-F Balcan, A Beygelzimer, J Langford.
    Agnostic active learning. In Proceedings of the 23rd international conference on Machine learning, ICML ’06, 2006
    70
  47. Jürgen Giesl, Peter Schneider-Kamp, René Thiemann.
    Aprove 1.2: Automatic termination proofs in the dependency pair framework. In Ulrich Furbach and Natarajan Shankar, editors, Third International Joint Conference on Automated Reasoning, volume 4130 of Lecture Notes in Computer Science, 2006
    69
  48. Paul Resnick, Richard Zeckhauser, John Swanson, Kate Lockwood.
    The value of reputation on ebay: A controlled experiment. Experimental Economics, 2006
    69
  49. W Li, A McCallum.
    Pachinko allocation: DAG-structured mixture models of topic correlations. In International Conference on Machine Learning, 2006
    69
  50. L von Ahn, R Liu, M Blum.
    Peekaboom: A game for locating objects in images. In In ACM CHI, 2006
    69
  51. J M M Montiel, J Civera, A J Davison.
    Unified Inverse Depth Parametrization for Monocular SLAM. in Proc. Robotics: Science and Systems (RSS’06, 2006
    69
  52. T D LaToza, G Venolia, R DeLine.
    Maintaining mental models: a study of developer work habits. International Conference on Software Engineering (ICSE, 2006
    68
  53. M J Freedman, K Lakshminarayanan, D Mazières.
    OASIS: Anycast for any service. in Proc. USENIX NSDI, 2006
    68
  54. J Camp, J Robinson, C Steger, E Knightly.
    Measurement Driven Deployment of a Two-Tier Urban. Mesh Access Network, Proc. ACM MobiSys, 2006
    68
  55. Peter Müller, Arnd Poetzsch-Heffter, Gary T Leavens.
    Modular invariants for layered object structures. Science of Computer Programming, 2006
    68
  56. Eduard Hovy, Mitchell Marcus, Martha Palmer, Lance Ramshaw, Ralph Weischedel.
    OntoNotes: the 90% solution. In Proceedings of the Human Language Technology Conference of the NAACL (HLT-NAACL, 2006
    67
  57. A Opelt, A Pinz, A Zisserman.
    A boundary-fragment-model for object detection. In ECCV, 2006
    67
  58. S Schaffert.
    IkeWiki: A Semantic Wiki for Collaborative Knowledge Management. 1st International Workshop on Semantic Technologies in Collaborative Applications STICA 06, 2006
    67
  59. P Pratikakis, J S Foster, M Hicks.
    LOCKSMITH: context-sensitive correlation analysis for race detection. In ACM SIGPLAN conference on Programming language design and implementation (PLDI, 2006
    67
  60. D Dantas, D Walker.
    Harmless advice. In POPL ’06, 2006
    66
  61. S H Y Wong, H Yang, S Lu, V Bharghavan.
    Robust rate adaptation for 802.11 wireless networks. In ACM MobiCom, 2006
    66
  62. X Wang, A McCallum.
    Topics over time: A non-markov continuous-time model of topical trends. In ACM SIGKDD international conference on Knowledge discovery and data mining, 2006
    66
  63. K Srinivasan, P Levis.
    RSSI is Under Appreciated. in Proceedings of the Third Workshop on Embedded Networked Sensors (EmNets, 2006
    65
  64. C Marlow, M Naaman, D Boyd, M Davis.
    Ht06, tagging paper, taxonomy, Flickr, academic article, to read. In 17th HYPERTEXT, 2006
    65
  65. M Elad.
    Why simple shrinkage is still relevant for redundant representations. IEEE Trans. Information Theory, 2006
    65
  66. H Grabner, H Bischof.
    On-line boosting and vision. In CVPR, 2006
    65
  67. P Brohan, J Kennedy, I Harris, S Tett, P Jones.
    Uncertainty estimates in regional and global observed temperature changes: a new dataset from 1850. Journal of Geophysical Research, 2006
    65
  68. Joel A Tropp.
    Just relax: Convex programming methods for subset selection and sparse approximation. IEEE Transactions on Information Theory, 2006
    65
  69. V Goyal, O Pandey, A Sahai, B Waters.
    Attribute-based encryption for fine-grained access control of encrypted data. In ACM Conference on Computer and Communications Security, 2006
    65
  70. M Caesar, M Castro, E B Nightingale, G O’Shea, A Rowstron.
    Virtual Ring Routing: Network Routing Inspired by DHTs. Proc. ACM SIGCOMM, 2006
    65
  71. L Chen, S H Low, J C Doyle, M Chiang.
    Cross-layer congestion control, routing and scheduling design in ad hoc wireless networks. in Proceedings of IEEE INFOCOM 2006, 2006
    64
  72. M Ranzato, C Poultney, S Chopra, Y Lecun.
    Efficient learning of sparse representations with an energy-based model. In Proc. Neural Information Processing Systems, 2006
    64
  73. L Itti, P F Baldi.
    Bayesian Surprise Attracts Human Attention. In: Advances in Neural Information Processing Systems, 2006
    64
  74. Ted Briscoe, John Carroll, Rebecca Watson.
    The second release of the rasp system. In Proceedings of the COLING/ACL on Interactive presentation sessions, 2006
    64
  75. Peter Buneman, Adriane Chapman, James Cheney.
    Provenance management in curated databases. In ACM SIGMOD, 2006
    64
  76. A Bosch, A Zisserman, Munoz.
    X.: Scene classification via pLSA. In: Proceedings of the European Conference on Computer Vision, 2006
    64
  77. Francis X Diebold, Canlin Li.
    Forecasting the Term Structure of Government Bond Yields. Journal of Econometrics, 2006
    64
  78. E Rosten, T Drummond.
    Machine Learning for High-Speed Corner Detection. in European Conference on Computer Vision, 2006
    64
  79. R Raina, A Y Ng, D Koller.
    Constructing informative priors using transfer learning. In ICML ’06, 2006
    64
  80. J Cowling, D Myers, B Liskov, R Rodrigues, L Shrira.
    HQ replication: A hybrid quorum protocol for byzantine fault tolerance. In Proceedings of the Seventh Symposium on Operating Systems Design and Implementations (OSDI, 2006
    63
  81. J-P Martin, L Alvisi.
    Fast Byzantine Consensus. IEEE Trans. Dependable and Secure Computing, 2006
    63
  82. P L Bartlett, M I Jordan, J D McAuliffe.
    Convexity, classification, and risk bounds. Journal of the American Statistical Association, 2006
    63
  83. I Wald, T Ize, A Kensler, A Knoll, S G Parker.
    Ray Tracing Animated Scenes using Coherent Grid Traversal. Proceedings of ACM SIGGRAPH, 2006
    63
  84. X Xiao, Y Tao.
    Personalized privacy preservation. In Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, 2006
    63
  85. S Ghilardi, C Lutz, Wolter.
    F.: Did i damage my ontology? a case for conservative extensions in description logics. In: Proceedings of the 10th International Conference on Principles of Knowledge Representation and Reasoning (KR-06, 2006
    62
  86. H Benko, A D Wilson, P Baudisch.
    Precise selection techniques for multi-touch screens. In Proceedings of the SIGCHI conference on Human Factors in computing systems, CHI ’06, 2006
    62
  87. A R Bradley, Z Manna, H B Sipma.
    What’s decidable about arrays. In VMCAI, 2006
    62
  88. Q Zhu, S Avidan, M Ye, K Cheng.
    Fast human detection using a cascade of histograms of oriented gradients. In IEEE Conf. on Computer Vision and Pattern Recognition, 2006
    62
  89. I P Gent, C Jefferson, Miguel.
    I.: Minion: A fast scalable constraint solver. In: In: Proceedings of ECAI 2006, Riva del Garda, 2006
    62
  90. G Begelman, P Keller, Smadja.
    F.: Automated tag clustering: Improving search and exploration in the tag space. In WWW Collaborative Web Tagging Workshop, 2006
    61
  91. J Heidemann, Y Wei, J Wills, A Syed, L Yuan.
    Research challenges and applications for underwater sensor networking. 2006
    61
  92. A Moshchuk, T Bragin, S Gribble, H Levy.
    A Crawler-based Study of Spyware in the Web. In Proceedings of the Symposium on Network and Distributed System Security (NDSS, 2006
    61
  93. A Halevy, M Franklin, D Maier.
    Principles of dataspace systems. In PODS, 2006
    61
  94. F Baccelli, B Blaszczyszyn, P Mühlethaler.
    An ALOHA Protocol for Multihop Mobile Wireless Networks. IEEE Transactions on Information Theory, 2006
    61