Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. Pascal Felber, Christof Fetzer, Torvald Riegel.
    Dynamic performance tuning of word-based software transactional memory. In Proceedings of the 13th ACM SIGPLAN Symposium on Principles and practice of parallel programming, PPoPP ’08, 2008
    44
  2. Kohei Honda, Nobuko Yoshida, Marco Carbone.
    Multiparty asynchronous session types. In Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, POPL ’08, 2008
    44
  3. L P, J C Heaton, N Li.
    Consumption strikes back? measuring long-run risk. Journal of Political Economy, 2008
    44
  4. J Leskovec, L Backstrom, R Kumar, A Tomkins.
    Microscopic Evolution of Social Networks. In KDD, 2008
    44
  5. M Hua, J Pei, W Zhang, X Lin.
    Ranking queries on uncertain data: A probabilistic threshold approach. In Proc. SIGMOD, 2008
    43
  6. Rajiv Gandhi, Arunesh Mishra, Srinivasan Parthasarathy.
    Minimizing broadcast latency and redundancy in ad hoc networks. IEEE/ACM Transactions on Networking, 2008
    43
  7. J Kamp, D Zuckerman.
    Deterministic extractors for bit-fixing sources and exposure-resilient cryptography. Lecture Notes in Computer Science 4965, 2008
    43
  8. C Borio, H Zhu.
    Capital regulation, risk-taking and monetary policy: a missing link. in the transmission mechanism?, Working Paper Series, No 268, Bank for International Settlements, 2008
    43
  9. B Hoh, M Gruteser, R Herring, J Ban, D Work, J-C Herrera, A Bayen, M Annavaram, Q Jacobson.
    Virtual trip lines for distributed privacy-preserving traffic monitoring. In ACM Mobisys, 2008
    42
  10. Cuenca Grau, B Horrocks, I Kazakov, Y, U Sattler.
    Modular Reuse of Ontologies: Theory and Practice. Journal of Artificial Intelligence Research, 2008
    42
  11. M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, J Malone-Lee, G Neven, P Paillier, H Shi.
    Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Journal of Cryptology, 2008
    42
  12. D Milne, I H Witten.
    Learning to link with wikipedia. In Proceeding of the 17th ACM conference on Information and knowledge management, 2008
    42
  13. L A Adamic, J Zhang, E Bakshy, M S Ackerman.
    Knowledge sharing and yahoo answers: everyone knows something. Proc.WWW2008, 2008
    42
  14. J Bengtson, K Bhargavan, C Fournet, A D Gordon, S Maffeis.
    Refinement types for secure implementations. 2008
    42
  15. K F Moore, D Grossman.
    High-level small-step operational semantics for transactions. In ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2008
    41
  16. Craig Gentry, Chris Peikert, Vinod Vaikuntanathan.
    Trapdoors for hard lattices and new cryptographic constructions. In 40th Annual ACM Symposium on Theory of Computing (STOC 2008, 2008
    41
  17. A Aiken, J S Foster, J Kodumal, Terauchi.
    T.: Checking and inferring local non-aliasing. In: PLDI. pp. 128–140 (2003) Baier, Ch., Katoen, J.P.: Principles of Model-Checking, 2008
    41
  18. Ivo Welch, Amit Goyal.
    A comprehensive look at the empirical performance of equity premium prediction. Review of Financial Studies, 2008
    41
  19. A Banerjee, D A Naumann, S Rosenberg.
    Regional logic for local reasoning about global invariants. In In European Conference on Object Oriented Programming, ECOOP, 2008
    41
  20. Ron Artstein, Massimo Poesio.
    Inter-coder agreement for computational linguistics. Comput. Linguist, 2008
    41
  21. Terry Koo, Xavier Carreras, Michael Collins.
    Simple semi-supervised dependency parsing. In Proceedings of the ACL, 2008
    41
  22. M Baltzer States», L Cappiello, R A.
    81 �«Measuring financial integration in new EU Member. 2008
    40
  23. D Balzarotti, M Cova, V Felmetsger, N Jovanovic, E Kirda, C Krügel, G Vigna.
    Saner: composing static and dynamic analysis to validate sanitization in web applications. In Proceedings of the IEEE Symposium on Security and Privacy, 2008
    40
  24. R Buyya, C Yeo, S Venugopal.
    Market-‐Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities. Proceedings of the 10th IEEE International Conference on High Peformance Computing and Communications, 2008
    40
  25. L Antova, T Jansen, C Koch, D Olteanu.
    Fast and simple relational processing of uncertain data. In ICDE, 2008
    40
  26. D Vlasic, I Baran, W Matusik, J Popović.
    Articulated mesh animation from multi-view silhouettes. ACM Trans. Graph, 2008
    40
  27. G DANEZIS, C LESNIEWSKI-LAAS, M F KAASHOEK, R ANDERSON.
    Sybil-resistant DHT routing. In European Symposium On Research In Computer Security, 2008
    40
  28. R Etkin, D Tse, H Wang.
    Gaussian interference channel capacity to within one bit. IEEE Trans. Inf. Theory, 2008
    40
  29. A Barth, C Jackson, J C Mitchell.
    Robust defenses for cross-site request forgery. In Proceedings of the 15th ACM conference on Computer and communications security, CCS ’08, 2008
    39
  30. L Xia, V Conitzer.
    Generalized scoring rules and the frequency of coalitional manipulability. In Proceeding of the ACM conference on electronic commerce 2008, 2008
    39
  31. T Ho, B Leong, R Koetter, M Medard, M Effros, D R Karger.
    Byzantine modification detection in multicast networks with random network coding. IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, 2008
    39
  32. K Sen.
    Race directed random testing of concurrent programs. In Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation (PLDI ’08, 2008
    39
  33. D McAllester, M Collins, F Pereira.
    Casefactor diagrams for structured probabilistic modeling. Journal of Computer and System Sciences, 2008
    39
  34. Dick Grune, Ceriel J H Jacobs.
    Parsing Techniques — A Practical Guide. 2008
    38
  35. A Torralba, R Fergus, Y Weiss.
    Small codes and large image databases for recognition. In CVPR, 2008
    38
  36. E Oren, R Delbru, M Catasta, R Cyganiak, H Stenzhorn, G Tummarello.
    Sindice.com: a document-oriented lookup index for open linked data. IJMSO, 2008
    38
  37. R Raghavendra, P Ranganathan, V Talwar, Z Wang, X Zhu.
    No ‘power’ struggles: coordinated multi-level power management for the datacenter. in Proceedings of the ACM the datacenter as a computer International Conference on Architectural Support for Programming Languages and Operating Systems, 2008
    38
  38. Jurgen A Doornik, Henrik Hansen.
    An omnibus test for univariate and multivariate normality. Oxford Bulletin of Economics and Statistics, 2008
    38
  39. Haitao Mi, Liang Huang, Qun Liu.
    Forestbased translation. In Proceedings of ACL: HLT, 2008
    38
  40. David A Smith, Jason Eisner.
    Dependency parsing by belief propagation. In Proceedings of the Conference on Empirical Methods in Natural Language Processing, EMNLP ’08, 2008
    38
  41. R Berinde, A C Gilbert, P Indyk, H Karloff, M J Strauss.
    Combining geometry and combinatorics: A unified approach to sparse signal recovery. 2008
    38
  42. P Raghavendra.
    Optimal algorithms and inapproximability results for every csp. In Proceedings of the 40th ACM Symposium on the Theory of Computing. ACM, 2008
    38
  43. Vítor Santos Costa, David Page, James Cussens.
    Clp(n): Constraint logic programming for probabilistic knowledge. In Probabilistic Inductive Logic Programming, 2008
    37
  44. J S Vitter.
    Algorithms and data structures for external memory. Found. Trends Theor. Comput. Sci, 2008
    37
  45. M Hay, G Miklau, D Jensen, D Towsley, P Weis.
    Resisting structural re-identification in anonymized social networks. In VLDB, 2008
    37
  46. K Liu, E Terzi.
    Towards Identity Anonymization on Graphs. SIGMOD, 2008
    37
  47. B Cully, G Lefebvre, D Meyer, M Feeley, N Hutchinson, A Warfield.
    Remus: High Availability via Asynchronous Virtual Machine Replication. In Proc. of NSDI, 2008
    37
  48. Y J Liang, J G Apostolopoulos, B Girod.
    Analysis of packet loss for compressed video: Effect of burst losses and correlation between error frames. IEEE Trans. on Circ. and Syst. for Video Technol, 2008
    36
  49. A Markopoulou, G Iannaconne, S Bhattacharrya, C-N Chuah, C Diot.
    Characterization of failures in an IP backbone. In IEEE/ACM Trans. Networking, 2008
    36
  50. E Friedgut, G Kalai, N Nisan.
    Elections can be manipulated often. In Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2008, 2008
    36
  51. J Clarke, M Lapata.
    Global inference for sentence compression: An integer linear programming approach. Journal of Artificial Intelligence Research, 2008
    36
  52. A Hobor, A W Appel, F Zappa Nardelli.
    Oracle semantics for concurrent separation logic. In ESOP, 2008
    36
  53. A Buttari, J Langou, J Kurzak, J Dongarra.
    Parallel tiled QR factorization for multicore architectures. In: Proceedings of the 7th International Conference on Parallel Processing and Applied Mathematics, 2008
    36
  54. J G Steffan, C Colohan, A Zhai, T C Mowry.
    The STAMPede approach to thread-level speculation. In Micro, 2008
    36
  55. Martin Zinkevich, Michael Johanson, Michael Bowling, Carmelo Piccione.
    Regret minimization in games with incomplete information. In Advances in Neural Information Processing Systems 20 (NIPS, 2008
    36
  56. P Heymann, D Ramage, Garcia-Molina.
    H.: Social tag prediction. In: SIGIR ’08: Proc. of the 31st annual Int’l ACM SIGIR conference on Research and development in information retrieval, 2008
    36
  57. G Leshed, E M Haber, T Matthews, T Lau.
    CoScripter: automating & sharing how-to knowledge in the enterprise. 2008
    36
  58. K Albayraktaroglu, A Jaleel, X Wu, M Franklin, B Jacob, C-W Tseng, D Yeung.
    BioBench: A Benchmark Suite of Bioinformatics Applications. in Proceedings of the 2005 IEEE International Symposium on Performance Analysis of Systems and Software, 2008
    36
  59. C Grier, S Tang, S King.
    Secure Web browsing with the OP Web browser. In S&P, 2008
    36
  60. N Swamy, B Corcoran, Hicks.
    M.: Fable: A language for enforcing user-defined security policies. In: Proceedings of the IEEE Symposium on Security and Privacy, 2008
    36
  61. Jeff Mitchell, Mirella Lapata.
    Vector-based models of semantic composition. proceedings of ACL08: HLT, 2008
    35
  62. J Leskovec, E Horvitz.
    Planetary-scale views on a large instant-messaging network. In Proceedings of WWW’ 08, 2008
    35
  63. Rashmi Prasad, Nikhil Dinesh, Alan Lee, Eleni Miltsakaki, Livio Robaldo, Aravind Joshi, Bonnie Webber.
    The Penn Discourse TreeBank 2.0. In Nicoletta Calzolari (Conference Chair), Khalid Choukri, Bente Maegaard, Joseph Mariani, Jan Odjik, Stelios Piperidis, and Daniel Tapias, editors, Proceedings of the Sixth International Language Resources and Evaluation (LREC’08, 2008
    35
  64. G Takacs, V Chandrasekhar, N Gelfand, Y Xiong, W Chen, T Bismpigiannis, R Grzeszczuk, K Pulli, B Girod.
    Outdoors Augmented Reality on Mobile Phone using LoxelBased Visual Feature Organization. in MIR, 2008
    35
  65. D Fotakis, R Pagh, P Sanders, P Spirakis.
    Space efficient hash tables with worst case constant access time. Carnegie Mellon University, 2008
    35
  66. C Flanagan, S N Freund, J Yi.
    Velodrome: A sound and complete dynamic atomicity checker for multithreaded programs. In Programming Language Design and Implementation (PLDI, 2008
    35
  67. J Gray.
    Distributed computing economics. Queue, 2008
    34
  68. C Pautasso, O Zimmermann, F Leymann.
    RESTful Web services vs. "big" Web services: making the right architectural decision. In WWW '08: Proceeding of the 17 th international conference on World Wide Web, 2008
    34
  69. J A Pouwelse, P Garbacki, J Wang, A Bakker, J Yang, A Iosup, D H Epema, M Reinders, M R Van Steen, H J Sips.
    Tribler: a social-based peer-to-peer system. Concurrency and Computation, 2008
    34
  70. Ulrike Malmendier, Geoffrey Tate.
    Who makes acquisitions? CEO overconfidence and the market’s reaction. Journal of Financial Economics, 2008
    34
  71. D Kempe, M McSherry, BA.
    decentralized algorithm for spectral analysis. J. Comput. Syst. Sci, 2008
    34
  72. S Agrawal, S Chaudhuri, L Kollár, A P Marathe, V R Narasayya, M Syamala.
    Database tuning advisor for microsoft sql server 2005. In VLDB, 2008
    34
  73. G Druck, G Mann, A McCallum.
    Learning from labeled features using generalized expectation criteria. In SIGIR ’08, 2008
    34
  74. Y WANG, J YANG, W YIN, Y ZHANG.
    A new alternating minimization algorithm for total variation image reconstruction. SIAM J. Imaging Sciences, 2008
    34
  75. C Guo, H Wu, K Tan, L Shiy, Y Zhang, S Lu.
    DCell: A scalable and fault-tolerant network structure for data centers. In SIGCOMM, 2008
    34
  76. K Yi, F Li, G Kollios, D Srivastava.
    Efficient processing of top-k queries in uncertain databases with x-relations. PT-k random1 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 5 10 15, 2008
    34
  77. Fei Wu, Daniel S Weld.
    Automatically refining the wikipedia infobox ontology. In Proceeding of the 17th international conference on World Wide Web, 2008
    34
  78. D Chiang, Y Marton, P Resnik.
    Online largemargin training of syntactic and structural translation features. In Proc. of EMNLP, 2008
    33
  79. Cho-Jui Hsieh, Kai-Wei Chang, Chih-Jen Lin, S Sathiya Keerthi, S Sundararajan.
    A dual coordinate descent method for large-scale linear svm. In ICML ’08: Proceedings of the 25th international conference on Machine learning, 2008
    33
  80. A Saxena, S Chung, A Ng.
    3-D depth reconstruction from a single still image. IJCV, 2008
    33
  81. G Ghinita, P Kalnis, A Khoshgozaran, C Shahabi, K-L Tan.
    Private queries in location based services: anonymizers are not necessary. In Proc. ACM SIGMOD, 2008
    32
  82. K J Barker, K Davis, A Hoisie, D J Kerbyson, M Lang, S Pakin, J C Sancho.
    Entering the petaflop era: the architecture and performance of Roadrunner. in: ACM/IEEE SC2008 Conference, 2008
    32
  83. G Wassermann, Z Su.
    Static Detection of Cross-Site Scripting Vulnerabilities. In Proceedings of the 30th International Conference on Software Engineering, 2008
    32
  84. P Jain, B Kulis, K Grauman.
    Fast image search for learned metrics. In CVPR, Los Alamitos, 2008
    32
  85. R Levy.
    Expectation-based syntactic comprehension. Cognition, 2008
    32