Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. B Cully, G Lefebvre, D Meyer, M Feeley, N Hutchinson, A Warfield.
    Remus: High availability via asynchronous virtual machine replication. In Symposium on Networked Systems Design and Implementation (NSDI, 2008
    84
  2. Y Chen, Q Zhao, A Swami.
    Joint design and separation principle for opportunistic spectrum access in the presence of sensing errors. IEEE Transactions on Information Theory, 2008
    83
  3. H Lee, C Ekanadham, A Ng.
    Sparse deep belief net model for visual area V2. In, 2008
    83
  4. A Dinaburg, P Royal, M Sharif, W Lee.
    Ether: malware analysis via hardware virtualization extensions. In ACM CCS, 2008
    83
  5. R Chartrand, W Yin.
    Iteratively reweighted algorithms for compressive sensing. In 33rd International Conference on Acoustics, Speech, and Signal Processing (ICASSP, 2008
    83
  6. I Titov, R McDonald.
    Modeling online reviews with multi-grain topic models. In WWW, 2008
    83
  7. J Bengtson, K Bhargavan, C Fournet, A D Gordon, S Maffeis.
    Refinement types for secure implementations. 2008
    83
  8. M Rubinstein, A Shamir, S Avidan.
    Improved seam carving for video retargeting. ACM Transactions on Graphics (SIGGRAPH, 2008
    82
  9. C Liu, J Yuen, A Torralba, J Sivic, W T Freeman.
    SIFT flow: Dense correspondence across different scenes. In ECCV, 2008
    82
  10. E A Lee.
    Cyber physical systems: Design challenges. 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing (ISORC, 2008
    82
  11. T M Mitchell, S V Shinkareva, A Carlson, K M Chang, V L Malave, R A Mason, M A Just.
    Predicting human brain activity associated with the meanings of nouns. Science, 2008
    82
  12. B Hoh, M Gruteser, R Herring, J Ban, D Work, J-C Herrera, A M Bayen, M Annavaram, Q Jacobson.
    Virtual trip lines for distributed privacy-preserving traffic monitoring. In Proceedings of the 6th international conference on Mobile systems, applications, and services, MobiSys ’08, 2008
    81
  13. Jakob Eriksson, Lewis Girod, Bret Hull, Ryan Newton, Samuel Madden, Hari Balakrishnan.
    The pothole patrol: using a mobile sensor network for road surface monitoring. In MobiSys ’08: Proceeding of the 6th international conference on Mobile systems, applications, and services, 2008
    81
  14. Eric A Hanushek, Ludger Woessmann.
    The Role of Cognitive Skills in Economic Development. Journal of Economic Literature, 2008
    81
  15. Koushik Sen.
    Race directed random testing of concurrent programs. In PLDI '08: Proceedings of the 2008 ACM SIGPLAN Conference on Programming Language Design and Implementation, 2008
    81
  16. H Casanova, A Legrand, M Quinson.
    SimGrid: a Generic Framework for Large-Scale Distributed Experimentations. In Proc. UKSim, 2008
    81
  17. E Candès, M B Wakin, S Boyd.
    Enhancing Sparsity by Reweighted ℓ1 Minimization. Journal of Fourier Analysis and Applications, 2008
    81
  18. G Heitz, D Koller.
    Learning spatial context: Using stuff to find things. In ECCV, 2008
    80
  19. Y Xie, F Yu, K Achan, R Panigrahy, G Hulten, I Osipkov.
    Spamming botnets: signatures and characteristics. in Proceedings of the ACM SIGCOMM 2008 conference on Data communication, 2008
    80
  20. P Singla, P Domingos.
    Lifted first-order belief propagation. Proc. of the 23rd AAAI Conf, 2008
    80
  21. R Jones, K L Klinkner.
    Beyond the session timeout: automatic hierarchical segmentation of search topics in query logs. In Proceeding of the 17th ACM conference on Information and knowledge management, 2008
    80
  22. G Lorenzoni.
    Inefficient Credit Booms. Review of Economic Studies, 2008
    80
  23. J Eriksson, H Balakrishnan, S Madden.
    Cabernet: Vehicular content delivery using wifi. in Proc. ACM Mobicom, 2008
    80
  24. M Grant, S Boyd.
    Graph implementations for nonsmooth convex programs. In. Recent Advances in Learning and Control, Lecture Notes in Control and Information Sciences. Springer-Verlag Limited, 2008
    80
  25. G Willems, T Tuytelaars, L Van.
    Gool. An efficient dense and scale-invariant spatio-temporal interest point detector. In Proceedings ECCV08, 2008
    80
  26. A ROTHMAN, P BICKEL, E LEVINA, J ZHU.
    Sparse permutation invariant covariance estimation. Electronic Journal of Statistics, 2008
    80
  27. J Albrecht, D Oppenheimer, A Vahdat, D A Patterson.
    Design and implementation trade-offs for wide-area resource discovery. ACM Transactions on Internet Technology, 2008
    79
  28. Ameesh Makadia, Vladimir Pavlovic, Sanjiv Kumar.
    A New Baseline for Image Annotation. In ECCV (3, 2008
    79
  29. Jie Tang, Jing Zhang, Limin Yao, Juanzi Li, Li Zhang, Zhong Su.
    Arnetminer: Extraction and mining of academic social networks. in KDD’08, 2008
    79
  30. D Chiang, Y Marton, P Resnik.
    Online large-margin training of syntactic and structural translation features. In Proc. of EMNLP, 2008
    79
  31. C Kästner, S Apel, M Kuhlemann.
    Granularity in software product lines. In ICSE ’08, 2008
    79
  32. S Gelaki, D Nikshych.
    Nilpotent fusion categories. Advances in Mathematics 217, 2008
    79
  33. D Turnbull, L Barrington, D Torres, G Lanckriet.
    Semantic Annotation and Retrieval of Music and Sound Effects. IEEE Trans on Audio, Speech, and Language Processing, 2008
    79
  34. M Blaschko, C Lampert.
    Learning to localize objects with structured output regression. In Proc. ECCV, 2008
    79
  35. M Szummer, P Kohli, D Hoiem.
    Learning CRFs using graph cuts. In ECCV, 2008
    79
  36. G Ghinita, P Kalnis, A Khoshgozaran, C Shahabi, K-L Tan.
    Private queries in location based services: Anonymizers are not necessary. in Proc. of SIGMOD, 2008
    78
  37. O Chum, J Philbin, A Zisserman.
    Near duplicate image detection: min-hash and tf-idf weighting. In BMVC, 2008
    78
  38. H Rauhut, K Schnass, P Vandergheynst.
    Compressed sensing and redundant dictionaries. IEEE Trans. Inform. Theory, 2008
    78
  39. A LEVIN, D LISCHINSKI, Y WEISS.
    A closedform solution to natural image matting. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008
    78
  40. Y Liang, H V Poor, S Shamai.
    Secure communication over fading channels. IEEE Trans. Inf. Theory, 2008
    78
  41. P K Gopala, L Lai, H El Gamal.
    On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory, 2008
    78
  42. T Holz, M Steiner, F Dahl, E Biersack, F Freiling.
    Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, 2008
    78
  43. Assaf Ben-David, Noam Nisan, Benny Pinkas.
    FairplayMP: a system for secure multi-party computation. In CCS ’08: Proceedings of the 15th ACM conference on Computer and communications security, 2008
    78
  44. S Nedevschi.
    Reducing Network Energy Consumption via Sleeping and Rate Adaptation. Proc. 5th USENIX Symposium on Networked Systems Design and Implementation, 2008
    78
  45. P Heymann, D Ramage, H Garcia-Molina.
    Social tag prediction. In SIGIR ’08: Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval, 2008
    77
  46. D Simakov, Y Caspi, E Shechtman, M Irani.
    Summarizing visual data using bidirectional similarity. In IEEE Conference on Computer Vision and Pattern Recognition, 2008
    77
  47. T J Kane, D O Staiger.
    Estimating Teacher Impacts on Student Achievement: An Experimental Evaluation. NBER Working Papers 14607, National Bureau of Economic Research, Inc, 2008
    77
  48. K Degtyarenko, P deMatos, M Ennis, J Hastings, M Zbinden, A McNaught, R Alcántara, M Darsow, M Guedj, M Ashburner.
    ChEBI: a database and ontology for chemical entities of biological interest. Nucleic Acids Res, 2008
    77
  49. S Dasgupta, D Hsu, C Monteleoni.
    A general agnostic active learning algorithm. In, 2008
    77
  50. D Balzarotti, M Cova, V Felmetsger, N Jovanovic, E Kirda, C Kruegel, G Vigna.
    Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. In Proc. Symposium on Security and Privacy, 2008
    76
  51. P Hagmann, L Cammoun, X Gigandet, R Meuli, C J Honey, V J Wedeen, O Sporns.
    Mapping the structural core of human cerebral cortex. PLoS Biology, 2008
    76
  52. H Mi, L Huang, Q Liu.
    Forest-based translation. In Proc. of ACL, 2008
    76
  53. A Kittur, R E Kraut.
    Harnessing the wisdom of crowds in Wikipedia: Quality through coordination. In CSCW’08. ACM, 2008
    76
  54. C Papadimitriou, T Roughgarden.
    Computing correlated equilibria in multi-player games. Journal of the ACM, 2008
    76
  55. Michael L Lemmon, Michael R Roberts, Jaime F Zender.
    Back to the Beginning: Persistence and the Cross-Section of Corporate Capital Structure. Journal of Finance, 2008
    75
  56. M Rosvall, C T Bergstrom.
    Maps of random walks on complex networks reveal community structure. Proc. Natl. Acad. Sci. USA 105, 2008
    75
  57. K Liu, E Terzi.
    Towards identity anonymization on graphs. In SIGMOD Conference, 2008
    75
  58. H Kim, Ahn.
    S.: BPLRU: a buffer management scheme for improving random writes in flash storage. In: Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST, 2008
    75
  59. Z Bar-Yossef, Gurevich.
    M.: Random sampling from a search engine’s index. Journal of the ACM (JACM, 2008
    75
  60. V de Silva, L-H Lim.
    Tensor rank and the ill-posedness of the best low-rank approximation problem. doi:10.1137/06066518X c© 2009 SPIE, 2008
    75
  61. G Brostow, J Shotton, J Fauqueur, R Cipolla.
    Segmentation and recognition using structure from motion point clouds. In European Conference on Computer Vision (ECCV, 2008
    74
  62. M Abadi, A Birrell, T Harris, M Isard.
    Semantics of transactional memory and automatic mutual exclusion. In POPL ’08: Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, 2008
    74
  63. J Sprague, L Bayraktaroglu, Y Bradford, T Conlin, N Dunn, D Fashena, K Frazer, M Haendel, D G Howe, J Knight.
    The Zebrafish Information Network: the zebrafish model organism database provides expanded support for genotypes and phenotypes. Nucleic Acids Res, 2008
    74
  64. Y Aı̈t-Sahalia.
    Closed-Form Likelihood Expansions for Multivariate Diffusions. Annals of Statistics, 2008
    74
  65. Y Zheng, A Barbu, B Georgescu, M Scheuering, D Comaniciu.
    Fourchamber heart modeling and automatic segmentation for 3D cardiac CT volumes using marginal space learning and steerable features. IEEE Transactions on Medical Imaging, 2008
    74
  66. L Laeven, F Valencia.
    Systemic Banking Crises: A New Database. IMF Working Paper 08/224 (Washington: International Monetary Fund, 2008
    74
  67. P Kenny, P Ouellet, N Dehak, V Gupta, P Dumouchel.
    A study of inter-speaker variability in speaker verification. IEEE Trans. Audio, Speech and Language Processing, 2008
    74
  68. A Saxena, S H Chung, A Y Ng.
    3-D depth reconstruction from a single still image. IJCV. 2008
    74
  69. D GUPTA, S LEE, M VRABLE, S SAVAGE, A C SNOEREN, G VARGHESE, G M VOELKER, A VAHDAT.
    Difference engine: Harnessing memory redundancy in virtual machines. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI, 2008
    74
  70. S Consolvo, D McDonald, W Toscos, T Chen, Y M, J Froehlich, B Harrison, P Klasnja, A LaMarca, L LeGrand, R Libby, I Smith, J Landay.
    A.: ‘Activity sensing in the wild: a field trial of ubifit garden. Proc. CHI 2008, ACM Press, 2008
    74
  71. C GRIER, S TANG, S T KING.
    Secure web browsing with the OP web browser. In Proceedings of the IEEE Symposium on Security and Privacy, 2008
    74
  72. James Clarke, Mirella Lapata.
    Global inference for sentence compression an integer linear programming approach. Journal of Artificial Intelligence Research, 2008
    73
  73. M S Miller, M Samuel, B Laurie, I Awad, M Stay.
    Caja: Safe active content in sanitized JavaScript. 2008
    73
  74. G Adomavicius, A Tuzhilin.
    Context-aware recommender systems. 2008
    73
  75. X Li, Y-Y Wang, A Acero.
    Learning query intent from regularized click graphs. In SIGIR, 2008
    73
  76. B D Ziebart, A Maas, J A Bagnell, A K Dey.
    Maximum entropy inverse reinforcement learning. In Proceedings of the 22nd AAAI Conference on Artificial Intelligence, 2008
    73
  77. D Wagner, G Reitmayr, A Mulloni, T Drummond, D Schmalstieg.
    Pose tracking from natural features on mobile phones. in ISMAR, 2008
    72
  78. B Motik, R Shearer, I Horrocks.
    Hypertableau Reasoning for Description Logics. 2008
    71
  79. S Davidson, J Freire.
    Provenance and scientific workflows: Challenges and opportunities. in ACM SIGMOD Int. Conf. on Management of Data, 2008
    71
  80. P Bonami, L T Biegler, A R Conn, G Cornuéjols, I E Grossmann, C D Laird, J Lee, A Lodi, F Margot, N Sawaya, A Wächter.
    An algorithmic framework for convex mixed integer nonlinear programs. Discrete Optimization. 2008
    71
  81. L Antova, T Jansen, C Koch, Olteanu.
    D.: Fast and simple relational processing of uncertain data. In: ICDE, 2008
    71
  82. G WASSERMANN, Z SU.
    Static detection of cross-site scripting vulnerabilities. In Proceedings of the International Conference on Software Engineering. IEEE, 2008
    71
  83. B Quilitz, U Leser.
    Querying distributed RDF data sources with SPARQL. In Proceedings of the 5th European Semantic Web Conference, ESWC 2008, 2008
    71
  84. Bingsheng He, Wenbin Fang, Qiong Luo, Naga K Govindaraju, Tuyong Wang.
    Mars: a mapreduce framework on graphics processors. In PACT: Proceedings of the 17th international conference on Parallel architectures and compilation techniques, 2008
    71
  85. A Globerson Meltzer, T Jaakkola, Y Weiss.
    Tightening lp relaxations for map using message passing. In Proceedings of UAI-08, 2008
    71
  86. B Gedik, L Liu.
    Protecting location privacy with personalized kanonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing, 2008
    71
  87. Q MEI, D CAI, D ZHANG.
    Topic modeling with network regularization. Proceeding of the 17th international conference on World Wide Web, 2008
    71
  88. U Brandes, D Delling, M Gaertler, R Görke, M Hoefer, Z Nikoloski, D Wagner.
    On modularity clustering. IEEE Transactions on Knowledge and Data Engineering, 2008
    70