Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. A Biere.
    PicoSAT essentials. Journal on Satisfiability, Boolean Modeling and Computation, 2008
    32
  2. J Grossklags, N Christin, J Chuang.
    Secure or insure? A game-theoretic analysis of information security games. In Proceedings of the 2008 World Wide Web Conference (WWW’08, 2008
    32
  3. J Hui, D Culler.
    IP is Dead, Long Live IP for Wireless Sensor Networks. In Proc. SenSys, 2008
    32
  4. D Harel, S Maoz.
    Assert and negate revisited: modal semantics for UML sequence diagrams. Software and Systems Modeling (SoSyM) 7, 2008
    32
  5. T Blattner, M Catenaro, M Ehrmann, R Strauch y J Turunen.
    83 �«The predictability of monetary policy. 2008
    32
  6. D Ross, J Lim, R-S Lin, M-H Yang.
    Incremental learning for robust visual tracking. IJCV, 2008
    32
  7. J Eriksson, H Balakrishnan, S Madden.
    Cabernet: Vehicular Content Delivery Using WiFi. in MOBICOM. ACM, 2008
    32
  8. Z Zheng, H Zha, T Zhang, O Chapelle, K Chen, G Sun.
    A general boosting method and its application to learning ranking functions for web search. In NIPS, 2008
    32
  9. D Turnbull, L Barrington, D Torres, G Lanckriet.
    Semantic annotation and retrieval of music and sound effects. IEEE Transactions on Audio, Speech, and Language Processing, 2008
    32
  10. P J Bickel, E Levina.
    Regularized estimation of large covariance matrices. Ann. Statist, 2008
    32
  11. J C van Gemert, J-M Geusebroek, C J Veenman, A W Smeulders.
    Kernel codebooks for scene categorization. in European Conf. Computer Vision, 2008
    32
  12. D Gupta, S Lee, M Vrable, S Savage, A C Snoeren, G Varghese, G M Voelker, A Vahdat.
    Difference engine: Harnessing memory redundancy in virtual machines. In Usenix OSDI, 2008
    32
  13. Mike Peng, Denis Wang, Yi Jiang.
    An Institution-Based View of International Business Strategy: A Focus on Emerging Economies. Journal of International Business Studies, 2008
    32
  14. Qin Gao, Stephan Vogel.
    Parallel implementations of word alignment tool. In Software Engineering, Testing, and Quality Assurance for Natural Language Processing, 2008
    31
  15. R Torres, A X Falcão, M A Gonçalves, J P Papa, B Zhang, W Fan, E A Fox.
    A Graph-based Approach for Multiscale Shape. 2008
    31
  16. H-R Kim, P K Chan.
    Learning implicit user interest hierarchy for context in personalization. Applied Intelligence, 2008
    31
  17. N Bettenburg, S Just, A Schröter, C Weiss, R Premraj, T Zimmermann.
    What makes a good bug report. in Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering (SIGSOFT ’08, 2008
    31
  18. J Eriksson, L Girod, B Hull, R Newton, S Madden, H Balakrishnan.
    The pothole patrol: using a mobile sensor network for road surface monitoring. In ACM MobiSys, 2008
    31
  19. N Vachharajani, Y Zhang, T Jablin.
    Revisiting the sequential programming model for the multicore era. IEEE MICRO, Jan, 2008
    31
  20. H Bay, A Ess, T Tuytelaars, L Van.
    Gool. Speededup robust features (SURF. Comput. Vis. Image Underst, 2008
    31
  21. Joakim Nivre, Ryan McDonald.
    Integrating graph-based and transition-based dependency parsers. In Proc. of ACL, 2008
    31
  22. M W STORER, K M GREENAN, E L MILLER, K VORUGANTI.
    Pergamum: Replacing tape with energy efficient, reliable, disk-based archival storage. In Proc. FAST 2008, 2008
    31
  23. E Deelman, G Singh, M Livny, G B Berriman, J Good.
    The cost of doing science on the cloud: the montage example. In SC, 2008
    31
  24. D D Salvucci, N A Taatgen.
    Threaded cognition: An integrated theory of concurrent multitasking. Psychological Review, 2008
    31
  25. S Nedevschi, L Popa, G Iannaccone, S Ratnasamy, D Wetherall.
    Reducing network energy consumption via sleeping and rate-adaptation. In Proc. NSDI, 2008
    31
  26. P Mohan, V Padmanabhan, R Ramjee.
    Nericell: Rich Monitoring of Road and Traffic Conditions Using Mobile Smartphones. in Proc. ACM SenSys, 2008
    30
  27. S McCamant, M D Ernst.
    Quantitative information flow as network flow capacity. In Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, 2008
    30
  28. R Cheng, J Chen, M F Mokbel, C-Y Chow.
    Probabilistic verifiers: Evaluating constrained nearest-neighbor queries over uncertain data. In 24th IEEE International Conf. on Data Engineering (ICDE’08). IEEE Computer Society, 2008
    30
  29. E Tola, V Lepetit, P Fua.
    A fast local descriptor for dense matching. in CVPR, 2008
    30
  30. J M Wang, D J Fleet, A Hertzmann.
    Gaussian process dynamical models for human motion. IEEE Trans Pattern Anal Mach Intell, 2008
    30
  31. M Papi, M Ali, T Correa Jr, J Perkins, M D Ernst.
    Practical pluggable types for java. 2008
    30
  32. R G Rajan, A Subramanian.
    Aid and growth: what does the cross-country evidence really show. Review of Economics and Statistics, 2008
    30
  33. J Lin, Q Lu, X Ding, Z Zhang, X Zhang, P Sadayappan.
    Gaining insights into multicore cache partitioning: bridging the gap between simulation and real systems. In International Symposium on High-Performance Computer Architecture, 2008
    30
  34. Q Zhao, B Krishnamachari, K Liu.
    On Myopic Sensing for Multi-Channel Opportunistic Access: Structure, Optimality, and Performance. IEEE Transactions on Wireless Communications, 2008
    30
  35. Kaushik Datta, Mark Murphy, Vasily Volkov, Samuel Williams, Jonathan Carter, Leonid Oliker, David Patterson, John Shalf, Katherine Yelick.
    Stencil computation optimization and auto-tuning on state-of-the-art multicore architectures. In Proceedings of the 2008 ACM/IEEE conference on Supercomputing, SC ’08, 2008
    30
  36. Q Mei, D Cai, D Zhang, C Zhai.
    Topic modeling with network regularization. In WWW, 2008
    30
  37. John Duchi, Shai Shalev-Shwartz, Yoram Singer, Tushar Chandra.
    Efficient projections onto the ℓ1-ball for learning in high dimensions. In Proceedings of ICML, 2008
    30
  38. H Kurniawati, D Hsu.
    Sarsop: Efficient point-based pomdp planning by approximating optimally reachable belief spaces. In Proc. Robotics: Science and Systems, 2008
    29
  39. M Brantner, D Florescu, D A Graf, D Kossmann, T Kraska.
    Building a Database on S3. In Proc. of SIGMOD, 2008
    29
  40. E Bonilla, K M Chai, C Williams.
    Multi-task gaussian process prediction. 2008
    29
  41. O Chum, J Philbin, A Zisserman.
    Near duplicate image detection: min-hash and tf-idf weighting. in Proceedings of the British Machine Vision Conference, 2008
    29
  42. Z Lin, X Jiang, D Xu, X Zhang.
    Automatic protocol format reverse engineering through context-aware monitored execution. In Proceedings of the 15th Annual Network and Distributed System Security Symposium, 2008
    29
  43. Jonathan E Hughes, Christopher R Knittel, Daniel Sperling.
    Evidence of a Shift in the Short-Run Price Elasticity of Gasoline Demand. Energy Journal, 2008
    29
  44. D Newman, A Asuncion, P Smyth, M Welling.
    Distributed inference for latent dirichlet allocation. In NIPS, 2008
    29
  45. A X Liu, M G Gouda.
    Diverse firewall design. IEEE Transactions on Parallel and Distributed Systems (TPDS, 2008
    29
  46. P Nikander, T Henderson, C Vogt, J Arkko.
    End- Host Mobility and Multihoming with the Host Identity Protocol", RFC 5206. 2008
    29
  47. P Singla, P Domingos.
    Lifted first-order belief propagation. In Proceedings of the 23rd AAAI Conference on Artificial Intelligence (AAAI08, 2008
    29
  48. G H Loh.
    3D-Stacked Memory Architectures for Multi-Core Processors. In Proc. of the 35th Intl. Symp. on Computer Architecture, 2008
    29
  49. D J Abadi, S R Madden, N Hachem.
    Columnstores vs. row-stores: How different are they really. In Proceedings of the SIGMOD Conference on Management of Data, 2008
    29
  50. D Wagner, G Reitmayr, A Mulloni, T Drummond, D Schmalstieg.
    Pose tracking from natural features on mobile phones. In Proc. 7th IEEE and ACM Intl. Symposium on Mixed and Augmented Reality (ISMAR’08, 2008
    29
  51. M Piatek, T Isdal, A Krishnamurthy, T Anderson.
    One hop reputations for peer to peer file sharing workloads. in Proc. of NSDI, 2008
    29
  52. B He, W Fang, Q Luo, N K Govindaraju, T Wang.
    Mars: a mapreduce framework on graphics processors. In Proceedings of the 17th international conference on Parallel architectures and compilation techniques, 2008
    29
  53. E Albert, P Arenas, S Genaim, Puebla.
    G.: Automatic inference of upper bounds for recurrence relations in cost analysis. In: 15th International Symposium on Static Analysis (SAS’08). Lecture Notes in Computer Science, 2008
    29
  54. U Endriss, N Maudet, F Sadri, F Toni.
    Negotiating socially optimal allocations of resources. 2006) 315–348. P.E. Dunne, Y. Chevaleyre / Theoretical Computer Science 396, 2008
    29
  55. M Blaschko, C Lampert.
    Learning to localize objects with structured output regression. In ECCV, 2008
    29
  56. A Passant, P Laublet.
    Meaning Of A Tag: A Collaborative Approach to Bridge the Gap Between Tagging and Linked. Data”, Proceedings of the Linked Data on the Web Workshop (LDOW2008) at the 17th International Conference on the World Wide Web (WWW2008, 2008
    29
  57. V Brik, S Banerjee, M Gruteser, S Oh.
    Wireless device identification with radiometric signatures. In Proceedings of the 14th ACM International Conference on Mobile Computing and Networking (MobiCom ’08, 2008
    29
  58. A Brzezinski, G Zussman, E Modiano.
    Distributed Throughput Maximization in Wireless Mesh Networks via Pre-Partitioning. in ACM Mobicom 2006, 2008
    29
  59. S Nason, J E Laird.
    Soar-rl: Integrating reinforcement learning with soar. In 6th international conference on cognitive modeling, 2008
    28
  60. E Albert, P Arenas, M Codish, S Genaim, G Puebla, D Zanardini.
    Termination analysis of Java Bytecode. In Proc. FMOODS ’08, LNCS 5051, 2008
    28
  61. A Das Sarma, X Dong, A Halevy.
    Bootstrapping pay-as-you-go data integration systems. in SIGMOD, 2008
    28
  62. G Wondracek, P M Comparetti, C Krügel, E Kirda.
    Automatic network protocol analysis. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2008, 2008
    28
  63. L Schröder.
    Expressivity of coalgebraic modal logic: The limits and beyond. Theoretical Computer Science, 2008
    28
  64. A Lopez.
    Statistical Machine Translation. ACM Computing Surveys, 2008
    28
  65. D Chaum, R Carback, J Clark, A Essex, S Popoveniuc, R Rivest, P Ryan, E Shen, A Sherman.
    Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. in Proceedings of the USENIX/ACCURATE Electronic Voting Technology Workshop, 2008
    28
  66. E Hart, J Timmis.
    Application areas of AIS: The past, the present and the future. Applied Soft Computing, 2008
    28
  67. B Greenstein, D McCoy, J Pang, T Kohno, S Seshan, D Wetherall.
    Improving wireless privacy with an identifier-free link layer protocol. in MobiSys, 2008
    28
  68. D Wischik, M Handley, M B Bagnulo.
    The resource pooling principle. ACM SIGCOMM CCR, 2008
    28
  69. C Liu, J Yuen, A Torralba, J Sivic, W Freeman.
    Sift flow: dense correspondence across different scenes. In Proceedings of the 10th European Conference on Computer Vision: Part III, 2008
    28
  70. W-N Chin, C David, H H Nguyen, S Qin.
    Enhancing modular OO verification with separation logic. In Proceedings of POPL, 2008
    28
  71. D Milne, I H Witten.
    An effective, low-cost measure of semantic relatedness obtained from wikipedia links. In In Proceedings of AAAI 2008, 2008
    28
  72. M Crammer, K, F Pereira.
    Confidence-Weighted Linear Classification. Proceedings of the International Conference on Machine Learning, 2008
    28
  73. C Xiao, W Wang, X Lin, J X Yu.
    Efficient similarity joins for near duplicate detection. In WWW, 2008
    28
  74. J Schneider, R Wattenhofer.
    A log-star distributed maximal independent set algorithm for growth-bounded graphs. In Proc. of 27th ACM Symposium on Principles of Distributed Computing (PODC, 2008
    28
  75. R Salakhutdinov, A Mnih.
    Bayesian probabilistic matrix factorization using markov chain monte carlo. In Proc. International Conference on Machine Learning, 2008
    28
  76. Nickolai Zeldovich, Silas Boyd-Wickizer, David Mazières.
    Securing distributed systems with information flow control. In Proc. 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI, 2008
    28
  77. D SIMAKOV, Y CASPI, E SHECHTMAN, IRANI.
    M.: Summarizing visual data using bidirectional similarity. In CVPR ’08, 2008
    28
  78. John Blitzer, Koby Crammer, Alex Kulesza, Fernando Pereira, Jennifer Wortman.
    Learning bounds for domain adaptation. In Proc. Advances In Neural Information Processing Systems (NIPS ’07, 2008
    28
  79. F Biagini, Y Hu, B Øxendal, T Zhang.
    Stochastic Calculus for Fractional Brownian Motion and Applications. 2008
    28
  80. M Collins, A Globerson, T Koo, X Carreras, P L Bartlett.
    Exponentiated gradient algorithms for conditional random fields and maxmargin Markov networks. Journal of Machine Learning Research, 2008
    28
  81. Y Wang, E Keller, B Biskeborn, J van der Merwe, J Rexford.
    Virtual Routers on the Move: Live Router Migration as a Network-Management Primitive. in ACM SIGCOMM, 2008
    28
  82. Lyndon Kennedy, Mor Naaman.
    Generating diverse and representative image search results for landmarks. Proceeding of the 17th International Conference on World Wide Web, 2008
    28
  83. A J Nicholson, B D Noble.
    BreadCrumbs: Forecasting Mobile Connectivity. In Proc. ACM MOBICOM, 2008
    27
  84. R M Nallapati, A Ahmed, E P Xing, W W Cohen.
    Joint latent topic models for text and citations. In KDD, 2008
    27
  85. S B Davidson, J Freire.
    Provenance and scientific workflows: challenges and opportunities. In Proc. SIGMOD, 2008
    27
  86. M Surdeanu, R Johansson, A Meyers, L Màrquez.
    The CoNLL-2008 Shared Task on Joint Parsing of Syntactic and Semantic Dependencies. In Proceedings of the 12th CoNLL, 2008
    27
  87. G Heitz, D Koller.
    Learning spatial context: Using stuff to find things. In ECCV, 2008
    27
  88. M Fornassier, H Rauhut.
    Recovery algorithms for vector valued data with joint sparsity constrains. SIAM Journal on Numerical Analysis, 2008
    27
  89. P Faliszewski, E Hemaspaandra, H Schnoor.
    Copeland voting: ties matter. In Padgham, 2008
    27
  90. Patrice Godefroid, Adam Kie˙zun, Michael Y Levin.
    Grammar-based whitebox fuzzing. In Programming Language Design and Implementation, 2008
    27
  91. M Kudlur, S Mahlke.
    Orchestrating the execution of stream programs on multicore platforms. In Proc. of the ’08 Conference on Programming Language Design and Implementation, 2008
    27
  92. Luc Moreau, Juliana Freire, Joe Futrelle, Robert E McGrath, Jim Myers, Patrick Paulson.
    The Open Provenance Model. 2008
    27