Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. S Apel, C Kästner.
    An overview of feature-oriented software development. Journal of Object Technology (JOT, 2009
    30
  2. A Akavia, S Goldwasser, V Vaikuntanathan.
    Simultaneous hardcore bits and cryptography against memory attacks. Theory of Cryptography — TCC 2009, volume 5444 of Lecture Notes in Computer Science, 2009
    30
  3. P Arbelaez, M Maire, C Fowlkes, J Malik.
    From contours to regions: an empirical evaluation. In CVPR, 2009
    30
  4. G O Roberts, J S Rosenthal.
    Examples of adaptive MCMC. Journal of Computational and Graphical Statistics, 2009
    30
  5. Salvatore Guarnieri, Benjamin Livshits.
    Gatekeeper: mostly static enforcement of security and reliability policies for javascript code. In Proceedings of the 18th conference on USENIX security symposium, SSYM’09, 2009
    30
  6. S Hao, N A Syed, N Feamster, A G Gray, S Krasser.
    Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine. In USENIX Security Symposium, 2009
    30
  7. S Iwata, J Orlin.
    A simple combinatorial algorithm for submodular function minimization, 1230–1237. ACM-SIAM Symposium on Discrete Algorithms. SIAM, 2009
    30
  8. P Zhou, B Zhao, J Yang, Y Zhang.
    A durable and energy efficient main memory using phase change memory technology. In ISCA, 2009
    30
  9. Nikolaj Bjørner, Nikolai Tillmann, Andrei Voronkov.
    Path feasibility analysis for string-manipulating programs. In Proceedings of the 15th International Conference on Tools AND Algorithms for the Construction and Analysis of Systems (TACAS 2009, 2009
    30
  10. J Adamek, H Herrlich, G E Strecker.
    Abstract and Concrete Categories: The Joy of Cats. 2009
    30
  11. C Kiekintveld, M Jain, J Tsai, J Pita, F Ordonez, M Tambe.
    Computing optimal randomized resource allocations for massive security games. In AAMAS-09, 2009
    30
  12. F Guvenen.
    A parsimonious macroeconomic model for asset pricing. Econometrica, 2009
    29
  13. Y Furukawa, J Ponce.
    Carved visual hulls for imagebased modeling. Int. J. Comput. Vision, 2009
    29
  14. J Chang, J Boyd-Graber.
    Reading Tea Leaves: How Humans Interpret Topic Models. Proc. NIPS, 2009
    29
  15. J LIU, J SUN, H-Y SHUM.
    Paint selection. ACM Trans. Graph, 2009
    29
  16. D Chiang, W Wang, K Knight.
    11,001 new features for statistical machine translation. In Proc. of NAACL-HLT, 2009
    29
  17. D Olguin Olguin, B Waber, T Kim, A Mohan, K Ara, A Pentland.
    Sensible organizations: Technology and methodology for automatically measuring organizational behavior. IEEE Transactions on Systems, Man, and Cybernetics. Part B: Cybernetics, 2009
    29
  18. Robert L Bocchino, Vikram S Adve, Danny Dig, Sarita V Adve, Stephen Heumann, Rakesh Komuravelli, Jeffrey Overbey, Patrick Simmons, Hyojin Sung, Mohsen Vakilian.
    A type and effect system for deterministic parallel java. In OOPSLA ’09, 2009
    28
  19. B Viswanath, A Mislove, M Cha, K P Gummadi.
    On the evolution of user interaction in Facebook. In SIGCOMM Workshop on Social Networks, 2009
    28
  20. J O Wobbrock, M R Morris, A D Wilson.
    User-defined gestures for surface computing. In Proc. CHI 2009, 2009
    28
  21. Adam Barth, Collin Jackson, John C Mitchell.
    Securing frame communication in browsers. Communications of the ACM, 2009
    28
  22. J Sankaranarayanan, H Samet, B E Teitler, M D Lieberman, J Sperling.
    Twitterstand: news in tweets. In GIS ’09, 2009
    28
  23. A VINCIARELLI, M PANTIC, H BOURLARD.
    Social signal processing: Survey of an emerging domain. Image and Vision Computing, 2009
    28
  24. G Maier, A Feldmann, V Paxson, M Allman.
    On dominant characteristics of residential broadband internet traffic. In ACM Internet Measurement Conference, 2009
    28
  25. N Bloom.
    The impact of uncertainty shocks. Econometrica, 2009
    27
  26. Aayush Gupta, Youngjae Kim, Bhuvan Urgaonkar.
    Dftl: a flash translation layer employing demand-based selective caching of page-level address mappings. In Proceeding of the 14th international conference on Architectural, 2009
    27
  27. K Pietrzak.
    A leakage-resilient mode of operation. In: EUROCRYPT, 2009
    27
  28. C Gkantsidis, T Karagiannis, P Rodriguez, M Vojnović.
    Planet scale software updates. In Proceedings of the ACM Conference on Communications Architectures and Protocols, 2006. K. Glerum, 2009
    27
  29. V Ramasubramanian, T L Rodeheffer, D B Terry, M Walraed-Sullivan, T Wobber, C C Marshall, A Vahdat.
    Cimbiosys: a platform for content-based partial replication. In Proceedings of the 6th USENIX symposium on Networked systems design and implementation, NSDI’09, 2009
    27
  30. Joseph Devietti, Brandon Lucia, Luis Ceze, Mark Oskin.
    Dmp: deterministic shared memory multiprocessing. In ASPLOS ’09, 2009
    27
  31. D P Bunde.
    Power-aware scheduling for makespan and flow. Journal of Scheduling, 2009
    27
  32. F McSherry, I Mironov.
    Differentially private recommender systems: building privacy into the net. In Symp. Knowledge Discovery and Datamining (KDD, 2009
    26
  33. B Mackowiak, M Wiederholt.
    Optimal sticky prices under rational inattention. American Economic Review, 2009
    26
  34. G Cormode, F Li, K Yi.
    Semantics of ranking queries for probabilistic data and expected ranks. In Proc. ICDE, 2009
    26
  35. T Ho, H Viswanathan.
    Dynamic algorithms for multicast with intra-session network coding. IEEE Trans. on Information Theory, 2009
    26
  36. J P John, A Moshchuk, S D Gribble, A Krishnamurthy.
    Studying Spamming Botnets Using Botlab. In USENIX Symposium on Networked Systems Design and Implementation (NSDI, 2009
    26
  37. I Daubechies, R DeVore, M Fornasier, S Güntürk.
    Iteratively re-weighted least squares minimization for sparse recovery. Commun. Pure Appl. Math, 2009
    26
  38. S Vasudevan, D Towsley, D Goeckel, R Khalili.
    Neighbor discovery in wireless networks and the coupon collector’s problem. In Proc. of ACM MobiCom, 2009
    25
  39. A Doucet, A M Johansen.
    A tutorial on particle filtering and smoothing: Fifteen years later. Handbook of Nonlinear Filtering, 2009
    25
  40. K R Leino, P Müller.
    A Basis for Verifying Multi-threaded Programs. In ESOP, 2009
    25
  41. Federica Ciocchetta, Jane Hillston.
    Bio-PEPA: A framework for the modelling and analysis of biological systems. Theoretical Computer Science, 410(3334):3065 – 3084, 2009
    25
  42. K Hoffman, D Zage, C Nita-Rotaru.
    A survey of attack and defense techniques for reputation systems. ACM Computing Surveys, 2009
    25
  43. F Neumann, C Witt.
    Runtime analysis of a simple ant colony optimization algorithm. Algorithmica, 2009
    25
  44. Ravi Chugh, Jeffrey A Meister, Ranjit Jhala, Sorin Lerner.
    Staged information flow for JavaScript. In Proc. SIGPLAN 2009 Conference on Programming Language Design and Implementation, 2009
    25
  45. Nikhil Bansal, Ho-Leung Chan, Kirk Pruhs.
    Speed scaling with an arbitrary power function. In SODA, 2009
    25
  46. F J Herrmann, Y A Erlangga, T Lin.
    Compressive simultaneous fullwaveform simulation. Geophysics, 2009
    25
  47. H Wang, M Ullah, A Klaser, I Laptev, C Schmid.
    Evaluation of local spatio-temporal features for action recognition. In BMVC, 2009
    25
  48. F Chen, D Koufaty, X Zhang.
    Understanding Intrinsic Characteristics and System Implications of Flash Memory based Solid State Drives. In Proc. of International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS’09, 2009
    24
  49. X Jiang, S Dawson-Haggerty, P Dutta, D Culler.
    Design and implementation of a high-fidelity AC metering network. In ACM IPSN/SPOTS, 2009
    24
  50. M Cha, A Mislove, K P Gummadi.
    A measurement-driven analysis of information in the flickr social network. In Proceedings of the 18th international conference on World wide web, WWW ’09, 2009
    24
  51. B J Jansen, M Zhang, K Sobel, A Chowdury.
    Twitter power: Tweets as electronic word of mouth. Journal of the American Society for Information Science & Technology, 2009
    24
  52. C Liu, J Yuen, A Torralba.
    Nonparametric scene parsing: label transfer via dense scene alignment. In CVPR, 2009
    23
  53. Eneko Agirre, Enrique Alfonseca, Keith Hall, Jana Kravalova, Marius Pasca, Aitor Soroa.
    A study on similarity and relatedness using distributional and wordnet-based approaches. In Proceedings of HLT-NAACL, 2009
    23
  54. L Xia, M Zuckerman, A Procaccia, V Conitzer, J Rosenschein.
    Complexity of unweighted coalitional manipulation under some common voting rules. In IJCAI09, 348–352, 2009
    23
  55. J Dunkley, D N Spergel, E Komatsu, G Hinshaw, D Larson, M R Nolta, N Odegard, L Page, C L Bennett, B Gold, R S Hill, N Jarosik, J L Weiland, M Halpern, A Kogut, M Limon, S S Meyer, G S Tucker, E Wollack, E L Wright.
    Five-Year Wilkinson Microwave Anisotropy Probe (WMAP) Observations: Bayesian Estimation of Cosmic Microwave Background Polarization Maps. APJ, 2009
    23
  56. C Ansótegui, M Sellmann, K Tierney.
    A gender-based genetic algorithm for the automatic configuration of algorithms. In CP, 2009
    23
  57. U Kang, C Tsourakakis, C Faloutsos.
    PEGASUS: A peta-scale graph mining system implementation and observations. In ICDM, 2009
    23
  58. Y Wang, J Lin, M Annavaram, Q A Jacobson, J Hong, B Krishnamachari, N Sadeh.
    A framework of energy efficient mobile sensing for automatic user state recognition. In ACM MobiSys, 2009
    23
  59. A Wierman, L L H Andrew, A Tang.
    Power-aware speed scaling in processor sharing systems. In Proceedings of IEEE Infocom, 2009
    22
  60. W Headden M Johnson, D McClosky.
    Improving unsupervised dependency parsing with richer contexts and smoothing. In Proc. of NAACL, 2009
    22
  61. J van Benthem, J Gerbrandy, T Hoshi, E Pacuit.
    Merging frameworks for interaction. Journal of Philosophical Logic, 2009
    22
  62. A Clement, M Marchetti, E Wong, L Alvisi, M Dahlin.
    Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults. In 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI, 2009
    22
  63. S H Ahmad, M Liu, T Javidi, Q Zhao, B.
    Krishnamachari “Optimality of Myopic Sensing in Multi-Channel Opportunistic Access. IEEE Transactions on Information Theory, 2009
    22
  64. Z Nutov.
    Approximating Minimum Cost Connectivity Problems via Uncrossable Bifamilies and Spider-Cover Decompositions. In Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science (FOCS, 2009
    22
  65. H Lu, W Pan, N D Lane, T Choudhury, A T Campbell.
    Soundsense: scalable sound sensing for people-centric applications on mobile phones. In ACM Mobisys, 2009
    22
  66. A F Smeaton, P Over, W Kraaij.
    High-level feature detection from video in TRECVid: a 5-year retrospective of achievements. in Multimedia Content Analysis, ser. Signals and Communication Technology, 2009
    22
  67. S Auer, S Dietzold, J Lehmann, S Hellmann, D Aumueller.
    Triplify: Light-Weight Linked Data Publication from Relational Databases. In WWW ’09: Proceedings of the 18th international conference on World wide web, 2009
    22
  68. Percy Liang, Michael I Jordan, Dan Klein.
    Learning semantic correspondences with less supervision. In ACL-IJCNLP, 2009
    22
  69. M Lettau, S C Ludvigson, J A Wachter.
    The Declining Equity Premium: What Role Does Macroeconomic Risk Play. Oxford University Press for Society for Financial Studies, 2009
    22
  70. J Condit, B Hackett, S K Lahiri, S Qadeer.
    Unifying type checking and property checking for low-level code. In POPL, 2009
    22
  71. B S P Dollar, C Wojek, P Perona.
    Pedestrian detection: A benchmark. In CVPR, 2009
    22
  72. T F Abdelzaher, K G Shin.
    Period-based load partitioning and assignment for large real-time applications. in Proceedings of the 15th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2009
    22
  73. H Telljohann, E W Hinrichs, S Kübler, H Zinsmeister, K Beck.
    Stylebook for the Tübingen Treebank of Written German (TüBa-D/Z. 2009
    22
  74. C Daskalakis, A Mehta, Papadimitriou.
    C.H.: A Note on Approximate Nash Equilibria. Theoretical Computer Science, 2009
    22
  75. N Bell, M Garland.
    Implementing sparse matrix-vector multiplication on throughput-oriented processors. in Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis, 2009
    21
  76. Moni Naor, Gil Segev.
    Public-key cryptosystems resilient to key leakage. In CRYPTO, 2009
    21
  77. D Ramage, D Hall, R Nallapati, C D Manning.
    Labeled lda: a supervised topic model for credit attribution in multi-labeled corpora. In Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 1 - Volume 1, EMNLP ’09, 2009
    21
  78. P Bahl, R Chandra, T Moscibroda, R Murty, M Welsh.
    White space networking with wi-fi like connectivity. In Proc. of ACM SIGCOMM, 2009
    21
  79. O Chum, M Perdoch, J Matas.
    Geometric min-hashing: Finding a (thick) needle in a haystack. In CVPR, 2009
    21
  80. J Meng, Paulson.
    L.C.: Lightweight relevance filtering for machine-generated resolution problems. Journal of Applied Logic, 2009
    21
  81. A Ghosh, T Roughgarden, Sundararajan.
    M.: Universally utility-maximizing privacy mechanisms. In: Proceedings of the 41st annual ACM symposium on Theory of computing. STOC ’09, 2009
    21
  82. J Rhodes, B Steinberg.
    Theq-theory of finite semigroups. Monographs in Mathematics, 2009
    21
  83. M Furr, J-h D An, J S Foster, M Hicks.
    Static type inference for Ruby. Proceedings of the ACM symposium on Applied Computing (SAC, 2009
    21
  84. V Rastogi, M Hay, G Miklau, D Suciu.
    Relationship privacy: output perturbation for queries with joins. In Symp. Principles of Database Systems (PODS, 2009
    21