Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. M Briers, A Doucet, S Maskell.
    Smoothing algorithms for state–space models. Annals of the Institute of Statistical Mathematics, 2010
    16
  2. E A Di Paolo, M Rohde, H De Jaegher.
    Horizons for the enactive mind: Values, social interaction, and play. In, 2010
    16
  3. A G West, S Kannan, I Lee.
    Detecting Wikipedia vandalism via spatio-temporal analysis of revision metadata. In EUROSEC ‘10: Proceedings of the Third European Workshop on System Security, 2010
    16
  4. D Ramage, S Dumais, D Liebling.
    Characterizing microblogs with topic models. In ICWSM, 2010
    16
  5. S Kandula, R Mahajan, P Verkaik, S Agarwal, J Padhye, P Bahl.
    Detailed diagnosis in enterprise networks. In SIGCOMM, 2010
    16
  6. F Bry, S Schaffert, A Schroeder.
    A Contribution to the Semantics of Xcerpt, a Web Query and Transformation Language. Univ. Complutense de Madrid, 2010
    16
  7. E J Candès, Y Plan.
    Matrix completion with noise. Proceedings of the IEEE, 2010
    16
  8. N Swamy, J Chen, R Chugh.
    Enforcing stateful authorization and information flow policies in Fine. In Proceedings of ESOP, 2010
    16
  9. S Schoenmackers, O Etzioni, D S Weld, J Davis.
    Learning first-order Horn clauses from web text. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP 2010, 2010
    15
  10. Matthieu Bussière, Marcel Fratzscher, Gernot J Müller.
    Productivity Shocks, Budget Deficits and the Current Account. Journal of International Money and Finance, 2010
    15
  11. J TOGELIUS, G N YANNAKAKIS, K O STANLEY, C BROWNE.
    Search-based procedural content generation. In Applications of Evolutionary Computation, EvoApplicatons 2010. LNCS Series, 2010
    15
  12. Lars Birkedal, Kristian Støvring, Jacob Thamsborg.
    The category-theoretic solution of recursive metric-space quations. Theoretical Computer Science, 2010
    15
  13. C PITTER, M SCHOEBERL.
    A real-time java chip-multiprocessor. ACM Trans. Embedded Comput. Syst, 2010
    15
  14. E Cuervo, A Balasubramanian, D-k Cho, A Wolman, S Saroiu, R Chandra, P Bahl.
    Maui: making smartphones last longer with code offload. In Proceedings of the 8th international conference on Mobile systems, applications, and services, MobiSys ’10, 2010
    15
  15. J Burnim, K Sen.
    Asserting and Checking Determinism for Multithreaded Programs. Commun. ACM, 2010
    15
  16. L Dalessandro, M F Spear, M L Scott.
    NOrec: streamlining stm by abolishing ownership records. In PPoPP ’10: Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2010
    15
  17. Adrien Verdelhan.
    A habit-based explanation of the exchange rate risk premium. Journal of Finance, 2010
    15
  18. I Broustis, K Papagiannaki, S V Krishnamurthy, M Faloutsos, V P Mhatre.
    Measurement-driven guidelines for 802.11 WLAN design. IEEE/ACM Transactions on Networking, 2010
    15
  19. A Aviram, S-C Weng, S Hu, B Ford.
    Efficient system-enforced deterministic parallelism. In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI ’10, 2010
    15
  20. J Mudigonda, P Yalagandula, M Al-Fares, J C Mogul.
    COTS data-center ethernet for multipathing over arbitrary topologies. In NSDI, 2010
    15
  21. S N Artemov, M C Fitting.
    Justification logic. 2010
    15
  22. J P Bigham, C Jayant, H Ji.
    VizWiz: Nearly Real-time Answers to Visual Questions. 2010
    15
  23. K Rustan M Leino, Philipp Rümmer.
    A polymorphic intermediate verification language: Design and logical encoding. In TACAS, 2010
    15
  24. V Dang, W B Croft.
    Query reformulation using anchor text. 2010
    14
  25. Adrià de Gispert, Gonzalo Iglesias, Graeme Blackwood, Eduardo R Banga, William Byrne.
    Hierarchical phrase-based translation with weighted finite state transducers and shallow-n grammars. Computational Linguistics, 2010
    14
  26. U Fischbacher, S Gächter.
    Social preferences, beliefs, and the dynamics of free riding in public good experiments. American Economic Review, 2010
    14
  27. S Das, D Agrawal, A El.
    Abbadi. G-Store: A Scalable Data Store for Transactional Multi key. Access in the Cloud. In SoCC, 2010
    14
  28. M Veanes, P de Halleux, Tillmann.
    N.: Rex: Symbolic Regular Expression Explorer. In: ICST 2010. IEEE, Los Alamitos, 2010
    14
  29. U Fischbacher, S Gächter.
    Heterogeneous Social Preferences and the Dynamics of Free Riding in Public Goods. American Economic Review, 2010
    14
  30. M Cova, C Kruegel, G Vigna.
    Detection and Analysis of Drive-by-Download Attacks and Malicious JavaScript Code. In Proceedings of the International World Wide Web Conference (WWW, 2010
    14
  31. V Toubiana, A Narayanan, D Boneh, H Nissenbaum, S Barocas.
    Adnostic: Privacy preserving targeted advertising. in 17th Annual Network and Distributed System Security Symposium, NDSS, 2010
    14
  32. M Ozuysal, M Calonder, V Lepetit, P Fua.
    Fast Keypoint Recognition Using Random Ferns. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010
    14
  33. M Motoyama, K Levchenko, C Kanich, D McCoy, G M Voekler, Savage.
    S.: Re: CAPTCHAs - Understanding CAPTCHA-solving services in an economic context. In: USENIX Security Symposium, 2010
    14
  34. P Milgrom.
    Simplified mechanisms with an application to sponsored-search auctions. Games and Economic Behavior, 2010
    14
  35. D Damanik, R Killip, B Simon.
    Perturbations of orthogonal polynomials with periodic recursion coefficients. Annals of Math, 2010
    14
  36. C Grishman.
    Information extraction. Handbook of Computational Linguistics and Natural Language Processing, Wiley-Blackwell, 2010
    14
  37. S Gerrish, D Blei.
    A language-based approach to measuring scholarly impact. In International Conference on Machine Learning, 2010
    14
  38. Dekang Lin, Kenneth Church, Heng Ji, Satoshi Sekine, David Yarowsky, Shane Bergsma.
    New tools for web-scale N-grams. Kailash Patil, Emily Pitler, Rachel Lathbury, Vikram Rao, Kapil Dalwani, and Sushant Narsale, 2010
    14
  39. J Pearl.
    An introduction to causal inference. The International Journal of Biostatistics (online journal, 2010
    14
  40. C Àlvarez, M J Blesa, J Díaz, M J Serna, A Fernández.
    Adversarial models for priority-based networks. In Proceedings of the 29th IEEE International Conference on Computer Communications (INFOCOM, 2010
    14
  41. Murillo Campello, John R Graham, Campbell R Harvey.
    The real effects of financial constraints: Evidence from a financial crisis. Journal of Financial Economics, 2010
    14
  42. D Bates, A Barth, C Jackson.
    Regular expressions considered harmful in client-side XSS filters. In WWW, 2010
    14
  43. M D Bond, K E Coons, K S McKinley.
    Pacer: Proportional detection of data races. In PLDI, 2010
    13
  44. J Heathcote, F Perri, G Violante.
    Unequal we stand: An empirical analysis of economic inequality. in the United States, 1967-2006, Review of Economic Dynamics, 2010
    13
  45. M Boyer, K Skadron, W Weimer.
    Automated Dynamic Analysis of CUDA Programs. In Proceedings of 3rd Workshop on Software Tools for MultiCore Systems, 2010
    13
  46. M Giacobini, M Tomassini, A Tettamanzi, E Alba.
    Selection intensity in cellular evolutionary algorithms for regular lattices. 2005b) 123 Program Evolvable Mach, 2010
    13
  47. H Falaki, R Mahajan, S Kandula, D Lymberopoulos, R Govindan, D Estrin.
    Diversity in smartphone usage. In Proceedings of the 8th international conference on Mobile systems, applications, and services, MobiSys ’10, 2010
    13
  48. G Tsoumakas, I Katakis, I Vlahavas.
    Mining Multi-label Data. Data Mining and Knowledge Discovery Handbook, O. Maimon, L. Rokach (Ed.), Springer, 2010
    13
  49. E KALOGERAKIS, A HERTZMANN, K SINGH.
    Learning 3D mesh segmentation and labeling. ACM Trans. on Graphics (Proc. SIGGRAPH, 2010
    13
  50. George Danezis, Claudia Diaz, Paul Syverson.
    Anonymous communication. Handbook of Financial Cryptography, 2010
    13
  51. A Levin.
    A (2002) Taxonomy of large margin principle algorithms for ordinal regression problems. Journal of Machine Learning Research 6:1265–1295 Shashua, 2010
    13
  52. Jacob Eisenstein, Brendan O’Connor, Noah A Smith, Eric P Xing.
    A latent variable model for geographic lexical variation. In Empirical Natural Language Processing Conference (EMNLP, 2010
    13
  53. G A Vecchi C Deser, H Teng J Ma, andA T Wittenberg.
    Global warming pattern formation: Sea surface temperature and rainfall. J. Climate, 2010
    13
  54. J Koláˇr, Y Liu.
    Automatic sentence boundary detection in conversational speech: A cross-lingual evaluation on. English and Czech,” in Proc. ICASSP, 2010
    13
  55. V Kuncak, M Mayer, R Piskac, P Suter.
    Complete functional synthesis. In PLDI, 2010
    13
  56. David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert.
    Bonsai trees, or how to delegate a lattice basis. In EUROCRYPT, 2010
    13
  57. R N Neelamani, C E Krohn, J R Krebs, J K Romberg, M Deffenbaugh, J E Anderson.
    Efficient seismic forward modeling using simultaneous random sources and sparsity. Geophysics, 2010
    13
  58. Jacopo Urbani, Spyros Kotoulas, Jason Maassen, Frank van Harmelen, Henri E Bal.
    OWL Reasoning with WebPIE: Calculating the Closure of 100 Billion Triples. In ESWC, 2010
    13
  59. J Kennan.
    Private information, wage bargaining and employment fluctuations. Review of Economic Dynamics, 2010
    12
  60. M Pellizzari.
    Do Friends and Relatives Really Help in Getting a Good Job. Industrial and Labor Relations Review, 2010
    12
  61. E J Schwartz, T Avgerinos, Brumley.
    D.: All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP 2010, 2010
    12
  62. J Ross, L Irani, M S Silberman, A Zaldivar, B Tomlinson.
    Who are the crowdworkers?: shifting demographics in Mechanical Turk. In Proc. CHI 2010, 2010
    12
  63. A Begel, K Y Phang, T Zimmermann.
    Codebook: Discovering and exploiting relationships in software repositories. In ICSE, 2010
    12
  64. K Bhargavan, C Fournet, A D Gordon.
    Modular verification of security protocol code by typing. POPL, 2010
    12
  65. A Gargett, K Garoufi, A Koller, K Striegnitz.
    The GIVE-2 Corpus of Giving Instructions in Virtual Environments. In Proceedings of the 7th Conference on International Language Resources and Evaluation (LREC, 2010
    12
  66. G N Ali, P J Chiang, A K Mikkilineni, Chiu G T- C, E J Delp, J P Allebach.
    Application of Principal Components Analysis and Gaussian Mixture Models to Printer Identification. In Proceedings of the IS & T‟s NIP20: International Conference on Digital Printing Technologies, pages Volume 20, pp.301–305, Nov 2004. 14 Special Issue on “Recent Trends in Image Processing and Pattern Recognition” RTIPPR, 2010
    12
  67. Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir.
    Related-key cryptanalysis of the full aes-192 and aes-256. EUROCRYPT 2010, volume 6110 of LNCS, 2010
    12
  68. S Athey, G Ellison.
    Position auctions with consumer search. Forthcoming, Quarterly Journal of Economics, 2010
    12
  69. Jan Schwinghammer, Hongseok Yang, Lars Birkedal, François Pottier, Bernhard Reus.
    A semantic foundation for hidden state. Pages 2–17 of: International Conference on Foundations of Software Science and Computation Structures (FOSSACS). Lecture Notes in Computer Science, 2010
    12
  70. M Hardt, K Talwar.
    On the geometry of differential privacy. In Proc. of ACM Symposium on Theory of Computing (STOC, 2010
    12
  71. D Kondo, B Javadi, A Iosup, D Epema.
    The failure trace archive: Enabling comparative analysis of failures in diverse distributed systems. In IEEE/ACM CCGrid, 2010
    12
  72. T Naseem, H Chen, R Barzilay, M Johnson.
    Using universal linguistic knowledge to guide grammar induction. In Proc. of EMNLP, 2010
    12
  73. V W Zheng, Y Zheng, X Xie, Q Yang.
    Collaborative location and activity recommendations with gps history data. In Proceedings of 19th International World Wide Web Conference, Raleigh (NC),USA, 2010
    12
  74. F N Afrati, J D Ullman.
    Optimizing joins in a Map-Reduce environment. In Proceedings of the 13th International Conference on Extending Database Technology, 2010
    12
  75. D Hansen, B Shneiderman, M A Smith.
    Analyzing Social Media Networks with NodeXL: Insights from a Connected World. Information Systems Research, 2010
    12
  76. Peng Guan, Alexander Weiss, Alexandru O Bălan, Michael J Black.
    Estimating human shape and pose from a single image. In Proc. of the International Conference on Computer Vision, 2010
    12
  77. Y Chen, J W Vaughan.
    A new understanding of prediction markets via no-regret learning. In ACM Conference on Electronic Commerce (EC, 2010
    12
  78. N Dehak, P Kenny, R Dehak, P Dumouchel, P Ouellet.
    Front-end factor analysis for speaker verification. IEEE Transactions on Audio, Speech, and Language Processing, 2010
    12
  79. H Becker, M Naaman, L Gravano.
    Learning similarity metrics for event identification in social media. In WSDM’10, 2010
    12
  80. T Dinsdale-Young, M Dodds, P Gardner, M J Parkinson, V Vafeiadis.
    Concurrent abstract predicates. in ECOOP, 2010
    12
  81. H J Seo, P Milanfar, “Training-free.
    generic object detection using locally adaptive regression kernels. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010
    12
  82. B Heller, S Seetharaman, P Mahadevan, Y Yiakoumis, P Sharma, S Banerjee, N McKeown.
    ElasticTree: Saving energy in data center networks. in Proc. Networked Systems Design and Implementation, 2010
    12
  83. Tano Santos, Pietro Veronesi.
    Habit formation, the cross section of stock returns and the cash-flow risk puzzle. Journal of Financial Economics, 2010
    12
  84. A Gilbert, P Indyk.
    Sparse recovery using sparse matrices. Proceedings of IEEE, 2010
    12
  85. M ZAHARIA, M CHOWDHURY, M J FRANKLIN, S SHENKER, I STOICA.
    Spark: cluster computing with working sets. In Proceedings of HotCloud, 2010
    12
  86. Y Kim, D Han, O Mutlu, M Harchol-Balter.
    ATLAS: a scalable and high-performance scheduling algorithm for multiple memory controllers. In Proceedings of the 16th International Symposium on High Performance Computer Architecture (HPCA-16, 2010
    12