Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. C Matuszek, N FitzGerald, L Zettlemoyer, L Bo, D Fox.
    A joint model of language and perception for grounded attribute learning. In Proceedings of the International Conference on Machine Learning, 2012
    22
  2. M Hardt, K Ligett, F McSherry.
    A simple and practical algorithm for differentially private data release. In Proc. NIPS, 2012
    22
  3. D Hofheinz, E Kiltz.
    Programmable hash functions and their applications. In Journal of Cryptology, 2012
    21
  4. Y Zhang, A Juels, M K Reiter, T Ristenpart.
    Cross-VM side channels and their use to extract private keys. in CCS, 2012
    21
  5. G Elek.
    Full groups and so. 2012
    21
  6. W Wu, H Li, H Wang, K Q Zhu.
    Probase: a probabilistic taxonomy for text understanding. SIGMOD, 2012
    21
  7. J Galí, F Smets, R Wouters.
    Unemployment in an Estimated New Keynesian Model. University of Chicago, 2012
    21
  8. Kun Duan, Devi Parikh, David Crandall, Kristen Grauman.
    Discovering localized attributes for fine-grained recognition. In Computer Vision and Pattern Recognition. IEEE, 2012
    21
  9. J Sturm, N Engelhard, F Endres, W Burgard, D Cremers.
    A benchmark for the evaluation of rgb-d slam systems. In Intelligent Robots and Systems (IROS), IEEE/RSJ International Conference on, 2012
    21
  10. T H Austin, C Flanagan.
    Multiple facets for dynamic information flow. In Proceedings of the 39th Symposium on Principles of Programming Languages, 2012
    21
  11. B Ager, N Chatzis, A Feldmann, N Sarrar, S Uhlig, W Willinger.
    Anatomy of a large european ixp. In Proc. of ACM SIGCOMM, 2012
    21
  12. A Thomson, T Diamond, S- C Weng, K Ren, P Shao, D J Calvin Abadi.
    fast distributed transactions for partitioned database systems. In SIGMOD, 2012
    20
  13. D Hedin, A Sabelfeld.
    Information-flow security for a core of JavaScript. In 25th IEEE Computer Security Foundations Symposium (CSF, 2012
    20
  14. J Bergstra, Y Bengio.
    Random search for hyper-parameter optimization. 2012
    20
  15. D MERRILL, M GARLAND, A GRIMSHAW.
    Scalable gpu graph traversal. In Principles and Practice of Parallel Programming (PPoPP, 2012
    20
  16. G Raskutti, M Wainwright, B Yu.
    Minimax-optimal rates for sparse additive models over kernel classes via convex programming. Journal of Machine Learning Research (JMLR, 2012
    20
  17. H Wang, S Sen, A Elgohary, M Farid, M Youssef, R R Choudhury.
    No need to war-drive: unsupervised indoor localization. InMobiSys, 2012
    20
  18. S Weiss, M W Achtelik, S Lynen, M Chli, R Siegwart.
    Realtime onboard visual-inertial state estimation and self-calibration of MAVs in unknown environment. in Proc. IEEE Int. Conf, 2012
    20
  19. Z Liu, Y Chen, C Bash, A Wierman, D Gmach, Z Wang, M Marwah, C Hyser.
    Renewable and cooling aware workload management for sustainable data centers. In Sigmetrics, 2012
    20
  20. J Lin, S Amini, J I Hong, N Sadeh, J Lindqvist, J Zhang.
    Expectation and purpose: understanding users’ mental models of mobile app privacy through crowdsourcing. In ACM Ubicomp, 2012
    20
  21. Andrea Beltratti, René Stulz.
    The credit crisis around the globe: Why did some banks perform better. Journal of Financial Economics, 2012
    20
  22. U Jermann, V Quadrini.
    Macroeconomic effects of financial shocks. American Economic Review, 2012
    20
  23. J R Mayer, J C Mitchell.
    Third-Party Web Tracking Policy and Technology. Proceedings of the 2012 IEEE Symposium on Security and Privacy, 2012
    20
  24. H Gao, J Tang, H Liu.
    Exploring social-historical ties on location-based social networks. In Proceedings of ICWSM’12, 2012
    19
  25. W Lasecki, C Miller, A Sadilek, A Abumoussa, D Borrello, R Kushalnagar, J Bigham.
    Real-time captioning by groups of non-experts. In UIST, ACM, 2012
    19
  26. M Valstar, M Pantic.
    Fully Automatic Recognition of the Temporal Phases of Facial Actions. IEEE Trans. Systems, Man, and Cybernetics, Part B: Cybernetics, 2012
    19
  27. P Gardner, S Maffeis, G D Smith.
    Towards a program logic for JavaScript. In Proc. POPL-39, 2012
    19
  28. E Hazan.
    The convex optimization approach to regret minimization. In Optimization for Machine Learning, chapter 10, 2012
    19
  29. C Baumeister, G Peersman.
    The Role of Time-Varying Price Elasticities in Accounting for Volatility Changes in the Crude Oil Market. Journal of Applied Econometrics, 2012
    19
  30. T Whelan, J McDonald, M Kaess, M F H Johannsson, J J Leonard.
    Kintinuous: Spatially Extended KinectFusion. Paper presented at the RSS Workshop on RGB-D: Advanced Reasoning with Depth Cameras, 2012
    19
  31. M Lin, Z Liu, A Wierman, L L H Andrew.
    Online algorithms for geographical load balancing. in Proc. Int. Green Computing Conf, 2012
    19
  32. C Y Hong, M Caesar, P Godfrey.
    Finishing Flows Quickly with Preemptive Scheduling. 2012
    19
  33. Y Kwon, M Balazinska, B Howe, J Rolia.
    SkewTune: Mitigating skew in mapreduce applications. In Proc. of the ACM SIGMOD, 2012
    19
  34. F Stulp, O Sigaud.
    Path integral policy improvement with covariance matrix adaptation. in Proceedings of the Twenty-Ninth International Conference on Machine Learning, 2012
    19
  35. Y Cai, C Daskalakis, M Weinberg.
    An algorithmic characterization of multidimensional mechanisms. 2012
    19
  36. B I P Rubinstein, P L Bartlett, L Huang.
    Learning in a large function space: Privacy-preserving mechanisms for svm learning. Journal of Privacy and Confidentiality, 2012
    19
  37. Canlin Li, Min Wei.
    Term Structure Modelling with Supply Factors and the Federal Reserve’s Large Scale Asset. Purchase Programs,” Finance and Economics Discussion Series 2012-37, Federal Reserve Board, 2012
    19
  38. P Li, Y Fu, U Mohammed, J H Elder, S J D Prince.
    Probablistic models for inference about identity. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2012
    19
  39. P KELLEY, S CONSOLVO, L CRANOR, J JUNG, N SADEH, D WETHERALL.
    An conundrum of permissions: Installing applications on an android smartphone. InWorkshop on Usable Security. 2012
    18
  40. S Yoo, M Harman.
    Regression testing minimisation, selection and prioritisation: A survey. Software Testing, Verification, and Reliability, 2012
    18
  41. M D Smucker, C L Clarke.
    Time-based calibration of effectiveness measures. In Proceedings of the 35th ACM conference on research and development in information retrieval (SIGIR, 2012
    18
  42. I Stanton, G Kliot.
    Streaming graph partitioning for large distributed graphs. in Proc. of 18th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, 2012
    18
  43. Raj Chetty, John N Friedman, Emmanuel Saez.
    Using Differences in Knowledge Across Neighborhoods to Uncover the. Impacts of the EITC on Earnings.” NBER Working Paper 18232, National Bureau of Economic Research, 2012
    18
  44. Z Weinberg, J Wang, V Yegneswaran, L Briesemeister, S Cheung, F Wang, D Boneh.
    StegoTorus: A Camouflage Proxy for the Tor Anonymity System. In CCS, 2012
    18
  45. Valentin I Spitkovsky, Angel X Chang.
    A cross-lingual dictionary for english wikipedia concepts. In LREC, 2012
    18
  46. S Gulwani, W R Harris, R Singh.
    Spreadsheet data manipulation using examples. Commun. ACM, 2012
    18
  47. X Cao, Y Wei, F Wen, J Sun.
    Face alignment by explicit shape regression. In CVPR, 2012
    18
  48. JG Andrews, H Claussen, M Dohler, S Rangan, M Reed.
    Femtocells: past, present, and future. Selected Areas Commun. IEEE J, 2012
    17
  49. F Metze, E Barnard, M Davel, C van Heerden, X Anguera, G Gravier, N Rajput.
    The spoken web search task. In MediaEval 2012 Workshop, 2012
    17
  50. W Wang, K Macherey, W Macherey, F J Och, P Xu.
    Improved domain adaptation for statistical machine translation. In AMTA, 2012
    17
  51. H Moghaddam, B Li, M Derakhshani, I Goldberg.
    SkypeMorph: Protocol Obfuscation for Tor Bridges. In CCS, 2012
    17
  52. F Roesner, T Kohno, D Wetherall.
    Detecting and defending against third-party tracking on the web. In NSDI’12: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation. USENIX Association, 2012
    17
  53. G Cormode, M Mitzenmacher, J Thaler.
    Practical verified computation with streaming interactive proofs. In ITCS ’12: Proceedings of the 3rd Symposium on Innovations in Theoretical Computer Science, 2012
    17
  54. Y Breitbart, C Y Chong, M Garofalakis, R Rastogi, A Silberschatz.
    Efficiently monitoring bandwidth and latency in IP networks. In IEEE INFOCOM 2001, 933-942 202 Y. Pan et al. / Journal of Information & Computational Science 9, 2012
    17
  55. E Nordstrom.
    Serval: An End-Host Stack for Service-Centric Networking. In USENIX NSDI, 2012
    17
  56. A J-B Chaney, D M Blei.
    Visualizing topic models. In ICWSM, 2012
    17
  57. G Duranton, M A Turner.
    Urban Growth and Transportation. The Review of Economic Studies, 2012
    17
  58. C Le Goues, T Nguyen, S Forrest, Weimer.
    W.: GenProg: A generic method for automatic software repair. IEEE Trans. on Soft. Eng, 2012
    17
  59. O Abdel-Hamid, A Mohamed, H Jiang, G Penn.
    Applying convolutional neural networks concepts to hybrid NN-HMM model for speech recognition. in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP, 2012
    17
  60. L POPA, G KUMAR, M CHOWDHURY, A KRISHNAMURTHY, S RATNASAMY, I STOICA.
    Faircloud: sharing the network in cloud computing. In SIGCOMM, 2012
    17
  61. D Dolev, D Feitelson, J Halpern, R Kupferman, N Linial.
    No justified complaints: On fair sharing of multiple resources. in Proc. ACM ITCS, 2012
    17
  62. H Hassanieh, P Indyk, D Katabi, E Price.
    Simple and practical algorithm for sparse Fourier transform. 2012
    17
  63. M Obstfeld.
    Financial Flows, Financial Crises, and Global Imbalances. Journal of International Money and Finance, 2012
    17
  64. R WANG, S CHEN, X WANG.
    Signing me onto your accounts through Facebook and Google: a traffic-guided security study of commercially deployed single-sign-on web services. In Proceedings of the IEEE Symposium on Security and Privacy, 2012
    17
  65. Y CHEN, ET AL.
    Interactive analytical processing in big data systems: A cross-industry study of mapreduce workloads. International Conference on Very Large Databases (VLDB, 2012
    17
  66. Kook Jin Ahn, Sudipto Guha, Andrew McGregor.
    Graph sketches: sparsification, spanners, and subgraphs. In PODS, 2012
    17
  67. J Tang, H Gao, H Liu.
    mTrust: discerning multi-faceted trust in a connected world. In WSDM, 2012
    17
  68. Y Altmann, A Halimi, N Dobigeon, J-Y Tourneret.
    Supervised nonlinear spectral unmixing using a post-nonlinear mixing model for hyperspectral imagery. IEEE Trans. Image Processing, 2012
    17
  69. N Heninger, Z Durumeric, E Wustrow, J A Halderman.
    Mining your Ps and Qs: Detection of widespread weak keys in network devices. In 21st USENIX Security Symposium, 2012
    17
  70. S Shekhar, M Dietz, D S Wallach.
    Adsplit: separating smartphone advertising from applications. in ‘Proceedings of the 21st USENIX conference on Security symposium’, Security’12, USENIX Association, 2012
    17
  71. A Sadilek, H A Kautz, V Silenzio.
    Modeling Spread of Disease from Social Interactions. In Sixth AAAI International Conference on Weblogs and Social Media (ICWSM, 2012
    16
  72. M Fratzscher.
    Capital flows, push versus pull factors and the global financial crisis. Journal of International Economics, 2012
    16
  73. G Adomavicius, Y Kwon.
    Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques. IEEE Transactions on Knowledge and Data Engineering (TKDE, 2012
    16
  74. A ROSE, M A SPIEGEL.
    Cross-country causes and consequences of the 2008 crisis: early warning. Japan and the World Economy, 2012
    16
  75. M J F Gales, S Watanabe, E Fosler-Lussier.
    Structured discriminative models for speech recognition: An overview. IEEE Signal Processing Mag, 2012
    16
  76. J D Collins, D M Tullsen, H Wang.
    Control flow optimization via dynamic reconvergence prediction. In IEEE/ACM International Symposium on Microarchitecture, 2012
    16
  77. T Thüm, S Apel, C Kästner, M Kuhlemann, I Schaefer, G Saake.
    Analysis strategies for software product lines,” tech. 2012
    16
  78. M Eitz, J Hays, M Alexa.
    How do humans sketch objects. SIGGRAPH, 2012
    16
  79. Sergio Cabello.
    Many distances in planar graphs. Algorithmica, 2012
    16
  80. A Ferguson, P Bodik, S Kandula, E Boutin, R Fonseca.
    Jockey: guaranteed job latency in data parallel clusters. In EuroSys, 2012
    16
  81. William Blacoe, Mirella Lapata.
    A comparison of vector-based representations for semantic composition. In Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, 2012
    16
  82. M Davies, Y Eldar.
    Rank awareness in joint sparse recovery. IEEE Trans. Inf. Theory, 2012
    16
  83. Stephen Roller, Michael Speriosu, Sarat Rallapalli, Benjamin Wing, Jason Baldridge.
    Supervised text-based geolocation using language models on an adaptive grid. In Proc. of EMNLP-CoNLL, 2012
    16