Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. A K Parekh.
    A generalized processor sharing approach to flow control in integrated services network. Ph.D. dissertation, EECS Dept., M.I.T, 1992
    1492
  2. S H Muggleton.
    Inductive Logic Programming. 1992
    952
  3. R Want, A Hopper, V Falcao, J Gibbsons.
    The Active Badge location System. ACM Transactions on Information System, 1992
    915
  4. T von Eicken, D E Culler, S C Goldstein, K E Schauser.
    Active messages: a mechanism for integrated communication and computation. In International Symposium on Computer Architecture, 1992
    911
  5. B E Boser, I M Guyon, V N Vapnik.
    A training algorithm for optimal margin classifiers. In COLT, 1992
    896
  6. G Wiederhold.
    Mediation in the Architecture of Future Information Systems. IEEE Computer, 1992
    888
  7. J J Kistler, M Satyanarayanan.
    Disconnected Operation in the Coda File System. ACM Transactions on Computer Systems, 1992
    864
  8. G F Cooper, Herskovits.
    E.: A bayesian method for the induction of probabilistic networks from data. Machine Learning 9, 1992
    860
  9. J R Koza.
    Genetic programming. 1992
    801
  10. M Rosenblum, J Ousterhout.
    The Design and Implementation of a Log-Structured File System. ACM Trans. Comput. Syst, 1992
    796
  11. Tanenbaum.
    Modern Operating Systems. 1992
    767
  12. B Selman, H Levesque, D Mitchell.
    A new method for solving hard satisfiability problems. In Proceedings of the 10th National Conference on Artificial Intelligence, 1992
    616
  13. G Berry, G Gonthier.
    The Esterel synchronous programming language: Design, semantics, implementation. Science OfComputerProgramming, 1992
    606
  14. L Gottesfeld Brown.
    A survey of image registration techniques. ACM Computing Surveys, 1992
    579
  15. J W Klop.
    Term Rewriting Systems. Handbook of Logic in Computer Science, I:1–112, 1992
    545
  16. D Goldberg, D Nichols, B M Oki, D Terry.
    Using Collaborative Filtering to Weave an Information Tapestry. Communications of the ACM, 1992
    542
  17. H Hoppe, T DeRose, T Duchamp, J McDonald, W Stuetzle.
    Surface reconstruction from unorganized points. In Proc. of the 19th Annual Conf. on Computer Graphics and Interactive Techniques, 1992
    525
  18. J R Bergen, P Anandan, K J Hanna, R Hingorani.
    Hierarchical model-based motion estimation. In Proceedings of the Second European Conference on Computer Vision, 1992
    521
  19. Douglass R Cutting, David R Karger, Jan O Pedersen, John W Tukey.
    Scatter/gather: a cluster-based approach to browsing large document collections. In Proceedings of the 15th annual international ACM SIGIR conference on Research and development in information retrieval, SIGIR ’92, 1992
    511
  20. Peter F Brown, Vincent Della Pietra, Peter V deSouza, Jenifer C Lai, Robert L Mercer.
    Classbased n-gram models for natural language. Computational Linguistics, 1992
    506
  21. D D Clark, S Shenker, L Zhang.
    Supporting real-time applications in an integrated services packet network: Architecture and mechanism. ACM Computer Communication Review, 1992
    500
  22. E Kushilevitz.
    Privacy and communication complexity. SIAM J. Discrete Math, 1992
    493
  23. S Owre, J M Rushby, N Shankar.
    PVS: A prototype verification system. 11th International Conference on Automated Deduction (CADE, 1992
    490
  24. J R Burch, E M Clarke, K L McMillan, D L Dill, L J Hwang.
    Symbolic model checking: 10 20 states and beyond. Information and Computation, 1992
    473
  25. B Meyer.
    Applying “design by contract. Computer, 1992
    462
  26. H P Barendregt.
    Lambda calculi with types. 1992
    461
  27. D H Wolpert.
    Stacked generalization. Neural Networks, 1992
    453
  28. D DeWitt, J Gray.
    Parallel database systems: The future of high performance database systems. Communications of the ACM, 1992
    453
  29. T Mowry, M Lam, A Gupta.
    Design and evaluation of a compiler algorithm for prefetching. Proc. ASPLOS V, 1992
    450
  30. D A Randell, Z Cui, A G Cohn.
    A spatial logic based on regions and connection. Proc. of KR-92, 1992
    438
  31. T A Henzinger, X Nicollin, J Sifakis, Yovine.
    S.: Symbolic model checking for real-time systems. In: LICS, 1992
    437
  32. R W Cottle, J S Pang, R E Stone.
    The Linear Complementarity Problem. 1992
    435
  33. W J Dally.
    Virtual-channel Flow Control. IEEE Trans. On Parallel and Distributed system, 1992
    431
  34. Eric Brill.
    A simple rule-based part of speech tagger. In In Proceedings of the Third ACL Applied NLP, 1992
    425
  35. P Dourish, S Bly.
    Portholes: supporting awareness in distributed work group. Proc. of CHI1992, 1992
    425
  36. Thomas E Anderson, Brian N Bershad, Edward D Lazowska, Henry M Levy.
    Scheduler activations: Effective kernel support for user-level management of parallelism. ACM Transactions on Computer Systems, 1992
    418
  37. P Wadler.
    Comprehending monads. Mathematical Structures in Computer Science, 1992
    416
  38. P R Wilson.
    Uniprocessor garbage collection techniques. In IWMM ’92: Proceedings of the International Workshop on Memory Management, 1992
    415
  39. P Keleher, A L Cox, W Zwaenepoel.
    Lazy release consistency for software distributed shared memory. in Proc. Int. Symposium on Computer Architecture (ISCA, 1992
    410
  40. R Coifman, V Wickerhauser.
    Entropy-based algorithms for best basis selection. IEEE Trans. Inform. Theory, 1992
    407
  41. D J C MacKay.
    Bayesian interpolation. Neural Comput, 1992
    406
  42. E C Freuder, R J Wallace.
    Partial Constraint Satisfaction. Artificial Intelligence, 1992
    390
  43. D E Knuth.
    Literate Programming. The. 1992
    389
  44. J Penberthy, D S Weld.
    UCPOP: A sound, complete, partial order planner for ADL. In Proceedings of the Third International Conference on Knowledge Representation and Reasoning, 1992
    382
  45. D L Mills.
    Network Time Protocol (Version 3): Specification, Implementation and Analysis. 16] Net2Phone, [17] NetFlow, 1992
    375
  46. M R Genesereth, R E Fikes.
    Knowledge interchange format version 3.0 reference manual. 1992
    364
  47. E P Simoncelli, W T Freeman, E H Adelson, D J Heeger.
    Shiftable multi-scale transforms. IEEE Trans Information Theory, Special Issue on Wavelets, 1992
    363
  48. Dan Lenoski, James Laudon, Kourosh Gharachorloo, Wolf-Dietrich Weber, Anoop Gupta, John Hennessy, Mark Horowitz, Monica S Lam.
    The Stanford Dash multiprocessor. IEEE Computer, 1992
    357
  49. Greg Turk.
    Re-tiling polygonal surfaces. Computer Graphics (SIGGRAPH 92 Proceedings, 1992
    356
  50. S Minton, Philips A B Johnston, P Laird.
    Minimizing conflicts: a heuristic repair method for constraint satisfaction and scheduling problems. Artificial Intelligence, 1992
    353
  51. E M Sentovich, K J Singh, L Lavagno, C Moon, R Murgai, A Saldanha, H Savoj, P R Stephan, R K Brayton, A L Sangiovanni-Vincentelli.
    SIS: A System for Sequential Circuit Synthesis. 1992
    350
  52. H Kautz, B Selman.
    Planning as satisfiability. European Conference on Artificial Intelligence, 1992
    350
  53. Y Amir, D Dolev, S Kramer, D Malkhi.
    Transis: A communication subsystem for high availability. In Proc. of the Twenty-2nd Int. Symp. on Fault-Tolerant Computing, 1992
    336
  54. D MacKay.
    A practical Bayesian framework for backpropagation networks. Neural Computation, 1992
    335
  55. Olivier D Faugeras, QuangTuan Luong, Stephen J Maybank.
    Camera self-calibration: Theory and experiments. In European Conference on Computer Vision, 1992
    332
  56. G J Tesauro.
    Practical issues in temporal difference learning. Learn. 8, 1992
    331
  57. Vipin Kumar.
    Algorithms for constraint satisfaction problems: a survey. Artificial Intelligence Magazine, 1992
    327
  58. S A Mahlke, D C Lin, W Y Chen, R E Hank, R A Bringmann, W W Hwu.
    ªEffective Compiler Support for Predicated Execution Using the Hyperblock,º. Proc. 25th Ann. ACM/IEEE Int'l Symp. Microarchitecture, 1992
    318
  59. W Landi, B Ryder.
    A safe approximate algorithm for interprocedural pointer aliasing. In Programming Language Design and Implementation (PLDI, 1992
    314
  60. S Mahadevan, J Connell.
    Automatic programming of behavior-based robots using reinforcement learning. Artificial Intelligence, 1992
    313
  61. D Cutting, J Kupieg, J Pedersen, P Sibun.
    A pratical part-of-speech tagger. In Third Conference on Applied Natural Language Processing, 1992
    312
  62. J Callan, W B Croft, S M Harding.
    The inquery retrieval system. In DEXA, 1992
    307
  63. H E Bal, M F Kaashoek, A S Tanenbaum.
    Orca: A Language For Parallel Programming of Distributed Systems. IEEE Transactions on Software Engineering, 1992
    307
  64. S Hiranandani, K Kennedy, C Tseng.
    Compiling Fortran D for MIMD distributed-memory machines. Commun. ACM, 1992
    305
  65. B Carpenter.
    The Logic of Typed Feature Structures. 1992
    295
  66. W Frawley Frawley, G Piatetsky-Shapiro, C Matheus.
    Knowledge Discovery in Databases: An Overview. AI Magazine, Fall, 1992
    293
  67. B Shneiderman.
    Tree visualization with tree-maps: 2-d space-filling approach. ACM Transactions on Graphics, 1992
    292
  68. D Scott.
    Multivariate Density Estimation. 1992
    290
  69. J-M Andreoli.
    Logic Programming with Focusing Proofs in Linear Logic. J. Logic Comput, 1992
    284
  70. P LANGLEY, W IBA.
    An Analysis of Bayesian Classifiers. Proceedings of the 10 th National Conference on Artificial Intelligence, 1992
    275
  71. C Mohan, D J Haderle, B G Lindsay, H Pirahesh, P M Schwarz.
    ARIES: a transaction recovery method supporting fine-granularity locking and partial rollbacks using write-ahead logging. ACM TODS, 1992
    275
  72. W Hutchins, H Somers.
    An introduction to machine translation. 1992
    269
  73. R Hastings, B Joyce.
    Purify: Fast detection of memory leaks and access errors. In Winter USENIX, 1992
    265
  74. T-Y Yeh, Y N Patt.
    Alternative implementations of two-level adaptive branch prediction. In Proceedings of the 19th Annual International Symposium on Computer Architecture (ISCA, 1992
    263
  75. P Cousot, R Cousot.
    Abstract interpretation and application to logic programs. Journal of Logic Programming, 1992
    260
  76. J Mylopoulos, L Chung, B Nixon.
    Representing and using non-functional requirements: a process-oriented approach. IEEE Transactions on Software Engineering, 1992
    259
  77. D F Ferraiolo, D R Kuhn.
    Role-based access control. In Proc. National Computer Security Conference, 1992
    258
  78. J Wilhelms, A V Gelder.
    Octrees for faster isosurface generation. ACM Transactions on Graphics, 1992
    254
  79. D Yarowsky.
    Word-sense disambiguation using statistical models of roget’s categories trained on large corpora. In Proceedings of the 15th International Conference on Computational Linguistics, 1992
    254
  80. R I Hartley.
    Estimation of relative camera positions for uncalibrated cameras. Computer Vision - ECCV '92, 1992
    251
  81. M I Jordan, D E Rumelhart.
    Forward models: supervised learning with a distal teacher. Cognitive Science, 1992
    241
  82. R T Medina-Mora, T Winograd, R Flores, F Flores.
    The action Workflow Approach to Workflow Management. Kraut (Eds.), Proceedings of the 4 th Conference on Computer Supported Cooperative Work. ACM, 1992
    240
  83. C Ahlberg, C Williamson, B Shneiderman.
    Dynamic queries for information exploration: An implementation and evaluation. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, 1992
    238
  84. H S Seung, M Opper, H Sompolinsky.
    Query by committee. In COLT’92, 1992
    236
  85. D MacKay.
    Information-based objective functions for active data selection. Neural Computation, 1992
    235
  86. T Larrabee.
    Test pattern generation using Boolean satisfiability. IEEE Transactions on Computer-Aided Design, 1992
    228
  87. Whitfield Diffie, Paul C van Oorschot, Michael J Wiener.
    Authentication and authenticated key exchanges. Designs, Codes, and Cryptography, 1992
    228
  88. C A Waldspurger, T Hogg, B A Huberman, J O Kephart, W S Stornetta.
    Spawn: a distributed computational economy. Tran. on Software Engineering, 1992
    227
  89. N Alon, O Goldreich, J H˚astad, R Peralta.
    Simple construction of almost kwise independent random variables. Random Structures and Algorithms. BR94] [CG88] [CW79] M. Bellare and, 1992
    227
  90. Fernando Pereira, Yves Schabes.
    Inside-outside reestimation from partially bracketed corpora. In Proceedings of the 30th Annual Meeting of the Association for Computational Linguistics, 1992
    225