Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. N Alon, J H Spencer.
    The Probabilistic Method. 1992
    1714
  2. B Boser, I Guyon, V Vapnik.
    A training algorithm for optimal margin classifiers. In Proceedings of the Fifth Annual Workshop on Computational Learning Theory, 1992
    1415
  3. R Want, A Hopper, V Falcao, J Gibbons.
    The Active Badge Location System. ACM Transactions on Information Systems, 1992
    1233
  4. Eugene Fama, F, Kenneth R French.
    The Cross-Section of Expected Stock Returns. Journal of Finance, 1992
    1228
  5. R Milner, J Parrow, D Walker.
    A calculus of mobile processes. I and II. Information and Computation, 1992
    1058
  6. A Tversky, D Kahneman.
    Advances in prospect theory: Cumulative representation of uncertainty. J. Risk Uncertainty, 1992
    1046
  7. R Dechter.
    Constraint Networks. In Encyclopedia of Artificial Intelligence, second edition, Wiley and Sons, 1992
    1007
  8. T von Eicken, D E Culler, S C Goldstein, K E Schauser.
    Active Messages: a mechanism for integrated communication and computation. In Proceedings of the 19th International Symposium on Computer Architecture, 1992
    992
  9. M A Hearst.
    Automatic acquisition of hyponyms from large text corpora. In: Proceedings of COLING’92, 1992
    977
  10. J Kistler, M Satyanarayanan.
    Disconnected operation in the Coda file system. ACM Transactions on Computer Systems, 1992
    959
  11. M Rosenblum, J K Ousterhout.
    The design and implementation of a log-structured file system. ACM Transactions on Computer Systems, 1992
    957
  12. R E Bryant.
    Symbolic Boolean Manipulation with Ordered Binary Decision Diagrams. ACM Computing Surveys, 1992
    940
  13. A S Tanenbaum, “Modern.
    Operating Systems. 1992
    939
  14. G K Wallace.
    The JPEG still picture compression standard. IEEE Trans. on Consumer Electronics, 1992
    935
  15. D Goldberg.
    Using collaborative filtering to weave an information tapestry. Communications of the ACM, 1992
    785
  16. L G Brown.
    A Survey of Image Registration Techniques. ACM Computing Surveys, 1992
    766
  17. P F Brown, V J Della-Pietra, P V deSouza, J C Lai, R L Mercer.
    Class-Based n-gram Models of Natural Language. Computational Linguistics, 1992
    737
  18. G Berry, G Gonthier.
    The ESTEREL synchronous programming language: Design, semantics, implementation. Science of Computer Programming, 1992
    723
  19. N Gregory Mankiw, David Romer, David Weil.
    A Contribution to the Empirics of Economic Growth. Quarterly Journal of Economics, 1992
    715
  20. B Selman, H J Levesque, D G Mitchell.
    A New Method for Solving Hard Satisfiability Problems. Proc. of AAAI-92, 1992
    705
  21. Douglass R Cutting, Jan O Pedersen, David Karger, John W Tukey.
    Scatter/gather: A cluster-based approach to browsing large document collections. Proceedings of the Fifteenth Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 1992
    677
  22. P Dourish, V Bellotti.
    Awareness and coordination in shared workspaces. In Proc. ACM Conf. Computer-Supported Cooperative Work (CSCW '92, 1992
    661
  23. J R Burch, E M Clarke, K L McMillan, D L Dill, L J Hwang.
    Symbolic model checking: 1020 states and beyond. I&C, 1992
    644
  24. A V Banerjee.
    A simple model of herd behavior. Quarterly Journal of Economics, 1992
    640
  25. Bertrand Meyer.
    Applying Design by Contract. IEEE Computer, 1992
    636
  26. R W Cottle, J S Pang, R E Stone.
    The Linear Complementarity Problem. 1992
    624
  27. D A Randell, Z Cui, A G Cohn.
    A spatial logic based on regions and connection. In Proceedings 3rd International Conference on Knowledge Representation and Reasoning, 1992
    616
  28. L Tassiulas, A Ephremides.
    Stability Properties of Constrained Queueing Systems and Scheduling for Maximum Throughput in Multihop Radio Networks. IEEE Transactions on Automatic Control, 1992
    604
  29. D Colton, R Kress.
    Inverse Acoustic and electromagnetic scattering theory. Applied Mathematical Sciences 93, 1992
    601
  30. J Bergen, P Anandan, K Hanna, R Hingorani.
    Hierarchical ModelBased Motion Estimation. In Proc. of the 2nd. European Conference on Computer Vision, 1992
    600
  31. William J Schroeder, Jonathan A Zarge, William E Lorensen.
    Decimation of triangle meshes. In SIGGRAPH ’92 Proc, 1992
    593
  32. J-W Klop.
    Term rewriting systems. Handbook of Logic in Computer Science, 1992
    582
  33. D H Wolpert.
    Stacked generalization. Neural Networks, Vol.5, No.2, 1992
    580
  34. D J C MacKay.
    Bayesian interpolation. Neural Computation, 1992
    578
  35. S Owre, J M Rushby, N Shankar.
    PVS: A prototype verification system. 11th International Conference on Automated Deduction (CADE), volume 607 of Lecture Notes in Artificial Intelligence, 1992
    570
  36. P Ekman.
    An argument for basic emotions. Cognition & Emotion, 1992
    556
  37. H Barendregt.
    Lambda calculi with types. in Handbook of Logic in Computer Science, 1992
    551
  38. D DeWitt, J Gray.
    Parallel database systems: the future of high performance database systems. Communications of the ACM, 1992
    550
  39. W J Dally.
    Virtual Channel Flow Control. IEEE Transactions on Parallel and Distributed Systems, 1992
    550
  40. A C Kakas, R A Kowalski, F Toni.
    Abductive Logic Programming. Journal of Logic and Computation, 1992
    549
  41. D D Clark, S Shenker, L Zhang.
    Supporting real-time applications in an integrated services packet networks: architecture and mechanism. In Proc. of ACM Sigcomm'1992, 1992
    540
  42. R R Coifman, M V Wickerhauser.
    Entropy-based Algorithms for Best Basis Selection. IEEE Trans. On Inf. Theory, 1992
    535
  43. Eric Brill.
    A Simple Rule-Based Part of Speech Tagger. In Third Conference on Applied Natural Language Processing. Proceedings of the Conference, 1992
    522
  44. Paul Dourish, Sara Bly.
    Portholes: Supporting Awareness in Distributed Work Groups. Proc. CHI’92 Human Factors in Computer Systems (Monterey. Ca, 1992
    503
  45. A Bairoch, B Boeckmann.
    The SWISS-PROT protein sequence data bank. Nucleic Acids Res, 1992
    484
  46. T C Mowry, M S Lam, A Gupta.
    Design and evaluation of compiler algorithm for prefetching. In Proc. International Conference on Architectural Support for Programming Languages and Operating Systems, 1992
    477
  47. B W Lampson, M Abadi, M L Burrows, E Wobber.
    Authentication in distributed systems: theory and practice. ACM Transactions on Computer Systems, 1992
    470
  48. A Chandrakasan, S Sheng, R Brodersen.
    Low-power cmos digital design. IEEE Journal of Solid-State Circuit, 1992
    467
  49. E P Simoncelli, W T Freeman, E H Adelson, D Heeger.
    Shiftable multiscale transforms. IEEE Trans. Inform. Theory, 1992
    465
  50. E Sentovich.
    A System for Sequential Circuit Synthesis. Memorandum No. UCB/ERL M92/41, Dept. EECS, 1992
    457
  51. H Kautz, B Selman.
    Planning as Satisfiability. In Proceedings of the Tenth European Conference on Artificial Intelligence, 1992
    456
  52. T ANDERSON, B BERSHAD, E LAZOSWKA, H LEVY.
    Scheduler activations: Effective kernel support for the user-level management of threads. ACM Transactions on Computer Systems, 1992
    450
  53. P Wilson.
    Uniprocessor Garbage Collection Techniques. Proceedings of the International Workshop on Memory Management, St, 1992
    448
  54. M A Just, P A Carpenter.
    A capacity theory of comprehension: individual differences in working memory. Psychological Review, 1992
    443
  55. J S Penberthy, D Weld.
    UCPOP: A Sound, Complete, Partial Order Planner for ADL. In Proc. KR-92, 1992
    443
  56. E C Freuder, R J Wallace.
    Partial constraint satisfaction. AI, 1992
    442
  57. P Keleher, A L Cox, W Zwaenepoel.
    Lazy Release Consistency for Software Distributed Shared Memory. in Proceedings of the 19th Annual International Symposium on Computer Architecture, 1992
    437
  58. S Mallat, W L Hwang.
    Singularity Detection and Processing with Wavelets. IEEE Trans on Inform. Theory, 1992
    434
  59. D J C Mackay.
    A Practical Bayesian Framework for Backpropagation Networks. Neural Computation, 1992
    429
  60. S Minton, M Johnston, A Philips, P Laird.
    Minimizing Conflicts: A Heuristic Repair Method for Constraint Satisfaction and Scheduling Problems. Artificial Intelligence, 1992
    427
  61. G Turk.
    Re-tiling Polygonal Surfaces. In SIGGRAPH 92, 1992
    412
  62. W Frawley, G Piatetsky-Shapiro, C Matheus.
    Knowledge discovery in databases: an overview. AI Magazine, 1992
    399
  63. D W Scott.
    Multivariate Density Estimation. 1992
    399
  64. Y Gavrieli, Y Sherman, S A Ben-Sasson.
    Identification of programmed cell death in situ via specific labeling of nuclear DNA fragmentation. Journal of Cell Biology, 1992
    389
  65. G J Tesauro.
    Practical issues in temporal difference learning. Machine Learning, 1992
    384
  66. D Lenoski, J Laudon, K Gharachorloo, W Weber, A Gupta, J Hennessy, M Horowitz, M Lam.
    The Stanford DASH Multiprocessor. IEEE Computer, 1992
    383
  67. K Chan, G Karolyi, Francis Longsta¤, Anthony Sanders.
    An Empirical Comparison of Alternative Models of Short-Term Interest Rate. Journal of Finance, 1992
    381
  68. D Batory, S O’Malley.
    The Design and Implementation of Hierarchical Software Systems Using Reusable. Components”, ACM Trans. on Software Engineering and Methodology, 1992
    376
  69. S M Bellovin, M Merritt.
    Encrypted key exchange: Password-based protocols secure against dictionary attacks. In Proc. IEEE Symposium on Security and Privacy, 1992
    375
  70. O Faugeras, T Luong, S Maybank.
    Camera selfcalibration: theory and experiments. In Proc. 2nd ECCV, 1992
    371
  71. Doug Cutting, Julian Kupiec, Jan Pedersen, Penelope Sibun.
    A Practical Part-of-Speech Tagger. In Third Conference on Applied Natural Language Processing. Proceedings of the Conference, 1992
    370
  72. Bob Carpenter.
    The Logic of Typed Feature Structures. Tracts in Theoretical Computer Science, 1992
    364
  73. P Langley, W Iba, K Thompson.
    An Analysis of Bayesian Classifiers. Proceedings of the Tenth National Conference on Artificial Intelligence: 223–228, 1992
    361
  74. D Ferraiolo, R Kuhn.
    Role-based access control. in 15th National Computer Security Conference, 1992
    361
  75. S A Mahlke, D C Lin, W Y Chen, R E Hank, R A Bringmann.
    Effective compiler support for predicated execution using the hyperblock. in IEEE Micro, 1992
    357
  76. J Hutchings, H Somers.
    An introduction to machine translation. In Ed, 1992
    356
  77. James Callan, W Bruce Croft, Stephen M Harding.
    The inquery retrieval system. In Proceedings of the Third International Conference on Database and Expert Systems Applications, 1992
    354
  78. Y AMIR, D DOLEV, S KRAMER, D MALKI.
    Transis: A communication sub-system for high availability. In 22nd IEEE Fault-Tolerant Computing Symposium (FTCS, 1992
    347
  79. S Mahadevan, J Cornell.
    Automatic programming of behavior-based robots using reinforcement learning. Artificial Intelligence, 1992
    345
  80. S Anderson.
    A-Morphous Morphology. 1992
    345
  81. Jean-Marc Andreoli.
    Logic programming with focusing proofs in linear logic. J. of Logic and Computation, 1992
    344
  82. D J C MacKay.
    Information-based objective functions for active data selection. Neural Computation, 1992
    343
  83. H S Seung, M Opper, H Sompolinsky.
    Query by committee. In COLT ’92: Proceedings of the fifth annual workshop on Computational learning theory, 1992
    343
  84. A Brooke, D Kendrick, A Meeraus.
    GAMS A User’s Guide. 1992
    339
  85. William Landi, Barbara G Ryder.
    A safe approximate algorithm for interprocedural pointer aliasing. In Proceedings of the ACM SIGPLAN 1992 Conference on Programming Language Design and Implementation, 1992
    336
  86. J Tooby, L Cosmides.
    Psychological foundations of culture. In, 1992
    334
  87. M I Jordan, D E Rumelhart.
    Forward models: Supervised learning with a distal teacher. Cognitive Sciences, 1992
    331