Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. S Floyd, V Jacobson.
    Random Early Detection Gateways for Congestion Avoidance. IEEE/ACM Transactions on Networking, 1993
    1908
  2. T R Gruber.
    A Translation Approach to Portable Ontology Specifications. Knowledge Acquisition, 1993
    1828
  3. Mitchell P Marcus, Beatrice Santorini, Mary Ann Marcinkiewicz.
    Building a large annotated corpus of English: The Penn Treebank. Computational Linguistics, 1993
    1587
  4. Will E Leland, Murad S Taqq, Walter Willinger, Daniel V Wilson.
    On the selfsimilar nature of Ethernet traffic. In Deepinder P. Sidhu, editor, ACM SIGCOMM, 1993
    1567
  5. M Bellare, Rogaway.
    P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security, 1993
    1091
  6. C Berrou, A Glavieux, P Thitimasjshima.
    Near Shannon Limit Error-Correcting Coding and Decoding. Turbo Codes,”Proceedings of the IEEE International Conference on Communications, 1993
    957
  7. L Zhang, S Deering, D Estrin, S Shenker, D Zappala.
    Rsvp: A new resource reservation protocol. In IEEE Network, 1993
    882
  8. P F Brown, S A Della Pietra, V J Della Pietra, R L Mercer.
    The mathematics of statistical machine translation: Parameter estimation. Computational Linguistics, 1993
    845
  9. S G Mallat, Z Zhang.
    Matching pursuits with time-frequency dictionaries. IEEE Trans. on Signal Proc, 1993
    648
  10. R Harper, F Honsell, G Plotkin.
    A framework for defining logics. J. ACM, 1993
    622
  11. Robert Wahbe, Steven Lucco, Thomas E Anderson, Susan L Graham.
    Efficient software-based fault isolation. In Proc. 14th ACM Symp. on Operating System Principles, 1993
    619
  12. Ted Dunning.
    Accurate methods for the statistics of surprise and coincidence. Comput. Linguist, 1993
    618
  13. G Graefe.
    Query evaluation techniques for large databases. ACM Computing Surveys, 1993
    590
  14. Eugene Fama, Kenneth R French.
    Common risk factors in the returns on stocks and bonds. Journal of Financial Economics, 1993
    585
  15. D L Donoho.
    De-Noising by Soft Thresholding. IEEE Trans. Info. Theory, 1993
    515
  16. J Hobbs, M Stickel, D Appelt, P Martin.
    Interpretation as abduction. Artificial Intelligence, 1993
    506
  17. Kenneth P Birman.
    The process group approach to reliable distributed computing. Communication ACM, 1993
    498
  18. M Riedmiller, Braun.
    H.: A direct adaptive method for faster backpropagation learning: the RPROP algorithm. In: Proceedings of the ICNN, 1993
    492
  19. Marshall Kirk McKusick, William Joy, Sam Leffler, R S Fabry.
    A Fast File System for UNIX. San Diego, CA 17 Systems, 1993
    476
  20. D Culler, R Karp, D Patterson, A Sahay, K E Schauser, E Santos, R Subramonian, T von.
    Eicken, “LogP: towards a realistic model of parallel computation. in Proceedings of the fourth ACM SIGPLAN symposium on Principles and practice of parallel programming, ser. PPOPP ’93, 1993
    466
  21. C Cruz-Neira, D J S, T DeFanti.
    Surround-screen projection-based virtual reality: the design and implementation of the CAVE. in Proceedings of the 20th annual conference on Computer graphics and interactive techniques, 1993
    463
  22. S E CHEN, L WILLIAMS.
    View interpolation for image synthesis. In Proc. ACM SIGGRAPH 93, 1993
    459
  23. F Pereira, N Tishby, L Lee.
    Distributional clustering of English words. In Proc. of the 31st Annual Meeting of the Association for Computational Linguistics, 1993
    459
  24. A C Kakas, R A Kowalski, F Toni.
    Abductive logic programming. Journal of Logic and Computation, 1993
    456
  25. R Brunelli, Poggio.
    T.: Face recognition: features versus templates. IEEE Trans. Pattern Anal. Mach. Intell, 1993
    452
  26. S McCanne, V Jacobson.
    The BSD packet filter: A new architecture for user-level packet capture. in Proc. Winter USENIX Tech. Conf, 1993
    432
  27. L M Ni, P K McKinley.
    A survey of wormhole routing techniques in direct networks. Computer, 1993
    425
  28. M Lades J C Vorbruggen, J Buhmann, J Lange, C von der Malsburg, R P Wurtz, W Konen.
    Distortion invariant object recognition in the dynamic link architecture. IEEE Trans. on Computers, 1993
    415
  29. D Huttenlocher, G Klanderman, W Rucklidge.
    Comparing images using the Hausdorff distance. Transactions on Pattern Analysis and Machine Intelligence, 1993
    398
  30. M Bellare, P Rogaway.
    Entity Authentication and Key Distribution. In CRYPTO 1993, volume 773/1993 of LNCS, 1993
    380
  31. C M Fonseca, P J Fleming.
    Genetic algorithms for multiobjective optimization: formulation, discussion and generalization. Proc. of the Fifth International Conference on Genetic Algorithms, 1993
    379
  32. Anne Dardenne, Axel van Lamsweerde, Stephen Fickas.
    Goal-directed requirements acquisition. Sci. Comput. Program, 1993
    366
  33. Rakesh Agrawal, Christos Faloutsos, Arun Swami.
    Efficient similarity search in sequence databases, volume 8958546. 1993
    356
  34. M Gelfond, V Lifschitz.
    Representing action and change by logic programs. Journal of Logic Programming, 1993
    354
  35. R Davidson, J G Mackinnon.
    Estimation and Inference in Econometrics. 1993
    346
  36. E A Bier, M C Stone, K Pier, W Buxton, T D DeRose.
    Toolglass and magic lenses: the see-through interface. In Proc. SIGGRAPH, 1993
    330
  37. M L Ginsberg.
    Dynamic Backtracking. Journal of Artificial Intelligence Research, 1993
    324
  38. J F Cardoso, A Souloumiac.
    Blind beamforming for non-gaussian signals. IEE Proceedings - F, 1993
    323
  39. J S Liu, R Chen.
    Sequential Monte Carlo Methods for Dynamic Systems. Journal of the American Statistical Association, 1993
    322
  40. H Hoppe, T DeRose, T Duchamp, J McDonald, W Stuetzle.
    Mesh optimization. 1993
    318
  41. J-S R Jang.
    ANFIS: Adaptive-Network-Based Fuzzy Inference System. IEEE Trans. on Systems, Man and Cybern, 1993
    317
  42. Martín Abadi, Michael Burrows, Butler Lampson, Gordon Plotkin.
    A 36 for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 1993
    316
  43. R Alur, C Courcoubetis, T A Henzinger, P-H Ho.
    Hybrid automata: An algorithmic approach to the specification and verification of hybrid systems. Proceedings of the 1992 Hybrid Systems Conference, volume 736 of LNCS, 1993
    316
  44. Patrick Prosser.
    Hybrid Algorithms for the Constraint Satisfaction Problem. Computational Intelligence, 1993
    311
  45. J McCarthy.
    Notes on formalizing context. In: IJCAI’93, 1993
    306
  46. D AND TEMPERLEY SLEATOR, D.
    Parsing English with a link grammar. In Proceedings of the International Workshop on Parsing Technologies, 1993
    304
  47. H Muhlenbein, D Schlierkamp-Voosen.
    Predictive models for the breeder genetic algorithm, I: continuous parameter optimization. Evolutionary Computation, 1993
    295
  48. J V Guttag, J J Horning.
    Larch: Languages and tools for formal specification. 1993
    294
  49. M Blum, M Luby, R Rubinfeld.
    Self-testing/correcting with applications to numerical problems. in Proc. 22nd STOC, 1993
    291
  50. P Druschel, L L Peterson.
    Fbufs: a high-bandwidth cross-domain transfer facility. SIGOPS Oper. Syst. Rev, 1993
    288
  51. R M Amadio, L Cardelli.
    Subtyping recursive types. ACM Transactions on Programming Languages and Systems, 1993
    287
  52. Steven M Bellovin, Michael Merritt.
    Encrypted key exchange: Passwordbased protocols secure against dictionary attacks. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 1993
    286
  53. P Wellner.
    Interacting with paper on the DigitalDesk. Communications of the ACM, 1993
    285
  54. Y Arens, C Y Chee, C Hsu, C Knoblock.
    Retrieving and integrating data from multiple information sources. Int. Intelligent & Cooperative Information Systems 2(2, 1993
    284
  55. Michael F Cohen, John Wallace, Pat Hanrahan.
    Radiosity and realistic image synthesis. 1993
    283
  56. T Brinkhoff, H-P Kriegel, B Seeger.
    Efficient Processing of Spatial Joins using R-trees. Proceedings of ACM SIGMOD International Coigerence otz Management of Data, 1993
    282
  57. S Abramsky.
    Computational interpretations of linear logic. Theor. Comput. Sci, 1993
    271
  58. M Perrone, L N Cooper.
    When networks disagree: Ensemble methods for hybrid neural networks. in Neural Networks for Speech and Image Pressing, 1993
    262
  59. N Audsley, A Burns, M Richardson, K Tindell, A Wellings.
    Applying new scheduling theory to static priority preemptive scheduling. Software Engineering Journal, 1993
    260
  60. Donald Hindle, Mats Rooth.
    Structural ambiguity and lexical relations. Computational Linguistics, 1993
    256
  61. M J Carey, D J DeWitt, J F Naughton.
    The OO7 Benchmark. In Proc. ACM SIGMOD International Conference on Management of Data, 1993
    255
  62. J H Hartman, J K Ousterhout.
    The Zebra striped network file system. In Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles, 1993
    254
  63. R J van Glabbeek.
    The linear time – branching time spectrum II: The semantics of sequential systems with silent moves. of Lecture Notes in Computer Science, 1993
    253
  64. D Poole.
    Probabilistic Horn abduction and Bayesian networks. Artificial Intelligence, 1993
    250
  65. E J O’Neil, P E O’Neil, G Weikum.
    The LRU-K page replacement algorithm for database disk buffering. In SIGMOD, 1993
    250
  66. R Anderson.
    Why cryptosystems fail. In Proc. ACM CCS’93, 1993
    249
  67. M Basseville, I V Nikiforov.
    Detection of Abrupt Changes: Theory and Application. 1993
    247
  68. W W Hwu, S A Mahlke, W Y Chen, P P Chang, N J Warter, R A Bringmann, R G Ouellette, R E Hank, T Kiyohara, G E Haab, J G Holm, D M Lavery.
    ªThe Superblock: An Effective Technique for VLIW and Superscalar. Compilation,º J. Supercomputing, 1993
    247
  69. C Ruemmler, J Wilkes.
    UNIX disk access patterns. Proc. of the Winter 118 USENIX, 1993
    242
  70. N Agrawal, T Imielinski, A Swami.
    Database Mining: A Performance Perspective. IEEE Trans. Knowledge and Data Eng, 1993
    242
  71. R Krovetz.
    Viewing morphology as an inference process. In: SIGIR ’93: Proceedings of the sixteenth annual international ACM SIGIR conference on Research and development in information retrieval, pp 191–202, 1993
    233
  72. J M AND LAM ANDERSON, M S.
    Global optimizations for parallelism and locality on scalable parallel machines. In Proceedings of the SIGPLAN Conference on Programming Language Design and Implementation, 1993
    233
  73. C Flanagan, A Sabry, B Duba, M Felleisen.
    The essence of compiling with continuations. ACM SIGPLAN Notices, 1993
    233
  74. T-Y Yeh, Y N Patt.
    A comparison of dynamic branch predictors that use two levels of branch history. Proceedings of the 20th Intl. Symp. on Computer Architecture, 1993
    229
  75. Y Saad.
    A Flexible Inner-Outer Preconditioned GMRES Algorithm. SIAM Journal on Scientific Computing, 1993
    227
  76. C Consel, O Danvy.
    Tutorial notes on partial evaluation. In Proceedings of the 20th Annual Symposium on Principles of Programming Languages (POPL ’93, 1993
    225
  77. M Hwang, X Huang.
    Shared-distribution hidden Markov models for speech recognition. IEEE Transactions on Speech and Audio Processing, 1993
    224
  78. Richard M Murray, S Shankar.
    Sastry. Nonholonomic motion planning: Steering using sinusoids. IEEE Transactions on Automatic Control, 1993
    222
  79. M Tan.
    Multi-agent reinforcement learning: Independent vs. cooperative agents. In Proceedings of the Tenth International Conference on Machine Learning, 1993
    220
  80. F Smadja.
    Retrieving collocations from text: Xtract. Computational Linguistics, 1993
    219
  81. R I Bahar, E A Frohm, C M Gaona, G D Hachtel, E Macii, A Pardo, F Somenzi.
    Algebraic decision diagrams and their applications. In ICCAD, 1993
    219
  82. P Dayan, G Hinton.
    Feudal reinforcement learning. In Advances in Neural Information Processing Systems, 1993
    218
  83. J Naor, M Naor.
    Small-Bias Probability Spaces: Efficient Constructions and Applications. SIAM Journal of Computing (SICOMP, 1993
    218
  84. P Yianilos.
    Data structures and algorithms for nearest neighbor search in general metric spaces. in ACM-SIAM Symposium on Discrete Algorithms, 1993
    217
  85. R Alur, C Courcoubetis, D Dill.
    Model-checking in dense real-time. ISSN 0890-5401. URL http://portal.acm.org/ citation.cfm?id=178164.178166, 1993
    215
  86. N Greene, M Kass, G Miller.
    Hierarchical z-buffer visibility. In Proc. of ACM SIGGRAPH, 1993
    214