Most Cited Computer Science Articles
This list is generated from documents in the CiteSeer^{x} database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeer^{x} database, since the database is continuously updated.
All Years
 1990
 1991
 1992
 1993
 1994
 1995
 1996
 1997
 1998
 1999
 2000
 2001
 2002
 2003
 2004
 2005
 2006
 2007
 2008
 2009
 2010
 2011
 2012

Random Early Detection Gateways for Congestion Avoidance. IEEE/ACM Transactions on Networking, 19931908

A Translation Approach to Portable Ontology Specifications. Knowledge Acquisition, 19931828

Building a large annotated corpus of English: The Penn Treebank. Computational Linguistics, 19931587

On the selfsimilar nature of Ethernet traffic. In Deepinder P. Sidhu, editor, ACM SIGCOMM, 19931567

P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security, 19931091

Near Shannon Limit ErrorCorrecting Coding and Decoding. Turbo Codes,”Proceedings of the IEEE International Conference on Communications, 1993957

Rsvp: A new resource reservation protocol. In IEEE Network, 1993882

The mathematics of statistical machine translation: Parameter estimation. Computational Linguistics, 1993845

Foundations of Constraint Satisfaction. 1993711

Matching pursuits with timefrequency dictionaries. IEEE Trans. on Signal Proc, 1993648

A framework for defining logics. J. ACM, 1993622

Efficient softwarebased fault isolation. In Proc. 14th ACM Symp. on Operating System Principles, 1993619

Accurate methods for the statistics of surprise and coincidence. Comput. Linguist, 1993618

Query evaluation techniques for large databases. ACM Computing Surveys, 1993590

Common risk factors in the returns on stocks and bonds. Journal of Financial Economics, 1993585

Transactional memory: architectural support for lockfree data structures. In ISCA, 1993571

DeNoising by Soft Thresholding. IEEE Trans. Info. Theory, 1993515

Interpretation as abduction. Artificial Intelligence, 1993506

The process group approach to reliable distributed computing. Communication ACM, 1993498

H.: A direct adaptive method for faster backpropagation learning: the RPROP algorithm. In: Proceedings of the ICNN, 1993492

A Fast File System for UNIX. San Diego, CA 17 Systems, 1993476

Eicken, “LogP: towards a realistic model of parallel computation. in Proceedings of the fourth ACM SIGPLAN symposium on Principles and practice of parallel programming, ser. PPOPP ’93, 1993466

Surroundscreen projectionbased virtual reality: the design and implementation of the CAVE. in Proceedings of the 20th annual conference on Computer graphics and interactive techniques, 1993463

View interpolation for image synthesis. In Proc. ACM SIGGRAPH 93, 1993459

Distributional clustering of English words. In Proc. of the 31st Annual Meeting of the Association for Computational Linguistics, 1993459

Abductive logic programming. Journal of Logic and Computation, 1993456

T.: Face recognition: features versus templates. IEEE Trans. Pattern Anal. Mach. Intell, 1993452

The BSD packet filter: A new architecture for userlevel packet capture. in Proc. Winter USENIX Tech. Conf, 1993432

A survey of wormhole routing techniques in direct networks. Computer, 1993425

Distortion invariant object recognition in the dynamic link architecture. IEEE Trans. on Computers, 1993415

Comparing images using the Hausdorff distance. Transactions on Pattern Analysis and Machine Intelligence, 1993398

Very simple classification rules perform well on most commonly used datasets. Machine learning, 1993382

Entity Authentication and Key Distribution. In CRYPTO 1993, volume 773/1993 of LNCS, 1993380

Genetic algorithms for multiobjective optimization: formulation, discussion and generalization. Proc. of the Fifth International Conference on Genetic Algorithms, 1993379

Adaptive display algorithm for interactive frame rates during visualization of complex virtual environments. Computer Graphics, 1993371

Goaldirected requirements acquisition. Sci. Comput. Program, 1993366

Representing action and change by logic programs. Journal of Logic Programming, 1993354

Estimation and Inference in Econometrics. 1993346

Toolglass and magic lenses: the seethrough interface. In Proc. SIGGRAPH, 1993330

Dynamic Backtracking. Journal of Artificial Intelligence Research, 1993324

Blind beamforming for nongaussian signals. IEE Proceedings  F, 1993323

Sequential Monte Carlo Methods for Dynamic Systems. Journal of the American Statistical Association, 1993322

Mesh optimization. 1993318

ANFIS: AdaptiveNetworkBased Fuzzy Inference System. IEEE Trans. on Systems, Man and Cybern, 1993317

A 36 for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 1993316

Hybrid automata: An algorithmic approach to the specification and verification of hybrid systems. Proceedings of the 1992 Hybrid Systems Conference, volume 736 of LNCS, 1993316

Prediction of protein secondary structure at better than 70% accuracy. J. Mol. Biol, 1993313

Hybrid Algorithms for the Constraint Satisfaction Problem. Computational Intelligence, 1993311

Notes on formalizing context. In: IJCAI’93, 1993306

Parsing English with a link grammar. In Proceedings of the International Workshop on Parsing Technologies, 1993304

Predictive models for the breeder genetic algorithm, I: continuous parameter optimization. Evolutionary Computation, 1993295

Selftesting/correcting with applications to numerical problems. in Proc. 22nd STOC, 1993291

Fbufs: a highbandwidth crossdomain transfer facility. SIGOPS Oper. Syst. Rev, 1993288

Subtyping recursive types. ACM Transactions on Programming Languages and Systems, 1993287

Encrypted key exchange: Passwordbased protocols secure against dictionary attacks. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 1993286

Interacting with paper on the DigitalDesk. Communications of the ACM, 1993285

Retrieving and integrating data from multiple information sources. Int. Intelligent & Cooperative Information Systems 2(2, 1993284

Learning and development in neural networks: The importance of starting small. Cognition, 1993283

Radiosity and realistic image synthesis. 1993283

Efficient Processing of Spatial Joins using Rtrees. Proceedings of ACM SIGMOD International Coigerence otz Management of Data, 1993282

Computational interpretations of linear logic. Theor. Comput. Sci, 1993271

When networks disagree: Ensemble methods for hybrid neural networks. in Neural Networks for Speech and Image Pressing, 1993262

Applying new scheduling theory to static priority preemptive scheduling. Software Engineering Journal, 1993260

Structural ambiguity and lexical relations. Computational Linguistics, 1993256

The OO7 Benchmark. In Proc. ACM SIGMOD International Conference on Management of Data, 1993255

The Zebra striped network file system. In Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles, 1993254

The linear time – branching time spectrum II: The semantics of sequential systems with silent moves. of Lecture Notes in Computer Science, 1993253

Probabilistic Horn abduction and Bayesian networks. Artificial Intelligence, 1993250

The LRUK page replacement algorithm for database disk buffering. In SIGMOD, 1993250

Why cryptosystems fail. In Proc. ACM CCS’93, 1993249

ªThe Superblock: An Effective Technique for VLIW and Superscalar. Compilation,º J. Supercomputing, 1993247

A weighted nearest neighbor algorithm for learning with symbolic features. Mach. Learn, 1993245

UNIX disk access patterns. Proc. of the Winter 118 USENIX, 1993242

Database Mining: A Performance Perspective. IEEE Trans. Knowledge and Data Eng, 1993242

The modern industrial revolution, exit, and the failure of internal control systems. Journal of Finance, 1993237

A scaled conjugate gradient algorithm for fast supervised learning. Neural Networks, 1993236

Viewing morphology as an inference process. In: SIGIR ’93: Proceedings of the sixteenth annual international ACM SIGIR conference on Research and development in information retrieval, pp 191–202, 1993233

Global optimizations for parallelism and locality on scalable parallel machines. In Proceedings of the SIGPLAN Conference on Programming Language Design and Implementation, 1993233

The essence of compiling with continuations. ACM SIGPLAN Notices, 1993233

A comparison of dynamic branch predictors that use two levels of branch history. Proceedings of the 20th Intl. Symp. on Computer Architecture, 1993229

A Flexible InnerOuter Preconditioned GMRES Algorithm. SIAM Journal on Scientific Computing, 1993227

Tutorial notes on partial evaluation. In Proceedings of the 20th Annual Symposium on Principles of Programming Languages (POPL ’93, 1993225

Shareddistribution hidden Markov models for speech recognition. IEEE Transactions on Speech and Audio Processing, 1993224

Sastry. Nonholonomic motion planning: Steering using sinusoids. IEEE Transactions on Automatic Control, 1993222

Multiagent reinforcement learning: Independent vs. cooperative agents. In Proceedings of the Tenth International Conference on Machine Learning, 1993220

Retrieving collocations from text: Xtract. Computational Linguistics, 1993219

Algebraic decision diagrams and their applications. In ICCAD, 1993219

Feudal reinforcement learning. In Advances in Neural Information Processing Systems, 1993218

SmallBias Probability Spaces: Efficient Constructions and Applications. SIAM Journal of Computing (SICOMP, 1993218

Data structures and algorithms for nearest neighbor search in general metric spaces. in ACMSIAM Symposium on Discrete Algorithms, 1993217

Modelchecking in dense realtime. ISSN 08905401. URL http://portal.acm.org/ citation.cfm?id=178164.178166, 1993215

Hierarchical zbuffer visibility. In Proc. of ACM SIGGRAPH, 1993214