Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. L Breiman.
    Bagging predictors. Machine Learning, 1996
    2751
  2. A J Menezes, P C van Oorschot, S A Vanstone.
    Handbook of Applied Cryptography. 1996
    2707
  3. D B Johnson, D A Maltz.
    Dynamic source routing in ad hoc wireless networks. in Mobile Computing, Imielinski and Korth, Eds, 1996
    2544
  4. H Schulzrinne, S Casner, R Frederick, V Jacobson.
    RTP: A Transport Protocol for Real-Time Applications. Internet RFC 1889, Internet Engineering Task Force (IETF, 1996
    2073
  5. R TIBSHIRANI.
    Regression shrinkage and selection via the lasso. J. R. Statist. Soc. B, 1996
    2064
  6. Y Freund, R E Schapire.
    Experiments with a new boosting algorithm. In International Conference on Machine Learning, 1996
    1764
  7. C Perkins, P Bhagwat.
    Highly dynamic destination-sequenced distance-vector routing (USUV) for mobile computers. in ACU/SIGCOUM'% Conference on Comunicnrions Arrhilecrurer, 1996
    1667
  8. L P Kaelbling, M L Littman, A W Moore.
    Reinforcement Learning: A Survey. Journal of Artificial Intelligence Research, 1996
    1395
  9. M Crovella, A Bestavros.
    Self-Similarity in World Wide Web traffic, Evidence and Possible cause. In Proceeding of ACM SIGMETRICS ’96, 1996
    1233
  10. R S Sandhu, E J Coyne, H L Feinstein, C E Youman.
    Role-based access control models. in IEEE Computer, 1996
    1205
  11. M Ester, H-P Kriegel, J Sander, X Xu.
    A density-based algorithm for discovering clusters in large spatial databases with noise. In Proc. ACM KDD, 1996
    1204
  12. Hugues Hoppe.
    Progressive meshes. In SIGGRAPH ’96 Proc, 1996
    1186
  13. S L Lauritzen.
    Graphical models. 1996
    1160
  14. M Levoy, P Hanrahan.
    Light field rendering. Computer Graphics, 1996
    1160
  15. A L Berger, S A Della Pietra, V J Della Pietra.
    A Maximum Entropy approach to natural language processing. Computational Linguistics, 1996
    1152
  16. I Nonaka, H Takeuchi.
    A Theory of Organizational Knowledge Creation. International Journal of Technology Management, 1996
    1151
  17. L E K P Vestka, J claude Latombe, M H Overmars.
    Probabilistic roadmaps for path planning in high-dimensional configuration spaces. IEEE Transactions on Robotics and Automation, 1996
    1004
  18. T Chandra, S Toueg.
    Unreliable Failure Detectors for Reliable Distributed Systems. Journal of the ACM, 1996
    974
  19. P E Debevec, C J Taylor, J Malik.
    Modeling and rendering architecture from photographs: A hybrid geometryand image-based approach. Computer Graphics, 1996
    954
  20. A Said, W A Pearlman.
    A new fast and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans. on Circuits and Systems for Video Technology, 1996
    934
  21. M Abadi, L Cardelli.
    A Theory of Objects. Monographs in Computer Science, 1996
    926
  22. M Dorigo, V Maniezzo, A Colorni.
    The ant system: optimization by a colony of cooperative agents. IEEE Transactions on System Man Cybernet, 1996
    926
  23. S J Gortler, R Grzeszczuk, R Szeliski, M F Cohen.
    The lumigraph. In SIGGRAPH, 1996
    907
  24. L K Grover.
    A fast quantum mechanical algorithm for database search. Proceedings, 28th ACM Symposium on Theory of Computing (STOC, 1996
    898
  25. R Durrett.
    Probability: theory and examples. 1996
    897
  26. M Blaze, J Feigenbaum, J Lacy.
    Decentralized trust management. Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
    886
  27. B Shneiderman.
    The eyes have it: a task by data type taxonomy for information visualizations. In Proceedings of 1996 IEEE Visual Languages, Boulder (CO, 1996
    883
  28. Eugene Charniak, Glenn Carroll, John Adcock.
    Taggers for Parsers. Artificial Intelligence, 1996
    872
  29. Lieven Vandenberghe, Stephen Boyd.
    Semidefinite programming. 1996
    842
  30. B Curless, M Levoy.
    A Volumetric Method for Building Complex Models from Range Images. Proc. ACM SIGGRAPH’96, 1996
    833
  31. William Gropp, Ewing Lusk, Nathan Doss, Anthony Skjellum.
    A highperformance, portable implementation of the MPI Message-Passing Interface standard. Parallel Computing, 1996
    793
  32. E Zegura, K Calvert, S Bhattacharjee.
    How to model an Internetwork. 1996
    721
  33. N Alon, Y Matias, M Szegedy.
    The space complexity of approximating the frequency moments. In Proc. of the 1996 Annual ACM Symp. on Theory of Computing, 1996
    714
  34. S Gottschalk, M C Lin, D Manocha.
    OBBTree: A Hierarchical Structure for Rapid Interference Detection. In SIGGRAPH 96, 1996
    713
  35. S McCanne, V Jacobson, M Vetterli.
    Receiver-Driven Layered Multicast. Proc. ACM SIGCOMM, 1996
    693
  36. A Y Levy, A Rajaraman, J J Ordille.
    Querying heterogeneous information sources using source descriptions. In Proceedings of the 22nd International Conference on Very Large Databases (VLDB-96, 1996
    688
  37. J R SMITH, S-F CHANG.
    VisualSEEk: a fully automated content-based image query system. In Proc. ACM Multimedia ’96 Conference, 1996
    668
  38. S Hutchinson, G D Hager, P I Corke.
    A tutorial on Visual Servo Control. IEEE Transactions on Robotics and Automation, 1996
    663
  39. S C Zhu, A Yuille.
    Region competition: unifying snakes, region growing, and bayes/mdl for multiband image segmentation. ARTICLE IN PRESS C- .E. Erdem et al. / Signal Processing: Image Communication 20, 1996
    662
  40. G Lowe.
    Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proc. Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055 of LNCS, 1996
    639
  41. R Srikant, R Agrawal.
    Mining Sequential Patterns: Generalizations and Performance. Improvements, Proceedings of the Fifth International conference, Extending Database Technology (EDBT’96, 1996
    592
  42. M Isard, A Blake.
    Contour tracking by stochastic propagation of conditional density. in Proceedings of the European Conference on Computer Vision, 1996
    592
  43. S Forrest, S A Hofmeyr, A Somayaji, T A Longstaff.
    A Sense of Self for UNIX Processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, 120-128, Los Alamitos, CA: IEEE Computer, 1996
    590
  44. Robert D Blumofe, Christopher F Joerg, Bradley C Kuszmaul, Charles E Leiserson, Keith H Randall, Yuli Zhou.
    Cilk: An Efficient Multithreaded Runtime System. Journal of Parallel and Distributed Computing, 1996
    582
  45. D Harel, A Naamad.
    The STATEMATE semantics of statecharts. ACM Transactions on Software Engenieering Methods, 1996
    575
  46. M J Black, A Jepson.
    Eigentracking: robust matching and tracking of articulated objects using a view-based representation. European Conference on Computer Vision, 1996
    569
  47. D A Cohn, Z Ghahramani, M I Jordan.
    Active learning with statistical models. Journal of Artificial Intellgence Research, 1996
    561
  48. Bjarne Steensgaard.
    Points-to analysis in almost linear time. In Conference Record of ACM Symposium on Principles of Programming Languages (POPL, 1996
    550
  49. H Kautz, B Selman.
    Pushing the envelope: Planning, propositional logic and stochastic search. In Proceedings of the National Conference on Artificial Intelligence (AAAI’96, 1996
    547
  50. S Berchtold, D Keim, H-P Kriegel.
    The X-tree: An Index Structure for HighDimensional Data. In Proceedings of the 22nd Intern. Conf. on VLDB, 1996
    542
  51. T A Henzinger.
    The theory of hybrid automata. In LICS, 1996
    527
  52. J Gray, P Helland, P O’Neil, D Shasha.
    The dangers of replication and a solution. In Proc. of ACM SIGMOD Conf, 1996
    522
  53. O Williamson.
    The Mechanisms of Governance. 1996
    512
  54. J Xu, W B Croft.
    Query expansion using local and global document analysis. In Proceedings of ACM SIGIR 1996 (19th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 1996
    510
  55. M Bellare, R Canetti, H Krawczyk.
    Keying hash functions for message authentication. 1996
    503
  56. Stephen E Deering, Deborah Estrin, Dino Farinacci, Ching-Gung Liu Van Jacobson, Liming Wei.
    The PIM architecture for wide-area multicast routing. IEEE/ACM Trans. Netw, 1996
    503
  57. R W Picard A Pentland, S Sclaroff.
    Photobook: Content-based manipulation of image databases. Multimedia Tools and applications, Chapter 2, 1996
    498
  58. C Bradford Barber, David P Dobkin, Hannu Huhdanpaa.
    The quickhull algorithm for convex hulls. ACM Trans. Math. Softw, 1996
    497
  59. V Harinarayan, A Rajaraman, J D Ullman.
    Implementing data cubes efficiently. in: Proceedings of the Fifteenth ACM SIGMOD International Conference on Management of Data (SIGMOD’96, 1996
    497
  60. Barbara Grosz, Sarit Kraus.
    Collaborative plans for complex group actions. Artificial Intelligence, 1996
    491
  61. J Hagenauer, E Offer, L Papke.
    Iterative decoding of binary block and convolutional codes. IEEE Transactions on Information Theory, 1996
    491
  62. T McInerney, D Terzopoulos.
    Deformable models in medical image analysis: a survey. Med. Image Anal, 1996
    475
  63. T Zhang, R Ramakrishnan, M Livny.
    BIRCH: An efficient data clustering method for very large databases. In Proceedings of ACM SIGMOD, 1996
    475
  64. A Chankhunthod, P B Danzig, C Neerdaels, M F Schwartz, K J Worrell.
    A hierarchical internet object cache. In USENIX Annual Technical Conf, 1996
    474
  65. D Duffie, R Kan.
    A Yield-Factor Model of Interest Rates. Mathematical Finance, 1996
    474
  66. A Ratnaparkhi.
    A maximum entropy model for part-of-speech tagging. In Proceedings of the EMNLP conference, 1996
    470
  67. G Rizzolatti, L Fadiga, V Gallese, L Fogassi.
    Premotor cortex and the recognition of motor actions. Cognitive Brain Research, 1996
    465
  68. J A Sethian.
    A marching level set method for monotonically advancing fronts. Proc. Nat. Acad. Sci, 1996
    463
  69. D C Plaut, J L McClelland, M S Seidenberg, K E Patterson.
    Understanding normal and impaired word reading: Computational principles in quasi-regular domains. Psychological Review, 1996
    460
  70. M Uschold, M Gruninger.
    Ontologies: Principles, Methods and Applications. The Knowledge Engineering Review, 1996
    457
  71. Michael John Collins.
    A new statistical parser based on bigram lexical dependencies. in: Proceedings of the 34rd Annual Meeting of the Association for Computational Linguistics, 1996
    452
  72. C Amza, A L Cox, S Dwarkadas, P Keleher, H Lu, R Rajamony, W Yu, W Zwaenepoel.
    Treadmarks: Shared memory computing on networks of workstations. IEEE Computer, 1996
    451
  73. N McKeown, V Anantharan, J Walrand.
    Achieving 100% Throughput in an Input-Queued Switch. Proceedings of INFOCOM, 1996
    446
  74. D L Tennenhouse, D J Wetherall.
    Towards an active network architecture. Computer Communication Review, 1996
    444
  75. Fikes Farquhar, Rice.
    The Ontolingua Server: A Tool for Collaborative Ontology Construction. OIL in a Nutshell. In: Knowledge Aquisation, Modelling and Management, 1-16, citeseer.nj.nec.com/fensel00oil.html Focacci; Lamma, 1996
    442
  76. D Volpano, G Smith, C Irvine.
    A sound type system for secure flow analysis. Journal of Computer Security, 1996
    442
  77. J R Shewchuk.
    Triangle: Engineering a 2D Quality Mesh Generator and Delaunay Triangulator. First ACM Workshop on Applied Computational Geometry, 1996
    442
  78. Tushar D Chandra, Vassos Hadzilacos, Sam Toueg.
    The weakest failure detector for solving consensus. Journal of the ACM (JACM, 1996
    433
  79. A S Rao.
    AgentSpeak(L): BDI Agent Speak Out in a Logical Computable Language. Velde ansd J.W. Perram (eds.), Agents Breaking Away, 1996
    433
  80. M S Chen, J Han, P S Yu.
    Data mining: an overview from a database perspective. IEEE Transactions on Knowledge and Data Engineering, 1996
    433
  81. M Arlitt, C Williamson.
    Web Server Workload Characterization: The Search for Invariants. in the ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems, 1996
    433
  82. Matthew O Jackson, Asher Wolinsky.
    A Strategic Model of Social and Economic Networks. Journal of Economic Theory, 1996
    431
  83. D L Swets, J J Weng.
    Using Discriminant Eigenfeatures for Image Retrieval. IEEE PAMI, 1996
    429
  84. S A Sloman.
    The empirical case for two systems of reasoning. Psychological Bulletin, 1996
    424
  85. T R G GREEN, M PETRE.
    Usability analysis of visual programming environments: a ‘cognitive dimensions’ framework. Journal of Visual Languages and Computing, 1996
    421
  86. M Hearst, J O Pedersen.
    Reexamining the cluster hypothesis: Scatter/gather on retrieval results. In Proceedings of the 19th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 1996
    418
  87. G Gigerenzer, D G Goldstein.
    Reasoning the fast and frugal way: Models of bounded rationality. Psychological Review, 1996
    415
  88. L McVoy, C Staelin.
    lmbench: Portable tools for performance analysis. In Proc. of the 1996 Usenix Technical Conference, 1996
    412
  89. R van Renesse, K P Birman, Maffeis.
    S.: “Horus, a flexible Group Communication System. Communications of the ACM, 1996
    410
  90. G C Necula, P Lee.
    Safe kernel extensions without run-time checking. In OSDI, 1996
    410
  91. J-F Cardoso, B H Laheld.
    Equivariant adaptive source separation. IEEE Trans. on Signal Processing, 1996
    405