Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. R S Sutton, A G Barto.
    Reinforcement Learning: An Introduction. 1998
    2674
  2. S Brin, L Page.
    The anatomy of a large-scale hypertextual web search engine. in: Proceedings of the 7th World Wide Web Conference, 1998
    2453
  3. L Page, S Brin, R Motwani, T Winograd.
    The Pagerank citation ranking: Bring order to the web. Stanford University, 1998
    1520
  4. T Joachims.
    Text Categorization with Support Vector Machines: Learning with Many Relevant Features. Proceedings of 10th ECML Conference, 1998
    1330
  5. J Padhye, V Firoiu, D Towsley, J Kurose.
    Modeling TCP Throughput: A Simple Model and its Empirical Validation. In Proc. ACM SIGCOMM, 1998
    980
  6. A Blum, T Mitchell.
    Combining labeled and unlabeled data with co-training. In Proceedings ofthe Eleventh Annual Conference on Computational Learning Theory, 1998
    918
  7. G J Foschini, M J Gans.
    On Limits of Wireless Communications in a Fading Environment When Using Multiple Antennas. Wireless Personal Communications, 1998
    916
  8. V Tarokh, N Seshadri, A R Calderbank.
    Space-Time Codes for High Data Rate Wireless Communications: Performance criterion and code construction. IEEE Trans. Information Theory, V, 1998
    811
  9. B Schölkopf, A Smola, K-R Müller.
    Nonlinear component analysis as a kernel eigenvalue problem. Neural Computation, 1998
    755
  10. J Kittler, M Hatef, R P Duin, J Matas.
    On combining classifiers. IEEE Trans. on PAMI, 1998
    728
  11. Black Blake, Davies Carlson, Weiss Wang.
    An Architecture for Differentiated Services. 1998
    687
  12. P Barford, M Crovella.
    Generating representative web workloads for network and server performance evaluation. in Proc. SIGMETRICS’98/PERFORMANCE’98, 1998
    677
  13. S Verdu.
    Multiuser Detection. 1998
    675
  14. Jay M Ponte, W Bruce Croft.
    A Language Modeling Approach to Information Retrieval. in Proc. 21st Annu. Int. ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR’98, 1998
    647
  15. L ITTI, C KOCH, E NIEBUR.
    A model of saliencybased visual attention for rapid scene analysis. IEEE Trans. Pattern Anal. Mach. Intell, 1998
    636
  16. R S Sutton, A G Barto.
    Reinforcement Learning. 1998
    618
  17. Leslie Pack Kaelbling, Michael L Littman, Anthony R Cassandra.
    Planning and acting in partially observable stochastic domains. Artificial Intelligence, 1998
    612
  18. S Arya, D Mount, N Netanyahu, R Silverman, A Wu.
    An optimal algorithm for approximate nearest neighbor searching fixed dimensions. In Proc. VLDB ’96, 1998
    604
  19. G Karypis, V Kumar.
    A fast and high quality multilevel scheme for partitioning irregular graphs. SIAM J. Sci. Comput, 1998
    603
  20. J Coleman.
    Social Capital in the Creation of Human Capital. The American Journal of Sociology, 1998
    600
  21. XING Robert E Schapire, Yoav Freund, Peter Bartlett, Wee Sun Lee.
    Boosting the margin: A new explanation for the effectiveness of voting methods. The Annals of Statistics, 1998
    595
  22. S ARORA, C LUND, R MOTWANI, M SUDAN, M SZEGEDY.
    Proof verification and the hardness of approximation problems. J. ACM, 1998
    589
  23. R M Neal, G E Hinton.
    A view of the EM algorithm that justifies incremental, sparse, and other variants. Learning in Graphical Models, 1998
    585
  24. V Bro PAXSON.
    A system for detecting network intruders in real-time. In Proc. USENIX Security Simposium, 1998
    553
  25. Young-Bae Ko, Nitin Vaidya.
    Location-Aided Routing (LAR) in Mobile Ad Hoc Networks. In Proceedings of the Fourth International Conference on Mobile Computing and Networking (MobiCom’98, 1998
    552
  26. G Morrisett, D Walker, K Crary, N Glew.
    From System F to typed assembly language. In POPL, 1998
    551
  27. M K Reiter, A V Rubin.
    Crowds: anonymity for web transactions. ACM Transactions on Information and Systems Security, 1998
    548
  28. R Schapire, Y Singer.
    Improved boosting algorithms using confidence-rated predictions. In COLT, 1998
    538
  29. Dekang Lin.
    Automatic retrieval and clustering of similar words. In Proc. of COLING-ACL 98, 1998
    507
  30. Kah-Kay Sung, Tomaso Poggio.
    Example-based learning for view-based human face detection. IEEE Trans. on PAMI, 1998
    500
  31. V Gaede, O Gunther.
    Multidimensional Access Methods. ACM Computing Surveys, 1998
    500
  32. Thomas Landauer, Peter Foltz, Darrell Laham.
    An Introduction to Latent Semantic Analysis. Discourse Processes, 1998
    490
  33. Dekang Lin.
    An information–theoretic definition of similarity. In Proceedings of the 15th International Conference on Machine Learning (ICML, 1998
    485
  34. N Guarino, editor.
    Formal Ontology and Information Systems. 1998
    479
  35. L Lamport.
    The part-time parliament. ACM Trans. Comput. Syst, 1998
    462
  36. Y LeCun, L Bottou, Y Bengio, P Ha.
    ner. Gradient-based learning applied to document recognition. Proceedings of the IEEE, 1998
    459
  37. R Agrawal, J Gehrke, D Gunopulos, P Raghavan.
    Automatic subspace clustering of high dimensional data for data mining applications. In SIGMOD, 1998
    456
  38. S T Dumais, J Platt, D Heckerman, M Sahami.
    Inductive Learning Algorithms and Representations for Text Classification. In Proceedings of ACM-CIKM98, 1998
    413
  39. R A DeVore.
    Nonlinear approximation. In Acta numerica, 1998
    411
  40. Y Rui, T Huang, M Ortega, S Mehrotra.
    Relevance Feedback: A Power Tool for Interactive Content-Based Image Retrieval. IEEE Trans. Circuits and Systems for Video Technology, 1998
    411
  41. M Matsumoto, T Nishimura.
    Mersenne Twister: A 623-Dimensionally Equidistributed Uniform Pseudo-Random Number Generator. ACM Transactions on Modeling and Computer Simulation, 1998
    408
  42. R Weber, H-J Schek, S Blott.
    A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces. In VLDB ’98: Proceedings of the 24rd International Conference on Very Large Data Bases, 1998
    402
  43. I Foster, C Kesselman, G Tsudik, S Tuecke.
    A Security Architecture for Computational Grids. Proc. ACM Computer and Communication Security, 1998
    398
  44. J J Dongarra, J J Du Croz, S Hammarling, R J Hanson.
    An extented set of Fortran Basic Linear Algebra Subprograms. 1998
    394
  45. C Cowan, C Pu, D Maier, J Walpole, P Bakke, S Beattie, A Grier, P Wagle, Q Zhang, Hinton.
    H.: StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In: Proc. of the 7th Usenix Security Symposium, 1998
    392
  46. M Bellare, A Desai, D Pointcheval, P Rogaway.
    Relations among Notions of Security for Public-Key Encryption Schemes. In Crypto ’98, LNCS 1462, 1998
    385
  47. R Cramer, V Shoup.
    A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In Advances in Cryptology – CRYPTO ’98, Springer LNCS 1462, 1998
    385
  48. C TOMASI, R MANDUCHI.
    Bilateral filtering for gray and color images. In Proc. of ICCV, 1998
    383
  49. K BHARAT, M HENZINGER.
    Improved Algorithms for Topic Distillation in a Hyperlinked Environment. In Proceedings of ACM SIGIR’98, 1998
    376
  50. G Karypis, V Kumar.
    Multilevel k-way partitioning scheme for irregular graphs. JPDC, 1998
    368
  51. D AND REITER MALKHI, M.
    Byzantine quorum systems. Distrib. Comput, 1998
    363
  52. T Starner, A Pentland, J Weaver.
    Real-time american sign language recognition using desk and wearable computer based video. IEEE Trans. Pattern Anal. Mach. Intell, 1998
    362
  53. S Thrun, D Fox, W Burgard.
    A probabilistic approach to concurrent mapping and localization for mobile robots. Machine Learning, 1998
    359
  54. O GOLDREICH, S GOLDWASSER, D RON.
    Property testing and its connection to learning and approximation. J. ACM, 1998
    359
  55. Chung Kei Wong, Mohamed Gouda, Simon S Lam.
    Secure group communications using key graphs. in Proceedings of ACM SIGCOMM ’98, 1998
    355
  56. D Clark, W Fang.
    Explicit allocation of best effort packet delivery service. IEEE/ACM Trans. Networking, 1998
    353
  57. Thom Frühwirth.
    Theory and practice of constraint handling rules. Special Issue on Constraint Logic Programming, 1998
    348
  58. K Czajkowski, I T Foster, N T Karonis, C Kesselman, S Martin, W Smith, S Tuecke.
    A Resource Management Architecture for Metacomputing Systems. in ‘Proceedings of the Workshop on Job Scheduling Strategies for Parallel Processing, 1998
    347
  59. T Balch, R C Arkin.
    Behavior-based formation control for multi-robot teams. IEEE Transactions on Robotics and Automation, 1998
    346
  60. J Carbonell, J Goldstein.
    The use of MMR, diversity-based reranking for reordering documents and producing summaries. In Proc. of the Int’l ACM SIGIR Conf. on Research and Development in Information Retrieval, 1998
    346
  61. M Frigo, S G Johnson.
    FFTW: An adaptive software architecture for the FFT. In Proc. 1998 IEEE Intl. Conf. Acoustics Speech and Signal Processing, 1998
    344
  62. D Baraff, Witkin.
    A.: Large steps in cloth simulation. In: Proceedings of ACM SIGGRAPH, 1998
    343
  63. L E Parker.
    Alliance: An architecture for fault tolerant multi-robot cooperation. IEEE Trans. Robot. Automat, 1998
    342
  64. D J Wetherall, J V Guttag, D L Tennenhouse.
    Ants: A toolkit for building and dynamically deploying network protocols. IEEE OpenArch, 1998
    338
  65. G Hager, P Belhumeur.
    Efficient region tracking with parametric models of geometry and illumination. IEEE Trans. on PAMI, 1998
    335
  66. I DaubechiesandW Sweldens.
    Factoring wavelet transforms into lifting steps. J. Fourier Anal. Appl, 1998
    334
  67. B Liu, W Hsu, Y Ma.
    Integrating Classification and Association Rule Mining. In Proceedings of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1998
    330
  68. Benny Chor, Eyal Kushilevitz, Oded Goldreich, Madhu Sudan.
    Private information retrieval. CS06] [Efr09] [ER60] [Gas04] [GGR98] [KdW04] [KPS08] [KT00] Bernard Chazelle and, 1998
    329
  69. I L Dryden, K V Mardia.
    Statistical shape analysis. 1998
    327
  70. N R Jennings, K Sycara, M Wooldridge.
    A roadmap of agent research and development. Autonomous Agents and Multi-Agent Systems Journal, 1998
    326
  71. S Chakrabarti, B Dom, P Indyk.
    Enhanced hypertext categorization using hyperlinks. In SIGMOD International Conference on Management of Data, 1998
    326
  72. T Lindeberg.
    Feature detection with automatic scale selection. International Journal on Computer Vision, 1998
    325
  73. R Bayardo.
    Efficiently mining long patterns from databases. In SIGMOD, 1998
    322
  74. C Bregler, J Malik.
    Tracking people with twists and exponential maps. In Proc. IEEE Comput. Soc. Conf. Comput. Vision and Pattern Recogn, 1998
    319
  75. J Byers, M Luby, M Mitzenmacher, A Rege.
    A Digital Fountain Approach to Reliable Distribution of Bulk Data. In Proceedings of ACM SIGCOMM ’98, 1998
    317
  76. J Shade, S Gortler, L He, R Szeliski.
    Layered depth images. in Proceedings of the 25th annual conference on Computer graphics and interactive techniques. ACM, 1998
    316
  77. Collin Baker, Charles Fillmore, John Lowe.
    The berkeley framenet project. In Proceedings of the COLING-ACL, 1998
    313
  78. G Bracha, M Odersky, D Stoutamire, P Wadler.
    Making the future safe for the past: Adding genericity to the Java programming language. In OOPSLA, 1998
    310
  79. T Jaakkola, D Haussler.
    Exploiting generative models in discriminative classifiers. Eds.), Advances in Neural Information Processing System, 1998
    303
  80. S Singh, C S Raghavendra.
    PAMAS - Power Aware Multi-Access Protocol with Signalling for Ad Hoc Networks. In Computer Communications Review, 1998
    301
  81. R Raman, M Livny, M Solomon.
    Matchmaking: distributed resource management for high throughput computing. In Proc. HPDC, 1998
    298
  82. N Amenta, M Bern, M Kamvysselis.
    A new voronoi-based surface reconstruction algorithm. In Proc. of the 25th Annual Conf. on Computer Graphics and Interactive Techniques, 1998
    297