Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. R Baeza-Yates, B Ribeiro-Neto.
    Modern Information Retrieval. 1999
    2652
  2. C E Perkins, E M Royer.
    Ad-hoc ondemand distance vector routing. In Proc. of the Mobile Computing Systems and Applications, 1999
    2480
  3. R Albert, Barabási AL.
    Emerging of Scaling in Random Networks. Science, 1999
    2426
  4. İ E Telatar.
    Capacity of multi-antenna Gaussian channels. European Trans. Telecommun, 1999
    2042
  5. D G Lowe.
    Object recognition from local scale-invariant features. In Proc. Int. Conf. on Computer Vision ICCV’99, 1999
    1749
  6. Robert E Hall, Charles I Jones.
    Why Do Some Countries Produce So Much More Output per Worker than Others?” Quarterly. Journal of Economics, 1999
    1498
  7. A K Jain, M N Murty, P J Flynn.
    Data Clustering: a Review. ACM Computing Surveys, 1999
    1410
  8. T R Golub, D K Slonim, P Tamayo, C Huard, M Gassenbeek, J P Mesirov, H Coller, M L Loh, J R Downing, M A Caligiuri, D D Bloomfield, E S Lander.
    Molecular classification of cancer: Class discovery and class prediction$17.00 (c) 2002 IEEE 8 by gene expression monitoring. Science, 1999
    1349
  9. M Faloutsos, P Faloutsos, C Faloutsos.
    On Power–Law Relationship of the Internet Topology. Proc. of ACM SIGCOMM, 1999
    1336
  10. R Clarida, J Gali, M Gertler.
    The science of monetary policy: A new keynesian perspective. Journal of Economic Literature, 1999
    1288
  11. V Tarokh, H Jafarkhani, A R Calderbank.
    Space-time block codes from orthogonal designs. IEEE Transactions on Information Theory, 1999
    1115
  12. E M Royer, C-K Toh.
    A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers. Commun, 1999
    1050
  13. B Bernanke, M Gertler, S Gilchrist.
    The Financial Accelerator in a Quantitative Business Cycle Framework. in Taylor, J and M. Woodford (eds), Handbook of Macroeconomics, 1999
    1003
  14. J Y Campbell, J H Cochrane.
    By Force of Habit: A Consumption-Based Explanation of Aggregate. Stock Market Behavior, Journal of Political Economy, 1999
    1003
  15. D Estrin, R Govindan, J Heidemann, S Kumar.
    Next century challenges: Scalable coordination in sensor networks. in Proc. of ACM Mobicom, 1999
    976
  16. S Ni, Y Tseng, Y Chen, J Sheu.
    The broadcast storm problem in a mobile ad hoc network. in Proceedings of ACM MOBICOM'99, 1999
    947
  17. R G Downey, M R Fellows.
    Parameterized Complexity. 1999
    923
  18. M Roesch.
    Snort: Lightweight intrusion detection for networks. In Proceedings of the 1999 USENIX LISA Systems Administration Conference. (available on http://www.snort.org, 1999
    904
  19. L Breaslau, P Cao, L Fan, G Phillips, S Shenker.
    Web Caching and Zipf-like Distributions: Evidence and Implications. In Proc. of IEEE Infocom, 1999
    898
  20. Hofmann.
    Probabilistic latent semantic indexing. in SIGIR ‘99: Proceedings of the 22nd annual international ACM SIGIR conference on research and development in information retrieval, pp 50-57, 1999
    873
  21. L Zhou.
    Securing ad hoc networks. IEEE Newark Magazine, 1999
    869
  22. M Jordan, Z Ghahramani, T Jaakkola, L Saul.
    An introduction to variational methods for graphical models. Machine learning, 1999
    868
  23. I H Witten, A Moffat, T C Bell.
    Managing Gigabytes: Compressing and Indexing Documents and Images. 1999
    856
  24. J F Sturm.
    Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones. Optimization Methods and Software 11/12, 1999
    842
  25. V Blanz, T Vetter.
    A morphable model for the synthesis of 3D faces. In Proc. of SIGGRAPH99, 1999
    828
  26. A Efros, T Leung.
    Texture synthesis by non-parametric sampling. In ICCV, 1999
    818
  27. P Kocher, J Jaffe, B Jun.
    Differential Power Analysis. In Proceedings of Crypto’99, 1999
    803
  28. S Floyd, K Fall.
    Promoting the use of end-to-end congestion control in the Internet. IEEE/ACM Trans. on Networking, 1999
    801
  29. A Biere, A Cimatti, E Clarke, Y Zhu.
    Symbolic model checking without BDDs. In Tools and Algorithms for the Construction and Analysis of Systems, LNCS, 1999
    770
  30. Vern Paxson.
    End-to-end internet packet dynamics. IEEE/ACM Trans. Netw, 1999
    760
  31. Johan Hastad, Russell Impagliazzo, Leonid A Levin, Michael Luby.
    A pseudorandom generator from any one-way function. SIAM J. Comput, 1999
    754
  32. R Fielding, J Gettys, J Mogul, H Frystyk, L Masinter, P Leach, T BernersLee.
    Hypertext transfer protocol – HTTP/1.1. 1999
    751
  33. R E Schapire, Y Singer.
    Improved Boosting Algorithms Using Confidence-rated Predictions. Machine Learning, 1999
    733
  34. T Joachims.
    Transductive Inference for Text Classification using Support Vector Machines. International Conference on Machine Learning (ICML, 1999
    728
  35. L Randall, R Sundrum.
    A large mass hierarchy from a small extra dimension. 1999
    720
  36. Lawrence Barsalou.
    Perceptual symbol systems. Behavioural and Brain Sciences, 1999
    710
  37. Y Yang, X Liu.
    A re-examination of text categorization methods. In Proceedings of SIGIR-99, 22nd ACM International Conference on Research and Development in Information Retrieval, 1999
    710
  38. P Bose, P Morin, I Stojmenović, J Urrutia.
    Routing with Guaranteed Delivery in Ad Hoc Wireless Networks. In Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DialM '99, 1999
    701
  39. P Paillier.
    Public-Key cryptosystems based on composite degree residuosity classes. Proc. of the EUROCRYPT’99. LNCS 1592, 1999
    700
  40. R Wolski, N Spring, J Hayes.
    The Network Weather Service: a distributed resource performance forecasting service for metacomputing. Future Generation Computing Systems, Metacomputing Issue, 1999
    691
  41. E Koutsoupias, Papadimitriou.
    C.,“Worst-case Equilibria. Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science, 1999
    675
  42. La Porta, R Lopez-de-Silanes, F Shleifer, A, R W Vishny.
    Corporate ownership around the world. Journal of Finance, 1999
    659
  43. D Gavrila.
    The Visual Analysis of Human Movement: A Survey. Computer Vision and Image Understanding, 1999
    626
  44. Y Freund, R Schapire.
    A short introduction to boosting. J. Japan. Soc. for Artif. Intel, 1999
    623
  45. J Frankel, D Romer.
    Does Trade cause Growth. American Economic Review, 1999
    621
  46. Greg Morrisett, David Walker, Karl Crary, Neal Glew.
    From System F to typed assembly language. ACM Transactions on Programming Languages and Systems, 1999
    616
  47. N Seiberg, E Witten.
    String theory and noncommutative geometry. JHEP, 1999
    616
  48. E Fehr, K Schmidt.
    A Theory of fairness, competition, and cooperation. Quarterly Journal of Economics, 1999
    612
  49. V Rodoplu, T H Meng.
    Minimum energy mobile wireless networks. IEEE J. Select. Areas Commun, 1999
    594
  50. M Castro, B Liskov.
    Practical Byzantine fault tolerance. In Proc. of USENIX Symp. on OSDI, 1999
    592
  51. A Igarishi, B Pierce, P Wadler.
    Featherweight Java: A minimal core calculus for Java and GJ. In Proc. OOPSLA, 1999
    588
  52. A Hyvarinen.
    Fast and robust fixed-point algorithms for independent component analysis. IEEE Transactions of Neural Networks, 1999
    580
  53. Thomas Hofmann.
    Probabilistic latent semantic analysis. Proceedings of Uncertainty in Artificial Intelligence, 1999
    573
  54. Canice Prendergast.
    The Provision of Incentives in Firms. Journal of Economic Literature, 1999
    573
  55. F Nielson, H R Nielson, Hankin.
    C.: Principles of Program Analysis. 1999
    573
  56. P Artzner, F Delbaen, J M Eber, D Heath.
    Coherent measures of risk. Math. Finance, 1999
    570
  57. S Low, D E Lapsley.
    Optimization flow control, I: Basic algorithm and convergence. IEEE/ACM Transactions on Networking, 1999
    569
  58. D J C MacKay.
    Good error correcting codes based on very sparse matrices. IEEE Trans. Inform. Theory, 1999
    568
  59. E Zitzler, L Thiele.
    Multi-objective evolutionary algorithms: A comparative case study and the strength Pareto approach. IEEE Transactions on Evolutionary Computation, 1999
    567
  60. H K Klein, M D Myers.
    A Set of Principles for Conducting and Evaluating Interpretive Field. Studies in Information Systems.” MIS Quarterly 23(1, 1999
    565
  61. M K Pitt, N Shephard.
    Filtering via Simulation: Auxiliary Particle Filters. Journal of the American Statistical Association, 1999
    565
  62. Y Yang.
    An evaluation of statistical approaches to text categorization. Journal of Information Retrieval, 1999
    550
  63. W Heinzelman, J Kulik, H Balakrishnan.
    Adaptive protocols for information dissemination in wireless sensor networks. In MOBICOM, 1999
    549
  64. F Stajano, R I Anderson.
    The reslursting duckling: Security issues for ad-hoc wireless networks. in Swenrh Iniemfionnl Securiq Promcols Workshop, 1999
    545
  65. M K Riesenhuber, T Poggio.
    Hierarchical models of object recognition in cortex. Nature Neuroscience, 1999
    543
  66. G Di Battista, P Eades, R Tamassia, I G Tollis.
    Graph Drawing. Inc., Upper Saddle River, NJ, 1999
    542
  67. Soumen Chakrabarti, Martin van den Berg, Byron Dom.
    Focused crawling: a new approach to topic-specific Web resource discovery. Computer Networks. 1999
    532
  68. J M Kahn, R H Katz, K S J Pister.
    Next century challenges: Mobile networking for smart dust. In In Proceedings of MOBICOM, 1999
    529
  69. D Duffie, K J Singleton.
    Modeling term structures of defaultable bonds. The Review of Financial Studies, 1999
    522
  70. M Tipping, C Bishop.
    Probabilistic Principal Component Analysis. Journal of the Royal Statistical Society, 1999
    515
  71. T Joachims.
    Making large-scale support vector machine learning practical. Advances in kernel methods - Support vector learning, 1999
    509
  72. Ozsu, Patrick Valduriez.
    Principles of Distributed Database Systems. 1999
    506
  73. K P Murphy, Y Weiss, M I Jordan.
    Loopy belief propagation for approximate inference: An empirical study. In Proceedings of the Fifteenth Conference on Uncertainty in Artificial Intelligence (UAI’99, 1999
    494
  74. A C Myers.
    JFlow: Practical Mostly-Static Information Flow Control. In 26th ACM Principles of Programming Languages, 1999
    488
  75. R Cooley, B Mobashar, J Srivastava.
    Data Preparation for Mining World Wide Web Browsing Patterns. Knowledge and Information Systems, 1999
    482
  76. K Kutulakos, S Seitz.
    A theory of shape by space carving. In Proceedings of the 7th IEEE International Conference on Computer Vision (ICCV-99, 1999
    482
  77. J Sethian.
    Level Set Methods and Fast Marching Methods: Evolving Interfaces. in Computational Geometry, Fluid Mechanics, Computer Vision, and Materials Science, 1999
    480
  78. B Aitken, E Harrison.
    Do domestic firms benefit from direct foreign investment? Evidence from. Venezuela”, The American Economic Review, 1999
    477
  79. W Adjie-Winoto, E Schwartz, H Balakrishnan.
    The Design and Implementation of an Intentional Naming System. In Proceedings of the Symposium on Operating Systems Principles, 1999
    474
  80. K J Dana, S K Nayar, B van Ginneken, J J Koenderink.
    Reflectance and texture of real-world surfaces. ACM Transactions on Graphics, 1999
    471
  81. J J Kuffner S M LaValle.
    Randomized kinodynamic planning. In Proc. of IEEE Int. Conf. on Robotics and Automation, 1999
    463
  82. X Yao.
    Evolving artificial neural networks. In Proceedings of the IEEE, 1999
    463
  83. Michael Collins, Yoram Singer.
    Unsupervised models for named entity classification. University of Maryland, College Park, 1999
    462
  84. A Gionis, P Indyk, R Motwani.
    Similarity search in high dimensions via hashing. In VLDB, 1999
    460
  85. R S Sutton, D Precup, S P Singh.
    Between MDPs and semi-MDPs: A framework for temporal abstraction in reinforcement learning. Artificial Intelligence, 1999
    458
  86. J Stam.
    Stable fluids. Proc. of SIGGRAPH 99, 1999
    457
  87. B Holmstrom.
    Managerial Incentive Problems: A Dynamic Perspective,”Review of Economic Studies. originally in Essays in Economics and Management in Honour of Lars Wahlbeck, Helsinki: Swedish School of Economics, 1999
    456
  88. G Benson.
    Tandem repeats finder: a program to analyze DNA sequences. Nucl. Acids Res, 1999
    455
  89. G Banga, P Druschel, J C Mogul.
    Resource containers: a new facility for resource management in server systems. In Proceedings of the 3rd USENIX Symposium on Operating system design and implementation, 1999
    455