Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. R Baeza-Yates, B Ribeiro-Neto.
    Modern Information Retrieval. 1999
  2. C E Perkins, E M Royer.
    Ad-hoc ondemand distance vector routing. In Proc. of the Mobile Computing Systems and Applications, 1999
  3. R Albert, Barabási AL.
    Emerging of Scaling in Random Networks. Science, 1999
  4. İ E Telatar.
    Capacity of multi-antenna Gaussian channels. European Trans. Telecommun, 1999
  5. D G Lowe.
    Object recognition from local scale-invariant features. In Proc. Int. Conf. on Computer Vision ICCV’99, 1999
  6. Robert E Hall, Charles I Jones.
    Why Do Some Countries Produce So Much More Output per Worker than Others?” Quarterly. Journal of Economics, 1999
  7. A K Jain, M N Murty, P J Flynn.
    Data Clustering: a Review. ACM Computing Surveys, 1999
  8. T R Golub, D K Slonim, P Tamayo, C Huard, M Gassenbeek, J P Mesirov, H Coller, M L Loh, J R Downing, M A Caligiuri, D D Bloomfield, E S Lander.
    Molecular classification of cancer: Class discovery and class prediction$17.00 (c) 2002 IEEE 8 by gene expression monitoring. Science, 1999
  9. M Faloutsos, P Faloutsos, C Faloutsos.
    On Power–Law Relationship of the Internet Topology. Proc. of ACM SIGCOMM, 1999
  10. R Clarida, J Gali, M Gertler.
    The science of monetary policy: A new keynesian perspective. Journal of Economic Literature, 1999
  11. V Tarokh, H Jafarkhani, A R Calderbank.
    Space-time block codes from orthogonal designs. IEEE Transactions on Information Theory, 1999
  12. E M Royer, C-K Toh.
    A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers. Commun, 1999
  13. B Bernanke, M Gertler, S Gilchrist.
    The Financial Accelerator in a Quantitative Business Cycle Framework. in Taylor, J and M. Woodford (eds), Handbook of Macroeconomics, 1999
  14. J Y Campbell, J H Cochrane.
    By Force of Habit: A Consumption-Based Explanation of Aggregate. Stock Market Behavior, Journal of Political Economy, 1999
  15. D Estrin, R Govindan, J Heidemann, S Kumar.
    Next century challenges: Scalable coordination in sensor networks. in Proc. of ACM Mobicom, 1999
  16. S Ni, Y Tseng, Y Chen, J Sheu.
    The broadcast storm problem in a mobile ad hoc network. in Proceedings of ACM MOBICOM'99, 1999
  17. R G Downey, M R Fellows.
    Parameterized Complexity. 1999
  18. M Roesch.
    Snort: Lightweight intrusion detection for networks. In Proceedings of the 1999 USENIX LISA Systems Administration Conference. (available on, 1999
  19. L Breaslau, P Cao, L Fan, G Phillips, S Shenker.
    Web Caching and Zipf-like Distributions: Evidence and Implications. In Proc. of IEEE Infocom, 1999
  20. Hofmann.
    Probabilistic latent semantic indexing. in SIGIR ‘99: Proceedings of the 22nd annual international ACM SIGIR conference on research and development in information retrieval, pp 50-57, 1999
  21. L Zhou.
    Securing ad hoc networks. IEEE Newark Magazine, 1999
  22. M Jordan, Z Ghahramani, T Jaakkola, L Saul.
    An introduction to variational methods for graphical models. Machine learning, 1999
  23. I H Witten, A Moffat, T C Bell.
    Managing Gigabytes: Compressing and Indexing Documents and Images. 1999
  24. J F Sturm.
    Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones. Optimization Methods and Software 11/12, 1999
  25. V Blanz, T Vetter.
    A morphable model for the synthesis of 3D faces. In Proc. of SIGGRAPH99, 1999
  26. A Efros, T Leung.
    Texture synthesis by non-parametric sampling. In ICCV, 1999
  27. P Kocher, J Jaffe, B Jun.
    Differential Power Analysis. In Proceedings of Crypto’99, 1999
  28. S Floyd, K Fall.
    Promoting the use of end-to-end congestion control in the Internet. IEEE/ACM Trans. on Networking, 1999
  29. A Biere, A Cimatti, E Clarke, Y Zhu.
    Symbolic model checking without BDDs. In Tools and Algorithms for the Construction and Analysis of Systems, LNCS, 1999
  30. Vern Paxson.
    End-to-end internet packet dynamics. IEEE/ACM Trans. Netw, 1999
  31. Johan Hastad, Russell Impagliazzo, Leonid A Levin, Michael Luby.
    A pseudorandom generator from any one-way function. SIAM J. Comput, 1999
  32. R Fielding, J Gettys, J Mogul, H Frystyk, L Masinter, P Leach, T BernersLee.
    Hypertext transfer protocol – HTTP/1.1. 1999
  33. R E Schapire, Y Singer.
    Improved Boosting Algorithms Using Confidence-rated Predictions. Machine Learning, 1999
  34. T Joachims.
    Transductive Inference for Text Classification using Support Vector Machines. International Conference on Machine Learning (ICML, 1999
  35. L Randall, R Sundrum.
    A large mass hierarchy from a small extra dimension. 1999
  36. Lawrence Barsalou.
    Perceptual symbol systems. Behavioural and Brain Sciences, 1999
  37. Y Yang, X Liu.
    A re-examination of text categorization methods. In Proceedings of SIGIR-99, 22nd ACM International Conference on Research and Development in Information Retrieval, 1999
  38. P Bose, P Morin, I Stojmenović, J Urrutia.
    Routing with Guaranteed Delivery in Ad Hoc Wireless Networks. In Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DialM '99, 1999
  39. P Paillier.
    Public-Key cryptosystems based on composite degree residuosity classes. Proc. of the EUROCRYPT’99. LNCS 1592, 1999
  40. R Wolski, N Spring, J Hayes.
    The Network Weather Service: a distributed resource performance forecasting service for metacomputing. Future Generation Computing Systems, Metacomputing Issue, 1999
  41. E Koutsoupias, Papadimitriou.
    C.,“Worst-case Equilibria. Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science, 1999
  42. La Porta, R Lopez-de-Silanes, F Shleifer, A, R W Vishny.
    Corporate ownership around the world. Journal of Finance, 1999
  43. D Gavrila.
    The Visual Analysis of Human Movement: A Survey. Computer Vision and Image Understanding, 1999
  44. Y Freund, R Schapire.
    A short introduction to boosting. J. Japan. Soc. for Artif. Intel, 1999
  45. J Frankel, D Romer.
    Does Trade cause Growth. American Economic Review, 1999
  46. Greg Morrisett, David Walker, Karl Crary, Neal Glew.
    From System F to typed assembly language. ACM Transactions on Programming Languages and Systems, 1999
  47. N Seiberg, E Witten.
    String theory and noncommutative geometry. JHEP, 1999
  48. E Fehr, K Schmidt.
    A Theory of fairness, competition, and cooperation. Quarterly Journal of Economics, 1999
  49. V Rodoplu, T H Meng.
    Minimum energy mobile wireless networks. IEEE J. Select. Areas Commun, 1999
  50. M Castro, B Liskov.
    Practical Byzantine fault tolerance. In Proc. of USENIX Symp. on OSDI, 1999
  51. A Igarishi, B Pierce, P Wadler.
    Featherweight Java: A minimal core calculus for Java and GJ. In Proc. OOPSLA, 1999
  52. A Hyvarinen.
    Fast and robust fixed-point algorithms for independent component analysis. IEEE Transactions of Neural Networks, 1999
  53. Thomas Hofmann.
    Probabilistic latent semantic analysis. Proceedings of Uncertainty in Artificial Intelligence, 1999
  54. Canice Prendergast.
    The Provision of Incentives in Firms. Journal of Economic Literature, 1999
  55. F Nielson, H R Nielson, Hankin.
    C.: Principles of Program Analysis. 1999
  56. P Artzner, F Delbaen, J M Eber, D Heath.
    Coherent measures of risk. Math. Finance, 1999
  57. S Low, D E Lapsley.
    Optimization flow control, I: Basic algorithm and convergence. IEEE/ACM Transactions on Networking, 1999
  58. D J C MacKay.
    Good error correcting codes based on very sparse matrices. IEEE Trans. Inform. Theory, 1999
  59. E Zitzler, L Thiele.
    Multi-objective evolutionary algorithms: A comparative case study and the strength Pareto approach. IEEE Transactions on Evolutionary Computation, 1999
  60. H K Klein, M D Myers.
    A Set of Principles for Conducting and Evaluating Interpretive Field. Studies in Information Systems.” MIS Quarterly 23(1, 1999
  61. M K Pitt, N Shephard.
    Filtering via Simulation: Auxiliary Particle Filters. Journal of the American Statistical Association, 1999
  62. Y Yang.
    An evaluation of statistical approaches to text categorization. Journal of Information Retrieval, 1999
  63. W Heinzelman, J Kulik, H Balakrishnan.
    Adaptive protocols for information dissemination in wireless sensor networks. In MOBICOM, 1999
  64. F Stajano, R I Anderson.
    The reslursting duckling: Security issues for ad-hoc wireless networks. in Swenrh Iniemfionnl Securiq Promcols Workshop, 1999
  65. M K Riesenhuber, T Poggio.
    Hierarchical models of object recognition in cortex. Nature Neuroscience, 1999
  66. G Di Battista, P Eades, R Tamassia, I G Tollis.
    Graph Drawing. Inc., Upper Saddle River, NJ, 1999
  67. Soumen Chakrabarti, Martin van den Berg, Byron Dom.
    Focused crawling: a new approach to topic-specific Web resource discovery. Computer Networks. 1999
  68. J M Kahn, R H Katz, K S J Pister.
    Next century challenges: Mobile networking for smart dust. In In Proceedings of MOBICOM, 1999
  69. D Duffie, K J Singleton.
    Modeling term structures of defaultable bonds. The Review of Financial Studies, 1999
  70. M Tipping, C Bishop.
    Probabilistic Principal Component Analysis. Journal of the Royal Statistical Society, 1999
  71. T Joachims.
    Making large-scale support vector machine learning practical. Advances in kernel methods - Support vector learning, 1999
  72. Ozsu, Patrick Valduriez.
    Principles of Distributed Database Systems. 1999
  73. K P Murphy, Y Weiss, M I Jordan.
    Loopy belief propagation for approximate inference: An empirical study. In Proceedings of the Fifteenth Conference on Uncertainty in Artificial Intelligence (UAI’99, 1999
  74. A C Myers.
    JFlow: Practical Mostly-Static Information Flow Control. In 26th ACM Principles of Programming Languages, 1999
  75. R Cooley, B Mobashar, J Srivastava.
    Data Preparation for Mining World Wide Web Browsing Patterns. Knowledge and Information Systems, 1999
  76. K Kutulakos, S Seitz.
    A theory of shape by space carving. In Proceedings of the 7th IEEE International Conference on Computer Vision (ICCV-99, 1999
  77. J Sethian.
    Level Set Methods and Fast Marching Methods: Evolving Interfaces. in Computational Geometry, Fluid Mechanics, Computer Vision, and Materials Science, 1999
  78. B Aitken, E Harrison.
    Do domestic firms benefit from direct foreign investment? Evidence from. Venezuela”, The American Economic Review, 1999
  79. W Adjie-Winoto, E Schwartz, H Balakrishnan.
    The Design and Implementation of an Intentional Naming System. In Proceedings of the Symposium on Operating Systems Principles, 1999
  80. K J Dana, S K Nayar, B van Ginneken, J J Koenderink.
    Reflectance and texture of real-world surfaces. ACM Transactions on Graphics, 1999
  81. J J Kuffner S M LaValle.
    Randomized kinodynamic planning. In Proc. of IEEE Int. Conf. on Robotics and Automation, 1999
  82. X Yao.
    Evolving artificial neural networks. In Proceedings of the IEEE, 1999
  83. Michael Collins, Yoram Singer.
    Unsupervised models for named entity classification. University of Maryland, College Park, 1999
  84. A Gionis, P Indyk, R Motwani.
    Similarity search in high dimensions via hashing. In VLDB, 1999
  85. R S Sutton, D Precup, S P Singh.
    Between MDPs and semi-MDPs: A framework for temporal abstraction in reinforcement learning. Artificial Intelligence, 1999
  86. J Stam.
    Stable fluids. Proc. of SIGGRAPH 99, 1999
  87. B Holmstrom.
    Managerial Incentive Problems: A Dynamic Perspective,”Review of Economic Studies. originally in Essays in Economics and Management in Honour of Lars Wahlbeck, Helsinki: Swedish School of Economics, 1999
  88. G Benson.
    Tandem repeats finder: a program to analyze DNA sequences. Nucl. Acids Res, 1999
  89. G Banga, P Druschel, J C Mogul.
    Resource containers: a new facility for resource management in server systems. In Proceedings of the 3rd USENIX Symposium on Operating system design and implementation, 1999