Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. J M Kleinberg.
    Authoritative sources in a hyperlinked environment. Journal of the ACM, 1999
  2. E M Clarke, O Grumberg, D A Peled.
    Model Checking. 1999
  3. R Baeza-Yates, B Ribeiro-Neto.
    Modern Information Retrieval. 1999
  4. C E Perkins, E M Royer.
    Ad Hoc On-Demand Distance Vector Routing. Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, Pages, 1999
  5. M Faloutsos, P Faloutsos, C Faloutsos.
    On Power-Law Relationships of the Internet Topology. Computer Comm. Rev, 1999
  6. Scott Shaobing Chen, David L Donoho, Michael A Saunders.
    Atomic decomposition by basis pursuit. SIAM Journal on Scientific Computing, 1999
  7. David G Lowe.
    Object recognition from local scale-invariant features. In Proc. of the International Conference on Computer Vision ICCV, Corfu, 1999
  8. A K Jain, M N Murty, P J Flynn.
    Data clustering: A review. ACM Computing Surveys, 1999
  9. T R Golub, D K Slonim, P Tamayo, C Huard, M Gaasenbeek, J P Mesirov, H Coller, M L Loh, J R Downing, M A Caligiuri, C D Bloomfield, E S Lander.
    Molecular classification of cancer: Class discovery and class prediction by gene expression monitoring. Science, 1999
  10. E M Royer, C-K Toh.
    A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Personal Communications, 1999
  11. D Estrin, R Govindan, J Heidemann.
    Kumar S.: Next Century Challenges: Scalable Coordination in Sensor Networks. In: Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom99, 1999
  12. I H Witten, A Moffat, T C Bell.
    Managing Gigabytes - Compressing and Indexing Documents and Images. 1999
  13. Martín Abadi, Andrew D Gordon.
    A calculus for cryptographic protocols: the spi calculus. in [AG97]. Martín Abadi and, 1999
  14. L Breslau, P Cao, L Fan, G Phillips, S Shenker.
    Web caching and zipf-like distributions: Evidence and implications. In INFOCOM, 1999
  15. Ora Lassila, Ralph Swick.
    Resource Description Framework (RDF) Model and Syntax Specification. W3C Recommendation, 1999
  16. S Floyd, K Fall.
    Promoting the use of end-to-end congestion control in the internet. IEEE/ACM Trans. Netw, 1999
  17. R Downey, M Fellows.
    Parameterized Complexity. 1999
  18. M Jordan, Z Ghahramani, T Jaakkola, L Saul.
    An introduction to variational methods for graphical models. Machine Learning, 1999
  19. V Tarokh, H Jafarkhani, A R Calderbank.
    Space-Time Block Codes from Orthogonal Designs. IEEE Transactions on Information Theory, 1999
  20. L Zhou, Z Haas.
    Securing Ad Hoc Networks. IEEE Networks, 1999
  21. S Chen, J Goodman.
    An empirical study of smoothing techniques for language modeling. Computer Speech and Language, 1999
  22. A Biere, A Cimatti, E M Clarke, Y Zhu.
    Symbolic model checking without BDDs. 5th International Conference on Tools and Algorithms for Construction and Analysis of Systems, volume 1579 of LNCS, 1999
  23. J H˚astad, R Impagliazzo, L A Levin, Luby.
    M.: A pseudorandom generator from any one-way function. SIAM J. Comput, 1999
  24. R Clarida, J Galí, M Gertler.
    The Science of Monetary Policy: A New Keynesian Perspective. Journal of Economic Perspectives, 1999
    T.: A morphable model for the synthesis of 3D faces. In Proc. SIGGRAPH, 1999
  26. A A Efros, T K Leung.
    Texture synthesis by non-parametric sampling. in [ICCV ’99: Proceedings of the International Conference on Computer Vision-Volume 2], 1033, IEEE Computer Society, 1999
  27. R Fielding, J Gettys, J Mogul, H Frystyk, L Masinter, P Leach, T Berners-Lee.
    Hypertext Transfer Protocol – HTTP/1.1. KBC05] [KM00] Tadayoshi Kohno, Andre Broido, and K.C. Claffy. Remote Physical Device Fingerprinting. IEEE Transcations on Dependable and Secure Computing, 2(2), April-June, 1999
  28. Y Yang, X Liu.
    A re-examination of text categorization methods. In Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR, 1999
  29. T Hofmann.
    Probabilistic latent semantic indexing. In SIGIR, 1999
  30. M Castro, B Liskov.
    Practical Byzantine fault tolerance. In Proceedings of the Third Symposium on Operating Systems Design and Implementation, 1999
  31. P C Kocher, J Jaffe, Jun.
    B.: Differential power analysis. In: CRYPTO, 1999
  32. E Koutsoupias, C Papadimitriou.
    Worst-case equilibria. In Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science, 1999
  33. A Igarashi, B Pierce, P Wadler.
    Featherweight Java: A minimal core calculus for Java and GJ. In Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA, 1999
  34. Charles E Perkins C E Perkin, Elizabeth M Royer.
    Ad hoc on-demand distance vector (AODV) routing. Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, 1999
  35. F Nielson, H R Nielson, C Hankin.
    Principles of Program Analysis. 1999
  36. Shmuel Sagiv, Thomas W Reps, Reinhard Wilhelm.
    Parametric shape analysis via 3-valued logic. In POPL, 1999
  37. D M Gavrila.
    The visual analysis of human movement: a survey,” Comput. Vis. Image Underst, 1999
  38. A K Dey, G D Abowd.
    Towards a Better Understanding of Context and Context-Awareness. Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing, 1999
  39. V Rodoplu, T H Meng.
    Minimum energy mobile wireless networks. IEEE Journal of Selected Areas in Communications, 1999
  40. M T Özsu, P Valduriez.
    Principles of Distributed Database Systems. 1999
  41. Y Freund, R Schapire, N Abe.
    A Short Introduction to Boosting. Journal of Japanese Society for Artificial Intelligence, 1999
  42. W Adjie-Winoto, E Schwartz, H Balakrishnan, J Lilley.
    The design and implementation of an intentional naming system. In 17th ACM Symposium on Operating Systems Principles (SOSP), Kiawah Island, SC, 1999
  43. P Paillier.
    Public-key cryptosystems based on composite residuosity classes. Proceedings of EUROCRYPT 1999, LNCS 1592, 1999
  44. Y Yang.
    An Evaluation of Statistical Approaches to Text Categorization. Information Retrieval, 1999
  45. S H Low, D E Lapsley.
    Optimization flow control, I: Basic algorithm and convergence. IEEE/ACM Trans. Networking, 1999
  46. J Kahn, R Katz, K Pister.
    Next Century Challenges: Mobile Networking for Smart Dust. In Proceeding of ACM International Conference on Mobile Computing and Networking(MOBICOM’99, 1999
  47. F Stajano, R Anderson.
    The resurrecting duckling: Security issues for adhoc wireless networks. In 7th International Workshop on Security Protocols, 1999
  48. S Chakrabarti, M van den Berg, B Dom.
    Focused crawling: a new approach to topic-specific web resource discovery. Comput. Netw, 1999
  49. W Heinzelman, J Kulik, H Balakrishnan.
    Adaptive protocols for information dissemination in wireless sensor networks. in Proceedings of Mobicom ’99, 1999
  50. K Nichols, V Jacobson, L Zhang.
    A two-bit differentiated services architecture for the Internet. IETF RFC, 1999
  51. G Banga, P Druschel, J C Mogul.
    Resource containers: A new facility for resource management in server systems. In Proc. of OSDI, 1999
  52. B Bernanke, M Gertler, S Gilchrist.
    The financial accelerator in a quantitative business cycle framework. in J Taylor and M Woodford (eds), Handbook of Macroeconomics, Elsevier, 1999
  53. Anind K Dey, Daniel Salber, Gregory D Abowd.
    The context toolkit: aiding the development of context-enabled applications. In Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit, CHI ’99, 1999
  54. K K Ramakrishnan, S Floyd.
    A proposal to add Explicit Congestion Notification (ECN. 1999
  55. A C Myers.
    JFlow: Practical mostly-static information flow control. In Principles of Programming Languages (POPL, 1999
  56. G Holland, N Vaidya.
    Analysis of TCP performance over mobile ad hoc networks. In Proc. of ACM MobiCom, 1999
  57. Peri Tarr, Harold Ossher, Stanley M Sutton, William Harrison.
    N degrees of separation: Multi-dimensional separation of concerns. In Proceedings of the International Conference on Software Engineering, 1999
  58. S Floyd, T Henderson.
    The newreno modification to tcp’s fast recovery algorithm. in, 1999
  59. J Shanmugasundaram, K Tufte, C Zhang, G He, D J DeWitt, J F Naughton.
    Relational Databases for Querying XML Documents: Limitations and Opportunities. In The VLDB Journal, 1999
  60. M Collins, Y Singer.
    Unsupervised models for named entity classification. In EMNLP, 1999
  61. D Duffie, K Singleton.
    Modelling the Term Structure of Defaultable Bonds. Review of Financial Studies, 1999
  62. E Zitzler, L Thiele.
    Multiobjective evolutionary algorithms: A comparative study and the strength Pareto approach. D. DUMITRESCU, CRINA GROS¸AN, AND MIHAI OLTEAN, 1999
  63. R Cooley, B Mobasher, J Srivastava.
    Data Preparation for Mining World Wide Web Browsing Patterns. In Journal of Knowledge and Information Systems, 1999
  64. M K Pitt, N Shephard.
    Filtering via simulation: Auxiliary particle filters. Journal of the American Statistical Association, 1999
  65. R Rejaie, M Handley, D Estrin.
    RAP: An End-to-End Rate-Based Congestion Control Mechanism for Realtime. Streams in the Internet,” Proc. IEEE INFOCOM ’99, 1999
  66. T Hofmann.
    Probabilistic latent semantic analysis. In Uncertainty in Artificial Intelligence (UAI, 1999
  67. A Harter, A Hopper, P Steggles, A Ward, P Webster.
    The anatomy of a context-aware application. In Proceedings of the MOBICOM ’99, 1999
  68. Mathieu Desbrun, Mark Meyer, Peter Schröder, Alan H Barr.
    Implicit fairing of irregular meshes using diffusion and curvature flow. In SIGGRAPH ’99: Proceedings of the 26th annual conference on Computer graphics and interactive techniques, 1999
  69. Kevin P Murphy, Yair Weiss, Michael I Jordan.
    Loopy Belief Propagation for Approximate Inference: An Empirical Study. In Proceedings of the Fifteenth Conference on Uncertainty in Artificial Intelligence, 1999
  70. Rolf Pfeifer, Christian Scheier.
    Understanding Intelligence. 1999
  71. L W Barsalou.
    Perceptual symbol systems. Behavioral and Brain Sciences, 1999
  72. M E Tipping, C M Bishop.
    Probabilistic principal component analysis. Journal of the Royal Statistical Society, 1999
  73. J Han, Y Fu.
    Discovery of Multiple-Level Association Rules from Large Databases. IEEE Transactions on Knowledge and Data Engineering, 1999
  74. C Boutilier, T Dean, S Hanks.
    Decision-theoretic planning: Structural assumptions and computational leverage. Journal of Artificial Intelligence Research, 1999
  75. M Tipping, C Bishop.
    Mixtures of probabilistic principal component analysers. Neural Computation, 1999
  76. Jeffrey S Foster, Manuel Fähndrich, Alexander Aiken.
    A theory of type qualifiers. In PLDI ’99: Proceedings of the ACM SIGPLAN 1999 conference on Programming language design and implementation, 1999
  77. M Riesenhuber, T Poggio.
    Hierarchical models of object recognition in cortex. Nature Neuroscience, 1999
  78. R S Sutton, D Precup, S Singh.
    Between mdps and semi-mdps: A framework for temporal abstraction in reinforcement learning. Artificial Intelligence, 1999
  79. D J C MacKay.
    Good error-correcting codes based on very sparse matrices. IEEE Trans. Inf. Theory, 1999
  80. Z Yao.
    Evolving artificial neural networks. Proceedings of the IEEE, 1999
  81. M Horowitz, R Ho, K Mai.
    The future of wires. In Seminconductor Research Corporation Workshop on Interconnects for Systems on a Chip, 1999
  82. A Hyvärinen.
    Fast and robust fixed-point algorithms for independent component analysis. IEEE Transactions on Neural Networks, 1999
  83. S M LaValle, J J Kuffner.
    Randomized kinodynamic planning. In Proc. IEEE Int. Conf. Robot. Autom. (ICRA, 1999
  84. W Damm, D Harel.
    LSCs: Breathing life into message sequence charts. In FMOODS, vol. 139 of IFIP Conference Proceedings, 1999
  85. N Tishby, F C Pereira, W Bialek.
    The information bottleneck method. in The 37th Annual Allerton Conference on Communication, Control, and Computing, 1999
  86. N McKeown, A Mekkittikul, V Anantharam, J Walrand.
    Achieving 100% throughput in an input-queued switch. IEEE Trans. Commun, 1999
  87. Alin Deutsch, Mary Fernandez, Daniela Florescu, Alon Levy, Dan Suciu.
    A Query Language for XML. In Proceedings of the 8th International World Wide Web Conference, 1999
  88. J P Marques Silva, K A Sakallah.
    GRASP: A search algorithm for propositional satisfiability. IEEE Transactions on Computers, 1999
  89. Paul Klemperer.
    Auction theory: A guide to the literature. 1999
  90. R C Whaley, J Dongarra.
    Automatically tuned linear algebra software. In PPSC, 1999