Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. J M Kleinberg.
    Authoritative sources in a hyperlinked environment. Journal of the ACM, 1999
    2152
  2. E M Clarke, O Grumberg, D A Peled.
    Model Checking. 1999
    1975
  3. R Baeza-Yates, B Ribeiro-Neto.
    Modern Information Retrieval. 1999
    1867
  4. C E Perkins, E M Royer.
    Ad Hoc On-Demand Distance Vector Routing. Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, Pages, 1999
    1662
  5. M Faloutsos, P Faloutsos, C Faloutsos.
    On Power-Law Relationships of the Internet Topology. Computer Comm. Rev, 1999
    979
  6. Scott Shaobing Chen, David L Donoho, Michael A Saunders.
    Atomic decomposition by basis pursuit. SIAM Journal on Scientific Computing, 1999
    971
  7. David G Lowe.
    Object recognition from local scale-invariant features. In Proc. of the International Conference on Computer Vision ICCV, Corfu, 1999
    958
  8. A K Jain, M N Murty, P J Flynn.
    Data clustering: A review. ACM Computing Surveys, 1999
    865
  9. T R Golub, D K Slonim, P Tamayo, C Huard, M Gaasenbeek, J P Mesirov, H Coller, M L Loh, J R Downing, M A Caligiuri, C D Bloomfield, E S Lander.
    Molecular classification of cancer: Class discovery and class prediction by gene expression monitoring. Science, 1999
    779
  10. E M Royer, C-K Toh.
    A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Personal Communications, 1999
    730
  11. D Estrin, R Govindan, J Heidemann.
    Kumar S.: Next Century Challenges: Scalable Coordination in Sensor Networks. In: Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom99, 1999
    725
  12. I H Witten, A Moffat, T C Bell.
    Managing Gigabytes - Compressing and Indexing Documents and Images. 1999
    708
  13. Martín Abadi, Andrew D Gordon.
    A calculus for cryptographic protocols: the spi calculus. in [AG97]. Martín Abadi and, 1999
    695
  14. L Breslau, P Cao, L Fan, G Phillips, S Shenker.
    Web caching and zipf-like distributions: Evidence and implications. In INFOCOM, 1999
    694
  15. Ora Lassila, Ralph Swick.
    Resource Description Framework (RDF) Model and Syntax Specification. W3C Recommendation, 1999
    679
  16. S Floyd, K Fall.
    Promoting the use of end-to-end congestion control in the internet. IEEE/ACM Trans. Netw, 1999
    669
  17. R Downey, M Fellows.
    Parameterized Complexity. 1999
    652
  18. M Jordan, Z Ghahramani, T Jaakkola, L Saul.
    An introduction to variational methods for graphical models. Machine Learning, 1999
    630
  19. V Tarokh, H Jafarkhani, A R Calderbank.
    Space-Time Block Codes from Orthogonal Designs. IEEE Transactions on Information Theory, 1999
    608
  20. L Zhou, Z Haas.
    Securing Ad Hoc Networks. IEEE Networks, 1999
    599
  21. S Chen, J Goodman.
    An empirical study of smoothing techniques for language modeling. Computer Speech and Language, 1999
    592
  22. A Biere, A Cimatti, E M Clarke, Y Zhu.
    Symbolic model checking without BDDs. 5th International Conference on Tools and Algorithms for Construction and Analysis of Systems, volume 1579 of LNCS, 1999
    580
  23. J H˚astad, R Impagliazzo, L A Levin, Luby.
    M.: A pseudorandom generator from any one-way function. SIAM J. Comput, 1999
    573
  24. R Clarida, J Galí, M Gertler.
    The Science of Monetary Policy: A New Keynesian Perspective. Journal of Economic Perspectives, 1999
    562
  25. V BLANZ, VETTER.
    T.: A morphable model for the synthesis of 3D faces. In Proc. SIGGRAPH, 1999
    561
  26. A A Efros, T K Leung.
    Texture synthesis by non-parametric sampling. in [ICCV ’99: Proceedings of the International Conference on Computer Vision-Volume 2], 1033, IEEE Computer Society, 1999
    556
  27. R Fielding, J Gettys, J Mogul, H Frystyk, L Masinter, P Leach, T Berners-Lee.
    Hypertext Transfer Protocol – HTTP/1.1. KBC05] [KM00] Tadayoshi Kohno, Andre Broido, and K.C. Claffy. Remote Physical Device Fingerprinting. IEEE Transcations on Dependable and Secure Computing, 2(2), April-June, 1999
    538
  28. Y Yang, X Liu.
    A re-examination of text categorization methods. In Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR, 1999
    523
  29. T Hofmann.
    Probabilistic latent semantic indexing. In SIGIR, 1999
    503
  30. M Castro, B Liskov.
    Practical Byzantine fault tolerance. In Proceedings of the Third Symposium on Operating Systems Design and Implementation, 1999
    467
  31. P C Kocher, J Jaffe, Jun.
    B.: Differential power analysis. In: CRYPTO, 1999
    462
  32. E Koutsoupias, C Papadimitriou.
    Worst-case equilibria. In Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science, 1999
    458
  33. A Igarashi, B Pierce, P Wadler.
    Featherweight Java: A minimal core calculus for Java and GJ. In Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA, 1999
    458
  34. Charles E Perkins C E Perkin, Elizabeth M Royer.
    Ad hoc on-demand distance vector (AODV) routing. Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, 1999
    457
  35. F Nielson, H R Nielson, C Hankin.
    Principles of Program Analysis. 1999
    456
  36. Shmuel Sagiv, Thomas W Reps, Reinhard Wilhelm.
    Parametric shape analysis via 3-valued logic. In POPL, 1999
    448
  37. D M Gavrila.
    The visual analysis of human movement: a survey,” Comput. Vis. Image Underst, 1999
    445
  38. A K Dey, G D Abowd.
    Towards a Better Understanding of Context and Context-Awareness. Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing, 1999
    435
  39. V Rodoplu, T H Meng.
    Minimum energy mobile wireless networks. IEEE Journal of Selected Areas in Communications, 1999
    425
  40. M T Özsu, P Valduriez.
    Principles of Distributed Database Systems. 1999
    419
  41. Y Freund, R Schapire, N Abe.
    A Short Introduction to Boosting. Journal of Japanese Society for Artificial Intelligence, 1999
    415
  42. W Adjie-Winoto, E Schwartz, H Balakrishnan, J Lilley.
    The design and implementation of an intentional naming system. In 17th ACM Symposium on Operating Systems Principles (SOSP), Kiawah Island, SC, 1999
    415
  43. P Paillier.
    Public-key cryptosystems based on composite residuosity classes. Proceedings of EUROCRYPT 1999, LNCS 1592, 1999
    410
  44. Y Yang.
    An Evaluation of Statistical Approaches to Text Categorization. Information Retrieval, 1999
    408
  45. S H Low, D E Lapsley.
    Optimization flow control, I: Basic algorithm and convergence. IEEE/ACM Trans. Networking, 1999
    406
  46. J Kahn, R Katz, K Pister.
    Next Century Challenges: Mobile Networking for Smart Dust. In Proceeding of ACM International Conference on Mobile Computing and Networking(MOBICOM’99, 1999
    403
  47. F Stajano, R Anderson.
    The resurrecting duckling: Security issues for adhoc wireless networks. In 7th International Workshop on Security Protocols, 1999
    402
  48. S Chakrabarti, M van den Berg, B Dom.
    Focused crawling: a new approach to topic-specific web resource discovery. Comput. Netw, 1999
    398
  49. W Heinzelman, J Kulik, H Balakrishnan.
    Adaptive protocols for information dissemination in wireless sensor networks. in Proceedings of Mobicom ’99, 1999
    395
  50. K Nichols, V Jacobson, L Zhang.
    A two-bit differentiated services architecture for the Internet. IETF RFC, 1999
    390
  51. G Banga, P Druschel, J C Mogul.
    Resource containers: A new facility for resource management in server systems. In Proc. of OSDI, 1999
    385
  52. B Bernanke, M Gertler, S Gilchrist.
    The financial accelerator in a quantitative business cycle framework. in J Taylor and M Woodford (eds), Handbook of Macroeconomics, Elsevier, 1999
    372
  53. Anind K Dey, Daniel Salber, Gregory D Abowd.
    The context toolkit: aiding the development of context-enabled applications. In Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit, CHI ’99, 1999
    371
  54. K K Ramakrishnan, S Floyd.
    A proposal to add Explicit Congestion Notification (ECN. 1999
    367
  55. A C Myers.
    JFlow: Practical mostly-static information flow control. In Principles of Programming Languages (POPL, 1999
    366
  56. G Holland, N Vaidya.
    Analysis of TCP performance over mobile ad hoc networks. In Proc. of ACM MobiCom, 1999
    364
  57. Peri Tarr, Harold Ossher, Stanley M Sutton, William Harrison.
    N degrees of separation: Multi-dimensional separation of concerns. In Proceedings of the International Conference on Software Engineering, 1999
    359
  58. S Floyd, T Henderson.
    The newreno modification to tcp’s fast recovery algorithm. in http://www.ietf.org/rfc/rfc2582.txt, 1999
    358
  59. J Shanmugasundaram, K Tufte, C Zhang, G He, D J DeWitt, J F Naughton.
    Relational Databases for Querying XML Documents: Limitations and Opportunities. In The VLDB Journal, 1999
    357
  60. M Collins, Y Singer.
    Unsupervised models for named entity classification. In EMNLP, 1999
    351
  61. D Duffie, K Singleton.
    Modelling the Term Structure of Defaultable Bonds. Review of Financial Studies, 1999
    350
  62. E Zitzler, L Thiele.
    Multiobjective evolutionary algorithms: A comparative study and the strength Pareto approach. D. DUMITRESCU, CRINA GROS¸AN, AND MIHAI OLTEAN, 1999
    348
  63. R Cooley, B Mobasher, J Srivastava.
    Data Preparation for Mining World Wide Web Browsing Patterns. In Journal of Knowledge and Information Systems, 1999
    344
  64. M K Pitt, N Shephard.
    Filtering via simulation: Auxiliary particle filters. Journal of the American Statistical Association, 1999
    344
  65. R Rejaie, M Handley, D Estrin.
    RAP: An End-to-End Rate-Based Congestion Control Mechanism for Realtime. Streams in the Internet,” Proc. IEEE INFOCOM ’99, 1999
    344
  66. T Hofmann.
    Probabilistic latent semantic analysis. In Uncertainty in Artificial Intelligence (UAI, 1999
    343
  67. A Harter, A Hopper, P Steggles, A Ward, P Webster.
    The anatomy of a context-aware application. In Proceedings of the MOBICOM ’99, 1999
    343
  68. Mathieu Desbrun, Mark Meyer, Peter Schröder, Alan H Barr.
    Implicit fairing of irregular meshes using diffusion and curvature flow. In SIGGRAPH ’99: Proceedings of the 26th annual conference on Computer graphics and interactive techniques, 1999
    343
  69. Kevin P Murphy, Yair Weiss, Michael I Jordan.
    Loopy Belief Propagation for Approximate Inference: An Empirical Study. In Proceedings of the Fifteenth Conference on Uncertainty in Artificial Intelligence, 1999
    341
  70. Rolf Pfeifer, Christian Scheier.
    Understanding Intelligence. 1999
    339
  71. L W Barsalou.
    Perceptual symbol systems. Behavioral and Brain Sciences, 1999
    338
  72. M E Tipping, C M Bishop.
    Probabilistic principal component analysis. Journal of the Royal Statistical Society, 1999
    338
  73. J Han, Y Fu.
    Discovery of Multiple-Level Association Rules from Large Databases. IEEE Transactions on Knowledge and Data Engineering, 1999
    330
  74. C Boutilier, T Dean, S Hanks.
    Decision-theoretic planning: Structural assumptions and computational leverage. Journal of Artificial Intelligence Research, 1999
    329
  75. M Tipping, C Bishop.
    Mixtures of probabilistic principal component analysers. Neural Computation, 1999
    329
  76. Jeffrey S Foster, Manuel Fähndrich, Alexander Aiken.
    A theory of type qualifiers. In PLDI ’99: Proceedings of the ACM SIGPLAN 1999 conference on Programming language design and implementation, 1999
    322
  77. M Riesenhuber, T Poggio.
    Hierarchical models of object recognition in cortex. Nature Neuroscience, 1999
    320
  78. R S Sutton, D Precup, S Singh.
    Between mdps and semi-mdps: A framework for temporal abstraction in reinforcement learning. Artificial Intelligence, 1999
    319
  79. D J C MacKay.
    Good error-correcting codes based on very sparse matrices. IEEE Trans. Inf. Theory, 1999
    318
  80. Z Yao.
    Evolving artificial neural networks. Proceedings of the IEEE, 1999
    318
  81. M Horowitz, R Ho, K Mai.
    The future of wires. In Seminconductor Research Corporation Workshop on Interconnects for Systems on a Chip, 1999
    317
  82. A Hyvärinen.
    Fast and robust fixed-point algorithms for independent component analysis. IEEE Transactions on Neural Networks, 1999
    317
  83. S M LaValle, J J Kuffner.
    Randomized kinodynamic planning. In Proc. IEEE Int. Conf. Robot. Autom. (ICRA, 1999
    313
  84. W Damm, D Harel.
    LSCs: Breathing life into message sequence charts. In FMOODS, vol. 139 of IFIP Conference Proceedings, 1999
    308
  85. N Tishby, F C Pereira, W Bialek.
    The information bottleneck method. in The 37th Annual Allerton Conference on Communication, Control, and Computing, 1999
    304
  86. N McKeown, A Mekkittikul, V Anantharam, J Walrand.
    Achieving 100% throughput in an input-queued switch. IEEE Trans. Commun, 1999
    303
  87. Alin Deutsch, Mary Fernandez, Daniela Florescu, Alon Levy, Dan Suciu.
    A Query Language for XML. In Proceedings of the 8th International World Wide Web Conference, 1999
    301
  88. J P Marques Silva, K A Sakallah.
    GRASP: A search algorithm for propositional satisfiability. IEEE Transactions on Computers, 1999
    298
  89. Paul Klemperer.
    Auction theory: A guide to the literature. 1999
    296
  90. R C Whaley, J Dongarra.
    Automatically tuned linear algebra software. In PPSC, 1999
    294