Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. I Stoica, R Morris, D Liben-Nowell, D Karger, M F Kaashoek, F Dabek, H Balakrishnan.
    Chord: A scalable peer-to-peer lookup service for Internet applications. In SIGCOMM, 2001
    2971
  2. A Rowstron, P Druschel.
    Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Sys-tems. Proc. IFIP/ACM Int’l Conf. Distributed Systems Platforms (Middleware ’01, 2001
    1488
  3. J Lafferty, A McCallum, F Pereira.
    Conditional random fields: Probabilistic models for segmenting and labeling sequence data. In Proceedings of 18th International Conference on Machine Learning (ICML2001, 2001
    1444
  4. T Berners-Lee, J Hendler, Lassila.
    O.: The Semantic Web. Scientific American, 2001
    1337
  5. A Hyvärinen, J Karhunen, E Oja.
    Independent Component Analysis. 2001
    968
  6. Gregor Kiczales, Erik Hilsdale, Jim Hugunin, Mik Kersten, Jeffrey Palm, William G Griswold.
    An overview of AspectJ. In Proceedings of the European Conference on ObjectOriented Programming (ECOOP, 2001
    954
  7. M W Moskewicz, C F Madigan, Y Zhao, L Zhang, S Malik.
    Engineering an efficient SAT solver. In Proceedings of the 38th Design Automation Conference, 2001
    891
  8. D G Andersen, H Balakrishnan, M F Kaashoek, R Morris.
    Resilient Overlay Networks. In Proc. 18th ACM Symposium on Operating Systems Principles (SOSP, 2001
    846
  9. Y Boykov, O Veksler, R Zabih.
    Fast approximate energy minimization via graph cuts. IEEE TPAMI, 2001
    825
  10. D Boneh, M Franklin.
    Identity-based encryption from the weil pairings. Advances in Cryptology-Asiacrypt 2001, LNCS 2248, 2001
    797
  11. E Rahm, P A Bernstein.
    A Survey of Approaches to Automatic Schema Matching. VLDB J, 2001
    782
  12. F Dabek, M Kaashoek, D Karger, R Morris, I Stoica.
    Wide-area cooperative storage with CFS. ACM SIGOPS Operating Systems Review, 2001
    766
  13. F R Kschischang, B J Frey, H A Loeliger.
    Factor Graphs and the Sum-Product Algorithm. IEEE Trans. on Information Theory, 2001
    694
  14. Y Xu, J Heidemann, D Estrin.
    Geography-informed Energy Conservation for Adhoc Routing. in Proceeding of the 7 th Annual International Conference on Mobile Computing and Networking, 2001
    623
  15. A Rowstron, P Druschel.
    Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In Symposium on Operating Systems Principles, 2001
    600
  16. M Grossglauser, D Tse.
    Mobility Increases the Capacity of Ad-hoc Wireless Networks. IEEE INFOCOM, 2001
    599
  17. A Perrig, R Szewczyk, V Wen, D Culler, J D Tygar.
    SPINS: Security Protocols for Sensor Networks. in: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MobiCom, 2001
    552
  18. T H Cormen, C E Leiserson, R L Rivest, C Stein.
    Introduction to Algorithms, second edition. 2001
    513
  19. A Savvides, C Han, M Srivastava.
    Dynamic fine-grained localization in ad-hoc networks of sensors. In Proceedings of ACM MobiCom ’01, 2001
    503
  20. P Bose, P Morin, I Stojmenovic, J Urrutia.
    Routing with guaranteed delivery in ad hoc wireless networks. In ACM DIALM 99, 2001
    497
  21. K Czajkowski, S Fitzgerald, I Foster, C Kesselman.
    Grid information services for distributed resource sharing. In Proc. of the 10th IEEE International symposium on High Performance Distributed Computing (HPDC-10’01, 2001
    492
  22. K Ramakrishnan, S Floyd, D Black.
    The Addition of Explicit Congestion Notification. ECN) to IP,” IETF RFC 3168, 2001
    473
  23. E Rosen, A Viswanathan, R Callon.
    Multiprotocol label switching architecture. IETF RFC 3031, 2001
    468
  24. S Thrun, D Fox, W Burgard, F Dellaert.
    Robust Monte Carlo localization for mobile robots. Artificial Intelligence, 2001
    467
  25. T Chan, L Vese.
    Active contours without edges. IEEE Transactions on Image Processing, 2001
    465
  26. M D Ernst, J Cockrell, W G Griswold, D Notkin.
    Dynamically discovering likely program invariants to support program evolution. IEEE Transactions on Software Engineering, 2001
    458
  27. S SAVAGE, D WETHERALL, A KARLIN, T ANDERSON.
    Network support for IP traceback. ACM/IEEE Trans. on Networking 9, 2001
    457
  28. D Boneh, B Lynn, H Shacham.
    Short signatures from the Weil pairing. Advances in Cryptology-Asiacrypt’01, LNCS 2248, 2001
    432
  29. W J Dally, B Towles.
    Route packets, not wires: on-chip interconnection networks. IEEE International Conference on Design and Automation, 2001
    413
  30. D D Lee, H S Seung.
    Algorithms for non-negative matrix factorization. In NIPS, 2001
    410
  31. L Getoor, N Friedman, D Koller, A Pfeffer.
    Learning probabilistic relational models. In D˘zeroski, S., & Lavra˘c, N. (Eds.), Relational Data Mining, 2001
    409
  32. A A Efros, W T Freeman.
    Image quilting for texture synthesis and transfer. Proc. 28th Conf. on Computer Graphics and Interactive Techniques, 2001
    391
  33. R Clarida, J Gali, M Gertler.
    Monetary policy rules and macroeconomic stability: Evidence and some theory, Quarterly. Journal of Economics, 2001
    378
  34. J Madhavan, P A Bernstein, E Rahm.
    Generic Schema Matching with Cupid. Proc. VLDB, 2001
    368
  35. J LI, C BLAKE, D S J D COUTO, H I LEE, R MORRIS.
    Capacity of ad hoc wireless networks. In ACM MobiCom, 2001
    368
  36. B Schölkopf, J C Platt, J C Shawe-Taylor, A J Smola, R C Williamson.
    Estimating the support of a high-dimensional distribution. Neural Computation, 2001
    361
  37. A K DEY.
    Understanding and using context. Personal and Ubiquitous Computing Journal, 2001
    360
  38. S Q Zhuang, B Y Zhao, A D Joseph, R H Katz, J D Kubiatowicz.
    Bayeux: An Architecture for Scalable and Fault-Tolerant Wide-Area Data Dissemination. In NOSSDAV ’01: Proceedings of the 11th international workshop on Network and, 2001
    359
  39. L Gao.
    On Inferring Autonomous System Relationships in the Internet. IEEE/ACM Transactions on Networking, 2001
    340
  40. R DeLine, M Fahndrich.
    Enforcing high-level protocols in low-level software. In Programming Language Design and Implementation (PLDI, 2001
    340
  41. D Martin, C Fowlkes, D Tal, J Malik.
    A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics. in Proceedings of the 8th International Conference Computer Vision, 2001
    339
  42. T Ball, R Majumdar, T Millstein, S K Rajamani.
    Automatic predicate abstraction of C programs. In Programming Language Design and Implementation (PLDI, 2001
    337
  43. E L Allwein, R E Schapire, Y Singer.
    Reducing multiclass to binary: a unifying approach for margin classifiers. 2001
    324
  44. V Haarslev, R Möller.
    RACER System Description. In Proc. IJCAR 2001, 2001
    318
  45. A Woo, D E Culler.
    A transmission control scheme for media access in sensor networks. In MobiCom ’01: Proceedings of the 7th annual international conference on Mobile computing and networking, 2001
    307
  46. J Chase, D Anderson, P Thakar, A Vahdat, R Doyle.
    Managing energy and server resources in hosting centers. in Proceedings of the ACM Symposium on Operating Systems Principles (SOSP, 2001
    307
  47. I Niles, A Pease.
    Towards a standard upper ontology. In Proc. FOIS, 2001
    303
  48. S Capkun, M Hamdi, J Hubaux.
    GPS-free positioning in mobile ad hoc networks. in Int. Conf. on System Sciences (HICSS-34) pp 3481-3490, Maui, 2001
    300
  49. A-H Doan, P Domingos, A Y Halevy.
    Reconciling the Schemas of Disparate Data Sources: A MachineLearning Approach. Proc. SIGMOD, 2001
    298
  50. J Z Wang, J Li, G Wiederhold.
    SIMPLIcity: SemanticsSensitive Integrated Matching for Picture Libraries. IEEE Trans. Pattern Analysis and Machine Intelligence, 2001
    298
  51. G Navarro.
    A Guided Tour to Approximate String Matching. ACM Computing Surveys, 2001
    296
  52. S Ratnasamy, M Handley, R Karp, S Shenker.
    Application-level multicast using content-addressable networks. In Proceedings of the Third International COST264 Workshop on Networked Group Communication, 2001
    294
  53. N Damianou, N Dulay, E Lupu, M Sloman.
    The Ponder policy specification language. In Proc. Policies for Distributed Systems and Networks, LNCS, 2001
    293
  54. E Zitzler, M Laumanns, L Thiele.
    SPEA2: Improving the strength pareto evolutionary algorithm. 2001
    293
  55. C Labovitz, A Ahuja, A Bose, F Jahanian.
    Delayed Internet routing convergence. ACM Trans. Networking, 2001
    288
  56. M Belkin, P Niyogi.
    Laplacian Eigenmaps and spectral techniques for embedding and clustering. in Advances in Neural Information Processing Systems 14, 2001
    284
  57. D F Ferraiolo, R Sandhu, S Gavrila, D R Kuhn, R Chandramouli.
    Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security, 2001
    283
  58. Thomas Hofmann.
    Unsupervised Learning by Probabilistic Latent Semantic Analysis. In Journal of machine Learning, 2001
    280
  59. D Pendarakis, S Shi, D Verma, M Waldvogel.
    ALMI: An Application Level Multicast Infrastructure. Proc. of 3rd USENIX Symp. on Internet Technologies and Systems (USITS, 2001
    280
  60. K-R Müller, S Mika, G Rätsch, K Tsuda, B Schölkopf.
    An introduction to kernel-based learning algorithms. IEEE Trans. Neural Netw, 2001
    279
  61. Huma Lodhi, John Shawe-Taylor, Nello Cristianini, Chris Watkins.
    Text classification using string kernels. 2001
    275
  62. N Borisov, I Goldberg, D Wagner.
    Intercepting mobile communications: The insecurity of 802.11. in ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom, 2001
    274
  63. S Antoy, M Hanus, B Massey, F Steiner.
    An Implementation of Narrowing Strategies. In Proc. of the 3rd International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming (PPDP 2001, 2001
    272
  64. Karl Aberer, Zoran Despotovic.
    Managing trust in a peer-2-peer information system. In 10th international conference on Information and knowledge management, 2001
    269
  65. S Borzsonyi, D Kossmann, K Stocker.
    The skyline operator. In ICDE Conf, 2001
    267
  66. D Acemoglu, S Johnson, J A Robinson.
    The Colonial Origins of Comparative Development: An Empirical Investigation.” American Economic Review 91. Montana State University, 2001
    265
  67. A Cerpa, J Elson, D Estrin, L Girod, M Hamilton, J Zhao.
    Habitat monitoring: application driver for wireless communications technology. In Proceedings of the 2001 ACM SIGCOMM Workshop on Data Communications in Latin America and the Caribbean, 2001
    264
  68. M W M Gamini Dissanayake, Paul Newman, Steven Clark, Hugh F Durrant-Whyte, M Csorba.
    A solution to the simultaneous localization and map building (SLAM) problem. IEEE Transactions on Robotics and Automation, 2001
    262
  69. D Agrawal, C C Aggarwal.
    On the design and quantification of privacy preserving data mining algorithms. In PODS ’01: Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, 2001
    257
  70. A I T Rowstron, A-M Kermarrec, M Castro, P Druschel.
    SCRIBE: The design of a large-scale event notification infrastructure. In Networked Group Communication, 2001
    253
  71. Peter Buneman, Sanjeev Khanna, Wang-Chiew Tan.
    Why and Where: A characterization of data provenance. In ICDT, 2001
    246
  72. O Faugeras, Q T Luong.
    The geometry of multiple images. 2001
    246
  73. B Bonet, H Geffner.
    Planning as heuristic search. Artificial Intelligence, 2001
    246
  74. S Tong, E Chang.
    Support vector machine active learning for image retrieval. In Proceedings of ACM International Conference on Multimedia, 2001
    245
  75. K Wagstaff, C Cardie, S Rogers, S Schroedl.
    Constrained k-means clustering with background knowledge. In Proceedings of the Eighteenth International Conference on Machine Learning, 2001
    243
  76. G Holland, N Vaidya, P Bahl.
    A Rate-Adaptive MAC Protocol for Multi-Hop Wireless Networks. In Proc. ACM/IEEE MobiCom, 2001
    242
  77. L Zhang, C Madigan, M Moskewicz, S Malik.
    Efficient Conflict Driven Learning in a Boolean Satisfiability. Solver. International Conference on Computer-Aided Design (ICCAD01, 2001
    242
  78. D Wagner, Dean.
    D.: Intrusion Detection via Static Analysis. In: IEEE Symposium on Security and Privacy, 2001
    242
  79. S Floyd, V Paxson.
    Difficulties in simulating the internet. IEEE/ACM Trans. Netw, 2001
    242
  80. T Richardson, M A Shokrollahi, R Urbanke.
    Design of capacity-approaching irregular low-density parity check codes. IEEE Trans. Info. Theory, 2001
    241
  81. N R Jennings.
    An agent-based approach for building complex software systems. Communications of the ACM, 2001
    241
  82. G Kiczales, E Hilsdale, J Hugunin, M Kersten, J Palm, W G Griswold.
    Getting started with AspectJ. Comm. ACM, 2001
    240
  83. L Qiu, V N Padmanabhan, G M Voelker.
    On the placement of web server replicas. In Proceedings of IEEE INFOCOM, 2001
    240
  84. W Daelemans, J Zavrel, K van der Sloat, A van den Bosch.
    Timbl: Tilburg memory based learner, version 4.0, reference guide. 2001
    239