Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. B Schölkopf, A Smola.
    Learning with kernels. 2002
    1456
  2. S Saroiu, K P Gummadi, S D Gribble.
    A measurement study of peer-to-peer file sharing systems. in Multimedia Computing and Networking (MMCN, 2002
    907
  3. K Papineni, S Roukos, T Ward, Zhu.
    W.: Bleu: a method for automatic evaluation of machine translation. In: 40th Meeting of the Association for Computational Linguistics, 2002
    902
  4. S Madden, M J Franklin, J M Hellerstein, W Hong.
    Tag: a tiny aggregation service for ad-hoc sensor networks. SIGOPS Operating System Review, 2002
    861
  5. J R Douceur.
    The Sybil Attack. In IPTPS ’01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, 2002
    842
  6. F Sebastiani.
    Machine learning in automated text categorization. ACM Computing Surveys, 2002
    807
  7. A Mainwaring, J Polastre, R Szewczyk, D Culler, J Anderson, “Wireless.
    sensor networks for habitat monitoring. Proc of WSNA, 2002
    787
  8. Wei Ye, John Heidemann, Deborah Estrin.
    An energy-efficient MAC protocol for wireless sensor networks. In Proceedings of the IEEE Infocom, 2002
    742
  9. M S Arulampalam, S Maskell, N Gordon, T Clapp.
    A tutorial on particle filters for online nonlinear, non-Gaussian Bayesian tracking. IEEE Transactions on Signal Processing, 2002
    712
  10. D Scharstein, R Szeliski.
    A taxonomy and evaluation of dense two-frame stereo correspondence algorithms. Int. J. Comput. Vision, 2002
    684
  11. R Albert, A Barabási.
    Statistical mechanics of complex networks. Reviews of modern physics, 2002
    683
  12. B Chen, K Jamieson, H Balakrishnan, R Morris.
    BSpan: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks. Wireless Netw, 2002
    615
  13. M Lenzerini.
    Data integration: A theoretical perspective. In Proc. PODS, 2002
    563
  14. Thorsten Joachims T Joachims.
    Optimizing Search Engines Using Clickthrough Data. IEEE Proc. ACM SIGKDD, 2002
    518
  15. T Sherwood, E Perelman, G Hamerly, B Calder.
    Automatically characterizing large scale program behavior. in Proceedings of the Tenth International Conference on Architectural Support for Programming Languages and Operating Systems, 2002
    508
  16. K Deb, A Pratap, S Agarwal, Meyarivan.
    T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation, 2002
    507
  17. S Banerjee, B Bhattacharjee, C Kommareddy.
    Scalable Application Layer Multicast. Proc. of ACM SIGCOMM 2002, 2002
    506
  18. T Camp, J Boleng, V Davies.
    A Survey of Mobility Models for Ad Hoc Network Research. Wireless Communication & Mobile Computing (WCMC), Special Issue on Mobile Ad Hoc Networking: Research, Trends and Applications, 2002
    493
  19. N Spring, R Mahajan, D Wetherall.
    Measuring ISP topologies with Rocketfuel. in Proc. ACM SIGCOMM, 2002
    469
  20. Y-C Hu, A Perrig, D B Johnson.
    Ariadne: A Secure OnDemand Routing Protocol for Ad Hoc Networks. Proc. ACM MobiCom ’02, 2002
    459
  21. E N M ELNOZAHY, L ALVISI, Y-M WANG, D B JOHNSON.
    A survey of rollback-recovery protocols in message-passing systems. ACM Computing Surveys, 2002
    456
  22. L Peterson, T Anderson, D Culler, T Roscoe.
    A Blueprint for Introducing Disruptive Technology into the Internet. Proc. of HotNet-I, 2002
    456
  23. T Sandholm.
    Algorithm for optimal winner determination in combinatorial auctions. Artificial Intelligence, 2002
    450
  24. Qin Lv, Pei Cao, Edith Cohen, Kai Li, Scott Shenker.
    Search and Replication in Unstructured Peer-to-Peer Networks. In ICS ’02: Proceedings of the 16th international conference on Supercomputing, 2002
    436
  25. Daniel Gildea, Daniel Jurafsky.
    Automatic labelling of semantic roles. Computational Linguistics, 2002
    434
  26. E Ng, H Zhang.
    Predicting Internet Network Distance with Coordiantes-Based Approaches. Proc. IEEE INFOCOM ’02, 2002
    433
  27. B White, J Lepreau, L Stoller, R Ricci, G Guruprasad, M Newbold, M Hibler, C Barb, A Joglekar.
    An integrated experimental environment for distributed systems and networks. in OSDI, 2002
    421
  28. J Elson, L Girod, D Estrin.
    Fine-grained network time synchronization using reference broadcasts. ACM SIGOPS Operating Syst. Rev, 2002
    413
  29. X Zeng, R Bagrodia, M Gerla.
    GloMoSim: A library for parallel simulation of large scale wireless networks. In Proceedings of the Workshop on Parallel and Distributed Simulations, 2002
    412
  30. W B Heinzelman, A P Chandrakasan, H Balakrishnan.
    An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wireless Communications, 2002
    411
  31. P Maymounkov, D Mazieres.
    Kademlia: A peer-to-peer information system based on the XOR metric. In IPTPS, 2002
    409
  32. A Stolcke.
    SRILM - An Extensible Language Modeling Toolkit. In: International Conference on Spoken Language Processing, 2002
    407
  33. J Frey, T Tannenbaum, M Livny, I Foster, S Tuecke.
    Condor-G: a computation management agent for Multi-Institutional grids. Cluster Computing, 2002
    401
  34. A Mockus, R Fielding, J Herbsleb.
    Two case studies of open source software development: Apache and Mozilla. ACM Transactions on Software Engineering and Methodology, 2002
    390
  35. V KOLMOGOROV, R ZABIH.
    What energy functions can be minimized via graph cuts. In Proc. ECCV. CD–ROM, 2002
    387
  36. P Juang, H Oki, Y Wang, M Martonosi, L S Peh, D Rubenstein.
    Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with zebranet. in Proceedings of ACM ASPLOS, 2002
    385
  37. T A Henzinger, R Jhala, R Majumdar.
    Lazy abstraction. In Principles of Programming Languages (POPL, 2002
    366
  38. M G C Resende, L S Pitsoulis.
    Greedy randomized adaptive search procedures. In P.M. Pardalos and M.G.C. Resende, editors, Handbook of Applied Optimization, 2002
    361
  39. M Paolucci, T Kawamura, T Payne, Sycara.
    K.: Semantic matching of web services capabilities. In: The Semantic Web ISWC 2002, 2002
    353
  40. P Papadimitratos, Z J Haas.
    Secure Routing for Mobile Ad hoc Networks. In Proc. of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002, 2002
    340
  41. M Montemerlo, S Thrun, D Koller, B Wegbreit.
    FastSLAM: a factored solution to the simultaneous localization and mapping problem. Proceedings of the AAAI National Conference on Artificial Intelligence, 2002
    336
  42. B Pang, L Lee, S Vaithyanathan.
    Thumbs up? Sentiment classification using machine learning techniques. In Proceedings of the Conference on Empirical Methods in Natural Language Processing, 2002
    335
  43. A Adya, W J Bolosky, M Castro, G Cermak, R Chaiken, J R Douceur, J Howell, J R Lorch, M Theimer, R P Wattenhofer.
    Farsite: federated, available, and reliable storage for an incompletely trusted environment. In OSDI, 2002
    329
  44. M Collins.
    Discriminative training methods for hidden Markov models: Theory and experiments with perceptron algorithms. In Proceedings of the 2002 Conference on Empirical Methods in Natural Language Processing (EMNLP-02, 2002
    325
  45. S Fridlyand, J Speed, T P.
    Comparison of discrimination methods for the classification of tumors using gene expression data. Journal of the American Statistical Association, 2002
    321
  46. G E Hinton.
    Training products of experts by minimizing contrastive divergence. Neural Computation, 2002
    315
  47. N Cai, W Yeung.
    Secure network coding. IEEE International Symposium on Information Theory ISIT’02, 2002
    315
  48. T H Haveliwala.
    Topic-sensitive PageRank. In Proceedings of the Eleventh International World Wide Web Conference, 2002
    314
  49. George Necula, Scott McPeak, Shree Rahul, Westley Weimer.
    CIL: Intermediate language and tools for analysis and transformation of C programs. In International Conference on Compiler Construction, 2002
    313
  50. P Duygulu, K Barnard, N de Freitas, D Forsyth, M Jordan.
    Object recognition as machine translation: Learning a lexicon for a fixed image vocabulary. In ECCV, 2002
    313
  51. X Yan, J Han.
    gspan: Graph-based substructure pattern mining. In Proc. of ICDM, 2002
    297
  52. Brad Williams, Tracy Camp.
    Comparison of broadcasting techniques for mobile ad hoc networks. In MobiHoc ’02: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, 2002
    296
  53. P Viswanath, D N C Tse, R Laroia.
    Opportunistic beamforming using dumb antennas. IEEE Trans. on Info.Theory, 2002
    295
  54. P Levis, D Culler.
    Mate: A Tiny Virtual Machine for Sensor Networks. ACM ASPLOS-X, 2002
    292
  55. L Subramanian, S Agarwal, J Rexford, R Katz.
    Characterizing the Internet hierarchy from Multiple Vantage Points. In Proceedings of IEEE Infocom, 2002
    291
  56. J Broekstra, A Kampman, F van Harmelen.
    Sesame: A Generic Architecture for Storing and Querying. RDF and RDF Schema. In ISWC, 2002
    286
  57. G C Necula, S McPeak, W Weimer.
    CCured: Type-safe retrofitting of legacy code. In Principles of Programming Languages (POPL, 2002
    285
  58. Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth Belding Royer.
    A Secure Routing Protocol for Ad hoc Networks. In Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP ’02, 2002
    285
  59. Y –C Hu, D B Johnson, A Perrig.
    SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’02, 2002
    284
  60. D Katabi, M Handley, C Rohrs.
    Congestion control for high bandwidth-delay product networks. In Proc. of ACM SIGCOMM, 2002
    280
  61. D Jackson.
    Alloy: a lightweight object modelling notation. ACM Transactions on Software Engineering Methodology, 2002
    269
  62. Y Lindell, B Pinkas.
    Privacy preserving data mining. In Journal of Cryptology, 2002
    267
  63. Trevor Jim, J Greg Morrisett, Dan Grossman, Michael W Hicks, James Cheney, Yanling Wang.
    Cyclone: A safe dialect of C. In General Track: USENIX Annual Technical Conference, 2002
    267
  64. George W Dunlap, Samuel T King, Sukru Cinar, Murtaza A Basrai, Peter M Chen.
    ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI, 2002
    265
  65. Gurmeet Singh Manku.
    Rajeev Motwani; Approximate Frequency Counts over Data. Streams; Int'l Conf. on Very Large Databases, 2002
    262
  66. B Taskar, P Abbeel, D Koller.
    Discriminative probabilistic models for relational data. In Proceedings of 18th Conference on Uncertainty in Artificial Intelligence (UAI-2002, 2002
    261
  67. Y Yao, J Gehrke.
    The cougar approach to in-network query processing in sensor networks. in SIGMOD Record, 2002
    260
  68. C Carson, S Belongie, H Greenspan, J Malik.
    Blobworld: Image Segmentation Using Expectation-Maximization and Its Application to Image Querying. IEEE Trans. Pattern Analysis and Machine Intelligence, 2002
    258
  69. D Malkhi, M Naor, D Ratajczak.
    Viceroy: A scalable and dynamic emulation of the Butterfly. In Proceeding of the 21 st ACM Symposium on Principles of Distributed Computing (PODC’02, 2002
    256
  70. Cristian Estan, George Varghese.
    New directions in traffic measurement and accounting. SIGCOMM Comput. Commun. Rev, 2002
    256
  71. C Boyapati, R Lee, M Rinard.
    Ownership types for safe programming: Preventing data races and deadlocks. In Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA, 2002
    255
  72. Michael J Freedman, Robert Morris.
    Tarzan: A peer-to-peer anonymizing network layer. In Vijay Atluri, editor, Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, 2002
    253
  73. D Martin, C Fowlkes, J Malik.
    Learning to detect natural image boundaries using brightness and text ure. In Advances in Neural Info. Proc. Systems, 2002
    248
  74. H De Jong.
    Modeling and simulation of genetic regulatory systems: a literature review. Journal of Computational Biology, 2002
    244
  75. N Li, J C Mitchell, W H Winsborough.
    Design of a role-based trust management framework. In IEEE Symposium on Security and Privacy, 2002
    243
  76. S McIlraith, T Son.
    Adapting Golog for Composition of Semantic Web Services. Proceedings of the Eighth International Conference on Knowledge Representation and Reasoning (KR2002, 2002
    243
  77. M Ripeanu, I Foster, A Iamnitchi.
    Mapping the gnutella network: properties of large-scale peer-to-peer systems and implications for system design. IEEE Internet Computing Journal, 2002
    243
  78. R Lienhart, J Maydt.
    An extended set of haar-like features for rapid object detection. IEEE ICIP, 2002
    242
  79. S Hangal, M Lam.
    Tracking down software bugs using automatic anomaly detection. In Proceedings of International conference on Software engineering, 2002
    242
  80. Srini Narayanan, Sheila A McIlraith.
    Simulation, verification and automated composition of web services. In Proceedings of the 11th International Conference on World Wide Web, 2002
    241
  81. D Chaum, A Fiat, M Naor.
    Untraceable electronic cash. in Proc. on Advances in Cryptology (CRYPTO’88, 2002
    240
  82. M MEYER, M DESBRUN, P SCHRÖDER, A BARR.
    H.: Discrete differential-geometry operators for triangulated 2-manifolds. Visualization and Mathematics III, 2002
    238
  83. P S L M Barreto, H Y Kim, B Lynn, M Scott.
    Efficient algorithms for pairing-based cryptosystems. In Advances in Cryptology – CRYPTO 2002, 2002
    238
  84. T Ojala, M Pietikäinen, T Mäenpää.
    Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2002
    233
  85. C Boyapati, S Khurshid, D Marinov.
    Korat: Automated testing based on Java predicates. In International Symposium on Software Testing and Analysis (ISSTA, 2002
    233
  86. P Turney.
    Thumbs up or thumbs down? semantic orientation applied to unsupervised classification of reviews. In Proceedings of the 40th Annual Meeting fo the Association for Computational Linguistics, 2002
    233
  87. J Ioannidis, S M Bellovin.
    Implementing Pushback: Router-Based Defense against DDoS. Attacks,” Proc. Network and Distributed System Security Symp, 2002
    233
  88. B Johanson, A Fox, T Winograd.
    The Interactive Workspaces Project: Experiences with Ubiquitous Computing Rooms. IEEE Pervasive Computing Magazine, 2002
    230
  89. A Muthitacharoen, R Morris, T M Gil, B Chen.
    Ivy: A Read/Write Peer-to-Peer File System. In Proceedings of the 5th Conference on Symposium on Operating Systems Design and Implementation (OSDI, 2002
    230