Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. Dragovic Barham, Hand Fraser, Harris.
    Xen and the art of virtualization. 2003
  2. F J Och, Ney.
    H.: A systematic comparison of various statistical alignment models. Computational Linguistics, 2003
  3. R Fergus, P Perona, A Zisserman.
    Object class recognition by unsupervised scale-invariant learning. In CVPR, 2003
  4. Sanjay Ghemawat, Howard Gobioff, Shun-Tak Leung.
    The Google File System. SOSP, 2003
  5. D Gay, P Levis.
    von Behren, R.: The NesC language: A holistic approach to networked embedded systems. In: Proc. of the ACM Conf. on Programming Language Design and Implementation, 2003
  6. W Zhao, R Chellappa, P J Phillips, A Rosenfeld.
    Face recognition: A literature survey. Mathematical Sciences in, 2003
  7. S D Kamvar, M T Schlosser, H Garcia-molina.
    The EigenTrust algorithm for reputation management in P2P networks. In Proc. of the Twelfth WWW Conference, 2003
  8. J Sivic, A Zisserman.
    Video Google: A text retrieval approach to object matching in videos. In Proc. ICCV, 2003
  9. D De Couto, D Aguayo, J Bicket, R Morris.
    A high-throughput path metric for multi-hop wireless routing. In MobiCom, 2003
  10. A K Jain, P W Duin, J Mao.
    Statistical Pattern Recognition: A Review. National Institute of Standards and Technology Interagency Report (NISTIR) 7030, 2003
  11. Alec Woo, Terence Tong, David Culler.
    Taming the underlying challenges of reliable multihop routing in sensor networks. In the First ACM Conference on Embedded Networked Sensor Systems (SenSys, 2003
  12. Andrei Sabelfeld, Andrew C Myers.
    Language-based informationflow security. IEEE Journal on Selected Areas in Communications, 2003
  13. I Stoica, R Morris, D Liben-Nowell, D R Karger, M F Kaashoek, F Dabek, H Balakrishnan.
    Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking, 2003
  14. H Chan, A Perrig, D Song.
    Random key predistribution schemes for sensor networks. in Proc. 2003 IEEE Symposium on Security and Privacy, 2003
  15. I Guyon, A Elisseeff.
    An introduction to variable and feature selection,” The. Journal of Machine Learning Research, 2003
  16. Kevin Fall.
    A Delay-Tolerant Network Architecture for Challenged Internets. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM, 2003
  17. J Zhao, R Govindan.
    Understanding packet delivery performance in dense wireless sensor networks. In ACM Conference on Embedded Networked Sensor Systems (Sensys, 2003
  18. I Horrocks, P F Patel-Schneider, van Harmelen.
    F.: From SHIQ and RDF to OWL: The making of a Web ontology language. J. Web Semant, 2003
  19. P Koehn, F J Och, Marcu.
    D.: Statistical phrase-based translation. In: Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology, 2003
  20. D Klein, C D Manning.
    Accurate Unlexicalized Parsing. Proceedings of the 41st Meeting of the Association for Computational Linguistics, 2003
  21. S Madden, M Franklin, J Hellerstein, W Hong.
    The design of an acquisitional query processor for sensor networks. In SIGMOD. ACM, 2003
  22. P Eugster, P Felber, R Guerraoui, Kermarrec.
    A.M.: The many faces of publish/subscribe. ACM Computing Surveys, 2003
  23. Y Freund, R Iyer, R E Schapire, Y Singer.
    An Efficient Boosting Algorithm for Combining Preferences. Journal of Machine Learning Research, 2003
  24. L Zheng, D N C Tse.
    Diversity and multiplexing: A fundamental tradeoff in multiple-antenna channels. IEEE Transactions on Information Theory, 2003
  25. T Harris, K Fraser.
    Language support for lightweight transactions. In OOPSLA, 2003
  26. Y C Hu, A Perrig, D B Johnson.
    Packet leashes: A defense against wormhole attacks in wireless ad hod networks. in Proc. of 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM, 2003
  27. D Comaniciu, V Ramesh, P Meer.
    Kernel-based object tracking. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003
  28. M Fox, D Long.
    PDDL2.1: An extension to PDDL for expressing temporal planning domains. Journal of Artificial Intelligence Research (JAIR, 2003
  29. B N Grosof, I Horrocks, R Volz, S Decker.
    Description logic programs: Combining logic programs with description logic. In Proceedings of the 12th International Conference on the World Wide Web, 2003
  30. FOR CONFERENCES Chandrasekaran, S Cooper, O Deshpande, A Franklin, M J, J M Hellerstein, W Hong, S Krishnamurthy, S Madden, V Raman, F Reiss, M Shah.
    TelegraphCQ: Continuous dataflow processing for an uncertain world. The First Biennial Conference on Innovative Data Systems Research (CIDR), Asilomar, 2003
  31. K P Gummadi, R J Dunn, S Saroiu, S D Gribble, H M Levy, J Zahorjan.
    Measurement, Modeling and Analysis of a Peer-toPeer File Sharing Workload. Proc. ACM Symp. Operating Systems Principles, 2003
  32. B P Gerkey, R T Vaughan, A Howard.
    The Player/Stage Project: Tools for Multi-Robot and Distributed Sensor Systems. In Proc. of the Intl. Conf. on Advanced Robotics, 2003
  33. F Sha, F Pereira.
    Shallow parsing with conditional random fields. Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology, 2003
  34. X Zhu, Z Ghahramani, J Lafferty.
    Semi-supervised learning using gaussian fields and harmonic functions. In ICML, 2003
  35. Y Chawathe, S Ratnasamy, L Breslau, N Lanham, S Shenker.
    Making Gnutella-like P2P Systems Scalable. In SIGCOMM ’03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, 2003
  36. D Kostic, A Rodriguez, J Albrecht.
    Bullet: High bandwidth data dissemination using an overlay mesh. 2003
  37. J Yoon, M Liu, B Noble.
    Random waypoint considered harmful. in Proc. IEEE INFOCOM 2003, 2003
  38. V Venkatesh, M Morris, G B Davis, F D Davis.
    User acceptance of information technology: Toward a unified view. MIS Quarterly, 2003
  39. W Du, J Deng, Y S Han, P Varshney.
    A pairwise key predistribution scheme for wireless sensor networks. in Proc. 10th ACM Conf. Comp. Commun. Security, 2003
  40. K Jain, J Padhye, V N Padmanabhan, L Qiu.
    Impact of interference on multi-hop wireless network performance. In MobiCom, 2003
  41. Y Yao, J Gehrke.
    Query processing for sensor networks. in Proceedings of CIDR Conference, 2003
  42. Maurice Herlihy, Victor Luchangco, Mark Moir, William N Scherer.
    Software transactional memory for dynamic-sized data structures. In Proceedings of the twenty-second annual symposium on Principles of distributed computing, PODC ’03, 2003
  43. T van Dam, Langendoen.
    K.: An adaptive energy-efficient MAC protocol for wireless sensor networks. In: Proc. of the 1 st Conf. on Networked Sensor Systems (SENSYS, 2003
  44. T He, C Huang, B Blum, J Stankovic, T Abdelzaher.
    Range-free localization schemes in large scale sensor networks. In Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking (MobiCom'03, 2003
  45. B Yang, H Garcia-Molina.
    Designing a Super-Peer Network. Proc. 19th Int’l Conf. Data Eng. (ICDE ’03, 2003
  46. M Jain, C Dovrolis.
    End-to-End Available Bandwidth: Measurement Methodology, Dynamics, and Relation with TCP Throughput. IEEE/ACM Transactions on Networking, 2003
  47. D Moore, C Shannon, G Voelker, S Savage.
    Internet Quarantine: Requirements for Containing Self-Propagating Code. In Proceedings of the IEEE Infocom Conference, 2003
  48. K Skadron, M R Stan, W Huang, S Velusamy, K Sankaranarayanan, D Tarjan.
    Temperature-aware microarchitecture. in Proceedings of the 30th Annual ACM/IEEE International Symposium on Computer Architecture, 2003
  49. D Batory, J N Sarvela, A Rauschmayer.
    Scaling step-wise refinement. In ICSE ’03: Proceedings of the 25th International Conference on Software Engineering, 2003
  50. T Garfinkel, B Pfaff, J Chow, M Rosenblum, D Boneh.
    Terra: a virtual machine-based platform for trusted computing. In SOSP ’03: Proceedings of the nineteenth ACM symposium on Operating systems principles, 2003
  51. V Blanz, T Vetter.
    Face recognition based on fitting a 3D morphable model. IEEE Trans. Pattern Anal. Mach. Intell, 2003
    Graphcut Textures: Image and Video Synthesis Using Graph Cuts. Proc. ACM Siggraph, 2003
  53. D Liben-Nowell, J Kleinberg.
    The link prediction problem for social networks. In CIKM, 2003
  54. R Bhagwan, S Savage, G M Voelker.
    Understanding availability. In The 2nd International Workshop on Peer-to-peer systems, 2003
  55. A Rao, S Ratnasamy, C Papadimitriou, S Shenker, I Stoica.
    Geographic routing without location information. In MobiCom ’03: Proceedings of the 9th annual international conference on Mobile computing and networking, 2003
  56. F Zambonelli, N R Jennings, M Wooldridge.
    Developing multiagent systems: The Gaia methodology. ACM Transactions on Software Engineering and Methodology, 2003
  57. W Cohen, P Ravikumar, S Fienberg.
    A Comparison of String Distance Metrics for NameMatching Tasks. In the Proceedings of the IJCAI, 2003
  58. L Burdy, Y Cheon, D Cok, M Ernst, J Kiniry, G T Leavens, K R M Leino, Erik Poll.
    An overview of JML tools and applications. In FMICS, 2003
  59. D Blei, M Jordan.
    Modeling annotated data. In Proceedings of the 26th annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2003
  60. D Niculescu, B Nath.
    Ad Hoc Positioning System (APS) using AoA. In Proceedings of IEEE INFOCOM ’03, 2003
  61. R C Shah, S Roy, S Jain, W Brunette.
    Data MULEs: Modeling a Three-tier Architecture for Sparse Sensor Networks. Elsevier Ad Hoc Networks Journal, 2003
  62. J Jeon, V Lavrenko, R Manmatha.
    Automatic image annotation and retrieval using cross-media relevance models. In Proceedings of SIGIR, 2003
  63. R Basri, D Jacobs.
    Lambertian reflectance and linear subspaces. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003
  64. B Ziltova, J Flusser.
    Image registration methods: A survey. Image and Vision Computing, 2003
  65. A Efros, A Berg, G Mori, J Malik.
    Recognizing action at a distance. In IEEE Intl. Conf. on Computer Vision, 2003
  66. K Yee, K Swearingen, K Li, M Hearst.
    Faceted metadata for image search and browsing. Proc. CHI 2003, ACM, 2003
  67. Franz Baader, Werner Nutt.
    Basic description logics. The Description Logic Handbook: Theory, Implementation, and Applications, chapter 2, 2003
  68. A J Davison.
    Real-Time Simultaneous Localisation and Mapping with a Single Camera. In Proceedings International Conference Computer Vision, 2003
  69. C Cranor, T Johnson, O Spatscheck, V Shkapenyuk.
    Gigascope: A stream database for network applications. In SIGMOD, 2003
  70. R Gummadi, S Gribble, S Ratnasamy, S Shenker, Stoica.
    I.: The impact of dht routing geometry on resilience and proximity. 2003
  71. J Fakcharoenphol, S Rao, K Talwar.
    A tight bound on approximating arbitrary metrics by tree metrics. In STOC'03: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003
  72. Niels Provos.
    Improving Host Security with System Call Policies. In Proceedings of the 12 th USENIX Security Symposium, 2003
  73. S S Pradhan, K Ramchandran.
    Distributed Source Coding Using Syndromes (DISCUS): design and construction. IEEE Trans. on Inf. Theory, 2003
  74. A Sellen, R Harper.
    The Myth of the Paperless Office. 2003
  75. Nicholas T Karonis, Brian Toonen, Ian Foster.
    MPICHG2: A Grid-enabled implementation of the Message Passing Interface. Journal of Parallel and Distributed Computing, Volume 63, Issue 5, Special Issue on Computational Grids, 2003
  76. D Kempe, A Dobra, J Gehrke.
    Gossip-based computation of aggregate information. In Proc. of the 44th IEEE Ann. Symp. on Foundations of Computer Science, 2003
  77. C Chong, S P Kumar.
    Sensor Networks: Evolution, Opportunities, and Challenges. Proceedings of the IEEE, 2003
  78. S Zhong, J Chen, Y R Yang.
    Sprite: A Simple, Cheat-Proof,Credit-Based System for Mobile Ad-Hoc Networks. Proc. INFOCOM, Mar.-Apr, 2003
  79. R Kumar, J Novak, P Raghavan, A Tomkins.
    On the bursty evolution of blogspace. In Proceedings of the 12th WWW conference, 2003
  80. P Eugster, S Handurukande, R Guerraoui, A-M Kermarrec, Kouznetsov.
    P.: Lightweight probabilistic broadcast. ACM Trans. Comput. Syst, 2003
  81. A Evfimievski, J Gehrke, R Srikant.
    Limiting privacy breaches in privacy preserving data mining. In PODS, 2003
  82. James Aspnes, Gauri Shah.
    Skip graphs. In SODA, 2003
  83. S H Low.
    A duality model of TCP and queue management algorithms. IEEE/ACM Trans. Networking, 2003
  84. K Sripanidkulchai, B Maggs, H Zhang.
    Efficient Content Location Using Interest-Based Locality. in P2P Systems,” Proc. IEEE INFOCOM ’03, 2003
  85. F Ye, G Zhong, S Lu, L Zhang.
    Peas: A robust energy conserving protocol for long-lived sensor networks. In The 23nd International Conference on Distributed Computing Systems (ICDCS, 2003
  86. B Grunbaum.
    Convex Polytopes. 2003
    R.: Linear algebra operators for gpu implementation of numerical algorithms. In SIGGRAPH ’03: ACM SIGGRAPH 2003 Papers, 2003
  88. K Dave, S Lawrence, D M Pennock.
    Mining the peanut gallery: Opinion extraction and semantic classification of product reviews. In Proceedings of WWW, 2003
    RacerX: Effective, static detection of race conditions and deadlocks. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, 2003
  90. F Pottier, V Simonet.
    Information flow inference for ML. ACM TOPLAS, 2003
  91. M G Lagoudakis, R Parr.
    Least-squares policy iteration. Journal of Machine Learning Research, 2003
  92. T Garfinkel, M Rosenblum.
    A Virtual Machine Introspection Based Architecture for Intrusion Detection. In 10 th ISOC Symposium on Network and Distributed Systems Security (SNDSS, 2003
  93. P Moulin, J A O’Sullivan.
    Information-theoretic analysis of information hiding. IEEE Transactions on Information Theory, 2003
  94. M K Aguilera, J C Mogul, J L Wiener, P Reynolds, A Muthitacharoen.
    Performance Debugging for Distributed Systems of Black Boxes. In Proc. of SOSP, 2003