Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. Dragovic Barham, Hand Fraser, Harris.
    Xen and the art of virtualization. 2003
    922
  2. F J Och, Ney.
    H.: A systematic comparison of various statistical alignment models. Computational Linguistics, 2003
    728
  3. R Fergus, P Perona, A Zisserman.
    Object class recognition by unsupervised scale-invariant learning. In CVPR, 2003
    618
  4. Sanjay Ghemawat, Howard Gobioff, Shun-Tak Leung.
    The Google File System. SOSP, 2003
    576
  5. D Gay, P Levis.
    von Behren, R.: The NesC language: A holistic approach to networked embedded systems. In: Proc. of the ACM Conf. on Programming Language Design and Implementation, 2003
    556
  6. W Zhao, R Chellappa, P J Phillips, A Rosenfeld.
    Face recognition: A literature survey. Mathematical Sciences in, 2003
    554
  7. S D Kamvar, M T Schlosser, H Garcia-molina.
    The EigenTrust algorithm for reputation management in P2P networks. In Proc. of the Twelfth WWW Conference, 2003
    526
  8. J Sivic, A Zisserman.
    Video Google: A text retrieval approach to object matching in videos. In Proc. ICCV, 2003
    490
  9. D De Couto, D Aguayo, J Bicket, R Morris.
    A high-throughput path metric for multi-hop wireless routing. In MobiCom, 2003
    490
  10. A K Jain, P W Duin, J Mao.
    Statistical Pattern Recognition: A Review. National Institute of Standards and Technology Interagency Report (NISTIR) 7030, 2003
    472
  11. Alec Woo, Terence Tong, David Culler.
    Taming the underlying challenges of reliable multihop routing in sensor networks. In the First ACM Conference on Embedded Networked Sensor Systems (SenSys, 2003
    468
  12. Andrei Sabelfeld, Andrew C Myers.
    Language-based informationflow security. IEEE Journal on Selected Areas in Communications, 2003
    435
  13. I Stoica, R Morris, D Liben-Nowell, D R Karger, M F Kaashoek, F Dabek, H Balakrishnan.
    Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking, 2003
    430
  14. H Chan, A Perrig, D Song.
    Random key predistribution schemes for sensor networks. in Proc. 2003 IEEE Symposium on Security and Privacy, 2003
    409
  15. I Guyon, A Elisseeff.
    An introduction to variable and feature selection,” The. Journal of Machine Learning Research, 2003
    402
  16. Kevin Fall.
    A Delay-Tolerant Network Architecture for Challenged Internets. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM, 2003
    391
  17. J Zhao, R Govindan.
    Understanding packet delivery performance in dense wireless sensor networks. In ACM Conference on Embedded Networked Sensor Systems (Sensys, 2003
    384
  18. I Horrocks, P F Patel-Schneider, van Harmelen.
    F.: From SHIQ and RDF to OWL: The making of a Web ontology language. J. Web Semant, 2003
    384
  19. P Koehn, F J Och, Marcu.
    D.: Statistical phrase-based translation. In: Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology, 2003
    378
  20. D Klein, C D Manning.
    Accurate Unlexicalized Parsing. Proceedings of the 41st Meeting of the Association for Computational Linguistics, 2003
    369
  21. S Madden, M Franklin, J Hellerstein, W Hong.
    The design of an acquisitional query processor for sensor networks. In SIGMOD. ACM, 2003
    366
  22. P Eugster, P Felber, R Guerraoui, Kermarrec.
    A.M.: The many faces of publish/subscribe. ACM Computing Surveys, 2003
    359
  23. Y Freund, R Iyer, R E Schapire, Y Singer.
    An Efficient Boosting Algorithm for Combining Preferences. Journal of Machine Learning Research, 2003
    358
  24. L Zheng, D N C Tse.
    Diversity and multiplexing: A fundamental tradeoff in multiple-antenna channels. IEEE Transactions on Information Theory, 2003
    354
  25. T Harris, K Fraser.
    Language support for lightweight transactions. In OOPSLA, 2003
    341
  26. Y C Hu, A Perrig, D B Johnson.
    Packet leashes: A defense against wormhole attacks in wireless ad hod networks. in Proc. of 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM, 2003
    331
  27. D Comaniciu, V Ramesh, P Meer.
    Kernel-based object tracking. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003
    328
  28. M Fox, D Long.
    PDDL2.1: An extension to PDDL for expressing temporal planning domains. Journal of Artificial Intelligence Research (JAIR, 2003
    327
  29. B N Grosof, I Horrocks, R Volz, S Decker.
    Description logic programs: Combining logic programs with description logic. In Proceedings of the 12th International Conference on the World Wide Web, 2003
    327
  30. FOR CONFERENCES Chandrasekaran, S Cooper, O Deshpande, A Franklin, M J, J M Hellerstein, W Hong, S Krishnamurthy, S Madden, V Raman, F Reiss, M Shah.
    TelegraphCQ: Continuous dataflow processing for an uncertain world. The First Biennial Conference on Innovative Data Systems Research (CIDR), Asilomar, 2003
    325
  31. K P Gummadi, R J Dunn, S Saroiu, S D Gribble, H M Levy, J Zahorjan.
    Measurement, Modeling and Analysis of a Peer-toPeer File Sharing Workload. Proc. ACM Symp. Operating Systems Principles, 2003
    321
  32. B P Gerkey, R T Vaughan, A Howard.
    The Player/Stage Project: Tools for Multi-Robot and Distributed Sensor Systems. In Proc. of the Intl. Conf. on Advanced Robotics, 2003
    319
  33. F Sha, F Pereira.
    Shallow parsing with conditional random fields. Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology, 2003
    319
  34. X Zhu, Z Ghahramani, J Lafferty.
    Semi-supervised learning using gaussian fields and harmonic functions. In ICML, 2003
    316
  35. Y Chawathe, S Ratnasamy, L Breslau, N Lanham, S Shenker.
    Making Gnutella-like P2P Systems Scalable. In SIGCOMM ’03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, 2003
    294
  36. D Kostic, A Rodriguez, J Albrecht.
    Bullet: High bandwidth data dissemination using an overlay mesh. 2003
    293
  37. J Yoon, M Liu, B Noble.
    Random waypoint considered harmful. in Proc. IEEE INFOCOM 2003, 2003
    290
  38. V Venkatesh, M Morris, G B Davis, F D Davis.
    User acceptance of information technology: Toward a unified view. MIS Quarterly, 2003
    283
  39. W Du, J Deng, Y S Han, P Varshney.
    A pairwise key predistribution scheme for wireless sensor networks. in Proc. 10th ACM Conf. Comp. Commun. Security, 2003
    283
  40. K Jain, J Padhye, V N Padmanabhan, L Qiu.
    Impact of interference on multi-hop wireless network performance. In MobiCom, 2003
    270
  41. Y Yao, J Gehrke.
    Query processing for sensor networks. in Proceedings of CIDR Conference, 2003
    269
  42. Maurice Herlihy, Victor Luchangco, Mark Moir, William N Scherer.
    Software transactional memory for dynamic-sized data structures. In Proceedings of the twenty-second annual symposium on Principles of distributed computing, PODC ’03, 2003
    268
  43. T van Dam, Langendoen.
    K.: An adaptive energy-efficient MAC protocol for wireless sensor networks. In: Proc. of the 1 st Conf. on Networked Sensor Systems (SENSYS, 2003
    260
  44. T He, C Huang, B Blum, J Stankovic, T Abdelzaher.
    Range-free localization schemes in large scale sensor networks. In Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking (MobiCom'03, 2003
    258
  45. B Yang, H Garcia-Molina.
    Designing a Super-Peer Network. Proc. 19th Int’l Conf. Data Eng. (ICDE ’03, 2003
    257
  46. M Jain, C Dovrolis.
    End-to-End Available Bandwidth: Measurement Methodology, Dynamics, and Relation with TCP Throughput. IEEE/ACM Transactions on Networking, 2003
    255
  47. D Moore, C Shannon, G Voelker, S Savage.
    Internet Quarantine: Requirements for Containing Self-Propagating Code. In Proceedings of the IEEE Infocom Conference, 2003
    252
  48. K Skadron, M R Stan, W Huang, S Velusamy, K Sankaranarayanan, D Tarjan.
    Temperature-aware microarchitecture. in Proceedings of the 30th Annual ACM/IEEE International Symposium on Computer Architecture, 2003
    249
  49. D Batory, J N Sarvela, A Rauschmayer.
    Scaling step-wise refinement. In ICSE ’03: Proceedings of the 25th International Conference on Software Engineering, 2003
    248
  50. T Garfinkel, B Pfaff, J Chow, M Rosenblum, D Boneh.
    Terra: a virtual machine-based platform for trusted computing. In SOSP ’03: Proceedings of the nineteenth ACM symposium on Operating systems principles, 2003
    245
  51. V Blanz, T Vetter.
    Face recognition based on fitting a 3D morphable model. IEEE Trans. Pattern Anal. Mach. Intell, 2003
    245
  52. V KWATRA, A SCHÖDL, I ESSA, G TURK, A BOBICK.
    Graphcut Textures: Image and Video Synthesis Using Graph Cuts. Proc. ACM Siggraph, 2003
    242
  53. D Liben-Nowell, J Kleinberg.
    The link prediction problem for social networks. In CIKM, 2003
    238
  54. R Bhagwan, S Savage, G M Voelker.
    Understanding availability. In The 2nd International Workshop on Peer-to-peer systems, 2003
    237
  55. A Rao, S Ratnasamy, C Papadimitriou, S Shenker, I Stoica.
    Geographic routing without location information. In MobiCom ’03: Proceedings of the 9th annual international conference on Mobile computing and networking, 2003
    237
  56. F Zambonelli, N R Jennings, M Wooldridge.
    Developing multiagent systems: The Gaia methodology. ACM Transactions on Software Engineering and Methodology, 2003
    236
  57. W Cohen, P Ravikumar, S Fienberg.
    A Comparison of String Distance Metrics for NameMatching Tasks. In the Proceedings of the IJCAI, 2003
    235
  58. L Burdy, Y Cheon, D Cok, M Ernst, J Kiniry, G T Leavens, K R M Leino, Erik Poll.
    An overview of JML tools and applications. In FMICS, 2003
    234
  59. D Blei, M Jordan.
    Modeling annotated data. In Proceedings of the 26th annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2003
    234
  60. D Niculescu, B Nath.
    Ad Hoc Positioning System (APS) using AoA. In Proceedings of IEEE INFOCOM ’03, 2003
    234
  61. R C Shah, S Roy, S Jain, W Brunette.
    Data MULEs: Modeling a Three-tier Architecture for Sparse Sensor Networks. Elsevier Ad Hoc Networks Journal, 2003
    231
  62. J Jeon, V Lavrenko, R Manmatha.
    Automatic image annotation and retrieval using cross-media relevance models. In Proceedings of SIGIR, 2003
    228
  63. R Basri, D Jacobs.
    Lambertian reflectance and linear subspaces. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003
    224
  64. B Ziltova, J Flusser.
    Image registration methods: A survey. Image and Vision Computing, 2003
    224
  65. A Efros, A Berg, G Mori, J Malik.
    Recognizing action at a distance. In IEEE Intl. Conf. on Computer Vision, 2003
    222
  66. K Yee, K Swearingen, K Li, M Hearst.
    Faceted metadata for image search and browsing. Proc. CHI 2003, ACM, 2003
    217
  67. Franz Baader, Werner Nutt.
    Basic description logics. The Description Logic Handbook: Theory, Implementation, and Applications, chapter 2, 2003
    217
  68. A J Davison.
    Real-Time Simultaneous Localisation and Mapping with a Single Camera. In Proceedings International Conference Computer Vision, 2003
    213
  69. C Cranor, T Johnson, O Spatscheck, V Shkapenyuk.
    Gigascope: A stream database for network applications. In SIGMOD, 2003
    211
  70. R Gummadi, S Gribble, S Ratnasamy, S Shenker, Stoica.
    I.: The impact of dht routing geometry on resilience and proximity. 2003
    209
  71. J Fakcharoenphol, S Rao, K Talwar.
    A tight bound on approximating arbitrary metrics by tree metrics. In STOC'03: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003
    208
  72. Niels Provos.
    Improving Host Security with System Call Policies. In Proceedings of the 12 th USENIX Security Symposium, 2003
    207
  73. S S Pradhan, K Ramchandran.
    Distributed Source Coding Using Syndromes (DISCUS): design and construction. IEEE Trans. on Inf. Theory, 2003
    205
  74. A Sellen, R Harper.
    The Myth of the Paperless Office. 2003
    202
  75. Nicholas T Karonis, Brian Toonen, Ian Foster.
    MPICHG2: A Grid-enabled implementation of the Message Passing Interface. Journal of Parallel and Distributed Computing, Volume 63, Issue 5, Special Issue on Computational Grids, 2003
    201
  76. D Kempe, A Dobra, J Gehrke.
    Gossip-based computation of aggregate information. In Proc. of the 44th IEEE Ann. Symp. on Foundations of Computer Science, 2003
    200
  77. C Chong, S P Kumar.
    Sensor Networks: Evolution, Opportunities, and Challenges. Proceedings of the IEEE, 2003
    199
  78. S Zhong, J Chen, Y R Yang.
    Sprite: A Simple, Cheat-Proof,Credit-Based System for Mobile Ad-Hoc Networks. Proc. INFOCOM, Mar.-Apr, 2003
    198
  79. R Kumar, J Novak, P Raghavan, A Tomkins.
    On the bursty evolution of blogspace. In Proceedings of the 12th WWW conference, 2003
    197
  80. P Eugster, S Handurukande, R Guerraoui, A-M Kermarrec, Kouznetsov.
    P.: Lightweight probabilistic broadcast. ACM Trans. Comput. Syst, 2003
    196
  81. A Evfimievski, J Gehrke, R Srikant.
    Limiting privacy breaches in privacy preserving data mining. In PODS, 2003
    195
  82. James Aspnes, Gauri Shah.
    Skip graphs. In SODA, 2003
    194
  83. S H Low.
    A duality model of TCP and queue management algorithms. IEEE/ACM Trans. Networking, 2003
    193
  84. K Sripanidkulchai, B Maggs, H Zhang.
    Efficient Content Location Using Interest-Based Locality. in P2P Systems,” Proc. IEEE INFOCOM ’03, 2003
    192
  85. F Ye, G Zhong, S Lu, L Zhang.
    Peas: A robust energy conserving protocol for long-lived sensor networks. In The 23nd International Conference on Distributed Computing Systems (ICDCS, 2003
    191
  86. B Grunbaum.
    Convex Polytopes. 2003
    191
  87. J KRÜGER, WESTERMANN.
    R.: Linear algebra operators for gpu implementation of numerical algorithms. In SIGGRAPH ’03: ACM SIGGRAPH 2003 Papers, 2003
    189
  88. K Dave, S Lawrence, D M Pennock.
    Mining the peanut gallery: Opinion extraction and semantic classification of product reviews. In Proceedings of WWW, 2003
    188
  89. D ENGLER, K ASHCRAFT.
    RacerX: Effective, static detection of race conditions and deadlocks. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, 2003
    187
  90. F Pottier, V Simonet.
    Information flow inference for ML. ACM TOPLAS, 2003
    187
  91. M G Lagoudakis, R Parr.
    Least-squares policy iteration. Journal of Machine Learning Research, 2003
    187
  92. T Garfinkel, M Rosenblum.
    A Virtual Machine Introspection Based Architecture for Intrusion Detection. In 10 th ISOC Symposium on Network and Distributed Systems Security (SNDSS, 2003
    187
  93. P Moulin, J A O’Sullivan.
    Information-theoretic analysis of information hiding. IEEE Transactions on Information Theory, 2003
    185
  94. M K Aguilera, J C Mogul, J L Wiener, P Reynolds, A Muthitacharoen.
    Performance Debugging for Distributed Systems of Black Boxes. In Proc. of SOSP, 2003
    185