Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. G D Plotkin.
    A structural approach to operational semantics. J. Log. Algebr. Program, 2004
    1168
  2. E W Dijkstra.
    A note on two problems in connexion with graphs. Numerische Mathematik, 2004
    963
  3. A Gelman, J Carlin, H Stern, D Rubin.
    Bayesian data analysis. 2004
    838
  4. J Dean, S Ghemawat.
    MapReduce: Simplified data processing on large clusters. In OSDI ’04, 2004
    781
  5. K Mikolajezyk, “Scale C Schmid.
    and affine invariant interest point detectors. International Journal of Computer Vision, 2004
    630
  6. P VIOLA, M J JONES.
    Robust real-time face detection. Int. J. Comput. Vision, 2004
    559
  7. C Robert, G Casella.
    Monte Carlo Statistical Methods. 2004
    548
  8. Brian Babcock, Shivnath Babu, Mayur Datar, Rajeev Motwani, Jennifer Widom.
    Models and issues in data stream systems. In Proceedings of 21st ACM Symposium on Principles of Database Systems (PODS, 2004
    511
  9. R Dingledine, N Mathewson, P Syverson.
    Tor: The second-generation onion router. In USENIX Security, 2004
    480
  10. C Zhai, J Lafferty.
    A study of smoothing methods for language models applied to 197 information retrieval. ACM Transactions on Information Systems, 2004
    459
  11. E Clarke, A Gupta, O Strichman.
    SAT-based counterexample-guided abstraction refinement. IEEE Transactions on Computer Aided Design, 2004
    456
  12. J N Laneman, D N C Tse.
    G.W.Wornell, “Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior. IEEE Transactions on Information Theory, 2004
    450
  13. Yuri Boykov, Vladimir Kolmogorov.
    An experimental comparison of min-cut/max-flow algorithms for energy minimization in vision. IEEE transactions on Pattern Analysis and Machine Intelligence, 2004
    428
  14. M Castro, P Drushel, A Kermarec, A Rowstrom.
    Scribe: A Large-scale and Decentralized Application-level Multicast Infrastructure. IEEE Journal on Selected Areas in Communications, 2004
    426
  15. J Y A Wang, E H Adelson.
    Representing moving images with layers. IEEE Transactions on Image Processing,vol, 2004
    394
  16. Mike Barnett, K Rustan M Leino, Wolfram Schulte.
    The spec# programming system: An overview. In, 2004
    366
  17. F Dabek, R Cox, F Kaashoek, R Morris.
    Vivaldi: A decentralized network coordinate system. In Proc. ACM SIGCOMM, 2004
    355
  18. J R Anderson, D Bothell, M D Byrne, S Douglass, C Lebiere, Y Qin.
    An integrated theory of the mind. Psychological Review, 2004
    350
  19. C Rother, V Kolmogorov, A Blake.
    GrabCut": interactive foreground extraction using iterated graph cuts. Proc. Siggraph, 2004
    339
  20. G Csurka, C Bray, C Dance, L Fan.
    Visual categorization with bags of keypoints. In ECCV Workshop on Stat. Learn. in, 2004
    322
  21. D Aguayo, J Bicket, S Biswas, G Judd, R Morris.
    Linklevel measurements from an 802.11b mesh network. in Proc. ACM SIGCOMM, 2004
    317
  22. Luis von Ahn, Laura Dabbish.
    Labeling Images with a Computer Game. In Proceedings of the 22nd Conference on Human factors in Computing Systems (CHI 04, 2004
    310
  23. CA Avizienis, J-C Laprie, B Randell, C Landwehr.
    Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing, 2004
    294
  24. B Taskar, C Guestrin, D Koller.
    Max-margin Markov networks. In, 2004
    293
  25. A J Smola, B Schlkopf.
    A tutorial on support vector regression. Statistics and Computing, 2004
    288
  26. J Tropp.
    Greed is good: Algorithmic results for sparse approximation. IEEE Trans. Inform. Theory, 2004
    285
  27. L Fei-Fei, R Fergus, P Perona.
    Learning generative visual models from few training examples. Workshop on Generative-Model Based Vision, IEEE Proc. CVPR, 2004
    282
  28. J W Hui, D Culler.
    The dynamic behavior of a data dissemination protocol for network programming at scale. In Proceedings of the Second International Conference on Embedded Networked Sensor Systems (SenSys, 2004
    281
  29. W Ye, J Heidemann, D Estrin.
    Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM Trans. Netw, 2004
    277
  30. S Sen, J Wang.
    Analyzing peer-to-peer traffic across large networks. IEEE/ACM Transactions on Networking (ToN, 2004
    265
  31. H-A Kim, B Karp.
    Autograph: Toward Automated, Distributed Worm Signature Detection. In Proceedings of the USENIX Security Conference, 2004
    264
  32. W Zhao, M Ammar, E Zegura.
    A message ferrying approach for data delivery in sparse mobile ad hoc networks. In Proceedings of MobiHoc’04, 2004
    261
  33. Z WANG, A C BOVIK, H R SHEIKH, E P SIMONCELLI.
    Image quality assessment: From error visibility to structural similarity. IEEE transactions on image processing, 2004
    261
  34. P Felzenszwalb, D Huttenlocher.
    Efficient graph-based image segmentation. International Journal of Computer Vision, 2004
    254
  35. Darrel R Hankerson, Alfred J Menezes, Scott A Vanstone.
    Guide to Elliptic Curve Cryptography. 2004
    251
  36. Amol Deshpande, Carlos Guestrin, Samuel Madden, Joseph M Hellerstein, Wei Hong.
    Model-driven Data Acquisition in Sensor Networks. In Proceedings International Conference on Very Large Data Bases (VLDB, 2004
    250
  37. S Singh, C Estan, G Varghese, S Savage.
    Automated Worm Fingerprinting. In Proceedings of Symposium on Operating Systems Design and Implementation (OSDI, 2004
    242
  38. C KARLOF, N SASTRY, D WAGNER.
    TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys, 2004
    236
  39. M J Freedman, E Freuenthal, D Mazières.
    Democratizing Content Publication with Coral. NSDI. 2004
    233
  40. R Szewczyk, A Mainwaring, J Polastre, J Anderson, D Culler.
    An analysis of a large scale habitat monitoring application. In SenSys ’04: Proceedings of the 2nd international conference on Embedded networked sensor systems, 2004
    222
  41. A P Gasch, P T Spellman, C M Kao, O Carmel-Harel, M B Eisen, G Storz, D Botstein, P O Brown.
    Genomic expression programs in the response of yeast cells to environmental changes. Mol Biol Cell, 2004
    221
  42. T ZIMMERMANN, P WEISSGERBER, S DIEHL, A ZELLER.
    Mining version histories to guide software changes. In Proceedings of the ICSE, 2004
    221
  43. C Jin, D X Wei, S H Low, “FAST.
    TCP: motivation, architecture, algorithms, Performance. In Proceedings of IEEE Infocom, 2004
    217
  44. D Moore, J Leonard, D Rus, S Teller.
    Robust Distributed Network Localization with Noisy Range Measurements. in Proceedings of ACM SenSys, 2004
    213
  45. D Hiemstra, S E Robertson, H Zaragoza.
    Parsimonious language models for information retrieval. In Proc. 27th Ann. Int. ACM SIGIR Conf. on Research and Development in Information Retrieval, 2004
    210
  46. Z Gyöngyi, H Garcia-Molina, J Pedersen.
    Combating Web Spam with TrustRank. In VLDB, 2004
    209
  47. R Canetti, O Goldreich, Halevi.
    S.: The random oracle methodology, revisited. J. ACM, 2004
    203
  48. P Levis, N Patel, D Culler, S Shenker.
    Trickle: a self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In NSDI’04: Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation, 2004
    201
  49. M Maroti, B Kusy, G Simon, A Ledeczi.
    The flooding time synchronization protocol. in Proc. 2nd ACM Conf. Embedded Networked Sensor Syst, 2004
    199
  50. Chris Lattner, Vikram Adve.
    LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. In Proceedings of the 2004 International Symposium on Code Generation and Optimization (CGO’04, 2004
    196
  51. I Tsochantaridis, T Joachims, T Hofmann, Y Altun.
    Support vector machine learning for interdependent and structured output spaces. 2004
    192
  52. D Boneh, X Boyen, H Shacham.
    Short group signatures. In In proceedings of CRYPTO’04, volume 3152 of LNCS, 2004
    191
  53. R Kannan, S Vempala, A Vetta.
    On clusterings: Good, bad and spectral. Journal of the ACM, 2004
    191
  54. P Felzenszwalb, D P Huttenlocher.
    Efficient belief propagation for early vision. Int. Journal of Computer Vision, 2004
    190
  55. D Nister.
    An Eifficient Solution to the Five-Point Relative Pose Problem. Proc. of CVPR, 756–777, 2004
    190
  56. M Izal, G Urvoy-Keller, E W Biersack, P A Felber, A Al Hamra, L GarcésErice.
    Dissecting BitTorrent: Five months in a torrent’s lifetime. In Passive and Active Measurements (PAM2004, 2004
    190
  57. John Whaley, Monica S Lam.
    Cloning-based contextsensitive pointer alias analysis using binary decision diagrams. In PLDI ’04: Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation, 2004
    190
  58. J Considine, F Li, G Kollios, J Byers.
    Approximate aggregation techniques for sensor databases. in Proceedings of the 20th International Conference on Data Engineering, ser. ICDE ’04. IEEE Computer Society, 2004
    189
  59. J Jung, V Paxson, A W Berger, H Balakrishnan.
    Fast portscan detection using sequential hypothesis testing. In In Proceedings of the IEEE Symposium on Security and Privacy, 2004
    187
  60. L Cardelli.
    Type systems. The Computer Science and Engineering Handbook, chapter 97, 2004
    186
  61. I Matthews, S Baker.
    Active appearance models revisited. International Journal of Computer Vision, 2004
    184
  62. T Henderson, D Kotz, I Abyzov.
    The changing usage of a mature campus-wide wireless network. In Proceedings of ACM Mobicom, 2004
    183
  63. L-L Xie, P R Kumar.
    A Network Information Theory for Wireless Communication: Scaling Laws and Optimal Operation. IEEE Trans. on Inform. Theory, 2004
    182
  64. D Hovemeyer, W Pugh.
    Finding bugs is easy. In Companion to the 19th annual ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications, OOPSLA ’04, 2004
    176
  65. A Lakhina, M Crovella, C Diot.
    Diagnosing network-wide traffic anomalies. In SIGCOMM Conf, 2004
    176
  66. L Xiong, L Liu.
    PeerTrust: Supporting Reputation-Based Trust in Peer-to-PeerCommunities. IEEE Trans. Knowledge and Data Eng, 2004
    176
  67. B Leibe, A Leonardis, B Schiele.
    Combined object categorization and segmentation with an implicit shape model. In ECCV, 2004
    175
  68. A Torralba, K P Murphy, W T Freeman.
    Sharing features: efficient boosting procedures for multiclass object detection. In Proc. Conf. Computer Vision and Pattern Recognition, 2004
    174
  69. N Xu, S Ranfwala, K Chintalapudi, D Ganesan, A Broad, R Govindan, D Estrin.
    A wireless sensor network for structural monitoring. in Proc. the ACM Conference on Embedded Networked Sensor Systems (Sensys04, 2004
    172
  70. A Dunkels, G Gronvall, T Voigt.
    Contiki - a Lightweight and Flexible Operating System for Tiny Networked Sensors. Proceedings of the First IEEE Workshop on Embedded Networked Sensors, 2004
    170
  71. Y Dodis, R Ostrovsky, L Reyzin, A Smith.
    Fuzzy Extractors: How to Generate Strong Keys from. Biometrics and Other Noisy Data, Proc. Eurocrypt 2004 (LNCS: 3027, 2004
    170
  72. A K Jain, A Ross, S Prabhakar.
    An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol, 2004
    169
  73. P O Hoyer.
    Non-negative Matrix Factorization with Sparseness Constraints. Journal of Machine Learning Research, 2004
    169
  74. S C Madeira, A L Oliveira.
    Biclustering algorithms for biological data analysis: a survey. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2004
    167
  75. T Brox, A Bruhn, N Papenberg, J Weickert.
    High accuracy optical flow estimation based on a theory for warping. In ECCV, 2004
    167
  76. S Fortune.
    Voronoi diagrams and Delaunay triangulations. Handbook of Discrete and Computational Geometry, 2004
    165
  77. V Shnayder, M Hempstead, B Chen, G W Allen, M Welsh.
    Simulating the power consumption of large-scale sensor network applications. In Proceedings of the 2nd international conference on embedded networked sensor systems (SenSys, 2004
    165
  78. C Boutilier, R I Brafman, C Domshlak, H H Hoos, Poole.
    D.: CP-nets: A tool for representing and reasoning with conditional Ceteris Paribus preference statements. J. Artif. Intell. Res, 2004
    163
  79. M Datar, N Immorlica, P Indyk, V S Mirrokni.
    Locality-sensitive hashing scheme based on p-stable distributions. In SCG, 2004
    161
  80. K Wang, S J Stolfo.
    Anomalous Payload-based Network Intrusion Detection. In Proceedings of the 7 th International Symposium on Recent Advances in Intrusion Detection (RAID, 2004
    161
  81. L Zeng, B Benatallah, A H H Ngu, M Dumas, J Kalagnanam, H Chang.
    Qos-aware middleware for web services composition. IEEE Trans. Software Eng, 2004
    160
  82. T A Henzinger, R Jhala, R Majumdar, K L McMillan.
    Abstractions from proofs. Proceedings of the 31st Symposium on Principles of Programming Languages, 2004
    159
  83. C Flanagan, S N Freund.
    Atomizer: a dynamic atomicity checker for multithreaded programs. In POPL, 2004
    157
  84. H Liu, P Singh.
    Conceptnet, a practical commonsense reasoning tool-kit. BT Technology Journal, 2004
    157
  85. N Provos.
    A virtual honeypot framework. In Proc. USENIX Security’04, 2004
    156
  86. J N Al-Karaki, A E Kamal.
    Routing Techniques in Wireless Sensor Networks: A Survey. in IEEE Wireless Communications, 2004
    155
  87. F Lin, Y Zhao.
    ASSAT: computing answer sets of a logic program by SAT solvers. Artificial Intelligence, 2004
    155
  88. R Draves, J Padhye, B Zill.
    Comparisons of Routing Metrics for Static Multi-Hop Wireless Networks. ACM Annual Conf. Special Interest Group on Data Communication (SIGCOMM, 2004
    154
  89. M Galley, M Hopkins, K Knight, D Marcu.
    What’s in a translation rule. Proceedings HTL-NAACL, 2004
    153
  90. M Feldman, K Lai, I Stoica, J Chuang.
    Robust incentive techniques for peer-to-peer networks. in Proc. of ACM EC ’04, 2004
    152