Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. N Dalal, B Triggs.
    Histograms of oriented gradients for human detection. In CVPR, 2005
  2. J Newsome, D Song.
    Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In The 12 th Annual Network and Distributed System Security Symposium, 2005
  3. G Adomavicius, A Tuzhilin.
    Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans. on Knowl. and Data Eng, 2005
  4. T Harris, S Marlow, S Peyton Jones, M Herlihy.
    Composable memory transactions. In ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2005
  5. D Tse, P Viswanath.
    Fundamentals of Wireless Communications. 2005
  6. L Fei-Fei, P Perona.
    A Bayesian hierarchical model for learning natural scene categories. IEEE Computer Vision and Pattern Recognition, 2005
  7. P-P Sloan, J Kautz, Snyder.
    J.: Precomputed radiance transfer for real-time rendering in dynamic, low-frequency lighting environments. In Proceedings of SIGGRAPH 2002 (2002), ACM Press / ACM SIGGRAPH, 2005
  8. P F Felsenszwalb, D P Huttenlocher.
    Pictorial structures for object recognition. IJCV, 2005
  9. S Madden, M J Franklin, J M Hellerstein, W Hong.
    TinyDB: An Acquisitional Query Processing System for Sensor Networks. ACM Trans. Database Syst, 2005
  10. S Muthukrishnan.
    Data Streams: Algorithms and Applications. Foundations and Trends in Theoretical Computer Science. Now Publishers, 2005
  11. D Thain, T Tannenbaum, M Livny.
    Distributed computing in practice: the Condor experience: Research articles. Concurr. Comput. : Pract. Exper, 2005
  12. A Broder, M Mitzenmacher.
    Network applications of Bloom filters: A survey. in Internet Mathematics, 2005
  13. M Palmer, D Gildea, P Kingsbury.
    The Proposition Bank: An Annotated Corpus of Semantic Roles. Computational Linguistics, 2005
  14. X Zhang, J Liu, B Li, T Yum.
    CoolStreaming/DONet: A Datadriven Overlay Network for Peer-to-Peer Live Media Streaming. In Proc. of IEEE INFOCOM’05, 2005
  15. Eugene Charniak, Mark Johnson.
    Coarse-to-fine n-best parsing and MaxEnt discriminative reranking. In Proceedings of the 43rd Meeting of Association for Computational Linguistics, 2005
  16. J Manson, B Pugh, S V Adve.
    The Java memory model. In 32nd ACM SIGPLAN/SIGACT Symp. on Principles of Prog. Lang, 2005
  17. Christopher Clark, Keir Fraser, Steven Hand, Jacob Gorm Hansen, Eric Jul, Christian Limpach, Ian Pratt, Andrew Warfield.
    Live Migration of Virtual Machines. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI, 2005
  18. Matteo Frigo, Steven G Johnson.
    The design and implementation of FFTW3. Proceedings of the IEEE, 2005
  19. C Burges, T Shaked, E Renshaw, A Lazier, M Deeds, N Hamilton, G Hullender.
    Learning to Rank using Gradient Descent. In ICML, 2005
  20. I F Akyldiz, X Wang, W Wang.
    Wireless Mesh Networks: A Survey. Computer Networks, 2005
  21. K Grauman, T Darrell.
    The pyramid match kernel: Discriminative classification with sets of image features. In Proceedings of the Tenth IEEE International Conference on Computer Vision, 2005
  22. M Collins, T Koo.
    Discriminative Reranking for Natural Language Parsing. Computational Linguistics, 2005
  23. A Goldsmith.
    Wireless Communications. 2005
  24. M Costa, J Crowcroft, M Castro, A Rowstron.
    Vigilante: End-to-End Containment of Internet Worms. In Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP, 2005
  25. I Laptev.
    On space-time interest points. IJCV, 2005
  26. K Sen, D Marinov, G Agha.
    CUTE: A concolic unit testing engine for C. In European Software Engineering Conference and Foundations of Software Engineering (ESEC/FSE, 2005
  27. T Joachims, L Granka, B Pan, H Hembrooke, G Gay.
    Accurately interpreting clickthrough data as implicit feedback. In SIGIR ’05, 2005
  28. Oren Etzioni, Michael Cafarella, Doug Downey, AnaMaria Popescu, Tal Shaked, Stephen Soderland, S Weld, Alexander Yates.
    Unsupervised named-entity extraction from the web: An experimental study. Artificial Intelligence, 2005
  29. R J Bayardo, R Agrawal.
    Data privacy through optimal k-anonymization. In Proceedings of the 21st International Conference on Data Engineering (ICDE’05, 2005
  30. C Ananian, K Asanovic, B Kuszmaul, C Leiserson, S Lie.
    Unbounded Transactional Memory. In Proceedings of HPCA-11, 2005
  31. P Dollar, V Rabaud, G Cottrell, S Belongie.
    Behavior recognition via sparse spatiotemporal features. in 2nd Joint IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance, 2005
  32. K Akkaya, M Younis.
    A Survey of Routing Protocols in Wireless Sensor Networks. Elsevier Ad Hoc Network Journal, 2005
  33. J Newsome, B Karp, D Song.
    Polygraph: Automatically Generating Signatures for Polymorphic Worms. In Proceedings of the IEEE Symposium on Security and Privacy, 2005
  34. B Motik, U Sattler, R Studer.
    Query answering for OWL-DL with rules. Web Semantics: Science, Services and Agents on the World Wide Web, 2005
  35. I Tsochantaridis, T Joachims, T Hofmann, Y Altun.
    Large margin methods for structured and interdependent output variables. Journal of Machine Learning Research, 2005
  36. J Bicket, D Aguayo, S Biswas, R Morris.
    Architecture and evaluation of an unplanned 802.11b mesh network. In MobiCom, 2005
  37. A Banerjee, S Merugu, I S Dhillon, J Ghosh.
    Clustering with Bregman divergences. Journal of Machine Learning Research, 2005
  38. Joshi JBD, E Bertino, U Latif.
    Ghafoor A. A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering, 2005
  39. J A Pouwelse, P Garbacki, D H J Epema, H J Sips.
    The BitTorrent P2P file-sharing system: Measurements and analysis. 4th International Workshop on Peer-to-Peer Systems (IPTPS’05, 2005
  40. P Shvaiko, J Euzenat.
    A survey of schema-based matching approaches. 2005
  41. M Murata, D Lee, M Mani, Kawaguchi.
    K.: Taxonomy of XML schema languages using formal language theory. ACM Trans. Inter. Tech, 2005
  42. D Clark, J Wroclawski, K Sollins, R Braden.
    Tussle in Cyberspace: Defining Tomorrow’s Internet. IEEE-ACM Transactions on Networking, 2005
  43. K Q Weinberger, J Blitzer, L K Saul.
    Distance metric learning for large margin nearest neighbor classification. In NIPS, 2005
  44. S Biswas, R Morris.
    ExOR: Opportunistic Multi-Hop Routing for Wireless Networks. in ACM SIGCOMM, 2005
  45. Ryan McDonald, Fernando Pereira, Kiril Ribarov, Jan Hajič.
    Non-projective dependency parsing using spanning tree algorithms. In Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing, HLT ’05, 2005
  46. A Lakhina, M Crovella, C Diot.
    Mining anomalies using traffic feature distributions. In SIGCOMM ’05: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, 2005
  47. H Hosoya, J Vouillon, B Pierce.
    Regular expression types for XML. ACM Trans. Program. Lang. Syst, 2005
  48. R Fergus, L Fei-Fei, P Perona, A Zisserman.
    Learning object categories from google’s image search. In IEEE Intl. Conf. on Computer Vision, 2005
  49. X Wang, H Yu.
    How to Break MD5 and Other Hash Functions. in EUROCRYPT 2005. Springer Berlin, 2005
  50. U von Luxburg, O Bousquet, M Belkin.
    Limits of spectral clustering. in Advances in Neural Information Processing Systems (NIPS) 17, 2005
  51. M Barnett, B-Y E Chang, R DeLine, B Jacobs, K R M Leino.
    Boogie: A modular reusable verifier for object-oriented programs. In FMCO 2005, volume 4111 of LNCS, 2005
  52. J Heer, S Card, J Landay.
    Prefuse: A toolkit for interactive information visualization. In Proc CHI’05, 2005
  53. N H Vaidya, P Bahl, S Gupta.
    Distributed fair scheduling in a Wireless LAN. IEEE Trans. Mobile Comput, 2005
  54. M Thorup, U Zwick.
    Approximate distance oracles. Journal of the ACM, 2005
  55. Marjan Mernik, Jan Heering, Anthony M Sloane.
    When and How to Develop Domain-Specific Languages. ACM Computing Surveys, 2005
  56. N Paragios, R Deriche.
    Geodesic active regions and level set methods for motion estimation and tracking. Computer Vis. and Image Understanding, 2005
  57. L Ning, J C Hou, L Sha.
    BDesign and analysis of an mst-based topology control algorithm. IEEE Trans. Wireless Commun, 2005
  58. R McDonald, K Crammer, F Pereira.
    Online large-margin training of dependency parsers. In Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics (ACL-05, 2005
  59. Brent Waters.
    Efficient Identity-Based Encryption Without Random Oracles. In Proc. of Advances in Cryptology - EUROCRYPT 2005, 2005
  60. B Titzer, D Lee, J Palsberg.
    Avrora: scalable sensor network simulation with precise timing. In: Proc. of the 4 th Int. Symp. on Information, 2005
  61. R Collins, Y Liu, M Leordeanu.
    On-line selection of discriminative tracking features. In PAMI, 2005
  62. B Girod, A Aaron, S Rane, D Rebollo-Monedero.
    Distributed video coding. Proceedings of the IEEE, 2005
  63. Z Gyöngyi, H Garcia-Molina.
    Web Spam Taxonomy. In Proceedings of the 1st ACM International Workshop on Adversarial Information Retrieval on the Web, 2005
  64. Graham Cormode.
    S.Muthukrishnan; What's Hot and What's Not: Tracking Most Frequent Items Dynamically. ACM Transactions on Database Systems, 2005
  65. S Roth, M Black.
    Fields of experts: A framework for learning image priors. In IEEE Computer Vision and Pattern Recognition, 2005
  66. T Serre, L Wolf, T Poggio.
    Object recognition with features inspired by visual cortex. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2005
  67. Philipp Koehn.
    Europarl: A Parallel Corpus for Statistical Machine Translation. In Conference Proceedings: the tenth Machine Translation Summit, 2005
  68. X Yang, D Wetherall, T Anderson.
    A DoS-limiting network architecture. Proceedings of ACM SIGCOMM, 2005
  69. J Teevan, S Dumais, E Horvitz.
    Personalizing search via automated analysis of interests and activities. In SIGIR ‘05, 2005
    Gossip-based aggregation in large dynamic networks. ACM Transactions on Computer Systems, 2005
  71. M J Neely, E Modiano, C E Rohrs.
    Dynamic Power Allocation and Routing for Time Varying Wireless Networks. IEEE J. Sel. Areas Comm, 2005
  72. Z Fu, H Luo, P Zerfos, S Lu, L Zhang, M Gerla.
    The impact of multi-hop wireless channel on TCP performance. IEEE Transactions on Mobile Computing, 2005
  73. A W Moore, D Zuev.
    Internet traffic classification using bayesian analysis techniques. Perform. Eval. Rev, 2005
  74. Anh Nguyen-tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, David Evans.
    Automatically hardening web applications using precise tainting. In Proceedings of the IFIP International Information Security Conference, 2005
  75. A G Ramm.
    Inverse problems. 2005
  76. Jonathan Aldrich.
    Open modules: Modular reasoning about advice. In European Conference on Object-Oriented Programming, 2005
  77. X Wang, Lisa Yin, Y Yu.
    H.: Finding collisions in the full SHA-1. In: Proc. of CRYPTO 2005, 2005
  78. D Brumley, Boneh.
    D.: Remote timing attacks are practical. Computer Networks, 2005
  79. T Joachims.
    A support vector method for multivariate performance measures. In Proceedings of 22nd International Conference on Machine Learning (ICML-2005, 2005
  80. Boon T Loo, Tyson Condie, Joseph M Hellerstein, Petros Maniatis, Timothy Roscoe, Ion Stoica.
    Implementing Declarative Overlays. In SOSP ’05: Proceedings of the twentieth ACM symposium on Operating systems principles, 2005
  81. R Wattenhofer, L Li, P Bahl, Y M Wang.
    A cone-based distributed topology control algorithm for wireless multi-hop networks. IEEE/ACM Transactions on Networking, 2005
  82. R Pike, S Dorward, R Griesemer, S Quinlan.
    Interpreting the data: Parallel analysis with Sawzall. In Scientific Programming Journal, 2005
  83. M S Floater, K Hormann.
    Surface parameterization: a tutorial and survey. In Advances in, 2005
  84. M M K Martin, D J Sorin, B M Beckmann, M R Marty, M Xu, A R Alameldeen, K E Moore, M D Hill, D A Wood.
    Multifacet’s General Execution-driven Multiprocessor Simulator (GEMS) Toolset. Computer Architecture News, 2005
  85. R Cilibrasi.
    M.B.Vitanyi, Clustering by compression. IEEE Transactions on Information Theory, 2005
  86. F Jurie, B Triggs.
    Creating efficient codebooks for visual recognition. In ICCV, 2005
  87. F Radlinski, Joachims.
    T.: Query chains: learning to rank from implicit feedback. In: KDD ’05: Proceeding of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, 2005
  88. X He, S Yan, Y Hu, P Niyogi, H Zhang.
    Face recognition using laplacianfaces. IEEE Trans. Pattern Anal. Mach. Intell, 2005
  89. A Gulli, A Signorini.
    The indexable Web is more than 11.5 billion pages. In Proc. 14th WWW, 2005
  90. B Taskar, V Chatalbashev, D Koller, C Guestrin.
    Learning structured prediction models: a large margin approach. In Proceedings of 22nd International Conference on Machine Learning (ICML-2005, 2005
  91. Josef Sivic, Bryan C Russell, Alexei A Efros, Andrew Zisserman, William T Freeman.
    Discovering objects and their location in images. In IEEE Intl. Conf. on Computer Vision, 2005
  92. N Feamster, H Balakrishnan.
    Detecting BGP configuration faults with static analysis. in Proc. 2nd Symp. Networked Systems Design and Implementation (NSDI, 2005
  93. Samuel T King, George W Dunlap, Peter M Chen.
    Debugging Operating Systems with Time-Traveling Virtual Machines. In Proceedings of the 2005 USENIX Annual Technical Conference, 2005