Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. N Dalal, B Triggs.
    Histograms of oriented gradients for human detection. International Conference on Computer Vision and Pattern Recognition, 2005
  2. K Mikolajczyk, C Schmid.
    A performance evaluation of local descriptors. IEEE Trans. Pattern Anal, 2005
  3. D Tse, P Viswanath.
    Fundamentals of Wireless Communication. 2005
  4. E Candés, T Tao.
    Decoding by linear programming. IEEE Trans. Inform. Theory, 2005
  5. S Haykin.
    Cognitive radio: brain-empowered wireless communications. IEEE Journal on Selected Areas Commun, 2005
  6. C keung Luk, R Cohn, R Muth, H Patil, A Klauser, G Lowney, S Wallace, V Janapa, R K Hazelwood.
    Pin: Building customized program analysis tools with dynamic instrumentation. In In Programming Language Design and Implementation, 2005
  7. P Godefroid, N Klarlund, K Sen.
    DART: Directed Automated Random Testing. In Proceedings of PLDI’2005, 2005
  8. A Goldsmith.
    Wireless Communications. 2005
  9. P F Felzenszwalb, D P Huttenlocher.
    Pictorial structures for object recognition. Int. J. Comput. Vis, 2005
  10. J Ramsay, B W Silverman.
    Functional Data Analysis. 2005
  11. J Polastre, R Szewczyk, D Culler.
    Telos: enabling ultra-low power wireless research. In Proceedings of IEEE IPSN, 2005
  12. J Newsome.
    Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. in 12th Annual Network and Distributed System Security Symposium, 2005
  13. I Laptev.
    On space-time interest points. International Journal of Computer Vision, 2005
  14. D Zhou, O Bousquet, T Lal, J Weston, B Schlkopf.
    Learning with local and global consistency. In NIPS’16, 2005
  15. S Madden, M J Franklin, J M Hellerstein, W Hong.
    Tinydb: an acquisitional query processing system for sensor networks. ACM-TODS, 2005
  16. M Frigo, S G Johnson.
    The design and implementation of FFTW3. Proceedings of the IEEE, 2005
  17. J C Barrett, B Fry, J Maller, M J Daly.
    Haploview: analysis and visualization of LD and haplotype maps. Bioinformatics, 2005
  18. B C Russell, A Torralba, K P Murphy, W T Freeman.
    LabelMe: a database and web-based tool for image annotation. 2005
  19. J S Yedidia, W T Freeman, Y Weiss.
    Constructing free-energy approximations and generalized belief propagation algorithms. IEEE Trans. on Information Theory, 2005
  20. T Harris, S Marlow, P Jones.
    Composable memory transactions. In PPoPP’05: Proceedings of the 10th ACM SIGPLAN Symposium on Principles and Practice of parallel programming, 2005
  21. J Finkel, T Grenager, CD Manning.
    Incorporating non-local information into information extraction systems by Gibbs sampling. In Proc. of ACL, 2005
  22. P Dollar, V Rabaud, G Cottrell, S Belongie.
    Behavior recognition via sparse spatio-temporal features. In International workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance, 2005
  23. Eugene Charniak, Mark Johnson.
    Coarse-tofine n-best parsing and MaxEnt discriminative reranking. In Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics, 2005
  24. H ZOU, T HASTIE.
    Regularization and variable selection via the elastic net. Journal of the Royal Statistical Society. Series B, 2005
  25. C Clark, K Fraser, S Hand, J G Hanseny, E July, C Limpach, I Pratt, A Warfield.
    Live migration of virtual machines. In In Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI, 2005
  26. M Gildea Palmer, D Kingsbury, P.
    The Proposition Bank: An annotated corpus of semantic roles. Computational Linguistics, 2005
  27. David Chiang.
    A hierarchical phrase-based model for statistical machine translation. In Proceedings of the 43rd Annual Meeting of the ACL, 2005
  28. S Muthukrishnan.
    Data Streams: Algorithms and Applications. Foundations and Trends in Theoretical Computer Science. Now Publishers, 2005
  29. K Jain, J Padhye, V Padmanabhan, L Qiu.
    Impact of interference on multi-hop wireless network performance. Wireless Networks, 2005
  30. K Grauman, T Darrell.
    The pyramid match kernel: Discriminative classification with sets of image features. In IEEE International Conference on Computer Vision (ICCV, 2005
  31. C Burges, T Shaked, E Renshaw, A Lazier, M Deeds, N Hamilton, G Hullender.
    Learning to rank using gradient descent. ICML, 2005
  32. X Zhang, J Liu, B Li, Y-S P Yum.
    CoolStreaming/DONet: A datadriven overlay network for efficient live media streaming. INFOCOM 2005, 2005
  33. P Cramton, R Steinberg, Y Shoham.
    Combinatorial auctions. 2005
  34. K Sen, D Marinov, G Agha.
    CUTE: A concolic unit testing engine for C. In Proceedings of the European Software Engineering Conference and the International Symposium on Foundations of Software Engineering (ESEC/FSE, 2005
  35. T Joachims, L Granka, B Pan, H Hembrooke, G Gay.
    Accurately interpreting clickthrough data as implicit feedback. In SIGIR, 2005
  36. J Leskovec, J Kleinberg, C.
    Faloutsos “Graphs over Time: Densification Laws, Shrinking Diameters and Possible Explanations. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD, 2005
  37. G K Smyth.
    Limma: linear models for microarray data. Bioinformatics and Computational Biology Solutions using R and Bioconductor, 2005
  38. P Koehn.
    Europarl: A parallel corpus for statistical machine translation. in Proceedings of MT Summit, 2005
  39. Lilian Burdy, Yoonsik Cheon, David R Cok, Michael D Ernst, Joeseph R Kiniry, Gary T Leavens, K Rustan M Leino, Erik Poll.
    An overview of JML tools and applications. International Journal on Software Tools for Technology Transfer, 2005
  40. F Baader, S Brandt, C Lutz.
    Pushing the EL envelope, in. Proc. 19th Int. Joint Conf. on Artificial Intelligence (IJCAI-05), Morgan-Kaufmann Publishers, 2005
    An improved data stream summary: the count-min sketch and its applications. J. Algorithms, 2005
  42. C Rasmussen, C Williams.
    Gaussian processes for machine learning. 2005
  43. Jeremy Manson, William Pugh, Sarita V Adve.
    The Java Memory Model. SIGPLAN Not, 2005
  44. A C Berg, T L Berg, J Malik.
    Shape matching and object recognition using low distortion cost. In CVPR, 2005
  45. T Spyropoulos, K Psounis, C S Raghavendra.
    Spray and wait: An efficient routing scheme for intermittently connected mobile networks. In Proceedings of ACM SIGCOMM, 2005
  46. A Buades, B Coll, J M Morel.
    A review of image denoising algorithms, with a new one. 2005
  47. P Phillips P Flynn, T Scruggs, K Bowyer, J Chang, K Hoffman, J Marques, J Min, W Worek.
    Overview of the face recognition grand challenge. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2005
  48. S Biswas, R Morris.
    ExOR: Opportunistic Multi-Hop Routing for Wireless Networks. in Proc. of ACM SIGCOMM, 2005
  49. M Alicherry, R Bhatia, L Li.
    Joint Channel Assignment and Routing for Throughput Optimization. in Multi-Radio Wireless Mesh Networks,” Proc. ACM MobiCom, 2005
  50. P Shvaiko, J Euzenat.
    A survey of schema-based matching approaches. Journal on Data Semantics IV, 2005
  51. R McDonald, F Pereira, K Ribarov, J Hajič.
    NonProjective Dependency Parsing using Spanning Tree Algorithms. In Proceedings of Human Langauge Technology Conference and Conference on Empirical Methods in Natural Language Processing (HTL/EMNLP, 2005
  52. M Iacoviello.
    House Prices, Borrowing Constraints, and Monetary. Policy in the Business Cycle,American Economic Review 95, 2005
  53. R Bayardo, R Agrawal.
    Data privacy through optimal k-anonymization. In ICDE, 2005
  54. R Xu, D Wunsch.
    Survey of clustering algorithms. IEEE Transactions on Neural Networks, 2005
  55. A-M Popescu, O Etzioni.
    Extracting product features and opinions from reviews. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP, 2005
  56. J Heer, S K Card, J A Landay.
    prefuse: a toolkit for interactive information visualization. In Proceedings of the SIGCHI conference on Human factors in computing systems, CHI ’05, 2005
  57. H W Hethcote.
    The Mathematics of Infectious Diseases. SIAM Review, 2005
  58. B Motik, U Sattler, R Studer.
    Query answering for OWL-DL with rules. J. of Web Semantics, 2005
  59. P J Modi, W-M Shen, M Tambe, M Yoko.
    ADOPT: Asynchronous distributed constraint optimization with quality guarantees. Artificial Intelligence, 2005
  60. J Bicket, D Aguayo, S Biswas, R Morris.
    Architecture and evaluation of an unplanned 802.11b mesh network. in MobiCom ’05: Proceedings of the 11th annual international conference on Mobile computing and networking, 2005
  61. Yuanbo Guo, Zhengxiang Pan, Jeff Heflin.
    LUBM: A Benchmark for OWL Knowledge Base Systems. Web Semantics: Science, Services and Agents on the World Wide Web, 2005
  62. A Lakhila, M Crovella, C Diot.
    Mining Anomalies Using Traffic Feature Distributions. In Proccedings of ACM SIGCOMM, 2005
  63. K Mikolajczyk.
    A comparison of affine region detectors. International Journal of Computer Vision, 2005
  64. D Acemoglu, S Johnson.
    Unbundling institutions. J. Polit. Economy, 2005
  65. T Wilson, J Wiebe, Hoffmann.
    P.: Recognizing contextual polarity in phraselevel sentiment analysis. Association for Computational Linguistics, 2005
  66. R McDonald, K Crammer, F Pereira.
    Online large-margin training of dependency parsers. In Proc. of ACL, 2005
  67. K LeFevre, D J DeWitt, R Ramakrishnan.
    Incognito: efficient full-domain k-anonymity. In Proceedings of the 2005 ACM SIGMOD international conference on Management of data, 2005
  68. S Roth, M Black.
    Fields of experts: A framework for learning image priors. In IEEE Conf. on Computer Vision and Pattern Recognition, volume II, 2005
  69. B Baudes, A Coll, J M Morel.
    A non-local algorithm for image denoising. In CVPR, 2005
  70. B Girod, A Aaron, S Rane, D Rebollo-Monedero.
    Distributed Video Coding. Proc. of the IEEE, Special Issue on Video Coding and Delivery, 2005
  71. R T Collins, Y Liu.
    On-line selection of discriminative tracking features. IEEE Trans. on Pattern Analysis and Machine Intelligence, 2005
  72. S M Uppala, Coauthors.
    The ERA-40 Reanalysis. 2005
  73. M Barnett, B Chang, R DeLine, B Jacobs, K Leino.
    Boogie: A modular reusable verifier for object-oriented programs. Proceedings of the Fourth International Symposium on Formal Methods for Components and Objects (FMCO, 2005
  74. C S Ananian, K Asanovic, B C Kuszmaul, C E Leiserson, S Lie.
    Unbounded transactional memory. In HPCA’05: Proceeding of the 11th International Symposim on High-Performance Computer Architecture, 2005
  75. Daron Acemoglu, Simon Johnson, James A Robinson.
    Institutions as the Fundamental Cause of Long-Run Growth. In Handbook of Economic Growth, ed. Philippe Aghion and Stephen Durlauf, 2005
  76. Y L Simmhan, B Plale, D Gannon.
    A survey of data provenance in e-science. SIGMOD Rec, 2005
  77. M Neely, E Modiano, C Rohrs.
    Dynamic power allocation and routing for time-varying wireless networks. IEEE Journal on Selected Areas in Communications, 2005
  78. S Golder, B A Huberman.
    The structure of collaborative tagging systems. 2005
  79. J Pouwelse, P Garbacki, D Epema, H Sips.
    The Bittorrent P2P File-sharing System: Measurements and Analysis. In IPTPS, 2005
  80. S Washietl, I L Hofacker, P F Stadler.
    Fast and reliable prediction of noncoding RNAs. Proc. Natl Acad. Sci. USA, 2005
    Polygraph: Automatically generating signatures for polymorphic worms. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, 2005
  82. R Levine.
    Finance and growth: theory and evidence. in ‘Handbook of Economic Growth’, P. Aghion and S. Durlauf (eds, 2005
  83. V Acharya, L Pedersen.
    Asset Pricing with Liquidity Risk. The Journal of Financial Economics, 2005
  84. J Winn, A Criminisi, T Minka.
    Categorization by learned universal visual dictionary. In ICCV, 2005
  85. K Azarian, H El Gamal, P Schniter.
    On the achievable diversitymultiplexing tradeoff in half-duplex cooperative channels. IEEE Transactions on Information Theory, 2005
  86. Lada Adamic, Natalie Glance.
    The Political Blogosphere and the 2004 U.S. Election: Divided They Blog. WWW 2005 2nd Annual Workshop on the Weblogging Ecosystem: Aggregation, Analysis and Dynamics, 2005
  87. J Campa, L Goldberg.
    Exchange Rate Pass Through into Import Prices. Review of Economics and Statistics, November, 2005
  88. B Liblit, M Naik, A Zheng, A Aiken, M Jordan.
    Scalable statistical bug isolation. ACM SIGPLAN Conference on Programming Language Design and Implementation, 2005
  89. X He, S Yan, Y Hu, P Niyogi, H Zhang.
    Face recognition using laplacianfaces. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2005
  90. D Batory.
    Feature models, grammars, and propositional formulas. In Proceedings of the 9th International Conference of Software Product Lines, 2005
  91. Thorsten Joachims.
    A support vector method for multivariate performance measures. in ICML, eds., Luc De Raedt and Stefan Wrobel, 2005
  92. Lior Wolf.
    Object Recognition with Features Inspired by Visual Cortex. Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Volume, 2005
  93. L Zelnik-Manor, P Perona.
    Self-tuning spectral clustering. Advances in Neural Information Processing Systems 17, 2005
  94. D Roman.
    Web Service Modeling Ontology. Applied Ontology, 2005