Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. D L Donoho.
    Compressed sensing. IEEE Trans. Inform. Theory, 2006
    735
  2. S Lazebnik, C Schmid, J Ponce.
    Beyond bags of features: spatial pyramid matching for recognizing natural scene categories. In: IEEE Computer Vision and Pattern Recognition, 2006
    434
  3. M, P Domingos.
    Markov logic networks. Machine Learning, 2006
    319
  4. N Eagle, A Pentland.
    Reality Mining: Sensing Complex Social Systems. Personal and Ubiquitous Computing, 2006
    229
  5. P Cramton, Y Shoham, R Steinberg.
    Combinatorial Auctions. 2006
    224
  6. D Blei, J Lafferty.
    Dynamic topic models. In International Conference on Machine Learning, 2006
    223
  7. J R Larus, R Rajwar.
    Transactional Memory. 2006
    214
  8. S Zhu, S Setia, S Jajodia.
    LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sensor Networks, 2006
    212
  9. Z J Haas, J Y Halpern, L Li.
    Gossip-based ad hoc routing. IEEE/ACM Trans. Netw, 2006
    211
  10. G E Hinton, S Osindero, Y Teh.
    A fast learning algorithm for deep belief nets. Neural Computation, 2006
    198
  11. N Snavely, S Seitz, R Szeliski.
    Photo tourism: Exploring photo collections in 3D. ACM Trans. Graphics, 2006
    197
  12. P A Chou, Z Miao.
    Rate-distortion optimized streaming of packetized media. IEEE Trans. Multimedia, Pages, 2006
    188
  13. N Nethercote, J Seward.
    Valgrind: A Program Supervision Framework. In Electronic Notes in Theoretical Computer Science (2003, 2006
    181
  14. D L Donoho.
    For most large underdetermined systems of linear equations the minimal . Commun. Pure Appl. Math, 2006
    180
  15. S Seitz, B Curless, J Diebel, D Scharstein, R Szeliski.
    A Comparison and Evaluation of Multi-view Stereo Reconstruction Algorithms. In Computer Vision and Pattern Recognition (CVPR, 2006
    172
  16. M Everingham, A Zisserman, C K I Williams, L Van Gool.
    The pascal visual object classes challenge 2006 (voc 2006) results. 2006
    171
  17. M Snover, B Dorr, R Schwartz, L Micciulla, J Makhoul.
    A study of translation edit rate with targeted human annotation. In: 7th Association for Machine Translation in the America, 2006
    170
  18. R Niedermeier.
    Invitation to Fixed-Parameter Algorithms. 2006
    169
  19. D L Donoho, M Elad, V Temlyakov.
    Stable recovery of sparse overcomplete representations in the presence of noise. IEEE Trans. Inform. Theory, 2006
    166
  20. Kevin E Moore, Jayaram Bobba, Michelle J Moravan, Mark D Hill, David A Wood.
    LogTM: Log-Based Transactional Memory. In Proceedings of the International Symposium on High Performance Computer Architecture, 2006
    165
  21. D DICE, O SHALEV, N SHAVIT.
    Transactional locking II. In DISC, 2006
    164
  22. Roy Bar-Haim, Ido Dagan, Bill Dolan, Lisa Ferro, Danilo Giampiccolo, Bernardo Magnini.
    The second pascal recognising textual entailment challenge. In Proceedings of the Second PASCAL Challenges Workshop on Recognising Textual Entailment, 2006
    163
  23. K Dekel, O Keshet, J Shalev-Shwartz, S, Y Singer.
    Online passive-aggressive algorithms. Journal of Machine Learning Research, 2006
    156
  24. J A Tropp.
    Just relax: Convex programming methods for identifying sparse signals. IEEE Trans. Inform. Theory, 2006
    153
  25. A Shokrollahi.
    Raptor codes. IEEE/ACM Transactions on Networking, 2006
    148
  26. Cristian Cadar, Vijay Ganesh, Peter Pawlowski, David Dill, Dawson Engler.
    EXE: automatically generating inputs of death. In Conference on Computer and Communications Security, 2006
    140
  27. A JUELS.
    RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 2006
    137
  28. L Backstrom, D Huttenlocher, J Kleinberg, X Lan.
    Group formation in large social networks: Membership, growth, and evolution. Proceedings of 12th International Conference on Knowledge Discovery in Data Mining, 2006
    137
  29. S Buchholz, E Marsi.
    CoNLL-X shared task on multilingual dependency parsing. In CoNLL, 2006
    136
  30. Bratin Saha, Ali-Reza Adl-Tabatabai, Richard L Hudson, Chi Cao Minh, Benjamin Hertzberg.
    McRT-STM: a high performance software transactional memory system for a multi-core runtime. In Proceedings of the 11th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP, 2006
    134
  31. M C De Marneffe, B MacCartney, C D Manning.
    Generating typed dependency parses from phrase structure parses. In Proceedings of the Fifth International Conference on Language Resources and Evaluation, 2006
    131
  32. Slav Petrov, Leon Barrett, Romain Thibaux, Dan Klein.
    Learning accurate, compact, and interpretable tree annotation. In Proceedings of the 21st International Conference on Computational Linguistics and the 44th Annual Meeting of the Association for Computational Linguistics, 2006
    131
  33. H Zhang, A C Berg, M Maire, J Malik.
    SVM-KNN: Discriminative nearest neighbor classification for visual category recognition. In Proccedings of the IEEE International Conference on Computer Vision and Pattern Recognition (CVPR, 2006
    130
  34. Michel Galley, Jonathan Graehl, Kevin Knight, Daniel Marcu, Steve DeNeefe, Wei Wang, Ignacio Thayer.
    Scalable inference and training of context-rich syntactic translation models. In Proceedings of COLING-ACL, 2006
    129
  35. C Rasmussen, C Williams.
    Gaussian processes for machine learning. 2006
    128
  36. S A Baset, H Schulzrinne.
    An analysis of the Skype peer-to-peer Internet telephony protocol. In Proc. of the INFOCOM ’06, 2006
    128
  37. K LeFevre, D J Dewitt, R Ramakrishnan.
    Mondrian multidimensional k-anonymity. In ICDE, 2006
    125
  38. H R Varian.
    Position auctions. International Journal of Industrial Organization, 2006
    124
  39. H V Madhyastha, T Isdal, M Piatek, C Dixon, T Anderson, A Krishnamurthy, A Venkataramani.
    iPlane: An information plane for distributed services. in Proc. USENIX OSDI, 2006
    123
  40. Simon Peyton Jones, Dimitrios Vytiniotis, Stephanie Weirich, Geoffrey Washburn.
    Simple unification-based type inference for GADTs. In ICFP ’06: Proceedings of the Eleventh ACM SIGPLAN International Conference on Functional Programming, 2006
    121
  41. T Sandholm, S Suri, A Gilpin, D Levine.
    CABOB: a fast optimal algorithm for combinatorial auctions. International joint conferences on artificial intelligence, 2001, p. 1102–8. Y. Guo et al. / Computers & Operations Research 33, 2006
    119
  42. Bruno Dutertre, Leonardo de Moura.
    A Fast Linear-Arithmetic Solver for DPLL(T. In Proceedings of the 18th Computer-Aided Verification conference, volume 4144 of LNCS, 2006
    118
  43. S Khot, G Kindler, E Mossel, R O’Donnell.
    Optimal inapproximability results for MAX-CUT and other 2-variable CSPs. 11 [KS09] [KV05] [Las01] [LN06] [MOO05] [RS09] [Sch08, 2006
    117
  44. Andrew S Tanenbaum.
    Distributed Systems: Principles and Paradigms. 2006
    115
  45. L A Adamic J Leskovec, B A Huberman.
    The dynamics of viral marketing. InEC’06: Proc.of the 7th ACMconference onElectronic commerce, 2006
    115
  46. J Demsar.
    Statistical Comparisons of Classifiers over Multiple Data Sets. Journal of Machine Learning Research, 2006
    114
  47. R Jones, B Rey, O Madani, W Greiner.
    Generating query substitutions. In WWW, 2006
    114
  48. A El Gamal, J Mammen, B Prabhakar, D Shah.
    Optimal Throughput-Delay Trade-off in Wireless Networks – Part I: The Fluid Model,” to appear. IEEE Trans. on Inform. Th, 2006
    112
  49. B C Russell, A A Efros, J Sivic, W T Freeman, A Zisserman.
    Using multiple segmentations to discover objects and their extent in image collections. In CVPR, 2006
    110
  50. T Ball, E Bounimova, B Cook, V Levin, J Lichtenberg, C McGarvey, B Ondrusek, S Rajamani, A Ustuner.
    Thorough static analysis of device drivers. 2006
    110
  51. Rion Snow, Daniel Jurafsky, Andrew Y Ng.
    Semantic taxonomy induction from heterogenous evidence. In Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics, ACL-44, 2006
    109
  52. D Kempe, J Kleinberg, A Demers.
    Spatial gossip and resource location protocols. In Proceedings of STOC’06, 2006
    108
  53. C Dwork.
    Differential privacy. In ICALP, 2006
    108
  54. A Chaintreau, P Hui, J Crowcroft, C Diot, R Gass, J Scott.
    Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms. in Proceedings of INFOCOM, 2006
    107
  55. G Werner-Allen, K Lorincz, J Johnson, J Lees, M Welsh.
    Fidelity and yield in a volcano monitoring sensor network. USENIX OSDI, 2006
    106
  56. W Xu, S Bhatkar, R Sekar.
    Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In Proceedings of the 15th USENIX Security Symposium, 2006
    105
  57. A Ledeczi, D Balasubramanian, Z Molnár.
    An Introduction to the Generic Modeling Environment. In Proceedings of MDD-TIF07, Model-Driven Development Tool Implementers Forum. 2007. http://www.dsmforum.org/events/MDD-TIF07/GME.2.pdf MetaCase. MetaEdit+. Version 4.0. Evaluation Tutorial. Technical report, MetaCase, 2005. http://www.metacase.com/suppor, 2006
    105
  58. A Andoni, P Indyk.
    Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. in FOCS ’06: Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science, 2006
    104
  59. M Chudnovsky, N Robertson, P Seymour, R Thomas.
    The strong perfect graph theorem. Annals of Mathematics, 2006
    104
  60. Y Xie, A Aiken.
    Static detection of security vulnerabilities in scripting languages. In Proceedings of the Usenix Security Symposium, 2006
    103
  61. S Weil, S Brandt, E Miller, D Long, C Maltzahn.
    Ceph: A scalable, high-performance distributed file system. in Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI, 2006
    103
  62. D Brumley, J Newsome, D Song, H Wang, S Jha.
    Towards Automatic Generation of Vulnerability-Based Signatures. In Proceedings of the IEEE Symposium on Security and Privacy, 2006
    101
  63. R SZELISKI, R ZABIH, D SCHARSTEIN, O VEKSLER, V KOLMOGOROV, A AGARWALA, M F TAPPEN, C ROTHER.
    A comparative study of energy minimization methods for markov random fields. In European Conference on Computer Vision, 2006
    100
  64. Saikat Guha, Neil Daswani, Ravi Jain.
    An Experimental Study of the Skype Peer-to-Peer VoIP System. In IPTPS, 2006
    100
  65. Alexandros Ntoulas, Marc Najork, Mark Manasse, Dennis Fetterly.
    Detecting spam web pages through content analysis. In Proceedings of the 15th International World Wide Web Conference (WWW, 2006
    100
  66. Dino Distefano, Peter W O’Hearn, Hongseok Yang.
    A local shape analysis based on separation logic. In TACAS, 2006
    99
  67. Rob Fergus, Barun Singh, Aaron Hertzmann, Sam Roweis, William Freeman.
    Removing camera shake from a single photograph. SIGGRAPH, 2006
    98
  68. P S L M Barreto, M Naehrig.
    Pairing-friendly elliptic curves of prime order. In Selected Areas in Cryptography – SAC 2005, 2006
    98
  69. Andrew Hinton, Marta Kwiatkowska, Gethin Norman, David Parker.
    PRISM: A tool for automatic verification of probabilistic systems. In Proc. of TACAS’06, volume 3920 of LNCS, 2006
    98
  70. D Tsarkov, I Horrocks.
    FaCT++ Description Logic Reasoner: System Description. In Proc. IJCAR 2006, 2006
    98
  71. S Golder, B A Huberman.
    The Structure of Collaborative Tagging Systems. Journal of Information Sciences, 2006
    98
  72. I F Akyildiz, W Lee, M C Vuran, S Mohanty.
    Next Generation/Dynamic Spectrum Access/Cognitive Radio Wireless Networks: A Survey. Computer Networks, 2006
    97
  73. M Helmert.
    The Fast Downward planning system. 2006
    97
  74. T Ho, M Médard, R Koetter, D Karger, M Effros, J Shi, B Leong.
    A random linear network coding approach to multicast. IEEE Transactions on Information Theory, 2006
    96
  75. Byron Cook, Andreas Podelski, Andrey Rybalchenko.
    Termination proofs for systems code. In Proceedings of the 2006 ACM SIGPLAN conference on Programming language design and implementation, PLDI ’06, 2006
    96
  76. C STARK, B-J BREITKREUTZ, T REGULY, L BOUCHER, A BREITKREUTZ.
    BioGRID: a General Repository for Interaction Datasets. Nucleic Acids Research, 2006
    96
  77. N Jovanovic, C Kruegel, E Kirda.
    Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper. In Proceedings of the 2006 IEEE Symposium on Security and Privacy, 2006
    93
  78. Gabor Karsai, Janos Sztipanovits, Ákos Lédeczi, Ted Bapty.
    ModelIntegrated Development of Embedded Software. Proceedings of the IEEE, 91(1):145–164, 2003. [Ler06] [Lis03] [Mét88] [Oka98] [Pie02] Xavier Leroy. Coinductive Big-Step Operational Semantics. In Programming Languages and Systems - 15th European Symposium on Programming (ESOP’06, 2006
    93
  79. A Hotho, R Jaschke, C Schmitz, G Stumme.
    Information retrieval in folksonomies: Search and ranking. In The Semantic Web: Research and Applications, 2006
    92
  80. Y-C Cheng, J Bellardo, P Benko, A C Snoeren, G M Voelker, S Savage.
    Jigsaw: Solving the puzzle of enterprise 802.11 analysis. in Proc. of ACM SIGCOMM, 2006
    92
  81. J Haupt, R Nowak.
    Signal reconstruction from noisy random projections. IEEE Trans. Inf. Th, 2006
    91
  82. T Sandholm, C Boutilier.
    Preference elicitation in combinatorial auctions. In Cramton, Shoham, & Steinberg (Eds.), Combinatorial Auctions, 2006
    90
  83. G WERNER-ALLEN, K LORINCZ, M WELSH, O MARCILLO, J JOHNSON, M RUIZ, J LEES.
    Deploying a wireless sensor network on an active volcano. IEEE Internet Computing, 2006
    89
  84. J Tropp, A Gilbert, M Strauss.
    Algorithms for simultaneous sparse approximation. part I: Greedy pursuit. Signal Processing, 2006
    89
  85. L Kocsis, C Szepesvári.
    Bandit based Monte-Carlo planning. In Proceedings of the 17th ECML, 2006
    88
  86. M Buettner, G V Yee, E Anderson, R Han.
    X-mac: A short preamble MAC protocol for duty-cycled wireless sensor networks. In Proc. Sensys’06, 2006
    88
  87. A Bharambe, C Herley, V Padmanabhan.
    Analyzing and improving a bittorrent network’s performance mechanisms. in INFOCOM ’06: Proc. 25th Intl. Conference on Computer Communications, 2006
    88
  88. Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, David Mazières.
    Making information flow explicit in HiStar. In Proc. 7th USENIX Symp. on Operating Systems Design and Implementation (OSDI, 2006
    88