Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. T Roughgarden, É Tardos.
    How bad is selfish routing. Journal of the ACM, 2002. ACM SIGCOMM Computer Communication Review 52 Volume 38, Number, 2008
    384
  2. C D Manning, P Raghavan, H Schutze.
    Introduction to Information Retrieval. 2008
    333
  3. B Russell, A Torralba, K Murphy.
    LabelMe: a database and web-based tool for image annotation. Intl. Journal of Computer Vision (IJCV, 2008
    203
  4. L M de Moura, N Bjørner.
    Z3: An efficient SMT solver. In TACAS 2008, volume 4963 of LNCS, 2008
    195
  5. C Olston, B Reed, U Srivastava, R Kumar, A Tomkins.
    Pig Latin: A Not-So-Foreign Language for Data Processing. In SIGMOD, 2008
    160
  6. T Eiter, G Ianni, T Lukasiewicz, R Schindlauer, Tompits.
    H.: Combining answer set programming with description logics for the semantic web. Artif. Intell. 2008
    151
  7. J C Niebles, H Wang, L Fei-Fei.
    Unsupervised learning of human action categories using spatial-temporal words. International Journal of Computer Vision, 2008
    149
  8. A T Sherman, D A McGrew.
    Key Establishment in Large Dynamic Groups Using One-Way Function Trees. In Fifteenth National Power Systems Conference (NPSC’08, 2008
    136
  9. S Katti, H Rahul, W Hu, D Katabi, M Medard, J Crowcroft.
    XORs in the air: Practical wireless network coding. IEEE/ACM Trans. on Networking, 2008
    134
  10. Ritendra Datta, Dhiraj Joshi, Jia Li, James.
    Z.Wang, Image retrieval: ideas, influences, and trends of the new age. ACM Computing Surveys, 2008
    128
  11. C Bienia, S Kumar, J P Singh, K Li.
    The PARSEC Benchmark Suite: Characterization and Architectural Implications. In Proceedings of the 17th International Conference on Parallel Architectures and Compilation Techniques, 2008
    124
  12. B Pang, L Lee.
    Opinion mining and sentiment analysis. Foundations and Trends in Information Retrieval, 2008
    115
  13. J Klensin.
    Simple Mail Transfer Protocol. 2008
    107
  14. I Rhee, A Warrier, M Aia, J Min, M L Sichitiu.
    Z-MAC: A Hybrid MAC for Wireless Sensor Networks. IEEE/ACM Transactions on Networking, 2008
    97
  15. E J Candès, B Recht.
    Exact matrix completion via convex optimization. Foundations of Computational Mathematics 9, 2008
    97
  16. L SEILER, D CARMEAN, E SPRANGLE, T FORSYTH, M ABRASH, P DUBEY, S JUNKINS, A LAKE, J SUGERMAN, R CAVIN, R ESPASA, E GROCHOWSKI, T JUAN, P HANRAHAN.
    Larrabee: a many-core x86 architecture for visual computing. In SIGGRAPH ’95, 2008
    95
  17. A Kittur, E H Chi, B Suh.
    Crowdsourcing User Studies with Mechanical Turk. In Proc. CHI 2008, ACM, 2008
    93
  18. P Godefroid, M Y Levin, D A Molnar.
    Automated Whitebox Fuzz Testing. in Proceedings of the Network and Distributed System Security Symposium, 2008
    90
  19. N Mckeown, T Anderson, H Balakrishnan, G Parulkar, L Peterson, J Rexford, S Shenker, J Turner.
    Openflow: enabling innovation in campus networks. In SIGCOMM CCR, 2008
    89
  20. K E A van de Sande, T Gevers, C G M Snoek.
    Evaluation of color descriptors for object and scene recognition. In Proc. of IEEE Conf. on Computer Vision and Pattern Recognition (CVPR, 2008
    82
  21. E van den Berg, M P Friedlander.
    Probing the pareto frontier for basis pursuit solutions. SIAM Journal on Scientific Computing, 2008
    82
  22. T Spyropoulos, K Psounis, C S Raghavendra.
    Efficient Routing in Intermittently Connected Mobile Networks: The Multiple-copy Case. IEEE/ACM Transactions on Networking, 2008
    81
  23. S Ganeriwal, L K Balzano, M B Srivastava.
    Reputation-based framework for high integrity sensor networks. ACM Trans. Sen. Netw, 2008
    80
  24. A MU’ALEM, N NISAN.
    Truthful approximation mechanisms for restricted combinatorial auctions. Games and Economics Behavior, 2008
    79
  25. H Jegou, M Douze, C Schmid.
    Hamming embedding and weak geometric consistency for large scale image search. Computer Vision–ECCV, 2008
    78
  26. P Haslum, H Geffner.
    Heuristic planning with time and resources. in: Proceedings 6th European Conference on Planning (ECP-01, 2008
    75
  27. T Fiebig, S Helmer, C Kanne, G Moerkotte, J Neumann, R Schiele, Westmann.
    T.: Anatomy of a native XML base management system. 2002) Wide Web, 2008
    73
  28. R Snow, B O’Connor, D Jurafsky, A Y Ng.
    Cheap and fast— but is it good?: evaluating non-expert annotations for natural language tasks. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP-2008, 2008
    73
  29. Roy Tromble, Shankar Kumar, Franz Och, Wolfgang Macherey.
    Lattice minimum-Bayes-risk decoding for statistical machine translation. In EMNLP, 2008
    72
  30. D S Lun, M Médard, R Koetter, M Effros.
    BOn coding for reliable communication over packet networks. Phys. Commun, 2008
    72
  31. M Flatt.
    PLT MzScheme: Language Manual. 2008
    71
  32. M Al-Fares, A Loukissas, A Vahdat.
    A scalable, commodity data center network architecture. In SIGCOMM, 2008
    70
  33. Ingo Steinwart, Andreas Christmann.
    Support Vector Machines. 2008
    68
  34. M F Duarte, M A Davenport, D Takhar, J N Laska, T Sun, K F Kelly, R G Baraniuk.
    Single-pixel imaging via compressive sampling. IEEE Signal Processing Magazine, 2008
    68
  35. A Cohen, W Dahmen, R DeVore.
    Compressed Sensing and Best k-term Approximation. Journal of the American Mathematical Society, 2008
    68
  36. O Boiman, E Shechtman, M Irani.
    In defense of nearest-neighbor based image classification. In Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on, 2008
    67
  37. A Narayanan, V Shmatikov.
    Robust de-anonymization of large sparse datasets. In IEEE Symposium on Security and Privacy, 2008
    65
  38. A Berndt, R Douglas, D Duffie, M Ferguson, D Schranz.
    Measuring default risk premia from default swap rates and EDFs. 2008
    65
  39. L El Ghaoui O Banerjee, A d’Aspremont.
    Model selection through sparse maximum likelihood estimation for multivariate gaussian or binary data. Journal of Machine Learning Research, 2008
    63
  40. H van Ditmarsch, W van der Hoek, B Kooi.
    Dynamic Epistemic Logic. 2008
    62
  41. J Shotton, M Johnson, R Cipolla.
    Semantic Texton Forests for Image Categorization and Segmentation. In CVPR, 2008
    62
  42. J Philbin, O Chum, M Isard, J Sivic, A Zisserman.
    Lost in quantization: Improving particular object retrieval in large scale image databases. In Proc. CVPR, 2008
    61
  43. Ran Canetti, Oded Goldreich, Shafi Goldwasser, Silvio Micali.
    Resettable zero-knowledge. In Proc. 32th STOC, 2008
    61
  44. L Shen, J Xu, R Weischedel.
    A new string-to-dependency machine translation algorithm with a target dependency language model. Proceedings of ACL-08: HLT, 2008
    59
  45. D Nurmi, R Wolski, C Grzegorczyk, G Obertelli, S Soman, L Youseff, D Zagorodnov.
    The eucalyptus open-source cloud-computing system. In Proceedings of Cloud Computing and Its Applications, 2008
    59
  46. L Meier, S V D Geer, P Bhlmann.
    The group lasso for logistic regression. Journal of the Royal Statistical Society: Series B, 2008
    59
  47. R Barzilay, M Lapata.
    Modeling local coherence: An entity-based approach. Comput. Linguist, 2008
    59
  48. H Yu, M Kaminsky, P B Gibbons, A Flaxman.
    SybilLimit: A NearOptimal Social Network Defense against Sybil Attacks. In IEEE Symposium on Security and Privacy, 2008
    58
  49. A Czumaj, W Rytter.
    Broadcasting algorithms in radio networks with unknown topology. Proc. 44th Ann. Symp. on Foundations of Computer Science, (FOCS’2003), 492501. © 2008 ACADEMY PUBLISHER JOURNAL OF NETWORKS, VOL, 2008
    58
  50. M Belkin, P Niyogi.
    Towards a theoretical foundation for laplacian based manifold methods. J. Comput. System Sci, 2008
    55
  51. B Aydemir, A Charguéraud, B C Pierce, R Pollack, S Weirich.
    Engineering Formal Metatheory. In Proceedings of the 35th Annual ACM SIGPLAN-SIGACT Symposium on Principles on Programming Languages, 2008
    55
  52. N Torp-Smith, L Birkedal, J C Reynolds.
    Local reasoning about a copying garbage collector. ACM Transactions on Programming Lamguages and Systems, 2008
    55
  53. C Dwork.
    Differential privacy: a survey of results. in Proc. of 5th international conference on Theory and applications of models of computation (TAMC’08, 2008
    54
  54. C Kanich, C Kreibich, K Levchenko, B Enright, G Voelker, V Paxson, S Savage.
    Spamalytics: An empirical analysis of spam marketing conversion. In Proc. ACM CCS‘08, 2008
    54
  55. K Zee, V Kuncak, M C Rinard.
    Full functional verification of linked data structures. In Programming Language Design and Implementation, 2008
    53
  56. M Zaharia, A Konwinski, A D Joseph, R H Katz, I Stoica.
    Improving mapreduce performance in heterogeneous environments. In OSDI, 2008
    53
  57. N Craswell, O Zoeter, M Taylor, B Ramsey.
    An experimental comparison of click position-bias models. Proceedings of 1st ACM Conference on Web Search and Web Data Mining, 2008
    53
  58. CAO MINH, C CHUNG, J KOZYRAKIS, C, K OLUKOTUN.
    STAMP: Stanford transactional applications for multi-processing. In IISWC, 2008
    53
  59. A Argyriou, T Evgeniou, M Pontil.
    Convex multi-task feature learning. Machine Learning, 2008
    53
  60. H-J Boehm, S V Adve.
    Foundations of the C++ concurrency memory model. In Proc. PLDI, 2008
    52
  61. A Saxena, J Driemeyer, A Y Ng.
    Robotic grasping of novel objects using vision. The International Journal of Robotics Research, 2008
    52
  62. P Hui, J Crowcroft, E Yoneki.
    Bubble rap: social-based forwarding in delay tolerant networks. in Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc, 2008
    52
  63. J Zhao, G Cao.
    VADD: Vehicle-Assisted Data Delivery in Vehicular Ad hoc Networks. IEEE Transactions on Vehicular Technology, 2008
    52
  64. K Bowyer, K Hollingsworth, P Flinn.
    Image understanding for iris biometrics: A survey. Computer Vision and Image Understanding, 110(2):281 – 307, 2008
    52
  65. M Abadi, A Birrell, T Harris, M Isard.
    Semantics of transactional memory and automatic mutual exclusion. In ACM SIGPLANSIGACT Symposium on Principles of Programming Languages, 2008
    51
  66. N Agrawal, V Prabhakaran, T Wobber, J D Davis, M S Manasse, R Panigrahy.
    Design tradeoffs for SSD performance. In USENIX, 2008
    51
  67. J MAIRAL, M ELAD, G SAPIRO.
    Sparse representation for color image restoration. IEEE Trans. Image Process, 2008
    51
  68. B Krishnamurthy, P Gill, M Arlitt.
    A few chirps about twitter. In Proceedings of the First Workshop on Online Social Networks, 2008
    51
  69. T Crouch, R Riezler, S Dalrymple, M, R Kaplan.
    The PARC 700 Dependency Bank. In Proceedings of the 4th International Workshop on Linguistically Interpreted Corpora, 2008
    51
  70. L Bottou, O Bousquet.
    The trade-offs of large scale learning. In Proc. Neural Info. Proc. Systems, 2008
    50
  71. R H Baayen, D J Davidson, D M Bates.
    Mixed-effects modeling with crossed random effects for subjects and items. Res Journal of Memory and Language, 2008
    49
  72. Hongseok Yang, Oukseh Lee, Josh Berdine, Cristiano Calcagno, Byron Cook, Dino Distefano, Peter W O’Hearn.
    Scalable shape analysis for systems code. In CAV, 2008
    49
  73. P Liang, D Klein, M I Jordan.
    Agreementbased learning. Proc. of NIPS, 2008
    49
  74. B Aronov, S Har-Peled.
    On Approximating the Depth and Related Problems. SIAM Journal on Computing, 2008
    49
  75. James Henderson, Oliver Lemon, Kallirroi Georgila.
    Hybrid Reinforcement/Supervised Learning of dialogue policies from fixed datasets. Computational Linguistics, 2008
    48
  76. G Gu, R Perdisci, J Zhang, W Lee.
    BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In Proceedings of the 17th USENIX Security Symposium (Security’08, 2008
    48
  77. N Provos, P Mavrommatis, M Rajab, F Monrose.
    All your iFrames point to us. In Proc. USENIX Security‘08, 2008
    48
  78. J M MCCUNE, B J PARNO, A PERRIG, M K REITER, H ISOZAKI.
    Flicker: an execution infrastructure for tcb minimization. SIGOPS Oper. Syst. Rev, 2008
    47
  79. Y Huang, T Z J Fu, D M Chiu, J C S Liu, C Huang.
    Challenges, Design and Analysis of a Large-scale P2P-VoD System. In Proc. of ACM SIGCOMM’08, 2008
    47
  80. M Sabou, M d’Aquin, Motta.
    E.: Exploring the semantic web as background knowledge for ontology matching. Journal of Data Semantics, 2008
    47
  81. E Agichtein, C Castillo, D Donato, A Gionis, G Mishne.
    Finding high-quality content in social media. In WSDM, 2008
    47
  82. E Miluzzo, N D Lane, K Fodor, R Peterson, H Lu, M Musolesi, S B Eisenman, X Zheng, A T Campbell.
    Sensing meets mobile social networks: the design, implementation and evaluation of the cenceme application. In ACM SenSys, 2008
    47
  83. C Peikert, B Waters.
    Lossy trapdoor functions and their applications. In Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008
    47
  84. S Gaonkar, J Li, R R Choudhury, L Cox, A Schmidt.
    Micro-blog: sharing and querying content through mobile phones and social participation. In ACM MobiSys, 2008
    46
  85. G Ramalingam, J Field, F Tip.
    Aggregate structure identification and its application to program analysis. InProceedingsofthe26thACMSIGPLAN-SIGACTsymposiumon PrinciplesofProgramming Languages, 1999. T. Reps, 2008
    46
  86. Yehuda Koren.
    Factorization meets the neighborhood: a multifaceted collaborative filtering model. ACM Int. Conference on Knowledge Discovery and Data Mining (KDD’08, 2008
    46
  87. M Musuvathi, S Qadeer, T Ball, G Basler, P A Nainar, I Neamtiu.
    Finding and reproducing heisenbugs in concurrent programs. Operating System Design and Implementation (OSDI, 2008
    45
  88. T Holz, M Steiner, F Dahl, E Biersack, F Freiling.
    Measurements and mitigation of peer-to-peer-based botnets: a case study on Storm Worm. In LEET’08: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, 2008
    45
  89. J Heath, M Kwiatkowska, G Norman, D Parker, O Tymchyshyn.
    Probabilistic model checking of complex biological pathways. Theoretical Computer Science (Special Issue on Converging Sciences: Informatics and Biology, 2008
    45
  90. J Leskovec, K J Lang, A Dasgupta, M W Mahoney.
    Statistical properties of community structure in large social and information networks. In WWW, 2008
    45
  91. C Kim, M Caesar, J Rexford.
    Floodless in SEATTLE: a scalable ethernet architecture for large enterprises. In SIGCOMM, 2008
    45
  92. J Yin, T ElBatt, G Yeung, B Ryu, S Habermas, H Krishnan, T Talty.
    Performance evaluation of safety applications over dsrc vehicular ad hoc networks. in VANET ’04: Proceedings of the 1st ACM International Workshop on, 2008
    44