Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. E R Gansner, S C North.
    An open graph visualization system and its applications to software engineering. 2010/7/30 Florian Haftmann. Code Generation from Specifications in Higher-Order Logic. PhD thesis, 2009
    238
  2. A Oppenheim, R Schafer.
    Discrete-Time Signal Processing. Series in Signal Processing. Springer-Verlag, 2009
    213
  3. Frühwirth.
    T.W.: Constraint Handling Rules. 2009
    162
  4. Flajolet, R Sedgewick.
    Analytic Combinatorics. Handbook of Combinatorics, 2009
    154
  5. C Daskalakis, P W Goldberg, C H Papadimitriou.
    The complexity of computing a Nash equilibrium. SIAM J. Comput, 2009
    139
  6. Ewa Deelman, Gurmeet Singh, Mei-Hui Su, James Blythe, Yolanda Gil, Carl Kesselman, Gaurang Mehta, Karan Vahi, G Bruce Berriman, John Good, Anastasia Laity, Joseph C Jacob, Daniel S Katz.
    Pegasus: A framework for mapping complex scientific workflows onto distributed systems. Sci. Program., 13(3):219–237, 2005. 2009] Ding Ding, Siwei, 2009
    132
  7. M Armbrust, A Fox, R Griffith, A D Joseph, R H Katz, A Konwinski, G Lee, D A Patterson, A Rabkin, I Stoica, M Zaharia.
    Above the clouds: A Berkeley view of cloud computing. 2009
    122
  8. P F Felzenszwalb, R B Girshick, D McAllester, D Ramanan.
    Object detection with discriminatively trained part based models. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2009
    104
  9. C Bizer, T Heath, T Berners-Lee.
    Linked Data - The Story So Far. Int. J. Semantic Web Inf. Syst, 2009
    96
  10. F Alizadeh, D Goldfarb.
    Second-order cone programming. Math. Program, 2009
    85
  11. Jonathan Katz, Rafail Ostrovsky, Moti Yung.
    Efficient password-authenticated key exchange using human-memorable passwords. of Lecture Notes in Computer Science, 2009
    74
  12. R Burkard.
    Assignment Problems. Philadelphia: SIAM, Society for Industrial and Applied Mathematics, 2009
    70
  13. J Deng, W Dong, R Socher, L-J Li, K Li, L Fei-Fei.
    ImageNet: A Large-Scale Hierarchical Image Database. in IEEE Conf. on Computer Vision and Pattern Recognition (CVPR, 2009
    69
  14. G Boella, L W N van der Torre.
    Regulative and constitutive norms in normative multiagent systems. In Proc. of KR, 2009
    67
  15. O Gnawali, R Fonseca, K Jamieson, D Moss, P Levis.
    Collection tree protocol. In Proc. 7th ACM Conf. Embedded Networked Sensor Systems (SenSys ’09, 2009
    63
  16. P Dung, R Kowalski, Toni.
    F.: Assumption-based argumentation. Argumentation in AI, 2009
    62
  17. P J Bickel, Y Ritov, A Tsybakov.
    Simultaneous analysis of lasso and the Dantzig selector, Ann. Statist, 2009
    62
  18. S Chong, J Liu, A C Myers, X Qi, K Vikram, L Zheng, X Zheng.
    Secure web applications via automatic partitioning. 2009
    61
  19. T Blumensath, M E Davies.
    Iterative hard thresholding for compressed sensing. Applied and Computational Harmonic Analysis, 2009
    60
  20. F Mérillon, L Réveillère, C Consel, R Marlet, G Muller.
    Devil: An IDL for Hardware Programming. 2009
    60
  21. A G Greenwald, T A Poehlman, E Uhlmann, M R Banaji.
    Measuring and using the Implicit Association Test: III. Meta-analysis of predictive validity. Journal of Personality and Social Psychology, 2009
    60
  22. A J Halderman, S D Schoen, N Heninger, W Clarkson, W Paul, J A Calandrino, A J Feldman, J Appelbaum, E W Felten.
    Lest we remember: cold-boot attacks on encryption keys,” Commun. 2009
    60
  23. T Bosse, C M Jonker, L van der Meij, A Sharpanskykh, J Treur.
    Specification and Verification of Dynamics in Cognitive Agent Models. International Journal of Cooperative Information Systems, 2009
    58
  24. J Pérez, M Arenas, Gutierrez.
    C.: Semantics and Complexity of SPARQL. ACM Trans. Database Syst, 2009
    58
  25. A Stepanov, McJones.
    P.: Elements of Programming. 2009
    56
  26. Danilo Giampiccolo, Hoa Trang Dang, Bernardo Magnini, Ido Dagan, Bill Dolan.
    The Fourth PASCAL Recognizing Textual Entailment Challenge. In Proceedings of TAC 2008 Workshop, 2009
    55
  27. A Pavlo, E Paulson, A Rasin, D J Abadi, D J DeWitt, S Madden, M Stonebraker.
    A comparison of approaches to large-scale data analysis. In SIGMOD Conference, 2009
    53
  28. S Wright, R Nowak, M Figueiredo.
    Sparse reconstruction by separable approximation. IEEE Trans. Sig. Proc, 2009
    52
  29. V Chandola, A Banerjee, V Kumar.
    Anomaly detection: A survey. ACM Computing Surveys, 2009
    50
  30. A Narayanan, V Shmatikov.
    De-anonymizing social networks. In IEEE Symp. Security and Privacy, 2009
    48
  31. Gerwin Klein, Kevin Elphinstone, Gernot Heiser, June Andronick, David Cock, Philip Derrin, Dhammika Elkaduwe, Kai Engelhardt, Rafal Kolanski, Michael Norrish, Thomas Sewell, Harvey Tuch, Simon Winwood.
    sel4: Formal verification of an os kernel. In Proceedings of the 22nd ACM Symposium on Operating Systems Principles (SOSP, 2009
    47
  32. E J Candès, T Tao.
    The power of convex relaxation: Near-optimal matrix completion. IEEE Transactions on Information Theory, 2009
    45
  33. N Kumar, A C Berg, P N Belhumeur, S K Nayar.
    Attribute and simile classifiers for face verification. In ICCV’09, Kyoto, Japan, Sept.29 - Oct.2, 2009
    44
  34. E Cohen, M Dahlweid, M A Hillebrand, D Leinenbach, M Moskal, T Santen, W Schulte, S Tobies.
    VCC: A practical system for verifying concurrent C. In TPHOLs 2009, volume 5674 of LNCS, 2009
    44
  35. C Lampert, H Nickisch, S Harmeling.
    Learning to detect unseen object classes by between-class attribute transfer. in IEEE Conf. on Computer Vision and Pattern Recognition (CVPR, 2009
    44
  36. S J Pan, Q Yang.
    A survey on transfer learning. IEEE Transactions on Knowledge and Data Engineering, 2009
    43
  37. K Jarrett, K Kavukcuoglu, M Ranzato, Y LeCun.
    What is the best multi-stage architecture for object recognition. in Proc. International Conference on Computer Vision (ICCV’09). IEEE, 2009
    43
  38. David G Andersen, Jason Franklin, Michael Kaminsky, Amar Phanishayee, Lawrence Tan, Vijay Vasudevan.
    Fawn: a fast array of wimpy nodes. In SOSP ’09: Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, 2009
    42
  39. B Butler, L Sproull, S Kiesler, R Kraut.
    2002) “Community effort in online groups: Who does the work and why. Leadership at a Distance. Mahwah, NJ: Erlbaum. opensource.mit.edu/papers/butler.pdf (March 21, 2009
    42
  40. B D Argall, S Chernova, M Veloso, B Browning.
    A Survey of Robot Learning from Demonstration. Robotics and Automation Systems, 2009
    42
  41. Luis M Vaquero, Luis Rodero‐Merino, Juan Caceres, Maik Lindner.
    A Break in the Clouds: Towards a Cloud Definition. ACM SIGCOMM Computer Communication Review, 2009
    42
  42. C Baral, M Gelfond, Rushton.
    N.: Probabilistic reasoning with answer sets. TPLP, 2009
    42
  43. J Sneyers, T Schrijvers, Demoen.
    B.: The computational power and complexity of constraint handling rules. ACM Transactions on Programming Languages and Systems (TOPLAS, 2009
    42
  44. C Flanagan, S N Freund.
    FastTrack: Efficient and Precise Dynamic Race Detection. In PLDI, 2009
    41
  45. C Calcagno, D Distefano, P O’Hearn, H Yang.
    Compositional Shape Analysis by Means of Bi-Abduction. In POPL, 2009
    40
  46. O Arandjelović, G Shakhnarovich, J Fisher, R Cipolla, T Darrell.
    Face recognition with image sets using manifold density divergence, in. Proc. IEEE Conference on Computer Vision and Pattern Recognition (CVPR, 2009
    40
  47. M L Weitzman.
    On Modeling and Interpreting the Economics of Catastrophic Climate Change. The Review of Economics and Statistics, 2009
    40
  48. T Bosse, C Jonker, L v d Meij, A Sharpanskykh, J Treur.
    Specification and verification of dynamics in agent models. International Journal of Cooperative Information Systems, 2009
    40
  49. A Artale, D Calvanese, R Kontchakov, M Zakharyaschev.
    The DL-Lite family and relations. J. Artificial Intelligence Research (JAIR, 2009
    40
  50. M K Brunnermeier.
    Deciphering the Liquidity and Credit Crunch 2007-08. Journal of Economic Perspectives, 2009
    40
  51. M Drmota.
    Random trees. 2009
    39
  52. D Crandall, L Backstrom, D Huttenlocher, J Kleinberg.
    Mapping the world’s photos. In Proc. 18th International World Wide Web Conference, 2009
    39
  53. B YEE, D SEHR, G DARDYK, B CHEN, R MUTH, T ORMANDY, S OKASAKA, N NARULA, N FULLAGAR.
    Native Client: A Sandbox for Portable, Untrusted x86 Native Code. In IEEE Symposium on Security and Privacy, 2009
    39
  54. Andrea Vedaldi, V Gulshan, M Varma, Andrew Zisserman.
    Multiple kernels for object detection. In Proceedings of International Conference on Computer Vision (ICCV, 2009
    38
  55. R E Moore, R B Kearfott, M J Cloud.
    Introduction to Interval Analysis. 2009
    38
  56. V Guruswami, C Umans, S Vadhan.
    Unbalanced Expanders and Randomness Extractors from Parvaresh–Vardy Codes. Journal of the ACM, 2009
    38
  57. C Guo, H Wu, K Tan, L Shiy, Y Zhang, S Lu.
    BCube: A high performance, server-centric network architecture for modular data centers. In SIGCOMM, 2009
    38
  58. A Farhadi, I Endres, D Hoiem, D Forsyth.
    Describing objects by their attributes. in IEEE Conf. on Computer Vision and Pattern Recognition (CVPR, 2009
    38
  59. B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, R Kemmerer, C Kruegel, G Vigna.
    Your Botnet is My Botnet: Analysis of a Botnet Takeover. In ACM Conference on Computer and Communications Security (CCS, 2009
    37
  60. R Alur, P Madhusudan.
    Adding nesting structure to words. JACM, 2009
    37
  61. K Fall, K Varadhan.
    The ns Manual (formerly ns Notes and Documentation). The VINT Project A Collaboration between researchers at. UC Berkeley, LBL, USC/ISI, and Xerox PARC, 2009
    37
  62. K Kavukcuoglu, M A Ranzato, R Fergus, Y LeCun.
    Learning invariant features through topographic filter maps. In CVPR, 2009
    37
  63. E Gilbert, K Karahalios.
    Predicting tie strength with social media. In CHI ’09: Proceedings of the 27th international conference on Human factors in computing systems, 2009
    36
  64. Mark Lutz.
    Learning Python. 2009
    36
  65. S Park, S Lu, Y Zhou.
    CTrigger: exposing atomicity violation bugs from their hiding places. In Fourteenth International ConferenceonArchitectureSupportforProgrammingLanguages andOperatingSystems (ASPLOS ’09),pages, 2009
    35
  66. M Zuckerman, A D Procaccia, J S Rosenschein.
    Algorithms for the coalitional manipulation problem. Artificial Intelligence, 2009
    35
  67. Mike Mintz, Steven Bills, Rion Snow, Dan Jurafsky.
    Distant supervision for relation extraction without labeled data. In ACL-IJCNLP 2009, 2009
    35
  68. Francois Portet, Ehud Reiter, Albert Gatt, Jim Hunter, Somayajulu Sripada, Yvonne Freer, Cindy Sykes.
    Automatic generation of textual summaries from neonatal intensive care data. Artificial Intelligence, 2009
    35
  69. C-N J Yu, T Joachims.
    Learning structural SVMs with latent variables. In Proceedings of the 26th Annual International Conference on Machine Learning (ICML-2009, 2009
    34
  70. Greg Hamerly, Erez Perelman, Jeremy Lau, Brad Calder.
    SimPoint 3.0: Faster and More Flexible Program Analysis. In Workshop on Modeling, Benchmarking and Simulation, June 2005. 108 Siva Hari, Manlap Li, Pradeep Ramachandran, and Sarita Adve. Low-cost Hardware, 2009
    34
  71. J Reppy, C Russo, Y Xiao.
    Parallel Concurrent ML. In ICFP ’09, 2009
    34
  72. Amal Ahmed, Derek Dreyer, Andreas Rossberg.
    State-dependent representation independence. In POPL ’09, 2009
    33
  73. M Dobrescu, N Egi, K Argyraki, B-G Chun, K Fall, G Iannaccone, A Knies, M Manesh, S Ratnasamy.
    RouteBricks: Exploiting parallelism to scale software routers. In Proc. of SOSP, 2009
    33
  74. J Liu, J Luo, M Shah.
    Recognizing realistic actions from videos “in the wild. In CVPR, 2009
    33
  75. T Imielinski, J Navas.
    GPS-based addressing and routing. IETF RFC, 2009
    33
  76. B Babenko, M-H Yang, S Belongie.
    Visual tracking with online multiple instance learning. In Proc. Conf. Computer Vision and Pattern Recognition, 2009
    32
  77. A Qureshi, R Weber, H Balakrishnan, J Guttag, B Maggs.
    Cutting the electric bill for Internet-scale systems. in Proc. ACM SIGCOMM, 2009
    32
  78. Y C Eldar, M Mishali.
    Robust recovery of signals from a structured union of subspaces. IEEE Trans. Inform. Theory, 2009
    32
  79. P V Gehler, S Nowozin.
    On feature combination for multiclass object classification. In ICCV, 2009
    32
  80. L Jacob, G Obozinski, J P Vert.
    Group Lasso with overlap and graph Lasso. In Proceedings of the 26th Annual International Conference on Machine Learning, 2009
    32
  81. J Romberg.
    Compressive sensing by random convolution. SIAM Journal on Imaging Sciences, 2009
    31
  82. C Wilson, B Boe, A Sala, K P Puttaswamy, B Y Zhao.
    User interactions in social networks and their implications. In Eurosys, 2009
    31
  83. M K Qureshi, V Srinivasan, J A Rivers.
    Scalable high performance main memory system using phase-change memory technology. In ISCA, 2009
    31
  84. D Weinshall.
    Cognitive authentication schemes safe against spyware (short paper), in: SP’06. Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P’06), 2006, 2009
    31
  85. Adam Kiezun, Vijay Ganesh, Philip J Guo, Pieter Hooimeijer, Michael D Ernst.
    Hampi: A solver for string constraints. In Proc. of 2009 International Symposium on Testing and Analysis (ISSTA’09, 2009
    31
  86. B Settles.
    Active learning literature survey. University of Wisconsin-Madison, 2009
    31