Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. Yee Whye Teh.
    Dirichlet processes. In Encyclopedia of Machine Learning, 2010
  2. E J Elton, M J Gruber, D Agrawal D.
    C.Mann (2001) Explaining the rate spread on corporate bonds. ECB Working Paper Series No 1271 December 2010 45, 2010
  3. G Shakhnarovich, P Viola, T Darrell.
    Fast Pose Estimation With Parameter-Sensitive Hashing. in International Conference on Computer Vision, 2010
  4. E G Birgin, J Martinez, M Raydan.
    Nonmonotone spectral projected gradient methods on convex sets. Siam J. Optim, 2010
  5. Haewoon Kwak, Changhyun Lee, Hosung Park, Sue Moon.
    What is Twitter, A Social Network or a News Media. In Proc. of the 19th Int’l Conference on World Wide Web (WWW, 2010
  6. Lars E O Svensson.
    Inflation Targeting. Handbook of Monetary Economics. Volume 3B, 2010
  7. Michal Kapalka.
    Theory of Transactional Memory. 2010
  8. M Greenwald, S Khanna.
    Power conserving computation of order-statistics over sensor networks. In Proc. ACM Symposium on Principles of Database Systems, 2010
  9. Andreas Rossberg, Claudio V Russo, Derek Dreyer.
    F-ing modules. In Proceedings of the 5th ACM SIGPLAN workshop on Types in language design and implementation, TLDI ’10. ACM, 2010
  10. Andrew Carlson, Justin Betteridge, Richard C Wang, Estevam R Hruschka, Tom M Mitchell.
    Coupled semi-supervised learning for information extraction. In Proceedings of the third ACM international conference on Web search and data mining, WSDM ’10, 2010
  11. D Malkhi, M K Reiter.
    Secure Execution of Java Applets Using a Remote Playground. IEEE Trans. Softw. Eng, 2010
  12. Benjamin Keys, Tanmoy Mukherjee, Amit Seru, Vikrant Vig.
    Did Securitization Lead to Lax Screening? Evidence from Subprime Loans.” Quarterly. Journal of Economics 125, 2010
  13. R Mateescu, K Kask, V Gogate, R Dechter.
    Iterative join-graph propagation. 2010
  14. Chaitanya Desai, Deva Ramanan, Charles Fowlkes.
    Discriminative models for multi-class object layout. In Proceedings of International Conference on Computer Vision (ICCV, 2010
  15. T Andersen, T Bollerslev, F X Diebold.
    Parametric and nonparametric volatility measurement. In Yacine Aït-Sahalia and Lars P. Hansen, editors, Handbook of Financial Econometrics, 2010
  16. M Brown, G Hua, S Winder.
    Discriminative Learning of Local Image Descriptors. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010
  17. M Everingham, L Van Gool, C K I Williams, J Winn, A Zisserman.
    The pascal visual object classes (voc) challenge,” Int. J. of Comp. Vis, 2010
  18. Christina D Romer, David H Romer.
    The Macroeconomic Effects of Tax Changes: Estimates Based on a New Measure. of Fiscal Shocks,” American Economic Review, 2010
  19. Avrim Blum, Eyal Even-Dar, Katrina Ligett.
    Routing without regret: On convergence to nash equilibria of regret-minimizing algorithms in routing games. Theory of Computing, 2010
  20. Ankur Agarwal, Bill Triggs.
    Hyperfeatures multilevel local coding for visual recognition. In European Conference on Computer Vision, 2006. 8 Y-Lan Boureau, Francis Bach, Yann LeCun, and, 2010
  21. E M Maximilien.
    Assessing Test-Driven Development at IBM. In In Proceedings of the 25th International Conference on Software Engineering (ICSE-03. Pp. 564–569. IEEE Computer Society, 2003. Oracle. Javadoc Tool. 2010. PyPI. Python Package Index, 2010
  22. M Cha, H Haddadi, F Benevenuto, K P Gummadi.
    Measuring user influence in Twitter: the million follower fallacy. In Proc. AAAI Conf. on Weblogs and Social, 2010
  23. A Barker, S Brenner, E-H Park, L-Y Sung.
    Two-level additive Schwarz preconditioners for a weakly over-penalized symmetric interior penalty method. Journal of Scientific Computing, 2010
  24. Z Tu, X Bai.
    Auto-context and Its Application to High-Level Vision Tasks and 3D Brain Image Segmentation. IEEE Trans. Pattern Anal. Mach. Intell, 2010
  25. Takeshi Sakaki, Makoto Okazaki, Yutaka Matsuo.
    Earthquake Shakes Twitter Users: RealTime Event Detection by Social Sensors. In Proc. of the 19th Int’l Conference on World Wide Web (WWW, 2010
  26. J Euzénat, A Ferrara, C Meilicke, A Nikolov, J Pane, F Scharffe, P Shvaiko, H Stuckenschmidt.
    Results of the ontology alignment evaluation initiative 2010. In Proc. OM, 2010
  27. H W Meuer, E Strohmaier, J J Dongarra, H D Simon.
    Top500 supercomputing sites. 2010
  28. T Condie, N Conway, P Alvaro, J Hellerstein, K Elmeleegy, R Sears.
    Mapreduce online. In NSDI Conference, 2010
  29. Gideon S Mann, Andrew McCallum.
    Generalized expectation criteria for semi-supervised learning with weakly labeled data. Journal of Machine Learning Research, 11:955–984. Yishay Mansour, Mehryar Mohri, and Afshin Rostamizadeh, 2010
  30. J J Hox.
    Multilevel Analysis. Techniques and Applications, 2010
  31. D Walton, C Reed, Macagno.
    F.: Argumentation Schemes. 2010
  32. T Berg-Kirkpatrick, A Bouchard-Côté, J DeNero, D Klein.
    Painless unsupervised learning with features. In Conference of the North American Chapter of the Association for Computational Linguistisc (NAACL, 2010
  33. Kuzman Ganchev, Joao Graca, Jennifer Gillenwater, Ben Taskar.
    Posterior regularization for structured latent variable models. Journal of Machine Learning Research (JMLR, 2010
  34. U Doraszelksi, M Satterthwaite.
    Computable markov-perfect industry dynamics. RAND Journal of Economics, 2010
  35. A Carlson, J Betteridge, B Kisiel, B Settles, E H, T Mitchell.
    Toward an architecture for never-ending language learning. In Proceedings of the Conference on Artificial Intelligence (AAAI, 2010
  36. “Vertical.
    Relationships and Competition in Retail Gasoline Markets: Empirical Evidence from Contract Changes. in Southern California: Reply,” American Economic Review, 2010
  37. B F Cooper, A Silberstein, E Tam, R Ramakrishnan, R Sears.
    Benchmarking cloud serving systems with YCSB. In SoCC, 2010
  38. Jens Kober, Jan Peters.
    Policy search for motor primitives in robotics. Machine Learning, 2010
  39. H Leontyev, J Anderson.
    Generalized tardiness bounds for global multiprocessor scheduling. Real-Time Sys, 2010
  40. D Needell, R Vershynin.
    Signal recovery from incomplete and inaccurate measurements via regularized orthogonal matching pursuit. IEEE Journal of Selected Topics in Signal Processing, 2010
  41. K R M Leino.
    Dafny: An automatic program verifier for functional correctness. In LPAR16, volume 6355 of LNAI, 2010
  42. Chris Ding, Tao Li, Michael I Jordan.
    Convex and SemiNonnegative Matrix Factorizations. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010
  43. P Wang, S Sparks, Cliff C Zou.
    An Advanced Hybrid Peer-to-Peer Botnet. IEEE, 2010
  44. Tom Bergan, Owen Anderson, Joseph Devietti, Luis Ceze, Dan Grossman.
    Coredet: a compiler and runtime system for deterministic multithreaded execution. In ASPLOS ’10, 2010
  45. Andrej Bogdanov, Emanuele Viola.
    Pseudorandom bits for polynomials. SIAM J. on Computing, 2010
  46. A G Dimakis, P B Godfrey, Y Wu, M J Wainwright, K Ramachandran.
    Network coding for distributed storage systems. IEEE Transactions on Information Theory, 2010
  47. J Heer, M Bostock.
    Crowdsourcing graphical perception: using Mechanical Turk to assess visualization design. in Proc. Conf. on Human Factors in Computing Systems, 2010
  48. W Mason, D J Watts.
    Financial incentives and the performance of crowds. SIGKDD Explorations, 2010
  49. R Wein, E Fogel, B Zukerman, D Halperin.
    2D arrangements. In Cgal Editorial Board, editor, Cgal User and Reference Manual. 3.6 edition, 2010
  50. Jonathan Katz, Ji Sun Shin, Adam Smith.
    Parallel and concurrent security of the HB and HB+ protocols. Journal of Cryptology, 2010
  51. M Al-Fares, S Radhakrishnan, B Raghavan, N Huang, A Vahdat.
    Hedera: Dynamic Flow Scheduling for Data Center Networks. In NSDI, 2010
  52. Refet S Gürkaynak, Andrew T Levin, Eric T Swanson.
    Does Inflation Targeting Anchor Long-Run Inflation Expectations? Evidence from Long-Term Bond. Yields in the U.S., U.K. and Sweden.” Journal of the European Economic Association, forthcoming, 2010
  53. Alan Ritter, Mausam, Oren Etzioni.
    A latent dirichlet allocation method for selectional preferences. In Proceedings of the 48rd Annual Meeting of the Association for Computational Linguistics (ACL, 2010
  54. J R Hershey, S J Rennie, P A Olsen.
    Super-human multi-talker speech recognition: A graphical modeling approach. Comput. Speech. Lang, 2010
  55. S Srivastava, S Gulwani, J Foster.
    From program verification to program synthesis. In POPL, 2010
  56. Brendan O’Connor, Ramnath Balasubramanyan, Bryan R Routledge, Noah A Smith.
    From tweets to polls: Linking text sentiment to public opinion time series. In Proceedings of the International AAAI Conference on Weblogs and Social, 2010
  57. M Gomez-Rodriguez, J Leskovec, A Krause.
    Inferring networks of diffusion and influence. In Proc. Knowledge Discovery and Data Mining (KDD, 2010
  58. Bangpeng Yao, Li Fei-Fei.
    Modeling mutual context of object and human pose in human-object interaction activities. In Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR, 2010
  59. L Caires, H T Vieira.
    Conversation types. Theor. Comput. Sci, 2010
  60. J Mairal, F Bach, J Ponce, G Sapiro.
    Online learning for matrix factorization and sparse coding. Journal of Machine Learning Research, 2010
  61. Campbell R Harvey, Merrill Liechty, John Liechty, Peter Müller.
    Portfolio selection with higher moments, Quantitative Finance 10. 2010
  62. C Andrieu, A Doucet, R Holenstein.
    Particle Markov chain Monte Carlo methods’ (with discussion. Journal Royal Statistical Society B, 2010
  63. G Venkatesh, J Sampson, N Goulding, S Garcia, V Bryksin, J LugoMartinez, S Swanson, M B Taylor.
    Conservation cores: reducing the energy of mature computations. in Proceedings of the fifteenth edition of ASPLOS on Architectural, 2010
  64. S Faust, E Kiltz, K Pietrzak, Rothblum.
    G.N.: Leakage-resilient signatures. In: TCC, 2010
  65. S Kim, E P Xing.
    Tree-guided group lasso for multi-task regression with structured sparsity. In Proceedings of 27th International Conference on Machine Learning, 2010
  66. L Meyerovich, B Livshits.
    ConScript: Specifying and enforcing finegrained security policies for JavaScript in the browser. In IEEE Symposium on Security and Privacy, 2010
  67. A M Bronstein, M M Bronstein, R Kimmel, M Mahmoudi, G Sapiro.
    A Gromov-Hausdorff framework with diffusion geometry for topologically-robust non-rigid shape matching. International Journal of Computer Vision, 2010
  68. Peter D Turney, Patrick Pantel.
    From frequency to meaning: Vector space models of semantics. Journal of Artificial Intelligence Research, 2010
  69. X Tan, B Triggs.
    Enhanced local texture feature sets for face recognition under difficult lighting conditions. IEEE Transactions on Image Processing, 2010
  70. T Koo, A M Rush, M Collins, T Jaakkola, D Sontag.
    Dual decomposition for parsing with non-projective head automata. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP-2010, 2010
  71. M Zaharia, D Borthakur, J Sen Sarma, K Elmeleegy, S Shenker, I Stoica.
    Delay scheduling: a simple technique for achieving locality and fairness in cluster scheduling. In EuroSys, 2010
  72. N Hopper, E Y Vasserman, E Chan-Tin.
    How much anonymity does network latency leak. ACM Transactions on Information and System Security, 2010
  73. S Shoham.
    A game-based framework for CTL counter-examples and 3-valued abstraction-refinement, in: CAV 03. Proceedings of the 15th Conference on Computer Aided Verification, Lecture Notes in Computer Science, 2010
  74. S Dercon, L Christiaensen.
    Consumption Risk, Technology Adoption, and Poverty Traps: Evidence from Ethiopia. Journal of Development Economics (Article in, 2010
  75. Rosario Gennaro, Craig Gentry, Bryan Parno.
    Non-interactive verifiable computing: Outsourcing computation to untrusted workers. of Lecture Notes in Computer Science, 2010
  76. D Baron, S Sarvotham, R G Baraniuk.
    Bayesian compressive sensing via belief propagation. IEEE Trans. Signal Process, 2010
  77. Alan Ritter, Colin Cherry, Bill Dolan.
    Unsupervised modeling of twitter conversations. In Proceedings of HLT-NAACL 2010, 2010
  78. Shahar Dobzinski, Ron Lavi, Noam Nisan.
    Multi-unit auctions with budget limits. 2010
  79. P Schneider-Kamp, J Giesl, T Ströder, A Serebrenik, R Thiemann.
    Automated termination analysis for logic programs with cut. In ICLP ’10, Theory and Practice of Logic Programming, 2010
  80. E Tola, V Lepetit, P Fua.
    Daisy: an Efficient Dense Descriptor Applied to Wide Baseline Stereo. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010
  81. V I Spitkovsky, H Alshawi, D Jurafsky.
    From Baby Steps to Leapfrog: How “Less is More” in unsupervised dependency parsing. In Proc. of NAACL-HLT, 2010
  82. S Greenland, J Pearl, J.
    Causal diagrams. International Encyclopedia of Statistical Sciences, 2010
  83. B M Bibby, M Jacobsen, M Sørensen.
    Estimating functions for discretely sampled diffusion-type models. Handbook of Financial Econometrics, 2010
  84. J Heathcote, K Storesletten, G L Violante.
    The macroeconomic implications of rising wage inequality in the united states. Journal of Political Economy, 2010
  85. M F Balcan, A Blum, A Gupta.
    Approximate clustering without the approximation. In Proc. of FOCS, 2010
  86. H Jégou, M Douze, C Schmid.
    Improving Bag-Of-Features for Large Scale Image Search. International Journal of Computer Vision, 2010
  87. D Erhan, A Courville, Y Bengio, P Vincent.
    Why does unsupervised pre-training help deep learning. in Proceedings of AISTATS 2010, 2010
  88. M Naaman, J Boase, C H Lai.
    Is it really about me?: message content in social awareness streams. Proc.CHI2010, 2010
  89. C Dyer, A Lopez, J Ganitkevitch, J Weese, F Ture.
    cdec: A decoder, alignment, and learning framework for finite-state and context-free translation models. In ACL System Demonstrations, 2010
  90. Patrick Hunt, Mahadev Konar, Flavio P Junqueira, Benjamin Reed.
    ZooKeeper: Wait-free coordination for Internetscale systems. In Proceedings of the 2010 USENIX Annual Technical Conference (ATC ’10, 2010
  91. Adam Barth, Adrienne Porter Felt, Prateek Saxena, Aaron Boodman.
    Protecting browsers from extension vulnerabilities. In Proceedings of the 17th Network and Distributed System Security Symposium (NDSS 2010, 2010