Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. Pedro F Felzenszwalb, Ross B Girshick, David McAllester, Deva Ramanan.
    Object detection with discriminatively trained part based models. 2010
    574
  2. H Kwak, H Park C Lee.
    S.Moon. What is twitter, a social network or a news media. In WWW, 2010
    420
  3. M Everingham, L Van Gool, C K I Williams, J Winn, Zisserman.
    A.: The pascal visual object classes (voc) challenge. Int. J. Comput. Vision, 2010
    260
  4. S Fortunato.
    Community detection in graphs. Physics Reports, 486(3C5):75 – 174, 2010
    249
  5. W Enck, P Gilbert, B-G Chun, L P Cox, J Jung, P McDaniel, A N Sheth.
    Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI’10, 2010
    231
  6. T Sakaki, M Okazaki, Y Matsuo.
    Earthquake shakes twitter users: real-time event detection by social sensors. In Proceedings of the 19th international conference on World wide web, 2010
    211
  7. G Malewicz, M H Austern, A J Bik, J C Dehnert, I Horn, N Leiser, G Czajkowski.
    Pregel: a system for large-scale graph processing. In Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, SIGMOD ’10, 2010
    207
  8. S J PAN, Q YANG.
    A survey on transfer learning. IEEE Transaction on Knowledge Discovery and Data Engineering, 2010
    207
  9. M Cha, H Haddadi, F Benevenuto, P K Gummadi.
    Measuring user influence in twitter: The million follower fallacy. ICWSM, 2010
    177
  10. B F COOPER, A SILBERSTEIN, E TAM, R RAMAKRISHNAN, R SEARS.
    Benchmarking cloud serving systems with ycsb. In Proceedings of the 1st ACM symposium on Cloud computing, 2010
    160
  11. E J Candes, T Tao.
    The power of convex relaxation: near-optimal matrix completion. IEEE Transactions on Information Theory, 2010
    146
  12. Peter D Turney, Patrick Pantel.
    From frequency to meaning: Vector space models of semantics. Journal of artificial intelligence research, 2010
    141
  13. A Lakshman, P Malik.
    Cassandra: a decentralized structured storage system. ACM SIGOPS Operating Systems Review, 2010
    137
  14. M S Bernstein, G Little, R C Miller, B Hartmann, M S Ackerman, D R Karger, D Crowell, K Panovich.
    Soylent: a word processor with a crowd inside. In UIST, 2010
    136
  15. P Arbelaez, M Maire, C Fowlkes, J Malik.
    Contour Detection and Hierarchical Image Segmentation. IEEE Trans. PAMI, 2010
    135
  16. A Carlson, J Betteridge, B Kisiel, B Settles, E R H Jr, T M Mitchell.
    Toward an architecture for never-ending language learning. In AAAI, 2010
    125
  17. M Al-Fares, S Radhakrishnan, B Raghavan, N Huang, A Vahdat.
    Hedera: Dynamic Flow Scheduling for Data Center Networks. In NSDI, 2010
    119
  18. B O’Connor, R Balasubramanyan, B Routledge, N Smith.
    From tweets to polls: Linking text sentiment to public opinion time series. In ICWSM 2010, 2010
    118
  19. J Mairal, F Bach, J Ponce, G Sapiro.
    Online learning for matrix factorization and sparse coding. 2010
    116
  20. D S Lee, T Lemiux.
    Regression Discontinuity Designs in Economics. Journal of Economic Literature, 2010
    115
  21. E CUERVO, A BALASUBRAMANIAN, D CHO, A WOLMAN, S SAROIU, R CHANDRA, P BAHL.
    Maui: Making smartphones last longer with code offload. In MobiSys, 2010
    114
  22. Minoru Kanehisa, Susumu Goto, Miho Furumichi, Mao Tanabe, Mika Hirakawa.
    Kegg for representation and analysis of molecular networks involving diseases and drugs. Nucleic Acids Research, 38(suppl 1):D355–D360, 2010
    109
  23. M Zaharia, D Borthankur, J Sarma, K Elmellegy, S Shenker, I Stoica.
    Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in cluster Scheduling. In EuroSys 2010, 2010
    107
  24. A G Dimakis, P B Godfrey, Y Wu, M O Wainwright, K Ramchandran.
    Network coding for distributed storage systems. IEEE Transactions on Information Theory, 2010
    105
  25. P Hunt, M Konar, F P Junqueira, B Reed.
    ZooKeeper: wait-free coordination for Internet-scale systems. In Proc. USENIX ATC, 2010
    103
  26. M Brown, G Hua, S Winder.
    Discriminative learning of local image descriptors. IEEE Trans. Pattern Anal. Mach. Intell, 2010
    102
  27. Jaliya Ekanayake.
    Twister: A Runtime for iterative MapReduce. in Proceedings of the First International Workshop on MapReduce and its Applications of ACM HPDC 2010 conference, 2010
    98
  28. B Alexe, T Deselaers, V Ferrari.
    What is an object. In Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on, 2010
    94
  29. Mark Gertler, Nobuhiro Kiyotaki.
    Financial Intermediation and Credit Policy in Business Cycle Analysis. In Handbook of Monetary Economics, edited by Benjamin M. Friedman and Michael Woodford, 2010
    93
  30. A Vedaldi, A Zisserman.
    Efficient additive kernels via explicit feature maps. In CVPR, 2010
    93
  31. J Leskovec, D Huttenlocher, J Kleinberg.
    Predicting positive and negative links in online social networks. In Proc. WWW, 2010
    92
  32. A Carlson, J Betteridge, R C Wang, E R Hruschka, T M Mitchell.
    Coupled semi-supervised learning for information extraction. In WSDM, 2010
    91
  33. A LI, X YANG, S KANDULA, M ZHANG.
    CloudCmp: Comparing Public Cloud Providers. In Proceedings of the 2010 Internet Measurement Conference (IMC’10, 2010
    91
  34. D Ramage, S Dumais, D Liebling.
    Characterizing Microblogs with Topic Models. 2010
    91
  35. E J Candès, Y Plan.
    Matrix completion with noise. Proc. of the IEEE, 2010
    91
  36. Peter Henry, Michael Krainin, Evan Herbst, Xiaofeng Ren, Dieter Fox.
    RGB-D mapping: Using depth cameras for dense 3D modeling of indoor environments. In ISER, 2010
    85
  37. Peter Welinder, Steve Branson, Serge Belongie, Pietro Perona.
    The multidimensional wisdom of crowds. In Neural Information Processing Systems Conference (NIPS, 2010
    79
  38. L Zhang, B Tiwana, Z Qian, R P Dick Z Wang, L Yang Z M Mao.
    Accurate online power estimation and automatic battery behavior based power model generation for smartphones, in. Proceedings of the Eighth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis – CODES/ISSS ’10, ACM, 2010
    79
  39. J Heer, M Bostock.
    Crowdsourcing graphical perception: Using mechanical turk to assess visualization design. In CHI ’10: Proceedings of the 28th international conference on Human factors in computing systems, 2010
    77
  40. A Pak, P Paroubek.
    Twitter as a corpus for sentiment analysis and opinion mining. Proceedings of LREC 2010, 2010
    77
  41. D Sun, S Roth, M Black.
    Secrets of optical flow estimation and their principles. In CVPR, 2010
    77
  42. T Bergan, O Anderson, J Devietti, L Ceze, D Grossman.
    CoreDet: A compiler and runtime system for deterministic multithreaded execution. In ASPLOS, 2010
    77
  43. A Balasubramanian, R Mahajan, A Venkataramani.
    Augmenting mobile 3G using WiFi. in Proc. 8th Int. Conf. Mobile Syst. Appl. Services, 2010
    77
  44. J M McCune, Y Li, N Qu, Z Zhou, A Datta, V Gligor, A Perrig.
    Trustvisor: Efficient TCB reduction and attestation. In Proceedings of the IEEE Symposium on Security and Privacy (SP’10). IEEE Computer Society, Los Alamitos, CA, 2010
    76
  45. S Baccianella, A Esuli, F Sebastiani.
    SentiWordNet 3.0: An Enhanced Lexical Resource for Sentiment Analysis and Opinion Mining. In LREC(10, 2010
    76
  46. R Jenatton, J Mairal, G Obozinski, F Bach.
    Proximal methods for sparse hierarchical dictionary learning. in Proceedings of the 27th Annual International Conference on Machine Learning, 2010
    76
  47. C Dyer, A Lopez, J Ganitkevitch, J Weese, F Ture, P Blunsom, H Setiawan, V Eidelman, P Resnik.
    cdec: A decoder, alignment, and learning framework for finite-state and context-free translation models. In Proc. of the ACL, 2010
    75
  48. P Saxena, D Akhawe, S Hanna, F Mao, S McCamant, D Song.
    A symbolic execution framework for JavaScript. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, 2010
    75
  49. Matthew Hoffman, David M Blei, Francis Bach.
    Online learning for latent Dirichlet allocation. In Advances in Neural Information Processing Systems, 2010
    74
  50. J Tropp, J Laska, M Duarte, J Romberg, R Baraniuk.
    Beyond Nyquist: Efficient Sampling of Sparse Bandlimited Signals. IEEE Transactions on Information Theory, 2010
    74
  51. J Dean, S Ghemawat.
    Mapreduce: A Flexible Data Processing Tool. Comm. ACM, 2010
    74
  52. G Szabo, B A Huberman.
    Predicting the popularity of online content. Communications of ACM, 2010
    73
  53. D L Donoho, A Maleki, A Montanari.
    Message passing algorithms for compressed sensing: I. motivation and construction. in Proc. of Information Theory Workshop, 2010
    73
  54. P Felzenszwalb, R Girshick, D McAllester.
    Cascade object detection with deformable part models. In Proc. CVPR, 2010
    73
  55. Andreas Rossberg, Claudio Russo, Derek Dreyer.
    F-ing modules. In TLDI, 2010
    73
  56. W Chen, C Wang, Wang.
    Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, 2010
    72
  57. D Cash, D Hofheinz, E Kiltz, C Peikert.
    Bonsai trees, or how to delegate a lattice basis. In EUROCRYPT, 2010
    72
  58. D Peng, F Dabek.
    Large-scale incremental processing using distributed transactions and notifications. In Proc. 9th Symposium on Operating Systems Design and Implementation (OSDI’10, 2010
    72
  59. M Mishali, Y C Eldar.
    From theory to practice: Sub-Nyquist sampling of sparse wideband analog signals. IEEE J. Select. Topics Signal Processing, 2010
    71
  60. C Grier, K Thomas, V Paxson, M Zhang.
    spam: The Underground on 140 Characters or Less. In Proceedings of the ACM Conference on Computer and Communications Security (CCS, 2010
    71
  61. S HAN, K JANG, K PARK, S MOON.
    PacketShader: a GPU-accelerated software router. In Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM, 2010
    71
  62. Jure Leskovec, Kevin J Lang, Michael Mahoney.
    Empirical comparison of algorithms for network community detection. In Proceedings of the 19th International Conference on World Wide Web (WWW, 2010
    71
  63. A Kovashka, K Grauman.
    Learning a hierarchy of discriminative space-time neighborhood features for human action recognition. In IEEE Int. Conf. on Computer Vision and Pattern Recognition, 2010
    71
  64. M Naaman, J Boase, C-H Lai.
    Is it really about me?: message content in social awareness streams. In Proceedings of the 2010 ACM conference on Computer supported cooperative work, CSCW ’10, 2010
    71
  65. A Goyal, F Bonchi, L V Lakshmanan.
    Learning influence probabilities in social networks. In WSDM ’10: Proceedings of the 3rd ACM international conference on Web search and data mining, 2010
    71
  66. R Xiang, J Neville, M Rogati.
    Modeling relationship strength in online social networks. In Proc. (19th) Int. Conf. on World Wide Web, WWW ’10, 2010
    70
  67. Y Bu, B Howe, M Balazinska, M D Ernst.
    Haloop: efficient iterative data processing on large clusters. 2010
    70
  68. Jacob Eisenstein, Brendan O’Connor, Noah A Smith, Eric P Xing.
    A latent variable model for geographic lexical variation. In Proc. of EMNLP. Jacob, 2010
    69
  69. T Koponen, M Casado, N Gude, J Stribling, L Poutievski, M Zhu, R Ramanathan, Y Iwata, H Inoue, T Hama, S Shenker.
    Onix: A Distributed Control Platform for Large-scale Production Networks. In OSDI, 2010
    68
  70. M Van Dijk, C Gentry, S Halevi, V Vaikuntanathan.
    Fully homomorphic encryption over the integers. Advances in Cryptology–EUROCRYPT, 2010
    68
  71. J Carreira, C Sminchisescu.
    Constrained parametric min-cuts for automatic object segmentation. In Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on, 2010
    68
  72. Csaba Szepesvári.
    Algorithms for Reinforcement Learning. 2010
    68
  73. M Nauman, S Khan, X Zhang.
    Apex: extending Android permission model and enforcement with userdefined runtime constraints. In Proc. of the ASIACCS, 2010
    68
  74. N P Smart, F Vercauteren.
    Fully homomorphic encryption with relatively small key and ciphertext sizes. In Public Key Cryptography, 2010
    67
  75. L Li, W Chu, J Langford, R E Schapire.
    A contextual-bandit approach to personalized news article recommendation. In Proceedings of the 19th International Conference on World Wide Web, 2010
    67
  76. C Guo, G Lu, H J Wang, S Y.
    SecondNet: A Data Center Network Virtualization Architecture with Bandwidth Guarantees. In Proceedings of ACM CoNext, 2010
    67
  77. David Karger, Cliff Stein, Joel Wein.
    Scheduling algorithms. Algorithms and Theory of Computation Handbook, 2010
    67
  78. S Zhuravlev, S Blagodurov, A Fedorova.
    Addressing Shared Resource Contention in Multicore Processors via Scheduling. Proc. of 15th Edition of Architectural Support for Programming Languages and Operating Systems, 2010
    66
  79. J Huang, T Zhang.
    The benefit of group sparsity. Annals of Statistics, 2010
    66
  80. M Cova, C Kruegel, G Vigna.
    Detection and Analysis of Drive-byDownload Attacks and Malicious JavaScript Code. In International World Wide Web Conference (WWW, 2010
    65
  81. S Kim, E P Xing.
    Tree-guided group Lasso for multi-task regression with structured sparsity. in Proceedings of the 27th International Conference on Machine Learning, 2010
    65
  82. Alberto Abadie, Alexis Diamond, Jens Hainmueller.
    Synthetic Control Methods for Comparative Case Studies: Estimating the Effect of California’s Tobacco Control Program. Journal of the American Statistical Association, 2010
    64
  83. A Lewko, T Okamoto, A Sahai, K Takashima, B Waters.
    Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In EUROCRYPT, 2010
    64
  84. K Saenko, B Kulis, M Fritz, T Darrell.
    Adapting visual category models to new domains. In ECCV, 2010
    62