Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. S Baker, D Scharstein, J P Lewis, S Roth, M J Black, S R.
    A database and evaluation methodology for optical flow. Int. J. Comput. Vision, 2011
    239
  2. L Bottou, O Bousquet.
    The tradeoffs of large scale learning. In Optimization for Machine Learning, 2011
    147
  3. A P Felt, E Chin, S Hanna, D Song, D Wagner.
    Android permissions demystified. In ACM CCS, 2011
    108
  4. R Jenatton, J Y Audibert, F Bach.
    Structured Variable Selection with Sparsity-Inducing Norms. Journal of Machine Learning Research, 2011
    99
  5. W Enck, D Octeau, P McDaniel, S Chaudhuri.
    A Study of Android Application Security. In Proc. of the USENIX Security Symposium, 2011
    98
  6. L Xu, F Hutter, H H Hoos, Leyton-Brown.
    K.: SATzilla: Portfolio-based algorithm selection for SAT. CoRR, 2011
    94
  7. P L Combettes, J-C Pesquet.
    Proximal splitting methods in signal processing. In Fixed-Point Algorithms for Inverse Problems in Science and Engineering, 2011
    93
  8. R Newcombe, A Davison, S Izadi, P Kohli, O Hilliges, J Shotton, D Molyneaux, S Hodges, D Kim, A Fitzgibbon.
    KinectFusion: Real-time dense surface mapping and tracking. In IEEE and ACM Intl. Sym. on Mixed and Augmented Reality (ISMAR, 2011
    90
  9. A Coates, H Lee, A Y Ng.
    An analysis of single-layer networks in unsupervised feature learning. In AISTATS, 2011
    86
  10. M Kwiatkowska, G Norman, D Parker.
    PRISM 4.0: Verification of Probabilistic Realtime Systems. In Proc. CAV’11. LNCS 6806, 2011
    86
  11. P Bustos.
    Trade Liberalization, Exports, and Technology Upgrading: Evidence on the Impact. of MERCOSUR on Argentinian Firms,” American Economic Review, 2011
    79
  12. H H Holger, Stützle.
    T.: SATLIB: An Online Resource for Research on SAT. Proceedings of Theory and Applications of Satisfiability Testing, 4th International Conference (SAT 2000, 2011
    78
  13. B Hindman, A Konwinski, M Zaharia, A Ghodsi, A D Joseph, R Katz, S Shenker, I Stoica.
    Mesos: A platform for fine-grained resource sharing in the data center. In Proc. of NSDI, 2011
    76
  14. J Kober, J Peters.
    Policy search for motor primitives in robotics. Machine Learning, 2011
    73
  15. D Acemoglu, D Autor.
    Skills, Tasks and Technologies: Implications for Employment and Earnings. Handbook of Labor Economics 4B, 2011
    73
  16. M TABOADA, J BROOKS, M TOFILOSKI, K VOLL, M STEDE.
    Lexicon-Based Methods for Sentiment Analysis. Computational Linguistics, 2011
    72
  17. Kevin Gimpel, Nathan Schneider, Brendan O’Connor, Dipanjan Das, Daniel Mills, Jacob Eisenstein, Michael Heilman, Dani Yogatama, Jeffrey Flanigan, Noah A Smith.
    Part-of-Speech Tagging for Twitter: Annotation, Features, and Experiments. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies (Short Papers). The Association for Computer Linguistics, 2011
    72
  18. S Melnik, A Gubarev, J J Long, G Romer, S Shivakumar, M Tolton, T Vassilakis.
    Dremel: interactive analysis of web-scale datasets. Commun. ACM, 2011
    67
  19. C Gentry, S Halevi.
    Implementing gentry’s fully-homomorphic encryption scheme. In EUROCRYPT, 2011
    66
  20. J K Aggarwal, M S Ryoo.
    Human activity analysis: A review. ACM Computing Surveys, 2011
    65
  21. J Duchi, E Hazan, Y Singer.
    Adaptive subgradient methods for online learning and stochastic optimization. The Journal of Machine Learning Research, 2011
    63
  22. L Backstrom, J Leskovec.
    Supervised random walks: predicting and recommending links in social networks. In Proceedings of the fourth ACM international conference on Web search and data mining, WSDM ’11, 2011
    62
  23. S P Kasiviswanathan, H K Lee, K Nissim, S Raskhodnikova, A Smith.
    What can we learn privately. SIAM Journal on Computing, 2011
    62
  24. M Yu, Y Yi, J Rexford, M Chiang.
    Rethinking virtual network embedding: substrate support for path splitting and migration. ACM SIGCOMM Computer Communication Review 64 Volume 41, Number 2, 2011
    61
  25. P N Mendes, M Jakob, A García-Silva, C Bizer.
    DBpedia Spotlight: Shedding Light on the Web of Documents. 7th International Conference on Semantic Systems (I-Semantics, 2011
    61
  26. E Chin, A P Felt, K Greenwood, D Wagner.
    Analyzing inter-application communication in android. In ACM MobiSys, 2011
    60
  27. A Iosup, S Ostermann, M N Yigitbasi, R Prodan, T Fahringer, D H Epema.
    Performance Analysis of Cloud Computing. Services for Many-Tasks Scientific Computing,” IEEE Transactions on Parallel and Distributed Systems, 2011
    60
  28. J Baker, C Bond, J C Corbett, J J Furman, A Khorlin, J Larson, J-M Leon, Y Li, A Lloyd, V Yushprakh.
    Megastore: Providing scalable, highly available storage for interactive services. In CIDR, 2011
    60
  29. Nate Foster, Rob Harrison, Michael J Freedman, Christopher Monsanto, Jennifer Rexford, Alec Story, David Walker.
    Frenetic: A network programming language. In ICFP, 2011
    58
  30. J Yang, J Leskovec.
    Patterns of Temporal Variation in Online Media. In proceedings of the ACM International Conference on Web Search and Data Mining (WSDM, 2011
    57
  31. M Lin, A Wierman, L Andrew, E Thereska.
    Dynamic Right-sizing for Power-proportional Data Centers. Proc. of 30th IEEE International Conference on Computer Communications, 2011
    57
  32. Z Brakerski, V Vaikuntanathan.
    Efficient fully homomorphic encryption from (standard) LWE. In FOCS, 2011
    57
  33. J H Clark, C Dyer, A Lavie, N A Smith.
    Better hypothesis testing for statistical machine translation: controlling for optimizer instability. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies: short papers - Volume 2, HLT ’11, 2011
    56
  34. A Ghodsi, M Zaharia, B Hindman, A Konwinski, S Shenker, I Stoica.
    Dominant resource fairness: Fair allocation of multiple resource types. in Proc. USENIX NSDI, 2011
    56
  35. P Ferraris, J Lee, V Lifschitz.
    Stable models and circumscription. Artificial Intelligence, 2011
    55
  36. R Newcombe, S Lovegrove, A Davison.
    DTAM: Dense tracking and mapping in real-time. In Intl. Conf. on Computer Vision (ICCV, 2011
    55
  37. S Izadi, D Kim, O Hilliges, D Molyneaux, R Newcombe, P Kohli, J Shotton, S Hodges, D Freeman, A Davison, A Fitzgibbon.
    KinectFusion: Real-time 3D Reconstruction and Interaction Using a Moving Depth Camera. In Proc. ACM UIST, 2011
    55
  38. A P Felt, H J Wang, A Moshchuk, S Hanna, E Chin.
    Permission redelegation: Attacks and defenses. In USENIX Security Symposium, 2011
    55
  39. K Lai, B Liefeng, R Xiaofeng, D Fox.
    A large-scale hierarchical multi-view rgb-d object dataset. In Robotics and Automation (ICRA), 2011 IEEE International Conference on, 2011
    55
  40. S Karaman, E Frazzoli.
    Sampling-based algorithms for optimal motion planning,” The Int. Journal of Robotics Research, 2011
    54
  41. M Dietz, S Shekhar, Y Pisetsky, A Shu, D S Wallach.
    Quire: Lightweight provenance for smart phone operating systems. In USENIX Security Symposium, 2011
    54
  42. M Egele, C Kruegel, E Kirda, Vigna.
    G.: PiOS: Detecting Privacy Leaks in iOS Applications. In: Proceedings of the 18th Annual Network and Distributed System Security Symposium,. NDSS, The Internet Society, 2011
    54
  43. Y Huang, D Evans, J Katz, L Malka.
    Faster secure two-party computation using garbled circuits. In Proceedings of the 20th USENIX Conference on Security, SEC’11, 2011
    53
  44. A Torralba, Efros.
    A.A.: Unbiased look at dataset bias. 2011
    51
  45. H Ballani, P Costa, T Karagiannis, A Rowstron.
    Towards predictable datacenter networks. 2011
    51
  46. J R Kwapisz, G M Weiss, S A Moore.
    Activity recognition using cell phone accelerometers. SIGKDD Explor. Newsl, 2011
    50
  47. Yue Jia, Mark Harman.
    An Analysis and Survey of the Development of Mutation Testing. Software Engineering, IEEE Transactions on, 2011
    50
  48. C Castillo, M Mendoza, B Poblete.
    Information Credibility on Twitter. in: Proceedings of the 20th international conference on World wide web, 2011
    49
  49. Vasco Cúrdia, Michael Woodford.
    The Central-Bank Balance Sheet as an Instrument of Monetary Policy. Journal of Monetary Economics, 2011
    49
  50. A P Felt, K Greenwood, D Wagner.
    The effectiveness of application permissions. In USENIX WebApps, 2011
    49
  51. S Wu, J M Hofman, W A Mason, D J Watts.
    Who says what to whom on twitter. In Proceedings of the international conference on World Wide Web, 2011
    48
  52. Dan Boneh, Amit Sahai, Brent Waters.
    Functional encryption: Definitions and challenges. TCC 2011: 8th Theory of Cryptography Conference, 2011
    48
  53. D G MURRAY, M SCHWARZKOPF, C SMOWTON, S SMITH, A MADHAVAPEDDY, S HAND.
    CIEL: A Universal Execution Engine for Distributed Data-Flow Computing. In NSDI, 2011
    48
  54. J Lehman, Stanley.
    K.: Abandoning Objectives: Evolution through the Search for Novelty Alone. Evolutionary Computation Journal, 2011
    47
  55. A Curtis, J Mogul, J Tourrilhes, P Yalagandula, P Sharma, S Banerjee.
    DevoFlow: Scaling Flow Management for High-Performance Networks. In SIGCOMM, 2011
    47
  56. A Kittur, B Smus, S Khamkar, R Kraut.
    E.: Crowdforge: Crowdsourcing complex work. Proceedings of the 24th annual ACM symposium on User interface software and technology , ACM, 2011
    47
  57. Nikhil Swamy, Juan Chen, Cedric Fournet, Pierre-Yves Strub, Karthikeyan Bhargavan, Jean Yang.
    Secure distributed programming with valuedependent types. In Proceedings of the 16th ACM SIGPLAN international conference on Functional programming, 2011
    47
  58. Y Chen, A Ganapathi, R Griffith, R Katz.
    The case for evaluating mapreduce performance using workload suites. In Proc. of MASCOTS, 2011
    46
  59. A Fader, S Soderland, O Etzioni.
    Identifying relations for open information extraction. In EMNLP, 2011
    46
  60. S Sundaresan, W de Donato, N Feamster, R Teixeira, S Crawford, A Pescapè.
    Broadband internet performance: a view from the gateway. In Proc. of ACM SIGCOMM, 2011
    45
  61. A Shieh, S Kandula, A Greenberg, C Kim, B Saha.
    Sharing the Data Center Network. In NSDI, 2011
    45
  62. Craig Knox, Vivian Law, Timothy Jewison, Philip Liu, Son Ly, Alex Frolkis, Allison Pon, Kelly Banco, Christine Mak, Vanessa Neveu, Yannick Djoumbou, Roman Eisner, An Chi Guo, David S Wishart.
    Drugbank 3.0: a comprehensive resource for omics research on drugs. Nucleic Acids Research, 39(suppl 1):D1035–D1041, 2011
    45
  63. Craig Gentry, Daniel Wichs.
    Separating succinct non-interactive arguments from all falsifiable assumptions. In Lance Fortnow and Salil P. Vadhan, editors, 43rd ACM STOC, 2011
    45
  64. F Bach, R Jenatton, J Mairal, G Obozinski.
    Convex optimization with sparsity-inducing norms. in Optimization for Machine Learning, 2011
    45
  65. A Ritter, S Clark, Etzioni Mausam.
    O.: Named entity recognition in tweets: An experimental study. Association for Computational Linguistics, 2011
    45
  66. J Tsai, S Egelman, L Cranor, A Acquisti.
    The Effect of Online Privacy Information on Purchasing Behavior. An Experimental Study,” Information Systems Research, 2011
    44
  67. Myle Ott, Yejin Choi, Claire Cardie, Jeffrey T Hancock.
    Finding deceptive opinion spam by any stretch of the imagination. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics (ACL, 2011
    44
  68. A Marcus, M S Bernstein, O Badar, D R Karger, S Madden, R C Miller.
    Twitinfo: aggregating and visualizing microblogs for event exploration. In CHI ’11, ACM, 2011
    44
  69. J Teevan, D Ramage, M Morris.
    Twittersearch: A comparison of microblog search and web search. In WSDM‟11, 2011
    44
  70. O E Barndor¤-Nielsen, P R Hansen, A Lunde, N Shephard.
    Multivariate realised kernels: consistent positive semi-de estimators of the covariation of equity prices with noise and non-synchronous trading. Journal of Econometrics. Forthcoming, 2011
    44
  71. M V Afonso, J M Bioucas-Dias, M A T Figueiredo.
    An augmented Lagrangian approach to the constrained optimization formulation of imaging inverse problems. IEEE Trans. Im. Proc, 2011
    44
  72. A Wagner, J Wright, A Ganesh, Z Zhou, H Mobahi, Y Ma.
    Towards a practical face recognition system: Robust alignment and illumination by sparse representation. IEEE Trans. Pattern Analysis and Machine Intelligence, 2011
    44
  73. K Levchenko, N Chachra, B Enright, M Felegyhazi, C Grier, T Halvorson, C Kanich, C Kreibich, H Liu, D McCoy, A Pitsillidis, N Weaver, V Paxson, G Voelker, S Savage.
    Click trajectories: End-to-end analysis of the spam value chain. In Proc. 2011 IEEE Symp. Sec. & Privacy, 2011
    44
  74. D Altig, L Christiano, M Eichenbaum, J Linde.
    Firm-specific capital, nominal rigidities and the business cycle. Review of Economic Dynamics, 2011
    44
  75. M-M Cheng, G-X Zhang, N J Mitra, X Huang, S- M Hu.
    Global contrast based salient region detection. In CVPR, 2011
    43
  76. A Sampson, W Dietl, E Fortuna.
    EnerJ: Approximate data types for safe and general low-power computation. In PLDI, 2011
    43
  77. John J Horton, David G Rand, Richard J Zeckhauser.
    The Online Laboratory: Conducting Experiments in a Real Labor. Market.” Experimental Economics, 2011
    43
  78. X Gabaix.
    The Granular Origins of Aggregate Fluctuations. Econometrica, 2011
    42
  79. D L Chen, Mooney.
    R.J.: Learning to interpret natural language navigation instructions from observations. In: Proc. Nat’l Conf. on Artificial Intelligence (AAAI, 2011
    42
  80. United Nations.
    Department of Economic and Social Affairs. World Population Prospects 2010, 2011
    41
  81. M Hopkins, J May.
    Tuning as ranking. In EMNLP, 2011
    41
  82. A Chudik, M H Pesaran, E Tosetti.
    Weak and strong cross section dependence and estimation of large panels. Econometrics Journal, 2011
    41
  83. Hao Ma, Dengyong Zhou, Chao Liu, Michael R Lyu, Irwin King.
    Recommender systems with social regularization. In Proceedings of the fourth ACM international conference on Web search and data mining, 2011
    40
  84. C Callison-Burch, P Koehn, C Monz, O Zaidan.
    Findings of the 2011 workshop on statistical machine translation. in Proceedings of the Sixth Workshop on Statistical Machine Translation, 2011
    40
  85. F Oggier, B Hassibi.
    The secrecy capacity of the MIMO wiretap channel. IEEE Trans. Inf. Theory, 2011
    40
  86. Z Cheng, J Caverlee, K Lee, D Sui.
    Exploring Millions of Footprints in Location Sharing Services. In: Fifth International AAAI Conference on Weblogs and Social, 2011
    39
  87. Q LI, Y ZHENG, X XIE, Y CHEN, W LIU, W MA.
    Mining user similarity based on location history. IN Proc. of the 16th International Conference on Advances in, 2011
    39
  88. S Borkar, A A Chien.
    The future of microprocessors. Communications of the ACM, 2011
    39
  89. Siu-Wing Cheng, Tamal K Dey.
    Quality meshing with weighted Delaunay refinement. inria-00560388, version 1 - 28, 2011
    39