Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. George E Dahl, Dong Yu, Li Deng, Alex Acero.
    Context-dependent pre-trained deep neural networks for large-vocabulary speech recognition. Audio, Speech, and Language Processing, IEEE Transactions on, 2012
    90
  2. A Krizhevsky, I Sutskever, G E Hinton.
    Imagenet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems (NIPS, 2012
    88
  3. P J Mohr, B N Taylor, D B Newell.
    CODATA recommended values of the fundamental physical constants: 2010. doi: 10.1103/RevModPhys.84.1527. url: http://link.aps.org/doi/10.1103/ RevModPhys.84.1527, 2012
    84
  4. S N Negahban, P Ravikumar, P Ravikumar, M J Wainwright, B Yu.
    A Unified framework for highdimensional analysis of M-Estimators with decomposable regularizers. Statis. Sci, 2012
    84
  5. A Cal̀ı, G Gottlob, T Lukasiewicz.
    A general datalog-based framework for tractable query answering over ontologies. J. of Web Semantics, 2012
    72
  6. J E Laird.
    The Soar Cognitive Architecture. 2012
    71
  7. D M Blei.
    Introduction to probabilistic topic models. Communications of the ACM, 2012
    71
  8. M Bostock.
    D3.js. Data Driven Documents. 2012
    65
  9. M Reitblatt, N Foster, J Rexford, C Schlesinger, D Walker.
    Abstractions for network update. In SIGCOMM, 2012
    59
  10. M Brunnermeier, Y Sannikov.
    A Macroeconomic Model with a Financial Sector,” mimeo. 2012
    59
  11. V Chandrasekhar, G Takacs, D Chen, S Tsai, Y Reznik, R Grzeszczuk, B Girod.
    Compressed histogram of gradients: A low-bitrate descriptor. International Journal of Computer Vision, 2012
    57
  12. R Shimer.
    Reassessing the Ins and Outs of Unemployment. Review of Economic Dynamics, 2012
    55
  13. A Delong, A Osokin, H N Isack, Boykov.
    Y.: Fast approximate energy minimization with label costs. IJCV, 2012
    52
  14. Geoffrey Hinton, Li Deng, Dong Yu, George E Dahl, Abdelrahman Mohamed, Navdeep Jaitly, Andrew Senior, Vincent Vanhoucke, Patrick Nguyen, Tara N Sainath.
    neural networks for acoustic modeling in speech recognition: The shared views of four research groups. Signal Processing Magazine, IEEE, 2012
    50
  15. V V Williams.
    Multiplying matrices faster than coppersmith-winograd. In Proceedings of STOC’12, 2012
    48
  16. Q Le, M Ranzato, R Monga, M Devin, K Chen, G Corrado, J Dean, A Ng.
    Building high-level features using large scale unsupervised learning. In ICML, 2012
    47
  17. M Duarte, S Sarvotham, D Baron, M Wakin, R Baraniuk.
    Distributed compressed sensing of jointly sparse signals. in Proc. 2005 Asilomar Conf. Signals, Syst. Computations, 2012
    47
  18. P Kazemian, G Varghese, N McKeown.
    Header space analysis: static checking for networks. In Proc. NSDI, 2012
    47
  19. V Chandrasekaran, B Recht, P A Parrilo, A S Willsky.
    The convex geometry of linear inverse problems. Foundations of Computational Mathematics, 2012
    44
  20. F Bach, R Jenatton, J Mairal, G Obozinski.
    Optimization with sparsity-inducing penalties. Foundations and Trends in Machine Learning, 2012
    44
  21. A Geiger, P Lenz, R Urtasun.
    Are we ready for autonomous driving? the kitti vision benchmark suite. in Computer Vision and Pattern Recognition (CVPR, 2012
    43
  22. Richard Socher, Brody Huval, Christopher D Manning, Andrew Y Ng.
    Semantic compositionality through recursive matrix-vector spaces. In Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, 2012
    41
  23. J Gall, A Yao, N Razavi, L Van Gool, V Lempitsky.
    Hough forests for object detection, tracking, and action recognition. In ACCV, 2012
    41
  24. R C Johnson, G Noguera.
    Accounting for Intermediates: Production Sharing and Trade in Value Added. Journal of International Economics, 2012
    40
  25. M Zhou, H Chen, J Paisley, L Ren, L Li, Z Xing, D Dunson, G Sapiro, L Carin.
    Nonparametric Bayesian dictionary learning for analysis of noisy and incomplete images. IEEE Trans. Image Process, 2012
    39
  26. A P Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner.
    Android permissions: User attention, comprehension, and behavior. In ACM SOUPS, 2012
    39
  27. Hess Chung, Jean-Philippe Laforte, David Reifschneider, John C Williams.
    Have We Underestimated the Likelihood and Severity of Zero Lower Bound Events. Journal of Money, Credit, and Banking, 2012
    38
  28. Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer.
    From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. 3rd Innovations in Theoretial Computer Science, 2012
    37
  29. B Liu.
    Sentiment analysis and opinion mining. Synthesis Lectures on Human Language Technologies, Morgan & Claypool, 2012
    37
  30. C Strecha, A Bronstein, M Bronstein, P Fua.
    LDAHash: Improved matching with smaller descriptors. IEEE Trans. Pattern Analysis and Machine Intelligence, 2012
    37
  31. M Rodriguez-Muro, Calvanese.
    D.: High performance query answering over DL-Lite ontologies. In: Proc. of the 13th Int. Conf. on the Principles of Knowledge Representation and Reasoning (KR, 2012
    36
  32. N Silberman, D Hoiem, P Kohli, R Fergus.
    Indoor Segmentation and Support Inference from RGBD Images. In ECCV, 2012
    36
  33. J Yang, S Ulukus.
    Optimal packet scheduling in an energy harvesting communication system. IEEE Trans. Comm, 2012
    36
  34. S DellaVigna, J A List, U Malmendier.
    Testing for Altruism and Social Pressure in Charitable Giving. The Quarterly. Journal of Economics, 2012
    35
  35. M Kaess, H Johannsson, R Roberts, V Ila, J Leonard, F Dellaert.
    iSAM2: Incremental smoothing and mapping using the Bayes tree. Intl. J. of Robotics Research, 2012
    34
  36. Emmanuel Farhi, Jean Tirole.
    Collective moral hazard, maturity mismatch and systemic bailouts. American Economic Review, 2012
    33
  37. C A Sutton, A McCallum.
    An Introduction to Conditional Random Fields. Foundations and Trends in Machine Learning, 2012
    33
  38. M C Grace, W Zhou, X Jiang, Sadeghi.
    A.R.: Unsafe exposure analysis of mobile in-app advertisements. In: Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC, 2012
    33
  39. Y Low, D Bickson, J Gonzalez, C Guestrin, A Kyrola, J M Hellerstein.
    Distributed GraphLab: a framework for machine learning and data mining in the cloud. VLDB Endow, 2012
    33
  40. C Chekuri, N Korula, M Pál.
    Improved algorithms for orienteering and related problems. ACM Transactions on Algorithms (TALG, 2012
    33
  41. G Bosilca, A Bouteiller, A Danalis, T Herault, P Lemarinier, J Dongarra.
    DAGuE: A generic distributed DAG engine for High Performance. Computing,” Parallel Computing, 2012
    31
  42. J Laurila, D Gatica-Perez, I Aad, J Blom, O Bornet, T Do, O Dousse, J Eberle, M Miettinen.
    The mobile data challenge: Big data for mobile computing research. In Mobile Data Challenge by Nokia Workshop, in conjunction with International Conference on Pervasive Computing, 2012
    31
  43. C Le Goues, M Dewey-Vogt, S Forrest, W Weimer.
    A Systematic Study of Automated Program Repair: Fixing 55 out of 105 Bugs for $8 each. in: International Conference on Software Engineering, 2012
    31
  44. J Bonneau.
    The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In: Proc. 33th IEEE Symp. on Security and Privacy, 2012
    31
  45. M Roughan, Y Zhang, W Willinger, L Qiu.
    Spatio-temporal compressive sensing and internet traffic matrices. IEEE/ACM Transactions on Networking, 2012
    31
  46. Guanghui Lan.
    An optimal method for stochastic composite optimization. Math. Prog, 2012
    31
  47. G E Hinton, N Srivastava, A Krizhevsky, I Sutskever, R R Salakhutdinov.
    Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580. 2012
    31
  48. A Pathak, Y C Hu, M Zhang.
    Where is the energy spent inside my app?: fine grained energy accounting on smartphones with Eprof. in Proceedings of the 7th ACM european conference on Computer Systems, 2012
    30
  49. B Kreuter, a shelat, C-H Shen.
    Billion-gate secure computation with malicious adversaries. In Proceedings of the USENIX Security Symposium, 2012
    30
  50. A Talwalkar, S Kumar, H Rowley.
    Large-scale manifold learning. University of Maryland, College, 2012
    29
  51. C Gentry, S Halevi, N Smart.
    Fully homomorphic encryption with polylog overhead. Advances in Cryptology–EUROCRYPT 2012, 2012
    29
  52. S Petrov, D Das, R McDonald.
    A universal part-of-speech tagset. In LREC, 2012
    29
  53. G Eggerttson, P Krugman.
    Debt, deleveraging, and the liquidity trap: a Fisher-Minsky Koo approach. The Quarterly. Journal of Economics, 2012
    29
  54. J M Bioucas-Dias, A Plaza, N Dobigeon, M Parente, Q Du, P Gader.
    Hyperspectral unmixing overview: Geometrical, statistical, and sparse regression-based approaches. IEEE J. Sel. Topics Appl. Earth Observ, 2012
    28
  55. E Kamar, S Hacker, E Horvitz.
    Combining human and machine intelligence in large–scale crowdsourcing. AAMAS, 2012
    28
  56. J C Corbett, J Dean, M Epstein, A Fikes, C Frost, J J Furman, S Ghemawat, A Gubarev, C Heiser, P Hochschild, W Hsieh, S Kanthak, E Kogan, H Li, A Lloyd, S Melnik, D Mwaura, D Nagle, S Quinlan, R Rao, L Rolig, Y Saito, M Szymaniak, C Taylor, R Wang, D Woodford.
    Spanner: Google’s globally-distributed database. In OSDI, 2012
    28
  57. J Mairal, F Bach, J Ponce.
    Task-driven dictionary learning. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2012
    27
  58. J Salamon, E Gómez.
    Melody extraction from polyphonic music signals using pitch contour characteristics. IEEE Transactions on Audio, Speech and Language Processing, 2012
    27
  59. N Nadhem, K Paterson.
    Plaintext-recovery attacks against datagram TLS. Network and Distributed System Security Symposium, 2012
    27
  60. E Kushilevitz, S Lu, R Ostrovsky.
    On the (in)security of hash-based oblivious RAM and a new balancing scheme. In SODA, 2012
    27
  61. C Cherry, G Foster.
    Batch tuning strategies for statistical machine translation. In HLT-NAACL, 2012
    27
  62. A Khurshid, W Zhou, M Caesar, P Godfrey.
    Veriflow: Verifying networkwide invariants in real time. In Hot Topics in SDNs. ACM, 2012
    26
  63. J Bonneau, C Herley, P Oorschot, Stajano.
    F.: The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In: Proc. 33th IEEE Symp. on Security and Privacy, 2012
    26
  64. B ATIKOGLU, Y XU, E FRACHTENBERG, S JIANG, M PALECZNY.
    Workload analysis of a large-scale key-value store. In Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems (New, 2012
    26
  65. Helger Lipmaa.
    Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments. In Proceedings of the 9th Theory of Cryptography Conference on Theory of Cryptography, TCC ’12, 2012
    26
  66. P Pearce, A P Felt, G Nunez, D Wagner.
    AdDroid: privilege separation for applications and advertisers in Android. In Proc. of the ASIACCS, 2012
    26
  67. A Sadilek, H Kautz, J P Bigham.
    Finding your friends and following them to where you are. In Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, 2012
    26
  68. J Sherry, S Hasan, C Scott, A Krishnamurthy, S Ratnasamy, V Sekar.
    Making middleboxes someone else’s problem: Network processing as a cloud service. in Proc. ACM SIGCOMM, 2012
    25
  69. B Parno, M Raykova, V Vaikuntanathan.
    How to delegate and verify in public: Verifiable computation from attribute-based encryption. TCC 2012, volume 7194 of LNCS, 2012
    25
  70. C Herley, Van.
    Oorschot, P.: A research agenda acknowledging the persistence of passwords. IEEE Security & Privacy, 2012
    25
  71. A Borji, L Itti.
    State-of-the-art in visual attention modeling. IEEE TPAMI, 2012
    25
  72. A Prest, C Schmid, V Ferrari.
    Weakly supervised learning of interactions between humans and objects. IEEE PAMI, 2012
    24
  73. J Yang, O Ozel, S Ulukus.
    Broadcasting with an energy harvesting rechargeable transmitter. IEEE Trans. Wireless Comm, 2012
    24
  74. Eric H Huang, Richard Socher, Christopher D Manning, Andrew Y Ng.
    Improving word representations via global context and multiple word prototypes. In ACL, 2012
    24
  75. C Gentry, S Halevi, N P Smart.
    Homomorphic Evaluation of the AES Circuit. In Proceedings of CRYPTO, 2012
    24
  76. F ROESNER, T KOHNO, A MOSHCHUK, B PARNO, H J WANG, C COWAN.
    User-driven access control: Rethinking permission granting in modern operating systems. In Proceedings of the IEEE Symposium on Security and Privacy, 2012
    24
  77. M M Halldórsson.
    Wireless scheduling with power control. ACM Trans. Algorithms, 2012
    24
  78. D Ciresan, U Meier, J Schmidhuber.
    Multicolumn deep neural networks for image classification. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR, 2012
    23
  79. R Bansal, D Kiku, A Yaron.
    An empirical evaluation of the long-run risks model for asset prices. Critical Finance Review, 2012
    23
  80. N Handigol, B Heller, V Jeyakumar, D Mazières, N McKeown.
    Where is the debugger for my software-defined network. In Proc. HotSDN, 2012
    23
  81. Eric Shieh, Bo An, Rong Yang, Milind Tambe, Craig Baldwin, Joseph DiRenzo, Ben Maule, Garrett Meyer.
    Protect: A deployed game theoretic system to protect the ports of the united states. In Proceedings of the Eleventh International Conference on Autonomous Agents and Multiagent Systems (AAMAS, 2012
    22
  82. P G Kelley, S Komanduri, M L Mazurek, R Shay, T Vidas, L Bauer, N Christin, L F Cranor, J Lopez.
    Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In: Proc. IEEE S&P, 2012
    22
  83. L Laeven, F Valencia.
    Systemic Banking Crises Database: An Update. In: IMF Working Papers 12/163. International Monetary Fund, 2012
    22
  84. S Bugiel, L Davi, A Dmitrienko, T Fischer, A-R Sadeghi, B Shastry.
    Towards taming privilege-escalation attacks on android. In NDSS Symposium, 2012
    22
  85. N Handigol, B Heller, V Jeyakumar, B Lantz, N McKeown.
    Reproducible network experiments using container based emulation. Proc. CoNEXT, 2012
    22
  86. H Zhang, E Law, R Miller, K Gajos, D Parkes, E Horvitz.
    Human computation tasks with global constraints. In Proceedings of the SIGCHI conference on Human factors in computing systems, CHI ’12, ACM, 2012
    22
  87. M T Goodrich, M Mitzenmacher, O Ohrimenko, R Tamassia.
    Privacy-preserving group data access via stateless oblivious ram simulation. In Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, 2012
    22
  88. R Xu, H Saı̈di, R Anderson.
    Aurasium: Practical policy enforcement for android applications. In Proceedings of the 21st USENIX Conference on Security Symposium, Security’12, 2012
    22
  89. C Doersch, S Singh, A Gupta, J Sivic, Efros.
    A.A.: What makes paris look like paris. ACM Transactions on Graphics (SIGGRAPH, 2012
    22
  90. N Vasconcelos, M Vasconcelos.
    Minimum probability of error image retrieval: From visual features to image semantics. Foundations and Trends in Signal Processing, 2012
    22
  91. J Snoek, H Larochelle, R P Adams.
    Practical Bayesian optimization of machine learning algorithms. Advances in Neural Information Processing Systems 25, NIPS ’12, 2012
    22
  92. D Zats, T Das, P Mohan, D Borthakur, R Katz.
    DeTail: Reducing the flow completion time tail in datacenter networks. In Proceedings of SIGCOMM, 2012
    22