Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. George E Dahl, Dong Yu, Li Deng, Alex Acero.
    Context-dependent pre-trained deep neural networks for large-vocabulary speech recognition. Audio, Speech, and Language Processing, IEEE Transactions on, 2012
  2. A Krizhevsky, I Sutskever, G E Hinton.
    Imagenet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems (NIPS, 2012
  3. P J Mohr, B N Taylor, D B Newell.
    CODATA recommended values of the fundamental physical constants: 2010. doi: 10.1103/RevModPhys.84.1527. url: RevModPhys.84.1527, 2012
  4. S N Negahban, P Ravikumar, P Ravikumar, M J Wainwright, B Yu.
    A Unified framework for highdimensional analysis of M-Estimators with decomposable regularizers. Statis. Sci, 2012
  5. A Cal̀ı, G Gottlob, T Lukasiewicz.
    A general datalog-based framework for tractable query answering over ontologies. J. of Web Semantics, 2012
  6. J E Laird.
    The Soar Cognitive Architecture. 2012
  7. D M Blei.
    Introduction to probabilistic topic models. Communications of the ACM, 2012
  8. M Bostock.
    D3.js. Data Driven Documents. 2012
  9. M Reitblatt, N Foster, J Rexford, C Schlesinger, D Walker.
    Abstractions for network update. In SIGCOMM, 2012
  10. M Brunnermeier, Y Sannikov.
    A Macroeconomic Model with a Financial Sector,” mimeo. 2012
  11. V Chandrasekhar, G Takacs, D Chen, S Tsai, Y Reznik, R Grzeszczuk, B Girod.
    Compressed histogram of gradients: A low-bitrate descriptor. International Journal of Computer Vision, 2012
  12. R Shimer.
    Reassessing the Ins and Outs of Unemployment. Review of Economic Dynamics, 2012
  13. A Delong, A Osokin, H N Isack, Boykov.
    Y.: Fast approximate energy minimization with label costs. IJCV, 2012
  14. Geoffrey Hinton, Li Deng, Dong Yu, George E Dahl, Abdelrahman Mohamed, Navdeep Jaitly, Andrew Senior, Vincent Vanhoucke, Patrick Nguyen, Tara N Sainath.
    neural networks for acoustic modeling in speech recognition: The shared views of four research groups. Signal Processing Magazine, IEEE, 2012
  15. V V Williams.
    Multiplying matrices faster than coppersmith-winograd. In Proceedings of STOC’12, 2012
  16. Q Le, M Ranzato, R Monga, M Devin, K Chen, G Corrado, J Dean, A Ng.
    Building high-level features using large scale unsupervised learning. In ICML, 2012
  17. M Duarte, S Sarvotham, D Baron, M Wakin, R Baraniuk.
    Distributed compressed sensing of jointly sparse signals. in Proc. 2005 Asilomar Conf. Signals, Syst. Computations, 2012
  18. P Kazemian, G Varghese, N McKeown.
    Header space analysis: static checking for networks. In Proc. NSDI, 2012
  19. V Chandrasekaran, B Recht, P A Parrilo, A S Willsky.
    The convex geometry of linear inverse problems. Foundations of Computational Mathematics, 2012
  20. F Bach, R Jenatton, J Mairal, G Obozinski.
    Optimization with sparsity-inducing penalties. Foundations and Trends in Machine Learning, 2012
  21. A Geiger, P Lenz, R Urtasun.
    Are we ready for autonomous driving? the kitti vision benchmark suite. in Computer Vision and Pattern Recognition (CVPR, 2012
  22. Richard Socher, Brody Huval, Christopher D Manning, Andrew Y Ng.
    Semantic compositionality through recursive matrix-vector spaces. In Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, 2012
  23. J Gall, A Yao, N Razavi, L Van Gool, V Lempitsky.
    Hough forests for object detection, tracking, and action recognition. In ACCV, 2012
  24. R C Johnson, G Noguera.
    Accounting for Intermediates: Production Sharing and Trade in Value Added. Journal of International Economics, 2012
  25. M Zhou, H Chen, J Paisley, L Ren, L Li, Z Xing, D Dunson, G Sapiro, L Carin.
    Nonparametric Bayesian dictionary learning for analysis of noisy and incomplete images. IEEE Trans. Image Process, 2012
  26. A P Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner.
    Android permissions: User attention, comprehension, and behavior. In ACM SOUPS, 2012
  27. Hess Chung, Jean-Philippe Laforte, David Reifschneider, John C Williams.
    Have We Underestimated the Likelihood and Severity of Zero Lower Bound Events. Journal of Money, Credit, and Banking, 2012
  28. Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer.
    From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. 3rd Innovations in Theoretial Computer Science, 2012
  29. B Liu.
    Sentiment analysis and opinion mining. Synthesis Lectures on Human Language Technologies, Morgan & Claypool, 2012
  30. C Strecha, A Bronstein, M Bronstein, P Fua.
    LDAHash: Improved matching with smaller descriptors. IEEE Trans. Pattern Analysis and Machine Intelligence, 2012
  31. M Rodriguez-Muro, Calvanese.
    D.: High performance query answering over DL-Lite ontologies. In: Proc. of the 13th Int. Conf. on the Principles of Knowledge Representation and Reasoning (KR, 2012
  32. N Silberman, D Hoiem, P Kohli, R Fergus.
    Indoor Segmentation and Support Inference from RGBD Images. In ECCV, 2012
  33. J Yang, S Ulukus.
    Optimal packet scheduling in an energy harvesting communication system. IEEE Trans. Comm, 2012
  34. S DellaVigna, J A List, U Malmendier.
    Testing for Altruism and Social Pressure in Charitable Giving. The Quarterly. Journal of Economics, 2012
  35. M Kaess, H Johannsson, R Roberts, V Ila, J Leonard, F Dellaert.
    iSAM2: Incremental smoothing and mapping using the Bayes tree. Intl. J. of Robotics Research, 2012
  36. Emmanuel Farhi, Jean Tirole.
    Collective moral hazard, maturity mismatch and systemic bailouts. American Economic Review, 2012
  37. C A Sutton, A McCallum.
    An Introduction to Conditional Random Fields. Foundations and Trends in Machine Learning, 2012
  38. M C Grace, W Zhou, X Jiang, Sadeghi.
    A.R.: Unsafe exposure analysis of mobile in-app advertisements. In: Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC, 2012
  39. Y Low, D Bickson, J Gonzalez, C Guestrin, A Kyrola, J M Hellerstein.
    Distributed GraphLab: a framework for machine learning and data mining in the cloud. VLDB Endow, 2012
  40. C Chekuri, N Korula, M Pál.
    Improved algorithms for orienteering and related problems. ACM Transactions on Algorithms (TALG, 2012
  41. G Bosilca, A Bouteiller, A Danalis, T Herault, P Lemarinier, J Dongarra.
    DAGuE: A generic distributed DAG engine for High Performance. Computing,” Parallel Computing, 2012
  42. J Laurila, D Gatica-Perez, I Aad, J Blom, O Bornet, T Do, O Dousse, J Eberle, M Miettinen.
    The mobile data challenge: Big data for mobile computing research. In Mobile Data Challenge by Nokia Workshop, in conjunction with International Conference on Pervasive Computing, 2012
  43. C Le Goues, M Dewey-Vogt, S Forrest, W Weimer.
    A Systematic Study of Automated Program Repair: Fixing 55 out of 105 Bugs for $8 each. in: International Conference on Software Engineering, 2012
  44. J Bonneau.
    The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In: Proc. 33th IEEE Symp. on Security and Privacy, 2012
  45. M Roughan, Y Zhang, W Willinger, L Qiu.
    Spatio-temporal compressive sensing and internet traffic matrices. IEEE/ACM Transactions on Networking, 2012
  46. Guanghui Lan.
    An optimal method for stochastic composite optimization. Math. Prog, 2012
  47. G E Hinton, N Srivastava, A Krizhevsky, I Sutskever, R R Salakhutdinov.
    Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580. 2012
  48. A Pathak, Y C Hu, M Zhang.
    Where is the energy spent inside my app?: fine grained energy accounting on smartphones with Eprof. in Proceedings of the 7th ACM european conference on Computer Systems, 2012
  49. B Kreuter, a shelat, C-H Shen.
    Billion-gate secure computation with malicious adversaries. In Proceedings of the USENIX Security Symposium, 2012
  50. A Talwalkar, S Kumar, H Rowley.
    Large-scale manifold learning. University of Maryland, College, 2012
  51. C Gentry, S Halevi, N Smart.
    Fully homomorphic encryption with polylog overhead. Advances in Cryptology–EUROCRYPT 2012, 2012
  52. S Petrov, D Das, R McDonald.
    A universal part-of-speech tagset. In LREC, 2012
  53. G Eggerttson, P Krugman.
    Debt, deleveraging, and the liquidity trap: a Fisher-Minsky Koo approach. The Quarterly. Journal of Economics, 2012
  54. J M Bioucas-Dias, A Plaza, N Dobigeon, M Parente, Q Du, P Gader.
    Hyperspectral unmixing overview: Geometrical, statistical, and sparse regression-based approaches. IEEE J. Sel. Topics Appl. Earth Observ, 2012
  55. E Kamar, S Hacker, E Horvitz.
    Combining human and machine intelligence in large–scale crowdsourcing. AAMAS, 2012
  56. J C Corbett, J Dean, M Epstein, A Fikes, C Frost, J J Furman, S Ghemawat, A Gubarev, C Heiser, P Hochschild, W Hsieh, S Kanthak, E Kogan, H Li, A Lloyd, S Melnik, D Mwaura, D Nagle, S Quinlan, R Rao, L Rolig, Y Saito, M Szymaniak, C Taylor, R Wang, D Woodford.
    Spanner: Google’s globally-distributed database. In OSDI, 2012
  57. J Mairal, F Bach, J Ponce.
    Task-driven dictionary learning. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2012
  58. J Salamon, E Gómez.
    Melody extraction from polyphonic music signals using pitch contour characteristics. IEEE Transactions on Audio, Speech and Language Processing, 2012
  59. N Nadhem, K Paterson.
    Plaintext-recovery attacks against datagram TLS. Network and Distributed System Security Symposium, 2012
  60. E Kushilevitz, S Lu, R Ostrovsky.
    On the (in)security of hash-based oblivious RAM and a new balancing scheme. In SODA, 2012
  61. C Cherry, G Foster.
    Batch tuning strategies for statistical machine translation. In HLT-NAACL, 2012
  62. A Khurshid, W Zhou, M Caesar, P Godfrey.
    Veriflow: Verifying networkwide invariants in real time. In Hot Topics in SDNs. ACM, 2012
  63. J Bonneau, C Herley, P Oorschot, Stajano.
    F.: The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In: Proc. 33th IEEE Symp. on Security and Privacy, 2012
    Workload analysis of a large-scale key-value store. In Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems (New, 2012
  65. Helger Lipmaa.
    Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments. In Proceedings of the 9th Theory of Cryptography Conference on Theory of Cryptography, TCC ’12, 2012
  66. P Pearce, A P Felt, G Nunez, D Wagner.
    AdDroid: privilege separation for applications and advertisers in Android. In Proc. of the ASIACCS, 2012
  67. A Sadilek, H Kautz, J P Bigham.
    Finding your friends and following them to where you are. In Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, 2012
  68. J Sherry, S Hasan, C Scott, A Krishnamurthy, S Ratnasamy, V Sekar.
    Making middleboxes someone else’s problem: Network processing as a cloud service. in Proc. ACM SIGCOMM, 2012
  69. B Parno, M Raykova, V Vaikuntanathan.
    How to delegate and verify in public: Verifiable computation from attribute-based encryption. TCC 2012, volume 7194 of LNCS, 2012
  70. C Herley, Van.
    Oorschot, P.: A research agenda acknowledging the persistence of passwords. IEEE Security & Privacy, 2012
  71. A Borji, L Itti.
    State-of-the-art in visual attention modeling. IEEE TPAMI, 2012
  72. A Prest, C Schmid, V Ferrari.
    Weakly supervised learning of interactions between humans and objects. IEEE PAMI, 2012
  73. J Yang, O Ozel, S Ulukus.
    Broadcasting with an energy harvesting rechargeable transmitter. IEEE Trans. Wireless Comm, 2012
  74. Eric H Huang, Richard Socher, Christopher D Manning, Andrew Y Ng.
    Improving word representations via global context and multiple word prototypes. In ACL, 2012
  75. C Gentry, S Halevi, N P Smart.
    Homomorphic Evaluation of the AES Circuit. In Proceedings of CRYPTO, 2012
    User-driven access control: Rethinking permission granting in modern operating systems. In Proceedings of the IEEE Symposium on Security and Privacy, 2012
  77. M M Halldórsson.
    Wireless scheduling with power control. ACM Trans. Algorithms, 2012
  78. D Ciresan, U Meier, J Schmidhuber.
    Multicolumn deep neural networks for image classification. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR, 2012
  79. R Bansal, D Kiku, A Yaron.
    An empirical evaluation of the long-run risks model for asset prices. Critical Finance Review, 2012
  80. N Handigol, B Heller, V Jeyakumar, D Mazières, N McKeown.
    Where is the debugger for my software-defined network. In Proc. HotSDN, 2012
  81. Eric Shieh, Bo An, Rong Yang, Milind Tambe, Craig Baldwin, Joseph DiRenzo, Ben Maule, Garrett Meyer.
    Protect: A deployed game theoretic system to protect the ports of the united states. In Proceedings of the Eleventh International Conference on Autonomous Agents and Multiagent Systems (AAMAS, 2012
  82. P G Kelley, S Komanduri, M L Mazurek, R Shay, T Vidas, L Bauer, N Christin, L F Cranor, J Lopez.
    Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In: Proc. IEEE S&P, 2012
  83. L Laeven, F Valencia.
    Systemic Banking Crises Database: An Update. In: IMF Working Papers 12/163. International Monetary Fund, 2012
  84. S Bugiel, L Davi, A Dmitrienko, T Fischer, A-R Sadeghi, B Shastry.
    Towards taming privilege-escalation attacks on android. In NDSS Symposium, 2012
  85. N Handigol, B Heller, V Jeyakumar, B Lantz, N McKeown.
    Reproducible network experiments using container based emulation. Proc. CoNEXT, 2012
  86. H Zhang, E Law, R Miller, K Gajos, D Parkes, E Horvitz.
    Human computation tasks with global constraints. In Proceedings of the SIGCHI conference on Human factors in computing systems, CHI ’12, ACM, 2012
  87. M T Goodrich, M Mitzenmacher, O Ohrimenko, R Tamassia.
    Privacy-preserving group data access via stateless oblivious ram simulation. In Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, 2012
  88. R Xu, H Saı̈di, R Anderson.
    Aurasium: Practical policy enforcement for android applications. In Proceedings of the 21st USENIX Conference on Security Symposium, Security’12, 2012
  89. C Doersch, S Singh, A Gupta, J Sivic, Efros.
    A.A.: What makes paris look like paris. ACM Transactions on Graphics (SIGGRAPH, 2012
  90. N Vasconcelos, M Vasconcelos.
    Minimum probability of error image retrieval: From visual features to image semantics. Foundations and Trends in Signal Processing, 2012
  91. J Snoek, H Larochelle, R P Adams.
    Practical Bayesian optimization of machine learning algorithms. Advances in Neural Information Processing Systems 25, NIPS ’12, 2012
  92. D Zats, T Das, P Mohan, D Borthakur, R Katz.
    DeTail: Reducing the flow completion time tail in datacenter networks. In Proceedings of SIGCOMM, 2012