Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. M Everingham, S M A and Van Gool Eslami, L Williams, C K I Winn, J Zisserman.
    A.: The pascal visual object classes challenge - a retrospective. Int. J. Comput. Vision, 2014
    394
  2. D Chakrabarti, S Papadimitriou, D Modha, C Faloutsos.
    Fully automatic cross-associations. KDD, 2004, 79–88. Statistical Analysis and Data Mining DOI:10.1002/sam 52 Statistical Analysis and Data Mining, 2014
    72
  3. Lutz Kilian, Daniel P Murphy.
    The role of inventories and speculative trading in the global market for crude oil. Journal of Applied Econometrics, 2014
    43
  4. R Oliveto, M Gethers, D Poshyvanyk, Lucia AD.
    On the equivalence of information retrieval methods for automated traceability link recovery. Proceedings of the IEEE International Conference on Program Comprehension (ICPC), IEEE Computer Society, 2010; 68–71. Copyright c© 2014, 2014
    31
  5. Elette Boyle, Shafi Goldwasser, Ioana Ivan.
    Functional signatures and pseudorandom functions. PKC 2014: 17th International Workshop on Theory and Practice in Public Key Cryptography, volume 8383 of Lecture Notes in Computer Science, 2014
    25
  6. Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J Schwartz, Maverick Woo, David Brumley.
    Automatic exploit generation. Communications of the ACM, 2014
    21
  7. Henri van den Esker, Remco van der Hofstad, Gerard Hooghiemstra, Dmitri Znamenski.
    Distances in random graphs with infinite mean degrees. MR-2275914 EJP 19, 2014
    20
  8. X He, A Yener.
    Providing secrecy with structured codes: Two-user Gaussian channels. IEEE Trans. Inf. Theory, 2014
    20
  9. E Vul, N Goodman, T L Griffiths, J B Tenenbaum.
    One and done? Optimal decisions from very few samples. Cognitive science, 2014
    18
  10. Marco Aldinucci, Marco Danelutto, Peter Kilpatrick, Massimo Torquati.
    Fastflow: high-level and efficient streaming on multi-core. In Sabri Pllana and Fatos Xhafa, editors, Programming Multi-core and Manycore Computing Systems, Parallel and Distributed Computing, chapter 13, 2014
    18
  11. G Navarro, K Sadakane.
    Fully-functional static and dynamic succinct trees. ACM Transactions on Algorithms, 2014
    18
  12. U Kang, B Meeder, E Papalexakis, C Faloutsos.
    Heigen: Spectral analysis for billion-scale graphs. TKDE, 2014
    18
  13. M Beadles, D Mitton.
    Criteria for Evaluating Network Access Server Protocols. RFC 3169, September 2001. Zorn Standards Track [Page 67] RFC 7155 Diameter NASREQ, 2014
    18
  14. RUBEN DURANTE, LOUIS PUTTERMAN, JOEL J VAN DER WEELE.
    Preferences for Redistribution and Perception of Fairness. An Experimental Study. Journal of the European Economic Association, 2014
    16
  15. Susan Hohenberger, Amit Sahai, Brent Waters.
    Replacing a random oracle: Full domain hash from indistinguishability obfuscation. In EUROCRYPT, 2014
    15
  16. S Pal, J Pitman.
    One-dimensional Brownian particle systems with rank-dependent drifts. MR-2473654 EJP 19, 2014
    14
  17. G Constantinides, P Cheung, W Luk.
    Truncation Noise in Fixed-Point SFGs. IEE Electronics Letters, 2014
    12
  18. J-L F Li, S Lee, D E Waliser, S Lee, B Guan, G Stephens, J Teixeira.
    under review. Assessment of Cloud Liquid Water in CMIP3, CMIP5, and Contemporary GCMs and Reanalyses with, 2014
    12
  19. J Ott, E Carrara.
    Extended Secure RTP Profile for Real-time Transport Control Protocol (RTCP)-Based Feedback (RTP/SAVPF. RFC 5124, February 2008. Singh, et al. Standards Track [Page 9] RFC 7243 RTCP XR Bytes Discarded, 2014
    12
  20. Bo Becker, Victoria Ivashina.
    Cyclicality of credit supply: Firm level evidence. Journal of Monetary Economics, 2014
    11
  21. J Modayil, A White, R S Sutton.
    Multi-timescale nexting in a reinforcement learning robot. Adaptive Behavior, 2014
    11
  22. Doron Zeilberger.
    The HOLONOMIC ANSATZ II: Automatic DISCOVERY(!) and PROOF(!!) of Holonomic Determinant Evaluations, Annals of Combinatorics 11. http://www.math.rutgers.edu/~zeilberg/mamarim/mamarimhtml/ansatzII.html Douglas R. Hofstadter, http://www.soic.indiana.edu/people/profiles/hofstadter-douglas.shtml Doron Zeilberger, http://www.math.rutgers.edu/~zeilberg/ First Version, 2014
    11
  23. Thomas Piketty, Emmanuel Saez, Stefanie Stantcheva.
    Optimal Taxation of Top Labor Incomes: A Tale of Three Elasticities. American Economic Journal: Economic Policy, 2014
    11
  24. B van der Loo, R Labugger, J Skepper, M Bachschmid, J Kilo, J Powell.
    Enhanced peroxynitrite formation is associated with vascular aging. Muller-Delp / Cardiovascular Research 66 (2005) 374–383 383 at Pennsylvania State U niversity on February 27, 2014
    10
  25. X Zhao, B Zhang, D Massey, A Terzis, L Zhang.
    The impact of link failure location on routing dynamics: A formal analysis. In Proc. ACM SIGCOMM Asia Workshop, 2005. ACM SIGCOMM Computer Communication Review 12 Volume 44, Number 1, 2014
    10
  26. K Häkkinen, M Kallinen, M Izquierdo.
    Changes in agonistantagonist EMG, muscle CSA and force during strength training in middle-aged and older people. DE BOER ET AL. at Serial Record on February 26, 2014
    9
  27. J YUAN, Y ZHENG, L ZHANG, X XIE, G 2011a SUN.
    Where to Find My Next Passenger. In Proceedings of 13th ACM International Conference on Ubiquitous Computing. ACM Press: 109-118 1: 54, 2014
    9
  28. Ryan O’Donnell.
    Analysis of Boolean Functions. 2014
    9
  29. R Kenyon, J-M Schlenker.
    Rhombic embeddings of planar quad-graphs. Trans. Amer. Math. Soc, 2014
    9
  30. R F Toso, M G C Resende.
    A C++ application programming interface for biased random-key genetic algorithms. Optimization Methods and Software, 2014
    9
  31. Y Tian.
    Matrix representations of octonions and their applications. Advances in Applied Clifford Algebras, 10:61–90, 2000. Electronic Journal of Linear Algebra ISSN 1081-3810 A publication of the International Linear Algebra Society Volume 27, 2014
    8
  32. S K Fayazbakhsh, L Chaing, V Sekar, M Yu, J C Mogul.
    Enforcing network-wide policies in the presence of dynamic middlebox actions using FlowTags. In NSDI, 2014
    8
  33. Golan Levin.
    The table is the score : An augmented-reality interface for real-time, tangible, spectrographic performance. Proceedings of 2006 International Computer Music Conference, 2006, http://www.flong.com/texts/publications/pub icmc06/, Last visited, 2014
    7
  34. Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova.
    Two-round secure mpc from indistinguishability obfuscation. In TCC, 2014
    7
  35. E Cantillon, P Yin.
    Competition Between Exchanges: Lessons from the Battle of the Bund," 2013 Casadesus-Masanell. Journal of Economics & Management Strategy, 2014
    7
  36. O Maillard, S Mannor.
    Latent bandits. In ICML, 2014
    7
  37. S Porter, M Mirmehdi, B Thomas.
    A shortest path representation for video summarisation. 12th International Conference on Image Analysis and Processing, 2003.Proceedings, 2014
    7
  38. V Dujmovi, M Suderman, D R Wood.
    Graph drawings with few slopes. Computational Geometry, 2014
    6
  39. M Dorigo, M Birattari, M Brambilla.
    Swarm robotics. Scholarpedia, 2014
    6
  40. Bernhard Haeupler, Siddhartha Sen, Robert E Tarjan.
    Rank-Balanced Trees. ACM Trans. Algorithms (2014). To appear. ACM Transactions on Database Systems, 2014
    6
  41. G Wang, T C E Cheng.
    Customer order scheduling to minimize total weighted completion time. Copyright ⓒ 2014 SERSC 325 Journal of Multimedia and Ubiquitous Engineering Vol.9, No.4, 2014
    6
  42. S Kapoor, S Gollamudi, S Nagaraj, Y F Huang.
    Adaptive multiuser detection and beam forming for interference suppression in CDMA mobile radio 123. Transducers, 2014
    6
  43. E Murphy-Chutorian, M M Trivedi.
    3d tracking and dynamic analysis of human head movements and attentional targets. in Proc. 2nd ACM/IEEE ICDSC, 2014
    6
  44. M Braverman, K Makarychev, Y Makarychev, A Naor.
    The Grothendieck constant is strictly smaller than Krivine’s bound. Forum Math. Pi, 2014
    6
  45. R Garg, S P Khatri.
    3D simulation and analysis of the radiation tolerance of voltage scaled digital circuit. in Proc. Int. Conf. Comput. Des., 2009, 2014
    5
  46. A Fiorentini, V Porciatti, Morrone MC, Burr DC.
    Visual ageing: unspecific decline of the responses to luminance and colour. Vision Res. 1996;36:3557–3566. Accepted May 31, 2005 Decision Editor: James R. Smith, PhD 1251GINKGO BILOBA AND VISUAL PROCESSING at Serial Record on M arch 1, 2014
    5
  47. A Badanidiyuru, J Vondrák.
    Fast algorithms for maximizing submodular functions. In SODA, 2014
    5
  48. A Korattikara, Y Chen, M Welling.
    Austerity in MCMC land: Cutting the MetropolisHastings budget. In Proceedings of the 31st International Conference on Machine Learning, ICML ’14, 2014
    5
  49. Albert Ai, Alex Lapanowski, Yaniv Plan, Roman Vershynin.
    One-bit compressed sensing with non-gaussian measurements. Linear Algebra and its Applications. 2014
    5
  50. H ZIEGLER, T NIETZSCHMANN, KEIM.
    D.: Visual Exploration and Discovery of Atypical Behavior in Financial Time Series Data using Two-Dimensional Colormaps. In Information Visualization, 2007. IV ’07. 11th International Conference (2007, 2014
    5
  51. Y LIPMAN.
    Bounded distortion mapping spaces for triangular meshes. ACM Trans. Graph, 2014
    5
  52. F Li, B C Ooi, M T ¨Ozsu, S Wu.
    Distributed data management using mapreduce. ACM Comput. Surv, 2014
    5
  53. K J Turner, S Reiff-Marganiec, L Blair, G A Campbell, F Wang.
    APPEL: Adaptable and Programmable Policy Environment and Language. 2014
    5
  54. R Kumar, M O Myreen, S Owens, M Norrish.
    CakeML: A verified implementation of ML. In POPL, 2014
    5
  55. R Bardenet, A Doucet, C Holmes.
    Towards scaling up Markov chain Monte Carlo: An adaptive subsampling approach. In Proceedings of the 31st International Conference on Machine Learning, ICML ’14, 2014
    4
  56. A Frankel.
    Aligned delegation. The American Economic Review, 2014
    4
  57. D J Aldous, K Ganesan.
    True scale-invariant random spatial networks. Proceedings of the National Academy of Sciences 110, 2014
    4
  58. M D Iordache, J Bioucas-Dias, A Plaza.
    Collaborative Sparse Regression for Hyperspectral Unmixing. IEEE Trans. Geosci. Remote Sens, 2014
    4
  59. R J Tibshirani.
    Adaptive piecewise polynomial estimation via trend filtering. Annals of Statistics, 2014
    4
  60. Internet Architecture Board, B Carpenter, Ed.
    Charter of the Internet Architecture Board (IAB. BCP 39, RFC 2850, May 2000. Dawkins, et al. Informational [Page 27] RFC 7241 IEEE 802/IETF Relationship, 2014
    4
  61. D Ceolin, A Nottamkandath, Fokkink.
    W.: Efficient semi-automated assessment of annotation trustworthiness. Journal of Trust Management, 2014
    4
  62. Carolyn Jane Anderson, Nate Foster, Arjun Guha, Jean-Baptiste Jeannin, Dexter Kozen, Cole Schlesinger, David Walker.
    NetKAT: Semantic foundations for networks. In POPL, 2014
    4
  63. A AL-HAJRI, G MILLER, M FONG, S FELS.
    Visualization of personal history for video navigation. In Proceedings of the Conference on Human Factors in Computing Systems, ACM, CHI, 2014
    4
  64. S CHEN, M ERWIG, E WALKINGSHAW.
    Extending Type Inference to Variational Programs. ACM Trans. Programming Languages and Systems (TOPLAS, 2014
    4
  65. Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs.
    Efficient nonmalleable codes and key-derivation for poly-size tampering circuits. EUROCRYPT 2014, volume 8441 of LNCS, 2014
    4
  66. C Baumeister, L Kilian.
    2014b), “What Central Bankers Need to Know about Forecasting Oil Prices. International Economic Review, 2014
    4
  67. C G Petra, O Schenk, M Lubin, K Gärtner.
    An augmented incomplete factorization approach for computing the Schur complement in stochastic optimization. SIAM Journal on Scientific Computing, 2014
    3
  68. K Head, T Mayer.
    Gravity equations: Workhorse, toolkit, and cookbook, in. Gopinath, G., Helpman, E., Rogoff, K. (Eds.), Handbook of International Economics. Elsevier, 2014
    3
  69. N Leontiadis, T Moore, N Christin.
    A nearly four-year longitudinal study of search-engine poisoning. 2014
    3
  70. Malin Adolfson, Stefan Laséen, Jesper Lindé, Lars E O Svensson.
    Monetary Policy Trade-Offs in an Estimated Open-Economy DSGE Model. Journal of Economic Dynamics and Control, 2014
    3
  71. E Mallada, S H Low.
    Distributed frequency-preserving optimal load control. IFAC World Congress, 2014
    3
  72. Y Wiseman.
    The still image lossy compression standard. JPEG, Encyclopedia of Information and Science Technology, Third Edition, 2014
    3