Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. Benoit Mandelbrot
    The Fractal Geometry of Nature 1982
    962
  2. Y -H Chu, S G Rao, H Zhang
    A Case for End System Multicast. Proc. of ACM SIGMETRICS, 2000
    962
  3. L Kaufman, P J Rousseeuw
    Finding Groups in Data: An Introduction to Cluster Analysis Wiley Series in Probability and Mathematical Statistics. Applied Probability and Statistics, 1990
    961
  4. George A Miller
    WordNet: A Lexical Database for English. Communications of the ACM, 1995
    960
  5. David G Lowe
    Object recognition from local scale-invariant features. In Proc. of the International Conference on Computer Vision ICCV, Corfu, 1999
    958
  6. J L Austin
    How to Do Things with Words 1975
    957
  7. C Berrou, A Glavieux, P Thitimasjshima
    Near Shannon Limit Error-Correcting Coding and Decoding. Turbo Codes,”Proceedings of the IEEE International Conference on Communications, 1993
    957
  8. Gregor Kiczales, Erik Hilsdale, Jim Hugunin, Mik Kersten, Jeffrey Palm, William G Griswold
    An overview of AspectJ. In Proceedings of the European Conference on ObjectOriented Programming (ECOOP, 2001
    954
  9. Y Linde, A Buzo, R M Gray
    An algorithm for vector quantizer design IEEE Transactions on Communication, 1980
    954
  10. S H Muggleton
    Inductive Logic Programming. 1992
    952
  11. P Bahl, V Padmanabhan
    RADAR: An In-building RF-based User Location and Tracking System. In INFOCOM 2000, 0
    951
  12. G Wahba
    Spline Models for Observational Data Society for Industrial and Applied Mathematics. CBMS-NSF Regional Conf. series in applied mathematics, 1990
    950
  13. M Litzkow, M Livny, M Mutka
    Condor - A Hunter of Idle Workstations Proc. of 8th Intl. Conf. of Distributed Computing Systems, 1988
    947
  14. S C Woo, M Ohara, E Torrie, J P Singh, A Gupta
    The splash-2 programs: characterization and methodological considerations. SIGARCH Comput. Archit. News, 1995
    941
  15. Sally Floyd, Steven McCanne Van Jacobson, Lixia Zhang, Ching-Gung Liu
    A reliable multicast framework for light-weight sessions and application level framing. In Proceedings of SIGCOMM, 1995
    941
  16. T ElGamal
    A public-key cryptosystem and a signature scheme based on discrete logarithms in: Annual International Cryptology Conference CRYPTO’85, 1985
    939
  17. William H Greene
    Econometric Analysis 2003
    939
  18. P Maes
    Agents That Reduce Work and Information Overload Communications of the ACM, 1994
    937
  19. J Bondy, U Murty
    Graph Theory with Applications 1976
    935
  20. W Feller
    An Introduction to Probability Theory and Its Application, 1968
    928
  21. R J Barro, X Sala-i-Martin
    Economic Growth. 1995
    927
  22. M Grötschel, L Lovász, A Schrijver
    Geometric Algorithms and Combinatorial Optimization 1988
    927
  23. T Kohonen
    Self-organized formation of topologically correct feature maps Biological Cybernetics, 1982
    923
  24. A S Tanenbaum
    Computer Networks Prentice-Hall PTR, Upper Saddle River, NJ, 4 th edition, 2002
    922
  25. R S Sandhu
    Role-Based Access Control Models. IEEE Computer, 1996
    922
  26. Dragovic Barham, Hand Fraser, Harris
    Xen and the art of virtualization. 2003
    922
  27. A Blum, T Mitchell
    Combining labeled and unlabeled data with co-training. In Proceedings ofthe Eleventh Annual Conference on Computational Learning Theory, 1998
    918
  28. M Abramowitz, I A Stegun
    Handbook of Mathematical Functions national Bureau of Standards Applied Mathematics Series 55 (U.S. Government Printing Office, 1965
    917
  29. J Ziv, A Lempel
    A universal algorithm for sequential data compression. IEEE Trans. Info. Theory, 1977
    917
  30. T Finin, R Fritzson
    KQML as an Agent Communication Language. In Proceedings of the Third International Conference on Information and Knowledge Management (CIKM’94, 1994
    917
  31. R Milner, J Parrow
    A calculus of mobile processes Inf. Comput, 1992
    917
  32. A K Mackworth
    Consistency in networks of relations Artificial Intelligence, 1977
    916
  33. G J Foschini, M J Gans
    On Limits of Wireless Communications in a Fading Environment When Using Multiple Antennas. Wireless Personal Communications, 1998
    916
  34. R Want, A Hopper, V Falcao, J Gibbsons
    The Active Badge location System. ACM Transactions on Information System, 1992
    915
  35. M Davis, H Putnam
    A Computing Procedure for Quantification Theory Proceedings of the 3rd Annual ACM Symposium on Theory of Computing: 151–158. doi:10.1145/800157.805047. Michael, 1960
    914
  36. S E Deering, D R Cheriton
    Multicast Routing in Datagram Internetworks and extended LANs. ACM Transactions on Computer Systems, 1990
    914
  37. T Hastie, R Tibshirani
    Generalized additive models. 1990
    913
  38. Noam Chomsky
    The Minimalist Program 1996
    912
  39. T von Eicken, D E Culler, S C Goldstein, K E Schauser
    Active messages: a mechanism for integrated communication and computation. In International Symposium on Computer Architecture, 1992
    911
  40. W Vickrey
    Counterspeculation, auctions, and competitive sealed tenders Journal of Finance, 1961
    911
  41. J Nelder, R Mead
    A simplex method for function minimization Computer Journal, 1965
    908
  42. S Saroiu, K P Gummadi, S D Gribble
    A measurement study of peer-to-peer file sharing systems. in Multimedia Computing and Networking (MMCN, 2002
    907
  43. K Mani Chandy, Leslie Lamport
    Distributed Snapshots: Determining Global States of Distributed Systems. ACM Transactions on Computer Systems, 1985
    906
  44. B W Boehm
    Software Engineering Economics 1981
    905
  45. K Papineni, S Roukos, T Ward, Zhu
    W.: Bleu: a method for automatic evaluation of machine translation. In: 40th Meeting of the Association for Computational Linguistics, 2002
    902
  46. J Foley, A van Dam, S Feiner, J Hughes
    Computer graphics: Principles and practice Addison-Wesley Publishing Co., ISBN, 1990
    900
  47. Barbara J Grosz, Candace L Sidner
    Attention, intentions, and the structure of discourse. Computational Linguistics, 1986
    897
  48. B E Boser, I M Guyon, V N Vapnik
    A training algorithm for optimal margin classifiers. In COLT, 1992
    896
  49. W Wren, A Azarbaygaui, T Darrell, Pentland
    A.: Pfinder: realtime tracking of the human body. IEEE Trans. Pattern Anal. Mach. Intell, 1997
    895
  50. R Agrawal, R Srikant
    Mining Sequential Patterns. In Proceedings of the 11th International Conference on Data Engineering, 1995
    895
  51. M LEVOY, P M HANRAHAN
    Light field rendering. In SIGGRAPH, 1996
    894
  52. P PERONA, J MALIK
    Scale-space and edge detection using anisotropic diffusion. IEEE Trans. Pattern Anal. Mach. Intell, 1990
    891
  53. M W Moskewicz, C F Madigan, Y Zhao, L Zhang, S Malik
    Engineering an efficient SAT solver. In Proceedings of the 38th Design Automation Conference, 2001
    891
  54. O E Williamson
    The economic institutions of capitalism 1985
    890
  55. R A Adams
    Sobolev Spaces 1975
    888
  56. G Wiederhold
    Mediation in the Architecture of Future Information Systems. IEEE Computer, 1992
    888
  57. S Haykin
    Adaptive Filter Theory 2002
    886
  58. Andrew D Birrell, Bruce Jay Nelson
    Implementing Remote Procedure Calls. In SOSP ’83: Proceedings of the ninth ACM symposium on Operating Systems Principles, 1983
    883
  59. W Heinzelman, A Chandrakasan, H Balakrishnan
    Energy-efficient communication protocol for wireless sensor networks. in the Proceeding of the Hawaii International Conference System Sciences, 2000
    883
  60. D W Aha, D Kibler, M K Albert
    Instancebased learning algorithms. 1991
    882
  61. H H Clark
    Using Language 1996
    882
  62. L Zhang, S Deering, D Estrin, S Shenker, D Zappala
    Rsvp: A new resource reservation protocol. In IEEE Network, 1993
    882
  63. J Besag
    Spatial interaction and the statistical analysis of lattice systems (with discussion Journal of the Royal Statistical Society, Series B, 1974
    876
  64. Andreu Mas-Colell, Michael D Whinston, Jerry R Green
    Microeconomic Theory 1995
    875
  65. J H Wilkinson
    The Algebraic Eigenvalue Problem 1965
    873
  66. B Schneier
    Applied Cryptography 1996
    872
  67. B A Davey, H A Priestley
    Introduction to lattices and order 2002
    871
  68. R Milner
    A theory of type polymorphism in programming. Journal of Computer and System Sciences, 1978
    870
  69. J Rissanen
    Modeling by shortest data description Automatica, 1978
    869
  70. D Dolev, A Yao
    On the security of public key protocols. Information Theory, IEEE Transactions on, 1983
    869
  71. B Bollobás
    Modern Graph Theory 1998
    865
  72. A K Jain, M N Murty, P J Flynn
    Data clustering: A review. ACM Computing Surveys, 1999
    865
  73. J J Kistler, M Satyanarayanan
    Disconnected Operation in the Coda File System. ACM Transactions on Computer Systems, 1992
    864
  74. S Madden, M J Franklin, J M Hellerstein, W Hong
    Tag: a tiny aggregation service for ad-hoc sensor networks. SIGOPS Operating System Review, 2002
    861
  75. G F Cooper, Herskovits
    E.: A bayesian method for the induction of probabilistic networks from data. Machine Learning 9, 1992
    860
  76. R Fletcher
    Practical Methods of Optimization 2000
    859
  77. J L Barron, D J Fleet, S S Beauchemin
    Performance of optical flow techniques. International Journal of Computer Vision, 1994
    858