Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. P Buneman, S Davidson, G Hillebrand, D Suciu
    A query language and optimization techniques for unstructured data. In SIGMOD, 1996
    372
  2. T A Henzinger
    The theory of hybrid automata. In: LICS, IEEE CS Press, 1996
    369
  3. M F Arlitt, C L Williamson
    Web server workload characterization: The search for invariants. in Proc. ACM SIGMETRICS’96, 1996
    365
  4. D Tennenhouse, D Wetherall
    Towards an Active Network Architecture. ACM SIGCOMM Computer Communications Review, 1996
    364
  5. Tushar Deepak Chandra, Vassos Hadzilacos, Sam Toueg
    The weakest failure detector for solving consensus. Journal of the ACM, 1996
    358
  6. L C Paulson
    ML for the Working Programmer 1996
    353
  7. A Farquhar, R Fikes, J Rice
    The ontolingua server: A tool for collaborative ontology construction. In Proc. Tenth Knowledge Acquisition for Knowledge-Based Systems Workshop, 1996
    350
  8. Eugene F Fama, Kenneth R French
    Multifactor explanations of asset pricing anomalies Journal of Finance, 1996
    343
  9. Larry W McVoy, Carl Staelin
    LMbench: Portable Tools for Performance Analysis. In Proceedings of the 1996 USENIX Annual Technical Conference, 1996
    338
  10. I Goldberg, D Wagner, R Thomas, E A Brewer
    A secure environment for untrusted helper applications: Confining the wily hacker. 6th USENIX Security Symposium, 1996
    336
  11. C Berrou, A Glavieux
    Near-optimum error-correcting coding and decoding: Turbo-codes IEEE Trans. Commun, 1996
    335
  12. D Volpano, C Irvine, G Smith
    A sound type system for secure flow analysis. J. Comput. Secur, 1996
    334
  13. A Ratnaparkhi
    A maximum entropy model for part-ofspeech tagging. In Proceedings of the Conference on Empirical Methods in Natural Language Processing, 1996
    334
  14. M Lipasti, C B Wilkerson, J P Shen
    Value locality and load value prediction. In Proceedings of the 7th International Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS-VII, 1996
    331
  15. Martín Abadi, Roger Needham
    Prudent engineering practices for cryptographic protocols. IEEE Transactions on Software Engineering, 1996
    330
  16. E M Clarke, J M Wing, R Alur
    Formal methods: State of the art and future directions. ACM Computing Surveys, 1996
    329
  17. M Uschold, M Gruninger
    Ontologies: principles, methods and applications. Knowledge Engineering Review, 1996
    328
  18. W Sweldens
    The Lifting Scheme: A Custom-design Construction of Biothogonal Wavelets Journal of Applied Computation Haron Anal, 1996
    326
  19. J-F Cardoso, B Laheld
    Equivariant adaptive source separation. IEEE Trans. Signal Process, 1996
    326
  20. D L Swets, J Y Weng
    Using discriminant eigenfeatures for image retrieval. IEEE Trans.Pattern Analysis and Machine Intelligence, 1996
    325
  21. S Murthy, J J Garcia-Luna-Aceves
    An Efficient Routing Protocol for Wireless Networks. in Mobile Communication Networks, 1996
    324
  22. T Zhang, R Ramakrishnan, M Livny
    Birch: An efficient data clustering method for very large databases. In SIGMOD Conference, 1996
    323
  23. James Gosling, Henry McGilton
    The java language environment: A white paper 1996
    323
  24. J Hagenauer, E Offer, L Papke
    Iterative decoding of binary block and convolutional codes. IEEE Trans. Information Theory, 1996
    323
  25. T Bollerslev, E Ghysels
    Periodic Autoregressive Conditional Heteroskedastcity Journal of Business and Economic Statistics, 1996
    320
  26. H Toivonen
    Sampling large databases for association rules, in. Proceedings of the International Very Large Database Conference, 1996
    320
  27. Jeffrey L Elman, Elizabeth A Bates, Mark H Johnson, Annette Karmiloff-Smith, Domenico Parisi, Kim Plunkett
    Rethinking Innateness: A Connectionist Perspective on Development 1996
    320
  28. C Xu, J L Prince
    Snakes, shapes, and gradient vector flow. 1996
    318
  29. A Chavez, P Maes
    Kasbah: An Agent Marketplace for Buying and Selling Goods. In Proceedings of the First International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology (PAAM '96, 1996
    318
  30. Jonathan Richard Shewchuk
    Triangle: Engineering a 2D Quality Mesh Generator and Delaunay Triangulator. Applied Computational Geometry: Towards Geometric Engineering, 1996
    313
  31. E Hairer, G Wanner
    Solving Ordinary Differential Equations of Springer Series in Computational Mathematics, 1996
    311
  32. J Sethian
    A fast marching level set method for monotonically advancing fronts. in Proceedings of the National Academy of Sciences - Applied Mathematics, 1996
    311
  33. C B Barber, D Dobkin, H Huhdanpaa
    The quickhull algorithm for convex hulls. ACM Transactions on Mathematical Software, 1996
    310
  34. R Kimball
    The Data Warehouse Toolkit 1996
    308
  35. T R G Green, M Petre
    Usability Analysis of Visual Programming Environments: A `Cognitive Dimensions' Framework. Journal of Visual Languages and Computing, 1996
    306
  36. J H Ming-Syan Chen
    Data mining an overview from database perspective. Knowledge and data Engineering, IEEE Transactions on, 1996
    306
  37. R Grant
    Toward a knowledge-based theory of the firm Strategic Management Journal, 1996
    304
  38. A Singhal, C Buckley, M Mitra
    Pivoted document length normalization. In SIGIR ’96: Proceedings of the 19st annual international ACM SIGIR conference on Research and development in information retrieval, 1996
    304
  39. Paul C Kocher
    Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. of Lecture Notes in Computer Science, 1996
    302
  40. R J Anderson, Kuhn
    M.G.: Tamper resistance – a cautionary note. In: The Second USENIX Workshop on Electronic Commerce Proceedings, 1996
    301
  41. D Koller, R M Sahami
    Toward optimal feature selection. In Proceedings of the 13 th International Conference on Machine Learning, 1996
    297
  42. D M Tullsen, S J Eggers, J S Emer, H M Levy, J L Lo, R L Stamm
    Exploiting choice: Instruction fetch and issue on an implementable simultaneous multithreading processor. In Proceedings of the 23rd Annual International Symposium on Computer Architecture, 1996
    295
  43. R Srikant, R Agrawal
    Mining quantitative association rules in large relational tables. In Proceedings of the ACM SIGMOD International Conference on Management of Data, 1996
    295
  44. R Sutton
    Generalization in reinforcement learning: Successful examples using sparce coarse coding. Advances in Neural Information Processing Sustems, 1996
    293
  45. Y Bartal
    Probabilistic approximation of metric spaces and its algorithmic applications. 37th Annual Symposium on Foundations of Computer Science, 1996
    292
  46. J C Mitchell
    Foundations of Programming Languages 1996
    292
  47. R Fagin
    Combining Fuzzy Information from Multiple Systems. In Proc. of ACM PODS, 1996
    291
  48. E K Lee, C A
    Thekkath. Petal: distributed virtual disks. In ASPLOS-VII: Proceedings of the seventh international conference on Architectural, 1996
    289
  49. Ronald L Rivest, Butler Lampson
    SDSI - A Simple Distributed Security Infrastructure. 1996
    285
  50. S V Adve, K Gharachorloo
    Shared memory consistency models: A tutorial. IEEE Comp, 1996
    284
  51. A Said, “A New W A Perlman, Fast
    Efficient Image Codec Based on Set Partitioning in Hierarchical Trees International Journal of Image processing (IJIP), Volume (5) : Issue (4) : 2011 401 Mohanty, Abhishek Singh & Sudipta Mahapatra, 1996
    284
  52. J P Marques-Silva, K A Sakallah
    GRASP – a New Search Algorithm for Satisfiability. In International Conference on Computer-Aided Design, 1996
    282
  53. N FOSTER, METAXAS
    D.: Realistic animation of liquids. In The Proceedings of Graphics Interface, 1996
    282
  54. Mooly Sagiv, Thomas Reps, Reinhard Wilhelm
    Solving shape-analysis problems in languages with destructive updating. In POPL ’96: Proceedings of the 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1996
    282
  55. M Bellare, P Rogaway
    The exact security of digital signatures – How to sign with RSA and Rabin. in Advances in Cryptology – EUROCRYPT’96, ser. Lecture Notes in Computer Science, 1996
    281
  56. K Perlin, A Goldberg
    Improv: A System for Scripting Interactive Actors in Virtual Worlds. Computer Graphics, 1996
    279
  57. Ashok Erramilli, Onuttom Narayan, Walter Willinger
    Experimental queueing analysis with long-range dependent packet traffic. IEEE/ACM Transactions on Networking, 1996
    276
  58. K S McKinley, S Carr, C-W Tseng
    Improving Data Locality with Loop Transformations. ACM Transactions on Programming Languages and Systems, 1996
    273
  59. R Rubinfeld, M Sudan
    Robust characterization of polynomials with applications to program testing. Cornell University, 1996
    271
  60. H S Nwana
    Software agents: An overview. Knowledge Engineering Review, 1996
    269
  61. A Ratnaparkhi
    A Maximum Entropy Part–of–speech Tagger In Proceedings of the 1st EMNLP Conference, 1996
    266
  62. M Pazzani, J Muramatsu, D Billsus
    Syskill & Webert: Identifying interesting web sites. Proceedings of the Fourteenth National Conference on Artificial Intelligence, 1996
    266
  63. Eric Rotenberg, Steve Bennett, James E Smith
    Trace cache: a low latency approach to high bandwidth instruction fetching. In MICRO 29: Proceedings of the 29th annual ACM/IEEE international symposium on Microarchitecture, 1996
    265
  64. M H Lipasti, J P Shen
    Exceeding the dataflow limit via value prediction. in MICRO-29. pp, 1996
    263
  65. C Huitema
    Routing in the Internet. 1996
    263
  66. D C Plaut, J L McClelland, M S Seidenberg, K Patterson
    Understanding normal and impaired word reading: Computational principles in quasi-regular domains. Psychological Review, 1996
    261
  67. Z Wang, J Crowcroft
    Quality-of-service routing for supporting multimedia applications IEEE Journal on Selected Areas in Communications, 1996
    260
  68. D M Gavrila, L S Davis
    3-D Model-Based Tracking of Humans in Action: A Multiview Approach. Proc. Conf. Computer Vision and Pattern Recognition, 1996
    260
  69. Dennis JE, Schnabel RB
    Numerical methods for Unconstrained Optimization and Nonlinear Equations SIAM Classics in Applied Mathematics (Philadelphia: Society for Industrial and Applied Mathematics, 1996
    260
  70. Leo Breiman
    Stacked regressions Machine Learning, 1996
    257
  71. Steven Abney
    Partial parsing via finite-state cascades. Journal of Natural Language Engineering, 1996
    257
  72. G Monte Kitagawa
    Carlo filter and smoother for non-gaussian nonlinear state space models Journal of Computational and Graphical Statistics, 1996
    256
  73. R Agrawal, H Mannila, R Srikant, H Toivonen
    Verkamo A.: Fast Discovery of Association Rules In: Advances in Knowledge Discovery and Data Mining, 1996
    251
  74. D Duffie, R Kan
    A Yield-Factor Model of Interest Rates Mathematical Finance, 1996
    250
  75. J R Bach, C Fuller, A Gupta, A Hampapur, B Horowitz, R Humphrey, R Jain, C F Shu
    The Virage image search engine. an open framework for image management in SPIE Storage and Retrieval for Image and Video Databases V, 1996
    249
  76. Cédric Fournet, Georges Gonthier, Jean-Jacques Lévy, Luc Maranget, Didier Rémy
    A calculus of mobile agents. In CONCUR ’96, LNCS 1119, 1996
    248
  77. J R Quinlan
    Bagging, boosting, and C4.5. In Proceedings of the Thirteenth National Conference on Artificial Intelligence (AAAI-96, 1996
    245
  78. Steven J Davis, John C Haltiwanger, Scott Schuh
    Job Creation and Destruction 1996
    243
  79. R Alur, T Henzinger, P-H Ho
    Automatic symbolic verification of embedded systems. IEEE Transactions on Software Engineering, 1996
    242
  80. J A Sethian, Level
    Set Methods and Fast Marching Methods: Evolving. Interfaces in Computational Geometry, Fluid Mechanics, Computer Vision and Materials Sciences, 1996
    242
  81. R Orfali, D Harkey, J Edwards
    The Essential Distributed Objects Survival Guide 1996
    240
  82. H Casanova, J Dongarra
    Netsolve : A network server for solving computational science problems. In Proceedings of Super-Computing -Pittsburg, 1996
    239
  83. R Dechter
    Bucket elimination: A unifying framework for probabilistic inference. Proc. of the Twelfth Conference Uncertainty in Arti cial Intelligence 211{219, 1996
    238
  84. M I Seltzer, Y Endo, C Small, K A Smith
    Dealing with disaster: Surviving misbehaved kernel extensions. In OSDI, 1996
    238
  85. M Shreedhar, George Varghese
    Efficient fair queuing using deficit round robin. IEEE/ACM Transactions On Networking, 1996
    237