Most Cited Computer Science Citations
This list is generated from documents in the CiteSeer^{x} database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeer^{x} database, since the database is continuously updated.
All Years
 1990
 1991
 1992
 1993
 1994
 1995
 1996
 1997
 1998
 1999
 2000
 2001
 2002
 2003
 2004
 2005
 2006
 2007
 2008
 2009
 2010
 2011
 2012

A query language and optimization techniques for unstructured data. In SIGMOD, 1996372

The theory of hybrid automata. In: LICS, IEEE CS Press, 1996369

Web server workload characterization: The search for invariants. in Proc. ACM SIGMETRICS’96, 1996365

Towards an Active Network Architecture. ACM SIGCOMM Computer Communications Review, 1996364

The weakest failure detector for solving consensus. Journal of the ACM, 1996358

ML for the Working Programmer 1996353

The ontolingua server: A tool for collaborative ontology construction. In Proc. Tenth Knowledge Acquisition for KnowledgeBased Systems Workshop, 1996350

Multifactor explanations of asset pricing anomalies Journal of Finance, 1996343

LMbench: Portable Tools for Performance Analysis. In Proceedings of the 1996 USENIX Annual Technical Conference, 1996338

A secure environment for untrusted helper applications: Confining the wily hacker. 6th USENIX Security Symposium, 1996336

Nearoptimum errorcorrecting coding and decoding: Turbocodes IEEE Trans. Commun, 1996335

A sound type system for secure flow analysis. J. Comput. Secur, 1996334

A maximum entropy model for partofspeech tagging. In Proceedings of the Conference on Empirical Methods in Natural Language Processing, 1996334

Value locality and load value prediction. In Proceedings of the 7th International Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOSVII, 1996331

Prudent engineering practices for cryptographic protocols. IEEE Transactions on Software Engineering, 1996330

Formal methods: State of the art and future directions. ACM Computing Surveys, 1996329

Ontologies: principles, methods and applications. Knowledge Engineering Review, 1996328

The Lifting Scheme: A Customdesign Construction of Biothogonal Wavelets Journal of Applied Computation Haron Anal, 1996326

Equivariant adaptive source separation. IEEE Trans. Signal Process, 1996326

Reexamining the cluster hypothesis: scatter/gather on retrieval results. In SIGIR, 1996325

Using discriminant eigenfeatures for image retrieval. IEEE Trans.Pattern Analysis and Machine Intelligence, 1996325

An Efficient Routing Protocol for Wireless Networks. in Mobile Communication Networks, 1996324

Birch: An efficient data clustering method for very large databases. In SIGMOD Conference, 1996323

Iterative decoding of binary block and convolutional codes. IEEE Trans. Information Theory, 1996323

Periodic Autoregressive Conditional Heteroskedastcity Journal of Business and Economic Statistics, 1996320

Sampling large databases for association rules, in. Proceedings of the International Very Large Database Conference, 1996320

Snakes, shapes, and gradient vector flow. 1996318

Kasbah: An Agent Marketplace for Buying and Selling Goods. In Proceedings of the First International Conference on the Practical Application of Intelligent Agents and MultiAgent Technology (PAAM '96, 1996318

Triangle: Engineering a 2D Quality Mesh Generator and Delaunay Triangulator. Applied Computational Geometry: Towards Geometric Engineering, 1996313

Solving Ordinary Differential Equations of Springer Series in Computational Mathematics, 1996311

A fast marching level set method for monotonically advancing fronts. in Proceedings of the National Academy of Sciences  Applied Mathematics, 1996311

The quickhull algorithm for convex hulls. ACM Transactions on Mathematical Software, 1996310

The Data Warehouse Toolkit 1996308

Usability Analysis of Visual Programming Environments: A `Cognitive Dimensions' Framework. Journal of Visual Languages and Computing, 1996306

Data mining an overview from database perspective. Knowledge and data Engineering, IEEE Transactions on, 1996306

Toward a knowledgebased theory of the firm Strategic Management Journal, 1996304

Pivoted document length normalization. In SIGIR ’96: Proceedings of the 19st annual international ACM SIGIR conference on Research and development in information retrieval, 1996304

Principles of Mobile Communications 1996303

Timing attacks on implementations of diffiehellman, rsa, dss, and other systems. of Lecture Notes in Computer Science, 1996302

M.G.: Tamper resistance – a cautionary note. In: The Second USENIX Workshop on Electronic Commerce Proceedings, 1996301

Toward optimal feature selection. In Proceedings of the 13 th International Conference on Machine Learning, 1996297

Exploiting choice: Instruction fetch and issue on an implementable simultaneous multithreading processor. In Proceedings of the 23rd Annual International Symposium on Computer Architecture, 1996295

Mining quantitative association rules in large relational tables. In Proceedings of the ACM SIGMOD International Conference on Management of Data, 1996295

Generalization in reinforcement learning: Successful examples using sparce coarse coding. Advances in Neural Information Processing Sustems, 1996293

Probabilistic approximation of metric spaces and its algorithmic applications. 37th Annual Symposium on Foundations of Computer Science, 1996292

Foundations of Programming Languages 1996292

Combining Fuzzy Information from Multiple Systems. In Proc. of ACM PODS, 1996291

Thekkath. Petal: distributed virtual disks. In ASPLOSVII: Proceedings of the seventh international conference on Architectural, 1996289

Shared memory consistency models: A tutorial. IEEE Comp, 1996284

Efficient Image Codec Based on Set Partitioning in Hierarchical Trees International Journal of Image processing (IJIP), Volume (5) : Issue (4) : 2011 401 Mohanty, Abhishek Singh & Sudipta Mahapatra, 1996284

GRASP – a New Search Algorithm for Satisfiability. In International Conference on ComputerAided Design, 1996282

D.: Realistic animation of liquids. In The Proceedings of Graphics Interface, 1996282

Solving shapeanalysis problems in languages with destructive updating. In POPL ’96: Proceedings of the 23rd ACM SIGPLANSIGACT Symposium on Principles of Programming Languages, 1996282

The exact security of digital signatures – How to sign with RSA and Rabin. in Advances in Cryptology – EUROCRYPT’96, ser. Lecture Notes in Computer Science, 1996281

Improv: A System for Scripting Interactive Actors in Virtual Worlds. Computer Graphics, 1996279

Experimental queueing analysis with longrange dependent packet traffic. IEEE/ACM Transactions on Networking, 1996276

Improving Data Locality with Loop Transformations. ACM Transactions on Programming Languages and Systems, 1996273

Robust characterization of polynomials with applications to program testing. Cornell University, 1996271

Software agents: An overview. Knowledge Engineering Review, 1996269

A Maximum Entropy Part–of–speech Tagger In Proceedings of the 1st EMNLP Conference, 1996266

Syskill & Webert: Identifying interesting web sites. Proceedings of the Fourteenth National Conference on Artificial Intelligence, 1996266

Trace cache: a low latency approach to high bandwidth instruction fetching. In MICRO 29: Proceedings of the 29th annual ACM/IEEE international symposium on Microarchitecture, 1996265

Exceeding the dataflow limit via value prediction. in MICRO29. pp, 1996263

Routing in the Internet. 1996263

Understanding normal and impaired word reading: Computational principles in quasiregular domains. Psychological Review, 1996261

Qualityofservice routing for supporting multimedia applications IEEE Journal on Selected Areas in Communications, 1996260

3D ModelBased Tracking of Humans in Action: A Multiview Approach. Proc. Conf. Computer Vision and Pattern Recognition, 1996260

Numerical methods for Unconstrained Optimization and Nonlinear Equations SIAM Classics in Applied Mathematics (Philadelphia: Society for Industrial and Applied Mathematics, 1996260

Stacked regressions Machine Learning, 1996257

Partial parsing via finitestate cascades. Journal of Natural Language Engineering, 1996257

Carlo filter and smoother for nongaussian nonlinear state space models Journal of Computational and Graphical Statistics, 1996256

Verkamo A.: Fast Discovery of Association Rules In: Advances in Knowledge Discovery and Data Mining, 1996251

A YieldFactor Model of Interest Rates Mathematical Finance, 1996250

The Virage image search engine. an open framework for image management in SPIE Storage and Retrieval for Image and Video Databases V, 1996249

A calculus of mobile agents. In CONCUR ’96, LNCS 1119, 1996248

Bagging, boosting, and C4.5. In Proceedings of the Thirteenth National Conference on Artificial Intelligence (AAAI96, 1996245

Job Creation and Destruction 1996243

Automatic symbolic verification of embedded systems. IEEE Transactions on Software Engineering, 1996242

Set Methods and Fast Marching Methods: Evolving. Interfaces in Computational Geometry, Fluid Mechanics, Computer Vision and Materials Sciences, 1996242

Netsolve : A network server for solving computational science problems. In Proceedings of SuperComputing Pittsburg, 1996239

Bucket elimination: A unifying framework for probabilistic inference. Proc. of the Twelfth Conference Uncertainty in Arti cial Intelligence 211{219, 1996238

Dealing with disaster: Surviving misbehaved kernel extensions. In OSDI, 1996238

Efficient fair queuing using deficit round robin. IEEE/ACM Transactions On Networking, 1996237