Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. K Calvert, M B Doar, A Nexion, E W Zegura
    Modeling internet topology. IEEE Communications Magazine, 1997
    369
  2. La Porta, F Lopez-de-Salinas R, A Shleifer, R Vishny
    Legal Determinants of External Finance Journal of Finance, 1997
    367
  3. D Lin, R Morris
    Dynamics of Random Early Detection. Proc. ACM SIGCOMM ’97, 1997
    367
  4. Zoubin Ghahramani, Michael I Jordan
    Factorial hidden Markov models. Machine Learning, 1997
    366
  5. C Atkeson, A Moore, S Schaal
    Locally weighted learning. AI Review, 1997
    363
  6. S J Wright
    Primal-Dual Interior-Point Methods. 1997
    360
  7. P Embrechts, C Klüppelberg, T Mikosch
    Modelling Extremal Events for Insurance and Finance 1997
    360
  8. D Koller
    Sahami M: Hierarchically classifying documents using very few words. proceedings of the 14th International Conference on Machine Learning (ICML, 1997
    356
  9. Nobuhiro Kiyotaki, John Moore
    Credit Cycles Journal of Political Economy, 1997
    354
  10. M Balabanovic, Y Shoham
    Fab: Content-based, Collaborative Recommendation. Communication of the ACM, 1997
    354
  11. T Lakshman, U Madhow
    The performance of TCP/IP for networks with high bandwidth-delay products and random loss. IEEE/ACM Trans. Networking, 1997
    354
  12. Julio J Rotemberg, Michael Woodford
    An Optimization-Based Econometric Framework for the Evaluation of Monetary Policy,” NBER Macroeconomics Annual, 1997
    351
  13. F Maes, A Collignon, D Vandermeulen, G Marchal, P Suetens
    Multimodality image registration by maximization of mutual information. IEEE Trans. on Medical Imaging, 1997
    351
  14. H HOPPE
    View-dependent refinement of progressive meshes. In SIGGRAPH 97, 1997
    350
  15. T M Mitchell
    Machine learning. 1997
    350
  16. L Rizzo
    Effective erasure codes for reliable computer communication protocols. Computer Communication Review, 1997
    349
  17. N E Fenton, S L Pfleeger
    Software Metrics. A Rigorous and Practical Approach 1997
    347
  18. H Garcia-Molina, Y Papakonstantinou, D Quass, A Rajararnan, Y Sagiv, J Ullman, V Vassalos, J Widom
    The TSIMMIS Approach to Mediation: Data Models and Languages. Journal of Intelligent Information Systems, 1997
    346
  19. L Rizzo
    Dummynet: a simple approach to the evaluation of network protocols. SIGCOMM Comput. Commun. Rev, 1997
    344
  20. N Katayama, S Satoh
    The sr-tree: an index structure for highdimensional nearest neighbor queries. In SIGMOD ’97: Proceedings of the 1997 ACM SIGMOD international conference on Management of data, 1997
    342
  21. A Fox, S D Gribble, Y Chawathe, E A Brewer, P Gauthier
    Cluster-based scalable network services. SIGOPS Oper. Syst. Rev, 1997
    341
  22. F Lu, E Milios
    Globally consistent range scan alignment for environment mapping. Autonomous Robots, 1997
    339
  23. A Dix, J Finlay, G Abowd, R Beale
    Humancomputer interaction. Prentice-Hall, Inc., Upper Saddle River, 1997
    335
  24. A Blum, P Langley
    Selection of relevant features and examples in machine learning. Artificial Intelligence, 1997
    334
  25. L Wiskott, J-M Fellous, N Krüger, C von
    der Malsburg, “Face recognition by elastic bunch graph matching IEEE Trans.PatternAnalysisandMachineIntelligence(TPAMI),vol.19, 1997
    334
  26. D Harel, E Gery
    Executable object modeling with statecharts. IEEE Computer.30(7, 1997
    334
  27. D J Teece, G Pisano, A Shuen
    Dynamic Capabilities and Strategic Management Strategic Management Journal, 1997
    332
  28. W Bosma, J Cannon, C Playoust
    The Magma algebra system. I. The user language In J. Symbolic Comput, 1997
    331
  29. D Staiger, J Stock
    Instrumental Variables Regression with Weak Instruments Econometrica, 1997
    331
  30. Dekai Wu
    Stochastic inversion transduction grammars and bilingual parsing corpora. Computational Linguistics, 1997
    330
  31. Rajeev Alur, Thomas A Henzinger, Orna Kupferman
    Alternatingtime temporal logic. In FOCS ’97: Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS, 1997
    327
  32. B Nayfeh, K Olukotun
    A single-chip multiprocessor. Computer, 1997
    326
  33. T Diers, C Allen
    The TLS Protocol Version 1.0 INTERNET DRAFT 9. Authors Address Mark Wahl Critical Angle Inc. 4815 West Braker Lane #502-385 Austin, TX 78759 USA EMail: M.Wahl@critical-angle.com Wahl Recommended Authentication Methods for LDAP Page 4, 1997
    325
  34. Andy Ward, Alan Jones
    A new location technique for the active office. IEEE Personal Communications, 1997
    324
  35. S SEITZ, C DYER
    Photorealistic scene reconstruction by voxel coloring. In CVPR, 1997
    322
  36. J R Hauser, J Wawrzynek
    GARP: A MIPS processor with a reconfigurable coprocessor. in Proceedings of the IEEE Symposium on FPGAs for Custom Computing Machines, 1997
    318
  37. J BLOOMENTHAL
    Introduction to implicit surfaces. 1997
    317
  38. P Godefroid
    Model checking for programming languages using VeriSoft. In Principles of Programming Languages (POPL, 1997
    316
  39. Thomas Back, David B Fogel, Zbigniew Michalewicz
    Handbook of Evolutionary Computation. 1997
    314
  40. Eugene Charniak
    Statistical parsing with a context-free grammar and word statistics. In Proceedings of the Fourteenth National Conference on Artificial Intelligence, 1997
    314
  41. W Easterly, R Levine
    Africa’s Growth Tragedy: Policies and Ethnic Divisions, Quarterly Journal of Economics, 1997
    312
  42. E Bernstein, U Vazirani
    Quantum complexity theory. SIAM J. Comput, 1997
    311
  43. P Porras, P Neumann
    EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In Proceedings of the 20 th NISSC, 1997
    310
  44. Chunhung Richard Lin, Mario Gerla
    Adaptive clustering for mobile wireless networks. IEEE Journal on Selected Areas in Communications, 1997
    309
  45. E L Lehmann
    Testing Statistical Hypotheses 1997
    309
  46. T A Henzinger, P-H Ho, H Wong-Toi
    HyTech: A model checker for hybrid systems. In Proceedings of the 9th International Conference on Computer Aided Verification, CAV ’97, 1997
    306
  47. Sylvia Richardson, Peter J Green
    On Bayesian analysis of mixtures with an unknown number of components. Journal of the Royal Statistical Society B, 1997
    303
  48. Rich Caruana
    Multitask learning. Machine Learning, 1997
    302
  49. A Hyvärinen, E Oja
    A fast fixed-point algorithm for independent component analysis. Neural Computation, 1997
    301
  50. M Odersky, P Wadler
    Pizza into Java: Translating theory into practice. in Proceedings of the 24th ACM Symposium on Principles of Programming Languages (POPL, 1997
    297
  51. J MCHUGH, S ABITEBOUL, R GOLDMAN, D QUASS, J WIDOM
    Lore: A database management system for semistructured data. SIGMOD Rec, 1997
    297
  52. S Knack, P Keefer
    Does social capital have an economic payoff? The Quarterly. Journal of Economics, 1997
    296
  53. W Schultz, P Dayan, P Montague
    A neural substrate of prediction and reward Science, 1997
    296
  54. D E Bakken J A Zinky
    R.D.Schantz, “Architectural Support for Quality of Service for CORBA Objects. in Theory and Practice of Object Systems, 1997
    296
  55. F Rieke, D Warland, de Ruyter van Steveninck, R, W Bialek
    Spikes: Exploring the neural code 1997
    294
  56. L S Blackford, J Choi, A Cleary, E D'Azevedo, J Demmel, I Dhillon, J Dongarra, S Hammarling, G Henry, A Petitet, K Stanley, D Walker, R C Whaley
    ScaLAPACK Users' Guide 1997
    291
  57. M Lounsbery, T D DeRose, J Warren
    Multiresolution analysis for surfaces of arbitrary topological type. ACM Transactions on Graphics, 1997
    291
  58. Lars E O Svensson
    Inflation Forecast Targeting: Implementing and Monitoring. Inflation Targets’, European Economic Review, 1997
    290
  59. M Harchol-Balter, A B Downey
    Exploiting process lifetime distributions for dynamic load balancing. ACM Transactions on Computer Systems, 1997
    289
  60. M Bellare, A Desai, E Jokipii, P Rogaway
    A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. In Proceedings of the 38th Symposium on Foundations of Computer Science (FOCS, 1997
    285
  61. T Joachims, D Freitag, T Mitchell
    WebWatcher: A tour guide for the World Wide Web. Proceedings of the Fifteenth International Joint Conference on Artificial Intelligence, 1997
    285
  62. S Julier, J Uhlmann
    A new extension of the Kalman filter to nonlinear systems. International Symposium of Aerospace/Defense Sensing, Simulation and Controls, 1997
    279
  63. J Ramsay, B Silverman
    Functional Data Analysis. Series in Statistics, 1997
    279
  64. J Hellerstein, P Haas, H Wang
    Online aggregation. In SIGMOD Conference, 1997
    277
  65. H Krawczyk, M Bellare, R Canetti
    HMAC: Keyed-Hashing for Message Authentication. 1997
    276
  66. T Joachims
    A probabilistic analysis of the rocchio algorithm with tfidf for text categorization. In: International Conference on Machine Learning (ICML, 1997
    276
  67. M Brand, N Oliver, A Pentland
    Coupled Hidden Markov Models for Complex Action Recognition. Proc. IEEE CS Conf. Computer Vision and Pattern Recognition, 1997
    275
  68. S Jamin, P Danzig, S Shenker, L Zhang
    A measurement-based admission control algorithm for integrated services packet networks. IEEE/ACM Transactions on Networking, 1997
    275
  69. G Bakshi, C Cao, Z Chen
    Empirical Performance of Alternative Option Pricing Models Journal of Finance, 1997
    272
  70. V I Pavlovic, R Sharma, T S Huang
    Visual interpretation of hand gestures for human–computer interaction: A review. IEEE Trans. Pattern Anal. Mach. Intell, 1997
    270
  71. J C R Bennett, H Zhang
    Hierarchical packet fair queueing algorithms. IEEE/ACM Transactions on Networking, 1997
    268
  72. P S Pacheco
    Parallel Programming with MPI 1997
    267
  73. M A Hearst
    Texttiling: Segmenting text into multi-paragraph subtopic passages. Computational linguistics, 1997
    267
  74. W Y Ma, B Manjunath
    Netra: A Toolbox for Navigating Large Image Databases. Proc. IEEE Int’l Conf. Image Processing (ICIP ’97, 1997
    267
  75. J Huang, S R Kumar, M Mitra, W-J Zhu, R Zabih
    Image indexing using color correlograms. in Proc. of CVPR, 1997
    266
  76. Phillipe Aghion, Jean Tirole
    Formal and Real Authority in Organizations Journal of Political Economy, 1997
    266
  77. Mads Tofte, Jean-Pierre Talpin
    Region-based memory management. Information and Computation, 1997
    265
  78. R P Bonasso, J Firby, E Gat, D Kortenkamp, D P Miller, M G Slack
    Experiences with an architecture for intelligent, reactive agents. Journal of Experimental & Theoretical Artificial Intelligence 9(2/3):237–256, 1997
    265
  79. N Kanwisher, J McDermott, M M Chun
    The fusiform face area: A module in human extrastriate cortex specialized for face perception Journal of Neuroscience, 1997
    264
  80. Nicolò Cesa-Bianchi, Yoav Freund, David Haussler, David P Helmbold, Robert E Schapire, Manfred K Warmuth
    How to use expert advice. Deeparnab Chakrabarty, Aranyak Mehta, and Vijay, 1997
    263
  81. R Hodrick, E Prescott
    Postwar U.S. business cycles: an empirical investigation J. Money Credit Bank, 1997
    260
  82. H J Kushner, G G Yin
    Stochastic approximation algorithms and applications Applications of Mathematics (New York, 1997
    260