Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. K BHARAT, M HENZINGER
    Improved Algorithms for Topic Distillation in a Hyperlinked Environment. In Proceedings of ACM SIGIR’98, 1998
    376
  2. OECD
    Employment Outlook 1998
    374
  3. Richard Blundell, Stephen Bond
    Initial Conditions and Moment Restrictions in Dynamic Panel Data Models Journal of Econometrics, 1998
    365
  4. D AND REITER MALKHI, M
    Byzantine quorum systems. Distrib. Comput, 1998
    363
  5. T Starner, A Pentland, J Weaver
    Real-time american sign language recognition using desk and wearable computer based video. IEEE Trans. Pattern Anal. Mach. Intell, 1998
    362
  6. O GOLDREICH, S GOLDWASSER, D RON
    Property testing and its connection to learning and approximation. J. ACM, 1998
    359
  7. S Thrun, D Fox, W Burgard
    A probabilistic approach to concurrent mapping and localization for mobile robots. Machine Learning, 1998
    359
  8. E L Lehmann, G Casella
    Theory of Point Estimation 1998
    358
  9. Chung Kei Wong, Mohamed Gouda, Simon S Lam
    Secure group communications using key graphs. in Proceedings of ACM SIGCOMM ’98, 1998
    355
  10. D Clark, W Fang
    Explicit allocation of best effort packet delivery service. IEEE/ACM Trans. Networking, 1998
    353
  11. Thom Frühwirth
    Theory and practice of constraint handling rules. Special Issue on Constraint Logic Programming, 1998
    348
  12. K Czajkowski, I T Foster, N T Karonis, C Kesselman, S Martin, W Smith, S Tuecke
    A Resource Management Architecture for Metacomputing Systems. in ‘Proceedings of the Workshop on Job Scheduling Strategies for Parallel Processing, 1998
    347
  13. J Carbonell, J Goldstein
    The use of MMR, diversity-based reranking for reordering documents and producing summaries. In Proc. of the Int’l ACM SIGIR Conf. on Research and Development in Information Retrieval, 1998
    346
  14. T Balch, R C Arkin
    Behavior-based formation control for multi-robot teams. IEEE Transactions on Robotics and Automation, 1998
    346
  15. M Frigo, S G Johnson
    FFTW: An adaptive software architecture for the FFT. In Proc. 1998 IEEE Intl. Conf. Acoustics Speech and Signal Processing, 1998
    344
  16. D Baraff, Witkin
    A.: Large steps in cloth simulation. In: Proceedings of ACM SIGGRAPH, 1998
    343
  17. L E Parker
    Alliance: An architecture for fault tolerant multi-robot cooperation. IEEE Trans. Robot. Automat, 1998
    342
  18. D J Wetherall, J V Guttag, D L Tennenhouse
    Ants: A toolkit for building and dynamically deploying network protocols. IEEE OpenArch, 1998
    338
  19. I Chlamtac S Basagni, V R Syrotiuk, B A Woodward
    A distance routing effect algorithm for mobility (dream in Proceedings of the IEEE/ACM international Conference on Mobile Computing and Networking (MOBICOM’98, 1998
    335
  20. G Hager, P Belhumeur
    Efficient region tracking with parametric models of geometry and illumination. IEEE Trans. on PAMI, 1998
    335
  21. I DaubechiesandW Sweldens
    Factoring wavelet transforms into lifting steps. J. Fourier Anal. Appl, 1998
    334
  22. B Liu, W Hsu, Y Ma
    Integrating Classification and Association Rule Mining. In Proceedings of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1998
    330
  23. Benny Chor, Eyal Kushilevitz, Oded Goldreich, Madhu Sudan
    Private information retrieval. CS06] [Efr09] [ER60] [Gas04] [GGR98] [KdW04] [KPS08] [KT00] Bernard Chazelle and, 1998
    329
  24. I L Dryden, K V Mardia
    Statistical shape analysis. 1998
    327
  25. D A Norman
    The invisible computer Nor02] Donald, 1998
    327
  26. N R Jennings, K Sycara, M Wooldridge
    A roadmap of agent research and development. Autonomous Agents and Multi-Agent Systems Journal, 1998
    326
  27. S Chakrabarti, B Dom, P Indyk
    Enhanced hypertext categorization using hyperlinks. In SIGMOD International Conference on Management of Data, 1998
    326
  28. T Lindeberg
    Feature detection with automatic scale selection. International Journal on Computer Vision, 1998
    325
  29. S Theodoridis, K Koutroumbas
    Pattern Recognition 1998
    325
  30. R Bayardo
    Efficiently mining long patterns from databases. In SIGMOD, 1998
    322
  31. C Bregler, J Malik
    Tracking people with twists and exponential maps. In Proc. IEEE Comput. Soc. Conf. Comput. Vision and Pattern Recogn, 1998
    319
  32. J Byers, M Luby, M Mitzenmacher, A Rege
    A Digital Fountain Approach to Reliable Distribution of Bulk Data. In Proceedings of ACM SIGCOMM ’98, 1998
    317
  33. J Shade, S Gortler, L He, R Szeliski
    Layered depth images. in Proceedings of the 25th annual conference on Computer graphics and interactive techniques. ACM, 1998
    316
  34. D POSADA, K A CRANDALL
    Modeltest: Testing the model of DNA substitution Bioinformatics, 1998
    313
  35. Collin Baker, Charles Fillmore, John Lowe
    The berkeley framenet project. In Proceedings of the COLING-ACL, 1998
    313
  36. G Bracha, M Odersky, D Stoutamire, P Wadler
    Making the future safe for the past: Adding genericity to the Java programming language. In OOPSLA, 1998
    310
  37. P Hájek
    Metamathematics of Fuzzy Logic 1998
    308
  38. Ben Shneiderman
    Designing the User Interface 1998
    306
  39. Kim Marriott, Peter J Stuckey
    Programming with Constraints: An Introduction 1998
    304
  40. J ANDERSON, C LEBIERE
    The Atomic Components of Thought 1998
    303
  41. T Jaakkola, D Haussler
    Exploiting generative models in discriminative classifiers. Eds.), Advances in Neural Information Processing System, 1998
    303
  42. S Singh, C S Raghavendra
    PAMAS - Power Aware Multi-Access Protocol with Signalling for Ad Hoc Networks. In Computer Communications Review, 1998
    301
  43. R Raman, M Livny, M Solomon
    Matchmaking: distributed resource management for high throughput computing. In Proc. HPDC, 1998
    298
  44. N Amenta, M Bern, M Kamvysselis
    A new voronoi-based surface reconstruction algorithm. In Proc. of the 25th Annual Conf. on Computer Graphics and Interactive Techniques, 1998
    297
  45. D Gibson, J Kleinberg, P Raghavan
    Inferring web communities from link topology. In ACM Con-ference on Hypertext and Hypermedia, 1998
    293
  46. J B A Maintz, M A Viergever
    A survey of medical image registration. Medical Image Analysis, 1998
    292
  47. van der Aalst
    W.M.: The Application of Petri Nets to Workflow Management. The Journal of Circuits, Systems and Computers, 1998
    290
  48. L C Evans
    Partial Differential Equations. 1998
    289
  49. N Jennings, M Wooldridge
    Applications of intelligent agents. In Agent Technology: Foundations, Applications and Markets, 1998
    289
  50. W Sweldens
    The lifting scheme: A construction of second generation wavelets. SIAM J. Math. Anal, 1998
    285
  51. M Craven, D DiPasquo, D Freitag, A McCallum, T Mitchell, K Nigam, S Slattery
    Learning to extract symbolic knowledge from the world wide web. 1998
    285
  52. D G Clarke, J M Potter, J Noble
    Ownership types for flexible alias protection. In Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA, 1998
    278
  53. E Horvitz, J Breese, D Heckerman, D Hovel, K Rommelse
    The Lumiere Project: Bayesian User Modeling for Inferring the Goals and Needs of Software Users. Proceedings of UAI, 1998
    277
  54. E F Fama
    Market efficiency, long-term returns, and behavioral finance. Journal of Financial Economics, 1998
    275
  55. Elan Amir, Steven McCanne, Randy Katz
    An active service framework and its application to real-time multimedia transcoding. ACM Computer Communication Review, 1998
    275
  56. O Zamir, O Etzioni
    Web document clustering: A feasibility demonstration. SIGIR, 1998
    274
  57. R G Rajan, L Zingales
    Financial dependence and growth. American Economic Review, 1998
    272
  58. David L Detlefs, K Rustan M Leino, Greg Nelson, James B Saxe
    Extended static checking. 1998
    272
  59. S Parsons, C Sierra, N R Jennings
    Agents that reason and negotiate by arguing. Journal of Logic and Computation, 1998
    272
  60. Sergey Brin
    Extracting patterns and relations from the world wide web. In Proc. of WebDB Workshop at 6th International Conference on Extending Database Technology, 1998
    272
  61. C P Gomes, B Selman, H Kautz
    Boosting combinatorial search through randomization. In Proceedings of National Conference on Artificial Intelligence, 1998
    270
  62. P J Phillips, H Wechsler, J Huang, P Rauss
    The FERET database and evaluation procedure for face-recognition algorithms Image and Vision Computing Journal, 1998
    267
  63. Y Wang, Q fan Zhu
    Error control and concealment for video communication: A review. in Proceedings of the IEEE, 1998
    267
  64. F J Provost, T Fawcett, R Kohavi
    The case against accuracy estimation for comparing induction algorithms. In Proceedings of the 15th International Conference on Machine Learning (ICML, 1998
    267
  65. Z J Haas, M R Pearlman
    The Zone Routing Protocol (ZRP) for ad hoc networks. IETF Internet draft, 1998
    267
  66. C Labovitz, R Malan, F Jahanian
    Internet Routing Instability. IEEE/ACM Trans. Networking, 1998
    267
  67. V S Pai, M Aron, G Banga, M Svendsen, P Druschel, W Zwaenepoel, E Nahum
    Locality-aware request distribution in cluster-based network servers. SIGPLAN Not, 1998
    266
  68. C Darwin
    On the origin of species 1998
    264
  69. W Lee, S Stolfo
    Data mining approaches for intrusion detection. In USENIX Security Symposium, 1998
    263
  70. D Lewis
    Naive (bayes) at forty: The independence assumption in information retrieval. Lecture Notes in Computer Science, 1998
    261
  71. D Black, M Carlson, E Davies, Z Wang, W Weiss
    An Architecture for Differentiated Services,” RFC 2475 1998
    261
  72. Paul Debevec
    Rendering synthetic objects into real scenes: Bridging traditional and image-based graphics with global illumination and high dynamic range photography. In Proceedings of SIGGRAPH 98, Computer Graphics Proceedings, Annual Conference Series, 1998
    261
  73. J Nonnenmacher, E W Biersack, D Towsley
    ParityBased Loss Recovery for Reliable Multicast Trasmission. IEEE/ACM Transactions on Networking (TON, 1998
    261
  74. C TOUMA
    GOTSMAN C.: Triangle mesh compression In Graphics Interface Conference Proceedings, 1998
    260
  75. C Cardoso, “Blind
    signal separation: statistical principles. Proceedings of the IEEE, 1998
    259
  76. M N NELSON, B B WELCH, J K OUSTERHOUT
    Caching in the Sprite network file system. ACM Trans. Comput. Syst, 1998
    258
  77. M J F Gales
    Maximum Likelihood Linear Transformations for HMM-Based Speech Recognition. Computer Speech and Language, 1998
    258
  78. Z Zhang
    Determining the epipolar geometry and its uncertainty: A review. International Journal of Computer Vision, 1998
    258
  79. World Wide
    Web Consortium, “Extensible markup language (xml 1.0, Rec. REC-xml19980210, 1998
    257
  80. J H Conway, N J Sloane
    Sphere packings, lattices and groups 1998
    257
  81. Hinrich Schütze
    Automatic word sense discrimination. Computational Linguistics, 1998
    256
  82. P N Belhumeur, D J Kriegman
    What is the set of images of an object under all possible illumination conditions. International Journal of Computer Vision (IJCV, 1998
    256
  83. W W Cohen, R E Schapire, Y Singer
    Learning to order things. In Proceedings of the 1997 conference on Advances in neural information processing systems 10 table of contents, 1998
    256
  84. Todd M Austin
    DIVA: A Reliable Substrate for Deep Submicron Microarchitecture Design. In Proceedings of the International Symposium on Microarchitecture, 1998
    254
  85. D A Cox, J B Little, O’Shea
    D.: Using Algebraic Geometry Graduate Texts in Mathematics, Number 185, 1998
    253