Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. D LIN
    Dependency-based evaluation of MINIPAR In Proceedings of the Workshop on the Evaluation of Parsing Systems, 1998
    253
  2. M S Crouse, R D Nowak, R G Baraniuk
    Wavelet-based statistical signal processing using hidden Markov models. IEEE Trans. Signal Processing, 1998
    252
  3. S Abiteboul, O M Duschka
    Complexity of answering queries using materialized views. In PODS, 1998
    252
  4. S CHAKRABARTI, B DOM, D GIBSON, J KLEINBERG, P RAGHAVAN, S RAJAGOPALAN
    Automatic resource compilation by analyzing hyperlink structure and associated text. In Proceedings of the International/World Wide Web Conference (WWW, 1998
    250
  5. Nicholas Barberis, Shleifer, Vishny
    A model of investor sentiment. Journal of Financial Economics, 1998
    249
  6. T Sander, C F Tschudin
    Protecting Mobile Agents Against Malicious Hosts. Agents and Security, Springer LNCS 1419, 1998
    249
  7. D Mosberger, T Jin
    httperf – A Tool for Measuring Web Server Performance. In Proceedings of the SIGMETRICS Workshop on Internet Server Performance, 1998
    249
  8. T Ishihara, H Yasuura
    Voltage scheduling problem for dynamically variable voltage processors. In Proc. Int. Symp. Low Power Electronics & Design, 1998
    246
  9. J Cho, H Garcia-Molina, L Page
    Efficient Crawling Through URL Ordering. Seventh International World-Wide Web Conference, 1998
    246
  10. S A Hofmeyr, S Forrest, A Somayaji
    Intrusion detection using sequences of system calls. Journal of Computer Security, 1998
    244
  11. M GLEICHER
    Retargeting motion to new characters In Proceedings of ACM SIGGRAPH, 1998
    244
  12. C Claus, C Boutilier
    The dynamics of reinforcement learning in cooperative multiagent systems. In Proceedings of the Fifteenth National Conference on Artificial Intelligence, 1998
    243
  13. George C Necula, Peter Lee
    The design and implementation of a certifying compiler. In Proceedings of PLDI, 1998
    243
  14. R RAZ
    A parallel repetition theorem. SIAM J. Comput, 1998
    241
  15. R J McEliece, D J C MacKay, J F Cheng
    Turbo decoding as an instance of Pearl’s belief propagation algorithm. IEEE J. Selected Areas in Communication, 1998
    240
  16. L KOBBELT, S CAMPAGNA, J VORSATZ, H-P SEIDEL
    Interactive multi-resolution modeling on arbitrary meshes. In Proceedings of ACM SIGGRAPH, 1998
    240
  17. T Narten, H Alvestrand
    Guidelines for Writing an IANA Considerations Section in RFCs, 1998
    240
  18. L Blum, F Cucker, M Shub, S Smale
    Complexity and Real Computation Object-OrientedSoftware Engineering: Using UML, Patterns and Java. Prentice–Hall, Upper Saddle River, 1998
    240
  19. T K Ho
    The random subspace method for constructing decision forests. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1998
    240
  20. R T Ng, L V S Lakshmanan, J Han, A Pang
    Exploratory mining and pruning optimizations of constrained association rules. In SIGMOD, 1998
    238
  21. R RASKAR, G WELCH, M CUTTS, A LAKE, L STESIN, H FUCHS
    The office of the future : A unified approach to image-based modeling and spatially immersive displays. In SIGGRAPH Conference Proceedings, 1998
    237
  22. M Hayden
    The Ensemble System 1998
    237
  23. J Hu, M P Wellman
    Multiagent Reinforcement Learning: Theoretical Framework and an Algorithm. in Proceedings of the International Conference on Machine Learning (ICML-98, 1998
    236
  24. M FLATT, S KRISHNAMURTHI, M FELLEISEN
    Classes and mixins. In Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages. POPL ’98. ACM, 1998
    236
  25. M Isard, A Blake
    CONDENSATION—Conditional Density Propagation for Visual Tracking Int’l J. Computer Vision, 1998
    235
  26. T A Henzinger, P W Kopke, A Puri, P Varaiya
    What’s decidable about hybrid automata. Journal of Computer and System Sciences, 1998
    234
  27. Christopher M Bishop, Markus Svensén, Christopher K I Williams
    GTM: the generative topographic mapping. Neural Computation, 1998
    233
  28. P Faratin, C Sierra, N Jennings
    Negotiation decision functions for autonomous agents. Robotics and Autonomous Systems, Vol, 1998
    233
  29. M Frigo, C E Leiserson, K H Randall
    The Implementation of the Cilk-5 Multithreaded Language. In Proc. of PLDI,pages 212–223, 1998
    232
  30. Wolfgang Banzhaf, Peter Nordin, Robert E Keller, Frank D Francone
    Genetic Programming – An Introduction 1998
    231
  31. Y Rubner, C Tomasi, L Guibas
    A Metric for Distributions with Applications To Image Databases. In Proceedings of the IEEE ICCV, 1998
    231
  32. O Shehory, S Kraus
    Methods for task allocation via agent coalition formation. Artificial Intelligence, 1998
    230
  33. D Gross, C M Harris
    Fundamentals of Queueing Theory Wiley Series in Probability and Statistics, Wiley-Interscience, 1998
    230
  34. N Fenton, S L Pfleeger
    Software Metrics: A rigorous approach 1998
    230
  35. M Rabin
    Psychology and economics. Journal of Economic Literature, 1998
    229
  36. R J Anderson, F A P Petitcolas
    On The Limits of Steganography. IEEE Journal of Selected Area in Communications, 1998
    229
  37. A Barron, J Rissanen, B Yu
    The Minimum Description Length Principle in Coding and Modeling IEEE Transactions on Information Theory, 1998
    229
  38. E S Raymond
    The cathedral and the bazaar First Monday, 1998
    228
  39. R Cho, M Campbell, E Winzeler, L Steinmetz, A Conway, L Wodicka, T Wolfsberg, A Gabrielian, D Landsman, D Lockhart, R Davis
    A genome-wide transcriptional analysis of the mitotic cell cycle. Molecular Cell 1998
    228
  40. L Breiman
    Arcing classifiers. Annals of Statistics, 1998
    227
  41. G Taubin, J Rossignac
    Geometric compression through topological surgery. in Proceedings of the 25th Annual Conference on Computer Graphics and Interactive Techniques (SIGGRAPH ’98, 1998
    227
  42. I Horrocks
    Using an expressive description logic: FaCT or fiction. Principles of Knowledge Representation and Reasoning. Proceedings of the Sixth International Conference (KR'98, 1998
    227
  43. M Yokoo, E H Durfee, T Ishida, K Kuwabara
    The distributed constraint satisfaction problem: Formalization and algorithms. IEEE Transactions on Knowledge and DATA Engineering, 1998
    226
  44. T H Davenport
    Putting the Enterprise into the Enterprise System Harvard Business Review, 1998
    225
  45. S Manne, A Klauser, D Grunwald
    Pipeline gating: speculation control for energy reduction. In Int’l Symp. Computer Architecture, 1998
    225
  46. T Pering, T Burd, R Brodersen
    The Simulation and Evaluation of Dynamic Voltage Scaling Algorithms. Proceedings of International Symposium on Low Power Electronics and Design, 1998
    225
  47. C ROSE, M F COHEN, B BODENHEIMER
    Verbs and adverbs: Multidimensional motion interpolation. In IEEE Computer Graphics and Applications, 1998
    224
  48. E D Scheirer
    Tempo and beat analysis of acoustic musical signals Journal of Acoustic Society of America, 1998
    224
  49. P W Wolniansky, G J Foschini, G D Golden, R A Valenzuela
    VBLAST: An architecture for realizing very high data ra tes over the rich-scattering wireless channel. in Proc. URSI Int. Symp. Signals, Systems and Electronics, 1998
    223
  50. N Garg, J Könemann
    Faster and simpler algorithms for multicommodity ow and other fractional packing problems. In FOCS'98: Proceedings of the 39th Annual IEEE Symposium on Foundations of Computer Science, 1998
    223
  51. Xavier Boyen, Daphne Koller
    Tractable inference for complex stochastic processes. In Proc. Conference on Uncertainty in Artificial Intelligence (UAI, 1998
    222
  52. J-A Meyer, P Husbands, I Harvey
    Evolutionary Robotics: A. Survey of Applications and Problems. Eighth European Workshop on Learning Robots, 1998
    221
  53. K Hirai
    The development of Honda humanoid robot Proceedings of the IEEE International Conference on Robotics and Automation, 1998
    221
  54. F A P Petitcolas, R J Anderson, M G Kuhn
    Attacks on copyright marking systems. Information Hiding, Second International Workshop, IH ˇ S98, 1998
    221
  55. John K Ousterhout
    Scripting: Higher-level programming for the 21st century. IEEE Computer, 1998
    221
  56. D Boneh, J Shaw
    Collusion-secure fingerprinting for digital data. IEEE Transaction on Information Theory, 1998
    219
  57. C Shapiro, H Varian
    Information Rules 1998
    219
  58. I D Baxter, A Yahin, L Moura, M Sant'Anna, L Bier
    Clone Detection Using Abstract Syntax Trees. ICSM '98. 1998
    219
  59. J Hofbauer, K Sigmund
    Evolutionary Games and Population Dynamics 1998
    219
  60. D Florescu, A Levy, A Mendelzon
    Database techniques for the World-Wide Web: a survey. SIGMOD Rec, 1998
    219
  61. P CIGNONI, C ROCCHINI, R Metro SCOPIGNO
    Measuring error on simplified surfaces. Computer Graphics Forum, 1998
    218
  62. R Westermann, T Ertl
    Efficiently using graphics hardware in volume rendering applications In Proceedings of SIGGRAPH 1998, 1998
    217
  63. K Karplus, C Barrett, R Hughey
    Hidden Markov Models for detecting remote protein homologies. Bioinformatics, 1998
    217
  64. D Calvanese, G De Giacomo, M Lenzerini
    On the decidability of query containment under constraints. In PODS, 1998
    217
  65. Yair Bartal
    On approximating arbitrary metrices by tree metrics. In STOC’98: Proceedings of the 30th Annual ACM Symposium on Theory of Computing, 1998
    217
  66. G Caire, G Taricco, E Biglieri
    Bit-Interleaved Coded Modulation IEEE Transactions on Information Theory, 1998
    217
  67. Kenneth L Judd
    Numerical Methods in Economics 1998
    216
  68. J H VAN HATEREN, A VAN DER SCHAAF
    Independent component filters of natural images compared with simple cells in primary visual cortex. Proceedings of the Royal Society B, 1998
    216
  69. Michael Reed, Paul Syverson, David Goldschlag
    Anonymous connections and onion routing. In IEEE Journal on Selected Areas in Communication Special Issue on Copyright and Privacy Protection, 1998
    215
  70. N Heintze, J G Riecke
    The SLam calculus: programming with secrecy and integrity. In Principles of Programming Languages (POPL ’98, 1998
    213
  71. S Guha, S Khuller
    Approximation algorithms for connected dominating sets. Algorithmica, 1998
    213
  72. S Birchfield
    Elliptical head tracking using intensity gradients and color histograms. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR, 1998
    212
  73. P Wurman, M Wellman, W Walsh
    The Michigan Internet AuctionBot: A configurable auction server for human and software agents”, The second international conference. on Autonomous agents, Minneapolis – MN – USA, 1998
    212
  74. J D Salehi, Z Zhang, J Kurose, D Towsley
    Supporting stored video: reducing rate variability and end-to-end resource requirements through optimal smoothing. IEEE/ACM Trans. on Networking, 1998
    211
  75. J H Van Lint
    Introduction to Coding Theory 1998
    211
  76. S Kent, R Atkinson
    Security Architecture for the Internet Protocol,” RFC 2401, 1998
    211
  77. M Reichert, P Dadam
    ADEPT flex - supporting dynamic changes of workflows without losing control. Journal of Intelligent Information Systems, 1998
    210
  78. H L Bodlaender
    A partial k-arboretum of graphs with bounded treewidth. Theor. Comput. Sci, 1998
    209
  79. N R Jennings, S Parsons, P Noriega, C Sierra
    On argumentation-based negotiation. In Proceedings of the International Workshop on Multi-Agent Systems, 1998
    208
  80. C P Papageorgiou, M Oren, T Poggio
    A general framework for object detection in Proc. IEEE Int. Conf. Comput. Vis, 1998
    208
  81. J H Holland
    Emergence: From Chaos to Order 1998
    207
  82. J Greggory Steffan, Todd C Mowry
    The potential for using thread-level data speculation to facilitate automatic parallelization. In Proc. of the 4th International Symposium on High-Performance Computer Architecture, 1998
    207
  83. J Nathapied, S Ghoshal
    Social capital, intellectual capital and the organizational advantage Academy of Management Review, 1998
    207
  84. Terrance Odean
    Are investors reluctant to realize their losses. Journal of Finance, 1998
    205