Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. Hinrich Schutze
    Automatic word sense discrimination. Computational Linguistics, 1998
    411
  2. J Byers, M Luby, M Mitzenmacher, A Rege
    Digital fountain approach to reliable distribution of bulk data. In ACM SIGCOMM’98, 1998
    408
  3. J Shade, S Gortler, L-W He, R Szeliski
    Layered depth images. Computer Graphics, 1998
    406
  4. S Chakrabarti, B Dom, P Indyk
    Enhanced hypertext categorization using hyperlinks. In SIGMOD, 1998
    406
  5. J R Anderson, C Lebiere
    The Atomic Components of Thought 1998
    405
  6. L Arnold
    Random Dynamical Systems 1998
    405
  7. Roberto J Bayardo
    Jr.: Efficiently Mining Long Patterns from Databases. SIGMOD Conference, 1998
    403
  8. P J Phillips, H Wechsler, J Huang, P J Rauss
    The FERET database and evaluation procedure for face-recognition algorithm Image and Vision Computing, 1998
    398
  9. T K Ho
    ªThe Random Subspace Method for Constructing Decision Forests,º. IEEE Trans. Pattern Analysis and Machine Intelligence, 1998
    393
  10. W W Chin
    The partial least squares approach to structural equation modeling In Modern Methods for Business Research edited by George A. Marcoulides, 295–336. Mahwah, 1998
    391
  11. R J Cho, M J Campbell, E A Winzeler, L Steinmetz, A Conway, L Wodicka, T G Wolfsberg, A E Gabrielian, D Landsman, D J Lockhart, R W Davis
    A genome-wide transcriptional analysis of the mitotic cell cycle. Mol. Cell 2:65–73 1998
    391
  12. D Filmer, L Pritchett
    Estimating wealth effects without expenditure data - or tears: an application to educational enrolments. in states of India. Policy Research Working Paper No. 1 994, World, 1998
    389
  13. B Shneiderman
    Designing the User Interface 1998
    387
  14. C Bregler, J Malik
    Tracking people with twists and exponential maps. In Computer Vision and Pattern Recognition, 1998
    386
  15. S Blade, D Black, M Carlson, E Davies, Z Wang, W Weiss
    An Architecture for Differentiated Services", RFC2475 1998
    386
  16. T M Cover
    Comments on broadcast channels. IEEE Trans. Inf. Theory, 1998
    383
  17. T H Davenport, L Prusak
    Working Knowledge. 1998
    379
  18. Kim Marriott, Peter J Stuckey
    Programming with Constraints: An Introduction 1998
    379
  19. R Ramaswami, K Sivarajan
    Optical networks. A practical perspective 1998
    378
  20. D J Wetherall, J V Guttag, D L Tennehouse
    ANTS: a Toolkit for Building and Dynamically Deploying Network Protocols. In IEEE OPENARCH’98, 1998
    377
  21. T G Andersen, Bollerslev Tim
    Answering the Skeptics: Yes, Standard Volatility Models Do Provide Accurate Forecasts. International Economic Review, 1998
    376
  22. R Raman, M Livny, M Solomon
    Matchmaking: Distributed resource management for high throughput computing. In: Proceedings of the Seventh IEEE International Symposium on High Performance Distributed Computing, 1998
    376
  23. M Isard, A Blake
    Condensation-Conditional Density Propagation for Visual Tracking Int’l J. Computer Vision, 1998
    374
  24. D G Kleinbaum, L L Kupper, K E Muller, A Nizam
    Applied regression analysis and other multivariate methods (3 rd ed 1998
    374
  25. H E Pashler
    The psychology of attention 1998
    373
  26. D Cox, J Little, D O’Shea
    Using Algebraic Geometry 1998
    372
  27. SofroSaul Lach Clerides, James Tybout
    Is learning by exporting important? Micro-dynamic evidence from Colombia, Mexico and Morocco, Quarterly Journal of Economics, 1998
    371
  28. L Blum, F Cucker, M Shub, S Smale
    Complexity and Real Computation 1998
    371
  29. D Gibson, J M Kleinberg, P Raghavan
    Inferring web communities from link topology. In UK Conference on Hypertext, 1998
    371
  30. N Amenta, M Bern, M Kamvysselis
    A New Voronoi-based Surface Reconstruction. In SIGGRAPH 98, 1998
    371
  31. I Nonaka, N Konno
    The Concept of "Ba": Building a Foundation for Knowledge Creation California Management Review, 1998
    369
  32. Donald M Topkis
    Supermodularity and complementarity 1998
    369
  33. Sergey Brin
    Extracting patterns and relations from the World Wide Web. In Proceedings of the WebDB Workshop at the 6th International Conference on Extending Database Technology (EDBT, 1998
    369
  34. D Rousseau, M Sitkin, S B, R S Burt, C Camerer
    Not so Different after all: A Cross-discipline View of Trust Academy of Management Review, 1998
    368
  35. N JENNINGS, M WOOLRIDGE
    Applications of Intelligent Agents. Westfield College. University of London, UK, 1998
    366
  36. S Chu, J DeRisi, M Eisen, J Mulholland, D Botstein
    The transcriptional program of sporulation in budding yeast. Science 282: 699. 1998
    364
  37. L Vicisano, L Rizzo, J Crowcroft
    Tcp-like congestion control for layered multicast data transfer. In IEEE INFOCOM’98, 1998
    363
  38. J H Holland
    Emergence, From Chaos to Order 1998
    362
  39. Tim Coelli, D S Prasada Rao, George E Battese
    An Introduction to Efficiency and Productivity Analysis 1998
    361
  40. E S Raymond
    The Cathedral and the Bazaar First Monday, 1998
    361
  41. M Frigo, C Leiserson, K Randall
    The implementation of the cilk-5 multithreaded language. In SIGPLAN Conference on Programming Language Design and Implementation, 1998
    360
  42. G Bracha, M Odersky, D Stoutamire, P Wadler
    Making the future safe for the past: adding genericity to the Java programming language. In OOPSLA ’98, 1998
    359
  43. O Zamir, O Etzioni
    Web Document Clustering: A Feasibility Demonstration. in Proc. 21st Annu. Int. ACM SIGIR Conf, 1998
    359
  44. C Torrance, C T Compo
    A practical guide to wavelet analysis. Bulletin of the American Meteorological Society, 1998
    357
  45. N Amenta, M Bern
    Surface Reconstruction by Voronoi Filtering. 14th ACM Symposium on computational Geometry, 1998
    357
  46. P Debevec
    Rendering Synthetic Objects Into Real Scenes: Bridging Traditional and Image-Based Graphics With Global Illumination and High Dynamic Range. Photography”, Proceedings of SIGGRAPH 98, Computer Graphics Proceedings, Annual Conference Series, 1998
    357
  47. C E Snow, M S Burns, P Griffin
    Preventing reading difficulties in young children 1998
    353
  48. I Kant
    Critique of pure reason 1998
    353
  49. T Ishihara, H Yauura
    Voltage scheduling problem for dynamically variable voltage processors. In Proc. of The International Symposium on Low Power Electronics and Design, 1998
    353
  50. J R NORRIS
    Markov Chains 1998
    353
  51. A Demers, S Keshav, S Shenker
    Analysis and simulation of a fair queuing algorithm Proceedings of ACM SIGCOMM 1998, Conference on Applications, Technologies, Architectures and Protocols for Computer Communication, 1998
    351
  52. A Odabasioglu, M Celik, L T
    Pillage, “PRIMA: passive reduced-order interconnect macromodeling algorithm IEEE Trans. on CAD, 1998
    351
  53. F Provost, R Kohavi, T Fawcett
    The case against accuracy estimation for comparing induction algorithms. In Proceedings of ICML-98, 1998
    351
  54. W Lee, S J Stolfo
    Data Mining Approaches for Intrusion Detection. In Proceedings of the 7th USENIX Security Symposium, 1998
    350
  55. J P Nataro, J B Kaper
    Diarrheagenic Escherichia coli Clin. Microbiol. Rev, 1998
    348
  56. B N Holben, T F Eck, I Slutsker, D Tanré, J P Buis, A Setzer, E Vermote, J A Reagan, Y Kaufman, T Nakajima, F Lavenu, I Jankowiak, A Smirnov
    AERONET - A federated instrument network and data archive for aerosol characterization 1998
    348
  57. D Clarke, J M Potter, J Noble
    Ownership types for flexible alias protection. In OOPSLA, 1998
    348
  58. http research microsoft comhorvitzvista htm Horvitz, E Breese, J S Heckerman, D Hovel, D Rommelse, K
    The Lumiere Project: Bayesian user modeling for inferring the goals and needs of software users. Fourteenth Conference on Uncertainty in Artificial Intelligence, 1998
    345
  59. J C Scott
    Seeing Like a State. How Certain Schemes to Improve the Human Condition Have Failed Yale Agrarian Studies Series. New Haven and London, 1998
    343
  60. A M Martinez, R Benavente
    The AR face database 1998
    343
  61. R G Allen, L S Pereira, D Raes, M Smith
    Crop evapotranspiration: Guidelines for computing crop water requirements FAO Irrigation and Drainage Paper No. 56. Food and Agriculture Organization of the United Nations, 1998
    342
  62. Bob G Witmer, Michael J Singer
    Measuring Presence in Virtual Environments: A Presence Questionnaire. Presence, Teleoperators, and Virtual Environments, 1998
    342
  63. R J McEliece, D J C MacKay, J Cheng
    Turbo decoding as an instance of Pearl’s belief propagation algorithm. IEEE J. Select. Areas Comm, 1998
    340
  64. Brian J Hall, Jeffrey B Leibman
    Are CEOs Really Paid Like Bureaucrats?” Quarterly Journal of Economics, 1998
    338
  65. B Holmström, J Tirole
    Private and Public Supply of Liquidity Journal of Political Economy, 1998
    338
  66. M S Crouse, R D Nowak, R G Baranuik
    WaveletBased Statistical Signal Processing Using Hidden Markov Models. IEEE Trans. on Signal Proc, 1998
    338
  67. S Morris, H Shin
    Unique Equilibrium in a Model of SelfFulfilling Currency Attacks American Economic Review, 1998
    334
  68. Y Rubner, C Tomasi, L J Guibas
    A metric for distributions with applications to image databases. in ICCV ’98: Proceedings of the Sixth International Conference on Computer Vision, 1998
    334
  69. R J Anderson, F A P Petitcolas
    On The Limits of Steganography. IEEE journal of selected areas in communications, 1998
    333
  70. A Mack, I Rock
    Inattentional blindness 1998
    330
  71. C P Gomes, B Selman, H Kautz
    Boosting combinatorial search through randomization. In Proceedings of the National Conference on Artificial Intelligence, 1998
    329
  72. Rev
    private communication C, 1998
    328
  73. G Rudebush, L Svensson
    Policy rules for inflation targeting. National Bureau of Economics Research Working Paper, 1998
    328
  74. J Platt
    Sequential minimal optimization: A fast algorithm for training support vector machines. Advances in Kernel Methods - Support Vector Learning. JLCL Gu et al, 1998
    328
  75. E D Scheirer
    Tempo and beat analysis of acoustic musical signals J. Acoust. Soc. Am, 1998
    328
  76. S Parsons, C Sierra, N Jennings
    Agents that reason and negotiate by arguing. Journal of Logic and Computation, 1998
    328