Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. G Abowd, E Mynatt
    Charting past, present and future research in ubiquitous computing. Interaction, Special Issue on HCI in the new Millennium, 2000
    272
  2. W Aiello, F Chung, L Lu
    A Random Graph Model for Massive Graphs. In STOC ’00, 2000
    272
  3. Yizong Cheng, George M Church
    Biclustering of expression data. In ISMB-2000, 2000
    272
  4. Keith Cheverst, Nigel Davies, Keith Mitchell, Adrian Friday, Christos Efstratiou
    Developing a context-aware electronic tourist guide: some issues and experiences. In Proc. SIGCHI’00, 2000
    272
  5. M Altinel, M J Franklin
    Efficient Filtering of XML Documents for Selective Dissemination of Information. In Proc. Intl. Conf. on Very Large Database (VLDB, 2000
    269
  6. B TRIGGS, P MCLAUCHLAN, R HARTLEY, FITZGIBBON
    A.: Bundle adjustment – A modern synthesis. In Vision Algorithms: Theory and Practice, Triggs W., Zisserman A., Szeliski R., (Eds.), LNCS, 2000
    268
  7. K Havelund, T Pressburger
    Model checking Java programs using Java PathFinder. International Journal on Software Tools for Technology Transfer (STTT, 2000
    266
  8. K Sohrabi, J Gao, V Ailawadhi, G J Pottie
    Protocols for Self-Organization of a Wireless Sensor Network. IEEE Personal Communications, 2000
    265
  9. E Hairer, S P Nørsett, G Wanner
    Solving Ordinary Differential Equations I: Nonstiff Problems Series in Computational Mathematics v, 2000
    264
  10. V AGARWAL, M S HRISHIKESH, S W KECKLER, D BURGER
    Clock rate versus ipc: the end of the road for conventional microarchitectures. SIGARCH Comput. Archit. News, 2000
    263
  11. M Grundy, W Lin, D Cristianini, N Sugnet, C Furey, T Ares, M, D Haussler
    Knowledge-based analysis of microarray gene expression data by using support vector machines. Proceedings of the National Academy of Sciences 97, 2000
    263
  12. R R Stewart, Q Xie, K Morneault, C Sharp, H J Schwarzbauer, T Taylor, I Rytina, M Kalla, L Zhang, V Paxson
    Stream control transmission protocol,” Internet Draft 2000
    262
  13. L de Alfaro, T A Henzinger
    Interface Automata. In IWSSD ’00: Proceedings of the 10th International Workshop on Software Specification and Design, 2000
    262
  14. B Sarwar, G Karypis, J Konstan
    Riedl J: Analysis of Recommendation Algorithms for E-Commerce. In Proceedings of ACM E-Commerce, 2000
    262
  15. E Agichtein, L Gravano
    Snowball: extracting relations from large plain-text collections. In Proc. 2000 ACM conf. on Digital libraries (DL ’00, 2000
    261
  16. Christopher Pissarides
    Equilibrium Unemployment Theory 2000
    258
  17. A Abdul-Rahman, S Hailes
    Supporting trust in virtual communities. Hawaii International Conference on System Sciences, 6:6007, 2000
    257
  18. N M Oliver, B Rosario, Pentland
    A.P.: Bayesian computer vision system for modeling human interactions. IEEE Trans. PAMI, 2000
    256
  19. Bernard Fortz, Mikkel Thorup
    Internet traffic engineering by optimizing OSPF weights. In Proc. IEEE INFOCOM, 2000
    256
  20. G Păun
    Computing with membranes. ISSN 0022-0000. URL http://portal.acm.org/ citation.cfm?id=353298.353304, 2000
    254
  21. William J Bolosky, John R Douceur, David Ely, Marvin Theimer
    Feasibility of a serverless distributed file system deployed on an existing set of desktop pcs In SIGMETRICS, 2000
    253
  22. M Bertalmio, G Sapiro, V Caselles, C Ballester
    Image inpainting. in SIGGRAPH: ACM Special Interest Group on Computer Graphics and Interactive Techniques, 2000
    251
  23. H Sidenbladh, M J Black, D J Fleet
    Stochastic Tracking of 3D Human Figures Using 2D Image Motion. Proceedings of the 6th European Conference on Computer Vision (ECCV), Part II, 2000
    250
  24. H PFISTER, M ZWICKER, J VAN BAAR, M GROSS
    Surfels: surface elements as rendering primitives. In Computer graphics and interactive techniques, SIGGRAPH’00, 2000
    250
  25. B A Nardi, S Whittaker, E Bradner
    Interaction and outeraction: Instant messaging in action. Proceedings of CSCW 2000, 2000
    248
  26. P Carns, Ligon IW, R Ross, R Thakur
    PVFS: A parallel file system for Linux clusters. 2000
    248
  27. O Alter, P O Brown, D Bostein
    Singular value decomposition for genome-wide expression data processing and modeling Proc. Natl. acad.sci. USA, 2000
    248
  28. M Bellare, D Pointcheval, P Rogaway
    Authenticated Key Exchange Secure Against Dictionary Attacks. In EUROCRYPT 2000, volume 1807/2000 of LNCS, 2000
    246
  29. Richard S Sutton, David McAllester, Satinder P Singh, Yishay Mansour
    Policy gradient methods for reinforcement learning with function approximation. In Advances in Neural Information Processing Systems, Proceedings of the 13th Neural Information Processing Systems Conference (NIPS’1999, 2000
    243
  30. Paul Debevec, Tim Hawkins, Chris Tchou, Haarm-Pieter Duiker, Westley Sarokin, Mark Sagar
    Acquiring the reflectance field of a human face In Proceedings of ACM SIGGRAPH 2000, Computer Graphics Proceedings, Annual Conference Series, 2000
    240
  31. Robert E Filman, Daniel P Friedman
    Aspect-oriented programming is quantification and obliviousness. 2000
    239
  32. J Padhye, D Towsley, V Firoiu, J Kurose
    Modeling TCP Reno performance: a simple model and its empirical validation. IEEE/ACM Transactions on Networking, 2000
    239
  33. J J Kuffner, S M LaValle
    RRT-Connect: An Efficient Approach to Single-Query Path Planning In Proc. IEEE Int. Conf. Robot. Autom. (ICRA, 2000
    237
  34. Koen Claessen, John Hughes
    Quickcheck: A lightweight tool for random testing of Haskell programs. In Proceedings of the fifth ACM SIGPLAN international conference on Functional programming, 2000
    236
  35. J Bransford, A Brown, R Cocking
    How people learn National Academy Press, 2000
    235
  36. F Cali, M Conti, E Gregori
    Dynamic Tuning of the IEEE 802.11 Protocol to Achieve a Theoretical Throughput Limit. IEEE/ACM Transactions on Networking, 2000
    234
  37. F, F Kabanza
    Using temporal logics to express search control knowledge for planning. Artificial Intelligence, 2000
    233
  38. R E Levine, N Loayza, T Beck
    Financial Intermediation and Growth: Causality and Causes. Journal of Monetary Economics, 2000
    233
  39. O Kupferman, M Y Vardi, Wolper
    P.: An automata-theoretic approach to branching-time model checking. Journal of the ACM, 2000
    232
  40. Benjamin C Pierce, David N Turner
    Pict: A programming language based on the pi-calculus. In Proof, Language and Interaction: Essays in Honour of Robin Milner, 2000
    231
  41. D Duffie, J Pan, K Singleton
    Transform analysis and asset pricing for affine jumpdiffusions. Econometrica, 2000
    229
  42. M E Leventon, W E L Grimson, O Faugeras
    Statistical shape influence in geodesic active contours. Hilton Head Island, SC, 2000
    227
  43. Jakob Nielsen
    Designing Web Usability 2000
    227
  44. C J Erceg, D W Henderson, A T Levin
    Optimal Monetary Policy with Staggered Wage and Price Contracts Journal of Monetary Economics, 2000
    226
  45. M Kaufmann, P Manolios, J S Moore
    Computer-Aided Reasoning: An Approach 2000
    226
  46. J Cassell, J Sullivan, E Churchill
    Embodied Conversational Agents 2000
    226
  47. R Plamondon, S N Srihari
    On-line and off-line handwriting recognition: A comprehensive survey IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000
    225
  48. R Neal
    Markov chain sampling methods for Dirichlet process mixture models. Journal of Computational and Graphical Statistics, 2000
    223
  49. D Pointcheval, J Stern
    Security arguments for digital signatures and blind Signatures. International Journal of Computer Science and Security Volume(4): Issue(1). 105 Rao, K.A.Ajmath, P.Vasudeva Reddy & T.Gowri, 2000
    220
  50. John L Henning
    SPEC CPU2000: Measuring CPU Performance in the New Millennium IEEE Computer, 2000
    219
  51. Barry Brumitt, Brian Meyers, John Krumm, Amanda Kern, Steven Shafer
    EasyLiving: Technologies for Intelligent Environments”, Microsoft Research. HUC 2000, LNCS 1927, 2000
    217
  52. C Flanagan, S N Freund
    Type-Based Race Detection for Java. In PLDI, 2000
    216
  53. S Guha, N Mishra, R Motwani, L O’Callaghan
    Clustering data streams. In 41st Symposium on Foundations of Computer Science (FOCS’00). IEEE Computer Society, 2000
    216
  54. G Bekaert, C R Harvey
    Foreign speculators and emerging equity markets. Journal of Finance, 2000
    215
  55. R Herbrich, T Graepel, K Obermayer
    Large margin rank boundaries for ordinal regression In Advances in Large Margin Classifiers, 2000
    213
  56. S Thrun, W Burgard, D Fox
    A real-time algorithm for mobile robot mapping with applications to multi-robot and 3d mapping. In IEEE International Conference on Robotics and Automation, 2000
    212
  57. W MATUSIK, C BUEHLER, R RASKAR, S J GORTLER, L MCMILLAN
    Image-based visual hulls. SIGGRAPH, 2000
    212
  58. K Tieu, P Viola
    Boosting image retrieval. In Proceedings ieee conf. on, 2000
    211
  59. “A A Joux
    one round protocol for tripartite diffie-Hellman In proc.of ANTS-IV, LNCS 1838, pp.385394, 2000
    211
  60. W Johnson, J Rickel, J Lester
    Animated Pedagogical Agents: Face-to-Face Interaction in Interactive Learning Environments. Int. J. Artif. Int. Educ, 2000
    211
  61. S Dumais, H Chen
    Hierarchical classification of Web content. In Proceedings of the 23rd annual international ACM SIGIR, 2000
    210
  62. Lee Breslau, Deborah Estrin, Kevin Fall, Sally Floyd, John Heidemann, Ahmed Helmy, Polly Huang, Steven McCanne, Kannan Varadhan, Ya Xu, Haobo Yu
    Advances in network simulation. IEEE Computer, 2000
    210
  63. T Erickson, W A Kellogg
    Social translucence. an approach to designing systems that support social processes. ACM Transactions on Computer–Human Interaction, 2000
    209
  64. J Pei, J Han, R Mao
    CLOSET: An Efficient Algorithm for Mining Frequent Closed Item sets. Proc. ACM SIGMOD Workshop Research Issues in Data Mining and Knowledge Discovery, 2000
    209
  65. M Weber, M Welling, P Perona
    Unsupervised learning of models for recognition. 2000
    209
  66. A Snoeren, H Balakrishnan
    An end-to-end approach to host mobility. in Proc. ACM MOBICOM, 2000
    209
  67. Y Zhang, V Paxson, S Shenker
    The stationarity of internet path properties. Routing, loss, and throughput,” ACIRI, Tech. Rep, 2000
    207
  68. P Rice, I Longden, A Bleasby
    EMBOSS: the European molecular biology open software suite Trends Genet, 2000
    206
  69. Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik
    A practical and provably secure coalition-resistant group signature scheme. In Proc. of Crypto 2000, volume 1880 of LNCS, 2000
    206
  70. M Ainsworth, J T Oden
    A posteriori error estimation in finite element analysis Pure and Applied Mathematics, 2000
    204
  71. J Portilla, E P Simoncelli
    A parametric texture model based on joint statistics of complex wavelet coefficients. Int. J. Comput. Vis, 2000
    204
  72. D Q Mayne, J B Rawlings, C V Rao, P O M Scokaert
    Constrained model predictive control: stability and optimality Automatica, 2000
    204
  73. A Perrig, R Canetti, D Song, D Tygar
    Efficient authentication and signing of multicast streams over lossy channels. in Proc. IEEE Symp. Security and Privacy, 2000
    203
  74. Y Zhang, W Lee
    Intrusion Detection in Wireless Ad Hoc Networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (ACM MobiCom’00, 2000
    202
  75. D L McGuinness, R Fikes, J Rice, S Wilder
    An Environment for Merging and Testing Large Ontologies. In: Proceedings of the Seventh International Conference on Principles of Knowledge Representation and Reasoning (KR2000, 2000
    202
  76. B Kuipers
    The spatial semantic hierarchy. Artificial Intelligence, 2000
    202
  77. Bruce Tesar, Paul Smolensky
    Learnability in Optimality Theory. 2000
    201
  78. Srinivas M Aji, Robert J McEliece
    The Generalized Distributive Law IEEE Transactions on Information Theory, 2000
    200
  79. J L Herlocker, J A Konstan, J Riedl
    Explaining collaborative filtering recommendations. ACM Conference on Computer-Supported Cooperative Work (CSCW, 2000
    198
  80. R Gulati, N Nohria, A Zaheer
    Strategic networks Strategic Management Journal, 2000
    198
  81. M Breunig, H-P Kriegel, R Ng, J Sander
    LOF: Identifying Density-Based Local Outliers. In: Proceedings of ACM SIGMOD International Conference on the Management of Data (SIGMOD00, 2000
    197
  82. Arnaud Doucet, Nando de Freitas, Kevin Murphy, Stuart Russell
    RaoBlackwellised particle filtering for dynamic Bayesian networks. In Proceedings of the Sixteenth Annual Conference on Uncertainty in Artificial Intelligence (UAI-00, 2000
    197
  83. D Peleg
    Distributed computing: a locality-sensitive approach Society for Industrial and Applied Mathematics, 2000
    196
  84. A K McCallum, K Nigam, L H Ungar
    Efficient clustering of high-dimensional data sets with application to reference matching. In Proc. of SIGKDD, 2000
    196