Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. Huma Lodhi, John Shawe-Taylor, Nello Cristianini, Chris Watkins
    Text classification using string kernels. 2001
    275
  2. N Borisov, I Goldberg, D Wagner
    Intercepting mobile communications: The insecurity of 802.11. in ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom, 2001
    274
  3. C Larman
    Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and the Unified Process. Prentice Hall PTR, Upper Saddle River, NJ, 2001
    272
  4. S Antoy, M Hanus, B Massey, F Steiner
    An Implementation of Narrowing Strategies. In Proc. of the 3rd International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming (PPDP 2001, 2001
    272
  5. Karl Aberer, Zoran Despotovic
    Managing trust in a peer-2-peer information system. In 10th international conference on Information and knowledge management, 2001
    269
  6. S Borzsonyi, D Kossmann, K Stocker
    The skyline operator. In ICDE Conf, 2001
    267
  7. D Acemoglu, S Johnson, J A Robinson
    The Colonial Origins of Comparative Development: An Empirical Investigation.” American Economic Review 91. Montana State University, 2001
    265
  8. A Cerpa, J Elson, D Estrin, L Girod, M Hamilton, J Zhao
    Habitat monitoring: application driver for wireless communications technology. In Proceedings of the 2001 ACM SIGCOMM Workshop on Data Communications in Latin America and the Caribbean, 2001
    264
  9. M Newman
    The structure of scientific collaboration networks Proceedings of the National Academy of Sciences of the United States of America, 2001
    263
  10. M W M Gamini Dissanayake, Paul Newman, Steven Clark, Hugh F Durrant-Whyte, M Csorba
    A solution to the simultaneous localization and map building (SLAM) problem. IEEE Transactions on Robotics and Automation, 2001
    262
  11. D Davidson
    The Logical Form of Action Sentences In Essays on Actions and Events (2nd ed, 2001
    261
  12. D Hand, H Mannila, P Smyth
    Principles of data mining 2001
    259
  13. D Agrawal, C C Aggarwal
    On the design and quantification of privacy preserving data mining algorithms. In PODS ’01: Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, 2001
    257
  14. A I T Rowstron, A-M Kermarrec, M Castro, P Druschel
    SCRIBE: The design of a large-scale event notification infrastructure. In Networked Group Communication, 2001
    253
  15. F Natterer
    The mathematics of computerized tomography Society for Industrial and Applied Mathematics, 2001
    246
  16. B Bonet, H Geffner
    Planning as heuristic search. Artificial Intelligence, 2001
    246
  17. J D Ullman
    Principles of Database Systems 2001
    246
  18. Peter Buneman, Sanjeev Khanna, Wang-Chiew Tan
    Why and Where: A characterization of data provenance. In ICDT, 2001
    246
  19. O Faugeras, Q T Luong
    The geometry of multiple images. 2001
    246
  20. S Tong, E Chang
    Support vector machine active learning for image retrieval. In Proceedings of ACM International Conference on Multimedia, 2001
    245
  21. T Clausen, P Jacquet, A Laouiti, P Muhlethaler, A Qayyum, L Viennot
    Optimized link state routing protocol In Proceedings of IEEE INMIC, 2001
    245
  22. R L Rivest T H Cormen, C E Leiserson, C Stein
    Introduction to Algorithms, 2nd Edition 2001
    243
  23. K Wagstaff, C Cardie, S Rogers, S Schroedl
    Constrained k-means clustering with background knowledge. In Proceedings of the Eighteenth International Conference on Machine Learning, 2001
    243
  24. L Zhang, C Madigan, M Moskewicz, S Malik
    Efficient Conflict Driven Learning in a Boolean Satisfiability. Solver. International Conference on Computer-Aided Design (ICCAD01, 2001
    242
  25. D Wagner, Dean
    D.: Intrusion Detection via Static Analysis. In: IEEE Symposium on Security and Privacy, 2001
    242
  26. G Holland, N Vaidya, P Bahl
    A Rate-Adaptive MAC Protocol for Multi-Hop Wireless Networks. In Proc. ACM/IEEE MobiCom, 2001
    242
  27. S Floyd, V Paxson
    Difficulties in simulating the internet. IEEE/ACM Trans. Netw, 2001
    242
  28. T Richardson, M A Shokrollahi, R Urbanke
    Design of capacity-approaching irregular low-density parity check codes. IEEE Trans. Info. Theory, 2001
    241
  29. N R Jennings
    An agent-based approach for building complex software systems. Communications of the ACM, 2001
    241
  30. L Qiu, V N Padmanabhan, G M Voelker
    On the placement of web server replicas. In Proceedings of IEEE INFOCOM, 2001
    240
  31. G Kiczales, E Hilsdale, J Hugunin, M Kersten, J Palm, W G Griswold
    Getting started with AspectJ. Comm. ACM, 2001
    240
  32. V Crescenzi, G Mecca, P Merialdo
    RoadRunner: Towards Automatic Data Extraction from Large Web Sites. Proc. Int’l Conf. Very Large Data Bases (VLDB, 2001
    239
  33. W Daelemans, J Zavrel, K van der Sloat, A van den Bosch
    Timbl: Tilburg memory based learner, version 4.0, reference guide. 2001
    239
  34. G Cugola, E D Nitto, Fuggetta
    A.: The jedi event-based infrastructure and its application to the development of the opss wfms IEEE Trans. Softw. Eng, 2001
    234
  35. J Hopcroft, R Motwani, J Ullman
    Introduction to Automata Theory Languages, and Computation, Second Edition. Addison-Wesley, 2001
    228
  36. M Stephens, N J Smith, Donnelly
    P.: A new statistical method for haplotype reconstruction from population data Am. J. Hum. Genet, 2001
    227
  37. V Lavrenko, W B Croft
    Relevance-based language models. In Proceedings of the ACM SIGIR 01 conference, 2001
    226
  38. T H Cormen, C E Leiserson, R L Rivest, C Stein
    Introduction to algorithms, 2nd ed 2001
    226
  39. N Hansen, A Ostermeier
    Completely derandomized self-adaptation in evolution strategies. Evol. Comput, 2001
    224
  40. Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, Mani B Srivastava
    Coverage problems in wireless ad-hoc sensor networks. In INFOCOM, 2001
    223
  41. R Schapire
    The boosting approach to machine learning: An overview. In RSRI Workshop on Nonlinear Estimation and Classification, 2001
    223
  42. J-P Hubaux, L Buttyan, S Capkun
    The quest for security in mobile ad hoc networks. in Proc. ACM Symposium of Mobile Ad Hoc Networking and Computing (MobiHoc 2001, 2001
    223
  43. C Godsil, G Royle
    Algebraic Graph Theory 2001
    223
  44. A Feldmann, A Greenberg, C Lund, N Reingold, J Rexford, F True
    Deriving traffic demands for operational IP networks: Methodology and experience. Computer Science Department at Princeton University. From, 2001
    223
  45. M E Porter
    Strategy and the Internet Harvard Business Review, 2001
    222
  46. K Aberer
    P-grid: A self-organizing access structure for p2p information systems. in Proceedings of the 9th International Conference on Cooperative Information Systems, ser. CooplS ’01, 2001
    222
  47. D Halls, J Llinas
    Handbook of multisensor data fusion 2001
    222
  48. C Dwork, R Kumar, M Naor, D Sivakumar
    Rank Aggregation Methods for the Web. In WWW, 2001
    221
  49. P Francis, S Jamin, C Jin, Y Jin, D Raz, Y Shavitt, L Zhang
    IDMaps: A global Internet host distance estimation service,” Trans. Networking. 2001
    220
  50. L Gao, J Rexford
    Stable Internet routing without global coordination. IEEE/ACM Trans. Netw, 2001
    220
  51. games Algorithms
    the internet In Proceedings on 33rd Annual ACM Symposium on Theory of Computing (STOC, 2001
    218
  52. M E J Newman, S H Strogatz, D J Watts
    Random graphs with arbitrary degree distributions and their applications. Phys Rev. E, 2001
    217
  53. R C Whaley, A Petitet, J Dongarra
    Automated empirical optimizations of software and the ATLAS project. Parallel Computing, 2001
    215
  54. P Druschel, A Rowstron
    PAST: A large-scale, persistent peer-to-peer storage utility. In HotOS, 2001
    215
  55. P Samarati
    Protecting respondents’ identities in microdata release. In IEEE Transactions on Knowledge and Data Engineering (TKDE, 2001
    213
  56. M Hilaga, Y Shinagawa, T Komura, T Kunii
    Topology matching for fully automatic similarity estimation of 3d shapes In: SIGGRAPH ’01: Proceedings of the 28th annual conference on Computer graphics and interactive techniques, 2001
    213
  57. S J Lee, M Gerla
    Split Multipath Routing with Maximally Disjoint Paths. in Ad Hoc Networks,” Proc. IEEE Int’l Conf. Comm.(ICC, 2001
    212
  58. J Kong, P Zerfos, H Luo, S Lu, L Zhang
    Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. Proc. IEEE Int’l Conf. Network Protocols (ICNP ’01, 2001
    211
  59. S SOATTO, G DORETTO, Y N WU
    Dynamic textures. In Proceedings of International Conference on Computer Vision, 2001
    210
  60. I S Dhillon
    Co-clustering documents and words using bipartite spectral graph partitioning. Proceeding of ACM SIGKDD (KDD’01, 2001
    210
  61. Y Benjamini, D Yekutieli
    The control of the false discovery rate in multiple testing under dependency. Annals of Statistics, 2001
    209
  62. A W Appel
    Foundational proof-carrying code. In Logic in Computer Science (LICS, 2001
    209
  63. Y Bar-Shalom, X Rong Li, T Kirubarajan
    Estimation with Applications to Tracking and Navigation 2001
    209
  64. D Donoho, X Huo
    Uncertainty principles and ideal atomic decomposition. IEEE Transactions on Information Theory, 2001
    208
  65. K L Chung
    A Course in Probability Theory 2001
    207
  66. S Mascolo, C Casetti, M Gerla, M Y Sanadidi, R Wang
    TCP westwood: Bandwidth estimation for enhanced transport over wireless links. in MOBICOM, 2001
    206
  67. F Provost, T Fawcett
    Robust Classification for Imprecise Environments. Machine Learning, 2001
    205
  68. D X SONG, A PERRIG
    Advanced and authenticated marking schemes for IP traceback. In Proc. IEEE Infocom ’01, 2001
    205
  69. P Domingos, M Richardson
    Mining the network value of customers. In Proceedings 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2001
    204
  70. Y I Tian, T Kanade, J F Cohn
    Recognizing Action Units for Facial Expression Analysis. IEEE Trans. Pattern Analysis and Machine Intelligence, 2001
    204
  71. V K Goyal
    Multiple description coding: compression meets the network. in IEEE Signal Processing Mag, 2001
    202
  72. M Alavi, D E Leidner
    knowledge Management and Knowledge Management Systems Conceptual Foundataions and Research issues”, MIS Quartely, Vol.25, No.1, 2001
    201
  73. D Niculescu, B Nath
    Ad Hoc Positioning Systems (APS. In Proceedings of IEEE GLOBECOM ’01, 2001
    200
  74. M Abadi, C Fournet
    Mobile values, new names, and secure communication. In 28th Symposium on Principles of Programming Languages, POPL’01, 2001
    199
  75. K Park, H Lee
    On the Effectiveness of Route-Based Packet Filtering for Distributed DoS. Attack Prevention in Power-Law Internets,” Proc. ACM SIGCOMM ’01, 2001
    198
  76. D Estrin, L Girod, G Pottie, M Srivastava
    Instrumenting the world with wireless sensor networks. in International Conference on Acoustics, Speech, and Signal Processing, 2001
    198
  77. C K I Williams, M Seeger
    Using the Nyström Method to Speed Up Kernel Machines. In Advances in Neural Information Processing Systems 13, 2001
    197
  78. Venter
    The sequence of the human genome Science, 2001
    196
  79. P Loscocco, S Smalley
    Integrating flexible support for security policies into the Linux operating system. In Proceedings of the 2001 USENIX Annual Technical Conference, 2001
    195
  80. S Jajodia, P Samarati, M L Sapino, V S Subrahmanian
    Flexible Support for Multiple Access Control Policies. ACM Trans. Database Systems, 2001
    195