Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. B Taskar, P Abbeel, D Koller
    Discriminative probabilistic models for relational data. In Proceedings of 18th Conference on Uncertainty in Artificial Intelligence (UAI-2002, 2002
    261
  2. Y Yao, J Gehrke
    The cougar approach to in-network query processing in sensor networks. in SIGMOD Record, 2002
    260
  3. Paul Resnick, Richard Zeckhauser
    Trust among strangers in internet transactions: Empirical analysis of ebay’s reputation system In The Economics of the Internet and E-commerce, 2002
    258
  4. C Carson, S Belongie, H Greenspan, J Malik
    Blobworld: Image Segmentation Using Expectation-Maximization and Its Application to Image Querying. IEEE Trans. Pattern Analysis and Machine Intelligence, 2002
    258
  5. D Malkhi, M Naor, D Ratajczak
    Viceroy: A scalable and dynamic emulation of the Butterfly. In Proceeding of the 21 st ACM Symposium on Principles of Distributed Computing (PODC’02, 2002
    256
  6. Cristian Estan, George Varghese
    New directions in traffic measurement and accounting. SIGCOMM Comput. Commun. Rev, 2002
    256
  7. C Boyapati, R Lee, M Rinard
    Ownership types for safe programming: Preventing data races and deadlocks. In Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA, 2002
    255
  8. Michael J Freedman, Robert Morris
    Tarzan: A peer-to-peer anonymizing network layer. In Vijay Atluri, editor, Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, 2002
    253
  9. A-L Barabasi
    Linked: The New Science of Networks 2002
    252
  10. E Wenger, R McDermott, W M Snyder
    Cultivating Communities of Practice Western Reserve University, 2002
    248
  11. D Martin, C Fowlkes, J Malik
    Learning to detect natural image boundaries using brightness and text ure. In Advances in Neural Info. Proc. Systems, 2002
    248
  12. H De Jong
    Modeling and simulation of genetic regulatory systems: a literature review. Journal of Computational Biology, 2002
    244
  13. N Li, J C Mitchell, W H Winsborough
    Design of a role-based trust management framework. In IEEE Symposium on Security and Privacy, 2002
    243
  14. S McIlraith, T Son
    Adapting Golog for Composition of Semantic Web Services. Proceedings of the Eighth International Conference on Knowledge Representation and Reasoning (KR2002, 2002
    243
  15. M Ripeanu, I Foster, A Iamnitchi
    Mapping the gnutella network: properties of large-scale peer-to-peer systems and implications for system design. IEEE Internet Computing Journal, 2002
    243
  16. R Lienhart, J Maydt
    An extended set of haar-like features for rapid object detection. IEEE ICIP, 2002
    242
  17. S Hangal, M Lam
    Tracking down software bugs using automatic anomaly detection. In Proceedings of International conference on Software engineering, 2002
    242
  18. Srini Narayanan, Sheila A McIlraith
    Simulation, verification and automated composition of web services. In Proceedings of the 11th International Conference on World Wide Web, 2002
    241
  19. D Chaum, A Fiat, M Naor
    Untraceable electronic cash. in Proc. on Advances in Cryptology (CRYPTO’88, 2002
    240
  20. P S L M Barreto, H Y Kim, B Lynn, M Scott
    Efficient algorithms for pairing-based cryptosystems. In Advances in Cryptology – CRYPTO 2002, 2002
    238
  21. M MEYER, M DESBRUN, P SCHRÖDER, A BARR
    H.: Discrete differential-geometry operators for triangulated 2-manifolds. Visualization and Mathematics III, 2002
    238
  22. E Hairer, G Wanner
    Solving Ordinary Differential Equations II: Stiff and Differential– Algebraic Problems Series in Computational Mathematics v. 14, 2002
    237
  23. P Turney
    Thumbs up or thumbs down? semantic orientation applied to unsupervised classification of reviews. In Proceedings of the 40th Annual Meeting fo the Association for Computational Linguistics, 2002
    233
  24. C Boyapati, S Khurshid, D Marinov
    Korat: Automated testing based on Java predicates. In International Symposium on Software Testing and Analysis (ISSTA, 2002
    233
  25. T Ojala, M Pietikäinen, T Mäenpää
    Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2002
    233
  26. J Ioannidis, S M Bellovin
    Implementing Pushback: Router-Based Defense against DDoS. Attacks,” Proc. Network and Distributed System Security Symp, 2002
    233
  27. A Muthitacharoen, R Morris, T M Gil, B Chen
    Ivy: A Read/Write Peer-to-Peer File System. In Proceedings of the 5th Conference on Symposium on Operating Systems Design and Implementation (OSDI, 2002
    230
  28. D P Anderson, J Cobb, E Korpela, M Lebofsky, D Werthimer
    SETI@home: An experiment in public-resource computing Commun. ACM, 2002
    230
  29. B Johanson, A Fox, T Winograd
    The Interactive Workspaces Project: Experiences with Ubiquitous Computing Rooms. IEEE Pervasive Computing Magazine, 2002
    230
  30. N Bruno, N Koudas, D Srivastava
    Holistic twig joins: optimal XML pattern matching In Proceedings of the International Conference on Management of Data (SIGMOD, 2002
    229
  31. R Milo, S Sen-Orr, S Itzkovitz, N Kashtan, D Chklovskii, U Alon
    Network motifs: Simple building blocks of complex networks. Science, 2002
    229
  32. C von Mering, R Krause, B Snel, M Cornell, S G Oliver, S Fields, P Bork
    Comparative assessment of large-scale data sets of protein-protein interactions. Nature 2002
    228
  33. W Nejdl, B Wolf, C Qu, S Decker, M Sintek, A Naeve, M Nilsson, M Palmer, T Risch
    EDUTELLA: a P2P Networking Infrastructure based on RDF. In WWW, 2002
    228
  34. R Mahajan, D Wetherall, T Anderson
    Understanding BGP misconfiguration. in Proc. ACM SIGCOMM, 2002
    226
  35. C Savarese, J Rabay, K Langendoen
    Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks. USENIX Technical Annual Conference, 2002
    225
  36. G Jeh, J Widom
    Scaling personalized web search. 2002
    223
  37. M Das, S Lerner, M Seigle
    ESP: Path-sensitive program verification in polynomial time. In PLDI, 2002
    222
  38. C KAUFMAN, R PERLMAN, M SPECINER
    Network Security: Private Communication in a Public 2002
    222
  39. D Braginsky, D Estrin
    Rumor Routing Algorithm for Sensor Networks. in the Proceedings of the First Wossrkshop on Sensor Networks and Applications (WSNA, 2002
    222
  40. Bernhard Schölkopf, Alexander J Smola
    Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond, 2002
    221
  41. D Kotz, K Essien
    Analysis of a Campus-wide Wireless Network. In Proceedings ofACM Mobicom, 2002
    220
  42. FOR CONFERENCES D Carney, U Cetintemel
    Monitoring streams - a new class of data management applications VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases, 2002
    220
  43. A Doan, J Madhavan, P Domingos, A Halevy
    Learning to map between ontologies on the semantic web. In Proceedings of the 11th international conference on World Wide Web, 2002
    219
  44. S Baker, T Kanade
    Limits on Super-Resolution and How to Break Them. IEEE Trans. Pattern Analysis and Machine Intelligence, 2002
    219
  45. C Waldspurger
    Memory Resource Management in VMWare ESX Server. In Proceedings of the Fifth Symposium on Operating System Design and Implementation (OSDI’02, 2002
    219
  46. FOR CONFERENCES S Madden, M J Franklin
    Fjording the stream: An architecture for queries over streaming sensor data. ICDE Proceedings of the 18th International Conference on Data Engineering, 2002
    219
  47. Sebastian Thrun
    Robotic mapping: A survey. Exploring Artificial Intelligence in the New Millenium, 2002
    219
  48. C Leslie, E Eskin, W S Noble
    The spectrum kernel: A string kernel for svm protein classification Proceedings of the Pacific Symposium on Biocomputing, 2002
    217
  49. M A Isard, A Blake
    iCondensation: Unifying low-level and high-level tracking in a stochastic framework. In Proceedings of the European Conference on Computer Vision, 2002
    217
  50. D Moore, C Shannon, J Brown
    Code-Red: a case study on the spread and victims of an internet worm. In Proc. ACM/USENIX IMW’02, 2002
    215
  51. A D Wood, J A Stankovic
    Denial of Service in Sensor Networks. IEEE Computer, 2002
    214
  52. F Zhao, J Shin, J Reich
    Information-driven dynamic sensor collaboration for tracking applications. IEEE Signal Processing Magazine, 2002
    214
  53. R FATTAL, D LISCHINSKI, M WERMAN
    Gradient domain high dynamic range compression. ACM Trans. Graph, 2002
    211
  54. X GU, S J GORTLER, H HOPPE
    Geometry images. In SIGGRAPH 2002, 2002
    211
  55. T Lindvall
    Lectures on the Coupling Method 2002
    210
  56. J Lee, J Chai, P S A Reitsma, J K Hodgins, N S Pollard
    Interactive Control of Avatars Animated with Human Motion Data. ACM Trans. Graphics, (Proc. ACM SIGGRAPH, 2002
    209
  57. W Thies, M Karczmarek, S Amarasinghe
    StreamIt: A language for streaming applications. Massachusetts Institute of Technology, 2002
    208
  58. R Fagin, P Kolaitis, R Miller, L Popa
    Data exchange: Semantics and query answering. In Proc. ICDT, 2002
    208
  59. Laura Pearlman, Ian Foster Von Welch, Carl kesselman, Steven
    Tuecke,“A Community Authorization Service for Group Collaboration. IEEE 3rd. International Workshop on Policies for. Distributed Systems and Networks, 2002
    208
  60. P Shivakumar, M Kistler, S W Keckler, D Burger, L Alvisi
    Modeling the Effect of Technology Trends on the Soft Error Rate. of Combinational Logic,” Proc. Int’l Conf. Dependability Systems Networks, 2002
    208
  61. V KIRIANSKY, D BRUENING, S AMARASINGHE
    Secure Execution Via Program Shepherding. In Proceedings of the 11 th USENIX Security Symposium, 2002
    207
  62. S Al-Khalifa, H V Jagadish, J M Patel, Y Wu, N Koudas, D Srivastava
    Structural joins: A primitive for efficient XML query pattern matching. in ICDE, 2002
    206
  63. O CHAPELLE, V VAPNIK, O BOUSQUET, S MUKHERJEE
    Choosing multiple parameters for support vector machines. Machine Learning 46. 2002
    205
  64. A Schmidt, F Waas, M Kersten, M J Carey, I Manolescu, R Busse
    Xmark: A benchmark for xml data management. In In VLDB, 2002
    202
  65. S Madden, M Shah, J M Hellerstein, V Raman
    Continuously adaptive continuous queries over streams. In Proceedings of the 2002 ACM SIGMOD international conference on Management of data, 2002
    202
  66. Peter J Brockwell, Richard A Davis
    Introduction to Time Series and Forecasting 2002
    201
  67. D Ganesan, B Krishnamachari, A Woo, D Culler, D Estrin, S Wicker
    Complex behavior at scale: An experimental study of low-power wireless sensor networks. 2002
    201
  68. Z Wu, R Leahy
    An optimal graph theoretic approach to data clustering: theory and its application to image segmentation. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 2002
    201
  69. D Fensel, C Bussler, Y Ding, Omelayenko
    B.: The Web Service Modeling Framework WSMF. Electronic Commerce Research and Applications, 2002
    200
  70. E Cohen, S Shenker
    Replication Strategies in Unstructured Peer-to-Peer Networks. In SIGCOMM ’02: Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, 2002
    199
  71. D Ravichandran, E Hovy
    Learning surface text patterns for a question answering system. In Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL 2002, 2002
    199
  72. R Shah, J Rabaey
    Energy Aware Routing for Low Energy Ad Hoc Sensor Networks. in the Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC, 2002
    197
  73. L KOVAR, M GLEICHER, F PIGHIN
    Motion graphs. In ACM Transactions on Graphics, 2002
    197
  74. T Grust
    Accelerating XPath Location Steps In Proc. of the SIGMOD Conference, 2002
    196
  75. Michael Collins, Nigel Duffy
    Convolution kernels for natural language. In Advances in Neural Information Processing Systems 14, 2002
    195
  76. M Datar, A Gionis, P Indyk, R Motwani
    Maintaining stream statistics over sliding windows. SIAM Journal of Computing, 2002
    194
  77. B LÉVY, P SYLVAIN, R NICOLAS, M JEROME
    Least squares conformal maps for automatic texture atlas generation. ACM Trans. Graph, 2002
    194
  78. D Balfanz, D Smetters, P Stewart, H Wong
    Talking to strangers: Authentication in adhoc wireless networks. Network and Distributed Systems Security (NDSS, 2002
    192
  79. S Quinlan, S Dorward
    Venti: a new approach to archival storage. In FAST, 2002
    192
  80. A Gavin, M Bösche, R Krause, P Grandi, M Marzioch, A Bauer, J Schultz, J M Rick, A Michon, C Cruciat, M Remor, C Höfert, M Schelder, M Brajenovic, H Ruffner, A Merino, K Klein, M Hudak, D Dickson, T Rudi, V Gnau, A Bauch, S Bastuck, B Huhse, C Leutwein, M Heurtier, R R Copley, A Edelmann, E Querfurth, V Rybin, G Drewes, M Raida, T Bouwmeester, P Bork, B Seraphin, B Kuster, G Neubauer, G Superti-Furga
    Functional organization of the yeast proteome by systematic analysis of protein complexes. Nature 415(6868):141–147 2002
    192
  81. T Kamiya, S Kusumoto, K Inoue
    CCFinder: A multilinguistic token-based code clone detection system for large scale source code IEEE Transactions on Software Engineering, 2002
    192
  82. M Luby
    LT codes. Proc. 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002
    192
  83. Chalermek Intanagonwiwat, Deborah Estrin, Ramesh Govindan, John S Heidemann
    Impact of network density on data aggregation in wireless sensor networks. In ICDCS, 2002
    191
  84. M A FIGUEIREDO, A K JAIN
    Unsupervised learning of finite mixture models. IEEE Trans. Pattern Anal. Mach. Intell, 2002
    190