Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. F Zambonelli, N R Jennings, M Wooldridge
    Developing multiagent systems: The Gaia methodology. ACM Transactions on Software Engineering and Methodology, 2003
    236
  2. A E Eiben, J E Smith
    Introduction to Evolutionary Computing in, 2003
    235
  3. W Cohen, P Ravikumar, S Fienberg
    A Comparison of String Distance Metrics for NameMatching Tasks. In the Proceedings of the IJCAI, 2003
    235
  4. L Burdy, Y Cheon, D Cok, M Ernst, J Kiniry, G T Leavens, K R M Leino, Erik Poll
    An overview of JML tools and applications. In FMICS, 2003
    234
  5. D Blei, M Jordan
    Modeling annotated data. In Proceedings of the 26th annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2003
    234
  6. D Niculescu, B Nath
    Ad Hoc Positioning System (APS) using AoA. In Proceedings of IEEE INFOCOM ’03, 2003
    234
  7. R C Shah, S Roy, S Jain, W Brunette
    Data MULEs: Modeling a Three-tier Architecture for Sparse Sensor Networks. Elsevier Ad Hoc Networks Journal, 2003
    231
  8. J Jeon, V Lavrenko, R Manmatha
    Automatic image annotation and retrieval using cross-media relevance models. In Proceedings of SIGIR, 2003
    228
  9. B Ziltova, J Flusser
    Image registration methods: A survey. Image and Vision Computing, 2003
    224
  10. G LINDEN, B SMITH, J YORK
    Amazon.com recommendations: item-to-item collaborative filtering IEEE Internet Computing, 2003
    224
  11. R Basri, D Jacobs
    Lambertian reflectance and linear subspaces. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003
    224
  12. A Efros, A Berg, G Mori, J Malik
    Recognizing action at a distance. In IEEE Intl. Conf. on Computer Vision, 2003
    222
  13. G, C Wild
    Nonlinear Regression 2003
    219
  14. Franz Baader, Werner Nutt
    Basic description logics. The Description Logic Handbook: Theory, Implementation, and Applications, chapter 2, 2003
    217
  15. K Yee, K Swearingen, K Li, M Hearst
    Faceted metadata for image search and browsing. Proc. CHI 2003, ACM, 2003
    217
  16. A J Davison
    Real-Time Simultaneous Localisation and Mapping with a Single Camera. In Proceedings International Conference Computer Vision, 2003
    213
  17. Andrew R Webb
    Statistical Pattern Recognition 2003
    211
  18. C Cranor, T Johnson, O Spatscheck, V Shkapenyuk
    Gigascope: A stream database for network applications. In SIGMOD, 2003
    211
  19. T H Clausen, P Jacquet
    Optimized Link State Routing OLSR)”, RFC 3626, 2003
    209
  20. R Gummadi, S Gribble, S Ratnasamy, S Shenker, Stoica
    I.: The impact of dht routing geometry on resilience and proximity. 2003
    209
  21. J Fakcharoenphol, S Rao, K Talwar
    A tight bound on approximating arbitrary metrics by tree metrics. In STOC'03: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003
    208
  22. Niels Provos
    Improving Host Security with System Call Policies. In Proceedings of the 12 th USENIX Security Symposium, 2003
    207
  23. S S Pradhan, K Ramchandran
    Distributed Source Coding Using Syndromes (DISCUS): design and construction. IEEE Trans. on Inf. Theory, 2003
    205
  24. Walter Enders
    Applied Econometric Time Series 2003
    203
  25. A Sellen, R Harper
    The Myth of the Paperless Office. 2003
    202
  26. A Pau lraj, R Nabar, D Gore
    Introduction to Space-Time Wireless Communications 2003
    202
  27. Nicholas T Karonis, Brian Toonen, Ian Foster
    MPICHG2: A Grid-enabled implementation of the Message Passing Interface. Journal of Parallel and Distributed Computing, Volume 63, Issue 5, Special Issue on Computational Grids, 2003
    201
  28. G Caire, S Shamai
    On the achievable Throughput of a Multiantenna Gaussian Broadcast Channel IEEE Trans. Inform. Theory, 2003
    200
  29. D Kempe, A Dobra, J Gehrke
    Gossip-based computation of aggregate information. In Proc. of the 44th IEEE Ann. Symp. on Foundations of Computer Science, 2003
    200
  30. C Chong, S P Kumar
    Sensor Networks: Evolution, Opportunities, and Challenges. Proceedings of the IEEE, 2003
    199
  31. S Zhong, J Chen, Y R Yang
    Sprite: A Simple, Cheat-Proof,Credit-Based System for Mobile Ad-Hoc Networks. Proc. INFOCOM, Mar.-Apr, 2003
    198
  32. R Kumar, J Novak, P Raghavan, A Tomkins
    On the bursty evolution of blogspace. In Proceedings of the 12th WWW conference, 2003
    197
  33. Y Shang, W Ruml, Y Zhang, M P J Fromherz
    Localization from mere connectivity in Proceedings of ACM MobiHoc, 2003
    197
  34. P Eugster, S Handurukande, R Guerraoui, A-M Kermarrec, Kouznetsov
    P.: Lightweight probabilistic broadcast. ACM Trans. Comput. Syst, 2003
    196
  35. A Evfimievski, J Gehrke, R Srikant
    Limiting privacy breaches in privacy preserving data mining. In PODS, 2003
    195
  36. P PÉREZ, M GANGNET, A BLAKE
    Poisson image editing ACM Trans. Graph, 2003
    194
  37. James Aspnes, Gauri Shah
    Skip graphs. In SODA, 2003
    194
  38. S H Low
    A duality model of TCP and queue management algorithms. IEEE/ACM Trans. Networking, 2003
    193
  39. K Sripanidkulchai, B Maggs, H Zhang
    Efficient Content Location Using Interest-Based Locality. in P2P Systems,” Proc. IEEE INFOCOM ’03, 2003
    192
  40. B Grunbaum
    Convex Polytopes. 2003
    191
  41. F Ye, G Zhong, S Lu, L Zhang
    Peas: A robust energy conserving protocol for long-lived sensor networks. In The 23nd International Conference on Distributed Computing Systems (ICDCS, 2003
    191
  42. J KRÜGER, WESTERMANN
    R.: Linear algebra operators for gpu implementation of numerical algorithms. In SIGGRAPH ’03: ACM SIGGRAPH 2003 Papers, 2003
    189
  43. K Dave, S Lawrence, D M Pennock
    Mining the peanut gallery: Opinion extraction and semantic classification of product reviews. In Proceedings of WWW, 2003
    188
  44. F Pottier, V Simonet
    Information flow inference for ML. ACM TOPLAS, 2003
    187
  45. M G Lagoudakis, R Parr
    Least-squares policy iteration. Journal of Machine Learning Research, 2003
    187
  46. T Garfinkel, M Rosenblum
    A Virtual Machine Introspection Based Architecture for Intrusion Detection. In 10 th ISOC Symposium on Network and Distributed Systems Security (SNDSS, 2003
    187
  47. D ENGLER, K ASHCRAFT
    RacerX: Effective, static detection of race conditions and deadlocks. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, 2003
    187
  48. P Moulin, J A O’Sullivan
    Information-theoretic analysis of information hiding. IEEE Transactions on Information Theory, 2003
    185
  49. M K Aguilera, J C Mogul, J L Wiener, P Reynolds, A Muthitacharoen
    Performance Debugging for Distributed Systems of Black Boxes. In Proc. of SOSP, 2003
    185
  50. C Bettstetter, G Resta, P Santi
    The node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Trans. Mobile Comput, 2003
    184
  51. David Oppenheimer, Archana Ganapathi, David A Patterson
    Why do Internet services fail, and what can be done about it. Proceedings of the 4th Usenix Symposium on Internet Technologies and Systems, 2003
    183
  52. S Dumais, E Cutrell, J Cadiz, G Jancke, R Sarin, D C Robbins
    Stuff i’ve seen: a system for personal information retrieval and re-use. In Proceedings of ACM SIGIR conference on Research and development in information retrieval, 2003
    181
  53. J Pineau, G Gordon, S Thrun
    Point-based value iteration: An anytime algorithm for POMDPs. In Proceedings of IJCAI’03, 2003
    181
  54. R Cheng, D V Kalashnikov, S Prabhakar
    Evaluating probabilistic queries over imprecise data. In SIGMOD, 2003
    181
  55. A Sendonaris, E Erkip, B Aazhang
    User Cooperation Diversity Part I: System Description. IEEE Trans. on Communications, 2003
    180
  56. C Tang, Z Xu, S Dwarkadas
    Peer-to-peer information retrieval using selforganizing semantic overlay networks. in: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM, 2003
    178
  57. S Chaki, E Clarke, A Groce, S Jha, H Veith
    Modular verification of software components. in C. In International Conference on Software Engineering (ICSE, 2003
    178
  58. I S Dhillon, S Mallela, D S Modha
    Information-theoretical co-clustering. In SIGKDD, 2003
    178
  59. J L Fleiss, B Levin, M C Paik
    Statistical methods for rates and proportions 2003
    175
  60. Fabian Kuhn, Roger Wattenhofer, Yan Zhang, Aaron Zollinger
    Geometric adhoc routing: of theory and practice. 2003
    175
  61. Frank R Smets, Raf Wouters
    An Estimated Dynamic Stochastic General Equilibrium Model of the Euro Area Journal of the European Economics Association, 2003
    174
  62. M Hucka, A Finney, H M Sauro, H Bolouri, J C Doyle, H Kitano, A P Arkin, B J Bornstein, D Bray, A CornishBowden
    The systems biology markup language (SBML): a medium for representation and exchange of biochemical network models. Bioinformatics, 2003
    174
  63. N Li, B N Grosof, J Feigenbaum
    Delegation Logic: A logicbased approach to distributed authorization. ACM TISSEC, 2003
    174
  64. S Floyd
    HighSpeed TCP for large congestion windows. IETF Internet Draft, 2003
    174
  65. D Maio Maltoni, A K Jain, S Prabhakar
    Handbook of fingerprint Recognition 2003
    174
  66. W R MARK, R S GLANVILLE, K AKELEY, M J KILGARD
    Cg: a system for programming graphics hardware in a C-like language. ACM Transactions on Graphics, 2003
    174
  67. B Hassibi, B M Hochwald
    How much training is needed in multiple-antenna wireless links. IEEE Trans. on Inf. Theory, 2003
    173
  68. P Shannon, A Markiel, O Ozier, N S Baliga, J T Wang, D Ramage, N Amin, B Schwikowski, T Ideker
    Cytoscape: a software environment for integrated models of biomolecular interaction networks Genome Research, 2003
    172
  69. V Ribeiro, R Riedi, R Baraniuk, J Navratil, L Cottrell
    pathChirp: Efficient Available Bandwidth Estimation for Network Paths. Proceedings of Passive and Active Measurements (PAM) workshop, 2003
    172
  70. George Danezis, Roger Dingledine, Nick Mathewson
    Mixminion: Design of a type III anonymous remailer protocol. In Proceedings, 2003 IEEE Symposium on Security and Privacy, 2003
    172
  71. M Bilenko, R J Mooney
    Adaptive duplicate detection using learnable string similarity measures. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-2003, 2003
    170
  72. C F Camerer
    Behavioral Game Theory 2003
    170
  73. U Shankar N Sastry, D Wagner
    Secure verification of location claims. In WiSe ’03: Proceedings of the 2nd ACM workshop on Wireless security, 2003
    170
  74. D Boneh, C Gentry, B Lynn, H Shacham
    Aggregate and verifiably encrypted signatures from bilinear maps. in Proc. EUROCRYPT, ser. LNCS, 2003
    168
  75. M Balazinska, P Castro
    Characterizing Mobility and Network Usage in a Corporate Wireless Local-Area Network. In 1st International Conference on Mobile Systems, Applications, and Services (MobiSys, 2003
    167
  76. E SEGAL, M SHAPIRA, A REGEV, D PE’ER, D BOTSTEIN, D KOLLER, N FRIEDMAN
    Module networks: identifying regulatory modules and their condition-specific regulators from gene expression data Nature Genetics, 2003
    166
  77. Jia Li, James Z Wang
    Automatic linguistic indexing of pictures by a statistical modeling approach. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003
    165
  78. Paul Glasserman
    Monte Carlo Methods in Financial Engineering of Stochastic Modelling and Applied Probability, 2003
    165
  79. K Crammer, Y Singer
    Ultraconservative online algorithms for multiclass problems. The Journal of Machine Learning Research, 2003
    163
  80. Carl E Walsh
    Monetary Theory and Policy 2003
    162
  81. M Penrose
    Random Geometric Graphs 2003
    162
  82. X Wang, G Xing, Y Zhang, C Lu, R Pless, C Gill
    Integrated coverage and connectivity configuration in wireless sensor networks. In ACM Sensys’03, 2003
    161
  83. Y Sankarasubramaniam
    ESRT: event-to-sink reliable transport in wireless sensor networks. in Proc. of MobiHoc, 2003
    160
  84. P Reynolds, A Vahdat
    Efficient Peer-to-Peer Keyword Searching. Proc. ACM/IFIP/USENIX Int’l Middleware Conf. (Middleware, 2003
    160