Most Cited Computer Science Citations
This list is generated from documents in the CiteSeer^{x} database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeer^{x} database, since the database is continuously updated.
All Years
 1990
 1991
 1992
 1993
 1994
 1995
 1996
 1997
 1998
 1999
 2000
 2001
 2002
 2003
 2004
 2005
 2006
 2007
 2008
 2009
 2010
 2011
 2012

Developing multiagent systems: The Gaia methodology. ACM Transactions on Software Engineering and Methodology, 2003236

Introduction to Evolutionary Computing in, 2003235

A Comparison of String Distance Metrics for NameMatching Tasks. In the Proceedings of the IJCAI, 2003235

An overview of JML tools and applications. In FMICS, 2003234

Modeling annotated data. In Proceedings of the 26th annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2003234

Ad Hoc Positioning System (APS) using AoA. In Proceedings of IEEE INFOCOM ’03, 2003234

Data MULEs: Modeling a Threetier Architecture for Sparse Sensor Networks. Elsevier Ad Hoc Networks Journal, 2003231

Automatic image annotation and retrieval using crossmedia relevance models. In Proceedings of SIGIR, 2003228

Image registration methods: A survey. Image and Vision Computing, 2003224

Amazon.com recommendations: itemtoitem collaborative filtering IEEE Internet Computing, 2003224

Lambertian reflectance and linear subspaces. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003224

Recognizing action at a distance. In IEEE Intl. Conf. on Computer Vision, 2003222

Nonlinear Regression 2003219

Basic description logics. The Description Logic Handbook: Theory, Implementation, and Applications, chapter 2, 2003217

Faceted metadata for image search and browsing. Proc. CHI 2003, ACM, 2003217

RealTime Simultaneous Localisation and Mapping with a Single Camera. In Proceedings International Conference Computer Vision, 2003213

Statistical Pattern Recognition 2003211

Gigascope: A stream database for network applications. In SIGMOD, 2003211

Optimized Link State Routing OLSR)”, RFC 3626, 2003209

A tight bound on approximating arbitrary metrics by tree metrics. In STOC'03: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003208

Improving Host Security with System Call Policies. In Proceedings of the 12 th USENIX Security Symposium, 2003207

Distributed Source Coding Using Syndromes (DISCUS): design and construction. IEEE Trans. on Inf. Theory, 2003205

Applied Econometric Time Series 2003203

The Myth of the Paperless Office. 2003202

MPICHG2: A Gridenabled implementation of the Message Passing Interface. Journal of Parallel and Distributed Computing, Volume 63, Issue 5, Special Issue on Computational Grids, 2003201

On the achievable Throughput of a Multiantenna Gaussian Broadcast Channel IEEE Trans. Inform. Theory, 2003200

Gossipbased computation of aggregate information. In Proc. of the 44th IEEE Ann. Symp. on Foundations of Computer Science, 2003200

Sensor Networks: Evolution, Opportunities, and Challenges. Proceedings of the IEEE, 2003199

Sprite: A Simple, CheatProof,CreditBased System for Mobile AdHoc Networks. Proc. INFOCOM, Mar.Apr, 2003198

On the bursty evolution of blogspace. In Proceedings of the 12th WWW conference, 2003197

Localization from mere connectivity in Proceedings of ACM MobiHoc, 2003197

P.: Lightweight probabilistic broadcast. ACM Trans. Comput. Syst, 2003196

Limiting privacy breaches in privacy preserving data mining. In PODS, 2003195

Computer Security: Art and Science 2003194

Poisson image editing ACM Trans. Graph, 2003194

Skip graphs. In SODA, 2003194

A duality model of TCP and queue management algorithms. IEEE/ACM Trans. Networking, 2003193

Efficient Content Location Using InterestBased Locality. in P2P Systems,” Proc. IEEE INFOCOM ’03, 2003192

Convex Polytopes. 2003191

Peas: A robust energy conserving protocol for longlived sensor networks. In The 23nd International Conference on Distributed Computing Systems (ICDCS, 2003191

R.: Linear algebra operators for gpu implementation of numerical algorithms. In SIGGRAPH ’03: ACM SIGGRAPH 2003 Papers, 2003189

Mining the peanut gallery: Opinion extraction and semantic classification of product reviews. In Proceedings of WWW, 2003188

Information flow inference for ML. ACM TOPLAS, 2003187

Leastsquares policy iteration. Journal of Machine Learning Research, 2003187

A Virtual Machine Introspection Based Architecture for Intrusion Detection. In 10 th ISOC Symposium on Network and Distributed Systems Security (SNDSS, 2003187

RacerX: Effective, static detection of race conditions and deadlocks. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, 2003187

Informationtheoretic analysis of information hiding. IEEE Transactions on Information Theory, 2003185

Performance Debugging for Distributed Systems of Black Boxes. In Proc. of SOSP, 2003185

The node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Trans. Mobile Comput, 2003184

Why do Internet services fail, and what can be done about it. Proceedings of the 4th Usenix Symposium on Internet Technologies and Systems, 2003183

Stuff i’ve seen: a system for personal information retrieval and reuse. In Proceedings of ACM SIGIR conference on Research and development in information retrieval, 2003181

Pointbased value iteration: An anytime algorithm for POMDPs. In Proceedings of IJCAI’03, 2003181

Evaluating probabilistic queries over imprecise data. In SIGMOD, 2003181

User Cooperation Diversity Part I: System Description. IEEE Trans. on Communications, 2003180

Peertopeer information retrieval using selforganizing semantic overlay networks. in: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM, 2003178

Modular verification of software components. in C. In International Conference on Software Engineering (ICSE, 2003178

Informationtheoretical coclustering. In SIGKDD, 2003178

Applications of Case Study Research 2003177

A Brief History of Generative Models for Power Law and Lognormal Distributions, Internet Mathematics, 1, forthcoming Okabe, A. (2003) A New Approach to Spatial Analysis: Spatial Analysis on a Network with SANET, CUPUM ’03. Center for Northeast Asian Studies, Tohoku University Sendai, Japan, 2003177

Applying model management to classical meta data problems. In CIDR, 2003175

An Estimated Dynamic Stochastic General Equilibrium Model of the Euro Area Journal of the European Economics Association, 2003174

Delegation Logic: A logicbased approach to distributed authorization. ACM TISSEC, 2003174

HighSpeed TCP for large congestion windows. IETF Internet Draft, 2003174

Handbook of fingerprint Recognition 2003174

Cg: a system for programming graphics hardware in a Clike language. ACM Transactions on Graphics, 2003174

How much training is needed in multipleantenna wireless links. IEEE Trans. on Inf. Theory, 2003173

Cytoscape: a software environment for integrated models of biomolecular interaction networks Genome Research, 2003172

pathChirp: Efficient Available Bandwidth Estimation for Network Paths. Proceedings of Passive and Active Measurements (PAM) workshop, 2003172

Mixminion: Design of a type III anonymous remailer protocol. In Proceedings, 2003 IEEE Symposium on Security and Privacy, 2003172

The Impact of Trade on IntraIndustry Reallocation and Aggregate Industry Productivity. Econometrica, 2003170

Adaptive duplicate detection using learnable string similarity measures. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD2003, 2003170

Behavioral Game Theory 2003170

Secure verification of location claims. In WiSe ’03: Proceedings of the 2nd ACM workshop on Wireless security, 2003170

Aggregate and verifiably encrypted signatures from bilinear maps. in Proc. EUROCRYPT, ser. LNCS, 2003168

Characterizing Mobility and Network Usage in a Corporate Wireless LocalArea Network. In 1st International Conference on Mobile Systems, Applications, and Services (MobiSys, 2003167

Automatic linguistic indexing of pictures by a statistical modeling approach. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003165

Monte Carlo Methods in Financial Engineering of Stochastic Modelling and Applied Probability, 2003165

Ultraconservative online algorithms for multiclass problems. The Journal of Machine Learning Research, 2003163

Monetary Theory and Policy 2003162

Random Geometric Graphs 2003162

Integrated coverage and connectivity configuration in wireless sensor networks. In ACM Sensys’03, 2003161

ESRT: eventtosink reliable transport in wireless sensor networks. in Proc. of MobiHoc, 2003160

Efficient PeertoPeer Keyword Searching. Proc. ACM/IFIP/USENIX Int’l Middleware Conf. (Middleware, 2003160