Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. P O Hoyer
    Non-negative matrix factorization with sparseness constraints,” The. Journal of Machine Learning Research, 2004
    325
  2. S Sen, J Wang
    Analyzing Peer-To-Peer Traffic Across Large Networks. IEEE/ACM TON, 2004
    323
  3. P Milgrom
    Putting Auction Theory to Work 2004
    322
  4. R Guha, R Kumar, P Raghavan, A Tomkins
    Propagation of trust and distrust. In WWW, 2004
    320
  5. R Szewczyk, A Mainwaring, J Polastre, J Anderson, D Culler
    An analysis of a large scale habitat monitoring application. Sensys. 2004
    320
  6. L Zeng, B Benatallah, A H Ngu, M Dumas, J Kalagnanam, H Chang
    Qos-aware middleware for web services composition. IEEE Trans. Softw. Eng, 2004
    316
  7. Kim HA, V Karp
    Autograph: Toward automated, distributed worm signature detection. Proc. of the 13th USENIX Security Symp. USENIX Association, 2004
    315
  8. David Moore, John Leonard, Daniela Rus, Seth Teller
    Robust distributed network localization with noisy range measurements. In Proceedings of the ACM SenSys ’04, 2004
    313
  9. B Leibe, A Leonardis, B Schiele
    Combined object categorization and segmentation with an implicit shape model. In ECCV workshop on statistical learning in computer vision, 2004
    312
  10. C Jin, D X Wei, S H Low
    FAST TCP: Motivation, architecture, algorithms, performance. In IEEE INFOCOM 2004, Hong Kong, 2004
    310
  11. S J Julier, J K Uhlmann
    Unscented filtering and nonlinear estimation. Proceedings of the IEEE, 2004
    305
  12. B Greiner
    An Online Recruitment System for Economic Experiments. Forschung und wissenschaftliches Rechnen 2003. GWDG Bericht 63. Gesellschaft für Wissenschaftliche Datenverarbeitung, 2004
    304
  13. R Kumar, J Novak, P Raghaven, A Tomkins
    Structure and evolution of blogspace. Communications of the ACM, 2004
    299
  14. W Daelemans, J Zavrel, K Van der Sloot, A Van den Bosch
    TiMBL: Tilburg Memory Based Learner, version 5.1, Reference Guide. 2004
    298
  15. J Klyne
    Resource description framework (RDF): concepts and Abstract Syntax, recommendation W3C: http://www.w3.org/TR/rdf-concepts, 2004
    298
  16. L Salwinski, C S Miller, A J Smith, F K Pettit, J U Bowie, D Eisenberg
    The Database of Interacting Proteins: 2004 update. Nucleic Acids Res 2004
    297
  17. F Bach, G R G Lanckriet, M
    Multiple kernel learning, conic duality, and the smo algorithm. Proceedings of the 2004 International Conference on Machine Learning, 2004
    296
  18. D Boneh, X Boyen
    Short signatures without random oracles. In Advances in Cryptology, Proc. EUROCRYPT 2004, LNCS 3027, 2004
    295
  19. R U Nabar, H Bölcskei, F W Kneubühler
    Fading relay channels: performance limits and space-time signal design. IEEE Journal on Selected Areas in Communications, 2004
    295
  20. Gentleman RC, Carey VJ, Bates DM
    Bioconductor: open software development for computational biology and bioinformatics Genome Biology, 2004
    294
  21. P Levis, N Patel, D Culler, S Shenker
    Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In Proceedings of the 1st Symposium on Network System Design and Implementation (NSDI ’04, 2004
    293
  22. D Boneh, X Boyen, H Shacham
    Short group signatures. In Proceedings of Advances in Cryptology (CRYPTO, 2004
    292
  23. S Singh, C Estan, G Varghese, S Savage
    Automated Worm Fingerprinting. In OSDI’04: Proceedings of the 6th conference on Symposium on Opearting Systems Design Implementation, 2004
    291
  24. J A Fax, R M Murray
    Information flow and cooperative control of vehicle formations IEEE Transactions on Automatic Control, 2004
    288
  25. W Hu, T Tan, L Wang, S Maybank
    A survey on visual surveillance of object motion and behaviors. IEEE Trans. Systems, Man, and Cybernetics- Part C: Applications and Reviews, 2004
    287
  26. M J Freedman, E Freudenthal, D Mazières
    Democratizing content publication with Coral. In Proceedings of the 1st USENIX Symposium on Networked Systems Design and Implementation (NSDI ’04, 2004
    287
  27. M Abadi, C Fournet
    Mobile values, new names, and secure communication. In Proc. POPL’01, 2004
    286
  28. L-L Xie, P R Kumar
    A network information theory for wireless communication: scaling laws and optimal operation. IEEE Transactions on Information Theory, 2004
    285
  29. A Lakhina, M Crovella, C Diot
    Diagnosing network-wide traffic anomalies. in ACM SIGCOMM, 2004
    283
  30. A R Bharambe, M Agrawal, S Seshan
    Mercury: Supporting scalable multi-attribute range queries. In Proceedings of the ACM SIGCOMM Conference, 2004
    279
  31. R E Neapolitan
    Learning Bayesian Networks Series in Artificial Intelligence, 2004
    278
  32. L Xiong, L Liu
    PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 2004
    278
  33. H Kellerer, U Pferschy, D Pisinger
    Knapsack Problems 2004
    278
  34. Surowiecki
    The Wisdom of the Crowds 2004
    277
  35. G Appenzeller, I Keslassy, N McKeown
    Sizing Router Buffers. In Proceedings of ACM SIGCOMM’04, 2004
    276
  36. M Charikar, K Chen, M Farach-Colton
    Finding frequent items in data streams. Theoretical Computer Science (TCS, 2004
    275
  37. Venter JC, K Remington, Heidelberg JF, Halpern AL, D Rusch
    Environmental genome shotgun sequencing of the Sargasso Sea Science 304: 66–74. PKS I Screen in Metagenomes PLoS ONE | www.plosone.org 7 October 2008 | Volume 3 | Issue 10 | e3515, 2004
    274
  38. C L Zitnick, S B Kang, M Uyttendaele, S Winder, R Szeliski
    High-quality video view interpolation using a layered representation ACM SIGGRAPH and ACM Trans. on Graphics, 2004
    268
  39. H Iwaniec, E Kowalski
    Analytic Number Theory. Amer. Math. Soc., Providence RI, 2004
    267
  40. R Kumar, D M Tullsen, P Ranganathan, N P Jouppi, K I Farkas
    Single-ISA Heterogeneous Multi-Core Architectures for Multithreaded Workload Performance. In Proceedings of the 31st International Symposium on Computer Architecture, 2004
    266
  41. T Henderson, D Kotz, I Abyzov
    The Changing Usage of a Mature Campus-Wide Wireless Network. In MobiCom ’04: Proceedings of the 10th annual international conference on Mobile computing and networking, 2004
    265
  42. D Hovemeyer, W Pugh
    Finding Bugs is Easy. In SIGPLAN Notices, 2004
    264
  43. S Akira, K Takeda
    Toll-like receptor signalling 2004
    263
  44. N Xu, S Rangwala, K Chintalapudi, D Ganesan, A Broad, R Govindan, D Estrin
    A wireless sensor network for structural monitoring. in Proc. ACM Conf. Embedded Networked Sensor Systems (SenSys 2005, 2004
    263
  45. P Barham, A Donnelly, R Isaacs, R Mortier
    Using Magpie for request extraction and workload modelling In 6th Symposium on Operating Systems Design and Implementation (OSDI’04, 2004
    262
  46. Pieter Abbeel, Andrew Y Ng
    Apprenticeship learning via inverse reinforcement learning. In Proceedings of the twenty-first international conference on Machine learning, ICML ’04, 2004
    261
  47. Jeffrey Considine, Feifei Li, George Kollios, John Byers
    Approximate aggregation techniques for sensor databases. In ICDE ’04: Proceedings of the 20th International Conference on Data Engineering, 2004
    260
  48. A Mathes
    Folksonomies: Cooperative classification and communication through shared metadata. University of Illinois Urbana-Champaign, 2004
    259
  49. J Jung, V Paxson, A Berger, H Balakrishnan
    Fast Portscan Detection Using Sequential Hypothesis Testing. In Proceedings of 2004 IEEE Symposium on Security and Privacy, 2004
    259
  50. M J Pickering, S Garrod
    Toward a mechanistic psychology of dialogue Brain and Behavior Sciences, 2004
    259
  51. P Dourish
    What we talk about when we talk about context. Personal and Ubiquitous Computing. 8(1, 2004
    257
  52. M Dufwenberg, G Kirchsteiger
    A theory of sequential reciprocity. Games and Economic Behavior, 2004
    256
  53. P Bahl, R Chandra, J Dunagan
    SSCH: slotted seeded channel hopping for capacity improvement in IEEE 802.11 ad-hoc wireless networks. In MobiCom ’04: Proceedings of the 10th annual international conference on Mobile computing and networking, 2004
    253
  54. D E Rose, D Levinson
    Understanding user goals in web search Proceedings of the thirteenth InternationalWorldWideWeb Conference, ACMPress, 2004
    252
  55. T Pedersen, S Patwardhan, J Michelizzi
    WordNet::Similarity – Measuring the Relatedness of Concepts. Paper presented at the. Proceedings of Fifth Annual Meeting of the North American Chapter of the Association of Computational Linguistics (NAACL, 2004
    252
  56. J Newsome, R Shi, D Song, A Perrig
    The sybil attack in sensor networks: Analysis and defenses. In Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN, 2004
    252
  57. M O Jackson
    A survey of models of network formation: Stability and efficiency. Group Formation in Economics: Networks, Clubs and Coalitions, 2004
    249
  58. G E Crooks, G Hon, J M Chandonia, S E Brenner
    WebLogo: a sequence logo generator. Genome Res, 2004
    249
  59. M Pollefeys, L V Gool, M Vergauwen, F Verbiest, K Cornelis, J Tops, R Koch
    Visual modeling with a hand-held camera IJCV, 2004
    245
  60. Michel Galley, Mark Hopkins, Kevin Knight, Daniel Marcu
    What‟s in a translation rule. In Proc. of HLT-NAACL 2004, 2004
    245
  61. F B Viégas, M Wattenberg, D Kushal
    Studying cooperation and conflict between authors with history flow visualizations. CHI Letters, 2004
    245
  62. V Shnayder, M Hempstead, B Chen, G Werner-Allen, M Welsh
    Simulating the power consumption of large-scale sensor network applications. ACM SenSys, 2004
    243
  63. Sanjeev Arora, Satish Rao, Umesh Vazirani
    Expander flows, geometric embeddings and graph partitioning. In Proceedings of ACM STOC, 2004
    241
  64. Urvoy-Keller Izal, Felber Biersack, Hamra, Garc’esErice
    Dissecting bittorrent: Five months in a torrent’s lifetime. In PAM, 2004
    241
  65. G W Harrison, J A List
    Field experiments. Journal of Economic Literature, 2004
    239
  66. Craig Boutilier, Ronen I Brafman, Carmel Domshlak, Holger H Hoos, David Poole
    Cp-nets: A tool for representing and reasoning with conditional ceteris paribus preference statements. JAIR, 2004
    239
  67. S Li, C M Armstrong, N Bertin, H Ge, S Milstein, M Boxem, P O Vidalain, J D Han, A Chesneau, T Hao
    A map of the interactome network of the metazoan C. elegans Science, 2004
    239
  68. J Stankovic Perrig
    D.Wagners, “Security in wireless sensor networks. Communications of the ACM, Volume 47, Issue, 2004
    239
  69. X Sala-i-Martin, G Doppelhofer, R I Miller
    Determinants of Long-Term Growth: A Bayesian Averaging of Classical Estimates (BACE) Approach. American Economic Review, 2004
    238
  70. D Boneh, G di Crescenzo, R Ostrovsky, G Persiano
    Public key encryption with keyword search. Proc. Eurocrypt’04, 2004
    237
  71. A AGARWALA, M DONTCHEVA, M AGRAWALA, S DRUCKER, A COLBURN, B CURLESS, D SALESIN, M COHEN
    Interactive digital photomontage. ACM Trans. Graph, 2004
    236
  72. J Nivre, J Hall, J Nilsson
    Memory-based dependency parsing. In Proc. of CoNLL, 2004
    235
  73. P Hell, J Nešetřil
    Graphs and Homomorphisms. Oxford Lecture Series in Mathematics and Its Applications 28, 2004
    235
  74. A D Keromytis, V Misra, D Rubenstein
    SOS: Secure overlay services. Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary (LCN’05) 0-7695-2421-4/05 $20.00 © 2005 IEEE, 2004
    235
  75. D Cabric, S M Mishra, R W Brodersen
    Implementation issues in spectrum sensing for cognitive radios. in Proc. IEEE Asilomar Conf. on Signals, Syst., Computers, 2004
    234
  76. L Hu, D Evans
    Localisation for mobile sensor networks. In Tenth International Conference on Mobile Computing and Networking (MobiCom, 2004
    234
  77. S Banarjee, B P Carlin, A Gelfand
    Hierarchical modelling and Analysis for spatial data 2004
    234
  78. X He, P Niyogi
    Locality preserving projections. Advances in Neural Information Processing Systems 16, 2004
    233
  79. M A Harris, J Clark, A Ireland, J Lomax, M Ashburner, R Foulger, K Eilbeck, S Lewis, B Marshall
    The Gene Ontology (GO) database and informatics resource Nucleic Acids Res, 2004
    232
  80. R Draves, J Padhye, B Zill
    Comparison of routing metrics for static multi-hop wireless networks. in Proceedings of the 2004 conference on Applications, technologies, architectures, and, 2004
    232
  81. K Okuma, A Taleghani, N de Freitas
    A Boosted Particle Filter: Multitarget Detection and Tracking. In the proceedings of ECCV04, 2004
    231
  82. Edmund M Clarke, Daniel Kroening, Flavio Lerda
    A Tool for Checking ANSI-C Programs. In TACAS, 2004
    230
  83. E Giunchiglia, J Lee, V Lifschitz, N McCain, Turner
    H.: Nonmonotonic causal theories. Arti Intelligence, 2004
    230