Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. D Hovemeyer, W Pugh
    Finding bugs is easy. In Companion to the 19th annual ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications, OOPSLA ’04, 2004
    176
  2. Matt Welsh, Geoff Mainland
    Programming sensor networks using abstract regions In the First USENIX/ACM Symposium on Networked Systems Design and Implementation (NSDI ’04, 2004
    176
  3. L Xiong, L Liu
    PeerTrust: Supporting Reputation-Based Trust in Peer-to-PeerCommunities. IEEE Trans. Knowledge and Data Eng, 2004
    176
  4. A Lakhina, M Crovella, C Diot
    Diagnosing network-wide traffic anomalies. In SIGCOMM Conf, 2004
    176
  5. B Leibe, A Leonardis, B Schiele
    Combined object categorization and segmentation with an implicit shape model. In ECCV, 2004
    175
  6. A Torralba, K P Murphy, W T Freeman
    Sharing features: efficient boosting procedures for multiclass object detection. In Proc. Conf. Computer Vision and Pattern Recognition, 2004
    174
  7. N Xu, S Ranfwala, K Chintalapudi, D Ganesan, A Broad, R Govindan, D Estrin
    A wireless sensor network for structural monitoring. in Proc. the ACM Conference on Embedded Networked Sensor Systems (Sensys04, 2004
    172
  8. A Dunkels, G Gronvall, T Voigt
    Contiki - a Lightweight and Flexible Operating System for Tiny Networked Sensors. Proceedings of the First IEEE Workshop on Embedded Networked Sensors, 2004
    170
  9. Y Dodis, R Ostrovsky, L Reyzin, A Smith
    Fuzzy Extractors: How to Generate Strong Keys from. Biometrics and Other Noisy Data, Proc. Eurocrypt 2004 (LNCS: 3027, 2004
    170
  10. P O Hoyer
    Non-negative Matrix Factorization with Sparseness Constraints. Journal of Machine Learning Research, 2004
    169
  11. A K Jain, A Ross, S Prabhakar
    An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol, 2004
    169
  12. M L Mehta
    Random Matrices 2004
    169
  13. S C Madeira, A L Oliveira
    Biclustering algorithms for biological data analysis: a survey. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2004
    167
  14. A Clauset, M E J Newman
    Finding community structure in very large networks Physical Review E, 2004
    167
  15. T Brox, A Bruhn, N Papenberg, J Weickert
    High accuracy optical flow estimation based on a theory for warping. In ECCV, 2004
    167
  16. G A F Seber
    Multivariate Observations 2004
    167
  17. D McGuinness, F Harmelen
    Owl web ontology language overview 2004
    166
  18. V Shnayder, M Hempstead, B Chen, G W Allen, M Welsh
    Simulating the power consumption of large-scale sensor network applications. In Proceedings of the 2nd international conference on embedded networked sensor systems (SenSys, 2004
    165
  19. S Fortune
    Voronoi diagrams and Delaunay triangulations. Handbook of Discrete and Computational Geometry, 2004
    165
  20. C Boutilier, R I Brafman, C Domshlak, H H Hoos, Poole
    D.: CP-nets: A tool for representing and reasoning with conditional Ceteris Paribus preference statements. J. Artif. Intell. Res, 2004
    163
  21. K Whitehouse, C Sharp, E Brewer, D Culler
    Hood: a neighborhood abstraction for sensor networks in Proc. ACM International Conference on Mobile Systems, Applications, and Services (MobiSys ’04, 2004
    162
  22. M Datar, N Immorlica, P Indyk, V S Mirrokni
    Locality-sensitive hashing scheme based on p-stable distributions. In SCG, 2004
    161
  23. K Wang, S J Stolfo
    Anomalous Payload-based Network Intrusion Detection. In Proceedings of the 7 th International Symposium on Recent Advances in Intrusion Detection (RAID, 2004
    161
  24. M POLLEFEYS, L V GOOL, M VERGAUWEN, F VERBIEST, K CORNELIS, J TOPS, R KOCH
    Visual modeling with a hand-held camera International Journal of Computer Vision, 2004
    160
  25. L Zeng, B Benatallah, A H H Ngu, M Dumas, J Kalagnanam, H Chang
    Qos-aware middleware for web services composition. IEEE Trans. Software Eng, 2004
    160
  26. T A Henzinger, R Jhala, R Majumdar, K L McMillan
    Abstractions from proofs. Proceedings of the 31st Symposium on Principles of Programming Languages, 2004
    159
  27. P Hell, J Neˇsetˇril
    Graphs and homomorphisms Oxford Lecture Series in Mathematics and its Applications, 28, 2004
    158
  28. C Flanagan, S N Freund
    Atomizer: a dynamic atomicity checker for multithreaded programs. In POPL, 2004
    157
  29. H Liu, P Singh
    Conceptnet, a practical commonsense reasoning tool-kit. BT Technology Journal, 2004
    157
  30. N Provos
    A virtual honeypot framework. In Proc. USENIX Security’04, 2004
    156
  31. J N Al-Karaki, A E Kamal
    Routing Techniques in Wireless Sensor Networks: A Survey. in IEEE Wireless Communications, 2004
    155
  32. D E Rose, D Levinson
    Understanding user goals in Web search In Proc. Of the 13th Int. Conf. on the World Wide Web, 2004
    155
  33. C Koch
    Biophysics of computation 2004
    155
  34. F Lin, Y Zhao
    ASSAT: computing answer sets of a logic program by SAT solvers. Artificial Intelligence, 2004
    155
  35. R Draves, J Padhye, B Zill
    Comparisons of Routing Metrics for Static Multi-Hop Wireless Networks. ACM Annual Conf. Special Interest Group on Data Communication (SIGCOMM, 2004
    154
  36. M Galley, M Hopkins, K Knight, D Marcu
    What’s in a translation rule. Proceedings HTL-NAACL, 2004
    153
  37. C L Zitnick, S B Kang, M Uyttendaele, S Winder, R Szeliski
    High-quality video view interpolation using a layered representation in ACM SIGGRAPH. ACM, 2004
    153
  38. P Milgrom
    Putting auction theory to work 2004
    153
  39. Paramvir Bahl, Ranveer Chandra, John Dunagan
    SSCH: slotted seeded channel hopping for capacity improvement in ieee 802.11 ad-hoc wireless networks. In MobiCom ’04: Proceedings of the 10th annual international conference on Mobile computing and networking, 2004
    152
  40. M Feldman, K Lai, I Stoica, J Chuang
    Robust incentive techniques for peer-to-peer networks. in Proc. of ACM EC ’04, 2004
    152
  41. A Mathes
    Folksonomies: Cooperative Classification and Communication Through Shared Metadata. University of Illinois Urbana-Champaign, 2004
    151
  42. F R Bach, G R G Lanckriet, M I Jordan
    Multiple kernel learning, conic duality, and the SMO algorithm. In Proceedings of the twenty-first international conference on Machine learning, 2004
    151
  43. G E Suh, J W Lee, D Zhang, S Devadas
    Secure program execution via dynamic information flow tracking. In Proc. Architectural Support for Programming Languages and Operating Systems, 2004
    151
  44. H Kellerer, U Pferschy, D Pisinger
    Knapsack Problems 2004
    148
  45. M S Bazarra, J J Jarvis, H D Sherali
    Linear programming and network flows 2004
    148
  46. A Meyerson, R Williams
    On the complexity of optimal k-anonymity In PODS, 2004
    147
  47. S J Julier, J K Uhlmann
    Unscented Filtering and Nonlinear Estimation. Proceedings of the IEEE, 2004
    145
  48. R Szewczyk, J Polastre, J Mainwaring
    Lessons from a sensor network expedition. In European Workshop on Wireless Sensor Networks, 2004
    145
  49. D Gruhl, R Guha, D Liben-Nowell, A Tomkins
    Information diffusion through blogspace. In Proc. of 13th Intl. WWW Conference, 2004
    145
  50. H J Wang, C Guo, D R Simon, A Shield Zugenmaier
    Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In ACM SIGCOMM, 2004
    145
  51. L Hu, D Evans
    Localization for Mobile Sensor Networks. in Proceedings of ACM MobiCom, 2004
    141
  52. I F Akyildiz, Kasimoglu
    I.H.: Wireless sensor and actor networks: Research challenges Ad Hoc Networks Journal, 2004
    141
  53. A AGARWALA, M DONTCHEVA, M AGRAWALA, S DRUCKER, A COLBURN, B CURLESS, D SALESIN, M COHEN
    Interactive digital photomontage. In SIGGRAPH, 2004
    141
  54. M J Freedman, K Nissim, B Pinkas
    Efficient private matching and set intersection. Proceedings of EUROCRYPT 2004, LNCS 3027, 2004
    140
  55. C T Harbison, D B Gordon, T I Lee, N J Rinaldi, K D MacIsaac, T W Danford, N M Hannett, J-B Tagne, D B Reynolds, J Yoo, E G Jennings, J Zeitlinger, D K Pokholok, M Kellis, P A Rolfe, K T Takusagawa, E S Lander, D K Gifford, E Fraenkel, R A Young
    Transcriptional regulatory code of a eukaryotic genome Nature, 2004
    139
  56. M Mihail, A Saberi C Gkantsidis
    Random Walks in PeertoPeer Networks. in Proc. 23rd IEEE INFOCOM, 2004
    139
  57. P W O’Hearn, H Yang, J C Reynolds
    Separation and information hiding. In POPL ’04, 2004
    139
  58. M Rosen-Zvi, T Griffiths, M Steyvers, P Smith
    The author-topic model for authors and documents. In Proceedings of the 20th Conference on Uncertainty in Artificial Intelligence, 2004
    138
  59. J Nivre, J Hall, J Nilsson
    Memory-based dependency parsing. In Proc. of CoNLL, 2004
    137
  60. E Anshelevich, A Dasgupta, J Kleinberg, E Tardos, T Wexler, T Roughgarden
    The Price of Stability for Network Design with Fair Cost Allocation. In 45th Annual IEEE Symposium on Foundations of Computer Science, 2004
    137
  61. C Dwork, M Naor, Sahai
    A.: Concurrent zero-knowledge. J. ACM, 2004
    137
  62. Fernanda Viégas, Martin Wattenberg, Kushal Dave
    Studying cooperation and conflict between authors with history flow visualizations. In In Proceedings of the Conference on Human Factors in Computing Systems (CHI 2004, 2004
    137
  63. J R Crandall, F T Chong
    Minos: Control data attack prevention orthogonal to memory model. In Proceedings of the 37th International Symposium on Microarchitecture (MICRO, 2004
    136
  64. A Ben-Tal, A Goryashko, E Guslitzer
    A Nemirovski. Adjustable robust solutions of uncertain linear programs. Mathematical Programming, 2004
    136
  65. A Perrig, J Stankovic, D Wagner
    Security in wireless sensor networks. Comm. of the ACM, 2004
    135
  66. Ted Pedersen, Siddharth Patwardhan, Jason Michelizzi
    WordNet::Similarity: measuring the relatedness of concepts. In Demonstration Papers at Human Language Technologies - North American Chapter of the Association for Computational Linguistics, 2004
    135
  67. J Camenisch, A Lysyanskaya
    Signature schemes and anonymous credentials from bilinear maps. In Proceedings of Crypto 2004, 2004
    135
  68. X Fu, T Bultan, J Su
    Analysis of interacting bpel web services. In: WWW ’04: Proceedings of the 13th international conference on World Wide Web, 2004
    135
  69. D Fetterly, M Manasse, M Najork, J L Wiener
    A large-scale study of the evolution of web pages. In Softw. Pract. Exper, 2004
    134
  70. Tom Mens, Tom Tourwé
    A Survey of Software Refactoring IEEE Transactions on Software Engineering, 2004
    134
  71. L Fei-Fei, R Fergus, P Perona
    A bayesian approach to unsupervised oneshot learning of object categories. In IEEE Intl. Conf. on Computer Vision, 2004
    133
  72. W Du, J Deng, Y S Han, S Chen, P K Varshney
    A key management scheme for wireless sensor networks using deployment knowledge. in Proc. of INFOCOM, 2004
    133
  73. Li Ding, Timothy W Finin, Anupam Joshi, Rong Pan, R Scott Cost, Yun Peng, Pavan Reddivari, Vishal Doshi, Joel Sachs
    Swoogle: a search and metadata engine for the semantic web. In CIKM, 2004
    132
  74. F Dabek, J Li, E Sit, J Robertson, M Kaashoek, R Morris
    Designing a DHT for low latency and high throughput. in NSDI, 2004
    131
  75. Honghai Zhang, Jennifer C Hou
    Maintaining Sensing Coverage and Connectivity in Large Sensor Networks, Book chapter in Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless and Peer-to-Peer Network, 2004
    130
  76. B Knutsson
    Peer-to-peer support for massively multiplayer games. In INFOCOM, 2004
    130
  77. L Girod, J Elson, A Cerpa, T Stathopoulos, N Ramanathan, D Estrin
    Emstar: a software environment for developing and deploying wireless sensor networks. In Proceedings of the 2004 USENIX Technical Conference, 2004
    130
  78. T Hofmann
    Latent semantic models for collaborative filtering ACM Transactions on Information Systems, 2004
    130
  79. Aron Culotta, Jeffrey Sorensen
    Dependency tree kernels for relation extraction. In Proceedings of the 42nd Annual Meeting of the Association for Computational Linguistics (ACL, 2004
    129
  80. S Thrun, Y Liu, D Koller, A Ng, Z Ghahramani, H Durrant-Whyte
    Simultaneous localization and mapping with sparse extended information filters The International Journal of Robotics Research, 2004
    128
  81. Brook
    for GPUs: Stream Computing on Graphics Hardware ACM TRANSACTIONS ON GRAPHICS, 2004
    128