Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. P Lancaster, P Psarrakos
    On the pseudospectra of matrix polynomials SIAM J. Matrix Anal. Appl, 2005
    134
  2. J A Kahle, M N Day, H P Hofstee, C R Johns, T R Maeurer, D Shippy
    Introduction to the cell multiprocessor IBM Journal of Research and Development, 2005
    133
  3. Graham Cormode
    S.Muthukrishnan; What's Hot and What's Not: Tracking Most Frequent Items Dynamically. ACM Transactions on Database Systems, 2005
    133
  4. S Roth, M Black
    Fields of experts: A framework for learning image priors. In IEEE Computer Vision and Pattern Recognition, 2005
    132
  5. J Moult, K Fidelis, B Rost, T Hubbard, A Tramontano
    Critical assessment of methods of protein structure prediction (CASP)--round 6 Suppl 7, 2005
    130
  6. R Feynman, R Leighton, M Sands
    The Feynman Lectures on 2005
    130
  7. T Serre, L Wolf, T Poggio
    Object recognition with features inspired by visual cortex. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2005
    128
  8. Philipp Koehn
    Europarl: A Parallel Corpus for Statistical Machine Translation. In Conference Proceedings: the tenth Machine Translation Summit, 2005
    126
  9. J Teevan, S Dumais, E Horvitz
    Personalizing search via automated analysis of interests and activities. In SIGIR ‘05, 2005
    125
  10. X Yang, D Wetherall, T Anderson
    A DoS-limiting network architecture. Proceedings of ACM SIGCOMM, 2005
    125
  11. M JELASITY, A MONTRESOR, O BABAOGLU
    Gossip-based aggregation in large dynamic networks. ACM Transactions on Computer Systems, 2005
    124
  12. M J Neely, E Modiano, C E Rohrs
    Dynamic Power Allocation and Routing for Time Varying Wireless Networks. IEEE J. Sel. Areas Comm, 2005
    124
  13. Z Fu, H Luo, P Zerfos, S Lu, L Zhang, M Gerla
    The impact of multi-hop wireless channel on TCP performance. IEEE Transactions on Mobile Computing, 2005
    122
  14. K Mikolajczyk, T Tuytelaars, C Schmid, A Zisserman, J Matas, F Schaffalitzky, T Kadir, L van
    Gool. A comparison of affine region detectors International Journal of Computer Vision, 65(7):43, 2005
    120
  15. R ˜Koenker
    Quantile Regression 2005
    120
  16. A W Moore, D Zuev
    Internet traffic classification using bayesian analysis techniques. Perform. Eval. Rev, 2005
    120
  17. Albert Greenberg, Gisli Hjalmtysson, David A Maltz, Andy Myers, Jennifer Rexford, Geoffrey Xie, Hong Yan, Jibin Zhan, Hui Zhang
    A Clean Slate 4D Approach to Network Control and Management In Proceedings of ACM SIGCOMM CCR, 2005
    119
  18. Anh Nguyen-tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, David Evans
    Automatically hardening web applications using precise tainting. In Proceedings of the IFIP International Information Security Conference, 2005
    119
  19. A G Ramm
    Inverse problems. 2005
    118
  20. O Reingold
    Undirected ST-Connectivity in Log-Space In 37th ACM Symposium on the Theory of Computing, 2005
    118
  21. Jonathan Aldrich
    Open modules: Modular reasoning about advice. In European Conference on Object-Oriented Programming, 2005
    117
  22. X Wang, Lisa Yin, Y Yu
    H.: Finding collisions in the full SHA-1. In: Proc. of CRYPTO 2005, 2005
    117
  23. T Joachims
    A support vector method for multivariate performance measures. In Proceedings of 22nd International Conference on Machine Learning (ICML-2005, 2005
    116
  24. D Brumley, Boneh
    D.: Remote timing attacks are practical. Computer Networks, 2005
    116
  25. Boon T Loo, Tyson Condie, Joseph M Hellerstein, Petros Maniatis, Timothy Roscoe, Ion Stoica
    Implementing Declarative Overlays. In SOSP ’05: Proceedings of the twentieth ACM symposium on Operating systems principles, 2005
    115
  26. R Wattenhofer, L Li, P Bahl, Y M Wang
    A cone-based distributed topology control algorithm for wireless multi-hop networks. IEEE/ACM Transactions on Networking, 2005
    115
  27. J Art Dewey
    as experience 2005
    114
  28. R Pike, S Dorward, R Griesemer, S Quinlan
    Interpreting the data: Parallel analysis with Sawzall. In Scientific Programming Journal, 2005
    114
  29. M M K Martin, D J Sorin, B M Beckmann, M R Marty, M Xu, A R Alameldeen, K E Moore, M D Hill, D A Wood
    Multifacet’s General Execution-driven Multiprocessor Simulator (GEMS) Toolset. Computer Architecture News, 2005
    114
  30. W d Nooy, A Mrvar, V Batagelj
    Exploratory social network analysis with Pajek 2005
    114
  31. G Werner-Allen, P Swieskowski, M Welsh
    Motelab: a wireless sensor network testbed In IPSN ’05: Proceedings of the 4th international symposium on Information processing in sensor networks, page 68, Piscataway, 2005
    114
  32. M S Floater, K Hormann
    Surface parameterization: a tutorial and survey. In Advances in, 2005
    114
  33. R Cilibrasi
    M.B.Vitanyi, Clustering by compression. IEEE Transactions on Information Theory, 2005
    113
  34. F Jurie, B Triggs
    Creating efficient codebooks for visual recognition. In ICCV, 2005
    112
  35. R Xu, D Wunsch
    Survey of clustering algorithms IEEE Transactions on Neural Networks, 2005
    111
  36. F Radlinski, Joachims
    T.: Query chains: learning to rank from implicit feedback. In: KDD ’05: Proceeding of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, 2005
    111
  37. X He, S Yan, Y Hu, P Niyogi, H Zhang
    Face recognition using laplacianfaces. IEEE Trans. Pattern Anal. Mach. Intell, 2005
    110
  38. E Nesterov
    Smooth minimization of nonsmooth functions Mathemtical Programming, 2005
    110
  39. A Gulli, A Signorini
    The indexable Web is more than 11.5 billion pages. In Proc. 14th WWW, 2005
    110
  40. R Bornat, C Calcagno, P W O’Hearn, M J Parkinson
    Permission accounting in separation logic In POPL, 2005
    110
  41. Samuel T King, George W Dunlap, Peter M Chen
    Debugging Operating Systems with Time-Traveling Virtual Machines. In Proceedings of the 2005 USENIX Annual Technical Conference, 2005
    109
  42. N Feamster, H Balakrishnan
    Detecting BGP configuration faults with static analysis. in Proc. 2nd Symp. Networked Systems Design and Implementation (NSDI, 2005
    109
  43. Josef Sivic, Bryan C Russell, Alexei A Efros, Andrew Zisserman, William T Freeman
    Discovering objects and their location in images. In IEEE Intl. Conf. on Computer Vision, 2005
    109
  44. B Taskar, V Chatalbashev, D Koller, C Guestrin
    Learning structured prediction models: a large margin approach. In Proceedings of 22nd International Conference on Machine Learning (ICML-2005, 2005
    109
  45. E Cooke, F Jahanian, D McPherson
    The zombie roundup: Understanding, detecting, and disrupting botnets. In SRUTI 2005, 2005
    108
  46. B Leibe, E Seemann, B Schiele
    Pedestrian detection in crowded scenes. Proc. of the International Conference on Computer Vision and Pattern Recognition (CVPR, 2005
    108
  47. V Pai, K Kumar, K Tamilmani, V Sambamurthy, A E Mohr
    Chainsaw: Eliminating trees from overlay multicast. In IPTPS, 2005
    108
  48. J Surowiecki
    The Wisdom of Crowds 2005
    106
  49. S Boyd, A Ghosh, B Prabhakar
    Shah D.: Gossip Algorithms: Design, Analysis, and Applications. In: Proceedings of IEEE International Conference on Computer Communication (Infocom05, 2005
    105
  50. T Wilson, J Wiebe, P Hoffmann
    Recognizing contextual polarity in phrase-level sentiment analysis. Proceedings of the Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, 2005
    105
  51. Franz Baader, Ian Horrocks, Ulrike Sattler
    Description Logics as Ontology Languages for the Semantic Web. Mechanizing Mathematical Reasoning: Essays in Honor of Jörg Siekmann on the Occasion of His 60th Birthday, number 2605 in Lecture Notes in Artificial Intelligence, 2005
    105
  52. D S Batory
    Feature models, grammars, and propositional formulas. In SPLC, volume 3714 of LNCS, 2005
    104
  53. QEMU
    a fast and portable dynamic translator In USENIX Annual Technical Conference, FREENIX Track, 2005
    104
  54. M Zhang, K Asanovic
    Victim replication: Maximizing capacity while hiding wire delay in tiled chip multiprocessors. in In Proceedings of the 32nd Annual International Symposium on Computer Architecture, 2005
    104
  55. S Han
    A Dynamic Operating System for Sensor Nodes ACM Mobisys, 2005
    104
  56. B E Aydemir, A Bohannon, M Fairbairn, J N Foster, B C Pierce, P Sewell, D Vytiniotis, G Washburn, S Weirich, Zdancewic
    S.: Mechanized metatheory for the masses: The PoplMark challenge. Theorem Proving in Higher Order Logics: 18th International Conference, TPHOLs 2005. Volume 3603 of Lecture Notes in Computer Science, 2005
    104
  57. T Griffiths, Z Ghahramani
    Infinite latent feature models and the Indian buffet process. Advances in Neural Information Processing Systems, 2005
    103
  58. A McCallum, A Corrada-Emmanuel, X Wang
    Topic and role discovery in social networks. In Proceedings of the 19th international joint conference on Artificial intelligence, 2005
    103
  59. Y Zhao, G Karypis, U Fayyad
    Hierarchical clustering algorithms for document datasets. Data Mining and Knowledge Discovery, 2005
    103
  60. R Fonseca, S Ratnasamy, D Culler, S Shenker, I Stoica
    Beacon vector routing: Scalable point-to-point routing in wireless sensornets. In In NSDI, 2005
    103
  61. M Wainwright, T Jaakkola, A Willsky
    A new class of upper bounds on the log partition function. IEEE Trans. Info. Theory, 2005
    102
  62. Nir Ailon, Moses Charikar, Alantha Newman
    Aggregating inconsistent information: ranking and clustering In Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, STOC ’05, 2005
    102
  63. D Hoiem, A Efros, M Hebert
    Putting objects in perspective. In CVPR, 2005
    102
  64. B Ross, C Jackson, N Miyake, D Boneh, J Mitchell
    Stronger password authentication using browser extensions In Proceedings of the 14th USENIX Security Symposium, 2005
    102
  65. B Wong, A Slivkins, E G Sirer
    Meridian: A lightweight network location service without virtual coordinates. in Proc. ACM SIGCOMM, 2005
    102
  66. M Kodialam, T Nandagopal
    Characterizing the capacity region in multi-radio multi-channel wireless mesh networks. In Proc. of ACM MobiCom, 2005
    102
  67. D Anguelov, P Srinivasan, D Koller, S Thrun, J Rodgers, J Davis
    Scape: shape completion and animation of people. ACM Trans. Graph, 2005
    102
  68. J Polastre, J Hui, P Levis, J Zhao, D Culler, S Shenker, I Stoica
    A unifying link abstraction for wireless sensor networks. In SenSys ’05: Proceedings of the 3rd international conference on Embedded networked sensor systems, 2005
    101
  69. E Sudderth, A Torralba, W T Freeman, W Willsky
    Learning hierarchical models of scenes, objects, and parts. In IEEE Intl. Conf. on Computer Vision, 2005
    101
  70. M Franklin, A Halevy, D Maier
    From databases to dataspaces: a new abstraction for information management. ACM Sigmod Record, 2005
    101
  71. D Hoiem, A Efros, M Hebert
    Geometric context from a single image. In IEEE Intl. Conf. on Computer Vision, 2005
    100
  72. M T J Spaan, N Vlassis
    Perseus: Randomized point-based value iteration for POMDPs. Journal of Artificial Intelligence Research, 2005
    100
  73. United States
    General Accounting Office 2005
    100
  74. J M McCune, A Perrig, M K Reiter
    Seeing-isbelieving: Using camera phones for human-verifiable authentication. In Proceedings of the IEEE Symposium on Security and Privacy, 2005
    100
  75. Matthew J Parkinson, Gavin M Bierman
    Separation logic and abstraction. In POPL, 2005
    100
  76. Dan Boneh, Xavier Boyen, Eu-Jin Goh
    Hierarchical Identity Based Encryption with Constant Size Ciphertext. In Proc. of Advances in Cryptology - EUROCRYPT 2005, 2005
    100
  77. C G M Snoek, M Worring
    Multimodal video indexing: A review of the stateof-the-art. Multimedia Tools and Applications, 2005
    100
  78. S Chen, J Xu, E C Sezer, P Gauriar, R K Iyer
    Non-control-data attacks are realistic threats. In 14 th USENIX Security Symposium, 2005
    99
  79. J Banks, J S Carson, B L Nelson, D M Nicol
    Discrete-event system simulation 2005
    99
  80. M E J Newman
    Power laws, pareto distributions and zipf’s law Contemporary Physics, 2005
    99
  81. Chris Quirk, Arul Menezes, Colin Cherry
    Dependency treelet translation: Syntactically informed phrasal smt. In Proceedings of ACL 2005, 2005
    97
  82. A LaMarca, Y Chawathe, S Consolvo, J Hightower, I Smith, J Scott, T Sohn, J Howard, J Hughes, F Potter, J Tabert, P Powledge, G Botriello, Schilit
    B.: Place lab: Device positioning using radio beacons in the wild. In: Proceedings of the third International Conference on Pervasive Compiting Pervasive, 2005
    97