Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. P Lancaster, P Psarrakos
    On the pseudospectra of matrix polynomials SIAM J. Matrix Anal. Appl, 2005
  2. J A Kahle, M N Day, H P Hofstee, C R Johns, T R Maeurer, D Shippy
    Introduction to the cell multiprocessor IBM Journal of Research and Development, 2005
  3. Graham Cormode
    S.Muthukrishnan; What's Hot and What's Not: Tracking Most Frequent Items Dynamically. ACM Transactions on Database Systems, 2005
  4. S Roth, M Black
    Fields of experts: A framework for learning image priors. In IEEE Computer Vision and Pattern Recognition, 2005
  5. J Moult, K Fidelis, B Rost, T Hubbard, A Tramontano
    Critical assessment of methods of protein structure prediction (CASP)--round 6 Suppl 7, 2005
  6. R Feynman, R Leighton, M Sands
    The Feynman Lectures on 2005
  7. T Serre, L Wolf, T Poggio
    Object recognition with features inspired by visual cortex. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2005
  8. Philipp Koehn
    Europarl: A Parallel Corpus for Statistical Machine Translation. In Conference Proceedings: the tenth Machine Translation Summit, 2005
  9. J Teevan, S Dumais, E Horvitz
    Personalizing search via automated analysis of interests and activities. In SIGIR ‘05, 2005
  10. X Yang, D Wetherall, T Anderson
    A DoS-limiting network architecture. Proceedings of ACM SIGCOMM, 2005
    Gossip-based aggregation in large dynamic networks. ACM Transactions on Computer Systems, 2005
  12. M J Neely, E Modiano, C E Rohrs
    Dynamic Power Allocation and Routing for Time Varying Wireless Networks. IEEE J. Sel. Areas Comm, 2005
  13. Z Fu, H Luo, P Zerfos, S Lu, L Zhang, M Gerla
    The impact of multi-hop wireless channel on TCP performance. IEEE Transactions on Mobile Computing, 2005
  14. K Mikolajczyk, T Tuytelaars, C Schmid, A Zisserman, J Matas, F Schaffalitzky, T Kadir, L van
    Gool. A comparison of affine region detectors International Journal of Computer Vision, 65(7):43, 2005
  15. R ˜Koenker
    Quantile Regression 2005
  16. A W Moore, D Zuev
    Internet traffic classification using bayesian analysis techniques. Perform. Eval. Rev, 2005
  17. Albert Greenberg, Gisli Hjalmtysson, David A Maltz, Andy Myers, Jennifer Rexford, Geoffrey Xie, Hong Yan, Jibin Zhan, Hui Zhang
    A Clean Slate 4D Approach to Network Control and Management In Proceedings of ACM SIGCOMM CCR, 2005
  18. Anh Nguyen-tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, David Evans
    Automatically hardening web applications using precise tainting. In Proceedings of the IFIP International Information Security Conference, 2005
  19. A G Ramm
    Inverse problems. 2005
  20. O Reingold
    Undirected ST-Connectivity in Log-Space In 37th ACM Symposium on the Theory of Computing, 2005
  21. Jonathan Aldrich
    Open modules: Modular reasoning about advice. In European Conference on Object-Oriented Programming, 2005
  22. X Wang, Lisa Yin, Y Yu
    H.: Finding collisions in the full SHA-1. In: Proc. of CRYPTO 2005, 2005
  23. T Joachims
    A support vector method for multivariate performance measures. In Proceedings of 22nd International Conference on Machine Learning (ICML-2005, 2005
  24. D Brumley, Boneh
    D.: Remote timing attacks are practical. Computer Networks, 2005
  25. Boon T Loo, Tyson Condie, Joseph M Hellerstein, Petros Maniatis, Timothy Roscoe, Ion Stoica
    Implementing Declarative Overlays. In SOSP ’05: Proceedings of the twentieth ACM symposium on Operating systems principles, 2005
  26. R Wattenhofer, L Li, P Bahl, Y M Wang
    A cone-based distributed topology control algorithm for wireless multi-hop networks. IEEE/ACM Transactions on Networking, 2005
  27. J Art Dewey
    as experience 2005
  28. R Pike, S Dorward, R Griesemer, S Quinlan
    Interpreting the data: Parallel analysis with Sawzall. In Scientific Programming Journal, 2005
  29. M M K Martin, D J Sorin, B M Beckmann, M R Marty, M Xu, A R Alameldeen, K E Moore, M D Hill, D A Wood
    Multifacet’s General Execution-driven Multiprocessor Simulator (GEMS) Toolset. Computer Architecture News, 2005
  30. W d Nooy, A Mrvar, V Batagelj
    Exploratory social network analysis with Pajek 2005
  31. G Werner-Allen, P Swieskowski, M Welsh
    Motelab: a wireless sensor network testbed In IPSN ’05: Proceedings of the 4th international symposium on Information processing in sensor networks, page 68, Piscataway, 2005
  32. M S Floater, K Hormann
    Surface parameterization: a tutorial and survey. In Advances in, 2005
  33. R Cilibrasi
    M.B.Vitanyi, Clustering by compression. IEEE Transactions on Information Theory, 2005
  34. F Jurie, B Triggs
    Creating efficient codebooks for visual recognition. In ICCV, 2005
  35. R Xu, D Wunsch
    Survey of clustering algorithms IEEE Transactions on Neural Networks, 2005
  36. F Radlinski, Joachims
    T.: Query chains: learning to rank from implicit feedback. In: KDD ’05: Proceeding of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, 2005
  37. X He, S Yan, Y Hu, P Niyogi, H Zhang
    Face recognition using laplacianfaces. IEEE Trans. Pattern Anal. Mach. Intell, 2005
  38. E Nesterov
    Smooth minimization of nonsmooth functions Mathemtical Programming, 2005
  39. A Gulli, A Signorini
    The indexable Web is more than 11.5 billion pages. In Proc. 14th WWW, 2005
  40. R Bornat, C Calcagno, P W O’Hearn, M J Parkinson
    Permission accounting in separation logic In POPL, 2005
  41. Samuel T King, George W Dunlap, Peter M Chen
    Debugging Operating Systems with Time-Traveling Virtual Machines. In Proceedings of the 2005 USENIX Annual Technical Conference, 2005
  42. N Feamster, H Balakrishnan
    Detecting BGP configuration faults with static analysis. in Proc. 2nd Symp. Networked Systems Design and Implementation (NSDI, 2005
  43. Josef Sivic, Bryan C Russell, Alexei A Efros, Andrew Zisserman, William T Freeman
    Discovering objects and their location in images. In IEEE Intl. Conf. on Computer Vision, 2005
  44. B Taskar, V Chatalbashev, D Koller, C Guestrin
    Learning structured prediction models: a large margin approach. In Proceedings of 22nd International Conference on Machine Learning (ICML-2005, 2005
  45. E Cooke, F Jahanian, D McPherson
    The zombie roundup: Understanding, detecting, and disrupting botnets. In SRUTI 2005, 2005
  46. B Leibe, E Seemann, B Schiele
    Pedestrian detection in crowded scenes. Proc. of the International Conference on Computer Vision and Pattern Recognition (CVPR, 2005
  47. V Pai, K Kumar, K Tamilmani, V Sambamurthy, A E Mohr
    Chainsaw: Eliminating trees from overlay multicast. In IPTPS, 2005
  48. J Surowiecki
    The Wisdom of Crowds 2005
  49. S Boyd, A Ghosh, B Prabhakar
    Shah D.: Gossip Algorithms: Design, Analysis, and Applications. In: Proceedings of IEEE International Conference on Computer Communication (Infocom05, 2005
  50. T Wilson, J Wiebe, P Hoffmann
    Recognizing contextual polarity in phrase-level sentiment analysis. Proceedings of the Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, 2005
  51. Franz Baader, Ian Horrocks, Ulrike Sattler
    Description Logics as Ontology Languages for the Semantic Web. Mechanizing Mathematical Reasoning: Essays in Honor of Jörg Siekmann on the Occasion of His 60th Birthday, number 2605 in Lecture Notes in Artificial Intelligence, 2005
  52. D S Batory
    Feature models, grammars, and propositional formulas. In SPLC, volume 3714 of LNCS, 2005
  53. QEMU
    a fast and portable dynamic translator In USENIX Annual Technical Conference, FREENIX Track, 2005
  54. M Zhang, K Asanovic
    Victim replication: Maximizing capacity while hiding wire delay in tiled chip multiprocessors. in In Proceedings of the 32nd Annual International Symposium on Computer Architecture, 2005
  55. S Han
    A Dynamic Operating System for Sensor Nodes ACM Mobisys, 2005
  56. B E Aydemir, A Bohannon, M Fairbairn, J N Foster, B C Pierce, P Sewell, D Vytiniotis, G Washburn, S Weirich, Zdancewic
    S.: Mechanized metatheory for the masses: The PoplMark challenge. Theorem Proving in Higher Order Logics: 18th International Conference, TPHOLs 2005. Volume 3603 of Lecture Notes in Computer Science, 2005
  57. T Griffiths, Z Ghahramani
    Infinite latent feature models and the Indian buffet process. Advances in Neural Information Processing Systems, 2005
  58. A McCallum, A Corrada-Emmanuel, X Wang
    Topic and role discovery in social networks. In Proceedings of the 19th international joint conference on Artificial intelligence, 2005
  59. Y Zhao, G Karypis, U Fayyad
    Hierarchical clustering algorithms for document datasets. Data Mining and Knowledge Discovery, 2005
  60. R Fonseca, S Ratnasamy, D Culler, S Shenker, I Stoica
    Beacon vector routing: Scalable point-to-point routing in wireless sensornets. In In NSDI, 2005
  61. M Wainwright, T Jaakkola, A Willsky
    A new class of upper bounds on the log partition function. IEEE Trans. Info. Theory, 2005
  62. Nir Ailon, Moses Charikar, Alantha Newman
    Aggregating inconsistent information: ranking and clustering In Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, STOC ’05, 2005
  63. D Hoiem, A Efros, M Hebert
    Putting objects in perspective. In CVPR, 2005
  64. B Ross, C Jackson, N Miyake, D Boneh, J Mitchell
    Stronger password authentication using browser extensions In Proceedings of the 14th USENIX Security Symposium, 2005
  65. B Wong, A Slivkins, E G Sirer
    Meridian: A lightweight network location service without virtual coordinates. in Proc. ACM SIGCOMM, 2005
  66. M Kodialam, T Nandagopal
    Characterizing the capacity region in multi-radio multi-channel wireless mesh networks. In Proc. of ACM MobiCom, 2005
  67. D Anguelov, P Srinivasan, D Koller, S Thrun, J Rodgers, J Davis
    Scape: shape completion and animation of people. ACM Trans. Graph, 2005
  68. J Polastre, J Hui, P Levis, J Zhao, D Culler, S Shenker, I Stoica
    A unifying link abstraction for wireless sensor networks. In SenSys ’05: Proceedings of the 3rd international conference on Embedded networked sensor systems, 2005
  69. E Sudderth, A Torralba, W T Freeman, W Willsky
    Learning hierarchical models of scenes, objects, and parts. In IEEE Intl. Conf. on Computer Vision, 2005
  70. M Franklin, A Halevy, D Maier
    From databases to dataspaces: a new abstraction for information management. ACM Sigmod Record, 2005
  71. D Hoiem, A Efros, M Hebert
    Geometric context from a single image. In IEEE Intl. Conf. on Computer Vision, 2005
  72. M T J Spaan, N Vlassis
    Perseus: Randomized point-based value iteration for POMDPs. Journal of Artificial Intelligence Research, 2005
  73. United States
    General Accounting Office 2005
  74. J M McCune, A Perrig, M K Reiter
    Seeing-isbelieving: Using camera phones for human-verifiable authentication. In Proceedings of the IEEE Symposium on Security and Privacy, 2005
  75. Matthew J Parkinson, Gavin M Bierman
    Separation logic and abstraction. In POPL, 2005
  76. Dan Boneh, Xavier Boyen, Eu-Jin Goh
    Hierarchical Identity Based Encryption with Constant Size Ciphertext. In Proc. of Advances in Cryptology - EUROCRYPT 2005, 2005
  77. C G M Snoek, M Worring
    Multimodal video indexing: A review of the stateof-the-art. Multimedia Tools and Applications, 2005
  78. S Chen, J Xu, E C Sezer, P Gauriar, R K Iyer
    Non-control-data attacks are realistic threats. In 14 th USENIX Security Symposium, 2005
  79. J Banks, J S Carson, B L Nelson, D M Nicol
    Discrete-event system simulation 2005
  80. M E J Newman
    Power laws, pareto distributions and zipf’s law Contemporary Physics, 2005
  81. Chris Quirk, Arul Menezes, Colin Cherry
    Dependency treelet translation: Syntactically informed phrasal smt. In Proceedings of ACL 2005, 2005
  82. A LaMarca, Y Chawathe, S Consolvo, J Hightower, I Smith, J Scott, T Sohn, J Howard, J Hughes, F Potter, J Tabert, P Powledge, G Botriello, Schilit
    B.: Place lab: Device positioning using radio beacons in the wild. In: Proceedings of the third International Conference on Pervasive Compiting Pervasive, 2005