Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. Rion Snow, Daniel Jurafsky, Andrew Y Ng
    Semantic taxonomy induction from heterogenous evidence. In Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics, ACL-44, 2006
    109
  2. C Dwork
    Differential privacy. In ICALP, 2006
    108
  3. D Kempe, J Kleinberg, A Demers
    Spatial gossip and resource location protocols. In Proceedings of STOC’06, 2006
    108
  4. A Chaintreau, P Hui, J Crowcroft, C Diot, R Gass, J Scott
    Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms. in Proceedings of INFOCOM, 2006
    107
  5. G Werner-Allen, K Lorincz, J Johnson, J Lees, M Welsh
    Fidelity and yield in a volcano monitoring sensor network. USENIX OSDI, 2006
    106
  6. Devinderjit Sivia, John Skilling
    Data Analysis: A Bayesian Tutorial 2006
    106
  7. W Xu, S Bhatkar, R Sekar
    Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In Proceedings of the 15th USENIX Security Symposium, 2006
    105
  8. A Ledeczi, D Balasubramanian, Z Molnár
    An Introduction to the Generic Modeling Environment. In Proceedings of MDD-TIF07, Model-Driven Development Tool Implementers Forum. 2007. http://www.dsmforum.org/events/MDD-TIF07/GME.2.pdf MetaCase. MetaEdit+. Version 4.0. Evaluation Tutorial. Technical report, MetaCase, 2005. http://www.metacase.com/suppor, 2006
    105
  9. A Andoni, P Indyk
    Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. in FOCS ’06: Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science, 2006
    104
  10. M Chudnovsky, N Robertson, P Seymour, R Thomas
    The strong perfect graph theorem. Annals of Mathematics, 2006
    104
  11. Y Xie, A Aiken
    Static detection of security vulnerabilities in scripting languages. In Proceedings of the Usenix Security Symposium, 2006
    103
  12. S Weil, S Brandt, E Miller, D Long, C Maltzahn
    Ceph: A scalable, high-performance distributed file system. in Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI, 2006
    103
  13. L Grady
    Random walks for image segmentation In PAMI, 2006
    102
  14. Ali-Reza Adl-Tabatabai, Brian T Lewis, Vijay Menon, Brian R Murphy, Bratin Saha, Tatiana Shpeisman
    Compiler and runtime support for efficient software transactional memory In Proc. of the ’06 Conference on Programming Language Design and Implementation, 2006
    101
  15. D Brumley, J Newsome, D Song, H Wang, S Jha
    Towards Automatic Generation of Vulnerability-Based Signatures. In Proceedings of the IEEE Symposium on Security and Privacy, 2006
    101
  16. R SZELISKI, R ZABIH, D SCHARSTEIN, O VEKSLER, V KOLMOGOROV, A AGARWALA, M F TAPPEN, C ROTHER
    A comparative study of energy minimization methods for markov random fields. In European Conference on Computer Vision, 2006
    100
  17. Alexandros Ntoulas, Marc Najork, Mark Manasse, Dennis Fetterly
    Detecting spam web pages through content analysis. In Proceedings of the 15th International World Wide Web Conference (WWW, 2006
    100
  18. Saikat Guha, Neil Daswani, Ravi Jain
    An Experimental Study of the Skype Peer-to-Peer VoIP System. In IPTPS, 2006
    100
  19. M Rajab, J Zarfoss, F Monrose, A Terzis
    A Multifaceted Approach to Understanding the Botnet Phenomenon Proc. ACM SIGCOMM Internet Measurement Conf. (IMC ’06, 2006
    99
  20. Dino Distefano, Peter W O’Hearn, Hongseok Yang
    A local shape analysis based on separation logic. In TACAS, 2006
    99
  21. S Golder, B A Huberman
    The Structure of Collaborative Tagging Systems. Journal of Information Sciences, 2006
    98
  22. Rob Fergus, Barun Singh, Aaron Hertzmann, Sam Roweis, William Freeman
    Removing camera shake from a single photograph. SIGGRAPH, 2006
    98
  23. P S L M Barreto, M Naehrig
    Pairing-friendly elliptic curves of prime order. In Selected Areas in Cryptography – SAC 2005, 2006
    98
  24. D Tsarkov, I Horrocks
    FaCT++ Description Logic Reasoner: System Description. In Proc. IJCAR 2006, 2006
    98
  25. Andrew Hinton, Marta Kwiatkowska, Gethin Norman, David Parker
    PRISM: A tool for automatic verification of probabilistic systems. In Proc. of TACAS’06, volume 3920 of LNCS, 2006
    98
  26. I F Akyildiz, W Lee, M C Vuran, S Mohanty
    Next Generation/Dynamic Spectrum Access/Cognitive Radio Wireless Networks: A Survey. Computer Networks, 2006
    97
  27. T Ho, M Médard, R Koetter, D Karger, M Effros, J Shi, B Leong
    A random linear network coding approach to multicast. IEEE Transactions on Information Theory, 2006
    96
  28. Byron Cook, Andreas Podelski, Andrey Rybalchenko
    Termination proofs for systems code. In Proceedings of the 2006 ACM SIGPLAN conference on Programming language design and implementation, PLDI ’06, 2006
    96
  29. D Stutzbach, R Rejaie
    Understanding churn in peer-to-peer networks in Proc. of the 6th ACM SIGCOMM conference on Internet measurement, 2006
    96
  30. C STARK, B-J BREITKREUTZ, T REGULY, L BOUCHER, A BREITKREUTZ
    BioGRID: a General Repository for Interaction Datasets. Nucleic Acids Research, 2006
    96
  31. H Zou
    The adaptive lasso and its oracle properties Journal of the American Statistical Association, 2006
    95
  32. Cormac Flanagan
    Hybrid type checking In Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, POPL ’06, 2006
    95
  33. Frederic Jouault, Ivan Kurtev
    Transforming models with ATL In Proceedings of Satellite Events at the MoDELS 2005 Conference, 2006
    94
  34. N Stern
    The Economics of Climate Change The Stern Review, 2006
    93
  35. N Jovanovic, C Kruegel, E Kirda
    Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper. In Proceedings of the 2006 IEEE Symposium on Security and Privacy, 2006
    93
  36. G Paxinos, W Watson
    The rat brain in stereotaxic coordinates 2006
    93
  37. Gabor Karsai, Janos Sztipanovits, Ákos Lédeczi, Ted Bapty
    ModelIntegrated Development of Embedded Software. Proceedings of the IEEE, 91(1):145–164, 2003. [Ler06] [Lis03] [Mét88] [Oka98] [Pie02] Xavier Leroy. Coinductive Big-Step Operational Semantics. In Programming Languages and Systems - 15th European Symposium on Programming (ESOP’06, 2006
    93
  38. C Pomerance RE Crandall
    Primes Numbers: A Computational Perspective 2006
    93
  39. A Hotho, R Jaschke, C Schmitz, G Stumme
    Information retrieval in folksonomies: Search and ranking. In The Semantic Web: Research and Applications, 2006
    92
  40. Y-C Cheng, J Bellardo, P Benko, A C Snoeren, G M Voelker, S Savage
    Jigsaw: Solving the puzzle of enterprise 802.11 analysis. in Proc. of ACM SIGCOMM, 2006
    92
  41. J Haupt, R Nowak
    Signal reconstruction from noisy random projections. IEEE Trans. Inf. Th, 2006
    91
  42. T Sandholm, C Boutilier
    Preference elicitation in combinatorial auctions. In Cramton, Shoham, & Steinberg (Eds.), Combinatorial Auctions, 2006
    90
  43. E Agichtein, E Brill, S T Dumais, R Ragno
    Learning user interaction models for predicting web search result preferences In SIGIR, 2006
    89
  44. J Tropp, A Gilbert, M Strauss
    Algorithms for simultaneous sparse approximation. part I: Greedy pursuit. Signal Processing, 2006
    89
  45. J Demˇsar
    Statistical comparisons of classifiers over multiple data sets,” The Journal of Machine Learning Research J ′ ] −1 (v), J ′ (η) = −J ′ (1 − η) v = −J ′ (1 − [J ′ ] −1 (v, 2006
    89
  46. G WERNER-ALLEN, K LORINCZ, M WELSH, O MARCILLO, J JOHNSON, M RUIZ, J LEES
    Deploying a wireless sensor network on an active volcano. IEEE Internet Computing, 2006
    89
  47. Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, David Mazières
    Making information flow explicit in HiStar. In Proc. 7th USENIX Symp. on Operating Systems Design and Implementation (OSDI, 2006
    88
  48. M Buettner, G V Yee, E Anderson, R Han
    X-mac: A short preamble MAC protocol for duty-cycled wireless sensor networks. In Proc. Sensys’06, 2006
    88
  49. A Bharambe, C Herley, V Padmanabhan
    Analyzing and improving a bittorrent network’s performance mechanisms. in INFOCOM ’06: Proc. 25th Intl. Conference on Computer Communications, 2006
    88
  50. L Kocsis, C Szepesvári
    Bandit based Monte-Carlo planning. In Proceedings of the 17th ECML, 2006
    88
  51. J Chang, G S Sohi
    Cooperative caching for chip multiprocessors. in Proceedings of the 33rd annual international symposium on Computer Architecture, ISCA ’06, 2006
    88
  52. Y Rekhter, T Li, S Hares
    A border gateway protocol 4 (BGP-4 In RFC4271, 2006
    88
  53. G Kossinets, D J Watts
    Empirical analysis of an evolving social network Communications of the ACM, 2006
    87
  54. A AGARWAL, B TRIGGS
    Recovering 3D human pose from monocular images. IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI, 2006
    87
  55. S Banerjee, S Lee, B Bhattacharjee, A Srinivasan
    Resilient multicast using overlays. In IEEE/ACM Transactions on Networking, 2006
    87
  56. A M Law, W D Kelton
    Simulation Modeling and Analysis, 3 rd ed McGraw-Hill, 2000. c○IEEE Conference on Broadband Communications, Networks and Systems (BROADNETS, 2006
    87
  57. M Bernardine Dias, R Zlot, N Kalra, A Stentz
    Market-based multirobot coordination: A survey and analysis. Proceedings of the IEEE, 2006
    86
  58. M Burrows
    The chubby lock service for loosely-coupled distributed systems in Proceedings of OSDI’06: Seventh Symposium on Operating System Design and Implementation, 2006
    86
  59. S Lu, J Tucek, F Qin, Y Zhou
    Avio: Detecting atomicity violations via access interleaving invariants. In Twelfth International Conference on Architecture Support for Programming Languages and Operating Systems (ASPLOS ’06, 2006
    85
  60. E Berger, B Zorn
    Diehard: Probabilistic memory safety for unsafe languages. In ACM SIGPLAN Conference on Programming Language Design and Implementation, 2006
    85
  61. A Cox, C Xia, N Fang
    Microstereolithography: A Review. Proceeding of the 1st International Conference on Micromanufacturing, 2006
    85
  62. E Turban, E Maclean, J Wetherbe
    Electronic commerce: A managerial perspective 2006
    85
  63. P Liang, B Taskar, D Klein
    Alignment by agreement In Human Language Technology Conference of the North American Chapter of the Association of Computational Linguistics, 2006
    84
  64. Kiran-Kumar Muniswamy-Reddy, David A Holland, Uri Braun, Margo I Seltzer
    Provenance-aware storage systems In USENIX Annual Technical Conference, 2006
    84
  65. Michael Strube, Simone Paolo Ponzetto
    Wikirelate! computing semantic relatedness using wikipedia In AAAI, 2006
    82
  66. X Chen, X Deng
    Settling the complexity of 2-player Nash equilibrium 47th Annual IEEE Symposium on Foundations of Computer Science, 2006
    82
  67. Y-M Wang, D Beck, X Jiang, R Roussev, C Verbowski, S Chen, S King
    Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites that Exploit Browser Vulnerabilities. In Proceedings of the Symposium on Network and Distributed System Security (NDSS, 2006
    82
  68. Peter-Pike Sloan, Jesse Hall, John Hart, John Snyder
    Clustered principal components for precomputed radiance transfer. In GH ’06: Proceedings of the 21st ACM SIGGRAPH/EUROGRAPHICS symposium on Graphics hardware, 2006
    82
  69. M K Qureshi, Y N Patt
    Utility-based cache partitioning: A low-overhead, high-performance, runtime mechanism to partition shared caches. In Proceedings of the International Symposium on Microarchitecture, 2006
    81
  70. Alexander Budanitsky, Graeme Hirst
    Evaluating wordnet-based measures of lexical semantic relatedness. Computational Linguists, 2006
    81
  71. Linda Green
    Queueing Analysis in Healthcare, International Series in Operations Research and Management Science, 2006
    80
  72. J Davis, M Goadrich
    The relationship between precision-recall and ROC curves. In Proceedings of 23rd International Conference on Machine Learning (ICML-2006, 2006
    80
  73. N L Binkert, R G Dreslinski, L R Hsu, K T Lim, A G Saidi, S K Reinhardt
    The M5 Simulator: Modeling Networked Systems. IEEE Micro Magazine, 2006
    79
  74. P Pietzuch, J Ledlie, J Shneidman, M Roussopoulos, M Welsh, M Seltzer
    Network-aware operator placement for stream-processing systems. In ICDE, 2006
    79
  75. Xing Wei, Bruce Croft
    LDA-based document models for ad-hoc retrieval In SIGIR, 2006
    79
  76. R Chinnici, J-J Moreau, A Ryman, S Weerawarana
    Web Services Description Language (WSDL) Version 2.0," W3C 2006
    79
  77. C Reis, R Mahajan, M Rodrig, D Wetherall, J Zahorjan
    Measurement-based models of delivery and interference in static wireless networks. In SIGCOMM, 2006
    78
  78. H Lee, A Battle, R Raina, A Y Ng
    Efcient sparse coding algorithms. In NIPS, 2006
    78
  79. C Kemp, J Tenenbaum, T Griffiths, T Yamada, N Ueda
    Learning systems of concepts with an infinite relational model. In Proceedings of the national conference on artificial intelligence: Vol. 21 (p. 381). Menlo Park, 2006
    78
  80. P Boncz, T Grust, M van Keulen, S Manegold, J Rittinger, J Teubner
    MonetDB/XQuery: a fast XQuery processor powered by a relational engine. In SIGMOD, 2006
    78
  81. Mark Steedman, Jason Baldridge
    Combinatory Categorial Grammar. Encyclopedia of Language and Linguistics, 2006
    78
  82. S Thrun
    The robot that won the DARPA Grand Challenge. J. of Field Robotics, 2006
    77
  83. Jean-Claude Falmagne, Eric Cosyn, Jean-Paul Doignon, Nicolas Thiery
    The Assessment of Knowledge in Theory and in Practice. LNCS 3874, 949, 2006
    77
  84. M S Lew, N Sebe, C Djeraba, R Jain
    Content-based multimedia information retrieval: State of the art and challenges. ACM Trans. Multimedia Comput. Commun. Appl, 2006
    77
  85. G Păun
    Introduction to membrane computing. Applications of Membrane Computing, 2006
    77