Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. D Nurmi, R Wolski, C Grzegorczyk, G Obertelli, S Soman, L Youseff, D Zagorodnov
    The eucalyptus open-source cloud-computing system. In Proceedings of Cloud Computing and Its Applications, 2008
    59
  2. L Meier, S V D Geer, P Bhlmann
    The group lasso for logistic regression. Journal of the Royal Statistical Society: Series B, 2008
    59
  3. R Barzilay, M Lapata
    Modeling local coherence: An entity-based approach. Comput. Linguist, 2008
    59
  4. N Gude, T Koponen, J Pettit, B Pfaff, M Casado, N McKeown, S Shenker
    NOX: towards an operating system for networks ACM SIGCOMM Computer Communication Review, 2008
    58
  5. H Yu, M Kaminsky, P B Gibbons, A Flaxman
    SybilLimit: A NearOptimal Social Network Defense against Sybil Attacks. In IEEE Symposium on Security and Privacy, 2008
    58
  6. A Czumaj, W Rytter
    Broadcasting algorithms in radio networks with unknown topology. Proc. 44th Ann. Symp. on Foundations of Computer Science, (FOCS’2003), 492501. © 2008 ACADEMY PUBLISHER JOURNAL OF NETWORKS, VOL, 2008
    58
  7. R Snow, B O'Connor, D Jurafsky, A Y Ng
    Cheap and fast---but is it good? Evaluating nonexpert annotations for natural language tasks Proceedings of the Conference on Empirical Methods in Natural Language Processing (pp. 254-263). Association for Computational Linguistics, 2008
    58
  8. Guido W Imbens, Thomas Lemieux
    Regression discontinuity designs: A guide to practice Journal of Econometrics, 2008
    57
  9. Wolfram Laube, Martha Awo, Benjamin Schraven
    Erratic Rains and Erratic Markets: Environmental change, economic globalisation and the expansion of shallow groundwater irrigation in West Africa. Mollinga, Peter P, 2008
    57
  10. Jennifer Hauck, Eva Youkhana
    Histories of water and fisheries management 2008
    56
  11. D Distefano, M J Parkinson J
    jStar: Towards Practical Verification for Java In OOPSLA, 2008
    55
  12. M Belkin, P Niyogi
    Towards a theoretical foundation for laplacian based manifold methods. J. Comput. System Sci, 2008
    55
  13. B Aydemir, A Charguéraud, B C Pierce, R Pollack, S Weirich
    Engineering Formal Metatheory. In Proceedings of the 35th Annual ACM SIGPLAN-SIGACT Symposium on Principles on Programming Languages, 2008
    55
  14. N Torp-Smith, L Birkedal, J C Reynolds
    Local reasoning about a copying garbage collector. ACM Transactions on Programming Lamguages and Systems, 2008
    55
  15. C Dwork
    Differential privacy: a survey of results. in Proc. of 5th international conference on Theory and applications of models of computation (TAMC’08, 2008
    54
  16. C Kanich, C Kreibich, K Levchenko, B Enright, G Voelker, V Paxson, S Savage
    Spamalytics: An empirical analysis of spam marketing conversion. In Proc. ACM CCS‘08, 2008
    54
  17. T T Rogers, J L McClelland
    Preecis of semantic cognition: A parallel distributed processing approach Behav. Brain Sci, 2008
    54
  18. K Zee, V Kuncak, M C Rinard
    Full functional verification of linked data structures. In Programming Language Design and Implementation, 2008
    53
  19. M Zaharia, A Konwinski, A D Joseph, R H Katz, I Stoica
    Improving mapreduce performance in heterogeneous environments. In OSDI, 2008
    53
  20. N Craswell, O Zoeter, M Taylor, B Ramsey
    An experimental comparison of click position-bias models. Proceedings of 1st ACM Conference on Web Search and Web Data Mining, 2008
    53
  21. CAO MINH, C CHUNG, J KOZYRAKIS, C, K OLUKOTUN
    STAMP: Stanford transactional applications for multi-processing. In IISWC, 2008
    53
  22. A Argyriou, T Evgeniou, M Pontil
    Convex multi-task feature learning. Machine Learning, 2008
    53
  23. H-J Boehm, S V Adve
    Foundations of the C++ concurrency memory model. In Proc. PLDI, 2008
    52
  24. A Saxena, J Driemeyer, A Y Ng
    Robotic grasping of novel objects using vision. The International Journal of Robotics Research, 2008
    52
  25. P Hui, J Crowcroft, E Yoneki
    Bubble rap: social-based forwarding in delay tolerant networks. in Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc, 2008
    52
  26. J Zhao, G Cao
    VADD: Vehicle-Assisted Data Delivery in Vehicular Ad hoc Networks. IEEE Transactions on Vehicular Technology, 2008
    52
  27. K Bowyer, K Hollingsworth, P Flinn
    Image understanding for iris biometrics: A survey. Computer Vision and Image Understanding, 110(2):281 – 307, 2008
    52
  28. M Abadi, A Birrell, T Harris, M Isard
    Semantics of transactional memory and automatic mutual exclusion. In ACM SIGPLANSIGACT Symposium on Principles of Programming Languages, 2008
    51
  29. N Agrawal, V Prabhakaran, T Wobber, J D Davis, M S Manasse, R Panigrahy
    Design tradeoffs for SSD performance. In USENIX, 2008
    51
  30. J MAIRAL, M ELAD, G SAPIRO
    Sparse representation for color image restoration. IEEE Trans. Image Process, 2008
    51
  31. B Krishnamurthy, P Gill, M Arlitt
    A few chirps about twitter. In Proceedings of the First Workshop on Online Social Networks, 2008
    51
  32. T Crouch, R Riezler, S Dalrymple, M, R Kaplan
    The PARC 700 Dependency Bank. In Proceedings of the 4th International Workshop on Linguistically Interpreted Corpora, 2008
    51
  33. N Alon
    Problems and results in extremal combinatorics II, Discrete Mathematics 308, 2008
    50
  34. E de Aguiar, C Stoll, C Theobalt, N Ahmed, H-P Seidel, S Thrun
    Performance capture from sparse multiview video In SIGGRAPH ’08: ACM SIGGRAPH 2008 papers, ACM, 2008
    50
  35. L Bottou, O Bousquet
    The trade-offs of large scale learning. In Proc. Neural Info. Proc. Systems, 2008
    50
  36. R H Baayen, D J Davidson, D M Bates
    Mixed-effects modeling with crossed random effects for subjects and items. Res Journal of Memory and Language, 2008
    49
  37. Hongseok Yang, Oukseh Lee, Josh Berdine, Cristiano Calcagno, Byron Cook, Dino Distefano, Peter W O’Hearn
    Scalable shape analysis for systems code. In CAV, 2008
    49
  38. Aycock Tapscott, D, A D Williams
    Wikinomics: How mass collaboration changes everything Journal of the Scholarship of Teaching and Learning, 2008
    49
  39. P Liang, D Klein, M I Jordan
    Agreementbased learning. Proc. of NIPS, 2008
    49
  40. B Aronov, S Har-Peled
    On Approximating the Depth and Related Problems. SIAM Journal on Computing, 2008
    49
  41. James Henderson, Oliver Lemon, Kallirroi Georgila
    Hybrid Reinforcement/Supervised Learning of dialogue policies from fixed datasets. Computational Linguistics, 2008
    48
  42. G Gu, R Perdisci, J Zhang, W Lee
    BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In Proceedings of the 17th USENIX Security Symposium (Security’08, 2008
    48
  43. J A Bondy, U S R Murty
    Graph Theory 2008
    48
  44. N Provos, P Mavrommatis, M Rajab, F Monrose
    All your iFrames point to us. In Proc. USENIX Security‘08, 2008
    48
  45. J M MCCUNE, B J PARNO, A PERRIG, M K REITER, H ISOZAKI
    Flicker: an execution infrastructure for tcb minimization. SIGOPS Oper. Syst. Rev, 2008
    47
  46. Y Huang, T Z J Fu, D M Chiu, J C S Liu, C Huang
    Challenges, Design and Analysis of a Large-scale P2P-VoD System. In Proc. of ACM SIGCOMM’08, 2008
    47
  47. J Li, J Z Wang
    Real-time computerized annotation of pictures IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008
    47
  48. M Sabou, M d’Aquin, Motta
    E.: Exploring the semantic web as background knowledge for ontology matching. Journal of Data Semantics, 2008
    47
  49. E Agichtein, C Castillo, D Donato, A Gionis, G Mishne
    Finding high-quality content in social media. In WSDM, 2008
    47
  50. E Miluzzo, N D Lane, K Fodor, R Peterson, H Lu, M Musolesi, S B Eisenman, X Zheng, A T Campbell
    Sensing meets mobile social networks: the design, implementation and evaluation of the cenceme application. In ACM SenSys, 2008
    47
  51. C Peikert, B Waters
    Lossy trapdoor functions and their applications. In Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008
    47
  52. American Cancer Society
    Breast cancer facts and figures 2008
    46
  53. M Parkinson, G Bierman
    Separation logic, abstraction and inheritance ACM Symposium on Principles of Programming Languages, 2008
    46
  54. S Gaonkar, J Li, R R Choudhury, L Cox, A Schmidt
    Micro-blog: sharing and querying content through mobile phones and social participation. In ACM MobiSys, 2008
    46
  55. G Ramalingam, J Field, F Tip
    Aggregate structure identification and its application to program analysis. InProceedingsofthe26thACMSIGPLAN-SIGACTsymposiumon PrinciplesofProgramming Languages, 1999. T. Reps, 2008
    46
  56. Yehuda Koren
    Factorization meets the neighborhood: a multifaceted collaborative filtering model. ACM Int. Conference on Knowledge Discovery and Data Mining (KDD’08, 2008
    46
  57. J H Stock, M Yogo
    2001, Testing for Weak Instruments in Linear IV Regression, unpublished manuscript Harvard University BANCO DE, 2008
    46
  58. R Jampani, L Perez, M Wu, F Xu, C Jermaine, P J Haas
    MCDB: A Monte Carlo approach to managing uncertain data Proc. ACM SIGMOD Intl. Conf. Management of Data, 2008
    45
  59. A Sorokin, D Forsyth
    Utility data annotation with amazon mechanical turk In First IEEE Workshop on Internet Vision at CVPR 08, 2008
    45
  60. M Musuvathi, S Qadeer, T Ball, G Basler, P A Nainar, I Neamtiu
    Finding and reproducing heisenbugs in concurrent programs. Operating System Design and Implementation (OSDI, 2008
    45
  61. R Teixeira, A Shaikh, T Griffin, J Rexford
    Dynamics of hot-potato routing in IP networks,” IEEE/ACM Trans. Networking, 2008
    45
  62. C Clarke, M Kolla, G Cormack, O Vechtomova, A Ashkan, S Büttcher, I MacKinnon
    Novelty and diversity in information retrieval evaluation In Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval, 2008
    45
  63. G Gu, J Zhang, W Lee
    BotSniffer: Detecting botnet command and control channels in network traffic In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS’08, 2008
    45
  64. T Holz, M Steiner, F Dahl, E Biersack, F Freiling
    Measurements and mitigation of peer-to-peer-based botnets: a case study on Storm Worm. In LEET’08: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, 2008
    45
  65. J Heath, M Kwiatkowska, G Norman, D Parker, O Tymchyshyn
    Probabilistic model checking of complex biological pathways. Theoretical Computer Science (Special Issue on Converging Sciences: Informatics and Biology, 2008
    45
  66. J Leskovec, K J Lang, A Dasgupta, M W Mahoney
    Statistical properties of community structure in large social and information networks. In WWW, 2008
    45
  67. J Yin, T ElBatt, G Yeung, B Ryu, S Habermas, H Krishnan, T Talty
    Performance evaluation of safety applications over dsrc vehicular ad hoc networks. in VANET ’04: Proceedings of the 1st ACM International Workshop on, 2008
    44
  68. Pascal Felber, Christof Fetzer, Torvald Riegel
    Dynamic performance tuning of word-based software transactional memory. In Proceedings of the 13th ACM SIGPLAN Symposium on Principles and practice of parallel programming, PPoPP ’08, 2008
    44
  69. Kohei Honda, Nobuko Yoshida, Marco Carbone
    Multiparty asynchronous session types. In Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, POPL ’08, 2008
    44
  70. K Arrow, H Block, L Hurwicz
    On the stability of the competitive equilibrium Conference on Electronic Commerce, 2008
    44
  71. L P, J C Heaton, N Li
    Consumption strikes back? measuring long-run risk. Journal of Political Economy, 2008
    44
  72. R Elman, N Karpenko, A Merkurjev
    The algebraic and geometric theory of quadratic forms American Mathematical Society Colloquium Publications, 2008
    44
  73. J Leskovec, L Backstrom, R Kumar, A Tomkins
    Microscopic Evolution of Social Networks. In KDD, 2008
    44
  74. James B Campbell
    Introduction to remote sensing 2008
    43
  75. M Hua, J Pei, W Zhang, X Lin
    Ranking queries on uncertain data: A probabilistic threshold approach. In Proc. SIGMOD, 2008
    43
  76. Christian Kästner, Sven Apel, Martin Kuhlemann
    Granularity in software product lines In Proceedings of the 30th International Conference on Software Engineering (ICSE, 2008
    43
  77. Rajiv Gandhi, Arunesh Mishra, Srinivasan Parthasarathy
    Minimizing broadcast latency and redundancy in ad hoc networks. IEEE/ACM Transactions on Networking, 2008
    43
  78. J Kamp, D Zuckerman
    Deterministic extractors for bit-fixing sources and exposure-resilient cryptography. Lecture Notes in Computer Science 4965, 2008
    43
  79. C Borio, H Zhu
    Capital regulation, risk-taking and monetary policy: a missing link. in the transmission mechanism?, Working Paper Series, No 268, Bank for International Settlements, 2008
    43
  80. B Hoh, M Gruteser, R Herring, J Ban, D Work, J-C Herrera, A Bayen, M Annavaram, Q Jacobson
    Virtual trip lines for distributed privacy-preserving traffic monitoring. In ACM Mobisys, 2008
    42