Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. S Ryoo, C Rodrigues, S Baghsorkhi, S Stone, D Kirk, W Hwu
    Optimization principles and application performance evaluation of a multithreaded GPU using CUDA. In ACM SIGPLAN PPoPP 2008, 2008
    148
  2. A Argyriou, T Evgeniou, M Pontil
    Convex multi-task feature learning. In Machine Learning, 2008
    145
  3. O Boiman, E Shechtman, M Irani
    In defense of nearest-neighbor based image classification. In CVPR, 2008
    143
  4. I Steinwart, A Christmann
    Support Vector Machines. 2008
    143
  5. B F COOPER, R RAMAKRISHNAN, U SRIVASTAVA, A SILBERSTEIN, P BOHANNON, H-A JACOBSEN, N PUZ, D WEAVER, R YERNENI
    Pnuts: Yahoo!’s hosted data serving platform. Proc. VLDB Endow, 2008
    142
  6. B Krishnamurthy
    A few Chirps About Twitter. WOSN’08 August 18 2008, 2008
    141
  7. R Artstein, M Poesio
    Intercoder agreement for Computational Linguistics. In Computational Linguistics, 34(4): 555—596. JLCL Gu et al, 2008
    141
  8. H Yu, P B Gibbons, M Kaminsky, F Xiao
    Sybillimit: A near-optimal social network defense against sybil attacks. In Security and Privacy, 2008. SP 2008. IEEE Symposium on, 2008
    141
  9. Lars Peter Hansen, John C Heaton, Nan Li
    Consumption Strikes Back?: Measuring Long-Run Risk. Journal of Political Economy, 2008
    140
  10. C H Lampert, M B Blaschko, T Hofmann
    Beyond sliding windows: Object localization by efficient subwindow search. In Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition (CVPR, 2008
    139
  11. D A Ross, J Lim, R S Lin, Yang
    M.H.: Incremental learning for robust visual tracking. Int. J. Comput. Vision, 2008
    138
  12. Wang ET, R Sandberg, S Luo, I Khrebtukova, L Zhang
    Alternative isoform regulation in human tissue transcriptomes. Nature 456 2008
    137
  13. V Chandrasekhar, J Andrews, A Gatherer
    Femtocell Networks: A Survey IEEE Communications Magazine, 2008
    136
  14. J Civera, A J Davison, J Montiel
    Inverse Depth Parametrization for Monocular SLAM. IEEE Trans. on Robotics, 2008
    136
  15. L von Ahn, B Maurer, C McMillen, D Abraham, M Blum
    recaptcha: Human-based character recognition via web security measures. Science, 2008
    135
  16. J Philbin, O Chum, M Isard, J Sivic, A Zisserman
    Lost in quantization: Improving particular object retrieval in large scale image databases. in Proc Int’l Conf Computer Vision and Pattern Recognition, 2008
    134
  17. J Leskovec, K J Lang, A Dasgupta, M W Mahoney
    Statistical properties of community structure in large social and information networks. In WWW, 2008
    134
  18. V Ferrari, M Marin, A Zisserman
    Progressive search space reduction for human pose estimation. CVPR. 2008
    133
  19. N SNAVELY, S M SEITZ, R SZELISKI
    Modeling the world from internet photo collections. IJCV, 2008
    133
  20. C Dwork
    Differential privacy: A survey of results. In Theory and Applications of Models of Computation, 2008
    132
  21. S Maji, A C Berg, J Malik
    Classification using intersection kernel support vector machines is efficient. In Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on, 2008
    132
  22. B Sigurbjörnsson, R van Zwol
    Flickr tag recommendation based on collective knowledge. In WWW ’08: Proceeding of the 17th international conference on World Wide Web, 2008
    132
  23. Benjamin J Keys, Tanmoy Mukherjee, Amit Seru, Vikrant Vig
    Did Securitization Lead to Lax Screening? Evidence from Subprime. Loans.” Athens Meetings Paper, European Finance Association, 2008
    131
  24. S Griffiths-Jones, H K Saini, S van Dongen, A J Enright
    miRBase: tools for microRNA genomics Nucleic Acids Res, 2008
    130
  25. C L Clarke, M Kolla, G V Cormack, O Vechtomova, A Ashkan, S Büttcher, I MacKinnon
    Novelty and diversity in information retrieval evaluation In Proceedings of the 31st annual international ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 659–666, 2008
    130
  26. T Adrian, H S Shin
    Liquidity and leverage. 2008
    130
  27. A Blum, K Ligett, A Roth
    A learning theory approach to non-interactive database privacy. In Proceedings of the 40th Symposium on Thoery of Computing (STOC ’08, 2008
    128
  28. N Craswell, O Zoeter, M Taylor, B Ramsey
    An experimental comparison of click position-bias models. In WSDMŠ08, 2008
    128
  29. Alex J Halderman
    Lest We Remember: Cold Boot Attacks on Encryption Keys. Online] February, 2008
    128
  30. N G Brady, R R Weil
    The nature and properties of soil 2008
    127
  31. A Kläser, M Marszalek, C Schmid
    A spatio-temporal descriptor based on 3dgradients. In Proceedings British Machine Vision Conference, 2008
    123
  32. C Cao Minh, J Chung, C Kozyrakis, K Olukotun
    STAMP: Stanford transactional applications for multi-processing. In IISWC ’08: Proceedings of The IEEE International Symposium on Workload Characterization, 2008
    123
  33. L Grafakos
    Classical Fourier Analysis Grad. Texts in Math., 2nd edn, 2008
    123
  34. D Crocker, P Overell
    Augmented BNF for Syntax Specifications: ABNF STD 68, RFC 5234, 2008
    123
  35. K D Bollacker, C Evans, P Paritosh, T Sturge, J Taylor
    Freebase: a collaboratively created graph database for structuring human knowledge. In SIGMOD Conference, 2008
    122
  36. R Chaiken, B Jenkins, P Larson, B Ramsey, D Shakib, S Weaver, J Zhou
    SCOPE: easy and efficient parallel processing of massive data sets. Proc. VLDB Endow, 2008
    122
  37. M Caliendo, S Kopeinig
    Some practical guidance for the implementation of propensity score matching. Journal of Economic Surveys, 2008
    121
  38. Jeff Mitchell, Mirella Lapata
    Vector-based models of semantic composition. In Proceedings of ACL-08: HLT, 2008
    120
  39. Mikel D Rodriguez, Javed Ahmed, Mubarak Shah
    Action mach a spatio-temporal maximum average correlation height filter for action recognition. in CVPR, 2008
    120
  40. V R Cadambe, S A Jafar
    Interference alignment and degrees of freedom of the K-user interference channel. IEEE Transaction on Information Theory, 2008
    120
  41. R C Clark, R E Mayer
    E-learning and the science of instruction 2008
    120
  42. M Wand, G Kiczales
    Dutchyn C. A semantics for advice and dynamic join points in aspect-oriented programming. Journal of Software 软件学报 Vol.19, No.9, 2008
    120
  43. G Gu, R Perdisci, J Zhang, W Lee
    BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection. in Proceedings of the 17th conference on Security symposium, 2008
    119
  44. J Hays, A A
    Efros. IM2GPS: Estimating Geographic Information From a Single Image. In Proceedings of the IEEE Conf. on Computer Vision and Pattern Recognition, 2008
    118
  45. M Elad J Mairal, G Sapiro
    Sparse representation for color image restoration. IEEE Trans. Image Processing, 2008
    118
  46. C Borio, H Zhu
    Capital regulation, risk-taking and monetary policy: a missing link. in the transmission mechanism?”, BIS Working Papers, No 268, 2008
    117
  47. Rashmi Prasad, Nikhil Dinesh, Alan Lee, Eleni Miltsakaki, Livio Robaldo, Aravind Joshi, Bonnie Webber
    The Penn Discourse Treebank 2.0. Proc. of the 6th International Conference on Language Resources and Evaluation (LREC, 2008
    117
  48. P Turaga, R Chellappa, V Subrahmanian, O Udrea
    Machine Recognition of Human Activities: A Survey. IEEE Trans. Circuits and Systems for Video Technology, 2008
    116
  49. J Leskovec, L Backstrom, R Kumar, A Tomkins
    Microscopic Evolution of Social Networks. In Proc. ACM KDD, Las Vegas, 2008
    116
  50. N AGRAWAL, ET AL
    Design tradeoffs for SSD performance. In USENIX ATC, 2008
    116
  51. Terry Koo, Xavier Carreras, Michael Collins
    Simple Semi-supervised Dependency Parsing. In Proceedings of the 46 th ACL, 2008
    116
  52. M Li, P Vitányi
    An Introduction to Kolmogorov Complexity and Its Applications (Third, 2008
    115
  53. C Guo, H Wu, K Tan, L Shi, Y Zhang, S Lu
    DCell: a scalable and fault-tolerant network structure for data centers. In Proceedings of SIGCOMM, 2008
    114
  54. C Kanich, C Kreibich, K Levchenko, B Enright, G M Voelker, V Paxson, S Savage
    Spamalytics: An empirical analysis of spam marketing conversion. In Proceedings of the 15th ACM conference on Computer and communications security, 2008
    114
  55. M Pollefeys, D Nistér, J M Frahm, A Akbarzadeh, P Mordohai, B Clipp, C Engels, D Gallup, S J Kim, P Merrell, C Salmi, S Sinha, B Talton, L Wang, Q Yang, H Stewénius, R Yang, G Welch, H Towles
    Detailed real-time urban 3d reconstruction from video,” Int J. Comput. Vision, 2008
    113
  56. P Bonderson, M Freedman, C Nayak
    Measurement-only topological quantum computation. 2008
    113
  57. N Provos, P Mavrommatis, M Rajab, F Monrose
    All your iFrames point to us. In Proc. USENIX Security’08, 2008
    112
  58. B Yee, D Sehr, G Dardyk, J B Chen, R Muth, T Ormandy, S Okasaka, N Narula, N Fullagar
    Native Client: A Sandbox for Portable, Untrusted x86 Native Code. Technical paper Google Inc. 2008
    111
  59. D Karolchik, R M Kuhn, R Baertsch, G P Barber, H Clawson, M Diekhans, B Giardine, R A Harte, A S Hinrichs, F Hsu
    The UCSC Genome Browser Database: 2008 update Nucleic Acids Res, 2008
    110
  60. J M McCune, B J Parno, A Perrig, M K Reiter, Isozaki
    H.: Flicker: an execution infrastructure for tcb minimization. SIGOPS Oper. Syst. Rev, 2008
    109
  61. B Hayes
    Cloud computing Communication of the ACM, 2008
    109
  62. Ramya Raghavendra, Parthasarathy Ranganathan, Vanish Talwar, Zhikui Wang, Xiaoyun Zhu
    No “power” struggles: Coordinated multi-level power management for the data center. In Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008
    109
  63. E Agichtein, C Castillo, D Donato, A Gionis, G Mishne
    Finding highquality content in social media, with an application to community-based question answering. In Web Search and Data Mining (WSDM, 2008
    109
  64. U Malmendier, G Tate
    Who Makes Acquisitions? CEO Overconfidence and the Market’s Reaction. Journal of Financial Economics, 2008
    108
  65. I Foster, Y Zhao, I Raicu, S Lu
    Cloud computing and grid computing 360-degree compared. in Proceedings of the Grid Computing Environments Workshop (GCE, 2008
    107
  66. S A Mani, W Guo, M J Liao, E N Eaton, A Ayyanan, A Y Zhou, M Brooks, F Reinhard, C C Zhang, M Shipitsin
    The epithelialmesenchymal transition generates cells with properties of stem cells Cell, 2008
    107
  67. A Saxena, J Driemeyer, A Y Ng
    Robotic grasping of novel objects using vision. Int. J. Robot. Res, 2008
    107
  68. M Botsch, O Sorkine
    On linear variational surface deformation methods. IEEE Trans. Visual. Comput. Graph, 2008
    107
  69. Daron Acemoglu
    Introduction to Modern Economic Growth 2008
    106
  70. Wilhelm BT, S Marguerat, S Watt, F Schubert, V Wood
    Dynamic repertoire of a eukaryotic transcriptome surveyed at single-nucleotide resolution. Nature 453 Goodhead I, Penkett CJ, Rogers J & Bahler J, 2008
    106
  71. C J Hsieh, K W Chang, C J Lin, S S Keerthi, S Sundararajan
    A dual coordinate descent method for large-scale linear SVM. Proceedings of the 25th International Conference on Machine Learning, 2008
    106
  72. C Weiss, P Karras, A Bernstein
    Hexastore: sextuple indexing for semantic web data management. 2008
    105
  73. Y Huang, T Z Fu, D-M Chiu, J C Lui, C Huang
    Challenges, design and analysis of a large-scale p2p-vod system. in Proc. of ACM SIGCOMM, 2008
    105
  74. Jonathan Katz, Yehuda Lindell
    Introduction to Modern Cryptography 2008
    105
  75. M Musuvathi, S Qadeer, T Ball, G Basler, P A Nainar, I Neamtiu
    Finding and reproducing Heisenbugs in concurrent programs. In OSDI, 2008
    104
  76. B Aubert
    et al. [BaBar Collaboration], Phys Rev. D, 2008
    104
  77. G Gu, J Zhang, W Lee
    BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic in 15th Annual 2etwork & Distributed System Security Symposium, 2008
    104
  78. J FAN, J LV
    Sure independence screening for ultra-high dimensional feature space. Journal of the Royal Statistical Society: Series B, 2008
    104
  79. G Chen, W He, J Liu, S Nath, L Rigas, L Xiao, Zhao
    F.: Energy-aware server provisioning and load dispatching for connection-intensive internet services. In: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI, 2008
    103
  80. R J Jacob, A Girouard, L M Hirshfield, M S Horn, O Shaer, E T Solovey, J Zigelbaum
    Reality-based interaction: a framework for post-WIMP interfaces in [CHI ’08: Proceeding of the twentysixth annual SIGCHI conference on Human factors in computing systems ], 201–210, ACM, 2008
    103
  81. J M Wang, D J Fleet, A Hertzmann
    Gaussian process dynamical models for human motion. IEEE Trans. Pattern Anal. Mach. Intell, 2008
    103
  82. M D Chinn, H Ito
    A new measure of financial openness. Journal of Comparative Policy Analysis, 2008
    102
  83. W Stallings
    Operating Systems Internals and Design Principles, 6th Edition, 2008
    102