Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. E Cohen, M Dahlweid, M A Hillebrand, D Leinenbach, M Moskal, T Santen, W Schulte, S Tobies
    VCC: A practical system for verifying concurrent C. In TPHOLs 2009, volume 5674 of LNCS, 2009
    44
  2. C Lampert, H Nickisch, S Harmeling
    Learning to detect unseen object classes by between-class attribute transfer. in IEEE Conf. on Computer Vision and Pattern Recognition (CVPR, 2009
    44
  3. S J Pan, Q Yang
    A survey on transfer learning. IEEE Transactions on Knowledge and Data Engineering, 2009
    43
  4. K Jarrett, K Kavukcuoglu, M Ranzato, Y LeCun
    What is the best multi-stage architecture for object recognition. in Proc. International Conference on Computer Vision (ICCV’09). IEEE, 2009
    43
  5. David G Andersen, Jason Franklin, Michael Kaminsky, Amar Phanishayee, Lawrence Tan, Vijay Vasudevan
    Fawn: a fast array of wimpy nodes. In SOSP ’09: Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, 2009
    42
  6. N Eagle, A Pentland, D Lazer
    Inferring Social Network Structure using Mobile Phone Data in Proceedings of National Academy of Sciences, 2009
    42
  7. B Butler, L Sproull, S Kiesler, R Kraut
    2002) “Community effort in online groups: Who does the work and why. Leadership at a Distance. Mahwah, NJ: Erlbaum. opensource.mit.edu/papers/butler.pdf (March 21, 2009
    42
  8. John Kenneth Galbraith
    The Great Crash 2009
    42
  9. B D Argall, S Chernova, M Veloso, B Browning
    A Survey of Robot Learning from Demonstration. Robotics and Automation Systems, 2009
    42
  10. Luis M Vaquero, Luis Rodero‐Merino, Juan Caceres, Maik Lindner
    A Break in the Clouds: Towards a Cloud Definition. ACM SIGCOMM Computer Communication Review, 2009
    42
  11. C Baral, M Gelfond, Rushton
    N.: Probabilistic reasoning with answer sets. TPLP, 2009
    42
  12. J Sneyers, T Schrijvers, Demoen
    B.: The computational power and complexity of constraint handling rules. ACM Transactions on Programming Languages and Systems (TOPLAS, 2009
    42
  13. C Flanagan, S N Freund
    FastTrack: Efficient and Precise Dynamic Race Detection. In PLDI, 2009
    41
  14. J B Taylor
    The Financial Crisis and the Policy Responses: an Empirical Analysis of What Went Wrong National Bureau of Economic Research Working Paper Series, 2009
    40
  15. G M Sacco
    Dynamic taxonomies: A model for large information bases Semantic Web Conf., LNCS 4519, 2009
    40
  16. C Calcagno, D Distefano, P O’Hearn, H Yang
    Compositional Shape Analysis by Means of Bi-Abduction. In POPL, 2009
    40
  17. O Arandjelović, G Shakhnarovich, J Fisher, R Cipolla, T Darrell
    Face recognition with image sets using manifold density divergence, in. Proc. IEEE Conference on Computer Vision and Pattern Recognition (CVPR, 2009
    40
  18. M L Weitzman
    On Modeling and Interpreting the Economics of Catastrophic Climate Change. The Review of Economics and Statistics, 2009
    40
  19. B C Lee, E Ipek, O Mutlu, D Burger
    Architecting phase change memory as a scalable DRAM alternative In ISCA, 2009
    40
  20. T Bosse, C Jonker, L v d Meij, A Sharpanskykh, J Treur
    Specification and verification of dynamics in agent models. International Journal of Cooperative Information Systems, 2009
    40
  21. A Artale, D Calvanese, R Kontchakov, M Zakharyaschev
    The DL-Lite family and relations. J. Artificial Intelligence Research (JAIR, 2009
    40
  22. Luisa Bentivogli, Ido Dagan, Hoa Trang Dang, Danilo Giampiccolo, Bernardo Magnini
    The Fifth PASCAL Recognizing Textual Entailment Challenge In Proceedings of TAC 2009 Workshop. ― 300 ― of NTCIR-9 Workshop Meeting, 2009
    40
  23. M K Brunnermeier
    Deciphering the Liquidity and Credit Crunch 2007-08. Journal of Economic Perspectives, 2009
    40
  24. M Drmota
    Random trees. 2009
    39
  25. D Crandall, L Backstrom, D Huttenlocher, J Kleinberg
    Mapping the world’s photos. In Proc. 18th International World Wide Web Conference, 2009
    39
  26. M K Brunnermeier, L H Pedersen
    Market Liquidity and Funding Liquidity Review of Financial Studies, 2009
    39
  27. B YEE, D SEHR, G DARDYK, B CHEN, R MUTH, T ORMANDY, S OKASAKA, N NARULA, N FULLAGAR
    Native Client: A Sandbox for Portable, Untrusted x86 Native Code. In IEEE Symposium on Security and Privacy, 2009
    39
  28. Centers
    for Disease Control and Prevention, Public Health Ethics Committee Ethics Consults in Public Health. Atlanta, GA: Centers for Disease Control and Prevention, 2009
    38
  29. Andrea Vedaldi, V Gulshan, M Varma, Andrew Zisserman
    Multiple kernels for object detection. In Proceedings of International Conference on Computer Vision (ICCV, 2009
    38
  30. R E Moore, R B Kearfott, M J Cloud
    Introduction to Interval Analysis. 2009
    38
  31. V Guruswami, C Umans, S Vadhan
    Unbalanced Expanders and Randomness Extractors from Parvaresh–Vardy Codes. Journal of the ACM, 2009
    38
  32. C Guo, H Wu, K Tan, L Shiy, Y Zhang, S Lu
    BCube: A high performance, server-centric network architecture for modular data centers. In SIGCOMM, 2009
    38
  33. A Farhadi, I Endres, D Hoiem, D Forsyth
    Describing objects by their attributes. in IEEE Conf. on Computer Vision and Pattern Recognition (CVPR, 2009
    38
  34. B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, R Kemmerer, C Kruegel, G Vigna
    Your Botnet is My Botnet: Analysis of a Botnet Takeover. In ACM Conference on Computer and Communications Security (CCS, 2009
    37
  35. R Alur, P Madhusudan
    Adding nesting structure to words. JACM, 2009
    37
  36. K Fall, K Varadhan
    The ns Manual (formerly ns Notes and Documentation). The VINT Project A Collaboration between researchers at. UC Berkeley, LBL, USC/ISI, and Xerox PARC, 2009
    37
  37. K Kavukcuoglu, M A Ranzato, R Fergus, Y LeCun
    Learning invariant features through topographic filter maps. In CVPR, 2009
    37
  38. E Gilbert, K Karahalios
    Predicting tie strength with social media. In CHI ’09: Proceedings of the 27th international conference on Human factors in computing systems, 2009
    36
  39. Mark Lutz
    Learning Python. 2009
    36
  40. T-Y Liu
    Learning to rank for information retrieval Found. Trends Inf. Retr, 2009
    35
  41. S Park, S Lu, Y Zhou
    CTrigger: exposing atomicity violation bugs from their hiding places. In Fourteenth International ConferenceonArchitectureSupportforProgrammingLanguages andOperatingSystems (ASPLOS ’09),pages, 2009
    35
  42. L Bourdev, J Malik
    Poselets: body part detectors trained using 3d human pose annotations In In IEEE Conference on Computer Vision and Pattern Recognition, 2009
    35
  43. S Spiekermann, L F Cranor
    Engineering Privacy IEEE Trans Software Engineering, 2009
    35
  44. M Zuckerman, A D Procaccia, J S Rosenschein
    Algorithms for the coalitional manipulation problem. Artificial Intelligence, 2009
    35
  45. J Kapur
    Maximum entropy models in science and engineering, 2nd edn New Age International Publishers, 2009
    35
  46. Mike Mintz, Steven Bills, Rion Snow, Dan Jurafsky
    Distant supervision for relation extraction without labeled data. In ACL-IJCNLP 2009, 2009
    35
  47. AdBO09 Krzysztof R Apt, Frank S de Boer
    Ernst-Rüdiger Olderog. Verification of Sequential and Concurrent Programs 2009
    35
  48. “Cancer WHO
    World Health Organization 2009
    35
  49. Francois Portet, Ehud Reiter, Albert Gatt, Jim Hunter, Somayajulu Sripada, Yvonne Freer, Cindy Sykes
    Automatic generation of textual summaries from neonatal intensive care data. Artificial Intelligence, 2009
    35
  50. L Levin, R Venkatesan
    Random instances of a graph coloring problem are hard. In: Proceedings of the twentieth annual ACM symposium on Theory of computing, 1988, 217–222. Raghav Bhaskar Satyanarayana V Lokam Microsoft Research India 196/36 2nd Main Rd, Sadashivnagar Bangalore – 560080, INDIA. e-mail: {rbhaskar,satya}@microsoft.com Karthekeyan Chandrasekaran 2116 KACB, 266 Ferst Drive Georgia Tech, Atlanta GA 30332, USA e-mail: karthe@gatech.edu Peter L., 2009
    35
  51. V Jacobson, D Smetters, J Thornton, M Plass, N Briggs, R Braynard
    Networking named content in CoNEXT, 2009
    35
  52. C-N J Yu, T Joachims
    Learning structural SVMs with latent variables. In Proceedings of the 26th Annual International Conference on Machine Learning (ICML-2009, 2009
    34
  53. Greg Hamerly, Erez Perelman, Jeremy Lau, Brad Calder
    SimPoint 3.0: Faster and More Flexible Program Analysis. In Workshop on Modeling, Benchmarking and Simulation, June 2005. 108 Siva Hari, Manlap Li, Pradeep Ramachandran, and Sarita Adve. Low-cost Hardware, 2009
    34
  54. J Reppy, C Russo, Y Xiao
    Parallel Concurrent ML. In ICFP ’09, 2009
    34
  55. M Olszewski, J Ansel, S Amarasinghe
    Kendo: Efficient Deterministic Multithreading in Software In Proc. of ASPLOS,pages 97–108, 2009
    34
  56. Amal Ahmed, Derek Dreyer, Andreas Rossberg
    State-dependent representation independence. In POPL ’09, 2009
    33
  57. M Dobrescu, N Egi, K Argyraki, B-G Chun, K Fall, G Iannaccone, A Knies, M Manesh, S Ratnasamy
    RouteBricks: Exploiting parallelism to scale software routers. In Proc. of SOSP, 2009
    33
  58. J Liu, J Luo, M Shah
    Recognizing realistic actions from videos “in the wild. In CVPR, 2009
    33
  59. T Goldstein, S Osher
    The split Bregman method for l1 regularized problems SIAM J. Imaging Sciences, 2009
    33
  60. T Imielinski, J Navas
    GPS-based addressing and routing. IETF RFC, 2009
    33
  61. M Andriluka, S Roth, B Schiele
    Pictorial structures revisited: People detection and articulated pose estimation IEEE Conference on Computer Vision and Pattern Recognition, 2009
    32
  62. B Babenko, M-H Yang, S Belongie
    Visual tracking with online multiple instance learning. In Proc. Conf. Computer Vision and Pattern Recognition, 2009
    32
  63. A Qureshi, R Weber, H Balakrishnan, J Guttag, B Maggs
    Cutting the electric bill for Internet-scale systems. in Proc. ACM SIGCOMM, 2009
    32
  64. Y C Eldar, M Mishali
    Robust recovery of signals from a structured union of subspaces. IEEE Trans. Inform. Theory, 2009
    32
  65. P V Gehler, S Nowozin
    On feature combination for multiclass object classification. In ICCV, 2009
    32
  66. J Knobe
    Intentional action and side effects in ordinary language. Analysis, 63:190–193, 2003. 50 In ASIACCS ’09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, 2009
    32
  67. L Jacob, G Obozinski, J P Vert
    Group Lasso with overlap and graph Lasso. In Proceedings of the 26th Annual International Conference on Machine Learning, 2009
    32
  68. B J Jansen, Spink
    A.: An analysis of web searching by European AlltheWeb.com users Information Processing & Management 41(2) (2005) 361–381 Comments on the TEL GUI, 2009
    32
  69. R Lyons, Y Peres
    Probability on Trees and Networks 2009
    31
  70. Dense Accurate
    Robust Multi-view Stereopsis IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI, 2009
    31
  71. J Romberg
    Compressive sensing by random convolution. SIAM Journal on Imaging Sciences, 2009
    31
  72. C Wilson, B Boe, A Sala, K P Puttaswamy, B Y Zhao
    User interactions in social networks and their implications. In Eurosys, 2009
    31
  73. M K Qureshi, V Srinivasan, J A Rivers
    Scalable high performance main memory system using phase-change memory technology. In ISCA, 2009
    31
  74. D Weinshall
    Cognitive authentication schemes safe against spyware (short paper), in: SP’06. Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P’06), 2006, 2009
    31
  75. Adam Kiezun, Vijay Ganesh, Philip J Guo, Pieter Hooimeijer, Michael D Ernst
    Hampi: A solver for string constraints. In Proc. of 2009 International Symposium on Testing and Analysis (ISSTA’09, 2009
    31
  76. B Settles
    Active learning literature survey. University of Wisconsin-Madison, 2009
    31
  77. S Apel, C Kästner
    An overview of feature-oriented software development. Journal of Object Technology (JOT, 2009
    30
  78. A Akavia, S Goldwasser, V Vaikuntanathan
    Simultaneous hardcore bits and cryptography against memory attacks. Theory of Cryptography — TCC 2009, volume 5444 of Lecture Notes in Computer Science, 2009
    30
  79. P Arbelaez, M Maire, C Fowlkes, J Malik
    From contours to regions: an empirical evaluation. In CVPR, 2009
    30
  80. G O Roberts, J S Rosenthal
    Examples of adaptive MCMC. Journal of Computational and Graphical Statistics, 2009
    30
  81. Salvatore Guarnieri, Benjamin Livshits
    Gatekeeper: mostly static enforcement of security and reliability policies for javascript code. In Proceedings of the 18th conference on USENIX security symposium, SSYM’09, 2009
    30
  82. M Quigley, B Gerkey, K Conley, J Faust, T Foote, J Leibs, E Berger, R Wheeler, A Ng
    Ros: An open-source robot operating system In Proceedings of the Open-source software workshop at ICRA, 2009
    30
  83. S Hao, N A Syed, N Feamster, A G Gray, S Krasser
    Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine. In USENIX Security Symposium, 2009
    30
  84. D Roodman
    How to do xtabond2: an introduction to difference and system GMM in Stata’, Stata Journal, 2009
    30
  85. S Iwata, J Orlin
    A simple combinatorial algorithm for submodular function minimization, 1230–1237. ACM-SIAM Symposium on Discrete Algorithms. SIAM, 2009
    30