Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. C Cherry, G Foster
    Batch tuning strategies for statistical machine translation. In HLT-NAACL, 2012
    27
  2. Sameer Pradhan, Alessandro Moschitti, Nianwen Xue, Olga Uryupina, Yuchen Zhang
    CoNLL2012 shared task: Modeling multilingual unrestricted coreference in OntoNotes In Joint Conference on EMNLP and CoNLL – Shared Task, 2012
    26
  3. A Khurshid, W Zhou, M Caesar, P Godfrey
    Veriflow: Verifying networkwide invariants in real time. In Hot Topics in SDNs. ACM, 2012
    26
  4. J Bonneau, C Herley, P Oorschot, Stajano
    F.: The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In: Proc. 33th IEEE Symp. on Security and Privacy, 2012
    26
  5. B ATIKOGLU, Y XU, E FRACHTENBERG, S JIANG, M PALECZNY
    Workload analysis of a large-scale key-value store. In Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems (New, 2012
    26
  6. Helger Lipmaa
    Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments. In Proceedings of the 9th Theory of Cryptography Conference on Theory of Cryptography, TCC ’12, 2012
    26
  7. P Pearce, A P Felt, G Nunez, D Wagner
    AdDroid: privilege separation for applications and advertisers in Android. In Proc. of the ASIACCS, 2012
    26
  8. F Cingano, A Rosolia
    People I know: Job search and social networks Journal of Labor Economics, 2012
    26
  9. A Sadilek, H Kautz, J P Bigham
    Finding your friends and following them to where you are. In Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, 2012
    26
  10. A Criminisi, J Shotton, E Konukoglu
    Decision forests: A unified framework for classification, regression, density estimation, manifold learning and semi-supervised learning Foundations and Trends in Computer Graphics and Vision, 2012
    26
  11. J Sherry, S Hasan, C Scott, A Krishnamurthy, S Ratnasamy, V Sekar
    Making middleboxes someone else’s problem: Network processing as a cloud service. in Proc. ACM SIGCOMM, 2012
    25
  12. B Parno, M Raykova, V Vaikuntanathan
    How to delegate and verify in public: Verifiable computation from attribute-based encryption. TCC 2012, volume 7194 of LNCS, 2012
    25
  13. The Economic, Energy
    GHG Emissions Impacts of Proposed 2017–2025 Vehicle Fuel Economy Standards in the United States Karplus and Paltsev, 2012
    25
  14. Michael Grace, Yajin Zhou, Zhi Wang, Xuxian Jiang
    Systematic Detection of Capability Leaks in Stock Android Smartphones In Proceedings of the Nineteenth Annual Network & Distributed System Security Symposium, NDSS’12. ISOC, 2012
    25
  15. C Herley, Van
    Oorschot, P.: A research agenda acknowledging the persistence of passwords. IEEE Security & Privacy, 2012
    25
  16. Heitor Almeida, Murillo Campello, Bruno Laranjeira, Scott Weisbenner
    Corporate debt maturity and the real effects of the 2007 credit crisis, Critical Finance Review 2012
    25
  17. A Borji, L Itti
    State-of-the-art in visual attention modeling. IEEE TPAMI, 2012
    25
  18. A Prest, C Schmid, V Ferrari
    Weakly supervised learning of interactions between humans and objects. IEEE PAMI, 2012
    24
  19. B Alexe, T Deselaers, V Ferrari
    Measuring the objectness of image windows IEEE Trans. on PAMI, 2012
    24
  20. J Yang, O Ozel, S Ulukus
    Broadcasting with an energy harvesting rechargeable transmitter. IEEE Trans. Wireless Comm, 2012
    24
  21. J Lavaei, S Low
    Zero duality gap in optimal power flow problem IEEE Trans. on Power Systems, 2012
    24
  22. W-N Chin, C David, H H Nguyen, S Qin
    Automated verification of shape, size and bag properties via user-defined predicates in separation logic Science of Computer Programming, 2012
    24
  23. F Drewes, B Hoffmann, M Minas
    Contextual hyperedge replacement Applications of Graph Transformation with Industrial Relevance (AGTIVE’11), number 7233 in Lecture Notes in Computer Science, 2012
    24
  24. Eric H Huang, Richard Socher, Christopher D Manning, Andrew Y Ng
    Improving word representations via global context and multiple word prototypes. In ACL, 2012
    24
  25. C Gentry, S Halevi, N P Smart
    Homomorphic Evaluation of the AES Circuit. In Proceedings of CRYPTO, 2012
    24
  26. F ROESNER, T KOHNO, A MOSHCHUK, B PARNO, H J WANG, C COWAN
    User-driven access control: Rethinking permission granting in modern operating systems. In Proceedings of the IEEE Symposium on Security and Privacy, 2012
    24
  27. M M Halldórsson
    Wireless scheduling with power control. ACM Trans. Algorithms, 2012
    24
  28. R Arandjelović, A Zisserman
    Three things everyone should know to improve object retrieval In CVPR, 2012
    23
  29. D Ciresan, U Meier, J Schmidhuber
    Multicolumn deep neural networks for image classification. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR, 2012
    23
  30. R Bansal, D Kiku, A Yaron
    An empirical evaluation of the long-run risks model for asset prices. Critical Finance Review, 2012
    23
  31. Carbon
    Tax Revenue and the Budget Deficit: A Win-WinWin Solution Sebastian Rausch and John Reilly, 2012
    23
  32. N Handigol, B Heller, V Jeyakumar, D Mazières, N McKeown
    Where is the debugger for my software-defined network. In Proc. HotSDN, 2012
    23
  33. V SEKAR, N EGI, S RATNASAMY, M K REITER, G SHI
    Design and Implementation of a Consolidated Middlebox Architecture In Proc. of USENIX Symposium on Networked Systems Design & Implementation (NSDI, 2012
    23
  34. pdf
    Accessed 30 2012
    23
  35. A RAJARAMAN, J D ULLMAN
    Mining of massive datasets 2012
    23
  36. M Alizadeh, A Kabbani, T Edsall, B Prabhakar, A Vahdat, M Yasuda
    Less is More: Trading a little Bandwidth for Ultra-Low Latency in the Data Center. In USENIX NSDI, 2012
    23
  37. David J Cooper, John H Kagel
    Other Regarding Preferences: A Selective Survey of Experimental Results Handbook of Experimental Economics, 2012
    22
  38. Eric Shieh, Bo An, Rong Yang, Milind Tambe, Craig Baldwin, Joseph DiRenzo, Ben Maule, Garrett Meyer
    Protect: A deployed game theoretic system to protect the ports of the united states. In Proceedings of the Eleventh International Conference on Autonomous Agents and Multiagent Systems (AAMAS, 2012
    22
  39. P G Kelley, S Komanduri, M L Mazurek, R Shay, T Vidas, L Bauer, N Christin, L F Cranor, J Lopez
    Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In: Proc. IEEE S&P, 2012
    22
  40. Daron Acemoglu, James A Robinson
    Why Nations Fail: The Origins of Power, Prosperity, and Poverty, 2012
    22
  41. A J Ferrer, F Hernández, J Tordsson, E Elmroth, A Ali-Eldin, C Zsigri, R Sirvent, J Guitart, R M Badia, K Djemame, W Ziegler, T Dimitrakos, S K Nair, G Kousiouris, K Konstanteli, T Varvarigou, B Hudzia, A Kipp, S Wesner, M Corrales, N Forgó, T Sharif, C Sheridan
    OPTIMIS: A holistic approach to cloud service provisioning,” Future Generation Computer Systems, 2012
    22
  42. L Laeven, F Valencia
    Systemic Banking Crises Database: An Update. In: IMF Working Papers 12/163. International Monetary Fund, 2012
    22
  43. S Bugiel, L Davi, A Dmitrienko, T Fischer, A-R Sadeghi, B Shastry
    Towards taming privilege-escalation attacks on android. In NDSS Symposium, 2012
    22
  44. N Handigol, B Heller, V Jeyakumar, B Lantz, N McKeown
    Reproducible network experiments using container based emulation. Proc. CoNEXT, 2012
    22
  45. H Zhang, E Law, R Miller, K Gajos, D Parkes, E Horvitz
    Human computation tasks with global constraints. In Proceedings of the SIGCHI conference on Human factors in computing systems, CHI ’12, ACM, 2012
    22
  46. M T Goodrich, M Mitzenmacher, O Ohrimenko, R Tamassia
    Privacy-preserving group data access via stateless oblivious ram simulation. In Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, 2012
    22
  47. R Xu, H Saı̈di, R Anderson
    Aurasium: Practical policy enforcement for android applications. In Proceedings of the 21st USENIX Conference on Security Symposium, Security’12, 2012
    22
  48. C Doersch, S Singh, A Gupta, J Sivic, Efros
    A.A.: What makes paris look like paris. ACM Transactions on Graphics (SIGGRAPH, 2012
    22
  49. N Vasconcelos, M Vasconcelos
    Minimum probability of error image retrieval: From visual features to image semantics. Foundations and Trends in Signal Processing, 2012
    22
  50. J Snoek, H Larochelle, R P Adams
    Practical Bayesian optimization of machine learning algorithms. Advances in Neural Information Processing Systems 25, NIPS ’12, 2012
    22
  51. D Zats, T Das, P Mohan, D Borthakur, R Katz
    DeTail: Reducing the flow completion time tail in datacenter networks. In Proceedings of SIGCOMM, 2012
    22
  52. C Matuszek, N FitzGerald, L Zettlemoyer, L Bo, D Fox
    A joint model of language and perception for grounded attribute learning. In Proceedings of the International Conference on Machine Learning, 2012
    22
  53. M Hardt, K Ligett, F McSherry
    A simple and practical algorithm for differentially private data release. In Proc. NIPS, 2012
    22
  54. Daron Acemoglu, James A Robinson
    Why nations fail : the origins of power, prosperity and poverty 2012
    21
  55. Raj Chetty, John N Friedman, Jonah E Rockoff
    The long-term impacts of teachers: Teacher value-added and student outcomes in adulthood. Working Paper 17699 National Bureau of Economic Research, 2012
    21
  56. D Hofheinz, E Kiltz
    Programmable hash functions and their applications. In Journal of Cryptology, 2012
    21
  57. Y Zhang, A Juels, M K Reiter, T Ristenpart
    Cross-VM side channels and their use to extract private keys. in CCS, 2012
    21
  58. G Elek
    Full groups and so. 2012
    21
  59. D Goldfarb, S Ma, K Scheinberg
    Fast alternating linearization methods for minimizing the sum of two convex functions Mathematical Programming, 2012
    21
  60. W Wu, H Li, H Wang, K Q Zhu
    Probase: a probabilistic taxonomy for text understanding. SIGMOD, 2012
    21
  61. J Galí, F Smets, R Wouters
    Unemployment in an Estimated New Keynesian Model. University of Chicago, 2012
    21
  62. Kun Duan, Devi Parikh, David Crandall, Kristen Grauman
    Discovering localized attributes for fine-grained recognition. In Computer Vision and Pattern Recognition. IEEE, 2012
    21
  63. J Sturm, N Engelhard, F Endres, W Burgard, D Cremers
    A benchmark for the evaluation of rgb-d slam systems. In Intelligent Robots and Systems (IROS), IEEE/RSJ International Conference on, 2012
    21
  64. T H Austin, C Flanagan
    Multiple facets for dynamic information flow. In Proceedings of the 39th Symposium on Principles of Programming Languages, 2012
    21
  65. B Ager, N Chatzis, A Feldmann, N Sarrar, S Uhlig, W Willinger
    Anatomy of a large european ixp. In Proc. of ACM SIGCOMM, 2012
    21
  66. A Thomson, T Diamond, S- C Weng, K Ren, P Shao, D J Calvin Abadi
    fast distributed transactions for partitioned database systems. In SIGMOD, 2012
    20
  67. U S Department
    of Justice and Federal Trade Commission, Horizontal Merger Guidelines, August 19, 2010. As of August 20 2013: http://www.justice.gov/atr/public/guidelines/hmg-2010.pdf U.S. Department of Veterans Affairs, Veterans Health Administration, Health Care Resources Contracting: Educational Costs of Physician and Dentist Resident Training, VHA Handbook 1400.10, 2012
    20
  68. D Hedin, A Sabelfeld
    Information-flow security for a core of JavaScript. In 25th IEEE Computer Security Foundations Symposium (CSF, 2012
    20
  69. J Bergstra, Y Bengio
    Random search for hyper-parameter optimization. 2012
    20
  70. D MERRILL, M GARLAND, A GRIMSHAW
    Scalable gpu graph traversal. In Principles and Practice of Parallel Programming (PPoPP, 2012
    20
  71. G Raskutti, M Wainwright, B Yu
    Minimax-optimal rates for sparse additive models over kernel classes via convex programming. Journal of Machine Learning Research (JMLR, 2012
    20
  72. H Wang, S Sen, A Elgohary, M Farid, M Youssef, R R Choudhury
    No need to war-drive: unsupervised indoor localization. InMobiSys, 2012
    20
  73. T Vu
    DMap: A Shared Hosting Scheme for Dynamic Identifier to Locator Mappings in the Global Internet,” in IEEE ICDCS, 2012
    20
  74. S Weiss, M W Achtelik, S Lynen, M Chli, R Siegwart
    Realtime onboard visual-inertial state estimation and self-calibration of MAVs in unknown environment. in Proc. IEEE Int. Conf, 2012
    20