Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. L Breiman
    Bagging predictors. Machine Learning, 1996
    1940
  2. D Johnson, D Maltz
    Dynamic source routing in ad-hoc wireless networks routing protocols. In Mobile Computing, 1996
    1793
  3. Casner Schulzrinne, Jacobson Frederick
    RTP: A Transport Protocol for Real-Time Applications. 1996
    1650
  4. G GOLUB, VAN LOAN
    C.: Matrix Computations 1996
    1478
  5. Y Freund, R Shapire
    Experiments with a new boosting algorithm. in Intl. Conf. on Machine Learning (ICML, 1996
    1293
  6. Herbert A Simon
    Sciences of the Artificial 1996
    1165
  7. L P Kaelbling, M L Littman, A W Moore
    Reinforcement learning: A survey. JAIR, 1996
    1113
  8. Tim Lindholm, Frank Yellin
    The Java Virtual Machine Specification In Usenix Technical Conference, 1996
    1016
  9. Mark Crovella, Azer Bestavros
    Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes. In Proceedings of SIGMETRICS’96: The ACM International Conference on Measurement and Modelling of Computer Systems, 1996
    1009
  10. H Hoppe
    Progressive meshes. In Proc. of the 23rd Annual Conf. on Computer Graphics and Interactive Techniques, 1996
    971
  11. R S Sandhu
    Role-Based Access Control Models. IEEE Computer, 1996
    922
  12. Noam Chomsky
    The Minimalist Program 1996
    912
  13. M LEVOY, P M HANRAHAN
    Light field rendering. In SIGGRAPH, 1996
    894
  14. H H Clark
    Using Language 1996
    882
  15. B Schneier
    Applied Cryptography 1996
    872
  16. M Abadi, L Cardelli
    A Theory of Objects. 1996
    823
  17. A Berger, V Della Pietra, S Della Pietra
    A maximum entropy approach to natural language processing. Computational Linguistics, 1996
    806
  18. S Lauritzen
    Graphical Models 1996
    790
  19. M Este, H-P Kriegel, J Sander, X Xu
    A density-based algorithm for discovering clusters in large spatial databases with noise. in 2nd ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 1996
    758
  20. L Devroye, L Györfi, G Lugosi
    A probabilistic theory of pattern recognition 1996
    750
  21. H A Rowley, S Baluja, T Kanade
    Neural network‐based face detection. Proceedings CVPR 96, 1996 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1996
    747
  22. M Blaze, J Feigenbaum, J Lacy
    Decentralized Trust Management. In Proceedings of the IEEE Symposium on Security and Privacy, 1996
    731
  23. S J GORTLER, R GRZESZCZUK, R SZELISKI, M F COHEN
    The lumigraph. In Computer graphics and interactive techniques, SIGGRAPH’96, 1996
    716
  24. L E Kavraki, P ˇSvestka, J C Latombe, M H Overmars
    Probabilistic roadmaps for path planning in high-dimensional configuration spaces. IEEE Trans. Robot. Automat, 1996
    716
  25. A SAID, W A PEARLMAN
    MEMBER S.: A new fast and efficient image codec based on set partitioning in hierarchical trees. IEEE Transactions on Circuits and Systems for Video Technology 6, 1996
    715
  26. V Paxson
    End-to-End Internet Packet Dynamics. Proc. SIGCOMM’97, Sept 1997. V. “End-to-End Internet Routing Behavior in the Internet”, Proc. SIGCOMM’96, 1996
    653
  27. A Y Levy, A Rajaraman, J J Ordille
    Querying heterogeneous information sources using source descriptions. In VLDB, 1996
    639
  28. W Gropp, E Lusk, N Doss, A Skjellum
    A high performance, portable implementation of the MPI MessagePassing Interface standard. Parallel Computing, 1996
    636
  29. M Dorigo, V Maniezzo, A Colorni
    Ant system: Optimization by a colony of cooperating agents. IEEE Transactions on Systems Man and Cybernetics Part B-Cybernetics, 1996
    623
  30. G E Hughes, M J Creswell
    A New Introduction to Modal Logic 1996
    622
  31. G J Foschini
    Layered Space-Time Architecture for Wireless Communication in a Fading Environment when using Multiple Antennas in Proc. International Conference on Genetic Algorithms, 1996
    622
  32. B CURLESS, M LEVOY
    A volumetric method for building complex models from range images. In SIGGRAPH, ACM, 1996
    621
  33. J Gray, A Bosworth S Chaudhuri, A Layman, D Reichart, M Venkatrao, F Pellow, H Pirahesh
    Data cube: A relational aggregation operator generalizing group-by, cross-tab, and sub-totals. Data Mining and Knowledge Discovery, 1996
    616
  34. S McCanne, V Jacobson, M Vetterli
    Receiver-driven layered multicast. in Proceedings ACM SIGCOMM, 1996
    601
  35. E W Zegura, K L Calvert, S Bhattacharjee
    How to model an internetwork. Proc. IEEE Fifteenth Annual Joint Conference of the IEEE Computer Societies. Networking the Next Generation INFOCOM '96, 1996
    597
  36. S Gottschalk, M C Lin, D Manocha
    OBB-tree: A hierarchical structure for rapid interference detection. Proc. SIGGRAPH ’96, 1996
    591
  37. M Snir, S Otto, S Huss-Lederman, D Walker, J Dongarra
    MPI : The Complete Reference 1996
    568
  38. Douglas B West
    Introduction to graph theory Upper Saddle River, NJ, 1996
    566
  39. I Nonaka, H Takeuchi
    The Knowledge-Creating Company 1996
    550
  40. N Alon, Y Matias, M Szegedy
    The space complexity of approximating the frequency moments. In STOC, 1996
    549
  41. G Lowe
    Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Software - Concepts and Tools, 1996
    548
  42. B Shneiderman
    The eyes have it: a task by data type taxonomy for information visualizations. In Proceedings of the 1996 IEEE Symposium on Visual Languages, 1996
    545
  43. L Vandenberghe, S Boyd
    Semidefinite programming. SIAM Review, 1996
    540
  44. U M Fayyad, G Piatetsky-Shapiro, P Smyth
    From data mining to knowledge discovery: An overview in Advances in Knowledge Discovery and Data Mining, (AAAI Press/The, 1996
    537
  45. B S Manjunath
    W.Y.Ma , “Texture Features for Browsing and Retrieval .of Image Data International Journal of Image Processing, Volume (2) : Issue, 1996
    531
  46. John R Smith, Shih-Fu Chang
    Visualseek: a fully automated content-based image query system. In Proceedings of the fourth ACM international conference on Multimedia, MULTIMEDIA ’96, 1996
    529
  47. L K Grover
    A fast quantum mechanical algorithm for database search. In Proceedings of 28th ACM STOC, 1996
    527
  48. R Ihaka, R Gentleman
    R: A language for data analysis and graphics Journal of Computational and Graphical Statistics, 1996
    508
  49. M Shaw, D Garlan
    Software Architecture. 1996
    506
  50. S Hutchinson, G D Hager, P I Corke
    A tutorial on visual servo control. IEEE Trans. Robot. Automat, 1996
    497
  51. D Harel, A Naamad
    The Statemate Semantics of Statecharts. ACM Transactions on Software Engineering and Methodology, 1996
    494
  52. William H Press, Brian Flannery, Saul A Teukolsky, William T Vetterling
    Numerical Recipes 1996
    493
  53. R M Neal
    Bayesian Learning for Neural Networks. Lecture Notes in Statistics, 1996
    491
  54. Jean Carletta
    Assessing agreement on classification tasks: the kappa statistic. Comput. Linguist, 1996
    485
  55. M Isard, A Blake
    Contour tracking by stochastic propagation of conditional density. In Proc. European Conf. on Computer Vision, 1996
    484
  56. S Ross
    Stochastic Processes 1996
    477
  57. B Steensgaard
    Points-to analysis in almost linear time. In 23rd ACM SIGPLAN/SIGACT Symp. on Principles of Prog. Lang, 1996
    471
  58. S C ZHU, A YUILLE
    Region competition: Unifying snakes, region growing, and bayes/mdl for multiband image segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1996
    459
  59. S Berchtold, D A Keim, H-P Kriegel
    The x-tree: An index structure for high-dimensional data. In VLDB ’96: Proceedings of the 22th International Conference on Very Large Data Bases, 1996
    457
  60. H Kautz, B Selman
    Pushing the envelope: Planning, propositional logic and stochastic search. In Proc. 13th National Conference onArti cal Intelligence, 1996
    457
  61. S Forrest, S Hofmeyr, A Somayaji, T Longstaff
    A sense of self for UNIX processes. In IEEE Symposium on Security and Privacy, 1996
    449
  62. K Fall, S Floyd
    Simulation-based Comparisons of Tahoe Reno, and SACK TCP,” Computer Communication Review, 1996
    448
  63. M Castells
    The rise of the network society 1996
    447
  64. A Chankhunthod, P Danzig, C Neerdaels, M Schwartz, K Worrell
    A hierarchical internet object cache. In USENIX, 1996
    436
  65. J Gray, P Helland, P O’Neil, D Shasha
    The dangers of replication and a solution. In SIGMOD, 1996
    431
  66. R Srikant, R Agrawal
    Mining Sequential Patterns: Generalizations and Performance Improvements. In Proceedings of the 5th International Conference on Extending Database Technology (EDBT, 1996
    422
  67. V Harinarayan, A Rajaraman, J Ullman
    Implementing data cube efficiently. In SIGMOD, 1996
    419
  68. C Amza, A L Cox, S Dwarkadas, P Keleher, H Lu, R Rajamony, W Yu, W Zwaenepoel
    Treadmarks: Shared memory computing on networks of workstations. IEEE Computer, 1996
    401
  69. R Agrawal, H Mannila, R Srikant, H Toivonen, A I Verkamo
    Fast discovery of association rules In Advances in Knowledge Discovery and Data Mining, 1996
    398
  70. W R Gilks, S Richardson, D J Spiegelhalter
    Markov Chain Monte Carlo in Practice 1996
    396
  71. Doug Burger, Todd M Austin, Steve Bennett
    Evaluating Future Microprocessors: The SimpleScalar Tool Set. 1996
    395
  72. M Bellare, R Canetti, H Krawczyk
    Keying hash functions for message authentication. Advances in Cryptology, Proceedings Crypto’96, LNCS 1109, 1996
    394
  73. Å Björck
    Numerical methods for least squares problems Society for Industrial and Applied Mathematics, 1996
    391
  74. T E Anderson, M D Dahlin, J M Neefe, D A Patterson, D S Roselli, R Y Wang
    Serverless network file systems. ACM Trans. Comput. Systems, 1996
    390
  75. M Collins
    A new statistical parser based on bigram lexical dependencies. Proceedings of the Annual Meeting of the Association for Computational Linguistics, 1996
    388
  76. E Kalnay, Coauthors
    The NCEP/NCAR 40-Year Reanalysis Project Bull. Amer. Meteor. Soc, 1996
    387
  77. M Weiser, B Welch, A Demers, S Shenker
    Scheduling for reduced CPU energy. Mobile Computing, 1996
    387
  78. R van Renesse, K P Birman, S Maffeis
    Horus: a flexible group communication system. Commun. ACM, 1996
    382
  79. J Xu, W B Croft
    Query Expansion Using Local and Global Document Analysis. In Frei et, 1996
    377
  80. G C Necula, P Lee
    Safe kernel extensions without run-time checking. In Proceedings of OSDI, 1996
    377
  81. B J Grosz, S Kraus
    Collaborative plans for complex group action. Artificial Intelligence, 1996
    374