Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. R S Sutton, A G Barto
    Reinforcement Learning: An Introduction. 1998
    2674
  2. S Brin, L Page
    The anatomy of a large-scale hypertextual web search engine. in: Proceedings of the 7th World Wide Web Conference, 1998
    2453
  3. L Page, S Brin, R Motwani, T Winograd
    The Pagerank citation ranking: Bring order to the web. Stanford University, 1998
    1520
  4. F MacWilliams, N Sloane
    The Theory of Error-Correcting Codes 1998
    1465
  5. T Joachims
    Text Categorization with Support Vector Machines: Learning with Many Relevant Features. Proceedings of 10th ECML Conference, 1998
    1330
  6. I Daubechies
    Orthonormal bases of compactly supported wavelets Communications on Pure and Applied Mathematics 41, 1998
    1292
  7. M Spellman, P Brown, P, D Botstein
    Cluster analysis and display of genome-wide expression patterns Proc. Nat. Acad. Sci 95, 1998
    1127
  8. Frank P Kelly, Aman K Maulloo, David K H Tan
    Rate control for communication networks: shadow prices, proportional fairness and stability Journal of the Operational Research Society, 1998
    1064
  9. C H Papadimitriou, K Steiglitz
    Combinatorial Optimization: Algorithms and Complexity 1998
    1016
  10. J Padhye, V Firoiu, D Towsley, J Kurose
    Modeling TCP Throughput: A Simple Model and its Empirical Validation. In Proc. ACM SIGCOMM, 1998
    980
  11. A Blum, T Mitchell
    Combining labeled and unlabeled data with co-training. In Proceedings ofthe Eleventh Annual Conference on Computational Learning Theory, 1998
    918
  12. G J Foschini, M J Gans
    On Limits of Wireless Communications in a Fading Environment When Using Multiple Antennas. Wireless Personal Communications, 1998
    916
  13. B Bollobás
    Modern Graph Theory 1998
    865
  14. V Tarokh, N Seshadri, A R Calderbank
    Space-Time Codes for High Data Rate Wireless Communications: Performance criterion and code construction. IEEE Trans. Information Theory, V, 1998
    811
  15. Franz Baader, Tobias Nipkow
    Term Rewriting and all That CKMM04] Horatiu Cirstea, Claude Kirchner, Michael Moossen, and Pierre-Etienne Moreau, 1998
    792
  16. R C Arkin
    Behavior-Based Robotics 1998
    784
  17. B Schölkopf, A Smola, K-R Müller
    Nonlinear component analysis as a kernel eigenvalue problem. Neural Computation, 1998
    755
  18. Ken Arnold, James Gosling
    The Java Programming Language 1998
    732
  19. J Kittler, M Hatef, R P Duin, J Matas
    On combining classifiers. IEEE Trans. on PAMI, 1998
    728
  20. Black Blake, Davies Carlson, Weiss Wang
    An Architecture for Differentiated Services. 1998
    687
  21. P Barford, M Crovella
    Generating representative web workloads for network and server performance evaluation. in Proc. SIGMETRICS’98/PERFORMANCE’98, 1998
    677
  22. S Verdu
    Multiuser Detection. 1998
    675
  23. Jay M Ponte, W Bruce Croft
    A Language Modeling Approach to Information Retrieval. in Proc. 21st Annu. Int. ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR’98, 1998
    647
  24. L ITTI, C KOCH, E NIEBUR
    A model of saliencybased visual attention for rapid scene analysis. IEEE Trans. Pattern Anal. Mach. Intell, 1998
    636
  25. R S Sutton, A G Barto
    Reinforcement Learning. 1998
    618
  26. B N Parlett
    The Symmetric Eigenvalue Problem 1998
    614
  27. Leslie Pack Kaelbling, Michael L Littman, Anthony R Cassandra
    Planning and acting in partially observable stochastic domains. Artificial Intelligence, 1998
    612
  28. S Arya, D Mount, N Netanyahu, R Silverman, A Wu
    An optimal algorithm for approximate nearest neighbor searching fixed dimensions. In Proc. VLDB ’96, 1998
    604
  29. G Karypis, V Kumar
    A fast and high quality multilevel scheme for partitioning irregular graphs. SIAM J. Sci. Comput, 1998
    603
  30. J Coleman
    Social Capital in the Creation of Human Capital. The American Journal of Sociology, 1998
    600
  31. XING Robert E Schapire, Yoav Freund, Peter Bartlett, Wee Sun Lee
    Boosting the margin: A new explanation for the effectiveness of voting methods. The Annals of Statistics, 1998
    595
  32. S ARORA, C LUND, R MOTWANI, M SUDAN, M SZEGEDY
    Proof verification and the hardness of approximation problems. J. ACM, 1998
    589
  33. D Knuth
    The Art of Computer Programming. Volume 3: Sorting and Searching Random Sampling of Sparse Trigonometric Polynomials II - Orthogonal Matching Pursuit versus Basis Pursuit, 1998
    588
  34. R M Neal, G E Hinton
    A view of the EM algorithm that justifies incremental, sparse, and other variants. Learning in Graphical Models, 1998
    585
  35. V Bro PAXSON
    A system for detecting network intruders in real-time. In Proc. USENIX Security Simposium, 1998
    553
  36. Young-Bae Ko, Nitin Vaidya
    Location-Aided Routing (LAR) in Mobile Ad Hoc Networks. In Proceedings of the Fourth International Conference on Mobile Computing and Networking (MobiCom’98, 1998
    552
  37. G Morrisett, D Walker, K Crary, N Glew
    From System F to typed assembly language. In POPL, 1998
    551
  38. M K Reiter, A V Rubin
    Crowds: anonymity for web transactions. ACM Transactions on Information and Systems Security, 1998
    548
  39. R Schapire, Y Singer
    Improved boosting algorithms using confidence-rated predictions. In COLT, 1998
    538
  40. D Fudenberg, D K Levine
    The theory of learning in games 1998
    536
  41. A Borodin, R El-Yaniv
    Online computation and competitive analysis 1998
    529
  42. Dekang Lin
    Automatic retrieval and clustering of similar words. In Proc. of COLING-ACL 98, 1998
    507
  43. D J Newman, S Hettich, C L Blake, C J Merz
    UCI repository of machine learning databases. http://archive.ics.uci.edu/ml 1998
    504
  44. U S
    Environmental Protection Agency National Health and Environmental Effects Laboratory, 1998
    502
  45. Kah-Kay Sung, Tomaso Poggio
    Example-based learning for view-based human face detection. IEEE Trans. on PAMI, 1998
    500
  46. V Gaede, O Gunther
    Multidimensional Access Methods. ACM Computing Surveys, 1998
    500
  47. A BLAKE, M ISARD
    Active Contours 1998
    496
  48. Thomas Landauer, Peter Foltz, Darrell Laham
    An Introduction to Latent Semantic Analysis. Discourse Processes, 1998
    490
  49. P T Spellman, G Sherlock, M Q Zhang, V R Iyer, K Anders, M B Eisen, P O Brown, D Botstein, B Futcher
    Comprehensive identification of cell cycle-regulated genes of the yeast Saccharomyces cerevisia by microarray hybridization Mol. Biol. of the Cell, 1998
    487
  50. Dekang Lin
    An information–theoretic definition of similarity. In Proceedings of the 15th International Conference on Machine Learning (ICML, 1998
    485
  51. N Guarino, editor
    Formal Ontology and Information Systems. 1998
    479
  52. D Culler, J P Singh, A Gupta
    Parallel Computer Architecture: A Hardware/Software Approach (The Series in Computer Architecture and Design, 1998
    476
  53. S R Eddy
    Profile hidden Markov models Bioinformatics, 1998
    472
  54. World bank
    world development report 1998
    471
  55. F Buschmann, R Meunier, H Rohnert, P Sommerlad, M Stal
    Pattern-Oriented Software Architecture: A System of Patterns 1998
    469
  56. Desmond D’Souza, Alan Cameron Wills
    Objects, Components, and Frameworks with UML - The Catalysis Approach 1998
    465
  57. H Beyer, K Holtzblatt
    Contextual Design. Defining Customer-Centered Systems Psychological Bulletin, 1998
    462
  58. L Lamport
    The part-time parliament. ACM Trans. Comput. Syst, 1998
    462
  59. Y LeCun, L Bottou, Y Bengio, P Ha
    ner. Gradient-based learning applied to document recognition. Proceedings of the IEEE, 1998
    459
  60. R Agrawal, J Gehrke, D Gunopulos, P Raghavan
    Automatic subspace clustering of high dimensional data for data mining applications. In SIGMOD, 1998
    456
  61. E Parzen
    On the estimation of a probability density function and the mode Annals of Mathematical Statistics, 1998
    451
  62. T Berners-Lee, R Fielding, U C Irvine, L Masinter
    Uniform Resource Identifiers (URI): Generic Syntax 1998
    446
  63. Carl Shapiro, Hal R Varian
    Information Rules: A Strategic Guide to the Network 1998
    434
  64. J O’Rourke
    Computational Geometry 1998
    434
  65. S Guha, R Rastogi, K Shim
    CURE: An efficient clustering algorithm for large databases in Proceedings of the ACM SIGMOD International Conference on Management of data, ser. SIGMOD ’98, 1998
    426
  66. P Aghion, P Howitt, M Brant-Collett, C Garc’ia-Peñalosa
    Endogenous growth theory, the 1998
    425
  67. S T Dumais, J Platt, D Heckerman, M Sahami
    Inductive Learning Algorithms and Representations for Text Classification. In Proceedings of ACM-CIKM98, 1998
    413
  68. R A DeVore
    Nonlinear approximation. In Acta numerica, 1998
    411
  69. Y Rui, T Huang, M Ortega, S Mehrotra
    Relevance Feedback: A Power Tool for Interactive Content-Based Image Retrieval. IEEE Trans. Circuits and Systems for Video Technology, 1998
    411
  70. M Matsumoto, T Nishimura
    Mersenne Twister: A 623-Dimensionally Equidistributed Uniform Pseudo-Random Number Generator. ACM Transactions on Modeling and Computer Simulation, 1998
    408
  71. R Weber, H-J Schek, S Blott
    A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces. In VLDB ’98: Proceedings of the 24rd International Conference on Very Large Data Bases, 1998
    402
  72. I Foster, C Kesselman, G Tsudik, S Tuecke
    A Security Architecture for Computational Grids. Proc. ACM Computer and Communication Security, 1998
    398
  73. Emanuele Trucco, Alessandro Verri
    Introductory Techniques for 3-D Computer Vision 1998
    396
  74. J J Dongarra, J J Du Croz, S Hammarling, R J Hanson
    An extented set of Fortran Basic Linear Algebra Subprograms. 1998
    394
  75. R Durbin, S Eddy, A Krogh, G Mitchison
    Biological sequence analysis 1998
    393
  76. C Cowan, C Pu, D Maier, J Walpole, P Bakke, S Beattie, A Grier, P Wagle, Q Zhang, Hinton
    H.: StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In: Proc. of the 7th Usenix Security Symposium, 1998
    392
  77. R Sedgewick
    Algorithms In C, 1998
    386
  78. R Cramer, V Shoup
    A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In Advances in Cryptology – CRYPTO ’98, Springer LNCS 1462, 1998
    385
  79. M Bellare, A Desai, D Pointcheval, P Rogaway
    Relations among Notions of Security for Public-Key Encryption Schemes. In Crypto ’98, LNCS 1462, 1998
    385
  80. C TOMASI, R MANDUCHI
    Bilateral filtering for gray and color images. In Proc. of ICCV, 1998
    383
  81. La Porta, F Schleifer R Lopez-de-Silanes, R W A Vishney
    Law and Finance In: Journal of Political Economy, 1998
    382