Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. V Vapnik
    Statistical Learning Theory. 1998
    9898
  2. R Sutton, A Barto
    Reinforcement Learning, an introduction. 1998
    4148
  3. S Brin, L Page
    The Anatomy of a Large-Scale Hypertextual Web Search Engine. in Proc. of 7th International WWW Conference, 1998
    3623
  4. C L Blake, C J Merz
    UCI repository of machine learning databases 1998
    3070
  5. Jon M Kleinberg
    Authoritative sources in a hyperlinked environment. In Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA, 1998
    2990
  6. C ed Fellbaum
    WordNet: An Electronic Lexical Database 1998
    2956
  7. C J C Burges
    A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 1998
    2486
  8. Lawrence Page, Sergey Brin, Rajeev Motwani, Terry Winograd
    The PageRank citation ranking: Bringing order to the Web. 1998
    2389
  9. A Jain, R Dubes
    Algorithms for Clustering Data 1998
    2320
  10. D J Watts, S J Strogatz
    Collective dynamics of `small-world' networks Nature, 1998
    2148
  11. T Joachims
    Text Categorization with Support Vector Machines: Learning with Many Relevant Features. In Proceedings of the Tenth European Conference on Machine Learning, 1998
    1872
  12. D Posada, K A Crandall
    MODELTEST: testing the model of DNA substitution Bioinformatics, 1998
    1828
  13. S CHEN, D DONOHO, M SAUNDERS
    Atomic decomposition by basis pursuit. SIAM J. Sci. Comp, 1998
    1794
  14. S S Gubser, I R Klebanov, A M Polyakov
    Gauge theory correlators from noncritical string theory, Phys Lett. B, 1998
    1785
  15. G J Foschini, M J Gans
    On limits of wireless communications in a fading environment when using mutiple antennas. Wireless Personal Communications, 1998
    1751
  16. T Cootes, G Edwards, C J Taylor
    Active appearance models. in Proceedings of the 5th European Conference on Computer Vision (ECCV ’98, 1998
    1635
  17. F P Kelly, A K Maulloo, D Tan
    K.,“Rate control for communication networks: shadow prices, proportional fairness, and stability Journal of the Operational Research Society, 1998
    1518
  18. J Broch, D A Maltz, D B Johnson, Y Hu, J Jetcheva
    A performance comparison of multi-hop wireless ad hoc network routing protocols. in Proceedings of ACM MOBICOM'98, 1998
    1515
  19. S M Alamouti
    A simple transmit diversity technique for wireless communications. IEEE J. Select. Areas Commun, 1998
    1450
  20. V Tarokh, N Seshadri, A R Calderbank
    Space-time codes for high data rate wireless communications: performance criterion and code construction. IEEE Trans. Inf. Theory, 1998
    1364
  21. A Blum, T Mitchell
    Combining Labeled and Unlabeled Data with Co{Training. In Proceedings of the 11th Annual Conference on Computational Learning Theory, COLT-98, 1998
    1318
  22. J Friedman, T Hastie, R Tibshirani
    Additive logistic regression: a statistical view of boosting. 1998
    1314
  23. R Blundell, S Bond
    Initial Conditions and Moment Restrictions in Dynamic Panel Data Models. Journal of Econometrics, 1998
    1285
  24. M Isard, A Blake
    Condensation – conditional density propagation for visual tracking. International Journal of Computer Vision, 1998
    1225
  25. B Bollobás
    Modern Graph Theory Graduate Texts in Mathematics, 1998
    1219
  26. J Padhye, V Firoiu, D Towsley, J Krusoe
    Modeling TCP throughput: A simple model and its empirical validation. In ACM Computer Communications Review: Proceedings of SIGCOMM 1998, 1998
    1198
  27. J Breese
    Empirical analysis of predictive algorithms for collaborative filtering. Proceedings of the 14th Annual Conference on Uncertainty in Artificial Intelligence (UAI-98, 1998
    1169
  28. B Schölkopf, A Smola, K-R Müller
    Nonlinear component analysis as a kernel eigenvalue problem. Neural Computation, 1998
    1143
  29. S Verdu
    Multiuser Detection. 1998
    1107
  30. L Itti, C Koch, E Niebur
    A Model of Saliency-Based Visual Attention for Rapid Scene Analysis. IEEE Trans. PAMI, 1998
    1102
  31. J Kittler, M Hatef, R Duin, J Matas
    On combining classifiers. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1998
    1096
  32. P Aghion, P Howitt
    Endogenous Growth Theory 1998
    1084
  33. R C Arkin
    Behavior-based Robotics 1998
    1033
  34. H Rowley, S Baluja, T Kanade
    Neural networkbased face detection. 2007 EURASIP 1944 15th European Signal Processing Conference (EUSIPCO 2007, 1998
    1020
  35. F Baader, T Nipkow
    Term Rewriting and All That 1998
    1004
  36. Eisen MB, Spellman PT, Brown PO
    Botstein D. Cluster analysis and display of genome-wide expression patterns Proc Natl Acad Sci U S A, 1998
    981
  37. J Ponte, W Croft
    A language modeling approach to information retrieval. In Proceedings of the 21st ACM SIGIR Conference on Research and Development in Information Retrieval, 1998
    948
  38. B Ewing, L Hillier, M C Wendl, P Green
    Base-calling of automated sequencer traces using phred. I. Accuracy assessment, Genome Res, 1998
    943
  39. R S Sutton, A G Barto
    Introduction to reinforcement learning. 1998
    938
  40. G E Moore
    Cramming More Components Onto Integrated Circuits In: Proceedings of the IEEE, 1998
    909
  41. P T Spellman, G Sherlock, M Q Zhang, V R Iyer, K Anders, M B Eisen, P O Brown, D Botstein, B Futcher
    Comprehensive identification of cell cycle-regulated genes of the yeast Saccharomyces cerevisiae by microarray hybridization. Mol. Biol. Cell 9:3273–3297 1998
    901
  42. D Fudenberg, D K Levine
    The Theory of Learning in Games 1998
    889
  43. La Porta, Florencio Lopez-de-Silanes Rafael, Andrei Shleifer, Robert Vishny, “Law
    and Finance Journal of Political Economy, 1998
    872
  44. S Blake, D Black, M Carlson, M Davies, Z Wang, W Weiss
    An Architecture for Differentiated Services. RFC, 1998
    872
  45. G Karypis, V Kumar
    A Fast and High Quality Multilevel Scheme for Partitioning Irregular Graphs. SIAM Journal Scientific Computing, 1998
    861
  46. D Lin
    An information-theoretic definition of similarity. In ICML ’98: Proceedings of the Fifteenth International Conference on Machine Learning, 1998
    848
  47. L Cardelli, A Gordon
    Mobile ambients. In FOSSACS’98, 1998
    846
  48. A T Brunger, P D Adams, G M Clore, W L DeLano, P Gros, R W Grosse-Kunstleve, J S Jiang, J Kuszewski, M Nilges, N S Pannu
    Crystallography & NMR system: a new software suite for macromolecular structure determination Acta Crystallogr. D Biol. Crystallogr, 1998
    838
  49. A McCallum, K Nigam
    A comparison of event models for naive Bayes text classi. Proceedings of AAAI '98, 1998
    833
  50. U S Department
    of Health and Human Services American Indians, and Alaska Natives, Asian Americans and Pacific Islanders, and Hispanics: A Report of the Surgeon General. Atlanta, GA: HHS, PHS, CDC, NCCDPHP, OSH, 1998
    820
  51. S Arya, D M Mount, N S Netanyahu, R Silverman, A Y Wu
    An optimal algorithm for approximate nearest neighbor searching in fixed dimensions. Journal of the ACM, 1998
    817
  52. B N Parlett
    The Symmetric Eigenvalue Problem 1998
    816
  53. J Jaffar, M J Maher, K Marriott, P J Stuckey
    The semantics of constraint logic programs. Journal of Logic Programming, 1998
    814
  54. Y LeCun, L Bottou, Y Bengio, P Haffner
    Gradient-based learning applied to document recognition. Proceedings of the IEEE, 1998
    812
  55. T Landauer, P Folz, D Laham
    An introduction to latent semantic analysis. Discourse Processes, 1998
    784
  56. R Schapire, Y Freund, P Bartlett, W S Lee
    Boosting the margin: a new explanation of effectiveness of voting methods. 1998
    771
  57. D Lin
    Automatic retrieval and clustering of similar words. In Proceedings of COLING-ACL'1998, 1998
    761
  58. L Fan, P Cao, J Almeida, A Z Broder
    Summary Cache: A Scalable Wide-area Web Cache Sharing Protocol. In Proceedings ACM SIGCOMM’98, Vancouver, BC, 1998
    761
  59. L C Evans
    Partial Differential Equations. 1998
    756
  60. Vern Paxson
    Bro: A System for Detecting Network Intruders in Real-Time. In Proceedings of the 7th USENIX Security Symposium, 1998
    755
  61. C Tomasi, R Manduchi
    Bilateral filtering for gray and color images. Proc. Int. Conf. Computer Vision, 1998
    728
  62. M L Minsky
    The society of mind 1998
    727
  63. A Strauss, J Corbin
    Basics of qualitative research 1998
    725
  64. Sanjeev Arora, Carsten Lund, Rajeev Motwani, Madhu Sudan, Mario Szegedy
    Proof verification and the hardness of approximation problems. Journal of the ACM, 1998
    722
  65. N Guarino
    Formal Ontology and Information Systems. In Proc. of Formal Ontology and Information Systems, 1998
    719
  66. C B S Hettich, C Merz
    UCI repository of machine learning databases 1998
    718
  67. M Reiter, A Rubin
    Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security, 1998
    714
  68. A Dembo, O Zeitouni
    Large Deviations Techniques and Applications 1998
    713
  69. M Matsumoto, T Nishimura
    Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans. Model. Comput. Simul. (TOMACS, 1998
    704
  70. M Snir, S Otto, S Huss-Lederman, D Walker, J Dongarra
    MPI - The Complete Reference 1998
    691
  71. Allan Borodin, Ran El-Yaniv
    Online Computation and Competitive Analysis 1998
    683
  72. L Lamport
    The part-time parliament. ACM Transactions on Computer Systems, 1998
    674
  73. Jean-Yves Girard
    Light linear logic. Information and Computation, 1998
    665
  74. U Feige
    A Threshold of ln n for Approximating Set Cover. Journal of the ACM (JACM, 1998
    658
  75. Raghuram G Rajan, Luigi Zingales
    Financial Dependence and Growth. The American Economic Review, 1998
    656
  76. AWWA APHA, WEF
    Standard method for the examination of water and wastewater 20th ed, American Public Health Association, Washington DC, 1998
    652
  77. M I Jordan
    Learning in graphical models. 1998
    651
  78. B Alberts, D Bray, J Lewis, M Raff, K Roberts, J D Watson
    The Molecular Biology of the Cell 1998
    646
  79. R Durbin, S Eddy, A Krogh, G Mitchison
    Biological sequence analysis 1998
    645
  80. S Singh, M Woo, C S Raghavedra
    Power-Aware Routing in Mobile Ad-Hoc Networks. in Proceedings of ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM ’98, 1998
    627
  81. E L Lehmann, G Casella
    Theory of point estimation 1998
    624
  82. A Blake, M Isard
    Active contours 1998
    621
  83. P Ferguson
    Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing. RFC 2267, 1998
    610