Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. R Horn, C Johnson
    Matrix analysis 1999
    5089
  2. S Haykin
    Neural Networks: A Comprehensive Foundation Upper Saddle River, NJ, 1999
    4270
  3. R Baeza-Yates, B Ribeiro-Neto
    Modern Information Retrieval. 1999
    2652
  4. C E Perkins, E M Royer
    Ad-hoc ondemand distance vector routing. In Proc. of the Mobile Computing Systems and Applications, 1999
    2480
  5. R Albert, Barabási AL
    Emerging of Scaling in Random Networks. Science, 1999
    2426
  6. G BOOCH, J RUMBAUGH, I JACOBSON
    The Unified Modeling Language User Guide 1999
    2279
  7. J Nocedal, S J Wright
    Numerical Optimization 1999
    2178
  8. İ E Telatar
    Capacity of multi-antenna Gaussian channels. European Trans. Telecommun, 1999
    2042
  9. D G Lowe
    Object recognition from local scale-invariant features. In Proc. Int. Conf. on Computer Vision ICCV’99, 1999
    1749
  10. J D Jackson
    Classical Electrodynamics 1999
    1603
  11. T Joachims
    Making large-Scale SVM Learning Practical Advances in Kernel Methods - Support Vector Learning, 1999
    1554
  12. Robert E Hall, Charles I Jones
    Why Do Some Countries Produce So Much More Output per Worker than Others?” Quarterly. Journal of Economics, 1999
    1498
  13. Kent Beck
    Extreme Programming Explained: Embrace Change. AddisonWesley Professional, ISBN 0-201-61641Brooks The Mythical Man-Month: Essays on Software Engineering, 20th Anniversary Edition, 1999
    1421
  14. A K Jain, M N Murty, P J Flynn
    Data Clustering: a Review. ACM Computing Surveys, 1999
    1410
  15. T R Golub, D K Slonim, P Tamayo, C Huard, M Gassenbeek, J P Mesirov, H Coller, M L Loh, J R Downing, M A Caligiuri, D D Bloomfield, E S Lander
    Molecular classification of cancer: Class discovery and class prediction$17.00 (c) 2002 IEEE 8 by gene expression monitoring. Science, 1999
    1349
  16. M Faloutsos, P Faloutsos, C Faloutsos
    On Power–Law Relationship of the Internet Topology. Proc. of ACM SIGCOMM, 1999
    1336
  17. R Clarida, J Gali, M Gertler
    The science of monetary policy: A new keynesian perspective. Journal of Economic Literature, 1999
    1288
  18. T Lindholm, F Yellin
    The Java Virtual Machine Specification 1999
    1145
  19. L Wolsey, G Nehmauser
    Integer and Combinatorial Optimization 1999
    1140
  20. William Gropp, Ewing Lusk, Anthony Skjellum
    Using MPI: Portable Parallel Programming with the Message-Passing Interface 1999
    1131
  21. V Tarokh, H Jafarkhani, A R Calderbank
    Space-time block codes from orthogonal designs. IEEE Transactions on Information Theory, 1999
    1115
  22. Eric Bonabeau, Marco Dorigo, Guy Theraulaz
    Swarm Intelligence: From Natural to Artificial Systems 1999
    1079
  23. E M Royer, C-K Toh
    A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers. Commun, 1999
    1050
  24. B Bernanke, M Gertler, S Gilchrist
    The Financial Accelerator in a Quantitative Business Cycle Framework. in Taylor, J and M. Woodford (eds), Handbook of Macroeconomics, 1999
    1003
  25. J Y Campbell, J H Cochrane
    By Force of Habit: A Consumption-Based Explanation of Aggregate. Stock Market Behavior, Journal of Political Economy, 1999
    1003
  26. C Stauffer, W E L
    Grimson: Adaptive background mixture models for real-time tracking Computer Vision and Pattern Recognition, Volume, 1999
    1000
  27. P Checkland
    Systems thinking, systems practice 1999
    987
  28. D Estrin, R Govindan, J Heidemann, S Kumar
    Next century challenges: Scalable coordination in sensor networks. in Proc. of ACM Mobicom, 1999
    976
  29. J Rumbaugh, I Jacobson, G Booch
    The Unified Modeling Language Reference Manual 1999
    962
  30. A Sen
    Freedom as development 1999
    960
  31. S Ni, Y Tseng, Y Chen, J Sheu
    The broadcast storm problem in a mobile ad hoc network. in Proceedings of ACM MOBICOM'99, 1999
    947
  32. R Morris, E Kohler, J Jannotti, M F Kaashoek
    The click modular router. In Proceedings of the 17th ACM Symposium on Operating System Principles (SOSP, 1999
    940
  33. R G Downey, M R Fellows
    Parameterized Complexity. 1999
    923
  34. M Roesch
    Snort: Lightweight intrusion detection for networks. In Proceedings of the 1999 USENIX LISA Systems Administration Conference. (available on http://www.snort.org, 1999
    904
  35. L Breslau, P Cao, L Fan, G Phillips, S Shenker
    Web Caching and Zipf-like Distributions: Evidence and Implications. In Proceedings of Infocom’99, 1999
    897
  36. R Stanley
    Enumerative Combinatorics 1999
    890
  37. Hofmann
    Probabilistic latent semantic indexing. in SIGIR ‘99: Proceedings of the 22nd annual international ACM SIGIR conference on research and development in information retrieval, pp 50-57, 1999
    873
  38. L Zhou
    Securing ad hoc networks. IEEE Newark Magazine, 1999
    869
  39. M Jordan, Z Ghahramani, T Jaakkola, L Saul
    An introduction to variational methods for graphical models. Machine learning, 1999
    868
  40. J F Sturm
    Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones. Optimization Methods and Software 11/12, 1999
    842
  41. V Blanz, T Vetter
    A morphable model for the synthesis of 3D faces. In Proc. of SIGGRAPH99, 1999
    828
  42. D P Bertsekas
    Nonlinear Programming Belmont MA: Athena Scientific, 1999
    822
  43. A Efros, T Leung
    Texture synthesis by non-parametric sampling. In ICCV, 1999
    818
  44. P Kocher, J Jaffe, B Jun
    Differential Power Analysis. In Proceedings of Crypto’99, 1999
    803
  45. R Nelsen
    An Introduction to Copulas 1999
    801
  46. S Floyd, K Fall
    Promoting the use of end-to-end congestion control in the Internet. IEEE/ACM Trans. on Networking, 1999
    801
  47. U Alon, N Barkai, D A Notterman, S Ybarra K Gish, D Mack, A J Levine
    Broad patterns of gene expression revealed by clustering analysis of tumor and normal colon tissues probed by oligonucleotide array Proc. Natl. Acad. Sci. USA, 1999
    795
  48. S K CARD, J MACKINLAY, B SHNEIDERMAN
    Readings in Information Visualization: Using Vision to Think 1999
    773
  49. A Biere, A Cimatti, E Clarke, Y Zhu
    Symbolic model checking without BDDs. In Tools and Algorithms for the Construction and Analysis of Systems, LNCS, 1999
    770
  50. Vern Paxson
    End-to-end internet packet dynamics. IEEE/ACM Trans. Netw, 1999
    760
  51. J A Sethian, Level
    Set Methods and Fast Marching Methods 1999
    760
  52. Johan Hastad, Russell Impagliazzo, Leonid A Levin, Michael Luby
    A pseudorandom generator from any one-way function. SIAM J. Comput, 1999
    754
  53. R Fielding, J Gettys, J Mogul, H Frystyk, L Masinter, P Leach, T BernersLee
    Hypertext transfer protocol – HTTP/1.1. 1999
    751
  54. R E Schapire, Y Singer
    Improved Boosting Algorithms Using Confidence-rated Predictions. Machine Learning, 1999
    733
  55. E Fehr, K M Schmidt
    A Theory of Fairness Competition, and Cooperation”, Quarterly Journal of Economics, 1999
    731
  56. T Joachims
    Transductive Inference for Text Classification using Support Vector Machines. International Conference on Machine Learning (ICML, 1999
    728
  57. Lawrence Barsalou
    Perceptual symbol systems. Behavioural and Brain Sciences, 1999
    710
  58. Y Yang, X Liu
    A re-examination of text categorization methods. In Proceedings of SIGIR-99, 22nd ACM International Conference on Research and Development in Information Retrieval, 1999
    710
  59. P Bose, P Morin, I Stojmenović, J Urrutia
    Routing with Guaranteed Delivery in Ad Hoc Wireless Networks. In Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DialM '99, 1999
    701
  60. P Paillier
    Public-Key cryptosystems based on composite degree residuosity classes. Proc. of the EUROCRYPT’99. LNCS 1592, 1999
    700
  61. I Jacobson, G Booch, J Rumbaugh
    The Unified Software Development Process 1999
    696
  62. J Gali, M Gertler
    Inflation dynamics: a structural econometric analysis Journal of Monetary Economics, 1999
    693
  63. R Wolski, N Spring, J Hayes
    The Network Weather Service: a distributed resource performance forecasting service for metacomputing. Future Generation Computing Systems, Metacomputing Issue, 1999
    691
  64. E Koutsoupias, Papadimitriou
    C.,“Worst-case Equilibria. Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science, 1999
    675
  65. R G Cowell, A P Dawid, S L Lauritzen, D J Spiegelhalter
    Probabilistic networks and expert systems 1999
    670
  66. La Porta, R Lopez-de-Silanes, F Shleifer, A, R W Vishny
    Corporate ownership around the world. Journal of Finance, 1999
    659
  67. A Isidori
    Nonlinear Control systems 1999
    658
  68. Leon Sterling, Ehud Shapiro
    The Art of Prolog 1999
    642
  69. Marianne Baxter, Robert King
    Measuring Business Cycles: Approximate Band-Pass filters for economic time series The Review of Economics and Statistics, 1999
    641
  70. J Rawls
    A Theory of 1999
    629
  71. D Gavrila
    The Visual Analysis of Human Movement: A Survey. Computer Vision and Image Understanding, 1999
    626
  72. Y Freund, R Schapire
    A short introduction to boosting. J. Japan. Soc. for Artif. Intel, 1999
    623
  73. J Frankel, D Romer
    Does Trade cause Growth. American Economic Review, 1999
    621