Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. J M Kleinberg
    Authoritative sources in a hyperlinked environment. Journal of the ACM, 1999
    2152
  2. E M Clarke, O Grumberg, D A Peled
    Model Checking. 1999
    1975
  3. R Baeza-Yates, B Ribeiro-Neto
    Modern Information Retrieval. 1999
    1867
  4. G Booch, J Rumbaugh, I Jacobson
    The unified modeling language user guide 1999
    1804
  5. C E Perkins, E M Royer
    Ad Hoc On-Demand Distance Vector Routing. Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, Pages, 1999
    1662
  6. A L Barabasi, R Albert
    Emergence of scaling in random networks Science Magazine, 1999
    1250
  7. J Nocedal, S J Wright
    Numerical optimization 1999
    1146
  8. T Joachims
    Making large-Scale SVM Learning Practical Advances in Kernel Methods - Support Vector Learning. MIT-Press, 1999
    1051
  9. M Faloutsos, P Faloutsos, C Faloutsos
    On Power-Law Relationships of the Internet Topology. Computer Comm. Rev, 1999
    979
  10. Scott Shaobing Chen, David L Donoho, Michael A Saunders
    Atomic decomposition by basis pursuit. SIAM Journal on Scientific Computing, 1999
    971
  11. David G Lowe
    Object recognition from local scale-invariant features. In Proc. of the International Conference on Computer Vision ICCV, Corfu, 1999
    958
  12. A K Jain, M N Murty, P J Flynn
    Data clustering: A review. ACM Computing Surveys, 1999
    865
  13. T R Golub, D K Slonim, P Tamayo, C Huard, M Gaasenbeek, J P Mesirov, H Coller, M L Loh, J R Downing, M A Caligiuri, C D Bloomfield, E S Lander
    Molecular classification of cancer: Class discovery and class prediction by gene expression monitoring. Science, 1999
    779
  14. E Bonabeau, M Dorigo, G Theraulaz
    Swarm Intelligence: From Natural to Artificial Systems 1999
    751
  15. E M Royer, C-K Toh
    A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Personal Communications, 1999
    730
  16. D Estrin, R Govindan, J Heidemann
    Kumar S.: Next Century Challenges: Scalable Coordination in Sensor Networks. In: Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom99, 1999
    725
  17. Martín Abadi, Andrew D Gordon
    A calculus for cryptographic protocols: the spi calculus. in [AG97]. Martín Abadi and, 1999
    695
  18. L Breslau, P Cao, L Fan, G Phillips, S Shenker
    Web caching and zipf-like distributions: Evidence and implications. In INFOCOM, 1999
    694
  19. Ora Lassila, Ralph Swick
    Resource Description Framework (RDF) Model and Syntax Specification. W3C Recommendation, 1999
    679
  20. S Floyd, K Fall
    Promoting the use of end-to-end congestion control in the internet. IEEE/ACM Trans. Netw, 1999
    669
  21. Sze-Yao Ni, Yu-Chee Tseng, Yuh-Shyan Chen, Jang-Ping Sheu
    The broadcast storm problem in a mobile ad hoc network In MobiCom ’99: Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, 1999
    662
  22. R Downey, M Fellows
    Parameterized Complexity. 1999
    652
  23. M Jordan, Z Ghahramani, T Jaakkola, L Saul
    An introduction to variational methods for graphical models. Machine Learning, 1999
    630
  24. C Stauffer, W E L Grimson
    Adaptive background mixture models for real-time tracking Proc. of IEEE Conference on Computer Vision and Pattern Recognition, 1999
    610
  25. V Tarokh, H Jafarkhani, A R Calderbank
    Space-Time Block Codes from Orthogonal Designs. IEEE Transactions on Information Theory, 1999
    608
  26. L Zhou, Z Haas
    Securing Ad Hoc Networks. IEEE Networks, 1999
    599
  27. S Chen, J Goodman
    An empirical study of smoothing techniques for language modeling. Computer Speech and Language, 1999
    592
  28. A Biere, A Cimatti, E M Clarke, Y Zhu
    Symbolic model checking without BDDs. 5th International Conference on Tools and Algorithms for Construction and Analysis of Systems, volume 1579 of LNCS, 1999
    580
  29. J H˚astad, R Impagliazzo, L A Levin, Luby
    M.: A pseudorandom generator from any one-way function. SIAM J. Comput, 1999
    573
  30. G J Pottie, W J Kaiser
    Wireless integrated network sensors Communications of the ACM, 1999
    564
  31. R Clarida, J Galí, M Gertler
    The Science of Monetary Policy: A New Keynesian Perspective. Journal of Economic Perspectives, 1999
    562
  32. V BLANZ, VETTER
    T.: A morphable model for the synthesis of 3D faces. In Proc. SIGGRAPH, 1999
    561
  33. A A Efros, T K Leung
    Texture synthesis by non-parametric sampling. in [ICCV ’99: Proceedings of the International Conference on Computer Vision-Volume 2], 1033, IEEE Computer Society, 1999
    556
  34. R Fielding, J Gettys, J Mogul, H Frystyk, L Masinter, P Leach, T Berners-Lee
    Hypertext Transfer Protocol – HTTP/1.1. KBC05] [KM00] Tadayoshi Kohno, Andre Broido, and K.C. Claffy. Remote Physical Device Fingerprinting. IEEE Transcations on Dependable and Secure Computing, 2(2), April-June, 1999
    538
  35. S K Card, J D Mackinlay, B Shneiderman
    Readings in Information Visualization: Using Vision to Think 1999
    538
  36. I Jacobson, G Booch, J Rumbaugh
    The Unified Software Development Process 1999
    534
  37. Y Yang, X Liu
    A re-examination of text categorization methods. In Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR, 1999
    523
  38. Dimitri P Bertsekas
    Nonlinear Programming. Athena Scientific 1999
    517
  39. T Hofmann
    Probabilistic latent semantic indexing. In SIGIR, 1999
    503
  40. R G Cowell, A P Dawid, S L Lauritzen, D J Spiegelhalter
    Probabilistic Networks and Expert Systems 1999
    490
  41. U Alon, N Barkai, D A Notterman, K Gish, S Ybarra, D Mack, A J Levine
    Broad Patterns of Gene Expression Revealed by Clustering Analysis of Tumor and Normal Colon Tissues Probed by Oligonucleotide Arrays Proc. Nat’l Academy of Sciences USA, 1999
    481
  42. D P Bertsekas
    Nonlinear Programming Athena Scientific. ISBN, 1999
    481
  43. M Castro, B Liskov
    Practical Byzantine fault tolerance. In Proceedings of the Third Symposium on Operating Systems Design and Implementation, 1999
    467
  44. S Abiteboul, P Buneman, D Suciu
    Data on the Web: From Relations to Semistructured Data and XML 1999
    467
  45. P C Kocher, J Jaffe, Jun
    B.: Differential power analysis. In: CRYPTO, 1999
    462
  46. E Koutsoupias, C Papadimitriou
    Worst-case equilibria. In Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science, 1999
    458
  47. A Igarashi, B Pierce, P Wadler
    Featherweight Java: A minimal core calculus for Java and GJ. In Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA, 1999
    458
  48. Charles E Perkins C E Perkin, Elizabeth M Royer
    Ad hoc on-demand distance vector (AODV) routing. Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, 1999
    457
  49. F Nielson, H R Nielson, C Hankin
    Principles of Program Analysis. 1999
    456
  50. Shmuel Sagiv, Thomas W Reps, Reinhard Wilhelm
    Parametric shape analysis via 3-valued logic. In POPL, 1999
    448
  51. D M Gavrila
    The visual analysis of human movement: a survey,” Comput. Vis. Image Underst, 1999
    445
  52. J Campbell, J Cochrane
    By force of habit: A consumption-based explanation of aggregate stock market behavior The Journal of Political Economy, 1999
    436
  53. A K Dey, G D Abowd
    Towards a Better Understanding of Context and Context-Awareness. Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing, 1999
    435
  54. D J Watts
    Small world. The dynamics of networks between order and randomness Princeton Studies in Complexity, 1999
    430
  55. V Rodoplu, T H Meng
    Minimum energy mobile wireless networks. IEEE Journal of Selected Areas in Communications, 1999
    425
  56. H-D Ebbinghaus, J Flum
    Finite Model Theory 1999
    419
  57. M T Özsu, P Valduriez
    Principles of Distributed Database Systems. 1999
    419
  58. Y Freund, R Schapire, N Abe
    A Short Introduction to Boosting. Journal of Japanese Society for Artificial Intelligence, 1999
    415
  59. W Adjie-Winoto, E Schwartz, H Balakrishnan, J Lilley
    The design and implementation of an intentional naming system. In 17th ACM Symposium on Operating Systems Principles (SOSP), Kiawah Island, SC, 1999
    415
  60. P Paillier
    Public-key cryptosystems based on composite residuosity classes. Proceedings of EUROCRYPT 1999, LNCS 1592, 1999
    410
  61. Y Yang
    An Evaluation of Statistical Approaches to Text Categorization. Information Retrieval, 1999
    408
  62. S H Low, D E Lapsley
    Optimization flow control, I: Basic algorithm and convergence. IEEE/ACM Trans. Networking, 1999
    406
  63. J Kahn, R Katz, K Pister
    Next Century Challenges: Mobile Networking for Smart Dust. In Proceeding of ACM International Conference on Mobile Computing and Networking(MOBICOM’99, 1999
    403
  64. F Stajano, R Anderson
    The resurrecting duckling: Security issues for adhoc wireless networks. In 7th International Workshop on Security Protocols, 1999
    402
  65. S Chakrabarti, M van den Berg, B Dom
    Focused crawling: a new approach to topic-specific web resource discovery. Comput. Netw, 1999
    398
  66. W Heinzelman, J Kulik, H Balakrishnan
    Adaptive protocols for information dissemination in wireless sensor networks. in Proceedings of Mobicom ’99, 1999
    395
  67. K Nichols, V Jacobson, L Zhang
    A two-bit differentiated services architecture for the Internet. IETF RFC, 1999
    390
  68. G Banga, P Druschel, J C Mogul
    Resource containers: A new facility for resource management in server systems. In Proc. of OSDI, 1999
    385
  69. B Bernanke, M Gertler, S Gilchrist
    The financial accelerator in a quantitative business cycle framework. in J Taylor and M Woodford (eds), Handbook of Macroeconomics, Elsevier, 1999
    372
  70. Anind K Dey, Daniel Salber, Gregory D Abowd
    The context toolkit: aiding the development of context-enabled applications. In Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit, CHI ’99, 1999
    371
  71. K K Ramakrishnan, S Floyd
    A proposal to add Explicit Congestion Notification (ECN. 1999
    367
  72. A C Myers
    JFlow: Practical mostly-static information flow control. In Principles of Programming Languages (POPL, 1999
    366
  73. R E Kessler
    The alpha 21264 microprocessor IEEE Micro, 1999
    365
  74. G Holland, N Vaidya
    Analysis of TCP performance over mobile ad hoc networks. In Proc. of ACM MobiCom, 1999
    364
  75. J Herlocker, J Konstan, A Brochers, J Riedl
    An Algorithm Framework for Performing Collaborative Filtering In Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR, 1999
    363
  76. Peri Tarr, Harold Ossher, Stanley M Sutton, William Harrison
    N degrees of separation: Multi-dimensional separation of concerns. In Proceedings of the International Conference on Software Engineering, 1999
    359
  77. S Floyd, T Henderson
    The newreno modification to tcp’s fast recovery algorithm. in http://www.ietf.org/rfc/rfc2582.txt, 1999
    358
  78. J Shanmugasundaram, K Tufte, C Zhang, G He, D J DeWitt, J F Naughton
    Relational Databases for Querying XML Documents: Limitations and Opportunities. In The VLDB Journal, 1999
    357