Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. J Hennessy, D Patterson
    Computer Architecture: A Quantitative Approach 2003
    3593
  2. R Hartley, A Zisserman
    Multiple View Geometry in Computer Vision 2003
    2175
  3. Y Saad
    Iterative Methods for Sparse Linear Systems Second Edition, SIAM, 2003
    996
  4. William H Greene
    Econometric Analysis 2003
    939
  5. Dragovic Barham, Hand Fraser, Harris
    Xen and the art of virtualization. 2003
    922
  6. E M Rogers
    Diffusion of Innovations 2003
    753
  7. F J Och, Ney
    H.: A systematic comparison of various statistical alignment models. Computational Linguistics, 2003
    728
  8. R Fergus, P Perona, A Zisserman
    Object class recognition by unsupervised scale-invariant learning. In CVPR, 2003
    618
  9. Sanjay Ghemawat, Howard Gobioff, Shun-Tak Leung
    The Google File System. SOSP, 2003
    576
  10. D Gay, P Levis
    von Behren, R.: The NesC language: A holistic approach to networked embedded systems. In: Proc. of the ACM Conf. on Programming Language Design and Implementation, 2003
    556
  11. W Zhao, R Chellappa, P J Phillips, A Rosenfeld
    Face recognition: A literature survey. Mathematical Sciences in, 2003
    554
  12. R Elmasri, S B Navathe
    Fundamental of Database Systems 2003
    554
  13. T Hastie, R Tibshirani, J Friedman
    The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2003
    538
  14. S D Kamvar, M T Schlosser, H Garcia-molina
    The EigenTrust algorithm for reputation management in P2P networks. In Proc. of the Twelfth WWW Conference, 2003
    526
  15. D Forsyth, J Ponce
    Computer Vision: A Modern Approach 2003
    516
  16. J Sivic, A Zisserman
    Video Google: A text retrieval approach to object matching in videos. In Proc. ICCV, 2003
    490
  17. D De Couto, D Aguayo, J Bicket, R Morris
    A high-throughput path metric for multi-hop wireless routing. In MobiCom, 2003
    490
  18. A K Jain, P W Duin, J Mao
    Statistical Pattern Recognition: A Review. National Institute of Standards and Technology Interagency Report (NISTIR) 7030, 2003
    472
  19. Alec Woo, Terence Tong, David Culler
    Taming the underlying challenges of reliable multihop routing in sensor networks. In the First ACM Conference on Embedded Networked Sensor Systems (SenSys, 2003
    468
  20. Franz Baader, Diego Calvanese, Deborah McGuinness, Daniele Nardi, Peter Patel-Schneider
    The Description Logic Handbook: Theory, Implementation and Applications 2003
    463
  21. Andrei Sabelfeld, Andrew C Myers
    Language-based informationflow security. IEEE Journal on Selected Areas in Communications, 2003
    435
  22. I Stoica, R Morris, D Liben-Nowell, D R Karger, M F Kaashoek, F Dabek, H Balakrishnan
    Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking, 2003
    430
  23. R Dechter
    Constraint Processing 2003
    417
  24. H Chan, A Perrig, D Song
    Random key predistribution schemes for sensor networks. in Proc. 2003 IEEE Symposium on Security and Privacy, 2003
    409
  25. Charles Perkins, Elizabeth Royer, Samir Das
    Ad hoc on demand distance vector (AODV) routing IETF RFC, 2003
    403
  26. I Guyon, A Elisseeff
    An introduction to variable and feature selection,” The. Journal of Machine Learning Research, 2003
    402
  27. S Asmussen
    Applied Probability and Queues 2003
    397
  28. T Andrews, F Curbera, H Dholakia, Y Goland, J Klein, F Leymann, K Liu, D Roller, S Thatte, I Trickovic, S Weerawarana
    Business process execution language for web services, version 1.1 BEA Systems, IBM Corp., Microsoft Corp., SAP AG, Siebel Systems, 2003
    397
  29. Kevin Fall
    A Delay-Tolerant Network Architecture for Challenged Internets. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM, 2003
    391
  30. J Zhao, R Govindan
    Understanding packet delivery performance in dense wireless sensor networks. In ACM Conference on Embedded Networked Sensor Systems (Sensys, 2003
    384
  31. I Horrocks, P F Patel-Schneider, van Harmelen
    F.: From SHIQ and RDF to OWL: The making of a Web ontology language. J. Web Semant, 2003
    384
  32. P Koehn, F J Och, Marcu
    D.: Statistical phrase-based translation. In: Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology, 2003
    378
  33. D Klein, C D Manning
    Accurate Unlexicalized Parsing. Proceedings of the 41st Meeting of the Association for Computational Linguistics, 2003
    369
  34. S Madden, M Franklin, J Hellerstein, W Hong
    The design of an acquisitional query processor for sensor networks. In SIGMOD. ACM, 2003
    366
  35. P Eugster, P Felber, R Guerraoui, Kermarrec
    A.M.: The many faces of publish/subscribe. ACM Computing Surveys, 2003
    359
  36. Y Freund, R Iyer, R E Schapire, Y Singer
    An Efficient Boosting Algorithm for Combining Preferences. Journal of Machine Learning Research, 2003
    358
  37. L Zheng, D N C Tse
    Diversity and multiplexing: A fundamental tradeoff in multiple-antenna channels. IEEE Transactions on Information Theory, 2003
    354
  38. T Harris, K Fraser
    Language support for lightweight transactions. In OOPSLA, 2003
    341
  39. F BAADER, D CALVANESE, D MCGUINNESS, D NARDI, P F PATELSCHNEIDER, Eds
    The Description Logic Handbook 2003
    341
  40. Y C Hu, A Perrig, D B Johnson
    Packet leashes: A defense against wormhole attacks in wireless ad hod networks. in Proc. of 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM, 2003
    331
  41. D Comaniciu, V Ramesh, P Meer
    Kernel-based object tracking. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003
    328
  42. B N Grosof, I Horrocks, R Volz, S Decker
    Description logic programs: Combining logic programs with description logic. In Proceedings of the 12th International Conference on the World Wide Web, 2003
    327
  43. M Fox, D Long
    PDDL2.1: An extension to PDDL for expressing temporal planning domains. Journal of Artificial Intelligence Research (JAIR, 2003
    327
  44. FOR CONFERENCES Chandrasekaran, S Cooper, O Deshpande, A Franklin, M J, J M Hellerstein, W Hong, S Krishnamurthy, S Madden, V Raman, F Reiss, M Shah
    TelegraphCQ: Continuous dataflow processing for an uncertain world. The First Biennial Conference on Innovative Data Systems Research (CIDR), Asilomar, 2003
    325
  45. K P Gummadi, R J Dunn, S Saroiu, S D Gribble, H M Levy, J Zahorjan
    Measurement, Modeling and Analysis of a Peer-toPeer File Sharing Workload. Proc. ACM Symp. Operating Systems Principles, 2003
    321
  46. B P Gerkey, R T Vaughan, A Howard
    The Player/Stage Project: Tools for Multi-Robot and Distributed Sensor Systems. In Proc. of the Intl. Conf. on Advanced Robotics, 2003
    319
  47. F Sha, F Pereira
    Shallow parsing with conditional random fields. Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology, 2003
    319
  48. X Zhu, Z Ghahramani, J Lafferty
    Semi-supervised learning using gaussian fields and harmonic functions. In ICML, 2003
    316
  49. D Daley, D Vere-Jones
    An Introduction to the Theory of Point Processes 2003
    314
  50. J von
    zur Gathen and 2003
    313
  51. N Eén, N Sörensson
    An extensible SAT-solver Conference on Theory and Applications of Satisfiability Testing, number 2919 in Lecture Notes in Computer Science, 2003
    303
  52. Y Chawathe, S Ratnasamy, L Breslau, N Lanham, S Shenker
    Making Gnutella-like P2P Systems Scalable. In SIGCOMM ’03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, 2003
    294
  53. D Kostic, A Rodriguez, J Albrecht
    Bullet: High bandwidth data dissemination using an overlay mesh. 2003
    293
  54. J Yoon, M Liu, B Noble
    Random waypoint considered harmful. in Proc. IEEE INFOCOM 2003, 2003
    290
  55. L L Peterson, B S Davie
    Computer Networks: A Systems Approach 2003
    287
  56. V Venkatesh, M Morris, G B Davis, F D Davis
    User acceptance of information technology: Toward a unified view. MIS Quarterly, 2003
    283
  57. W Du, J Deng, Y S Han, P Varshney
    A pairwise key predistribution scheme for wireless sensor networks. in Proc. 10th ACM Conf. Comp. Commun. Security, 2003
    283
  58. K Jain, J Padhye, V N Padmanabhan, L Qiu
    Impact of interference on multi-hop wireless network performance. In MobiCom, 2003
    270
  59. Y Yao, J Gehrke
    Query processing for sensor networks. in Proceedings of CIDR Conference, 2003
    269
  60. Maurice Herlihy, Victor Luchangco, Mark Moir, William N Scherer
    Software transactional memory for dynamic-sized data structures. In Proceedings of the twenty-second annual symposium on Principles of distributed computing, PODC ’03, 2003
    268
  61. T WIEGAND, G J SULLIVAN, BJ ONTEGAARD, G, A LUTHRA
    Overview of the H.264-AVC video coding standard IEEE Trans. Circ. Syst. Video Tech, 2003
    268
  62. T van Dam, Langendoen
    K.: An adaptive energy-efficient MAC protocol for wireless sensor networks. In: Proc. of the 1 st Conf. on Networked Sensor Systems (SENSYS, 2003
    260
  63. T He, C Huang, B Blum, J Stankovic, T Abdelzaher
    Range-free localization schemes in large scale sensor networks. In Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking (MobiCom'03, 2003
    258
  64. B Yang, H Garcia-Molina
    Designing a Super-Peer Network. Proc. 19th Int’l Conf. Data Eng. (ICDE ’03, 2003
    257
  65. C W Gardiner
    Handbook of Stochastic Methods 2003
    255
  66. M Jain, C Dovrolis
    End-to-End Available Bandwidth: Measurement Methodology, Dynamics, and Relation with TCP Throughput. IEEE/ACM Transactions on Networking, 2003
    255
  67. H A David, H N Nagaraja
    Order Statistics 2003
    253
  68. D Moore, C Shannon, G Voelker, S Savage
    Internet Quarantine: Requirements for Containing Self-Propagating Code. In Proceedings of the IEEE Infocom Conference, 2003
    252
  69. K Skadron, M R Stan, W Huang, S Velusamy, K Sankaranarayanan, D Tarjan
    Temperature-aware microarchitecture. in Proceedings of the 30th Annual ACM/IEEE International Symposium on Computer Architecture, 2003
    249
  70. D Batory, J N Sarvela, A Rauschmayer
    Scaling step-wise refinement. In ICSE ’03: Proceedings of the 25th International Conference on Software Engineering, 2003
    248
  71. M Ghallab, D Nau, P Traverso
    Automated Planning: Theory and Practice 2003
    245
  72. T Garfinkel, B Pfaff, J Chow, M Rosenblum, D Boneh
    Terra: a virtual machine-based platform for trusted computing. In SOSP ’03: Proceedings of the nineteenth ACM symposium on Operating systems principles, 2003
    245
  73. V Blanz, T Vetter
    Face recognition based on fitting a 3D morphable model. IEEE Trans. Pattern Anal. Mach. Intell, 2003
    245
  74. V KWATRA, A SCHÖDL, I ESSA, G TURK, A BOBICK
    Graphcut Textures: Image and Video Synthesis Using Graph Cuts. Proc. ACM Siggraph, 2003
    242
  75. R Ramakrishnan, J Gehrke
    Database management systems 2003
    239
  76. D Liben-Nowell, J Kleinberg
    The link prediction problem for social networks. In CIKM, 2003
    238
  77. R Bhagwan, S Savage, G M Voelker
    Understanding availability. In The 2nd International Workshop on Peer-to-peer systems, 2003
    237
  78. A Rao, S Ratnasamy, C Papadimitriou, S Shenker, I Stoica
    Geographic routing without location information. In MobiCom ’03: Proceedings of the 9th annual international conference on Mobile computing and networking, 2003
    237