Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. S Boyd, L Vandenberghe
    Convex Optimization 2004
    1867
  2. G D Plotkin
    A structural approach to operational semantics. J. Log. Algebr. Program, 2004
    1168
  3. M C Golumbic
    Algorithmic Graph Theory and Perfect Graphs. Second edition Annals of Discrete Mathematics 57, Elsevier, 2004
    967
  4. E W Dijkstra
    A note on two problems in connexion with graphs. Numerische Mathematik, 2004
    963
  5. A Gelman, J Carlin, H Stern, D Rubin
    Bayesian data analysis. 2004
    838
  6. D Johnson, C Perkins, J Arkko
    Mobility Support in IPv6,” IETF RFC 3775, 2004
    792
  7. J Dean, S Ghemawat
    MapReduce: Simplified data processing on large clusters. In OSDI ’04, 2004
    781
  8. K Mikolajezyk, “Scale C Schmid
    and affine invariant interest point detectors. International Journal of Computer Vision, 2004
    630
  9. P VIOLA, M J JONES
    Robust real-time face detection. Int. J. Comput. Vision, 2004
    559
  10. C Robert, G Casella
    Monte Carlo Statistical Methods. 2004
    548
  11. Brian Babcock, Shivnath Babu, Mayur Datar, Rajeev Motwani, Jennifer Widom
    Models and issues in data stream systems. In Proceedings of 21st ACM Symposium on Principles of Database Systems (PODS, 2004
    511
  12. N Cristianini, J Shawe-Taylor
    Kernel methods for pattern analysis 2004
    490
  13. R Dingledine, N Mathewson, P Syverson
    Tor: The second-generation onion router. In USENIX Security, 2004
    480
  14. C Zhai, J Lafferty
    A study of smoothing methods for language models applied to 197 information retrieval. ACM Transactions on Information Systems, 2004
    459
  15. J Polastre, J Hill, D Culler
    Versatile low power media access for wireless sensor networks In The Second ACM Conference on Embedded Networked Sensor Systems (SenSys, 2004
    457
  16. E Clarke, A Gupta, O Strichman
    SAT-based counterexample-guided abstraction refinement. IEEE Transactions on Computer Aided Design, 2004
    456
  17. J N Laneman, D N C Tse
    G.W.Wornell, “Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior. IEEE Transactions on Information Theory, 2004
    450
  18. I Sommerville
    Software Engineering 2004
    446
  19. Yuri Boykov, Vladimir Kolmogorov
    An experimental comparison of min-cut/max-flow algorithms for energy minimization in vision. IEEE transactions on Pattern Analysis and Machine Intelligence, 2004
    428
  20. M Castro, P Drushel, A Kermarec, A Rowstrom
    Scribe: A Large-scale and Decentralized Application-level Multicast Infrastructure. IEEE Journal on Selected Areas in Communications, 2004
    426
  21. J Y A Wang, E H Adelson
    Representing moving images with layers. IEEE Transactions on Image Processing,vol, 2004
    394
  22. Mike Barnett, K Rustan M Leino, Wolfram Schulte
    The spec# programming system: An overview. In, 2004
    366
  23. F Dabek, R Cox, F Kaashoek, R Morris
    Vivaldi: A decentralized network coordinate system. In Proc. ACM SIGCOMM, 2004
    355
  24. J R Anderson, D Bothell, M D Byrne, S Douglass, C Lebiere, Y Qin
    An integrated theory of the mind. Psychological Review, 2004
    350
  25. C Rother, V Kolmogorov, A Blake
    GrabCut": interactive foreground extraction using iterated graph cuts. Proc. Siggraph, 2004
    339
  26. T L Griffiths, M Steyvers
    Finding scientific topics Proc. of the National Academy of Sciences of the United States of America, 101(Suppl 1):5228–5235, 2004
    327
  27. G Csurka, C Bray, C Dance, L Fan
    Visual categorization with bags of keypoints. In ECCV Workshop on Stat. Learn. in, 2004
    322
  28. K Krippendorff
    Content Analysis: An Introduction to Its Methodology Sage, Thousand Oaks, CA, 2004
    322
  29. D Aguayo, J Bicket, S Biswas, G Judd, R Morris
    Linklevel measurements from an 802.11b mesh network. in Proc. ACM SIGCOMM, 2004
    317
  30. Luis von Ahn, Laura Dabbish
    Labeling Images with a Computer Game. In Proceedings of the 22nd Conference on Human factors in Computing Systems (CHI 04, 2004
    310
  31. S Jain, K Fall, R Patra
    Routing in a delay tolerant network in Proceedings of ACM SIGCOMM, 2004
    301
  32. CA Avizienis, J-C Laprie, B Randell, C Landwehr
    Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing, 2004
    294
  33. B Taskar, C Guestrin, D Koller
    Max-margin Markov networks. In, 2004
    293
  34. A J Smola, B Schlkopf
    A tutorial on support vector regression. Statistics and Computing, 2004
    288
  35. I Horrocks, P F Patel-Schneider, H Boley, S Tabet, B Grosof, M Dean
    SWRL: A semantic web rule language combining OWL and RuleML 2004
    288
  36. J Tropp
    Greed is good: Algorithmic results for sparse approximation. IEEE Trans. Inform. Theory, 2004
    285
  37. L Fei-Fei, R Fergus, P Perona
    Learning generative visual models from few training examples. Workshop on Generative-Model Based Vision, IEEE Proc. CVPR, 2004
    282
  38. J W Hui, D Culler
    The dynamic behavior of a data dissemination protocol for network programming at scale. In Proceedings of the Second International Conference on Embedded Networked Sensor Systems (SenSys, 2004
    281
  39. W Ye, J Heidemann, D Estrin
    Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM Trans. Netw, 2004
    277
  40. World Bank
    World development indicators 2004
    273
  41. S Sen, J Wang
    Analyzing peer-to-peer traffic across large networks. IEEE/ACM Transactions on Networking (ToN, 2004
    265
  42. H-A Kim, B Karp
    Autograph: Toward Automated, Distributed Worm Signature Detection. In Proceedings of the USENIX Security Conference, 2004
    264
  43. Z WANG, A C BOVIK, H R SHEIKH, E P SIMONCELLI
    Image quality assessment: From error visibility to structural similarity. IEEE transactions on image processing, 2004
    261
  44. W Zhao, M Ammar, E Zegura
    A message ferrying approach for data delivery in sparse mobile ad hoc networks. In Proceedings of MobiHoc’04, 2004
    261
  45. P Felzenszwalb, D Huttenlocher
    Efficient graph-based image segmentation. International Journal of Computer Vision, 2004
    254
  46. Darrel R Hankerson, Alfred J Menezes, Scott A Vanstone
    Guide to Elliptic Curve Cryptography. 2004
    251
  47. Amol Deshpande, Carlos Guestrin, Samuel Madden, Joseph M Hellerstein, Wei Hong
    Model-driven Data Acquisition in Sensor Networks. In Proceedings International Conference on Very Large Data Bases (VLDB, 2004
    250
  48. S Singh, C Estan, G Varghese, S Savage
    Automated Worm Fingerprinting. In Proceedings of Symposium on Operating Systems Design and Implementation (OSDI, 2004
    242
  49. F J Och, H Ney
    The alignment template approach to statistical machine translation Computational Linguistics, 2004
    238
  50. C KARLOF, N SASTRY, D WAGNER
    TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys, 2004
    236
  51. M Hu, B Liu
    Mining and summarizing customer reviews In Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, 2004
    234
  52. M J Freedman, E Freuenthal, D Mazières
    Democratizing Content Publication with Coral. NSDI. 2004
    233
  53. R Szewczyk, A Mainwaring, J Polastre, J Anderson, D Culler
    An analysis of a large scale habitat monitoring application. In SenSys ’04: Proceedings of the 2nd international conference on Embedded networked sensor systems, 2004
    222
  54. A P Gasch, P T Spellman, C M Kao, O Carmel-Harel, M B Eisen, G Storz, D Botstein, P O Brown
    Genomic expression programs in the response of yeast cells to environmental changes. Mol Biol Cell, 2004
    221
  55. T ZIMMERMANN, P WEISSGERBER, S DIEHL, A ZELLER
    Mining version histories to guide software changes. In Proceedings of the ICSE, 2004
    221
  56. C Jin, D X Wei, S H Low, “FAST
    TCP: motivation, architecture, algorithms, Performance. In Proceedings of IEEE Infocom, 2004
    217
  57. D Moore, J Leonard, D Rus, S Teller
    Robust Distributed Network Localization with Noisy Range Measurements. in Proceedings of ACM SenSys, 2004
    213
  58. R Olfati-Saber, R M Murray
    Consensus problems in networks of agents with switching topology and time-delays IEEE Transactions on Automatic Control, 2004
    213
  59. D Hiemstra, S E Robertson, H Zaragoza
    Parsimonious language models for information retrieval. In Proc. 27th Ann. Int. ACM SIGIR Conf. on Research and Development in Information Retrieval, 2004
    210
  60. Z Gyöngyi, H Garcia-Molina, J Pedersen
    Combating Web Spam with TrustRank. In VLDB, 2004
    209
  61. K Salen, E Zimmerman
    Rules of play: Game design fundamentals 2004
    204
  62. R Canetti, O Goldreich, Halevi
    S.: The random oracle methodology, revisited. J. ACM, 2004
    203
  63. P Levis, N Patel, D Culler, S Shenker
    Trickle: a self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In NSDI’04: Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation, 2004
    201
  64. M Maroti, B Kusy, G Simon, A Ledeczi
    The flooding time synchronization protocol. in Proc. 2nd ACM Conf. Embedded Networked Sensor Syst, 2004
    199
  65. I Daubechies, M Defrise, C De Mol
    An iterative thresholding algorithm for linear inverse problems with a sparsity constraints Comm. Pure Appl. Math, 2004
    197
  66. Chris Lattner, Vikram Adve
    LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. In Proceedings of the 2004 International Symposium on Code Generation and Optimization (CGO’04, 2004
    196
  67. I Tsochantaridis, T Joachims, T Hofmann, Y Altun
    Support vector machine learning for interdependent and structured output spaces. 2004
    192
  68. D Boneh, X Boyen, H Shacham
    Short group signatures. In In proceedings of CRYPTO’04, volume 3152 of LNCS, 2004
    191
  69. R Kannan, S Vempala, A Vetta
    On clusterings: Good, bad and spectral. Journal of the ACM, 2004
    191
  70. John Whaley, Monica S Lam
    Cloning-based contextsensitive pointer alias analysis using binary decision diagrams. In PLDI ’04: Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation, 2004
    190
  71. D Nister
    An Eifficient Solution to the Five-Point Relative Pose Problem. Proc. of CVPR, 756–777, 2004
    190
  72. M Izal, G Urvoy-Keller, E W Biersack, P A Felber, A Al Hamra, L GarcésErice
    Dissecting BitTorrent: Five months in a torrent’s lifetime. In Passive and Active Measurements (PAM2004, 2004
    190
  73. P Felzenszwalb, D P Huttenlocher
    Efficient belief propagation for early vision. Int. Journal of Computer Vision, 2004
    190
  74. J Considine, F Li, G Kollios, J Byers
    Approximate aggregation techniques for sensor databases. in Proceedings of the 20th International Conference on Data Engineering, ser. ICDE ’04. IEEE Computer Society, 2004
    189
  75. J Jung, V Paxson, A W Berger, H Balakrishnan
    Fast portscan detection using sequential hypothesis testing. In In Proceedings of the IEEE Symposium on Security and Privacy, 2004
    187
  76. L Cardelli
    Type systems. The Computer Science and Engineering Handbook, chapter 97, 2004
    186
  77. I Matthews, S Baker
    Active appearance models revisited. International Journal of Computer Vision, 2004
    184
  78. T Henderson, D Kotz, I Abyzov
    The changing usage of a mature campus-wide wireless network. In Proceedings of ACM Mobicom, 2004
    183
  79. L-L Xie, P R Kumar
    A Network Information Theory for Wireless Communication: Scaling Laws and Optimal Operation. IEEE Trans. on Inform. Theory, 2004
    182
  80. C Barrett, S Berezin
    CVC Lite: A New Implementation of the Cooperating Validity Checker In Proc. CAV’04, 2004
    182
  81. P Barham, A Donnelly, R Isaacs, R Mortier
    Using magpie for request extraction and workload modelling In Proc. OSDI, 2004
    177