Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. James Gosling, Bill Joy, Guy Steele, Gilad Bracha
    The Java TM Language Specification 2005
    1530
  2. I Jolliffe
    Principal Component Analysis J. Wiley and Sons Ltd, 2005
    1350
  3. J Han, M Kamber
    Data Mining: Concepts and Techniques 2005
    1225
  4. N Dalal, B Triggs
    Histograms of oriented gradients for human detection. In CVPR, 2005
    691
  5. S Thrun, W Burgard, D Fox
    Probabilistic Robotics 2005
    427
  6. J Newsome, D Song
    Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In The 12 th Annual Network and Distributed System Security Symposium, 2005
    351
  7. G Adomavicius, A Tuzhilin
    Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans. on Knowl. and Data Eng, 2005
    321
  8. J Polastre, R Szewczyk, D Culler
    Telos: Enabling Ultra-Low Power Wireless Research in Proceedings of the 4 th International Symposium on Information Processing in Sensor Networks, 2005
    312
  9. L Ambrosio, N Fusco, D Pallara
    Functions of bounded variation and free discontinuity problems 2005
    312
  10. J H Cochrane
    Asset Pricing 2005
    311
  11. L J Christiano, M Eichenbaum, C L Evans
    Nominal rigidities and the dynamic effects of a shock to monetary policy Journal of Political Economy, 2005
    300
  12. T Harris, S Marlow, S Peyton Jones, M Herlihy
    Composable memory transactions. In ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2005
    300
  13. D Tse, P Viswanath
    Fundamentals of Wireless Communications. 2005
    298
  14. L Fei-Fei, P Perona
    A Bayesian hierarchical model for learning natural scene categories. IEEE Computer Vision and Pattern Recognition, 2005
    297
  15. P-N Tan, M Steinbach, V Kumar
    editors. Introduction to Data Mining 2005
    286
  16. P-P Sloan, J Kautz, Snyder
    J.: Precomputed radiance transfer for real-time rendering in dynamic, low-frequency lighting environments. In Proceedings of SIGGRAPH 2002 (2002), ACM Press / ACM SIGGRAPH, 2005
    284
  17. P F Felsenszwalb, D P Huttenlocher
    Pictorial structures for object recognition. IJCV, 2005
    283
  18. J Bosch
    Design and Use of Software Architectures: Adopting and Evolving a Product-line Approach Software Product Line Engineering: Foundations, Principles and Techniques, 2005
    280
  19. S Madden, M J Franklin, J M Hellerstein, W Hong
    TinyDB: An Acquisitional Query Processing System for Sensor Networks. ACM Trans. Database Syst, 2005
    277
  20. H W Engl, M Hanke, A Neubauer
    Regularization of Inverse Problems Kluwer, Dordrecht, The Netherlands, 2000); J. Kaipio and E. Somersalo, Statistical and Computational Inverse Problems (Springer, 2005
    259
  21. I Borg, P J F Groenen
    Modern Multidimensional Scaling: Theory and Applications In Proceedings of the 24th International Conference on Machine Learning, ICML ’07, 2005
    259
  22. S Muthukrishnan
    Data Streams: Algorithms and Applications. Foundations and Trends in Theoretical Computer Science. Now Publishers, 2005
    255
  23. D Parnas
    Designing software for ease of extension and contraction, Trans Software Eng IEEE SE-5, 1979. FUTURE TRENDS AND IMPLICATIONS 19 D. Patterson, 20th century vs. 21st century C&C: The SPUR manifesto, Commun ACM, 2005
    253
  24. D Thain, T Tannenbaum, M Livny
    Distributed computing in practice: the Condor experience: Research articles. Concurr. Comput. : Pract. Exper, 2005
    247
  25. N Chomsky
    Rules And Representations 2005
    244
  26. A Broder, M Mitzenmacher
    Network applications of Bloom filters: A survey. in Internet Mathematics, 2005
    244
  27. X Zhang, J Liu, B Li, T Yum
    CoolStreaming/DONet: A Datadriven Overlay Network for Peer-to-Peer Live Media Streaming. In Proc. of IEEE INFOCOM’05, 2005
    237
  28. Eugene Charniak, Mark Johnson
    Coarse-to-fine n-best parsing and MaxEnt discriminative reranking. In Proceedings of the 43rd Meeting of Association for Computational Linguistics, 2005
    237
  29. M Palmer, D Gildea, P Kingsbury
    The Proposition Bank: An Annotated Corpus of Semantic Roles. Computational Linguistics, 2005
    237
  30. J Manson, B Pugh, S V Adve
    The Java memory model. In 32nd ACM SIGPLAN/SIGACT Symp. on Principles of Prog. Lang, 2005
    235
  31. Christopher Clark, Keir Fraser, Steven Hand, Jacob Gorm Hansen, Eric Jul, Christian Limpach, Ian Pratt, Andrew Warfield
    Live Migration of Virtual Machines. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI, 2005
    230
  32. Matteo Frigo, Steven G Johnson
    The design and implementation of FFTW3. Proceedings of the IEEE, 2005
    223
  33. C Burges, T Shaked, E Renshaw, A Lazier, M Deeds, N Hamilton, G Hullender
    Learning to Rank using Gradient Descent. In ICML, 2005
    222
  34. I F Akyldiz, X Wang, W Wang
    Wireless Mesh Networks: A Survey. Computer Networks, 2005
    220
  35. U S Department
    of Health & Human Services 2005
    214
  36. P Kongetira, K Aingaran, K Olukotun
    Niagara: A 32-way multithreaded SPARC processor IEEE Micro, 2005
    214
  37. K Grauman, T Darrell
    The pyramid match kernel: Discriminative classification with sets of image features. In Proceedings of the Tenth IEEE International Conference on Computer Vision, 2005
    212
  38. M Collins, T Koo
    Discriminative Reranking for Natural Language Parsing. Computational Linguistics, 2005
    208
  39. A Goldsmith
    Wireless Communications. 2005
    206
  40. M Costa, J Crowcroft, M Castro, A Rowstron
    Vigilante: End-to-End Containment of Internet Worms. In Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP, 2005
    197
  41. D P Bertsekas
    Dynamic Programming and Optimal Control Volume I. Athena Scientific, 2005
    196
  42. A Copestake, D Flickinger, C Pollard, I Sag
    Minimal Recursion Semantics: An Introduction Research on Language and Computation, 2005
    195
  43. I Laptev
    On space-time interest points. IJCV, 2005
    194
  44. K Sen, D Marinov, G Agha
    CUTE: A concolic unit testing engine for C. In European Software Engineering Conference and Foundations of Software Engineering (ESEC/FSE, 2005
    193
  45. Oren Etzioni, Michael Cafarella, Doug Downey, AnaMaria Popescu, Tal Shaked, Stephen Soderland, S Weld, Alexander Yates
    Unsupervised named-entity extraction from the web: An experimental study. Artificial Intelligence, 2005
    193
  46. T Joachims, L Granka, B Pan, H Hembrooke, G Gay
    Accurately interpreting clickthrough data as implicit feedback. In SIGIR ’05, 2005
    193
  47. R J Bayardo, R Agrawal
    Data privacy through optimal k-anonymization. In Proceedings of the 21st International Conference on Data Engineering (ICDE’05, 2005
    186
  48. P Dollar, V Rabaud, G Cottrell, S Belongie
    Behavior recognition via sparse spatiotemporal features. in 2nd Joint IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance, 2005
    184
  49. C Ananian, K Asanovic, B Kuszmaul, C Leiserson, S Lie
    Unbounded Transactional Memory. In Proceedings of HPCA-11, 2005
    184
  50. K Akkaya, M Younis
    A Survey of Routing Protocols in Wireless Sensor Networks. Elsevier Ad Hoc Network Journal, 2005
    181
  51. B Motik, U Sattler, R Studer
    Query answering for OWL-DL with rules. Web Semantics: Science, Services and Agents on the World Wide Web, 2005
    181
  52. J Newsome, B Karp, D Song
    Polygraph: Automatically Generating Signatures for Polymorphic Worms. In Proceedings of the IEEE Symposium on Security and Privacy, 2005
    181
  53. I Tsochantaridis, T Joachims, T Hofmann, Y Altun
    Large margin methods for structured and interdependent output variables. Journal of Machine Learning Research, 2005
    176
  54. DC Washington
    The National Academies 2005
    174
  55. J Bicket, D Aguayo, S Biswas, R Morris
    Architecture and evaluation of an unplanned 802.11b mesh network. In MobiCom, 2005
    174
  56. A Banerjee, S Merugu, I S Dhillon, J Ghosh
    Clustering with Bregman divergences. Journal of Machine Learning Research, 2005
    168
  57. Joshi JBD, E Bertino, U Latif
    Ghafoor A. A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering, 2005
    165
  58. K LeFevre, D Dewitt, R Ramakrishnan
    Incognito: Efficient full-domain k-anonymity In ACM SIGMOD International Conference on Management of Data, 2005
    164
  59. J A Pouwelse, P Garbacki, D H J Epema, H J Sips
    The BitTorrent P2P file-sharing system: Measurements and analysis. 4th International Workshop on Peer-to-Peer Systems (IPTPS’05, 2005
    163
  60. P Shvaiko, J Euzenat
    A survey of schema-based matching approaches. 2005
    161
  61. M Murata, D Lee, M Mani, Kawaguchi
    K.: Taxonomy of XML schema languages using formal language theory. ACM Trans. Inter. Tech, 2005
    161
  62. D Clark, J Wroclawski, K Sollins, R Braden
    Tussle in Cyberspace: Defining Tomorrow’s Internet. IEEE-ACM Transactions on Networking, 2005
    160
  63. K Q Weinberger, J Blitzer, L K Saul
    Distance metric learning for large margin nearest neighbor classification. In NIPS, 2005
    156
  64. S BOAG, D CHAMBERLIN, M F FERNANDEZ, D FLORESCU, J ROBIE, J SIMÉON
    XQuery 1.0: An XML Query Language. W3C Working Draft 11 2005
    156
  65. S Biswas, R Morris
    ExOR: Opportunistic Multi-Hop Routing for Wireless Networks. in ACM SIGCOMM, 2005
    154
  66. Ryan McDonald, Fernando Pereira, Kiril Ribarov, Jan Hajič
    Non-projective dependency parsing using spanning tree algorithms. In Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing, HLT ’05, 2005
    153
  67. M N Do, M Vetterli
    The contourlet transform: an efficient directional multiresolution image representation Proceedings of the National Academy of Sciences of the United States of America, 2005
    153
  68. A Lakhina, M Crovella, C Diot
    Mining anomalies using traffic feature distributions. In SIGCOMM ’05: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, 2005
    152
  69. H Hosoya, J Vouillon, B Pierce
    Regular expression types for XML. ACM Trans. Program. Lang. Syst, 2005
    151
  70. R Fergus, L Fei-Fei, P Perona, A Zisserman
    Learning object categories from google’s image search. In IEEE Intl. Conf. on Computer Vision, 2005
    148
  71. X Wang, H Yu
    How to Break MD5 and Other Hash Functions. in EUROCRYPT 2005. Springer Berlin, 2005
    146
  72. U von Luxburg, O Bousquet, M Belkin
    Limits of spectral clustering. in Advances in Neural Information Processing Systems (NIPS) 17, 2005
    145
  73. H Choset, K M Lynch, S Hutchinson, G Kantor, W Burgard, L E Kavraki, S Thrun
    Principles of robot motion-theory, algorithms, and implementations 2005
    145
  74. J Heer, S Card, J Landay
    Prefuse: A toolkit for interactive information visualization. In Proc CHI’05, 2005
    144
  75. M Barnett, B-Y E Chang, R DeLine, B Jacobs, K R M Leino
    Boogie: A modular reusable verifier for object-oriented programs. In FMCO 2005, volume 4111 of LNCS, 2005
    144
  76. N H Vaidya, P Bahl, S Gupta
    Distributed fair scheduling in a Wireless LAN. IEEE Trans. Mobile Comput, 2005
    143
  77. M Thorup, U Zwick
    Approximate distance oracles. Journal of the ACM, 2005
    142
  78. Marjan Mernik, Jan Heering, Anthony M Sloane
    When and How to Develop Domain-Specific Languages. ACM Computing Surveys, 2005
    141
  79. L Ning, J C Hou, L Sha
    BDesign and analysis of an mst-based topology control algorithm. IEEE Trans. Wireless Commun, 2005
    141
  80. N Paragios, R Deriche
    Geodesic active regions and level set methods for motion estimation and tracking. Computer Vis. and Image Understanding, 2005
    141
  81. R McDonald, K Crammer, F Pereira
    Online large-margin training of dependency parsers. In Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics (ACL-05, 2005
    140
  82. Brent Waters
    Efficient Identity-Based Encryption Without Random Oracles. In Proc. of Advances in Cryptology - EUROCRYPT 2005, 2005
    140
  83. S Weisberg
    Applied Linear Regression 2005
    140
  84. B Titzer, D Lee, J Palsberg
    Avrora: scalable sensor network simulation with precise timing. In: Proc. of the 4 th Int. Symp. on Information, 2005
    139
  85. R Collins, Y Liu, M Leordeanu
    On-line selection of discriminative tracking features. In PAMI, 2005
    138
  86. G Tolle, J Polastre, R Szewczyk, D Culler, N Turner, K Tu, S Burgess, T Dawson, P Buonadonna, D Gay, W Hong
    A macroscope in the redwoods In SenSys ’05: Proceedings of the 3rd international, 2005
    136
  87. P Charles, C Grothoff, V Saraswat, C Donawa, A Kielstra, K Ebcioglu, C von Praun, V Sarkar
    X10: an object-oriented approach to non-uniform cluster computing In OOPSLA, 2005
    135
  88. B Girod, A Aaron, S Rane, D Rebollo-Monedero
    Distributed video coding. Proceedings of the IEEE, 2005
    135
  89. Z Gyöngyi, H Garcia-Molina
    Web Spam Taxonomy. In Proceedings of the 1st ACM International Workshop on Adversarial Information Retrieval on the Web, 2005
    134
  90. M Tompa, N Li, T L Bailey, G M Church, B De Moor, E Eskin, A V Favorov, M C Frith, Y Fu, W J Kent, V J Makeev, A A Mironov, W S Noble, G Pavesi, G Pesole, M Régnier, N Simonis, S Sinha, G Thijs, J van Helden, M Vandenbogaert, Z Weng, C Workman, C Ye, Z Zhu
    Assessing computational tools for the discovery of transcription factor binding sites Nature Biotechnology, 2005
    134