Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. N Dalal, B Triggs
    Histograms of oriented gradients for human detection. International Conference on Computer Vision and Pattern Recognition, 2005
    1893
  2. K Mikolajczyk, C Schmid
    A performance evaluation of local descriptors. IEEE Trans. Pattern Anal, 2005
    1248
  3. S Thrun, W Burgard, Fox
    D.: Probabilistic robotics 2005
    882
  4. D Tse, P Viswanath
    Fundamentals of Wireless Communication. 2005
    766
  5. E Candés, T Tao
    Decoding by linear programming. IEEE Trans. Inform. Theory, 2005
    706
  6. S Haykin
    Cognitive radio: brain-empowered wireless communications. IEEE Journal on Selected Areas Commun, 2005
    704
  7. C keung Luk, R Cohn, R Muth, H Patil, A Klauser, G Lowney, S Wallace, V Janapa, R K Hazelwood
    Pin: Building customized program analysis tools with dynamic instrumentation. In In Programming Language Design and Implementation, 2005
    700
  8. P Godefroid, N Klarlund, K Sen
    DART: Directed Automated Random Testing. In Proceedings of PLDI’2005, 2005
    576
  9. A Goldsmith
    Wireless Communications. 2005
    576
  10. P F Felzenszwalb, D P Huttenlocher
    Pictorial structures for object recognition. Int. J. Comput. Vis, 2005
    572
  11. J Ramsay, B W Silverman
    Functional Data Analysis. 2005
    572
  12. J Polastre, R Szewczyk, D Culler
    Telos: enabling ultra-low power wireless research. In Proceedings of IEEE IPSN, 2005
    529
  13. J Newsome
    Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. in 12th Annual Network and Distributed System Security Symposium, 2005
    520
  14. I Laptev
    On space-time interest points. International Journal of Computer Vision, 2005
    475
  15. D Zhou, O Bousquet, T Lal, J Weston, B Schlkopf
    Learning with local and global consistency. In NIPS’16, 2005
    471
  16. S Madden, M J Franklin, J M Hellerstein, W Hong
    Tinydb: an acquisitional query processing system for sensor networks. ACM-TODS, 2005
    462
  17. M Frigo, S G Johnson
    The design and implementation of FFTW3. Proceedings of the IEEE, 2005
    460
  18. J C Barrett, B Fry, J Maller, M J Daly
    Haploview: analysis and visualization of LD and haplotype maps. Bioinformatics, 2005
    451
  19. B C Russell, A Torralba, K P Murphy, W T Freeman
    LabelMe: a database and web-based tool for image annotation. 2005
    450
  20. J von
    zur Gathen and in Selected Areas in Cryptography (SAC 2005, 2005
    450
  21. M Margulies, M Egholm, Altman WE, S Attiya, Bader JS, Bemben LA, J Berka, Braverman MS, Chen YJ, Z Chen
    Genome sequencing in microfabricated high-density picolitre reactors. Nature 437: 376–380 2005
    441
  22. J S Yedidia, W T Freeman, Y Weiss
    Constructing free-energy approximations and generalized belief propagation algorithms. IEEE Trans. on Information Theory, 2005
    441
  23. T Harris, S Marlow, P Jones
    Composable memory transactions. In PPoPP’05: Proceedings of the 10th ACM SIGPLAN Symposium on Principles and Practice of parallel programming, 2005
    425
  24. J Finkel, T Grenager, CD Manning
    Incorporating non-local information into information extraction systems by Gibbs sampling. In Proc. of ACL, 2005
    423
  25. P Dollar, V Rabaud, G Cottrell, S Belongie
    Behavior recognition via sparse spatio-temporal features. In International workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance, 2005
    422
  26. G Kramer, M Gastpar, P Gupta
    Cooperative strategies and capacity theorems for relay networks IEEE Transactions on Information Theory, 2005
    420
  27. Eugene Charniak, Mark Johnson
    Coarse-tofine n-best parsing and MaxEnt discriminative reranking. In Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics, 2005
    416
  28. H ZOU, T HASTIE
    Regularization and variable selection via the elastic net. Journal of the Royal Statistical Society. Series B, 2005
    414
  29. C Clark, K Fraser, S Hand, J G Hanseny, E July, C Limpach, I Pratt, A Warfield
    Live migration of virtual machines. In In Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI, 2005
    407
  30. M Gildea Palmer, D Kingsbury, P
    The Proposition Bank: An annotated corpus of semantic roles. Computational Linguistics, 2005
    407
  31. David Chiang
    A hierarchical phrase-based model for statistical machine translation. In Proceedings of the 43rd Annual Meeting of the ACL, 2005
    404
  32. S Muthukrishnan
    Data Streams: Algorithms and Applications. Foundations and Trends in Theoretical Computer Science. Now Publishers, 2005
    404
  33. K Jain, J Padhye, V Padmanabhan, L Qiu
    Impact of interference on multi-hop wireless network performance. Wireless Networks, 2005
    403
  34. K Grauman, T Darrell
    The pyramid match kernel: Discriminative classification with sets of image features. In IEEE International Conference on Computer Vision (ICCV, 2005
    389
  35. C Burges, T Shaked, E Renshaw, A Lazier, M Deeds, N Hamilton, G Hullender
    Learning to rank using gradient descent. ICML, 2005
    388
  36. A Subramanian, P Tamayo, V K Mootha, S Mukherjee, B L Ebert, M A Gillette, A Paulovich, S L Pomeroy, T R Golub, E S Lander, J P Mesirov
    Gene set enrichment analysis: a knowledge-based approach for interpreting genome-wide expression profiles Proc. Natl. Acad. Sci. USA, 2005
    388
  37. X Zhang, J Liu, B Li, Y-S P Yum
    CoolStreaming/DONet: A datadriven overlay network for efficient live media streaming. INFOCOM 2005, 2005
    354
  38. P Cramton, R Steinberg, Y Shoham
    Combinatorial auctions. 2005
    351
  39. A Siepel, G Bejerano, Pedersen JS, Hinrichs AS, M Hou
    Evolutionarily conserved elements in vertebrate, insect, worm, and yeast genomes. Genome Res 15 2005
    344
  40. J Lu, G Getz, E A Miska, E Alvarez-Saavedra, J Lamb, D Peck, A Sweet-Cordero, B L Ebert, R H Mak, A A Ferrando
    MicroRNA expression profiles classify human cancers Nature, 2005
    343
  41. K Sen, D Marinov, G Agha
    CUTE: A concolic unit testing engine for C. In Proceedings of the European Software Engineering Conference and the International Symposium on Foundations of Software Engineering (ESEC/FSE, 2005
    336
  42. T Joachims, L Granka, B Pan, H Hembrooke, G Gay
    Accurately interpreting clickthrough data as implicit feedback. In SIGIR, 2005
    334
  43. J Leskovec, J Kleinberg, C
    Faloutsos “Graphs over Time: Densification Laws, Shrinking Diameters and Possible Explanations. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD, 2005
    332
  44. G K Smyth
    Limma: linear models for microarray data. Bioinformatics and Computational Biology Solutions using R and Bioconductor, 2005
    324
  45. J Smith, P Todd
    Does matching overcome LaLonde’s critique of nonexperimental estimators Journal of Econometrics, 2005
    318
  46. P Koehn
    Europarl: A parallel corpus for statistical machine translation. in Proceedings of MT Summit, 2005
    317
  47. Lilian Burdy, Yoonsik Cheon, David R Cok, Michael D Ernst, Joeseph R Kiniry, Gary T Leavens, K Rustan M Leino, Erik Poll
    An overview of JML tools and applications. International Journal on Software Tools for Technology Transfer, 2005
    315
  48. F Baader, S Brandt, C Lutz
    Pushing the EL envelope, in. Proc. 19th Int. Joint Conf. on Artificial Intelligence (IJCAI-05), Morgan-Kaufmann Publishers, 2005
    314
  49. G CORMODE, S MUTHUKRISHNAN
    An improved data stream summary: the count-min sketch and its applications. J. Algorithms, 2005
    314
  50. D Landau, K Binder
    A Guide to Monte Carlo Simulations in Statistical Physics, 2005
    313
  51. C Rasmussen, C Williams
    Gaussian processes for machine learning. 2005
    313
  52. Jeremy Manson, William Pugh, Sarita V Adve
    The Java Memory Model. SIGPLAN Not, 2005
    311
  53. A C Berg, T L Berg, J Malik
    Shape matching and object recognition using low distortion cost. In CVPR, 2005
    307
  54. T Spyropoulos, K Psounis, C S Raghavendra
    Spray and wait: An efficient routing scheme for intermittently connected mobile networks. In Proceedings of ACM SIGCOMM, 2005
    305
  55. P Kongetira, K Aingaran, K Olukotun
    Niagara: a 32-way Multithreaded Sparc Processor IEEE Micro, March-April, 2005
    303
  56. J C Phillips, R Braun, W Wang, J Gumbart, E Tajkhorshid, E Villa, C Chipot, R D Skeel, L Kale, K Schulten
    Scalable molecular dynamics with NAMD J. Comput. Chem, 2005
    299
  57. G Palla, I Derényi, I Farkas, T Vicsek
    Uncovering the overlapping community structure of complex networks in nature and society Nature, 2005
    298
  58. M Tompa, N Li, T L Bailey, G M Church, B De Moor, E Eskin, A V Favorov, M C Frith, Y Fu, W J Kent
    Assessing computational tools for the discovery of transcription factor binding sites Nat. Biotechnol, 2005
    297
  59. A Buades, B Coll, J M Morel
    A review of image denoising algorithms, with a new one. 2005
    296
  60. P Phillips P Flynn, T Scruggs, K Bowyer, J Chang, K Hoffman, J Marques, J Min, W Worek
    Overview of the face recognition grand challenge. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2005
    293
  61. M Alicherry, R Bhatia, L Li
    Joint Channel Assignment and Routing for Throughput Optimization. in Multi-Radio Wireless Mesh Networks,” Proc. ACM MobiCom, 2005
    288
  62. S Biswas, R Morris
    ExOR: Opportunistic Multi-Hop Routing for Wireless Networks. in Proc. of ACM SIGCOMM, 2005
    288
  63. R McDonald, F Pereira, K Ribarov, J Hajič
    NonProjective Dependency Parsing using Spanning Tree Algorithms. In Proceedings of Human Langauge Technology Conference and Conference on Empirical Methods in Natural Language Processing (HTL/EMNLP, 2005
    286
  64. P Shvaiko, J Euzenat
    A survey of schema-based matching approaches. Journal on Data Semantics IV, 2005
    286
  65. J Y Han
    Low-Cost Multi-Touch Sensing Through Frustrated Total Internal Reflection In UIST ’05: Proceedings of the 18th annual ACM symposium on User interface software and technology, 2005
    283
  66. A Flickinger Copestake, D Pollard, C Sag, I A
    Minimal recursion semantics: An introduction Research on Language and Computation, 2005
    283
  67. M Iacoviello
    House Prices, Borrowing Constraints, and Monetary. Policy in the Business Cycle,American Economic Review 95, 2005
    278
  68. R Bayardo, R Agrawal
    Data privacy through optimal k-anonymization. In ICDE, 2005
    277
  69. J Lofland, D Snow, A Anderson, L, L Lofland
    H.: ‘Analyzing Social Settings: A Guide to Qualitative Observation and Analysis 2005
    275
  70. R Keohane
    After Hegemony: Cooperation and Discord in the World Political, 2005
    274
  71. H Choset, K M Lynch, S Hutchinson, G Kantor, W Burgard, L E Kavraki, S Thrun
    Principles of Robot Motion: Theory, Algorithms, and Implementations 2005
    270
  72. R Xu, D Wunsch
    Survey of clustering algorithms. IEEE Transactions on Neural Networks, 2005
    266
  73. A-M Popescu, O Etzioni
    Extracting product features and opinions from reviews. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP, 2005
    264
  74. J Heer, S K Card, J A Landay
    prefuse: a toolkit for interactive information visualization. In Proceedings of the SIGCHI conference on Human factors in computing systems, CHI ’05, 2005
    262
  75. B Motik, U Sattler, R Studer
    Query answering for OWL-DL with rules. J. of Web Semantics, 2005
    259
  76. H W Hethcote
    The Mathematics of Infectious Diseases. SIAM Review, 2005
    259
  77. P J Modi, W-M Shen, M Tambe, M Yoko
    ADOPT: Asynchronous distributed constraint optimization with quality guarantees. Artificial Intelligence, 2005
    256
  78. J Bicket, D Aguayo, S Biswas, R Morris
    Architecture and evaluation of an unplanned 802.11b mesh network. in MobiCom ’05: Proceedings of the 11th annual international conference on Mobile computing and networking, 2005
    255