Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. N Dalal, B Triggs
    Histograms of oriented gradients for human detection. International Conference on Computer Vision and Pattern Recognition, 2005
  2. K Mikolajczyk, C Schmid
    A performance evaluation of local descriptors. IEEE Trans. Pattern Anal, 2005
  3. S Thrun, W Burgard, Fox
    D.: Probabilistic robotics 2005
  4. D Tse, P Viswanath
    Fundamentals of Wireless Communication. 2005
  5. E Candés, T Tao
    Decoding by linear programming. IEEE Trans. Inform. Theory, 2005
  6. S Haykin
    Cognitive radio: brain-empowered wireless communications. IEEE Journal on Selected Areas Commun, 2005
  7. C keung Luk, R Cohn, R Muth, H Patil, A Klauser, G Lowney, S Wallace, V Janapa, R K Hazelwood
    Pin: Building customized program analysis tools with dynamic instrumentation. In In Programming Language Design and Implementation, 2005
  8. P Godefroid, N Klarlund, K Sen
    DART: Directed Automated Random Testing. In Proceedings of PLDI’2005, 2005
  9. A Goldsmith
    Wireless Communications. 2005
  10. P F Felzenszwalb, D P Huttenlocher
    Pictorial structures for object recognition. Int. J. Comput. Vis, 2005
  11. J Ramsay, B W Silverman
    Functional Data Analysis. 2005
  12. J Polastre, R Szewczyk, D Culler
    Telos: enabling ultra-low power wireless research. In Proceedings of IEEE IPSN, 2005
  13. J Newsome
    Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. in 12th Annual Network and Distributed System Security Symposium, 2005
  14. I Laptev
    On space-time interest points. International Journal of Computer Vision, 2005
  15. D Zhou, O Bousquet, T Lal, J Weston, B Schlkopf
    Learning with local and global consistency. In NIPS’16, 2005
  16. S Madden, M J Franklin, J M Hellerstein, W Hong
    Tinydb: an acquisitional query processing system for sensor networks. ACM-TODS, 2005
  17. M Frigo, S G Johnson
    The design and implementation of FFTW3. Proceedings of the IEEE, 2005
  18. J C Barrett, B Fry, J Maller, M J Daly
    Haploview: analysis and visualization of LD and haplotype maps. Bioinformatics, 2005
  19. B C Russell, A Torralba, K P Murphy, W T Freeman
    LabelMe: a database and web-based tool for image annotation. 2005
  20. J von
    zur Gathen and in Selected Areas in Cryptography (SAC 2005, 2005
  21. M Margulies, M Egholm, Altman WE, S Attiya, Bader JS, Bemben LA, J Berka, Braverman MS, Chen YJ, Z Chen
    Genome sequencing in microfabricated high-density picolitre reactors. Nature 437: 376–380 2005
  22. J S Yedidia, W T Freeman, Y Weiss
    Constructing free-energy approximations and generalized belief propagation algorithms. IEEE Trans. on Information Theory, 2005
  23. T Harris, S Marlow, P Jones
    Composable memory transactions. In PPoPP’05: Proceedings of the 10th ACM SIGPLAN Symposium on Principles and Practice of parallel programming, 2005
  24. J Finkel, T Grenager, CD Manning
    Incorporating non-local information into information extraction systems by Gibbs sampling. In Proc. of ACL, 2005
  25. P Dollar, V Rabaud, G Cottrell, S Belongie
    Behavior recognition via sparse spatio-temporal features. In International workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance, 2005
  26. G Kramer, M Gastpar, P Gupta
    Cooperative strategies and capacity theorems for relay networks IEEE Transactions on Information Theory, 2005
  27. Eugene Charniak, Mark Johnson
    Coarse-tofine n-best parsing and MaxEnt discriminative reranking. In Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics, 2005
    Regularization and variable selection via the elastic net. Journal of the Royal Statistical Society. Series B, 2005
  29. C Clark, K Fraser, S Hand, J G Hanseny, E July, C Limpach, I Pratt, A Warfield
    Live migration of virtual machines. In In Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI, 2005
  30. M Gildea Palmer, D Kingsbury, P
    The Proposition Bank: An annotated corpus of semantic roles. Computational Linguistics, 2005
  31. David Chiang
    A hierarchical phrase-based model for statistical machine translation. In Proceedings of the 43rd Annual Meeting of the ACL, 2005
  32. S Muthukrishnan
    Data Streams: Algorithms and Applications. Foundations and Trends in Theoretical Computer Science. Now Publishers, 2005
  33. K Jain, J Padhye, V Padmanabhan, L Qiu
    Impact of interference on multi-hop wireless network performance. Wireless Networks, 2005
  34. K Grauman, T Darrell
    The pyramid match kernel: Discriminative classification with sets of image features. In IEEE International Conference on Computer Vision (ICCV, 2005
  35. C Burges, T Shaked, E Renshaw, A Lazier, M Deeds, N Hamilton, G Hullender
    Learning to rank using gradient descent. ICML, 2005
  36. A Subramanian, P Tamayo, V K Mootha, S Mukherjee, B L Ebert, M A Gillette, A Paulovich, S L Pomeroy, T R Golub, E S Lander, J P Mesirov
    Gene set enrichment analysis: a knowledge-based approach for interpreting genome-wide expression profiles Proc. Natl. Acad. Sci. USA, 2005
  37. X Zhang, J Liu, B Li, Y-S P Yum
    CoolStreaming/DONet: A datadriven overlay network for efficient live media streaming. INFOCOM 2005, 2005
  38. P Cramton, R Steinberg, Y Shoham
    Combinatorial auctions. 2005
  39. A Siepel, G Bejerano, Pedersen JS, Hinrichs AS, M Hou
    Evolutionarily conserved elements in vertebrate, insect, worm, and yeast genomes. Genome Res 15 2005
  40. J Lu, G Getz, E A Miska, E Alvarez-Saavedra, J Lamb, D Peck, A Sweet-Cordero, B L Ebert, R H Mak, A A Ferrando
    MicroRNA expression profiles classify human cancers Nature, 2005
  41. K Sen, D Marinov, G Agha
    CUTE: A concolic unit testing engine for C. In Proceedings of the European Software Engineering Conference and the International Symposium on Foundations of Software Engineering (ESEC/FSE, 2005
  42. T Joachims, L Granka, B Pan, H Hembrooke, G Gay
    Accurately interpreting clickthrough data as implicit feedback. In SIGIR, 2005
  43. J Leskovec, J Kleinberg, C
    Faloutsos “Graphs over Time: Densification Laws, Shrinking Diameters and Possible Explanations. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD, 2005
  44. G K Smyth
    Limma: linear models for microarray data. Bioinformatics and Computational Biology Solutions using R and Bioconductor, 2005
  45. J Smith, P Todd
    Does matching overcome LaLonde’s critique of nonexperimental estimators Journal of Econometrics, 2005
  46. P Koehn
    Europarl: A parallel corpus for statistical machine translation. in Proceedings of MT Summit, 2005
  47. Lilian Burdy, Yoonsik Cheon, David R Cok, Michael D Ernst, Joeseph R Kiniry, Gary T Leavens, K Rustan M Leino, Erik Poll
    An overview of JML tools and applications. International Journal on Software Tools for Technology Transfer, 2005
  48. F Baader, S Brandt, C Lutz
    Pushing the EL envelope, in. Proc. 19th Int. Joint Conf. on Artificial Intelligence (IJCAI-05), Morgan-Kaufmann Publishers, 2005
    An improved data stream summary: the count-min sketch and its applications. J. Algorithms, 2005
  50. D Landau, K Binder
    A Guide to Monte Carlo Simulations in Statistical Physics, 2005
  51. C Rasmussen, C Williams
    Gaussian processes for machine learning. 2005
  52. Jeremy Manson, William Pugh, Sarita V Adve
    The Java Memory Model. SIGPLAN Not, 2005
  53. A C Berg, T L Berg, J Malik
    Shape matching and object recognition using low distortion cost. In CVPR, 2005
  54. T Spyropoulos, K Psounis, C S Raghavendra
    Spray and wait: An efficient routing scheme for intermittently connected mobile networks. In Proceedings of ACM SIGCOMM, 2005
  55. P Kongetira, K Aingaran, K Olukotun
    Niagara: a 32-way Multithreaded Sparc Processor IEEE Micro, March-April, 2005
  56. J C Phillips, R Braun, W Wang, J Gumbart, E Tajkhorshid, E Villa, C Chipot, R D Skeel, L Kale, K Schulten
    Scalable molecular dynamics with NAMD J. Comput. Chem, 2005
  57. G Palla, I Derényi, I Farkas, T Vicsek
    Uncovering the overlapping community structure of complex networks in nature and society Nature, 2005
  58. M Tompa, N Li, T L Bailey, G M Church, B De Moor, E Eskin, A V Favorov, M C Frith, Y Fu, W J Kent
    Assessing computational tools for the discovery of transcription factor binding sites Nat. Biotechnol, 2005
  59. A Buades, B Coll, J M Morel
    A review of image denoising algorithms, with a new one. 2005
  60. P Phillips P Flynn, T Scruggs, K Bowyer, J Chang, K Hoffman, J Marques, J Min, W Worek
    Overview of the face recognition grand challenge. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2005
  61. M Alicherry, R Bhatia, L Li
    Joint Channel Assignment and Routing for Throughput Optimization. in Multi-Radio Wireless Mesh Networks,” Proc. ACM MobiCom, 2005
  62. S Biswas, R Morris
    ExOR: Opportunistic Multi-Hop Routing for Wireless Networks. in Proc. of ACM SIGCOMM, 2005
  63. R McDonald, F Pereira, K Ribarov, J Hajič
    NonProjective Dependency Parsing using Spanning Tree Algorithms. In Proceedings of Human Langauge Technology Conference and Conference on Empirical Methods in Natural Language Processing (HTL/EMNLP, 2005
  64. P Shvaiko, J Euzenat
    A survey of schema-based matching approaches. Journal on Data Semantics IV, 2005
  65. J Y Han
    Low-Cost Multi-Touch Sensing Through Frustrated Total Internal Reflection In UIST ’05: Proceedings of the 18th annual ACM symposium on User interface software and technology, 2005
  66. A Flickinger Copestake, D Pollard, C Sag, I A
    Minimal recursion semantics: An introduction Research on Language and Computation, 2005
  67. M Iacoviello
    House Prices, Borrowing Constraints, and Monetary. Policy in the Business Cycle,American Economic Review 95, 2005
  68. R Bayardo, R Agrawal
    Data privacy through optimal k-anonymization. In ICDE, 2005
  69. J Lofland, D Snow, A Anderson, L, L Lofland
    H.: ‘Analyzing Social Settings: A Guide to Qualitative Observation and Analysis 2005
  70. R Keohane
    After Hegemony: Cooperation and Discord in the World Political, 2005
  71. H Choset, K M Lynch, S Hutchinson, G Kantor, W Burgard, L E Kavraki, S Thrun
    Principles of Robot Motion: Theory, Algorithms, and Implementations 2005
  72. R Xu, D Wunsch
    Survey of clustering algorithms. IEEE Transactions on Neural Networks, 2005
  73. A-M Popescu, O Etzioni
    Extracting product features and opinions from reviews. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP, 2005
  74. J Heer, S K Card, J A Landay
    prefuse: a toolkit for interactive information visualization. In Proceedings of the SIGCHI conference on Human factors in computing systems, CHI ’05, 2005
  75. B Motik, U Sattler, R Studer
    Query answering for OWL-DL with rules. J. of Web Semantics, 2005
  76. H W Hethcote
    The Mathematics of Infectious Diseases. SIAM Review, 2005
  77. P J Modi, W-M Shen, M Tambe, M Yoko
    ADOPT: Asynchronous distributed constraint optimization with quality guarantees. Artificial Intelligence, 2005
  78. J Bicket, D Aguayo, S Biswas, R Morris
    Architecture and evaluation of an unplanned 802.11b mesh network. in MobiCom ’05: Proceedings of the 11th annual international conference on Mobile computing and networking, 2005