Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. A M Law
    Simulation Modeling and Analysis 4th Edition, McGraw-Hill, 2007
    963
  2. Finn V Jensen, Thomas D Nielsen
    Bayesian Networks and Decision Graphs 2007
    414
  3. R A Johnson, D W Wichern
    Applied multivariate statistical analysis 2007
    379
  4. P Koehn, H Hoang, A Birch, C Callison-Burch, M Federico, N Bertoldi, B Cowan, W Shen, C Moran, R Zens, C Dyer, O Bojar, A Constantin, Herbst
    E.: Moses: Open Source Toolkit for Statistical Machine Translation. In: 45th Annual Meeting of the Association for Computer Linguistics. 2007
    370
  5. C Coello, G Lamont, Veldhuizen
    D.: Evolutionary algorithms for solving MultiObjective problems In: Genetic and Evolutionary Computation, 2007
    352
  6. Z Pawlak, A Skowron
    Rudiments of rough sets Information Sciences 177, 2007
    324
  7. D Wagner, J Foster, E Brewer, A Aiken
    A first step towards automated detection of buffer overrun vulnerabilities. University of California, 2007
    313
  8. A Asuncion, D J Newman
    UCI machine learning repository 2007
    289
  9. A Machanavajjhala, J Gehrke, D Kifer
    l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data, 2007
    272
  10. Urs Fischbacher
    Z-Tree: Zurich Toolbox for Readymade Economic Experiments. Experimental Economics, 2007
    258
  11. P Bonnet, J Gehrke, P Seshadri
    Towards sensor database systems in Proceedings of the Second International Conference on Mobile Data Management, ser. MDM ’01, 2007
    232
  12. M Isard, M Budiu, Y Yu, A Birrell, D Fetterly
    Dryad: Distributed Data-Parallel Programs from Sequential Building Blocks In EuroSys, 2007
    219
  13. B Edelman, M Ostrovsky, M Schwarz
    Internet advertising and the generalized second-price auction: Selling billions of dollars worth of keywords. The American Economic Review, 2007
    211
  14. W PRATT
    Digital Image Processing 2007
    201
  15. Peter Brucker
    Scheduling Algorithms 2007
    195
  16. J Feigenbaum, M Schapira, S Shenker
    Distributed algorithmic mechanism design,” in Algorithmic Game Theory. 2007
    190
  17. H Comon, M Dauchet, R Gilleron, C Löding, F Jacquemard, D Lugiez, S Tison, M Tommasi
    Tree automata techniques and applications. Available on: http://www.grappa. univ-lille3.fr/tata, 2007. release October 2007
    187
  18. D Chiang
    Hierarchical phrase-based translation. Computational Linguistics, 2007
    186
  19. L Liao, D Fox, H Kautz
    Learning and inferring transportation routines. In Artificial Intelligence, 2007
    160
  20. G DeCandia, D Hastorun, M Jampani, G Kakulapati, A Lakshman, A Pilchin, S Sivasubramanian, P Vosshall, W Vogels
    Dynamo: amazon’s highly available key-value store. In SOSP, 2007
    159
  21. S Auer, C Bizer, J Lehmann, G Kobilarov, R Cyganiak, Z Ives
    DBpedia: A Nucleus for a Web of Open Data. in: Proceedings of the 6th International Semantic Web Conference, 2007
    156
  22. A Mislove, M Marcon, K P Gummadi, P Druschel, B Bhattacharjee
    Measurement and Analysis of Online Social Networks. In Internet Measurement Conference (IMC, 2007
    154
  23. S Boag, D Chamberlin, M F Fernández, D Florescu, J Robie, J Siméon
    XQuery 1.0: An XML Query Language 2007
    153
  24. N Nisan, T Roughgarden, E Tardos, V V Vazirani
    Algorithmic Game Theory. 2007
    149
  25. Michele Banko, Michael J Cafarella, Stephen Soderland, Matt Broadhead, Oren Etzioni
    Open information extraction from the web. In IJCAI. Roberto Basili, Diego De Cao, Danilo Croce, Bonaventura Coppola, and Alessandro Moschitti, 2007
    149
  26. D Calvanese, G D Giacomo, D Lembo, M Lenzerini, Rosati
    R.: Data complexity of query answering in description logics. In: Proceedings of the 10th International Conference on Principles of Knowledge Representation and Reasoning (KR-06, 2007
    142
  27. A Davison, I Reid, N Molton, O Stasse
    MonoSLAM: Real-time Single Camera SLAM. IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI, 2007
    135
  28. Michael R Lyu
    Software Reliability Engineering: A Roadmap”, International Conference on Software Engineering, 2007
    132
  29. T Bosse, C M Jonker, L van der Meij, J Treur
    A Language and Environment for Analysis of Dynamics by Simulation. Intern. J. of AI Tools, 2007
    131
  30. Dan Boneh, Ran Canetti, Shai Halevi, Jonathan Katz
    Chosen-Ciphertext Security from Identity-Based Encryption. SIAM J. Comput, 2007
    126
  31. G Caire F Bellifemine, D Greenwood
    Developing Multi-Agent Systems with JADE 2007
    120
  32. H Comon, M Dauchet, R Gilleron, C Löding, F Jacquemard, D Lugiez, S Tison, M Tommasi
    Tree automata techniques and applications. 2007
    118
  33. B J Frey, D Dueck
    Clustering by passing messages between data points. in Advances in Neural Information Processing Systems 18, 2007
    117
  34. E Sirin, B Parsia, B C Grau, A Kalyanpur, Y Katz
    Pellet: A practical OWL-DL reasoner Web Semantics, 2007
    117
  35. J Tropp, A Gilbert
    Signal recovery from partial information via orthogonal matching pursuit IEEE Trans. Info. Theory, 2007
    113
  36. H Debar, D Curry, B Feinstein
    The Intrusion Detection Message Exchange Format (IDMEF 2007
    112
  37. J A Tropp, Gilbert
    A.C.: Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans. on Information Theory, 2007
    111
  38. C Sutton, A McCallum
    An introduction to conditional random fields for relational learning In Getoor, L., & Taskar, B. (Eds.), Introduction to Statistical Relational Learning, 2007
    110
  39. N Li, T Li
    t-closeness: Privacy beyond k-anonymity and l-diversity In IEEE 23rd International Conference on Data Engineering, 2007
    109
  40. S Shalev-Shwartz, Y Singer, N Srebro
    Pegasos: Primal estimated sub-gradient solver for svm. In Proceedings of the 24th international conference on Machine learning, ICML ’07, 2007
    106
  41. M Raya, J-P Hubaux
    Securing vehicular ad hoc networks. Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks, 2007
    106
  42. X Fan, W-D Weber, L A Barroso
    Power provisioning for a warehouse-sized computer. In ISCA ’07: Proceedings of the 34th annual international symposium on Computer architecture, 2007
    102
  43. F Suchanek, G Kasneci, G Weikum
    YAGO: a core of semantic knowledge Proc. WWW 2007, 2007
    102
  44. G Griffin, A Holub, P Perona
    Caltech-256 object category dataset 2007
    100
  45. T Serre, L Wolf, S Bileschi, M Riesenhuber, T Poggio
    Robust object recognition with cortex-like mechanisms. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007
    100
  46. M Cha, H Kwak, P Rodriguez, Y Ahn, Moon
    S.: I tube, you tube, everybody tubes: analyzing the world’s largest user generated content video system. In: Proc. of the 7th ACM SIGCOMM conference, 2007
    97
  47. J Hays, A Efros
    Scene completion using millions of photographs. In SIGGRAPH, 2007
    97
  48. Will Schroeder, Ken Martin, Bill Lorensen
    The Visualization Toolkit 2007
    97
  49. Slav Petrov, Dan Klein
    Improved inference for unlexicalized parsing. In Proceedings of the Conference on Human Language Technology and North American chapter of the Association for Computational Linguistics, 2007
    96
  50. C Re, N Dalvi, D Suciu
    Efficient top-k query evaluation on probabilistic data. In ICDE, 2007
    96
  51. L A Barroso, U Hölzle
    The case for energy-proportional computing. IEEE Computer, 2007
    95
  52. Frank Smets, Rafael Wouters
    Shocks and Frictions in U.S Business Cycles: A Bayesian DSGE Approach,” American Economic Review, 2007
    95
  53. B Schölkopf, S Mika, C J C Burges, P Knirsch, K R Müller, G Rätsch, A J Smola
    Input space vs. feature space in kernel-based methods In IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP’07, 2007
    95
  54. P Kotler, K Keller, A Koshy, M Jha
    Marketing Management: A South Asian Perspective, Pearson Education, Twelfth Adition, PP.340, ISBN, 2007
    94
  55. R P Dick, D L Rhodes, W Wolf
    TGFF: Task graphs for free. Proc. International Conference on Hardware/Software Codesign and System Synthesis (CODES, 2007
    94
  56. Y Bengio, P Lamblin, D Popovici, H Larochelle
    Greedy layer-wise training of deep networks. In NIPS, 2007
    92
  57. Brian Milch, Bhaskara Marthi, Stuart Russell, David Sontag, Daniel L Ong, Andrey Kolobov
    BLOG: Probabilistic models with unknown objects. In Introduction to statistical relational learning, ed. Lise Getoor and Ben Taskar, 2007
    92
  58. K DABOV, A FOI, V KATKOVNIK, K O EGIAZARIAN
    Image denoising by sparse 3-d transform-domain collaborative filtering. IEEE Transactions on Image Processing, 2007
    91
  59. A Java, X Song, T Finin, B Tseng
    Why we Twitter: Understanding Micro-Blogging Usage and Communities. Proceedings of the 9th WEBKDD Conference, 2007
    89
  60. Iordanis Kerenidis, Ronald de Wolf
    Exponential lower bound for 2-query locally decodable codes via a quantum argument. In STOC, pages 106–115. ACM, 2003. [KS07] [KS09] [KT00] Tali Kaufman and Madhu, 2007
    89
  61. E Pinheiro, W-D Weber, L A Barroso
    Failure trends in a large disk drive population. in Proceedings of 5th USENIX Conference on File and Storage Technologies (FAST 2007, 2007
    89
  62. D G Feitelson, B Nitzberg, Job
    characteristics of a production parallel scientific workload on the NASA Ames iPSC/860. in: D.G. Feitelson, L. Rudolph (Eds.), Int’l. Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP), Revised Selected Papers, in: Lecture Notes in Computer Science, 2007
    88
  63. Michael Lustig, David Donoho, John M Pauly
    Sparse MRI: The application of compressed sensing for rapid MRI imaging Magnetic Resonance in Medicine, 2007
    88
  64. R Olfati-Saber, J Fax, R Murray
    Consensus and cooperation in networked multi-agent systems. In Proc. of the IEEE, 2007
    87
  65. G Klein, D W Murray
    Parallel Tracking and Mapping for Small AR Workspaces In Intl. Symposium on Mixed and Augmented Reality, 2007
    86
  66. I Koren, C M Krishna
    Fault-tolerant systems 2007
    86
  67. S Chachulski, M Jennings, S Katti, D Katabi
    Trading Structure for Randomness in Wireless Opportunistic Routing. ACM SIGCOMM Comput. Commun. Rev, 2007
    85
  68. R L Cilibrasi, P M B Vitanyi
    The google similarity distance. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2007
    83
  69. A LEVIN, R FERGUS, F DURAND, W FREEMAN
    Image and depth from a conventional camera with a coded aperture. 2007
    83
  70. C Sutton, A McCallum, K Rohanimanesh
    Dynamic conditional random fields: Factorized probabilistic models for labeling and segmenting sequence data. The Journal of Machine Learning Research, 2007
    83
  71. T Green, G Karvounarakis, V Tannen
    Provenance semirings In PODS, 2007
    82
  72. D P Bertsekas
    Dynamic Programming and Optimal Control,” in Athena Scientific, Blemont, 2007
    82
  73. E Horowitz, S Sahni, D Mehta
    Fundamentals of data structures in C++, Second Edition, Silicon, 2007
    81
  74. B E A Saleh, M C Teich
    Fundamentals of Photonics 2007
    81
  75. J Nivre, J Hall, S Kübler, R McDonald, J Nilsson, S Riedel, D Yuret
    The CoNLL 2007 shared task on dependency parsing In EMNLPCoNLL, 2007
    80
  76. G Vogiatzis, C H Esteban, P H S Torr, R Cipolla
    Multiview stereo via volumetric graph-cuts and occlusion robust photoconsistency. PAMI, 2007
    80
  77. D Blei, J McAuliffe
    Supervised topic models. In Neural Information Processing Systems, 2007
    78
  78. L Backstrom, C Dwork, J Kleinberg
    Wherefore art thou r3579x? anonymized social networks, hidden patterns, and structural steganography In Proc. 16th Intl. World Wide Web Conference, 2007
    77
  79. E Daly, M Haahr
    Social network analysis for routing in disconnected delay-tolerant manets in in Proc. of the 8th ACM international symposium on Mobile ad hoc networking and computing, 2007
    76
  80. Sharon Goldwater, Tom Griffiths
    A fully bayesian approach to unsupervised part-of-speech tagging. 2007
    76
  81. Q Zhao, L Tong, A Swami, Y Chen
    Decentrallized Cognitive Mac Opportunistic Spectrum Access in Ad Hoc Networks: A Pomdp Framework IEEE J. Selected Areas in Comm, 2007
    76
  82. S AVIDAN, A SHAMIR
    Seam carving for contentaware image resizing. ACM Trans. Graph, 2007
    76