Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. M J Wooldridge
    An Introduction to Multiagent Systems 2009
  2. P J Brockwell, R A Davis
    Time series: theory and methods 2009
  3. L Lovász, M D Plummer
    Matching theory Corrected reprint of the 1986 original [MR0859549, 2009
  4. E R Gansner, S C North
    An open graph visualization system and its applications to software engineering. 2010/7/30 Florian Haftmann. Code Generation from Specifications in Higher-Order Logic. PhD thesis, 2009
  5. Paul Gray, Paul Hurst, Stephen Lewis, Robert Meyer
    Analysis and Design of Analog Integrated Circuits. Fifth edition 2009
  6. A Oppenheim, R Schafer
    Discrete-Time Signal Processing. Series in Signal Processing. Springer-Verlag, 2009
  7. Frühwirth
    T.W.: Constraint Handling Rules. 2009
  8. Flajolet, R Sedgewick
    Analytic Combinatorics. Handbook of Combinatorics, 2009
  9. Gilbert Strang
    Introduction to linear algebra Wellesley-Cambridge Press, 2009
  10. C Daskalakis, P W Goldberg, C H Papadimitriou
    The complexity of computing a Nash equilibrium. SIAM J. Comput, 2009
  11. K Ogata
    Modern control engineering 2009
  12. Ewa Deelman, Gurmeet Singh, Mei-Hui Su, James Blythe, Yolanda Gil, Carl Kesselman, Gaurang Mehta, Karan Vahi, G Bruce Berriman, John Good, Anastasia Laity, Joseph C Jacob, Daniel S Katz
    Pegasus: A framework for mapping complex scientific workflows onto distributed systems. Sci. Program., 13(3):219–237, 2005. 2009] Ding Ding, Siwei, 2009
  13. Stephen G Simpson
    Subsystems of Second Order Arithmetic 2009
  14. M Armbrust, A Fox, R Griffith, A D Joseph, R H Katz, A Konwinski, G Lee, D A Patterson, A Rabkin, I Stoica, M Zaharia
    Above the clouds: A Berkeley view of cloud computing. 2009
  15. P F Felzenszwalb, R B Girshick, D McAllester, D Ramanan
    Object detection with discriminatively trained part based models. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2009
  16. Mitchell Petersen
    Estimating standard errors in finance panel data sets: comparing approaches Review of Financial Studies, 2009
  17. C Bizer, T Heath, T Berners-Lee
    Linked Data - The Story So Far. Int. J. Semantic Web Inf. Syst, 2009
  18. R B Cialdini
    Influence: Science and Practice 2009
  19. J Paek, B Greenstein, O Gnawali, K Jang, A Joki, M Vieira, J Hicks, D Estrin, R Govindan, E Kohler
    The tenet architecture for tiered sensor networks ACM Transactions on Sensor Networks, 2009
  20. F Alizadeh, D Goldfarb
    Second-order cone programming. Math. Program, 2009
  21. I F Akyildiz, X Wang
    Wireless Mesh Networks 2009
  22. J Garson
    Modal logic The Stanford Encyclopedia of Philosophy. The Metaphysics Research Lab,Stanford University, fall 2009 edition, 2009
  23. Jonathan Katz, Rafail Ostrovsky, Moti Yung
    Efficient password-authenticated key exchange using human-memorable passwords. of Lecture Notes in Computer Science, 2009
  24. M Jordan
    An introduction to probabilistic graphical models In preparation, 2009
  25. R Burkard
    Assignment Problems. Philadelphia: SIAM, Society for Industrial and Applied Mathematics, 2009
  26. J Deng, W Dong, R Socher, L-J Li, K Li, L Fei-Fei
    ImageNet: A Large-Scale Hierarchical Image Database. in IEEE Conf. on Computer Vision and Pattern Recognition (CVPR, 2009
  27. G Boella, L W N van der Torre
    Regulative and constitutive norms in normative multiagent systems. In Proc. of KR, 2009
  28. J Kleinberg, A Slivkins, T Wexler
    Triangulation and embedding using small sets of beacons J. ACM, 2009
  29. O Gnawali, R Fonseca, K Jamieson, D Moss, P Levis
    Collection tree protocol. In Proc. 7th ACM Conf. Embedded Networked Sensor Systems (SenSys ’09, 2009
  30. A Greenberg, J Hamilton, N Jain, S Kandula, C Kim, P Lahiri, D Maltz, P Patel, S Sengupta
    VL2: A scalable and flexible data center network In SIGCOMM, 2009
  31. P Dung, R Kowalski, Toni
    F.: Assumption-based argumentation. Argumentation in AI, 2009
  32. P J Bickel, Y Ritov, A Tsybakov
    Simultaneous analysis of lasso and the Dantzig selector, Ann. Statist, 2009
  33. S Chong, J Liu, A C Myers, X Qi, K Vikram, L Zheng, X Zheng
    Secure web applications via automatic partitioning. 2009
  34. T Blumensath, M E Davies
    Iterative hard thresholding for compressed sensing. Applied and Computational Harmonic Analysis, 2009
  35. F Mérillon, L Réveillère, C Consel, R Marlet, G Muller
    Devil: An IDL for Hardware Programming. 2009
  36. A G Greenwald, T A Poehlman, E Uhlmann, M R Banaji
    Measuring and using the Implicit Association Test: III. Meta-analysis of predictive validity. Journal of Personality and Social Psychology, 2009
  37. A J Halderman, S D Schoen, N Heninger, W Clarkson, W Paul, J A Calandrino, A J Feldman, J Appelbaum, E W Felten
    Lest we remember: cold-boot attacks on encryption keys,” Commun. 2009
  38. A Burns, A J Wellings
    Real-Time Systems and Programming Languages 2009
  39. T Bosse, C M Jonker, L van der Meij, A Sharpanskykh, J Treur
    Specification and Verification of Dynamics in Cognitive Agent Models. International Journal of Cooperative Information Systems, 2009
  40. J Pérez, M Arenas, Gutierrez
    C.: Semantics and Complexity of SPARQL. ACM Trans. Database Syst, 2009
  41. Solvay Gerke, Judith Ehlert
    Local Knowledge as Strategic Resource: Fishery in the Seasonal Floodplains of the Mekong, 2009
  42. Hans‐Dieter Evers, Gerke
    Strategic Group Analysis 2009
  43. Wolfram Laube
    Changing the Course of History? Implementing water reforms in Ghana and South Africa, 2009
  44. A Stepanov, McJones
    P.: Elements of Programming. 2009
  45. Danilo Giampiccolo, Hoa Trang Dang, Bernardo Magnini, Ido Dagan, Bill Dolan
    The Fourth PASCAL Recognizing Textual Entailment Challenge. In Proceedings of TAC 2008 Workshop, 2009
  46. V V Kozlov V I Arnold, A I Neishtadt
    Mathematical aspects of classical and celestial mechanics in Russian), Editorial URSS, 2009
  47. Hans-Dieter Evers, Sven Genschick, Benjamin Schraven
    Constructing Epistemic Landscapes: Methods of GIS-Based Mapping 2009
  48. Brazil Shadow
    WTO agricultural domestic support notifications Andre M. Nassar, 2009
  49. A Pavlo, E Paulson, A Rasin, D J Abadi, D J DeWitt, S Madden, M Stonebraker
    A comparison of approaches to large-scale data analysis. In SIGMOD Conference, 2009
  50. J Leskovec, L Backstrom, J Kleinberg
    Meme-tracking and the dynamics of the news cycle In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2009
  51. S Wright, R Nowak, M Figueiredo
    Sparse reconstruction by separable approximation. IEEE Trans. Sig. Proc, 2009
  52. V Chandola, A Banerjee, V Kumar
    Anomaly detection: A survey. ACM Computing Surveys, 2009
  53. Mark Ronan
    Lectures on buildings 2009
  54. IARC
    IARC monographs on the evaluation of carcinogenic risks to human, International Agency for Research on Cancer. Available at: ICES 2008a): Report of the Fourth ICES/OSPAR Workshop on Integrated Monitoring of Contaminants and their Effects in Coastal and Open Sea Areas (WKIMON IV), 5-7 February 2008, ICES, 2009
  55. T Joachims, T Finley, C-N Yu
    Cutting-plane training of structural SVMs Machine Learning. content/h557723w88185170, 2009
  56. A Narayanan, V Shmatikov
    De-anonymizing social networks. In IEEE Symp. Security and Privacy, 2009
  57. Gerwin Klein, Kevin Elphinstone, Gernot Heiser, June Andronick, David Cock, Philip Derrin, Dhammika Elkaduwe, Kai Engelhardt, Rafal Kolanski, Michael Norrish, Thomas Sewell, Harvey Tuch, Simon Winwood
    sel4: Formal verification of an os kernel. In Proceedings of the 22nd ACM Symposium on Operating Systems Principles (SOSP, 2009
  58. CUDA
    NVIDIA Compute Unified Device Architecture - Programming Guide - Version 2.2.1 NVIDIA Corporation, 21/ toolkit/docs/NVIDIA CUDA Programming Guide 2.2.1.pdf, 2009
  59. Irit Eguavoen
    The Acquisition of Water Storage Facilities in the Abay River Basin, 2009
  60. PHENIX Collab A
    Adare et al., Phys Rev. D79, 2009
  61. http www metoffice gov uksciencecreatingdaysaheadnwpindex html
    Last accessed 2009
  62. E J Candès, T Tao
    The power of convex relaxation: Near-optimal matrix completion. IEEE Transactions on Information Theory, 2009
  63. N Kumar, A C Berg, P N Belhumeur, S K Nayar
    Attribute and simile classifiers for face verification. In ICCV’09, Kyoto, Japan, Sept.29 - Oct.2, 2009