Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. M J Wooldridge
    An Introduction to Multiagent Systems 2009
    639
  2. P J Brockwell, R A Davis
    Time series: theory and methods 2009
    400
  3. L Lovász, M D Plummer
    Matching theory Corrected reprint of the 1986 original [MR0859549, 2009
    383
  4. E R Gansner, S C North
    An open graph visualization system and its applications to software engineering. 2010/7/30 Florian Haftmann. Code Generation from Specifications in Higher-Order Logic. PhD thesis, 2009
    238
  5. Paul Gray, Paul Hurst, Stephen Lewis, Robert Meyer
    Analysis and Design of Analog Integrated Circuits. Fifth edition 2009
    234
  6. A Oppenheim, R Schafer
    Discrete-Time Signal Processing. Series in Signal Processing. Springer-Verlag, 2009
    213
  7. Frühwirth
    T.W.: Constraint Handling Rules. 2009
    162
  8. Flajolet, R Sedgewick
    Analytic Combinatorics. Handbook of Combinatorics, 2009
    154
  9. Gilbert Strang
    Introduction to linear algebra Wellesley-Cambridge Press, 2009
    143
  10. C Daskalakis, P W Goldberg, C H Papadimitriou
    The complexity of computing a Nash equilibrium. SIAM J. Comput, 2009
    139
  11. K Ogata
    Modern control engineering 2009
    132
  12. Ewa Deelman, Gurmeet Singh, Mei-Hui Su, James Blythe, Yolanda Gil, Carl Kesselman, Gaurang Mehta, Karan Vahi, G Bruce Berriman, John Good, Anastasia Laity, Joseph C Jacob, Daniel S Katz
    Pegasus: A framework for mapping complex scientific workflows onto distributed systems. Sci. Program., 13(3):219–237, 2005. 2009] Ding Ding, Siwei, 2009
    132
  13. Stephen G Simpson
    Subsystems of Second Order Arithmetic 2009
    130
  14. M Armbrust, A Fox, R Griffith, A D Joseph, R H Katz, A Konwinski, G Lee, D A Patterson, A Rabkin, I Stoica, M Zaharia
    Above the clouds: A Berkeley view of cloud computing. 2009
    122
  15. P F Felzenszwalb, R B Girshick, D McAllester, D Ramanan
    Object detection with discriminatively trained part based models. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2009
    104
  16. Mitchell Petersen
    Estimating standard errors in finance panel data sets: comparing approaches Review of Financial Studies, 2009
    99
  17. C Bizer, T Heath, T Berners-Lee
    Linked Data - The Story So Far. Int. J. Semantic Web Inf. Syst, 2009
    96
  18. R B Cialdini
    Influence: Science and Practice 2009
    90
  19. J Paek, B Greenstein, O Gnawali, K Jang, A Joki, M Vieira, J Hicks, D Estrin, R Govindan, E Kohler
    The tenet architecture for tiered sensor networks ACM Transactions on Sensor Networks, 2009
    89
  20. F Alizadeh, D Goldfarb
    Second-order cone programming. Math. Program, 2009
    85
  21. I F Akyildiz, X Wang
    Wireless Mesh Networks 2009
    83
  22. J Garson
    Modal logic The Stanford Encyclopedia of Philosophy. The Metaphysics Research Lab,Stanford University, fall 2009 edition, 2009
    82
  23. Jonathan Katz, Rafail Ostrovsky, Moti Yung
    Efficient password-authenticated key exchange using human-memorable passwords. of Lecture Notes in Computer Science, 2009
    74
  24. M Jordan
    An introduction to probabilistic graphical models In preparation, 2009
    73
  25. R Burkard
    Assignment Problems. Philadelphia: SIAM, Society for Industrial and Applied Mathematics, 2009
    70
  26. J Deng, W Dong, R Socher, L-J Li, K Li, L Fei-Fei
    ImageNet: A Large-Scale Hierarchical Image Database. in IEEE Conf. on Computer Vision and Pattern Recognition (CVPR, 2009
    69
  27. G Boella, L W N van der Torre
    Regulative and constitutive norms in normative multiagent systems. In Proc. of KR, 2009
    67
  28. J Kleinberg, A Slivkins, T Wexler
    Triangulation and embedding using small sets of beacons J. ACM, 2009
    64
  29. O Gnawali, R Fonseca, K Jamieson, D Moss, P Levis
    Collection tree protocol. In Proc. 7th ACM Conf. Embedded Networked Sensor Systems (SenSys ’09, 2009
    63
  30. A Greenberg, J Hamilton, N Jain, S Kandula, C Kim, P Lahiri, D Maltz, P Patel, S Sengupta
    VL2: A scalable and flexible data center network In SIGCOMM, 2009
    63
  31. P Dung, R Kowalski, Toni
    F.: Assumption-based argumentation. Argumentation in AI, 2009
    62
  32. P J Bickel, Y Ritov, A Tsybakov
    Simultaneous analysis of lasso and the Dantzig selector, Ann. Statist, 2009
    62
  33. S Chong, J Liu, A C Myers, X Qi, K Vikram, L Zheng, X Zheng
    Secure web applications via automatic partitioning. 2009
    61
  34. T Blumensath, M E Davies
    Iterative hard thresholding for compressed sensing. Applied and Computational Harmonic Analysis, 2009
    60
  35. F Mérillon, L Réveillère, C Consel, R Marlet, G Muller
    Devil: An IDL for Hardware Programming. 2009
    60
  36. A G Greenwald, T A Poehlman, E Uhlmann, M R Banaji
    Measuring and using the Implicit Association Test: III. Meta-analysis of predictive validity. Journal of Personality and Social Psychology, 2009
    60
  37. A J Halderman, S D Schoen, N Heninger, W Clarkson, W Paul, J A Calandrino, A J Feldman, J Appelbaum, E W Felten
    Lest we remember: cold-boot attacks on encryption keys,” Commun. 2009
    60
  38. A Burns, A J Wellings
    Real-Time Systems and Programming Languages 2009
    60
  39. T Bosse, C M Jonker, L van der Meij, A Sharpanskykh, J Treur
    Specification and Verification of Dynamics in Cognitive Agent Models. International Journal of Cooperative Information Systems, 2009
    58
  40. J Pérez, M Arenas, Gutierrez
    C.: Semantics and Complexity of SPARQL. ACM Trans. Database Syst, 2009
    58
  41. Solvay Gerke, Judith Ehlert
    Local Knowledge as Strategic Resource: Fishery in the Seasonal Floodplains of the Mekong, 2009
    57
  42. Hans‐Dieter Evers, Gerke
    Strategic Group Analysis 2009
    56
  43. Wolfram Laube
    Changing the Course of History? Implementing water reforms in Ghana and South Africa, 2009
    56
  44. A Stepanov, McJones
    P.: Elements of Programming. 2009
    56
  45. Danilo Giampiccolo, Hoa Trang Dang, Bernardo Magnini, Ido Dagan, Bill Dolan
    The Fourth PASCAL Recognizing Textual Entailment Challenge. In Proceedings of TAC 2008 Workshop, 2009
    55
  46. V V Kozlov V I Arnold, A I Neishtadt
    Mathematical aspects of classical and celestial mechanics in Russian), Editorial URSS, 2009
    55
  47. Hans-Dieter Evers, Sven Genschick, Benjamin Schraven
    Constructing Epistemic Landscapes: Methods of GIS-Based Mapping 2009
    55
  48. Brazil Shadow
    WTO agricultural domestic support notifications Andre M. Nassar, 2009
    53
  49. A Pavlo, E Paulson, A Rasin, D J Abadi, D J DeWitt, S Madden, M Stonebraker
    A comparison of approaches to large-scale data analysis. In SIGMOD Conference, 2009
    53
  50. J Leskovec, L Backstrom, J Kleinberg
    Meme-tracking and the dynamics of the news cycle In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2009
    52
  51. S Wright, R Nowak, M Figueiredo
    Sparse reconstruction by separable approximation. IEEE Trans. Sig. Proc, 2009
    52
  52. V Chandola, A Banerjee, V Kumar
    Anomaly detection: A survey. ACM Computing Surveys, 2009
    50
  53. Mark Ronan
    Lectures on buildings 2009
    50
  54. IARC
    IARC monographs on the evaluation of carcinogenic risks to human, International Agency for Research on Cancer. Available at: http://www.iarc.fr ICES 2008a): Report of the Fourth ICES/OSPAR Workshop on Integrated Monitoring of Contaminants and their Effects in Coastal and Open Sea Areas (WKIMON IV), 5-7 February 2008, ICES, 2009
    49
  55. T Joachims, T Finley, C-N Yu
    Cutting-plane training of structural SVMs Machine Learning. http://www.springerlink.com/ content/h557723w88185170, 2009
    48
  56. A Narayanan, V Shmatikov
    De-anonymizing social networks. In IEEE Symp. Security and Privacy, 2009
    48
  57. Gerwin Klein, Kevin Elphinstone, Gernot Heiser, June Andronick, David Cock, Philip Derrin, Dhammika Elkaduwe, Kai Engelhardt, Rafal Kolanski, Michael Norrish, Thomas Sewell, Harvey Tuch, Simon Winwood
    sel4: Formal verification of an os kernel. In Proceedings of the 22nd ACM Symposium on Operating Systems Principles (SOSP, 2009
    47
  58. CUDA
    NVIDIA Compute Unified Device Architecture - Programming Guide - Version 2.2.1 NVIDIA Corporation, http://developer.download.nvidia.com/compute/cuda/2 21/ toolkit/docs/NVIDIA CUDA Programming Guide 2.2.1.pdf, 2009
    46
  59. Irit Eguavoen
    The Acquisition of Water Storage Facilities in the Abay River Basin, 2009
    46
  60. PHENIX Collab A
    Adare et al., Phys Rev. D79, 2009
    46
  61. http www metoffice gov uksciencecreatingdaysaheadnwpindex html
    Last accessed 2009
    45
  62. E J Candès, T Tao
    The power of convex relaxation: Near-optimal matrix completion. IEEE Transactions on Information Theory, 2009
    45
  63. N Kumar, A C Berg, P N Belhumeur, S K Nayar
    Attribute and simile classifiers for face verification. In ICCV’09, Kyoto, Japan, Sept.29 - Oct.2, 2009
    44