Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. S Baker, D Scharstein, J P Lewis, S Roth, M J Black, S R
    A database and evaluation methodology for optical flow. Int. J. Comput. Vision, 2011
    239
  2. P Mell, T Grance
    The NIST definition of cloud computing recommendations of the National Institute of Standards and Technology” Special Publication 800-145, 2011
    160
  3. L Bottou, O Bousquet
    The tradeoffs of large scale learning. In Optimization for Machine Learning, 2011
    147
  4. R W G HUNT, M POINTER
    R.: Measuring Colour 2011
    134
  5. A P Felt, E Chin, S Hanna, D Song, D Wagner
    Android permissions demystified. In ACM CCS, 2011
    108
  6. R Jenatton, J Y Audibert, F Bach
    Structured Variable Selection with Sparsity-Inducing Norms. Journal of Machine Learning Research, 2011
    99
  7. W Enck, D Octeau, P McDaniel, S Chaudhuri
    A Study of Android Application Security. In Proc. of the USENIX Security Symposium, 2011
    98
  8. D J Sheskin
    Handbook of Parametric and Nonparametric Statistical Procedures, Chapman & Hall/CRC, Boca, 2011
    98
  9. L Xu, F Hutter, H H Hoos, Leyton-Brown
    K.: SATzilla: Portfolio-based algorithm selection for SAT. CoRR, 2011
    94
  10. P L Combettes, J-C Pesquet
    Proximal splitting methods in signal processing. In Fixed-Point Algorithms for Inverse Problems in Science and Engineering, 2011
    93
  11. R Newcombe, A Davison, S Izadi, P Kohli, O Hilliges, J Shotton, D Molyneaux, S Hodges, D Kim, A Fitzgibbon
    KinectFusion: Real-time dense surface mapping and tracking. In IEEE and ACM Intl. Sym. on Mixed and Augmented Reality (ISMAR, 2011
    90
  12. J Bollen, H Mao, X Zeng
    Twitter mood predicts the stock market Journal of Computational Science, 2011
    89
  13. M Kwiatkowska, G Norman, D Parker
    PRISM 4.0: Verification of Probabilistic Realtime Systems. In Proc. CAV’11. LNCS 6806, 2011
    86
  14. A Coates, H Lee, A Y Ng
    An analysis of single-layer networks in unsupervised feature learning. In AISTATS, 2011
    86
  15. B-G CHUN, S IHM, P MANIATIS, M NAIK, A PATTI
    Clonecloud: elastic execution between mobile device and cloud In EuroSys, 2011
    79
  16. P Bustos
    Trade Liberalization, Exports, and Technology Upgrading: Evidence on the Impact. of MERCOSUR on Argentinian Firms,” American Economic Review, 2011
    79
  17. H H Holger, Stützle
    T.: SATLIB: An Online Resource for Research on SAT. Proceedings of Theory and Applications of Satisfiability Testing, 4th International Conference (SAT 2000, 2011
    78
  18. B Hindman, A Konwinski, M Zaharia, A Ghodsi, A D Joseph, R Katz, S Shenker, I Stoica
    Mesos: A platform for fine-grained resource sharing in the data center. In Proc. of NSDI, 2011
    76
  19. A Quinn, B Bederson
    Human computation: a survey and taxonomy of a growing field In Proc. CHI’11, ACM, 2011
    73
  20. D Acemoglu, D Autor
    Skills, Tasks and Technologies: Implications for Employment and Earnings. Handbook of Labor Economics 4B, 2011
    73
  21. J Kober, J Peters
    Policy search for motor primitives in robotics. Machine Learning, 2011
    73
  22. Kevin Gimpel, Nathan Schneider, Brendan O’Connor, Dipanjan Das, Daniel Mills, Jacob Eisenstein, Michael Heilman, Dani Yogatama, Jeffrey Flanigan, Noah A Smith
    Part-of-Speech Tagging for Twitter: Annotation, Features, and Experiments. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies (Short Papers). The Association for Computer Linguistics, 2011
    72
  23. M TABOADA, J BROOKS, M TOFILOSKI, K VOLL, M STEDE
    Lexicon-Based Methods for Sentiment Analysis. Computational Linguistics, 2011
    72
  24. D Kahneman
    Thinking Fast and Slow 2011
    70
  25. M J Franklin, D Kossmann, T Kraska, S Ramesh, R Xin
    Crowddb: answering queries with crowdsourcing In SIGMOD, 2011
    70
  26. S Melnik, A Gubarev, J J Long, G Romer, S Shivakumar, M Tolton, T Vassilakis
    Dremel: interactive analysis of web-scale datasets. Commun. ACM, 2011
    67
  27. C Gentry, S Halevi
    Implementing gentry’s fully-homomorphic encryption scheme. In EUROCRYPT, 2011
    66
  28. B Farb, D Margalit
    A Primer on Mapping Class Groups 2011
    66
  29. J K Aggarwal, M S Ryoo
    Human activity analysis: A review. ACM Computing Surveys, 2011
    65
  30. S B Thompson
    Simple formulas for standard errors that cluster by both firm and time Journal of Financial Economics, 2011
    64
  31. J Duchi, E Hazan, Y Singer
    Adaptive subgradient methods for online learning and stochastic optimization. The Journal of Machine Learning Research, 2011
    63
  32. S P Borgatti, M G Everett, L C Freeman
    UCINET 6 for Windows: Software for Social Network Analysis 2011
    63
  33. L Backstrom, J Leskovec
    Supervised random walks: predicting and recommending links in social networks. In Proceedings of the fourth ACM international conference on Web search and data mining, WSDM ’11, 2011
    62
  34. S P Kasiviswanathan, H K Lee, K Nissim, S Raskhodnikova, A Smith
    What can we learn privately. SIAM Journal on Computing, 2011
    62
  35. P N Mendes, M Jakob, A García-Silva, C Bizer
    DBpedia Spotlight: Shedding Light on the Web of Documents. 7th International Conference on Semantic Systems (I-Semantics, 2011
    61
  36. D Gross
    Recovering low-rank matrices from few coefficients in any basis IEEE Trans. Inf. Theor, 2011
    61
  37. M Yu, Y Yi, J Rexford, M Chiang
    Rethinking virtual network embedding: substrate support for path splitting and migration. ACM SIGCOMM Computer Communication Review 64 Volume 41, Number 2, 2011
    61
  38. E Chin, A P Felt, K Greenwood, D Wagner
    Analyzing inter-application communication in android. In ACM MobiSys, 2011
    60
  39. J Baker, C Bond, J C Corbett, J J Furman, A Khorlin, J Larson, J-M Leon, Y Li, A Lloyd, V Yushprakh
    Megastore: Providing scalable, highly available storage for interactive services. In CIDR, 2011
    60
  40. A Iosup, S Ostermann, M N Yigitbasi, R Prodan, T Fahringer, D H Epema
    Performance Analysis of Cloud Computing. Services for Many-Tasks Scientific Computing,” IEEE Transactions on Parallel and Distributed Systems, 2011
    60
  41. M Buhrmester, T Kwang, S D Gosling
    Amazon’s Mechanical Turk: A new source of inexpensive, yet high-quality data Perspectives on Psychological Science, 2011
    59
  42. Nate Foster, Rob Harrison, Michael J Freedman, Christopher Monsanto, Jennifer Rexford, Alec Story, David Walker
    Frenetic: A network programming language. In ICFP, 2011
    58
  43. Z Brakerski, V Vaikuntanathan
    Efficient fully homomorphic encryption from (standard) LWE. In FOCS, 2011
    57
  44. J Yang, J Leskovec
    Patterns of Temporal Variation in Online Media. In proceedings of the ACM International Conference on Web Search and Data Mining (WSDM, 2011
    57
  45. M Lin, A Wierman, L Andrew, E Thereska
    Dynamic Right-sizing for Power-proportional Data Centers. Proc. of 30th IEEE International Conference on Computer Communications, 2011
    57
  46. A Ghodsi, M Zaharia, B Hindman, A Konwinski, S Shenker, I Stoica
    Dominant resource fairness: Fair allocation of multiple resource types. in Proc. USENIX NSDI, 2011
    56
  47. J H Clark, C Dyer, A Lavie, N A Smith
    Better hypothesis testing for statistical machine translation: controlling for optimizer instability. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies: short papers - Volume 2, HLT ’11, 2011
    56
  48. A P Felt, H J Wang, A Moshchuk, S Hanna, E Chin
    Permission redelegation: Attacks and defenses. In USENIX Security Symposium, 2011
    55
  49. Jonathan Koomey
    Growth in Data Center Electricity Use 2005 to 2010 In Analytics Press, 2011
    55
  50. S Izadi, D Kim, O Hilliges, D Molyneaux, R Newcombe, P Kohli, J Shotton, S Hodges, D Freeman, A Davison, A Fitzgibbon
    KinectFusion: Real-time 3D Reconstruction and Interaction Using a Moving Depth Camera. In Proc. ACM UIST, 2011
    55
  51. R Newcombe, S Lovegrove, A Davison
    DTAM: Dense tracking and mapping in real-time. In Intl. Conf. on Computer Vision (ICCV, 2011
    55
  52. K Lai, B Liefeng, R Xiaofeng, D Fox
    A large-scale hierarchical multi-view rgb-d object dataset. In Robotics and Automation (ICRA), 2011 IEEE International Conference on, 2011
    55
  53. P Ferraris, J Lee, V Lifschitz
    Stable models and circumscription. Artificial Intelligence, 2011
    55
  54. S Karaman, E Frazzoli
    Sampling-based algorithms for optimal motion planning,” The Int. Journal of Robotics Research, 2011
    54
  55. M Dietz, S Shekhar, Y Pisetsky, A Shu, D S Wallach
    Quire: Lightweight provenance for smart phone operating systems. In USENIX Security Symposium, 2011
    54
  56. M Egele, C Kruegel, E Kirda, Vigna
    G.: PiOS: Detecting Privacy Leaks in iOS Applications. In: Proceedings of the 18th Annual Network and Distributed System Security Symposium,. NDSS, The Internet Society, 2011
    54
  57. M Schularick, A Taylor
    Credit Booms Gone Bust Monetary Policy, Leverage Cycles, and Financial Crises, 2011
    54
  58. Y Huang, D Evans, J Katz, L Malka
    Faster secure two-party computation using garbled circuits. In Proceedings of the 20th USENIX Conference on Security, SEC’11, 2011
    53
  59. Conrad DF, D Pinto, R Redon, L Feuk, O Gokcumen, Y Zhang, J Aerts, Andrews TD, C Barnes, P Campbell
    Origins and functional impact of copy number variation in the human genome. Nature 464: 704–712 2011
    52
  60. C Syverson
    What Determines Productivity Journal of Economic Literature, 2011
    51
  61. A El Gamal, Y-H Kim
    Network Information Theory 2011
    51
  62. H Ballani, P Costa, T Karagiannis, A Rowstron
    Towards predictable datacenter networks. 2011
    51
  63. A Torralba, Efros
    A.A.: Unbiased look at dataset bias. 2011
    51
  64. T Bertin-Mahieux, D P Ellis, B Whitman, P Lamere
    The Million Song Dataset In Proceedings of the 12th International Conference on Music Information Retrieval, 2011
    50
  65. J R Kwapisz, G M Weiss, S A Moore
    Activity recognition using cell phone accelerometers. SIGKDD Explor. Newsl, 2011
    50
  66. Yue Jia, Mark Harman
    An Analysis and Survey of the Development of Mutation Testing. Software Engineering, IEEE Transactions on, 2011
    50
  67. L Ratinov, D Roth, D Downey, M Anderson
    Local and Global Algorithms for Disambiguation to Wikipedia. ACL 2011
    49
  68. A P Felt, K Greenwood, D Wagner
    The effectiveness of application permissions. In USENIX WebApps, 2011
    49
  69. J Ernst, P Kheradpour, Mikkelsen TS, N Shoresh, Ward LD, Epstein CB, X Zhang, L Wang, R Issner, M Coyne
    Mapping and analysis of chromatin state dynamics in nine human cell types.Nature 473 2011
    49
  70. C Castillo, M Mendoza, B Poblete
    Information Credibility on Twitter. in: Proceedings of the 20th international conference on World wide web, 2011
    49
  71. Vasco Cúrdia, Michael Woodford
    The Central-Bank Balance Sheet as an Instrument of Monetary Policy. Journal of Monetary Economics, 2011
    49
  72. D G MURRAY, M SCHWARZKOPF, C SMOWTON, S SMITH, A MADHAVAPEDDY, S HAND
    CIEL: A Universal Execution Engine for Distributed Data-Flow Computing. In NSDI, 2011
    48
  73. S Wu, J M Hofman, W A Mason, D J Watts
    Who says what to whom on twitter. In Proceedings of the international conference on World Wide Web, 2011
    48
  74. Dan Boneh, Amit Sahai, Brent Waters
    Functional encryption: Definitions and challenges. TCC 2011: 8th Theory of Cryptography Conference, 2011
    48
  75. K Chatfield, V Lempitsky, A Vedaldi, A Zisserman
    The devil is in the details: an evaluation of recent feature encoding methods 2011
    47
  76. A Curtis, J Mogul, J Tourrilhes, P Yalagandula, P Sharma, S Banerjee
    DevoFlow: Scaling Flow Management for High-Performance Networks. In SIGCOMM, 2011
    47
  77. Nikhil Swamy, Juan Chen, Cedric Fournet, Pierre-Yves Strub, Karthikeyan Bhargavan, Jean Yang
    Secure distributed programming with valuedependent types. In Proceedings of the 16th ACM SIGPLAN international conference on Functional programming, 2011
    47
  78. A Kittur, B Smus, S Khamkar, R Kraut
    E.: Crowdforge: Crowdsourcing complex work. Proceedings of the 24th annual ACM symposium on User interface software and technology , ACM, 2011
    47
  79. J Lehman, Stanley
    K.: Abandoning Objectives: Evolution through the Search for Novelty Alone. Evolutionary Computation Journal, 2011
    47
  80. G Gottlob, G Orsi, A Pieris
    Ontological queries: Rewriting and optimization In Proc. of ICDE 2011, 2011
    46
  81. A Fader, S Soderland, O Etzioni
    Identifying relations for open information extraction. In EMNLP, 2011
    46