Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. T White
    Hadoop: The Definitive Guide 2012
    125
  2. George E Dahl, Dong Yu, Li Deng, Alex Acero
    Context-dependent pre-trained deep neural networks for large-vocabulary speech recognition. Audio, Speech, and Language Processing, IEEE Transactions on, 2012
    90
  3. A Krizhevsky, I Sutskever, G E Hinton
    Imagenet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems (NIPS, 2012
    88
  4. P J Mohr, B N Taylor, D B Newell
    CODATA recommended values of the fundamental physical constants: 2010. doi: 10.1103/RevModPhys.84.1527. url: http://link.aps.org/doi/10.1103/ RevModPhys.84.1527, 2012
    84
  5. S N Negahban, P Ravikumar, P Ravikumar, M J Wainwright, B Yu
    A Unified framework for highdimensional analysis of M-Estimators with decomposable regularizers. Statis. Sci, 2012
    84
  6. G Imbens, K Kalyanaraman
    Optimal bandwidth choice for the regression discontinuity estimator Review of Economic Studies, 2012
    77
  7. A Cal̀ı, G Gottlob, T Lukasiewicz
    A general datalog-based framework for tractable query answering over ontologies. J. of Web Semantics, 2012
    72
  8. J E Laird
    The Soar Cognitive Architecture. 2012
    71
  9. D M Blei
    Introduction to probabilistic topic models. Communications of the ACM, 2012
    71
  10. M Bostock
    D3.js. Data Driven Documents. 2012
    65
  11. M Reitblatt, N Foster, J Rexford, C Schlesinger, D Walker
    Abstractions for network update. In SIGCOMM, 2012
    59
  12. M Brunnermeier, Y Sannikov
    A Macroeconomic Model with a Financial Sector,” mimeo. 2012
    59
  13. V Chandrasekhar, G Takacs, D Chen, S Tsai, Y Reznik, R Grzeszczuk, B Girod
    Compressed histogram of gradients: A low-bitrate descriptor. International Journal of Computer Vision, 2012
    57
  14. R Shimer
    Reassessing the Ins and Outs of Unemployment. Review of Economic Dynamics, 2012
    55
  15. A Delong, A Osokin, H N Isack, Boykov
    Y.: Fast approximate energy minimization with label costs. IJCV, 2012
    52
  16. Y Zhou, X Jiang
    Dissecting Android Malware: Characterization and Evolution in Proceedings of the 33rd IEEE Symposium on Security and Privacy, 2012
    50
  17. Geoffrey Hinton, Li Deng, Dong Yu, George E Dahl, Abdelrahman Mohamed, Navdeep Jaitly, Andrew Senior, Vincent Vanhoucke, Patrick Nguyen, Tara N Sainath
    neural networks for acoustic modeling in speech recognition: The shared views of four research groups. Signal Processing Magazine, IEEE, 2012
    50
  18. V V Williams
    Multiplying matrices faster than coppersmith-winograd. In Proceedings of STOC’12, 2012
    48
  19. Q Le, M Ranzato, R Monga, M Devin, K Chen, G Corrado, J Dean, A Ng
    Building high-level features using large scale unsupervised learning. In ICML, 2012
    47
  20. M Duarte, S Sarvotham, D Baron, M Wakin, R Baraniuk
    Distributed compressed sensing of jointly sparse signals. in Proc. 2005 Asilomar Conf. Signals, Syst. Computations, 2012
    47
  21. P Kazemian, G Varghese, N McKeown
    Header space analysis: static checking for networks. In Proc. NSDI, 2012
    47
  22. V Chandrasekaran, B Recht, P A Parrilo, A S Willsky
    The convex geometry of linear inverse problems. Foundations of Computational Mathematics, 2012
    44
  23. F Bach, R Jenatton, J Mairal, G Obozinski
    Optimization with sparsity-inducing penalties. Foundations and Trends in Machine Learning, 2012
    44
  24. A Geiger, P Lenz, R Urtasun
    Are we ready for autonomous driving? the kitti vision benchmark suite. in Computer Vision and Pattern Recognition (CVPR, 2012
    43
  25. J Dick-Nielsen, P Feldhutter, D Lando
    Corporate bond liquidity before and after the on-set of the subprime crisis Journal of Financial Economics, 2012
    42
  26. Richard Socher, Brody Huval, Christopher D Manning, Andrew Y Ng
    Semantic compositionality through recursive matrix-vector spaces. In Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, 2012
    41
  27. J Gall, A Yao, N Razavi, L Van Gool, V Lempitsky
    Hough forests for object detection, tracking, and action recognition. In ACCV, 2012
    41
  28. K Tutuncuoglu, A Yener
    Optimum transmission policies for battery limited energy harvesting nodes IEEE Trans. Wireless Comm, 2012
    40
  29. R C Johnson, G Noguera
    Accounting for Intermediates: Production Sharing and Trade in Value Added. Journal of International Economics, 2012
    40
  30. M Zhou, H Chen, J Paisley, L Ren, L Li, Z Xing, D Dunson, G Sapiro, L Carin
    Nonparametric Bayesian dictionary learning for analysis of noisy and incomplete images. IEEE Trans. Image Process, 2012
    39
  31. A P Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner
    Android permissions: User attention, comprehension, and behavior. In ACM SOUPS, 2012
    39
  32. T Menzies, B Caglayan, Z He, E Kocaguneli, J Krall, F Peters, B Turhan
    The promise repository of empirical software engineering data 2012
    39
  33. Hess Chung, Jean-Philippe Laforte, David Reifschneider, John C Williams
    Have We Underestimated the Likelihood and Severity of Zero Lower Bound Events. Journal of Money, Credit, and Banking, 2012
    38
  34. Shawn Cole, Xavier Gine, Jeremy Tobacman, Robert Townsend, Petia Topalova, James Vickery
    Barriers to Household Risk Management: Evidence from India”. Working Paper 09-116 2012
    37
  35. R Achanta, A Shaji, K Smith, A Lucchi, P Fua, S Süsstrunk
    SLIC superpixels compared to state-of-the-art superpixel methods ISSN, 2012
    37
  36. Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer
    From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. 3rd Innovations in Theoretial Computer Science, 2012
    37
  37. B Liu
    Sentiment analysis and opinion mining. Synthesis Lectures on Human Language Technologies, Morgan & Claypool, 2012
    37
  38. C Strecha, A Bronstein, M Bronstein, P Fua
    LDAHash: Improved matching with smaller descriptors. IEEE Trans. Pattern Analysis and Machine Intelligence, 2012
    37
  39. Sanford Friedenthal, Alan Moore, Rick Steiner
    A Practical Guide to SysML: The Systems Modeling Language 2012
    36
  40. M Rodriguez-Muro, Calvanese
    D.: High performance query answering over DL-Lite ontologies. In: Proc. of the 13th Int. Conf. on the Principles of Knowledge Representation and Reasoning (KR, 2012
    36
  41. N Silberman, D Hoiem, P Kohli, R Fergus
    Indoor Segmentation and Support Inference from RGBD Images. In ECCV, 2012
    36
  42. S DellaVigna, J A List, U Malmendier
    Testing for Altruism and Social Pressure in Charitable Giving. The Quarterly. Journal of Economics, 2012
    35
  43. K P Murphy
    Machine Learning: A Probabilistic Perspective TABLE VII THE SELECTED INPUTS AND LOO ERRORS FOR THE TRIAZINES DATA. BOLD VALUES REPRESENT OPTIMAL CHOICES IN THE SENSE OF THE LOWEST ERROR WITH THE SMALLEST SET OF, 2012
    35
  44. M Kaess, H Johannsson, R Roberts, V Ila, J Leonard, F Dellaert
    iSAM2: Incremental smoothing and mapping using the Bayes tree. Intl. J. of Robotics Research, 2012
    34
  45. Emmanuel Farhi, Jean Tirole
    Collective moral hazard, maturity mismatch and systemic bailouts. American Economic Review, 2012
    33
  46. C A Sutton, A McCallum
    An Introduction to Conditional Random Fields. Foundations and Trends in Machine Learning, 2012
    33
  47. “IEEE standard
    for local and metropolitan area networks IEEE 802.15.6-2012 — Part 15.6: Wireless Body Area networks, 2012
    33
  48. M C Grace, W Zhou, X Jiang, Sadeghi
    A.R.: Unsafe exposure analysis of mobile in-app advertisements. In: Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC, 2012
    33
  49. Y Low, D Bickson, J Gonzalez, C Guestrin, A Kyrola, J M Hellerstein
    Distributed GraphLab: a framework for machine learning and data mining in the cloud. VLDB Endow, 2012
    33
  50. C Chekuri, N Korula, M Pál
    Improved algorithms for orienteering and related problems. ACM Transactions on Algorithms (TALG, 2012
    33
  51. A Banfi, G P Salam, G Zanderighi, J High
    Energy Phys 2012
    32
  52. Roger A Horn, Charles R Johnson
    Matrix analysis. Cambridge university press 2012
    32
  53. G Bosilca, A Bouteiller, A Danalis, T Herault, P Lemarinier, J Dongarra
    DAGuE: A generic distributed DAG engine for High Performance. Computing,” Parallel Computing, 2012
    31
  54. D Mellinger, N Michael, V Kumar
    Trajectory generation and control for precise aggressive maneuvers with quadrotors Internatiional Journal of Robotics Research, 2012
    31
  55. J Laurila, D Gatica-Perez, I Aad, J Blom, O Bornet, T Do, O Dousse, J Eberle, M Miettinen
    The mobile data challenge: Big data for mobile computing research. In Mobile Data Challenge by Nokia Workshop, in conjunction with International Conference on Pervasive Computing, 2012
    31
  56. C Le Goues, M Dewey-Vogt, S Forrest, W Weimer
    A Systematic Study of Automated Program Repair: Fixing 55 out of 105 Bugs for $8 each. in: International Conference on Software Engineering, 2012
    31
  57. J Bonneau
    The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In: Proc. 33th IEEE Symp. on Security and Privacy, 2012
    31
  58. Supply
    demand for cereals in 2012
    31
  59. M Roughan, Y Zhang, W Willinger, L Qiu
    Spatio-temporal compressive sensing and internet traffic matrices. IEEE/ACM Transactions on Networking, 2012
    31
  60. Jason Abaluck, Jonathan Gruber
    Choice Inconsistencies Among the Elderly: Evidence from Plan Choice in the Medicare Part D Program”, Forthcoming: American Economic Review, 2012
    31
  61. G E Hinton, N Srivastava, A Krizhevsky, I Sutskever, R R Salakhutdinov
    Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580. 2012
    31
  62. M Canini, D Venzano, P Perešíni, D Kostić, J Rexford
    A NICE way to test OpenFlow applications In Proc. NSDI, 2012
    30
  63. A Pathak, Y C Hu, M Zhang
    Where is the energy spent inside my app?: fine grained energy accounting on smartphones with Eprof. in Proceedings of the 7th ACM european conference on Computer Systems, 2012
    30
  64. Jia Deng, Alex Berg, Sanjeev Satheesh, Hao Su, Aditya Khosla, Fei-Fei Li
    Large scale visual recognition challenge In http://www.imagenet.org/challenges/LSVRC/2012/index, 2012
    30
  65. J CANDIA, M C GONZÁLEZ, P WANG, T SCHOENHARL, G MADEY, A L BARABÁSI
    Uncovering individual and collective human dynamics from mobile phone records 2012
    30
  66. B Kreuter, a shelat, C-H Shen
    Billion-gate secure computation with malicious adversaries. In Proceedings of the USENIX Security Symposium, 2012
    30
  67. A Talwalkar, S Kumar, H Rowley
    Large-scale manifold learning. University of Maryland, College, 2012
    29
  68. D Micciancio, C Peikert
    Trapdoors for Lattices In EUROCRYPT, volume 7237 of LNCS, 2012
    29
  69. C Gentry, S Halevi, N Smart
    Fully homomorphic encryption with polylog overhead. Advances in Cryptology–EUROCRYPT 2012, 2012
    29
  70. S Petrov, D Das, R McDonald
    A universal part-of-speech tagset. In LREC, 2012
    29
  71. J M Bioucas-Dias, A Plaza, N Dobigeon, M Parente, Q Du, P Gader
    Hyperspectral unmixing overview: Geometrical, statistical, and sparse regression-based approaches. IEEE J. Sel. Topics Appl. Earth Observ, 2012
    28
  72. J C Corbett, J Dean, M Epstein, A Fikes, C Frost, J J Furman, S Ghemawat, A Gubarev, C Heiser, P Hochschild, W Hsieh, S Kanthak, E Kogan, H Li, A Lloyd, S Melnik, D Mwaura, D Nagle, S Quinlan, R Rao, L Rolig, Y Saito, M Szymaniak, C Taylor, R Wang, D Woodford
    Spanner: Google’s globally-distributed database. In OSDI, 2012
    28
  73. C Ellison, G Rosu
    An executable formal semantics of c with applications In Proceedings of the 39th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL ’12, 2012
    28
  74. J Mairal, F Bach, J Ponce
    Task-driven dictionary learning. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2012
    27
  75. K E Taylor, R J Stouffer, G A Meehl
    An overview of CMIP5 and the experiment design Bull. Am. Meteorol. Soc, 2012
    27
  76. J Bricongne, L Fontagné, G Gaulier, D Taglioni, V Vicard
    Firms and the Global Crisis: French Exports in the Turmoil Journal of International Economics, 2012
    27
  77. J Salamon, E Gómez
    Melody extraction from polyphonic music signals using pitch contour characteristics. IEEE Transactions on Audio, Speech and Language Processing, 2012
    27
  78. N Nadhem, K Paterson
    Plaintext-recovery attacks against datagram TLS. Network and Distributed System Security Symposium, 2012
    27
  79. E Kushilevitz, S Lu, R Ostrovsky
    On the (in)security of hash-based oblivious RAM and a new balancing scheme. In SODA, 2012
    27
  80. E Stefanov, E Shi, D Song
    Towards practical oblivious RAM In Proceedings of Network and Distributed System Security Symposium, 2012
    27