Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. Nobuhiro Kiyotaki, John Moore.
    Credit Cycles. Journal of Political Economy, 1997
    1025
  2. D Gelernter.
    Generative communication in Linda. ACM Transactions on Programming Languages and Systems, 1985
    1024
  3. Edmund Woronowicz.
    Relations and their basic properties. Formalized Mathematics, 1990
    1023
  4. H Rowley, S Baluja, T Kanade.
    Neural networkbased face detection. 2007 EURASIP 1944 15th European Signal Processing Conference (EUSIPCO 2007, 1998
    1020
  5. A Shleifer, R Vishny.
    A Survey of Corporate Governance. The Journal of Finance, 1997
    1016
  6. C P Robert, G Casella.
    Monte Carlo statistical methods. 2004
    1014
  7. Michael Garland, Paul S Heckbert.
    Surface Simplification Using Quadric Error Metrics. 1997
    1014
  8. Philipp Koehn, Hieu Hoang, Alexandra Birch, Chris Callison-Burch, Marcello Federico, Nicola Bertoldi, Brooke Cowan, Wade Shen, Christine Moran, Richard Zens, Chris Dyer, Ondrej Bojar, Alexandra Constantin, Evan Herbst.
    Moses: Open source toolkit for statistical machine translation. In Proceedings of the 45th Annual Meeting of the Association for Computational Linguistics Companion Volume Proceedings of the Demo and Poster Sessions, 2007
    1011
  9. R Dechter.
    Constraint Networks. In Encyclopedia of Artificial Intelligence, second edition, Wiley and Sons, 1992
    1007
  10. P Krugman.
    Increasing Returns and Economic Geography. Journal of Political Economy, 1991
    1006
  11. L E K P Vestka, J claude Latombe, M H Overmars.
    Probabilistic roadmaps for path planning in high-dimensional configuration spaces. IEEE Transactions on Robotics and Automation, 1996
    1004
  12. B Bernanke, M Gertler, S Gilchrist.
    The Financial Accelerator in a Quantitative Business Cycle Framework. in Taylor, J and M. Woodford (eds), Handbook of Macroeconomics, 1999
    1003
  13. J Y Campbell, J H Cochrane.
    By Force of Habit: A Consumption-Based Explanation of Aggregate. Stock Market Behavior, Journal of Political Economy, 1999
    1003
  14. J Kubiatowicz, D Bindel, Y Chen, P Eaton, D Geels, R Gummadi, S Rhea, H Weatherspoon, W Weimer, C Wells, B Zhao.
    Oceanstore: An architecture for global-scale persistent storage. In Proceedings of ACM ASPLOS. ACM, 2000
    999
  15. T von Eicken, D E Culler, S C Goldstein, K E Schauser.
    Active Messages: a mechanism for integrated communication and computation. In Proceedings of the 19th International Symposium on Computer Architecture, 1992
    992
  16. Julian Besag.
    On the statisical analysis of dirty pictures. Journal of the Royal Statistical Society B, 1986
    991
  17. E von Hippel.
    Democratizing innovation. 2004
    990
  18. R G Gallager.
    Low-Density Parity-Check Codes. 1963
    989
  19. R Milner.
    A theory of type polymorphism in programming. J. Computer and System Sciences, 1978
    984
  20. A Birrell, B Nelson.
    Implementing remote procedure calls. ACM Trans. on Computer Systems, 1984
    977
  21. M A Hearst.
    Automatic acquisition of hyponyms from large text corpora. In: Proceedings of COLING’92, 1992
    977
  22. D Estrin, R Govindan, J Heidemann, S Kumar.
    Next century challenges: Scalable coordination in sensor networks. in Proc. of ACM Mobicom, 1999
    976
  23. M Herlihy, J M Wing.
    Linearizability: a correctness condition for concurrent objects. ACM Transactions on Programming Languages and Systems, 1990
    975
  24. L Zhang, S Deering, D Estrin, S Shenker, D Zappala.
    RSVP: A New Resource ReSerVation Protocol. IEEE Network Magazine, 1993
    975
  25. M X Goemans, D P Williamson.
    Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming. Journal of Association for Computing Machinery, 1995
    974
  26. T Chandra, S Toueg.
    Unreliable Failure Detectors for Reliable Distributed Systems. Journal of the ACM, 1996
    974
  27. D J Teece, G Pisano, A Shuen.
    Dynamic Capabilities and Strategic Management. Strategic Management Journal, 1997
    971
  28. S Osher, J A Sethian.
    Front propagating with curvature dependent speed: Algorithms based on Hamilton-Jacobi formulations. Journal of Computational Physics, 1988
    971
  29. W Zhao, R Chellapa, P J Phillips, A Rosenfeld.
    Face Recognition: A Literature Survey. ACM Computing Surveys, 2003
    969
  30. C D Manning, P Raghavan, H Schütze.
    Introduction to information retrieval. 2008
    963
  31. N J Boden, D Cohen, R E Felderman, A E Kulawik, C L Seitz, J Seizovic, W Su.
    Myrinet - A gigabit per second local area network. IEEE Micro, 1995
    961
  32. J Kistler, M Satyanarayanan.
    Disconnected operation in the Coda file system. ACM Transactions on Computer Systems, 1992
    959
  33. M Rosenblum, J K Ousterhout.
    The design and implementation of a log-structured file system. ACM Transactions on Computer Systems, 1992
    957
  34. K Deb, S Agrawal, A Pratab, T Meyarivan.
    A fast and elitist multiobjective genetic algorithm: NSGAII. IEEE Trans. Evolutionary Computation, 2002
    956
  35. O Aharony, S S Gubser, J M Maldacena, H Ooguri, Y Oz.
    Large N field theories, string theory and gravity,” Phys. Rep. 323. 2000
    955
  36. P E Debevec, C J Taylor, J Malik.
    Modeling and rendering architecture from photographs: A hybrid geometryand image-based approach. Computer Graphics, 1996
    954
  37. D Heckerman, D Geiger, Chickering DM.
    Learning Bayesian networks: the combination of knowledge and statistical data. In Proceedings of the 10th Conference Uncertainty in Artificial Intelligence, 1994
    953
  38. O Hart, J Moore.
    Property rights and the nature of the firm. Journal of Political Economy, 1990
    952
  39. D Marr, E Hildreth.
    Theory of edge detection. Proc R Sot Lond [Biol, 1980
    952
  40. J Koza.
    Genetic Programming H. 1994
    949
  41. J Ponte, W Croft.
    A language modeling approach to information retrieval. In Proceedings of the 21st ACM SIGIR Conference on Research and Development in Information Retrieval, 1998
    948
  42. S Ni, Y Tseng, Y Chen, J Sheu.
    The broadcast storm problem in a mobile ad hoc network. in Proceedings of ACM MOBICOM'99, 1999
    947
  43. Z Zhang.
    A flexible new technique for camera calibration. IEEE Transactions on PAMI, 0
    947
  44. B Ewing, L Hillier, M C Wendl, P Green.
    Base-calling of automated sequencer traces using Phred. I. Accuracy assessment. Genome Res, 1998
    944
  45. R Reiter.
    A Theory of Diagnosis from First Principles. Artificial Intelligence, 1987
    943
  46. V D Park, M S Corson.
    A highly adaptive distributed routing algorithm for mobile wireless networks. in Proceedings of IEEE INFOCOM, Kobe, Japan, 1997
    942
  47. E Kohler, R Morris, B Chen, J Jannotti, M F Kaashoek.
    The Click modular router. ACM Transactions on Computer Systems, 2000
    941
  48. R E Bryant.
    Symbolic Boolean Manipulation with Ordered Binary Decision Diagrams. ACM Computing Surveys, 1992
    940
  49. A S Tanenbaum, “Modern.
    Operating Systems. 1992
    939
  50. C Reynolds.
    Flocks, Herds, and Schools: A Distributed Behavioral Model”, Proc.SIGGRAPH '87. Simulating Humans: Computer Graphics, Animation, and Control, 1987
    938
  51. R S Sutton, A G Barto.
    Introduction to reinforcement learning. 1998
    938
  52. G K Wallace.
    The JPEG still picture compression standard. IEEE Trans. on Consumer Electronics, 1992
    935
  53. A Said, W A Pearlman.
    A new fast and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans. on Circuits and Systems for Video Technology, 1996
    934
  54. O Sandberg I Clarke, B Wiley, T W Hong.
    Freenet: A distributed anonymous information storage and retrieval system. Proceedings ICSI Workshop Design Issues in Anonymity and Unobservability, 2000
    934
  55. Thorsten Joachims.
    Optimizing search engines using clickthrough data. in Proc. of ACM KDD’02, 0
    931
  56. G Adomavicius, A Tuzhilin.
    Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Transactions on Knowledge and Data Engineering, 0
    929
  57. L A Zadeh.
    The Concept of a Linguistic Variable and its Application to Approximate Reasoning. University of South Florida, USA, and Bilkent University, 1975
    929
  58. M Abadi, L Cardelli.
    A Theory of Objects. Monographs in Computer Science, 1996
    926
  59. M Dorigo, V Maniezzo, A Colorni.
    The ant system: optimization by a colony of cooperative agents. IEEE Transactions on System Man Cybernet, 1996
    926
  60. R G Downey, M R Fellows.
    Parameterized Complexity. 1999
    923
  61. R Fergus, P Perona, A Zisserman.
    Object class recognition by unsupervised scale-invariant learning. CVPR, 0
    916
  62. S P Lloyd.
    Least squares quantization in PCM. IEEE Transactions on Information Theory, 1982
    914
  63. M Grossglauser, D Tse.
    Mobility increases the capacity of ad-hoc wireless networks. in Proc. IEEE Infocom, 2001
    913
  64. A Rubinstein.
    Perfect Equilibrium in a Bargaining Model. Econometrica, 1982
    913
  65. K LI, P HUDAK.
    Memory coherence in shared virtual memory systems. ACM Trans. Comput. Syst, 1989
    912
  66. D Donoho.
    Denoising by soft thresholding. IEEE Trans. on Inform. Theory, 1995
    910
  67. S J Gortler, R Grzeszczuk, R Szeliski, M F Cohen.
    The lumigraph. In SIGGRAPH, 1996
    907
  68. L R Rabiner, B H Juang.
    An introduction to hidden Markov models. IEEE ASSP Magazine, 1986
    906
  69. M Roesch.
    Snort: Lightweight intrusion detection for networks. In Proceedings of the 1999 USENIX LISA Systems Administration Conference. (available on http://www.snort.org, 1999
    904
  70. J H Saltzer, D P Reed, D D Clark.
    End-to-End Arguments in System Design. ACM Transactions on Computer Systems, 1984
    903
  71. W T FREEMAN, E H ADELSON.
    The design and use of steerable filters. IEEE Transaction on Pattern Analysis and Machine Intelligence, 0
    902
  72. L K Grover.
    A fast quantum mechanical algorithm for database search. Proceedings, 28th ACM Symposium on Theory of Computing (STOC, 1996
    898
  73. F DABEK, F KAASHOEK, D KARGER, R MORRIS, I STOICA.
    Wide-area cooperative storage with CFS. In Proc. ACM Symposium on Operating Systems Principles (SOSP, 2001
    898
  74. L Breaslau, P Cao, L Fan, G Phillips, S Shenker.
    Web Caching and Zipf-like Distributions: Evidence and Implications. In Proc. of IEEE Infocom, 1999
    898
  75. R Durrett.
    Probability: theory and examples. 1996
    897
  76. Daron Acemoglu, Simon Johnson, James A Robinson.
    The Colonial Origins of Comparative Development: An Empirical Investigation. Alesina, Alberto and Paola Giuliano. “The Power of Family,” NBER Working Paper 13051, 2007
    896
  77. K Church, P Hanks.
    Word association norms, mutual information and lexicography. In ACL Proceedings, 27th Annual Meeting, 1989
    896
  78. Anand S Rao, Michael P Georgeff.
    Modeling rational agents within a bdi-architecture. in Proc. KR’92, 1991
    895
  79. D Jefferson.
    Virtual Time. ACM Transactions on Programming Languages and Systems, 1985
    895
  80. I Biederman.
    Recognition-by-Components: A Theory of Human Image. Understanding, Psychological Review, 1987
    893
  81. E J Candes, T Tao.
    Near-optimal signal recovery from random projections: universal encoding strategies. IEEE Trans. Inform. Theory, 0
    891
  82. I J Cox, J Killian, T Leighton, T Hamoon.
    Secure Spread Spectrum Watermarking for Multimedia. Tech. Rep. 95-10, NEC Research Institute, 1995
    889
  83. M Blaze, J Feigenbaum, J Lacy.
    Decentralized trust management. Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
    886
  84. P Viola, M Jones.
    Robust real-time objects detection. in Proc. of IEEE Workshop on Statistical Theories of Computer Vision, 2001
    885
  85. Stevan Harnad.
    The symbol grounding problem. Physica D, 1990
    884