Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. Robert P Wilson, Monica S Lam.
    Efficient context-sensitive pointer analysis for c programs. In Proceedings of the ACM SIGPLAN 1995 Conference on Programming Language Design and Implementation, 1995
    411
  2. B P Miller, J M Cargille Callaghan, J K Hollingsworth, R B Irvin, K L Karavanic, K Kunchithapadam, T Newhall.
    The Paradyn parallel performance measurement tool. IEEE Computer, 1995
    408
  3. N Srinivas, K Deb.
    Multiobjective optimization using nondominated sorting in genetic algorithms. Evolutionary Computation, 1995
    406
  4. C M Fonseca, P J Fleming.
    An overview of evolutionary algorithms in multiobjective optimization. Evolutionary Computation, 1995
    402
  5. S Shenker.
    Fundamental design issues for the future Internet. IEEE Journal on Selected Areas in Communications, 1995
    401
  6. D J HEEGER, J R BERGEN.
    Pyramid-based texture analysis/synthesis. In Proceedings of the 22nd annual conference on Computer graphics and interactive techniques, 1995
    400
  7. S Acharya, R Alonso, M Franklin, S Zdonik.
    Broadcast disks: data management for asymmetric communication enviroments. ACM SIGMOD, 1995
    400
  8. M Stricker, M Orengo.
    Similarity of Color Images. In Proceeding SPIE Storage and Retrieval for Image and Video Databases, 1995
    399
  9. A Savasere, E Omiecinski, S Navathe.
    An efficient algorithm for mining association rules in large databases. Proc. 21st Int. Conf. Very Large Data Bases, 1995
    397
  10. J Han, Y Fu.
    Discovery of multiple-level association rules from large databases. in Proc. 21st Int. Conf. Very Large Data Bases, 1995
    393
  11. H Balakrishnan, S Seshan, E Amir, Randy H Katz.
    Improving TCP/IP Performance over Wireless Networks. In Proceedings of the 1st ACM International Conference on Mobile Computing and Networking (Mobicom, 1995
    393
  12. B B Bedersen, J Hollan.
    Pad++: A zooming graphical interface for exploring alternate interface physics. In P. Szekely, (Ed.), Proceedings of the 7th Annual ACM Symposium on User interface software and technology, 1995
    391
  13. T REPS, S HORWITZ, M SAGIV.
    Precise interprocedural dataflow analysis via graph reachability. In ACM Symposium on Principles of Programming Languages, 1995
    388
  14. H Garcia-Molina, Y Papakonstantinou, D Quass, A Pjaraman, Y Sagiv, J Ullman, J Widom.
    The TSIMMIS approach to mediation: Data models and languages (extended abstract). Next Generation Information Technologies and Systems. 1995
    388
  15. S Chib.
    Marginal Likelihood From the Gibbs Output. Journal of American Statistical Association, 1995
    382
  16. V Pavlovic.
    Visual interpretation of hand gestures for human computer interaction. Proc. Human Interaction with Complex Systems, 1995
    380
  17. Jochen Liedtke.
    On microkernel construction. In Proceedings of the 15th ACM Symposium on Operating System Principles (SOSP-15), Copper Mountain Resort, 1995
    377
  18. A G Greenwald, M R Banaji.
    Implicit social cognition: Attitudes, self-esteem, and stereotypes. Psychological Review, 1995
    374
  19. M Ajmone Marsan, G Balbo, G Conte, S Donatelli, G Franceschinis.
    Modelling with Generalized Stochastic Petri Nets. 1995
    371
  20. J Lamping, R Rao, P Pirolli.
    A Focus+Context Technique Based on Hyperbolic Geometry for Visualizing Large Hierarchies. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (ACM, 1995
    365
  21. R H Patterson, G A Gibson, E Ginting, D Stodolsky, J Zelenka.
    Informed prefetching and caching. In Proceedings of the 15th ACM Symposium on Operating System Principles, 1995
    363
  22. M Kontsevich.
    Homological algebra of mirror symmetry. in Proceedings of the International Congress of Mathematicians, 1995
    360
  23. D Chess, C Harrison, A Kershenbaum.
    Mobile Agents: Are they a good idea. Technical Report. IBM T. J. Watson Research Centre N.Y, 1995
    357
  24. M X Goemans, D P Williamson.
    A general ap- proximation technique for constrained forest problems. SIAM Journal on Computing, 1995
    357
  25. S McCanne, V Jacobson.
    vic: a flexible framework for packet video. In Proceedings of the Third ACM International Conference on Multimedia, 1995
    354
  26. D Adalsteinsson, J A Sethian.
    A fast level set method for propagating interface. Journal of Computational Physics, 1995
    351
  27. D C Luckham, L M Augustin, J J Kenny, J Veera, D Bryan, W Mann.
    Specification and analysis of system architecture using Rapide. IEEE Transactions on Software Engineering, 1995
    344
  28. G Murphy, D Notkin, K Sullivan.
    Software Reflexion Models: Bridging the gap between Source and High-Level Models. Proceedings of SIGSOFT ’95, Third ACM SIGSOFT Symposium on the Foundations of Software Engineering, ACM, 1995
    344
  29. G H John, P Langley.
    Estimating continuous distributions in bayesian classifiers. In UAI ’95, 1995
    343
  30. E Ukkonen.
    On-line construction of suffix trees. Algorithmica, 1995
    342
  31. David M Magerman.
    Statistical decision-tree models for parsing. In Proceedings of the 33rd Annual Meeting of the Association for Computational Linguistics (ACL, 1995
    338
  32. H Balakrishnan, S Seshan, R H Katz.
    Improving Reliable Transport and Handoff Performance. in Cellular Wireless Networks,” Wireless Networks, 1995
    338
  33. M Deering.
    Geometry Compression. In SIGGRAPH 95, 1995
    336
  34. M Shaw, R DeLine, D V Klein, T L Ross, D M Young, G Zelesnick.
    Abstractions for software architecture and tools to support hem. IEEE Trans on Software Engineering, 1995
    334
  35. F Girosi, M Jones, T Poggio.
    Regularization theory and neural networks architectures. Neural Computation, 1995
    331
  36. J D Sachs, A Warner.
    Economic reform and the process of global integration. Brookings Papers on Economic Activity, 1995
    329
  37. R Armstrong, D Freitag, T Joachims, T Mitchell.
    Webwatcher: A learning apprentice for the world wide web. Proceedings of the 1995 AAAI Spring Symposium on Information Gathering from Heterogeneous, Distributed Environments, 1995
    324
  38. Y Lee, D Terzopoulos, K Waters.
    Realistic Modeling for Facial Animation. In Computer Graphics Proceedings, Annual Conference Series, 1995
    322
  39. B Fritzke.
    A growing neural gas network learns topologies. Advances in Neural Information Processing Systems 7, 1995
    321
  40. A E Raftery.
    Bayesian model selection in social research. Sociological Methodology, 1995
    321
  41. M A Hernández, S J Stolfo.
    The merge/purge problem for large databases. In Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data (SIGMOD-95, 1995
    320
  42. R RAZ.
    A parallel repetition theorem. In Proceedings of the 27th Annual ACM Symposium on the Theory of Computing (Las Vegas, Nev., May 29 –June 1). ACM, 1995
    319
  43. J N Tsitsiklis.
    Efficient algorithms for globally optimal trajectories. IEEE Tran. Automatic. Control, 1995
    316
  44. D A Cox.
    The homogeneous coordinate ring of a toric variety. J. Algebraic Geom, 1995
    315
  45. G Smolka.
    The Oz Programming Model. Computer Science Today, Lecture Notes in Computer Science, 1995
    314
  46. H Byrd, P Lu, J Nocedal, C Zhu.
    A limited memory algorithm for bound constrained optimization. SIAM Journal of Scientific Computing, 1995
    314
  47. Manuel Blum, Sampath Kannan.
    Designing programs that check their work. Journal of the ACM, 1995
    313
  48. William A Wulf, Sally A McKee.
    Hitting the memory wall: implications of the obvious. Computer-Architecture-News, 1995
    311
  49. Sam Owre, John Rushby, Natarajan Shankar, Friedrich von Henke.
    Formal verification for fault-tolerant architectures: Prolegomena to the design of PVS. IEEE Transactions on Software Engineering, 1995
    311
  50. Sugih Jamin, Peter B Danzig, Scott Shenker, Lixia Zhang.
    A measurementbased admission control algorithm for integrated services packet networks. In Proceedings of ACM SIGCOMM ’95, 1995
    308
  51. D C Brogan J F O’Brien J K Hodgins, W L Wooten.
    Animating human athletics. In Proceedings of the 22nd International Conference on Computer Graphics and Interactive Techniques, 1995
    306
  52. C Huitema.
    Routing in the Internet. 1995
    304
  53. K ILGUN, R A KEMMERER, P A PORRAS.
    State transition analysis: a rule-based intrusion detection approach. IEEE Trans. Softw. Engng, 1995
    303
  54. Steven Berry, James Levinsohn, Ariel Pakes.
    Automobile Prices in Market Equilibrium. Econometrica, 1995
    302
  55. S W Wilson.
    Classifier fitness based on accuracy. Evolutionary Computation, 1995
    301
  56. J Plank, M Beck, G Kingsley, K Li.
    Libckpt: Transparent Checkpointing under Unix. Proc. Usenix, 1995
    301
  57. M A Hearst.
    Tilebars: Visualization of term distribution information in full text information access. In ACM SIGCHI Conference on Human Factors in Computing Systems, 1995
    301
  58. T Sterling, D Becker, D Savarese.
    Beowulf: A Parallel Workstation for Scientific Computation. Proceedings of the Fourth 1995 International Conference on Parallel Processing (ICPP, 1995
    299
  59. R Rivest.
    The RC5 encryption algorithm. Dr. Dobbs Journal, 1995
    297
  60. C A Cunha, A Bestavros, M Crovella.
    Characteristics of WWW client-based trace. 1995
    295
  61. R Caceres, L Iftode.
    Improving the Performance of Reliable Transport Protocols in Mobile Computing Environments. IEEE Journal on Selected Areas in Communications, 1995
    295
  62. M Talagrand.
    Concentration of measure and isoperimetric inequalities in product spaces. Inst. Hautes Études Sci. Publ. Math, 1995
    294
  63. Thomas Schiex, Hélène Fargier, Gérard Verfaillie.
    Valued constraint satisfaction problems: Hard and easy problems. in Proceedings of IJCAI’95, 1995
    292
  64. J Cohen, M Lin, D Manocha, K Ponamgi.
    I-COLLIDE: An Interactive and Exact Collision Detection System for LargeScaled Environments. In In Proceedings of ACM International 3D Graphics Conference, 1995
    291
  65. S Hannenhalli, P A Pevzner.
    Transforming cabbage into turnip (Polynomial algorithm for sorting signed permutations by reversals. In: Proceedings of the 27th Annual ACM Symposium on Theory of Computing, 1995
    290
  66. Shigeru Chiba.
    A metaobject protocol for c. In OOPSLA, 1995
    290
  67. Rob Gerth.
    Simple on-the-fly automatic verification of linear temporal logic. In Protocol Specification Testing and Verification, 1995
    287
  68. A Gupta, I S Mumick.
    Maintenance of materialized views: Problems, techniques, and applications. IEEE Data Engineering Bulletin, Special Issue on Materialized Views and Data Warehousing, 1995
    287
  69. J R Larus, eric Schnarr.
    EEL: Machine-Independent Executable Editing. In Proceedings of the SIGPLAN ’95 Conference on Programming Language Design and Implementation, 1995
    285
  70. E A Lee, T M Parks.
    Dataflow process networks. In Proceedings of the IEEE, 1995
    285
  71. J MacKie-Mason, H Varian.
    Pricing congestible network resources. IEEE Journal on Selected Areas In Communications, 1995
    284
  72. C Jacobs, A Finkelstein, D Salesin.
    Fast Multiresolution Image Querying. Proceedings of SIGGAPH 95, in Computer Graphics Proceedings, Annual Conference Series, 1995
    283
  73. Alvin E Roth.
    Bargaining Experiments. Handbook of Experimental Economics, 1995
    283
  74. O Rose.
    Statistical properties of MPEG video traffic and their impact on traffic modeling. in ATM systems”. IEEE Conference on Local Computer Networks, 1995
    283
  75. M Stonebraker.
    Chabot: Retrieval from a Relational Database of Images. IEEE Computer, 1995
    281
  76. G Gigerenzer, U Hoffrage.
    How to improve Bayesian reasoning without instruction: Frequency formats. Psychological Review, 1995
    280
  77. K Govil, E Chan, H Wasserman.
    Comparing algorithms for dynamic speed-setting of a low-power cpu. In 1st Int'l Conference on Mobile Computing and Networking, 1995
    280
  78. J H Hartman, J K Ousterhout.
    The Zebra striped network file system. ACM Transactionson Computer Systems, 1995
    279
  79. M Wooldridge, N R Jennings.
    Agent Theories, Architectures and Languages: a Survey. in Wooldridge & Jennings eds. Intelligent Agents, 1995
    276
  80. William Harvey, Matthew Ginsberg.
    Limited discrepancy search. In IJCAI’95: Proceedings of the International Joint Conference on Artificial Intelligence, 1995
    276
  81. G Winskel, M Nielsen.
    Models for Concurrency. Handbook of Logic in Computer Science, 1995
    273
  82. N Kushmerick, S Hanks, D Weld.
    An Algorithm for Probabilistic Planning. Artificial Intelligence, 1995
    273
  83. M L Honig, U Madhow, S Verdú.
    Blind adaptive multiuser detection. IEEE Trans. Inform. Theory, 1995
    273
  84. E Hutchins.
    How a cockpit remembers its speeds. Cognitive Science, 1995
    271
  85. H Kitano, M Asada, Y Kuniyoshi, I Noda, E Osawa.
    Robocup: The robot world cup initiative. In Proceedings of IJCA1-95 Workshop on Entertainment and AI/Alife, 1995
    270
  86. Azarbayejani, A P Pentland.
    Recursive estimation of motion, structure and focal length. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1995
    270
  87. R HARPER, G MORRISETT.
    Compiling polymorphism using intensional type analysis. In Proceedings of the 22nd ACM Symposium on Principles of Programming Languages, ACM, 1995
    267
  88. D Helbing, Molnar.
    P.: Social force model for pedestrian dynamics. Physical review E, 1995
    267