Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. V Vapnik.
    Statistical Learning Theory. 1998
    9898
  2. T H Cormen, C E Leiserson, R L Rivest, C Stein.
    Introduction to Algorithms. 1990
    9039
  3. A P Dempster, N M Laird, D B Rubin.
    Maximum likelihood from incomplete data via the EM algorithm. 1977
    8999
  4. D Lowe.
    Distinctive image features from scaleinvariant keypoints. In: International Journal of Computer Vision, 2004
    5621
  5. S F Altschul, T L Madden, A A Schaffer, J Zhang, Z Zhang, W Miller, D J Lipman.
    Gapped BLAST and PSI-BLAST: a new generation of protein database search programs. Nucleic Acids Res. 1997
    5384
  6. R Sutton, A Barto.
    Reinforcement Learning, an introduction. 1998
    4148
  7. S Kirkpatrick, C D Gelatt, M P Vecchi.
    Optimization by simulated annealing. Science, 1983
    3918
  8. C-C Chang, C-J Lin.
    Libsvm: a library for support vector machines. 0
    3829
  9. D Kahneman, A Tversky.
    Prospect theory: An analysis of decision under risk. Econometrica, 1979
    3795
  10. R T Rockafellar, R J-B Wets.
    Variational Analysis. 1997
    3743
  11. J R Quinlan.
    Induction of decision trees. Machine Learning, 1986
    3634
  12. C A R Hoare.
    Communicating Sequential Processes. 1985
    3632
  13. S Brin, L Page.
    The Anatomy of a Large-Scale Hypertextual Web Search Engine. in Proc. of 7th International WWW Conference, 1998
    3623
  14. J Canny.
    A computational approach to edge detection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1986
    3426
  15. Bradley Efron, Robert J Tibshirani.
    An Introduction to the Bootstrap. 1993
    3324
  16. M Kass, A Witkin, D Terzopoulos.
    Snakes: active contour models. International Journal of Computer Vision, 1988
    3267
  17. C L Liu, J W Layland.
    Scheduling Algorithms for Multiprogramming in a Hard Real-Time Environment. Journal of the ACM, 1973
    3213
  18. R Rivest, A Shamir, L Adleman.
    A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 1978
    3175
  19. R Bryant.
    Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers, 1986
    3147
  20. M Turk, A Penland.
    Eigenfaces for recognition. Journal of Cognitive Neuroscience, 1991
    3017
  21. S Deerwester, S T Landauer T K Dumais, G W Furnas, R A Harshman.
    Indexing by latent semantic analysis. Journal of the Society for Information Science, 1990
    3011
  22. Jon M Kleinberg.
    Authoritative sources in a hyperlinked environment. In Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA, 1998
    2990
  23. W Diffie, M E Hellman.
    New Directions in Cryptography. IEEE Transactions on Information Theory, 1976
    2951
  24. S Ratnasamy, P Francis, M Handley, R Karp, S Shenker.
    A Scalable Content-Addressable Network. In Proceedings of the ACM SIGCOMM '01 Conference, 2001
    2946
  25. Rakesh Agrawal, Ramakrishnan Srikant.
    Fast algorithms for mining association rules. In Proceedings of the 20th International Conference on Very Large Databases (VLDB, 1994
    2889
  26. J Shi, J Malik.
    Normalized cuts and image segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000
    2769
  27. L Breiman.
    Bagging predictors. Machine Learning, 1996
    2751
  28. A J Menezes, P C van Oorschot, S A Vanstone.
    Handbook of Applied Cryptography. 1996
    2707
  29. E M Clarke, D E Long, K L McMillan.
    Compositional model checking. In LICS, 1989
    2663
  30. S G Mallat.
    A Theory for Multiresolution Signal Decomposition: The Wavelet Representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1989
    2658
  31. R Baeza-Yates, B Ribeiro-Neto.
    Modern Information Retrieval. 1999
    2652
  32. R Agrawal, T Imielinski, A Swami.
    Mining Association Rules between Sets of Items in Large Databases. In Proceedings of the ACM SIGMOD International Conference on Management of Data, 1993
    2635
  33. D M Blei, A Y Ng, M I Jordan.
    Latent dirichlet allocation. Journal of Machine Learning Research, 2003
    2630
  34. Thomas R Gruber.
    A translation approach to portable ontology specifications. Knowledge Acquisition, 1993
    2610
  35. D B Johnson, D A Maltz.
    Dynamic source routing in ad hoc wireless networks. in Mobile Computing, Imielinski and Korth, Eds, 1996
    2544
  36. J Lafferty, A McCallum, F Pereira.
    Conditional random fields: Probabilistic models for segmenting and labeling sequence data. In ICML-2001, 2001
    2499
  37. J F Allen.
    Maintaining knowledge about temporal intervals. Communications of ACM, 1983
    2486
  38. C J C Burges.
    A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 1998
    2486
  39. C E Perkins, E M Royer.
    Ad-hoc ondemand distance vector routing. In Proc. of the Mobile Computing Systems and Applications, 1999
    2480
  40. L Lamport.
    Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 1978
    2461
  41. R Albert, Barabási AL.
    Emerging of Scaling in Random Networks. Science, 1999
    2426
  42. Christos H Papadimitriou.
    Computational Complexity. 1994
    2426
  43. V Jacobson.
    Congestion avoidance and control. ACM Computer Communication Review; Proceedings of the Sigcomm ’88 Symposium, 1988
    2419
  44. P Gupta, P R Kumar.
    The capacity of wireless networks. IEEE Trans. on Information Theory, 2000
    2418
  45. Lawrence Page, Sergey Brin, Rajeev Motwani, Terry Winograd.
    The PageRank citation ranking: Bringing order to the Web. 1998
    2389
  46. C Cortes, V Vapnik.
    Support vector networks. Machine Learning 20, 1995
    2375
  47. A Guttman.
    R-Trees: A dynamic index structure for spatial searching. In Proceedings of the 1984 ACM-SIGMOD Conference, 1984
    2374
  48. S Floyd, V Jacobson.
    Random Early Detection Gateways for Congestion avoidance. IEEE/ACM Trans. Network, Vol, 1993
    2360
  49. R Axelrod.
    The evolution of cooperation. 1984
    2353
  50. D Harel.
    STATECHARTS: A Visual Formalism for Complex Systems. Science of Computer Programming, 1987
    2322
  51. I Foster, C Kesselman, S Tuecke.
    The Anatomy of the Grid: Enabling Scalable Virtual Organizations. International Journal of Supercomputer Applications, 2001
    2281
  52. P Viola, M Jones.
    Rapid object detection using a boosted cascade of simple features. in Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR ’01, 2001
    2247
  53. W E Lorensen, H E Cline.
    Marching Cubes: A high resolution 3D surface construction algorithm. Computer Graphics (SIGGRAPH ’87 Proceedings, 1987
    2243
  54. B Schölkopf, A J Smola.
    Learning with kernels. 2002
    2234
  55. Mitchell P Marcus, Beatrice Santorini, Mary Ann Marcinkiewicz.
    Building a Large Annotated Corpus of English: The Penn Treebank. Computational Linguistics, 1993
    2228
  56. R Barro, X Sala-i-Martin.
    Economic Growth. 1995
    2209
  57. A Connes.
    Noncommutative Geometry. 1994
    2196
  58. R Alur, D L Dill.
    A Theory of Timed Automata. Theoretical Computer Science, 1994
    2161
  59. B D Lucas, T Kanade.
    An Iterative Image Registration Technique with an Application to Stereo Vision. Proceedings of Image Understanding Workshop, 1981
    2148
  60. J Han, M Kamber.
    Data Mining: Concepts and techniques. 2001
    2129
  61. H Schulzrinne, S Casner, R Frederick, V Jacobson.
    RTP: A Transport Protocol for Real-Time Applications. Internet RFC 1889, Internet Engineering Task Force (IETF, 1996
    2073
  62. R TIBSHIRANI.
    Regression shrinkage and selection via the lasso. J. R. Statist. Soc. B, 1996
    2064
  63. J MacQueen.
    Some methods for classification and analysis of multivariate observations. In Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability, LM LE Cam & J Neyman (eds.), Univeristy of California, 1967
    2063
  64. İ E Telatar.
    Capacity of multi-antenna Gaussian channels. European Trans. Telecommun, 1999
    2042
  65. P Erdös, A Rényi.
    On Random Graphs. I. Publ. Math. Debrecen, 1959
    2031
  66. J Dean, S Ghemawat.
    MapReduce: Simplified data processing on large clusters. In: Proceedings of Operating Systems Design and Implementation. MapReduce for Machine Learning on Multicore, In: proceedings of Advances in Neural Information Processing Systems. NIPS 19, 306-313. Mahout project, [online]. http://lucene.apache.org/mahout, 2004
    2020
  67. C Intanagonwiwat, R Govindan, D Estrin.
    Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom 2000, 2000
    1977
  68. W E Leland, M S Taqqu, W Willinger, D V Wilson.
    On the self-similar nature of Ethernet traffic (extended version. IEEE/ACM Transaction on Networking, 1994
    1948
  69. A Shamir.
    How to share a secret. Communications of the ACM, 1979
    1939
  70. J Kennedy, RC Eberhart.
    Particle swarm optimization. Proceedings of the 1995 IEEE International Conference on Neural Networks (Perth, Australia), IEEE Service Center, Piscataway, NJ, IV, 1995
    1938
  71. Mark Granovetter.
    Economic action and social structure : the problem of embeddedness. American Journal of Sociology, Volume, 1985
    1929
  72. R Motwani, P Raghavan.
    Randomized algorithms. 1995
    1927
  73. B Bollobás.
    Random Graphs. 1985
    1922
  74. Martin J Osborne, Ariel Rubinstein.
    A Course in Game Theory. 1994
    1902
  75. N Dalal, B Triggs.
    Histograms of oriented gradients for human detection. International Conference on Computer Vision and Pattern Recognition, 2005
    1893
  76. z Lakoff, G, M Johnson.
    Metaphors we live by. 1980
    1885
  77. D Donoho.
    Compressive sensing. IEEE Trans. on Information Theory, 0
    1884
  78. T Berners-Lee, J Hendler, O Lassila.
    The semantic web. Scientific American, 2001
    1882
  79. B K P Horn, B G Schunck.
    Determining optical flow. Artificial Intelligence, 1981
    1875
  80. T Joachims.
    Text Categorization with Support Vector Machines: Learning with Many Relevant Features. In Proceedings of the Tenth European Conference on Machine Learning, 1998
    1872
  81. C Harris, M J Stephens.
    A combined corner and edge detector. Alvey Vision Conference, 1988
    1860
  82. P Druschel, A Rowstron.
    Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems. In Proceedings of the 18th IFIP/ACM International Conference on Distributed Systems Platforms (Middleware 2001, 2001
    1848
  83. P M Romer.
    Endogenous Technological Change. Journal of Political Economy, 1990
    1815
  84. R Gallager A Parekh.
    A generalized processor sharing approach to flow control - the single node case. IEEE/ACM Trans. on Networking, 1993
    1803
  85. S CHEN, D DONOHO, M SAUNDERS.
    Atomic decomposition by basis pursuit. SIAM J. Sci. Comp, 1998
    1794
  86. J S Coleman.
    Social capital in the creation of human capital. American Journal of Sociology, 1988
    1786
  87. Alan Prince, Paul Smolensky.
    Optimality Theory: Constraint interaction in generative grammar. 1993
    1777
  88. B Karp, Kung HT.
    Gpsr: Greedy perimeter stateless routing for wireless networks. In Proceedings of MOBICOM, 0
    1771
  89. Y Freund, R E Schapire.
    Experiments with a new boosting algorithm. In International Conference on Machine Learning, 1996
    1764
  90. I Daubechies.
    Orthonormal bases of compactly supported wavelets[J. Communications on Pure and Applied Mathematics, 1988
    1753
  91. G J Foschini, M J Gans.
    On limits of wireless communications in a fading environment when using mutiple antennas. Wireless Personal Communications, 1998
    1751
  92. Leslie G Valiant.
    A theory of the learnable. Communications of the Association for Computing Machinery, 1984
    1750