Most Cited Computer Science Articles
This list is generated from documents in the CiteSeer^{x} database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeer^{x} database, since the database is continuously updated.
All Years
 1990
 1991
 1992
 1993
 1994
 1995
 1996
 1997
 1998
 1999
 2000
 2001
 2002
 2003
 2004
 2005
 2006
 2007
 2008
 2009
 2010
 2011
 2012
 2013
 2014
 2015

Comparing Predictive Accuracy. Journal of Business and Economic Statistics, 1995883

How to prove yourself: Practical solutions to identification and signature problems. Advances in Cryptology  CRYPTO ’86, volume 263 of Lectures, 0883

The eyes have it: a task by data type taxonomy for information visualizations. In Proceedings of 1996 IEEE Visual Languages, Boulder (CO, 1996883

Efficiently computing static single assignment form and the control dependence graph. ACM Trans. Program. Lang. Syst, 1991883

Classical negation in logic programs and disjunctive databases. New Generation Computing, 1991882

A probabilistic dynamic logic. J. Computing and System Sciences, 1984880

The wellfounded semantics for general logic programs. J. of the ACM, 1991880

Learning logical definitions from relations. Machine Learning 5(3, 1990875

A survey of mobility models for ad hoc networks research. Wireless Communication and Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, 0873

Probabilistic latent semantic indexing. in SIGIR ‘99: Proceedings of the 22nd annual international ACM SIGIR conference on research and development in information retrieval, pp 5057, 1999873

Taggers for Parsers. Artificial Intelligence, 1996872

An Architecture for Differentiated Services. RFC, 1998872

Monetary Policy Rules and Macroeconomic Stability: Evidence and Some Theory." The Quarterly. Journal of Economics, 2000871

TREEVIEW: An application to display phylogenetic trees on personal computers. Comput. Appl. Biosci, 1996871

Optimization by vector space methods. 1969870

An experimental comparison of mincut/maxflow algorithms for energy minimization in vision. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2004870

Studies on transformation of Escherichia coli with plasmids. J Mol Biol, 1983869

Securing ad hoc networks. IEEE Newark Magazine, 1999869

An introduction to variational methods for graphical models. Machine learning, 1999868

Foundations of Constraint Satisfaction. 1993867

Separation of Ownership and Control. Journal of Law and Economics, 1983866

A digital signature scheme secure against adaptively chosen message attacks. SIAM J. on Comp, 1988866

Accurate methods for the statistics of surprise and coincidence. Computational Linguistics, 1993865

Active contours without edges. IEEE Transactions on Image Processing, 0864

The program dependence graph and its use in optimization. ACM Trans. on Programming Languages and Systems, 1987862

A Fast and High Quality Multilevel Scheme for Partitioning Irregular Graphs. SIAM Journal Scientific Computing, 1998861

SRILM  an extensible language modeling toolkit. In Proc. of ICSLP02, Vol.2, 2002859

Algorithms for quantum computation: discrete logarithms and factoring. Proceedings, 35th Annual Symposium on Fundamentals of Computer Science (FOCS, 1994859

Text classification from labeled and unlabeled documents using EM. Machine Learning, 2000858

Tor: The secondgeneration onion router. 2004857

Scale and performance in a distributed file system. ACM Transactions on Computer Systems, 1988857

Mediabench: A tool for evaluating and synthesizing multimedia and communications systems. IEEE Micro, 1997856

Transaction Prices in a Specialist Market with Heterogeneously Informed Traders. Journal of Financial Economics, 1985855

Analysis of relative gene expression data using realtime quantitative. PCR and the 2(Delta Delta C(T)) method. Methods, 2001853

Soar: An architecture for general intelligence. Artificial Intelligence, 1987853

The Temporal Logic of Actions. ACM Transactions on Programming Languages and Systems, 1994853

The Cricket LocationSupport System. In Proc. of MOBICOM, 2000852

Grounding in Communication. Perspectives on Socially Shared Cognition, 1991850

GeographyInformed energy conservation for ad hoc routing. In: Proc. of the MOBICOM, 2001850

Incentives Build Robustness in BitTorrent. In Workshop on Economics of PeertoPeer Systems, 2003849

An informationtheoretic definition of similarity. In ICML ’98: Proceedings of the Fifteenth International Conference on Machine Learning, 1998848

Mobile ambients. In FOSSACS’98, 1998846

A study of cross validation and bootstrap for accuracy estimation and model selection. Proceedings of the 14th International Joint Conference on Artificial Intelligence (IJCAI95, 1995843

Improving DirectMapped Cache Performance by the Addition of a Small FullyAssociative Cache and. Prefetch Buffers,” ISCA17: ACM/IEEE International Symposium on Computer Architecture, 1990843

Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones. Optimization Methods and Software 11/12, 1999842

Semidefinite programming. 1996842

Implementing faulttolerant services using the state machine approach: A tutorial. Proceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization, 1990841

Markov chains for exploring posterior distributions (with discussion. Annals of Statistics, 1994840

The Impact of Trade on IntraIndustry Reallocations and Aggregate. Industry Productivity, Econometrica, 2003839

On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming, and nperson games. Artificial Intelligence, 1995839

User Acceptance of Information Technology: Toward a Unified View. MIS Quarterly, 2003837

Prediction of complete gene structures in human genomic DNA. J. Mol. Biol, 1997837

Generating representative Web workloads for network and server performance evaluation. In Proceedings of ACM SIGMETRICS ’98, 0835

A comparison of event models for naive Bayes text classi. Proceedings of AAAI '98, 1998833

Comparison of parametric representations monosyllabic word recognition. IEEE Transactions on Acoustics, Speech and Signal Processing, 1980833

A Volumetric Method for Building Complex Models from Range Images. Proc. ACM SIGGRAPH’96, 1996833

Intelligence Without Reason. in ‘Proceedings of the 1991 International Joint Conference on Arti Intelligence, 1991832

The Protein Data Bank. Nucleic Acids Res, 2000831

Does Social Capital Have an Economic Payoff? A CrossCountry Investigation” Quarterly. Journal of Economics, 1997830

The complexity of theoremproving procedures. In 3rd Annual ACM Symposium on the Theory of Computing, 1971830

Mitigating routing misbehavior in mobile ad hoc networks. Proc. the 6th annual international conference on Mobile Computing and Networking, 2000830

The hungarian method for the assignment problem. Naval Research Logistics Quaterly, 1955829

A morphable model for the synthesis of 3D faces. In Proc. of SIGGRAPH99, 1999828

A calculus for cryptographic protocols The Spi Calculus. In Proceedings of Fourth ACM Conference on Computer and Communications Security, 1997826

SPINS: Security protocols for sensor networks. In MobiCom, 2001824

Itembased collaborative filtering recommendation algorithms. Proceedings of the 10th International World Wide Web Conference(WWW10, 2009821

Gpsless low cost outdoor localization for very small devices. IEEE Personal Communications Magazine, 2000820

Least angle regression. Annals of Statistics, 2003819

Logical foundations of objectoriented and framebased languages. JACM, 1995819

Transactional memory: architectural support for lockfree data structures. In SIGARCH Comput. Archit. News, 1993818

Alignment by Maximization of Mutual Information. Int’l J. Computer Vision, 1997818

Texture synthesis by nonparametric sampling. In ICCV, 1999818

Hedonic Prices and Implicit Markets: Product Differentiation in Pure Competition. Journal of Political Economy, 1974817

An optimal algorithm for approximate nearest neighbor searching in fixed dimensions. Journal of the ACM, 1998817

Algorithms for nonnegative matrix factorization. Advances in Neural and Information Processing Systems 13, 2000816

The semantics of constraint logic programs. Journal of Logic Programming, 1998814

A Comparison of Mechanisms for Improving TCP Performance over Wireless Links. IEEE/ACM Transactions on Networking, 1997814

Transformationbased errordriven learning and natural language processing: A case study in partofspeech tagging. Computational Linguistics, 1995814

Span: an energyefficient coordination algorithm for topology maintenance in ad hoc wireless networks. ACMWireless Networks Journal, 0814

Gradientbased learning applied to document recognition. Proceedings of the IEEE, 1998812

Using Bayesian networks to analyze expression data. J. Comput. Biol, 2000808

Location systems for ubiquitous computing. IEEE Computer, 2001807

Using information content to evaluate semantic similarity in a taxonomy. In IJCAI, 1995806

A view of the EM algorithm that justifies incremental, sparse, and other variants. In Jordan [144, 0804

The Viterbi algorithm. Proceedings of the IEEE, 1973803

Differential Power Analysis. In Proceedings of Crypto’99, 1999803

The CN2 induction algorithm. Machine Learning, 1989803

Promoting the use of endtoend congestion control in the Internet. IEEE/ACM Trans. on Networking, 1999801

An introduction to variable and feature selection. Special Issue on Variable and Feature Selection, 0800

On the Measurement of Inequality. Journal of Economic Theory, 1970798

P.L.Lions, User’s guide to viscosity solutions of second order partial differential equations. Bull. Amer.Math. Soc, 1992795