Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. F X Diebold, R Mariano.
    Comparing Predictive Accuracy. Journal of Business and Economic Statistics, 1995
    883
  2. A Fiat, A Shamir.
    How to prove yourself: Practical solutions to identification and signature problems. Advances in Cryptology - CRYPTO ’86, volume 263 of Lectures, 0
    883
  3. B Shneiderman.
    The eyes have it: a task by data type taxonomy for information visualizations. In Proceedings of 1996 IEEE Visual Languages, Boulder (CO, 1996
    883
  4. R Cytron, J Ferrante, B K Rosen, M N Wegman, F K Zadeck.
    Efficiently computing static single assignment form and the control dependence graph. ACM Trans. Program. Lang. Syst, 1991
    883
  5. M Gelfond, V Lifschitz.
    Classical negation in logic programs and disjunctive databases. New Generation Computing, 1991
    882
  6. Yishai A Feldman, David Harel.
    A probabilistic dynamic logic. J. Computing and System Sciences, 1984
    880
  7. A van Gelder, K A Ross, J S Schlimpf.
    The well-founded semantics for general logic programs. J. of the ACM, 1991
    880
  8. J Ross Quinlan.
    Learning logical definitions from relations. Machine Learning 5(3, 1990
    875
  9. T Camp, J Boleng, V Davies.
    A survey of mobility models for ad hoc networks research. Wireless Communication and Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, 0
    873
  10. Hofmann.
    Probabilistic latent semantic indexing. in SIGIR ‘99: Proceedings of the 22nd annual international ACM SIGIR conference on research and development in information retrieval, pp 50-57, 1999
    873
  11. Eugene Charniak, Glenn Carroll, John Adcock.
    Taggers for Parsers. Artificial Intelligence, 1996
    872
  12. S Blake, D Black, M Carlson, M Davies, Z Wang, W Weiss.
    An Architecture for Differentiated Services. RFC, 1998
    872
  13. R Clarida, J Gali, M Gertler.
    Monetary Policy Rules and Macroeconomic Stability: Evidence and Some Theory." The Quarterly. Journal of Economics, 2000
    871
  14. D Luenberger.
    Optimization by vector space methods. 1969
    870
  15. Y Boykov, V Kolmogorov.
    An experimental comparison of min-cut/max-flow algorithms for energy minimization in vision. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2004
    870
  16. L Zhou.
    Securing ad hoc networks. IEEE Newark Magazine, 1999
    869
  17. M Jordan, Z Ghahramani, T Jaakkola, L Saul.
    An introduction to variational methods for graphical models. Machine learning, 1999
    868
  18. E F Fama, M C Jensen.
    Separation of Ownership and Control. Journal of Law and Economics, 1983
    866
  19. S Goldwasser, S Micali, R Rivest.
    A digital signature scheme secure against adaptively chosen message attacks. SIAM J. on Comp, 1988
    866
  20. Ted Dunning.
    Accurate methods for the statistics of surprise and coincidence. Computational Linguistics, 1993
    865
  21. TF Chan, LA Vese.
    Active contours without edges. IEEE Transactions on Image Processing, 0
    864
  22. J Ferrante, K J Ottenstein, J D Warren.
    The program dependence graph and its use in optimization. ACM Trans. on Programming Languages and Systems, 1987
    862
  23. G Karypis, V Kumar.
    A Fast and High Quality Multilevel Scheme for Partitioning Irregular Graphs. SIAM Journal Scientific Computing, 1998
    861
  24. A Stolcke.
    SRILM - an extensible language modeling toolkit. In Proc. of ICSLP-02, Vol.2, 2002
    859
  25. P Shor.
    Algorithms for quantum computation: discrete logarithms and factoring. Proceedings, 35th Annual Symposium on Fundamentals of Computer Science (FOCS, 1994
    859
  26. K Nigam, A McCallum, S Thrun.
    Text classification from labeled and unlabeled documents using EM. Machine Learning, 2000
    858
  27. R Dingledine, N Mathewson, P Syverson.
    Tor: The secondgeneration onion router. 2004
    857
  28. J Howard, M Kazar, S Menees, D Nichols, M Satyanarayanan, R Sidebotham, M West.
    Scale and performance in a distributed file system. ACM Transactions on Computer Systems, 1988
    857
  29. I H Witten, A Moffat, T C Bell.
    Managing Gigabytes: Compressing and Indexing Documents and Images. 1999
    856
  30. C Lee, M Potkonjak, W Mangione-Smith.
    Mediabench: A tool for evaluating and synthesizing multimedia and communications systems. IEEE Micro, 1997
    856
  31. Lawrence Glosten, Paul Milgrom, Ask “Bid.
    Transaction Prices in a Specialist Market with Heterogeneously Informed Traders. Journal of Financial Economics, 1985
    855
  32. K J Livak, T D Schmittgen.
    Analysis of relative gene expression data using real-time quantitative. PCR and the 2(-Delta Delta C(T)) method. Methods, 2001
    853
  33. Controlling Uncertainty Laird, J E, A Newell, P S Rosenbloom.
    Soar: An architecture for general intelligence. Artificial Intelligence, 1987
    853
  34. Leslie Lamport.
    The Temporal Logic of Actions. ACM Transactions on Programming Languages and Systems, 1994
    853
  35. N B Priyantha, A Chakraborty, H Balakrishnan.
    The Cricket Location-Support System. In Proc. of MOBICOM, 2000
    852
  36. H H Clark, S Brennan.
    Grounding in Communication. Perspectives on Socially Shared Cognition, 1991
    850
  37. Y Xu, Heidemann JS, D Estrin.
    Geography-Informed energy conservation for ad hoc routing. In: Proc. of the MOBICOM, 2001
    850
  38. B COHEN.
    Incentives Build Robustness in BitTorrent. In Workshop on Economics of Peer-to-Peer Systems, 2003
    849
  39. D Lin.
    An information-theoretic definition of similarity. In ICML ’98: Proceedings of the Fifteenth International Conference on Machine Learning, 1998
    848
  40. L Cardelli, A Gordon.
    Mobile ambients. In FOSSACS’98, 1998
    846
  41. R Kohavi.
    A study of cross validation and bootstrap for accuracy estimation and model selection. Proceedings of the 14th International Joint Conference on Artificial Intelligence (IJCAI95, 1995
    843
  42. N Jouppi.
    Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-Associative Cache and. Prefetch Buffers,” ISCA-17: ACM/IEEE International Symposium on Computer Architecture, 1990
    843
  43. J F Sturm.
    Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones. Optimization Methods and Software 11/12, 1999
    842
  44. Lieven Vandenberghe, Stephen Boyd.
    Semidefinite programming. 1996
    842
  45. F B Schneider.
    Implementing fault-tolerant services using the state machine approach: A tutorial. Proceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization, 1990
    841
  46. M Melitz.
    The Impact of Trade on Intra-Industry Reallocations and Aggregate. Industry Productivity, Econometrica, 2003
    839
  47. Lawrence J Christiano, Martin S Eichenbaum, Charles L Evans.
    Nominal Rigidities and the Dynamic Effects of a Shock to Monetary Policy,” NBER Working Paper no. 8403. 2001
    837
  48. V Venkatesh, M Morris, G Davis, F Davis.
    User Acceptance of Information Technology: Toward a Unified View. MIS Quarterly, 2003
    837
  49. C Burge, S Karlin.
    Prediction of complete gene structures in human genomic DNA. J. Mol. Biol, 1997
    837
  50. P Badford, M Crovella.
    Generating representative Web workloads for network and server performance evaluation. In Proceedings of ACM SIGMETRICS ’98, 0
    835
  51. A McCallum, K Nigam.
    A comparison of event models for naive Bayes text classi. Proceedings of AAAI '98, 1998
    833
  52. S Davis, P Mermelstein.
    Comparison of parametric representations monosyllabic word recognition. IEEE Transactions on Acoustics, Speech and Signal Processing, 1980
    833
  53. B Curless, M Levoy.
    A Volumetric Method for Building Complex Models from Range Images. Proc. ACM SIGGRAPH’96, 1996
    833
  54. R A Brooks.
    Intelligence Without Reason. in ‘Proceedings of the 1991 International Joint Conference on Arti Intelligence, 1991
    832
  55. H M Berman, J Westbrook, Z Feng, G Gilliland, T N Bhat, H Weissig, I N Shindyalov, P E Bourne.
    The Protein Data Bank. Nucleic Acids Res, 2000
    831
  56. S A Cook.
    The complexity of theorem-proving procedures. In 3rd Annual ACM Symposium on the Theory of Computing, 1971
    830
  57. S Marti, T J Giuli, K Lai, M Baker.
    Mitigating routing misbehavior in mobile ad hoc networks. Proc. the 6th annual international conference on Mobile Computing and Networking, 2000
    830
  58. H W Kuhn.
    The hungarian method for the assignment problem. Naval Research Logistics Quaterly, 1955
    829
  59. V Blanz, T Vetter.
    A morphable model for the synthesis of 3D faces. In Proc. of SIGGRAPH99, 1999
    828
  60. M Abadi, A D Gordon.
    A calculus for cryptographic protocols The Spi Calculus. In Proceedings of Fourth ACM Conference on Computer and Communications Security, 1997
    826
  61. A Perrig, R Szewczyk, V Wen, D Culler, J D Tygar.
    SPINS: Security protocols for sensor networks. In MobiCom, 2001
    824
  62. B Sarwar, G Karypis, J Konstan, J Riedl.
    Item-based collaborative filtering recommendation algorithms. Proceedings of the 10th International World Wide Web Conference(WWW10, 2009
    821
  63. Nirupama Bulusu, John Heidemann, Deborah Estrin.
    Gps-less low cost outdoor localization for very small devices. IEEE Personal Communications Magazine, 2000
    820
  64. B EFRON, I JOHNSTRON, T HASTIE, R TIBSHIRANI.
    Least angle regression. Annals of Statistics, 2003
    819
  65. M Kifer, G Lausen, J Wu.
    Logical foundations of objectoriented and frame-based languages. JACM, 1995
    819
  66. M Herlihy, J E B Moss.
    Transactional memory: architectural support for lock-free data structures. In SIGARCH Comput. Archit. News, 1993
    818
  67. P Viola, W Wells.
    Alignment by Maximization of Mutual Information. Int’l J. Computer Vision, 1997
    818
  68. A Efros, T Leung.
    Texture synthesis by non-parametric sampling. In ICCV, 1999
    818
  69. S Arya, D M Mount, N S Netanyahu, R Silverman, A Y Wu.
    An optimal algorithm for approximate nearest neighbor searching in fixed dimensions. Journal of the ACM, 1998
    817
  70. D D Lee, H S Seung.
    Algorithms for non-negative matrix factorization. Advances in Neural and Information Processing Systems 13, 2000
    816
  71. J Jaffar, M J Maher, K Marriott, P J Stuckey.
    The semantics of constraint logic programs. Journal of Logic Programming, 1998
    814
  72. H Balakrishnan, V N Padmanabhan, S Seshan, R Katz.
    A Comparison of Mechanisms for Improving TCP Performance over Wireless Links. IEEE/ACM Transactions on Networking, 1997
    814
  73. P J Phillips, H Moon, P Rauss, S A Rizvi.
    The feret evaluation methodology for face-recognition algorithms. 2000
    814
  74. B Chen, K Jamieson, H Balakrishnan, R Morris.
    Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks. ACMWireless Networks Journal, 0
    814
  75. Y LeCun, L Bottou, Y Bengio, P Haffner.
    Gradient-based learning applied to document recognition. Proceedings of the IEEE, 1998
    812
  76. N Friedman, M Linial, I Nachman, D Pe’er.
    Using Bayesian networks to analyze expression data. J. Comput. Biol, 2000
    808
  77. J Hightower, G Borriello.
    Location systems for ubiquitous computing. IEEE Computer, 2001
    807
  78. Radford M Neal, Geoffrey E Hinton.
    A view of the EM algorithm that justifies incremental, sparse, and other variants. In Jordan [144, 0
    804
  79. G D Forney.
    The Viterbi algorithm. Proceedings of the IEEE, 1973
    803
  80. P Kocher, J Jaffe, B Jun.
    Differential Power Analysis. In Proceedings of Crypto’99, 1999
    803
  81. P Clark, T Niblett.
    The CN2 induction algorithm. Machine Learning, 1989
    803
  82. S Floyd, K Fall.
    Promoting the use of end-to-end congestion control in the Internet. IEEE/ACM Trans. on Networking, 1999
    801
  83. I Guyon, A Elisseeff.
    An introduction to variable and feature selection. Special Issue on Variable and Feature Selection, 0
    800
  84. A B Atkinson.
    On the Measurement of Inequality. Journal of Economic Theory, 1970
    798