Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. T Kelly.
    Scalable TCP: improving performance in highspeed wide area networks. ACM Computer Communication Review, 2003
  2. N J A Harvey, M B Jones, S Saroiu, M Theimer, Wolman.
    A.: SkipNet: a scalable overlay network with practical locality properties. In Proc. of the 4th USENIX Symp. on Internet Technologies and Systems (USITS’03, 2003
  3. Glen Jeh, Jennifer Widom.
    Scaling personalized web search. In Proceedings of the Twelfth International World Wide Web Conference (WWW, 2003
  4. P A Chou, T Wu, K Jain.
    Practical network coding. in 41st Allerton Conf. Communication, Control and Computing, 2003
  5. Raghuram G Rajan, Luigi Zingales.
    The Great Reversals: The Politics of Financial Development in the 20th Century. Journal of Financial Economics, 2003
  6. David Kempe, Alin Dobra, Johannes Gehrke.
    Gossip-based computation of aggregate information. In 44th Annual IEEE Symposium on Foundations of Computer Science, 2003
  7. A J Sellen, R H Harper.
    The Myth of the Paperless Office. 2003
  8. R Huebsch, J M Hellerstein, N L Boon, T Loo, S Shenker, I Stoica.
    Querying the internet with pier. 2003
  9. F Zambonelli, N Jennings, M Wooldridge.
    Developing multiagent systems: The Gaia methodology. IEEE Transactions of Software Engineering and Methodology, 2003
  10. Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda.
    Performance anomaly of 802.11b. In Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003, 2003
  11. P Salovey, D A Pizarro.
    The value of emotional intelligence. In, 2003
    Faceted metadata for image search and browsing. Proceedings of the SIGCHI 2 hours 10 sec.2.3 minutes 128 seconds, 2003
  13. R Bhagwan, S Savage, G Voelker.
    Understanding availability. In In Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS, 2003
  14. D Moore, C Shannon, G M Voelker, S Savage.
    Internet Quarantine: Requirements for Containing Self-Propagating Code. Proceedings of IEEE INFOCOM, 2003
  15. Tal Garnkel, Mendel Rosenblum.
    A Virtual Machine Introspection Based Architecture for Intrusion Detection. In 10th ISOC Symposium on Network and Distributed Systems Security (SNDSS, 2003
  16. Christopher A Sims.
    Implications of Rational Inattention. Journal of Monetary Economics, 2003
  17. S Dumais, E Cutrell, J Cadiz, G Jancke, R Sarin, D C Robbins.
    Stuff I’ve seen: a system for personal information retrieval and re-use. In Proc. of SIGIR ’03, 2003
  18. F Ye, G Zhong, J Cheng, S Lu, L Zhang.
    Peas: A robust energy conserving protocol for long-lived sensor networks. In Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS ’03, 2003
  19. C Bettstetter, G Resta, P Santi.
    The Node Distribution of the random waypoint mobility model for wireless ad hoc networks. in IEEE Trans. on Mobile Computing, 2003
  20. A Sendonaris, E Erkip, B Aazhang.
    User cooperation diversity—Part I: system description. IEEE Trans. Commun, 2003
  21. Niels Provos.
    Improving Host Security with System Call Policies. In Proceedings of the 12th USENIX Security Symposium, 2003
  22. R Szabo.
    Quantum field theory on noncommutative spaces. Phys. Rept, 2003
  23. C Cranor, T Johnson, O Spataschek, V Shkapenyuk.
    Gigascope: A Stream Database for Network Applications. 2003
  24. D Engler, K Ashcraft.
    RacerX: Effective, static detection of race conditions and deadlocks. In SOSP, Nineteenth ACM Symposium on Operating Systems Principles, 2003
  25. B Liblit, A Aiken, A Zheng, M Jordan.
    Bug isolation via remote program sampling. ACM SIGPLAN Conference on Programming Language Design and Implementation, 2003
  26. I Dhillon, S Mallela, D Modha.
    Information-theoretic co-clustering. In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2003
  27. S H Low.
    A Duality Model of TCP and Queue Management Algorithms. IEEE/ACM Transactions on Networking, 2003
  28. K Gummadi, R Gummadi, S Ratnasamy, S Shenker, I Stoica.
    The Impact of DHT Routing Geometry on Resilience and Proximity. In Proceedings of the ACM SIGCOMM, 2003
  29. J Fakcharoenphol, S Rao, K Talwar.
    A tight bound on approximating arbitrary metrics by tree metrics. in Proceedings of the 35th ACM Symposium on Theory of Computing, ACM, 2003
  30. James Aspnes, Gauri Shah.
    Skip graphs. In Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2003
  31. C C Aggarwal, J Han, J Wang, P S Yu.
    A framework for clustering evolving data streams. In Proc. VLDB, 2003
  32. R A Irizarry, B M Bolstad, F Collin, L M Cope, B Hobbs, T P Speed.
    Summaries of Affymetrix GeneChip probe level data. Nucleic Acids Res, 2003
  33. J Pineau, G Gordon, S Thrun.
    Point-Based value iteration: An anytime algorithm for POMDP. In: Proc. of the 18th Int’l Joint Conf. on Artificial Intelligence (IJCAI, 2003
  34. V Ribeiro, R Riedi, R Baraniuk, J Navratil, L Cottrell.
    pathChirp: Efficient Available Bandwidth Estimation for Network Paths. In Passive and Active Measurements (PAM) workshop, 2003
  35. Mikhail Bilenko, Raymond J Mooney.
    Adaptive duplicate detection using learnable string similarity measures. In Proceedings of KDD-2003, 2003
  36. B Hochwald, S T Brink.
    Achieving Near-Capacity on a MultipleAntenna Channel. IEEE Transactions on Communications, 2003
  37. T Funkhouser, P Min, M Kazhdan, J Chen, A Halderman, D Dobkin, D Jacobs.
    A search engine for 3D models. ACM Transactions on Graphics, 2003
  38. A Goldsmith, S A Jafar, N Jindal, S Vishwanath.
    Capacity limits of MIMO channels. IEEE Trans. Inf. Theory, 2003
  39. X Wang, G Xing, Y Zhang, C Lu, R Pless, C Gill.
    Integrated coverage and connectivity configuration in wireless sensor networks. In First ACM Sensys Conference, 2003
  40. M A T Figueiredo, R D Nowak.
    An EM algorithm for wavelet-based image restoration. IEEE Transactions on Image Processing, 2003
  41. Michael M Swift, Brian N Bershad, Henry M Levy.
    Improving the Re-liability of Commodity Operating Systems. University of California,Berkeley, 2003
  42. A Torralba, K P Mutphy, W T Freeman, M A Rubin.
    Context-based vision system for place and object recognition. IEEE Int. Conf. Computer Vision, 2003
  43. T He, J A Stankovic, C Lu, T F Abdelzaher.
    SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks. In ICDCS, 2003
  44. D Boneh, C Gentry, H Schacham.
    Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology EUROCRYPT 2003, 2003
  45. D Oppenheimer, Archana Ganapathi, David A Patterson.
    Why do Internet services fail, and what can be done about it. 4th USENIX Symposium on Internet Technologies and Systems (USITS '03, 2003
  46. H Chui, A Rangarajan.
    A new point matching algorithm for non-rigid registration. Computer Vision and Image Understanding, 2003
  47. Christophe Andrieu, Nando de Freitas, Arnaud Doucet, Michael I Jordan.
    An introduction to MCMC for machine learning. Machine Learning, 2003
  48. T Ho, R Koetter, M Medard, D R Karger, M Effros.
    The Benefits of Coding over Routing in a Randomized Setting. in Proc. of IEEE International Symposium on Information Theory, 2003
  49. L Palen, P Dourish.
    Unpacking ‘Privacy’ for a Networked World. Proceedings of CHI 2003, 2003
  50. L von Ahn, M Blum, N J Hopper, J Langford.
    Captcha: Using hard ai problems for security. of Lecture Notes in Computer Science, 2003
  51. J N Laneman, G W Wornell.
    Distributed space-time coded protocols for exploiting cooperative diversity in wireless networks. IEEE Transactions on Information Theory, 2003
  52. W Mark, R Glanville, K Akeley, M Kilgard.
    Cg: A system for programming graphics hardware in a c{like language. In Proceedings of ACM SIGGRAPH. ACM Press, 2003
  53. M P Papazoglou, D Georgakopoulos.
    Introduction: Service-oriented computing. Communications of the ACM, 2003
  54. K Hirano, G Imbens, G Ridder.
    Efficient Estimation of Average Treatment Effects Using the Estimated Propensity. Score,” Econometrica, 2003
  55. D Gesbert, M Shafi, D Shiu, P J Smith.
    From Theory to Practice: An overview of MIMO Space-Time coded Wireless Systems. IEEE Journal on Selected Areas in Communcations, 2003
  56. J Strauss, D Katabi, Kaashoek.
    F.: A measurement study of available bandwidth estimation tools. ACM SIGCOMM Conference on Internet Measurment, 2003
  57. 27N Sastry, U Shankar, D Wagner.
    Secure verification of location claims. Proceedings of the 2003 ACM workshop on Wireless security, 2003
  58. S A Weis, S E Sarma, R L Rivest, Engels.
    D.W.: Security and privacy aspects of low-cost radio frequency identification systems. of Lecture Notes in Computer Science, 2003
  59. T A Henzinger, B Horowitz, C M Kirsch.
    Giotto: A time-triggered language for embedded programming. Proceedings of the IEEE, 2003
  60. D Tran, K Hua, T Do.
    ZIGZAG: an efficient peer-to-peer scheme for media streaming. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM, 2003
  61. P Moulin, J A O’Sullivan.
    Information-theoretic analysis of information hiding. IEEE Trans. Inform. Theory, 2003
  62. S Floyd.
    HighSpeed TCP for large congestion windows. IETF Internet Draft, 2003
  63. S Bhatkar, D C DuVarney, R Sekar.
    Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proc. of the 12th USENIX Security Symp, 2003
  64. G Danezis, R Dingledine, N Mathewson.
    Mixminion: Design of a Type III Anonymous Remailer Protocol. In Proceedings of the 2003 IEEE Symposium on Security and Privacy, 2003
  65. Philip A Bernstein.
    Applying Model Management to Classical Meta Data Problems. In Proc. CIDR, 2003
  66. S Vishwanath, N Jindal, A Goldsmith, “Duality.
    achievable rates, and sum-rate capacity of Gaussian MIMO broadcast channels. IEEE Trans. Inform. Theory, 2003
  67. R Agrawal, A Evfimievski, R Srikant.
    Information sharing across private databases. In: Proceedings of SIGMOD’03, 2003
  68. N Nystrom, M R Clarkson, A C Myers.
    Polyglot: An extensible compiler framework for Java. In International Conference on Compiler Construction (CC’03), volume 2622 of LNCS, 2003
  69. H Kopetz, G Bauer.
    The Time-Triggered Architecture. Proceedings of the IEEE, 2003
  70. F Bai, N Sadagopan, B Krishnamachari, A Helmy.
    Important: A framework to systematically analyze the impact of mobility on performance of routing protocols for ad hoc networks. In: Proc. of the IEEE INFOCOM, Vol.2, 2003
  71. C Flanagan, S Qadeer.
    A type and effect system for atomicity. In ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation, 2003
  72. K Czarnecki, S Helsen.
    Classification Of Model Transformation Approaches. In 2nd OOPSLA Workshop on Generative Techniques in the context of Model Driven Architecture, 2003
  73. D Klein, C D Manning.
    Fast exact inference with a factored model for natural language parsing. In Advances in NIPS 15, 2003
  74. K L McMillan.
    Interpolation and SAT-Based Model Checking. In CAV, 2003
  75. S D Kamvar, M T Schlosser, H Garcia-Molina.
    The Eigentrust Algorithm for Reputation Management. in P2P Networks,” in Proceedings of the 12th International Conference on World Wide Web (WWW’03, 2003
  76. Roland E Wunderlich, Thomas F Wenisch, Babak Falsafi, James C Hoe.
    SMARTS: Accelerating microarchitecture simulation via rigorous statistical sampling. In ISCA, 2003
  77. A Ross, A K Jain.
    Information fusion in biometrics. Pattern Recognition Letters, 2003
  78. D Nau, T C Au.
    SHOP2: An HTN planning system. Journal of Artificial Intelligence Research, 2003
  79. D J Love, R W Heath, T Strohmer.
    Grassmannian beamforming for multiple-input multiple-output wireless systems. IEEE Trans. on Inform. Theory, 2003
  80. N Li, B Grosof, J Feigenbaum.
    Delegation Logic: A Logic-based Approach to Distributed Authorization. ACM Transactions on Information and System Security, 2003
  81. S Chaki, E Clarke, A Groce, S Jha, H Veith.
    Modular verification of software components. in C. In International Conference on Software Engineering (ICSE, 2003