Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. G Venkatesh, J Sampson, N Goulding, S Garcia, V Bryksin, J Lugo-Martinez, S Swanson, M B Taylor.
    Conservation Cores: Reducing the Energy of Mature Computations. In Proceedings of the 15th International Conference on Architectural Support for Programming Languages and Operating Systems, 2010
    62
  2. H Prakken.
    An abstract framework for argumentation with structured arguments. Argument and Computation, 2010
    62
  3. R Rosati, A Almatelli.
    Improving query answering over DL-Lite ontologies. In Proc. of KR 2010, 2010
    61
  4. L Torresani, M Szummer, Fitzgibbon.
    A.: Efficient object category recognition using classemes. In: Computer Vision–ECCV 2010, 2010
    61
  5. T Berg-Kirkpatrick, A Bouchard-Cote, J DeNero, D Klein.
    Painless unsupervised learning with features. In Proceedings of NAACL-HLT-10, 2010
    61
  6. D Blei, T L Griffiths, M I Jordan.
    The nested Chinese restaurant process and Bayesian nonparametric inference of topic hierarchies. Journal of the ACM, 2010
    61
  7. Dean Karlan, Jonathan Zinman.
    Expanding Credit Access: Using Randomized Supply Decisions to Estimate the Impacts. Review of Financial Studies, 2010
    61
  8. T Koo, A M Rush, M Collins, T Jaakkola, D Sontag.
    Dual decomposition for parsing with nonprojective head automata. In Proc. of EMNLP, 2010
    61
  9. M Gomez Rodriguez, J Leskovec, A Krause.
    Inferring networks of diffusion and influence. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, 2010
    61
  10. J Ross, Lilly Irani, M Six Silberman, Andrew Zaldivar, Bill Tomlinson.
    Who are the crowdworkers?: shifting demographics in mechanical turk. In CHI '10 Extended Abstracts on Human Factors in Computing Systems (CHI EA '10). ACM, 2010
    60
  11. Z Kalal, J Matas, K Mikolajczyk.
    P-n learning: Bootstrapping binary classifiers by structural constraints. In Comp. Vis. Patt. Recognition, 2010
    60
  12. A Carroll, G Heiser.
    An analysis of power consumption in a smartphone. in Proceedings of the 2010 USENIX conference on USENIX annual technical conference, 2010
    59
  13. S Agrawal, D Boneh, X Boyen.
    Efficient lattice (h)ibe in the standard model. In EUROCRYPT, 2010
    59
  14. R Vernica, M J Carey, C Li.
    Efficient parallel set-similarity joins using mapreduce. In SIGMOD, 2010
    58
  15. H Jégou, M Douze, C Schmid.
    Improving bag-of-features for large scale image search. International Journal of Computer Vision, 2010
    58
  16. E Kalogerakis, A Hertzmann, K Singh.
    Learning 3D mesh segmentation and labeling. ACM Transactions on Graphics (TOG, 2010
    58
  17. Rajkumar Buyya, Rajiv Ranjan, Rodrigo N Calheiros.
    InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services. In Proceedings of the 10th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP ’10, 2010
    58
  18. R A Newcombe, A J Davison.
    Live dense reconstruction with a single moving camera. IEEE Conference on Computer Vision and pattern Recognition, 2010
    58
  19. Y Peng, A Ganesh, J Wright, W Xu, Y Ma.
    Rasl: Robust alignment by sparse and low-rank decomposition for linearly correlated images. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR, 2010
    58
  20. M Breitenstein, F Reichlin, B Leibe, E Koller-Meier, L Van Gool.
    Robust tracking-by-detection using a detector confidence particle filter. In ICCV, 2010
    58
  21. Sabina Alkire, M E Santos.
    Acute Multidimensional Poverty: A New Index for Developing Countries. OPHI Working Paper Series, 38. Oxford: Oxford Poverty and Human Development Initiative (OPHI, 2010
    57
  22. A Myronenko, X Song.
    Point set registration: coherent point drift. IEEE Trans. Pattern Anal. Mach. Intell, 2010
    56
  23. A Khisti, G W Wornell.
    Secure transmission with multiple antennas - Part II: The MIMOME wiretap channel. IEEE Trans. Inf. Theory, 2010
    56
  24. V Toubiana, A Narayanan, D Boneh, H Nissenbaum, S Barocas.
    Adnostic: Privacy preserving targeted advertising. in Proc. Network and Distributed System Security Sym, 2010
    56
  25. C Harrison, D Tan, D Morris.
    Skinput: appropriating the body as an input surface. In Proceedings of CHI ’10, ACM, 2010
    56
  26. Blaise Thomson, Steve Young.
    Bayesian update of dialogue state: A POMDP framework for spoken dialogue systems. Computer Speech & Language, 2010
    56
  27. J Leskovec, D Chakrabarti, J Kleinberg, C Faloutsos, Z.
    Ghahramani , Kronecker Graphs: An approach to modeling networks. Journal of Machine Learning Research (JMLR, 2010
    55
  28. B Heller, S Seetharaman, P Mahadevan, Y Yiakoumis, P Sharma, S Bannerjee, N McKeown.
    ElasticTree: Saving Energy in Data Center Networks. In NSDI, 2010
    55
  29. Y Wang, S Boyd.
    Fast model predictive control using online optimization. IEEE Trans. Control Syst. Technol, 2010
    55
  30. Tom Kwiatkowski, Luke Zettlemoyer, Sharon Goldwater, Mark Steedman.
    Inducing Probabilistic CCG Grammars from Logical Form with HigherOrder Unification. In Proceedings of the Conference on Empirical Methods in Natural Language Processing, 2010
    55
  31. Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, Ben Y Zhao.
    Detecting and characterizing social spam campaigns. In Proceedings of the 10th ACM SIGCOMM conference on Internet measurement. ACM, 2010
    54
  32. D Needell, R Vershynin.
    Signal recovery from incomplete and inaccurate measurements via regularized orthogonal matching pursuit. IEEE J. Sel. Topics Signal Process, 2010
    54
  33. S Srivastava, S Gulwani, J S Foster.
    From program verification to program synthesis. In POPL, 2010
    54
  34. Silas Boyd-Wickizer, Austin T Clements, Yandong Mao, Aleksey Pesterev, M Frans Kaashoek, Robert Morris, Nickolai Zeldovich.
    An analysis of Linux scalability to many cores. 2010
    54
  35. S Petrović, M Osborne, V Lavrenko.
    Streaming First Story Detection with application to Twitter. NAACL HLT, 2010
    54
  36. K Wurm, A Hornung, M Bennewitz, C Stachniss, W Burgard.
    OctoMap: A Probabilistic, Flexible, and Compact3D Map Representation for Robotic Systems. In Proc. ICRA 2010 Workshop on Best Practice in 3D Perception and Modeling for Mobile Manipulation, 2010
    53
  37. M Campello, J R Graham, C R Harvey.
    The Real Effects of Financial Constraints: Evidence from a Financial Crisis. Journal of Financial Economics, 2010
    53
  38. M Afonso, J Bioucas-Dias, M Figueiredo.
    Fast image recovery using variable splitting and constrained optimization. IEEE Transactions on Image Processing, 2010
    53
  39. Ryan McDonald, Keith Hall, Gideon Mann.
    Distributed Training Strategies for the Structured Perceptron. In Proceedings of NAACL, 2010
    52
  40. M Mathioudakis, N Koudas.
    Twittermonitor: Trend Detection Over the Twitter Stream. In Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, 2010
    52
  41. A Ritter, C Cherry, B Dolan.
    Unsupervised Modeling of Twitter Conversations. NAACL HLT, 2010
    52
  42. J Mudigonda, P Yalagandula, M Al-Fares, J C Mogul.
    COTS data-center Ethernet for multipathing over arbitrary topologies. In NSDI, 2010
    52
  43. Nava Ashraf, James Berry, Jesse M Shapiro.
    Can Higher Prices Stimulate Product use? Evidence from a Field Experiment in Zambia. American Economic Review, 2010
    51
  44. R Rubinstein, A M Bruckstein, M Elad.
    Dictionaries for sparse representation modeling. Proc. SPIE, 2010
    51
  45. Jia Deng, Alexander C Berg, Kai Li, Fei-Fei Li.
    What does classifying more than 10,000 image categories tell us. In ECCV, 2010
    51
  46. L Huang, K Sagae.
    Dynamic programming for linear-time incremental parsing. In Proc. of ACL, 2010
    51
  47. Niranjan Srinivas, Andreas Krause, Sham Kakade, Matthias Seeger.
    Gaussian process optimization in the bandit setting: no regret and experimental design. In International Conference on Machine Learning, 2010
    51
  48. J Haupt, W Bajwa, G Raz, R Nowak.
    Toeplitz compressed sensing matrices with applications to sparse channel estimation. IEEE Trans. Inf. Theory, 2010
    50
  49. A Farhadi, I Endres, D Hoiem.
    Attribute-centric recognition for crosscategory generalization. In CVPR, 2010
    50
  50. A Ritter, Mausam, O Etzioni.
    A latent Dirichlet allocation method for selectional preferences. In Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics (ACL-10, 2010
    50
  51. A Mislove, B Viswanath, K P Gummadi, P Druschel.
    You are who you know: Inferring user profiles in Online Social Networks. In Proceedings of the 3rd ACM International Conference of Web Search and Data Mining (WSDM’10, 2010
    50
  52. D Battr´e, S Ewen, F Hueske, O Kao, V Markl, D Warneke.
    Nephele/PACTs: A Programming Model and Execution Framework for Web-Scale Analytical Processing. In SoCC ’10: Proceedings of the ACM Paper ID: 22071408 93 International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Impact Factor (2012): 3.358 Volume 3 Issue 8, August 2014 www.ijsr.net Licensed Under Creative Commons Attribution CC B, 2010
    50
  53. M Gjoka, M Kurant, C T Butts, A Markopoulou.
    Walking in Facebook: A Case Study of Unbiased Sampling of OSNs. in Proc. IEEE INFOCOM, 2010
    49
  54. J Leverich, C Kozyrakis.
    On the energy (in)efficiency of hadoop clusters. In ACM SIGOPS Operating Systems Review, 2010
    49
  55. D Erhan, Y Bengio, A Courville, P-A Manzagol, P Vincent, S Bengio.
    Why does unsupervised pre-training help deep learning. Journal of Machine Learning Research, 2010
    49
  56. M Yu, J Rexford, M J Freedman, J Wang.
    Scalable Flow-Based Networking with DIFANE. In SIGCOMM, 2010
    49
  57. Y Eldar, H Rauhut.
    Average case analysis of multichannel sparse recovery using convex relaxation. IEEE Trans. Inform. Theory, 2010
    49
  58. L Ladicky, C Russell, P Kohli, Torr.
    P.H.: Graph cut based inference with co-occurrence statistics. In: ECCV. 2010
    48
  59. S Goferman, L Zelnik-Manor, A Tal.
    Context-Aware Saliency Detection. Proc. IEEE Conf. Computer Vision and Pattern Recognition, 2010
    48
  60. R Moore, W Lewis.
    Intelligent Selection of Language Model Training Data. in ACL (Short Papers, 2010
    48
  61. L Dalessandro, M F Spear, M L Scott.
    NOrec: Streamlining STM by Abolishing Ownership Records. In Proceedings of the 15th ACM Symposium on Principles and Practice of Parallel Programming, 2010
    48
  62. L Cabral, A Hortacsu.
    Dynamics of Seller Reputation: Theory and Evidence from eBay. Journal of Industrial Economics, 2010
    48
  63. I Endres, D Hoiem.
    Category independent object proposals. In ECCV, 2010
    48
  64. G WONDRACEK, T HOLZ, E KIRDA, C KRUEGEL.
    A practical attack to de-anonymize social network users. In the 31st IEEE Symposium on Security and Privacy, 2010
    48
  65. L Fang, K LeFevre.
    Privacy Wizards for Social Networking Sites. In Proceedings of the 19th International World Wide Web Conference (WWW’10), Releigh, NC, 2010
    48
  66. N Hopper, E Y Vasserman, E Chan-TIN.
    How much anonymity does network latency leak. ACM Trans. Inf. Syst. Secur, 2010
    48
  67. Nitin Madnani, Bonnie J Dorr.
    Generating phrasal and sentential paraphrases: A survey of datadriven methods. Comput. Linguist, 2010
    47
  68. G Tsoumakas, I Katakis, Vlahavas.
    I.: Mining multi-label data. Data Mining and Knowledge Discovery Handbook, 2nd edn, 2010
    47
  69. D Silver, J Veness.
    Monte-carlo planning in large POMDPs. In NIPS 23, 2010
    47
  70. Xiaokui Xiao, Guozhang Wang, Johannes Gehrke.
    Differential privacy via wavelet transforms. In ICDE, 2010
    47
  71. J SCHAD, J DITTRICH, J-A QUIANÉ-RUIZ.
    Runtime Measurements in the Cloud: Observing, Analyzing, and Reducing Variance. In Proceedings of the 36th International Conference on Very Large Data Bases (VLDB’10, 2010
    47
  72. Y Polyanskiy, H V Poor, S Verdú.
    Channel coding rate in the finite blocklength regime. IEEE Trans. Inf. Theory, 2010
    47
  73. F WU, D WELD.
    Open information extraction using wikipedia. In Computational Linguistics, 2010
    47
  74. M A Davenport, P T Boufounos, M B Wakin, R G Baraniuk.
    Signal processing with compressive measurements. IEEE Journal of Selected Topics in Signal Processing, 2010
    47
  75. H Ballani, P Francis.
    CONMan: A Step Towards Network Manageability. in Proc. of SIGCOMM, 2007. ACM SIGCOMM Computer Communication Review 66 Volume 40, Number 1, 2010
    46
  76. R Kontchakov, C Lutz, D Toman, F Wolter, Zakharyaschev.
    M.: The combined approach to query answering in DL-Lite. In: Proc. of the 12th Int. Conf. on Principles of Knowledge Representation and Reasoning (KR 2010, 2010
    46
  77. Edward J Schwartz, Thanassis Avgerinos, David Brumley.
    All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask. In Proceedings of the IEEE Symposium on Security and Privacy, 2010
    46
  78. G Richards, S Lebresne, B Burg, J Vitek.
    An analysis of the dynamic behavior of JavaScript programs. In PLDI, 2010
    46
  79. V Nair, G E Hinton.
    Rectified linear units improve restricted boltzmann machines. In Proceedings of the 27th International Conference on Machine Learning (ICML, 2010
    46
  80. Donald Kossmann, Tim Kraska, Simon Loesing.
    An evaluation of alternative architectures for transaction processing in the cloud. In SIGMOD Conference, 2010
    46
  81. V Lyubashevsky, C Peikert, O Regev.
    On ideal lattices and learning with errors over rings. In Proc. of EUROCRYPT, volume 6110 of LNCS, 2010
    46
  82. H Pérez-Urbina, B Motik, Horrocks.
    I.: Tractable query answering and rewriting under description logic constraints. Journal of Applied Logic, 2010
    46
  83. Andrew Begel, Yit Phang Khoo, Thomas Zimmermann.
    Codebook: discovering and exploiting relationships in software repositories. In Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1, ICSE ’10, 2010
    45
  84. N Sundaram, T Brox, K Keutzer.
    Dense point trajectories by GPUaccelerated large displacement optical flow. In European Conference on Computer Vision (ECCV), Lecture Notes in Computer Science, 2010
    45
  85. B Suh, L Hong, P Pirolli, Chi.
    E.H.: Want to be retweeted? large scale analytics on factors impacting retweet in twitter network. In: Social Computing (SocialCom), 2010 IEEE Second International Conference on, 2010
    45
  86. Z Shen H Ji, C Liu, Y Xu.
    Robust subspace segmentation by low-rank representation. In CVPR, 2010
    45
  87. L Bottou.
    Large-scale machine learning with stochastic gradient descent. Proceedings of the 19th International Conference on Computational Statistics (COMPSTAT’2010, 2010
    45