Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. T Whelan, H Johannsson, M Kaess, J Leonard, J McDonald.
    Robust real-time visual odometry for dense RGB-D mapping. In ICRA, 2013
    12
  2. Srinath Setty, Benjamin Braun, Victor Vu, Andrew J Blumberg, Bryan Parno, Michael Walfish.
    Resolving the conflict between generality and plausibility in verified computation. In Proceedings of the 8th EuoroSys Conference, EuroSys ’13, 2013
    12
  3. F Göloğlu, R Granger, G McGuire, J Zumbrägel.
    On the function field sieve and the impact of higher splitting probabilities: Application to discrete logarithms. in F21971”, Advances in Cryptology – CRYPTO 2013, LNCS 8043, 2013
    12
  4. T Rompf, A K Sujeeth, N Amin, K J Brown, V Jovanovic, H Lee, M Jonnalagedda, K Olukotun, M Odersky.
    Optimizing data structures in high-level programs: new directions for extensible compilers based on staging. In POPL, 2013
    11
  5. S M Chowdhury, D Kovenock, R M Sheremeta.
    An Experimental Investigation of Colonel Blotto Games. Economic Theory, 2013
    11
  6. T Kraska, G Pang, M J Franklin, S Madden, A Fekete.
    MDCC: Multi-data center consistency. In EuroSys, 2013
    11
  7. Roland G Fryer, J, S D Levitt.
    Testing for racial differences in the mental ability of young children. American Economic Review, 2013
    11
  8. S Salihoglu, J Widom.
    Gps: a graph processing system. In SSDBM, 2013
    11
  9. Amir Houmansadr, Thomas Riedl, Nikita Borisov, Andrew Singer.
    I Want my Voice to be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention. In the 20th Annual Network & Distributed System Security Symposium (NDSS, 2013
    11
  10. Jia Deng, Jonathan Krause, Li Fei-Fei.
    Fine-grained crowdsourcing for fine-grained recognition. In Computer Vision and Pattern Recognition (CVPR), 2013 IEEE Conference on, 2013
    11
  11. M Yamada, T Suzuki, T Kanamori, H Hachiya, M Sugiyama.
    Relative density-ratio estimation for robust distribution comparison. Neural computation. 2013
    11
  12. S Ji, W Xu, M Yang, K Yu.
    3D Convolutional Neural Networks for Human Action Recognition. PAMI, 2013
    11
  13. A Hornung, K M Wurm, M Bennewitz, C Stachniss, W Burgard.
    OctoMap: An efficient probabilistic 3D mapping framework based on octrees. Autonomous Robots, 2013
    11
  14. J Hasbrouck, G Saar.
    Low-Latency Trading. Journal of Financial Markets, Forthcoming, 2013
    11
  15. Andrew Mao, Ariel D Procaccia, Yiling Chen.
    Better human computation through principled voting. In Proceedings of the National Conference on Arti cial Intelligence (AAAI, 2013
    11
  16. F McSherry, D G Murray, R Isaacs, M Isard.
    Differential dataflow. In Conference on Innovative Data Systems Research (CIDR, 2013
    10
  17. W S Lasecki, Y C Song, H Kautz, J P Bigham.
    Real-time crowd labeling for deployable activity recognition. In Proceedings of the 2013 conference on Computer supported cooperative work, ACM, 2013
    10
  18. J Aizenman, H M, Y Jinjarak.
    What is the Risk of European Sovereign Debt Defaults. Fiscal Space, CDS Spreads and Market Pricing of Risk. Journal of International Money and Finance, 2013
    10
  19. Toby Murray, Daniel Matichuk, Matthew Brassil, Peter Gammie, Timothy Bourke, Sean Seefried, Corey Lewis, Xin Gao, Gerwin Klein.
    seL4: from general purpose to a proof of information flow enforcement. In IEEE Symp. Security & Privacy, 2013
    10
  20. Fred Morstatter, Jurgen Pfeffer, Huan Liu, Kathleen M Carley.
    Is the Sample Good Enough? Comparing Data from Twitter’s Streaming API with Twitter’s Firehose. In Proceedings of the International Conference of Weblogs and Social, 2013
    10
  21. S Lacoste-Julien, M Jaggi, M Schmidt, P Pletscher.
    Block-coordinate Frank-Wolfe optimization for structural SVMs. In ICML, 2013
    10
  22. E Stefanov, M van Dijk, E Shi, C Fletcher, L Ren, X Yu, S Devadas.
    Path ORAM: an extremely simple oblivious ram protocol. In In CCS, 2013
    10
  23. Michael Posa, Russ Tedrake.
    Direct trajectory optimization of rigid body dynamical systems through contact. In Algorithmic Foundations of Robotics X, 2013
    10
  24. J P Vila, P Schniter.
    Expectation-Maximization Gaussian-mixture approximate message passing. IEEE Trans. Signal Process, 2013
    10
  25. J R Marden, A Wierman.
    Distributed welfare games. Operations Research, 2013
    10
  26. S H Bach, B Huang, B London, L Getoor.
    Hinge-loss Markov random fields: Convex inference for structured prediction. in Proc. UAI’13, 2013
    10
  27. Eduardo Engel, Ronald Fisher, Alexander Galetovic.
    The Basic public finance of public-private partnerships. Journal of the European Economic Association, 2013
    10
  28. Joel Tetreault, Daniel Blanchard, Aoife Cahill.
    A Report on the First Native Language Identification Shared Task. In Proceedings of the Eighth Workshop on Innovative Use of NLP for Building Educational Applications, 2013
    10
  29. R Socher, A Perelygin, J Y Wu, J Chuang, C D Manning, A Y Ng, C Potts.
    Recursive deep models for semantic compositionality over a sentiment treebank. In Proceedings of EMNLP, 2013
    10
  30. M Goyal, E Baccelli, M Philipp, A Brandt, J Martocci.
    Reactive Discovery of Point-to-Point Routes. in Low-Power and Lossy Networks", RFC 6997, 2013
    10
  31. Lei Yuan, Jun Liu, Jieping Ye.
    Efficient methods for overlapping group lasso. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2013
    10
  32. T Chen, V Forejt, M Kwiatkowska, D Parker, A Simaitis.
    Automatic verification of competitive stochastic systems. Formal Methods in System Design, 2013
    10
  33. N Bitansky, A Chiesa, Y Ishai, R Ostrovsky, O Paneth.
    Succinct non-interactive arguments via linear interactive proofs. In IACR Theory of Cryptography Conference (TCC, 2013
    9
  34. J Hoydis, S T Brink.
    Massive MIMO in the UL/DL of Cellular Networks: How Many Antennas Do We Need. IEEE Journal On Selected Areas In Communications, 2013
    9
  35. Y Tachioka, S Watanabe, J L Roux, J R Hershey.
    Discriminative methods for noise robust speech recognition: A CHiME challenge benchmark. in Proc. CHiME-2013, 2013
    9
  36. D ANDREWS, X SHI.
    Inference based on conditional moment inequalities. Econometrica, 2013
    9
  37. J Huang, R W White.
    Parallel browsing behavior on the web. in Proceedings of the 21st ACM conference on Hypertext and hypermedia, HT ’10, 2013
    9
  38. M Busse, C Knittel, F Zettelmeyer.
    Are Consumers Myopic? Evidence from New and Used Car Purchases. American Economic Review, 2013
    9
  39. H Yu, D P Bertsekas.
    Q-Learning and Policy Iteration Algorithms for Stochastic Shortest Path Problems. Annals of Operations Research, 2013
    9
  40. Z Wen, W Yin.
    A feasible method for optimization with orthogonality constraints. Mathematical Programming A, 2013
    9
  41. M Seifeldin, A Saeed, A E Kosba, A El-Keyi, M Youssef.
    Nuzzer: A large-scale device-free passive localization system for wireless environments. Mobile Computing, IEEE Transactions on, 2013
    9
  42. Hoang Duong Thien Nguyen, Dawei Qi, Abhik Roychoudhury, Satish Chandra.
    SemFix: Program repair via semantic analysis. In Proceedings of the 2013 International Conference on Software Engineering, 2013
    9
  43. R F Kizilcec, C Piech, E Schneider.
    Deconstructing disengagement: analyzing learner subpopulations in massive open online courses. In LAK ’13, ACM, 2013
    9
  44. D Bertsimas, E Litvinov, X Sun, J Zhao, T Zheng.
    Adaptive robust optimization for the security constrained unit commitment problem. IEEE Trans. Power Syst, 2013
    9
  45. L Marshall, J Webber.
    Gotos considered harmful and other programmers’ taboos. In Proceedings of the 12th Workshop of the Psychology of Programming Interest Group, 2000, 2013
    9
  46. N Durrani, B Haddow, K Heafield, P Koehn.
    Edinburgh’s machine translation systems for European language pairs. in Proceedings of the Eighth Workshop on Statistical Machine Translation. Sofia, Bulgaria: Association for Computational Linguistics, 2013
    9
  47. G O Dworman, S O Kimbrough, Patch.
    C.: On pattern-directed search of archives and collections. Journal of the American Society for Information Science, 2013
    9
  48. M Allman.
    Comments on Bufferbloat. In ACM SIGCOMM Computer Communication Review, Volume 43, Issue 1, 2013
    9
  49. Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov.
    The Parrot is Dead: Observing Unobservable Network Communications. In the 34th IEEE Symposium on Security & Privacy, 2013
    9
  50. T Dinsdale-Young, L Birkedal, P Gardner, M Parkinson, Yang.
    H.: Views: compositional reasoning for concurrent programs. In: Proceedings of the 40th annual ACM SIGPLANSIGACT symposium on Principles of programming languages. POPL ’13, 2013
    9
  51. David Card, Jorg Heinig, Patrick Kline.
    Workplace Heterogeneity and the Rise of West German Wage Inequality.” Quarterly. Journal of Economics, 2013
    9
  52. D Gündüz, A Yener, A J Goldsmith, H V Poor.
    The multiway relay channel. IEEE Trans. Inf. Theory, 2013
    9
  53. Juri Ganitkevitch, Benjamin Van Durme, Chris Callison-Burch.
    PPDB: The paraphrase database. In Proc. NAACL, 2013
    9
  54. J DeBacker, B Heim, V Panousi, S Ramnath, I Vidangos.
    Rising inequality: transitory or permanent? New evidence from a panel of U.S. 2013
    9
  55. R Socher, J Bauer, C D Manning, A Y Ng.
    Parsing with compositional vector grammars. In Proceedings of the ACL, 2013
    9
  56. H Johannsson, M Kaess, M Fallon, J Leonard.
    Temporally scalable visual SLAM using a reduced pose graph. 2013
    9
  57. C ZHANG, T WEI, Z CHEN, L DUAN, L SZEKERES, S MCCAMANT, D SONG, W ZOU.
    Practical Control Flow Integrity and Randomization for Binary Executables. In Security and Privacy (SP), 2013 IEEE Symposium on, 2013
    9
  58. J Mota, J Xavier, P Aguiar, M Püschel.
    D-ADMM: A communication-efficient distributed algorithm for separable optimization. IEEE Trans. Sig. Proc, 2013
    9
  59. Stephen P Holland, Jonathan E Hughes, Christopher R Knittel, Nathan C Parker.
    Some Inconvenient Truths About Climate Change Policy: The Distributional Impacts of Transportation Policies.” Working paper. 2013
    9
  60. Jesper Bagger, François Fontaine, Fabien Postel-Vinay, Jean-Marc Robin.
    Tenure, experience, human capital and wages; a tractable equilibrium search model of wage dynamics. Working paper. 2013
    9
  61. C Kerl, J Sturm, Cremers.
    D.: Robust odometry estimation for RGB-D cameras. In: International Conference on Robotics and Automation (ICRA, 2013
    9
  62. M J Alam, T C Biedl, S Felsner, M Kaufmann, S G Kobourov, T Ueckerdt.
    Computing cartograms with optimal complexity. Discrete & Computational Geometry, 2013
    9
  63. P Kazemian, M Chang, H Zeng, G Varghese, N McKeown, S Whyte.
    Real Time Network Policy Checking Using Header Space Analysis. NSDI. 2013
    9
  64. M Liu, P Q Nguyen.
    Solving bdd by enumeration: An update. In CT-RSA, 2013
    9
  65. R Singh, S Gulwani, A Solar-Lezama.
    Automated feedback generation for introductory programming assignments. In PLDI. ACM, 2013
    9
  66. E Rosen, Y Rekhter.
    BGP/MPLS IP Virtual Private Networks (VPNs. RFC 4364, February 2006. Kumaki Experimental [Page 13] RFC 6882 Support for RSVP-TE in L3VPNs, 2013
    9
  67. C Lutz, I Seylan, D Toman, F Wolter.
    The combined approach to obda: Taming role hierarchies using filters. In Proc. of the 12th International Semantic Web Conference (ISWC 2013), volume 8218 of Lecture Notes in Computer Science, 2013
    9
  68. A Joux, “Faster.
    index calculus for the medium prime case: Application to 1175-bit and 1425-bit finite fields. Advances in Cryptology – EUROCRYPT 2013, LNCS 7881, 2013
    9
  69. Kai-Min Chung, Huijia Lin, Rafael Pass.
    Constant-round concurrent zero knowledge from p-certificates. In FOCS, 2013
    8
  70. Tobias Flach, Nandita Dukkipati, Andreas Terzis, Barath Raghavan, Neal Cardwell, Yuchung Cheng, Ankur Jain, Shuai Hao, Ethan Katz-Bassett, Ramesh Govindan.
    Reducing web latency: the virtue of gentle aggression. In SIGCOMM, 2013
    8
  71. J Y Campbell, S Giglio, C Polk, R Turley.
    An intertemporal CAPM with stochastic volatility. unpublished manuscript. 2013
    8
  72. Stefan Dziembowski, Tomasz Kazana, Maciej Obremski.
    Non-malleable codes from two-source extractors. CRYPTO 2013, Part II, volume 8043 of LNCS, 2013
    8
  73. Munindar P Singh.
    Norms as a basis for governing sociotechnical systems. ACM Transactions on Intelligent Systems and Technology (TIST, 2013
    8
  74. Eric Schkufza, Rahul Sharma, Alex Aiken.
    Stochastic Superoptimization. In Proceedings of the eighteenth international conference on Architectural Support for Programming Languages and Operating Systems. ACM, 2013
    8
  75. V G KIM, W LI, N J MITRA, S CHAUDHURI, S DIVERDI, T FUNKHOUSER.
    Learning part-based templates from large collections of 3d shapes. ACM Trans. Graphics, 2013
    8
  76. Peter Csermely, Tamás Korcsmáros, Huba J M Kiss, Gábor London, Ruth Nussinov.
    Structure and dynamics of molecular networks: A novel paradigm of drug discovery. Pharmacology & Therapeutics . [CrossRef. 2013
    8