Most Cited Computer Science Articles
This list is generated from documents in the CiteSeer^{x} database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeer^{x} database, since the database is continuously updated.
All Years
 1990
 1991
 1992
 1993
 1994
 1995
 1996
 1997
 1998
 1999
 2000
 2001
 2002
 2003
 2004
 2005
 2006
 2007
 2008
 2009
 2010
 2011
 2012
 2013
 2014
 2015

Robust realtime visual odometry for dense RGBD mapping. In ICRA, 201312

Resolving the conflict between generality and plausibility in verified computation. In Proceedings of the 8th EuoroSys Conference, EuroSys ’13, 201312

On the function field sieve and the impact of higher splitting probabilities: Application to discrete logarithms. in F21971”, Advances in Cryptology – CRYPTO 2013, LNCS 8043, 201312

An Experimental Investigation of Colonel Blotto Games. Economic Theory, 201311

MDCC: Multidata center consistency. In EuroSys, 201311

Testing for racial differences in the mental ability of young children. American Economic Review, 201311

Gps: a graph processing system. In SSDBM, 201311

I Want my Voice to be Heard: IP over VoiceoverIP for Unobservable Censorship Circumvention. In the 20th Annual Network & Distributed System Security Symposium (NDSS, 201311

Finegrained crowdsourcing for finegrained recognition. In Computer Vision and Pattern Recognition (CVPR), 2013 IEEE Conference on, 201311

Optimal Inattention to the Stock Market with Information Costs and Transactions Costs. Econometrica, 201311

OctoMap: An efficient probabilistic 3D mapping framework based on octrees. Autonomous Robots, 201311

LowLatency Trading. Journal of Financial Markets, Forthcoming, 201311

Better human computation through principled voting. In Proceedings of the National Conference on Arti cial Intelligence (AAAI, 201311

Differential dataflow. In Conference on Innovative Data Systems Research (CIDR, 201310

Realtime crowd labeling for deployable activity recognition. In Proceedings of the 2013 conference on Computer supported cooperative work, ACM, 201310

What is the Risk of European Sovereign Debt Defaults. Fiscal Space, CDS Spreads and Market Pricing of Risk. Journal of International Money and Finance, 201310

seL4: from general purpose to a proof of information flow enforcement. In IEEE Symp. Security & Privacy, 201310

Is the Sample Good Enough? Comparing Data from Twitter’s Streaming API with Twitter’s Firehose. In Proceedings of the International Conference of Weblogs and Social, 201310

Blockcoordinate FrankWolfe optimization for structural SVMs. In ICML, 201310

Path ORAM: an extremely simple oblivious ram protocol. In In CCS, 201310

Direct trajectory optimization of rigid body dynamical systems through contact. In Algorithmic Foundations of Robotics X, 201310

ExpectationMaximization Gaussianmixture approximate message passing. IEEE Trans. Signal Process, 201310

Iterationcomplexity of blockdecomposition algorithms and the alternating minimization augmented lagrangian method. SIAM Journal on Optimization, 201310

Distributed welfare games. Operations Research, 201310

D.: Checking NFA equivalence with bisimulations up to congruence. POPL ’13, 201310

Hingeloss Markov random fields: Convex inference for structured prediction. in Proc. UAI’13, 201310

The Basic public finance of publicprivate partnerships. Journal of the European Economic Association, 201310

A Report on the First Native Language Identification Shared Task. In Proceedings of the Eighth Workshop on Innovative Use of NLP for Building Educational Applications, 201310

Recursive deep models for semantic compositionality over a sentiment treebank. In Proceedings of EMNLP, 201310

Reactive Discovery of PointtoPoint Routes. in LowPower and Lossy Networks", RFC 6997, 201310

Efficient methods for overlapping group lasso. IEEE Transactions on Pattern Analysis and Machine Intelligence, 201310

School Admissions Reform in Chicago and England: Comparing Mechanisms by their Vulnerability to Manipulation. American Economic Review, 201310

Automatic verification of competitive stochastic systems. Formal Methods in System Design, 201310

Succinct noninteractive arguments via linear interactive proofs. In IACR Theory of Cryptography Conference (TCC, 20139

Massive MIMO in the UL/DL of Cellular Networks: How Many Antennas Do We Need. IEEE Journal On Selected Areas In Communications, 20139

Discriminative methods for noise robust speech recognition: A CHiME challenge benchmark. in Proc. CHiME2013, 20139

Inference based on conditional moment inequalities. Econometrica, 20139

Parallel browsing behavior on the web. in Proceedings of the 21st ACM conference on Hypertext and hypermedia, HT ’10, 20139

Are Consumers Myopic? Evidence from New and Used Car Purchases. American Economic Review, 20139

QLearning and Policy Iteration Algorithms for Stochastic Shortest Path Problems. Annals of Operations Research, 20139

A feasible method for optimization with orthogonality constraints. Mathematical Programming A, 20139

Nuzzer: A largescale devicefree passive localization system for wireless environments. Mobile Computing, IEEE Transactions on, 20139

SemFix: Program repair via semantic analysis. In Proceedings of the 2013 International Conference on Software Engineering, 20139

Deconstructing disengagement: analyzing learner subpopulations in massive open online courses. In LAK ’13, ACM, 20139

Adaptive robust optimization for the security constrained unit commitment problem. IEEE Trans. Power Syst, 20139

Matching with (branchofchoice) contracts at United States Military Academy. Econometrica, 20139

Gotos considered harmful and other programmers’ taboos. In Proceedings of the 12th Workshop of the Psychology of Programming Interest Group, 2000, 20139

Edinburgh’s machine translation systems for European language pairs. in Proceedings of the Eighth Workshop on Statistical Machine Translation. Sofia, Bulgaria: Association for Computational Linguistics, 20139

C.: On patterndirected search of archives and collections. Journal of the American Society for Information Science, 20139

Comments on Bufferbloat. In ACM SIGCOMM Computer Communication Review, Volume 43, Issue 1, 20139

The Parrot is Dead: Observing Unobservable Network Communications. In the 34th IEEE Symposium on Security & Privacy, 20139

H.: Views: compositional reasoning for concurrent programs. In: Proceedings of the 40th annual ACM SIGPLANSIGACT symposium on Principles of programming languages. POPL ’13, 20139

Workplace Heterogeneity and the Rise of West German Wage Inequality.” Quarterly. Journal of Economics, 20139

The multiway relay channel. IEEE Trans. Inf. Theory, 20139

PPDB: The paraphrase database. In Proc. NAACL, 20139

Parsing with compositional vector grammars. In Proceedings of the ACL, 20139

Practical Control Flow Integrity and Randomization for Binary Executables. In Security and Privacy (SP), 2013 IEEE Symposium on, 20139

DADMM: A communicationefficient distributed algorithm for separable optimization. IEEE Trans. Sig. Proc, 20139

D.: Robust odometry estimation for RGBD cameras. In: International Conference on Robotics and Automation (ICRA, 20139

Computing cartograms with optimal complexity. Discrete & Computational Geometry, 20139

Executive Networks and Firm Policies: Evidence from the Random Assignment of MBA Peers. Review of Financial Studies, 20139

Solving bdd by enumeration: An update. In CTRSA, 20139

Automated feedback generation for introductory programming assignments. In PLDI. ACM, 20139

BGP/MPLS IP Virtual Private Networks (VPNs. RFC 4364, February 2006. Kumaki Experimental [Page 13] RFC 6882 Support for RSVPTE in L3VPNs, 20139

The combined approach to obda: Taming role hierarchies using filters. In Proc. of the 12th International Semantic Web Conference (ISWC 2013), volume 8218 of Lecture Notes in Computer Science, 20139

index calculus for the medium prime case: Application to 1175bit and 1425bit finite fields. Advances in Cryptology – EUROCRYPT 2013, LNCS 7881, 20139

Constantround concurrent zero knowledge from pcertificates. In FOCS, 20138

Reducing web latency: the virtue of gentle aggression. In SIGCOMM, 20138

Nonmalleable codes from twosource extractors. CRYPTO 2013, Part II, volume 8043 of LNCS, 20138

Norms as a basis for governing sociotechnical systems. ACM Transactions on Intelligent Systems and Technology (TIST, 20138

Stochastic Superoptimization. In Proceedings of the eighteenth international conference on Architectural Support for Programming Languages and Operating Systems. ACM, 20138

Learning partbased templates from large collections of 3d shapes. ACM Trans. Graphics, 20138