Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. Jean-Guillaume Forand.
    Two-party competition with persistent policies. Journal of Economic Theory, 2014
    3
  2. A T Irish, J T Isaacs, F Quitin, J P Hespanha, U Madhow.
    Belief propagation based localization and mapping using sparsely sampled GNSS SNR measurements. In Proc. of the International Conference on Robotics and Automation, 2014
    3
  3. I Nourdin, G Peccati, Y Swan.
    Entropy and the fourth moment phenomenon. Journal of Functional Analysis, 2014
    3
  4. B Barak, S Garg, Y T Kalai, O Paneth, A Sahai.
    Protecting obfuscation against algebraic attacks. In Eurocrypt, 2014
    3
  5. Ming Fang, Ofer Zeitouni.
    Branching random walks in time inhomogeneous environments, Electron. MR-2968674 EJP 19, 2014
    3
  6. S Farrell, D Kutscher, C Dannewitz, B Ohlman, A Keranen, P Hallam-Baker.
    Naming Things with Hashes. RFC 6920, April 2013. Laganier & Dupont Standards Track [Page 12] RFC 7343 ORCHIDv2, 2014
    3
  7. S Hollingworth, M Zhao, Baylor SM.
    The amplitude and time course of the myoplasmic free [Ca2þ] transient in fast-twitch fibers of mouse muscle. 1007EC COUPLING ROLE IN MUSCLE AGING at Serial Record on M arch 3, 2014
    3
  8. C Costello, H Hisil, Smith.
    B.: Faster compact Diffie–Hellman: endomorphisms on the x-line. EUROCRYPT 2014. LNCS 8441, 2014
    3
  9. T Thüm, S Apel, C Kästner, I Schaefer, G Saake.
    A classification and survey of analysis strategies for software product lines. ACM Computing Surveys, 2014
    3
  10. J Tschannen, C A Furia, M Nordio, B Meyer.
    Program checking with less hassle. In VSTTE, volume 8164 of LNCS, 2014
    3
  11. P Honohan.
    Banking Crises. The Oxford Handbook of Banking, 2 nd edition, 2014
    3
  12. A Kovalenkov, X Vives.
    Competitive rational expectations equilibria without apology. J. Econ. Theory, 2014
    3
  13. M Fiorini, M P Keane.
    How the allocation of children’s time affects cognitive and non-cognitive development. Journal of Labor Economics, 2014
    3
  14. M-M Cheng, Z Zhang, W-Y Lin, P H S Torr, “BING.
    Binarized normed gradients for objectness estimation at 300fps. in IEEE CVPR, 2014
    3
  15. Anupam Das, Joseph Bonneau, Matthew Caesar, Nikita Borisov, XiaoFeng Wang.
    The tangled web of password reuse. In Symposium on Network and Distributed System Security (NDSS, 2014
    3
  16. J Kim, P Nguyen, S Weir, P J Guo, R C Miller, K Z Gajos.
    Crowdsourcing step-by-step information extraction to enhance existing how-to videos. In Proceedings of the 2014 ACM annual conference on Human factors in computing systems, ACM, 2014
    3
  17. M Birkner, A Greven, F den Hollander.
    Quenched large deviation principle for words in a letter sequence. Probab. Theory Related Fields 148 (2010) 403–456. MR-2678894 ECP 19, 2014
    3
  18. E Andreeva, A Bogdanov, A Luykx, B Mennink, N Mouha, Yasuda.
    K.: APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. In: FSE. Lecture Notes in Computer Science, 2014
    3
  19. H V NGUYEN, C KÄSTNER, T N NGUYEN.
    Exploring Variability-Aware Execution for Testing Plugin-Based Web Applications. In Proc. Int’l Conf. Software Engineering (ICSE). ACM, 2014
    3
  20. D Sun, S Roth, Black.
    M.J.: A quantitative analysis of current practices in optical flow estimation and the principles behind them. International Journal of Computer Vision (IJCV, 2014
    3
  21. T MAYBERRY, E-O BLASS, A H CHAN.
    Efficient private file retrieval by combining ORAM and PIR. In Proc. NDSS, 2014
    3
  22. S Chen, J Steinberger.
    Tight Security Bounds for Key-Alternating Ciphers. In EUROCRYPT 2014, 2014
    3
  23. H Berestycki, G Chapuisat.
    Traveling fronts guided by the environment for reactiondiffusion equations. Networks and Heterogeneous Media, 8 (2013),79–114. hal-00924459, version 1 - 6, 2014
    3
  24. James Brotherston, Jules Villard.
    Parametric completeness for separation theories. In Proceedings of POPL-41, 2014
    3
  25. M Grabisch, P Sudhölter.
    2012): “The bounded core for games with precedence constraints. Annals of Operations Research, 2014
    3
  26. Jonathan Berant, Percy Liang.
    Semantic parsing via paraphrasing. In Proceedings of ACL, 2014
    2
  27. M Ulusoy.
    Readability Approaches: Implications for Turkey. International Education Journal, 2014
    2
  28. A Andoni, P Indyk, H L Nguyen, I Razenshteyn.
    Beyond locality-sensitive hashing. In SODA, 2014
    2
  29. M Rieth.
    Myopic governments and welfare-enhancing debt limits. Journal of Economic Dynamics & Control, 2014
    2
  30. A Artikis, M Weidlich, F Schnitzler, I Boutsis, T Liebig, N Piatkowski, C Bockermann, K Morik, V Kalogeraki, J Marecek, A Gal, S Mannor, D Gunopulos, D Kinane.
    Heterogeneous stream processing and crowdsourcing for urban tra c management. In Proceedings of the 17th International Conference on Extending Database Technology, 2014
    2
  31. L Ma, K Agrawal, R D Chamberlain.
    A memory access model for highly-threaded many-core architectures,” Future Generation. Computer Systems, 2014
    2
  32. A Kriegl, P W Michor, A Rainer.
    An exotic zoo of diffeomorphism groups on R. 2014
    2
  33. P Alvaro, N Conway, J M Hellerstein, D Maier.
    Blazes: Coordination analysis for distributed programs. In ICDE, 2014
    2
  34. N LAMBERT, J LANGFORD, J W VAUGHAN, Y CHEN, D M REEVES, Y SHOHAM, D M PENNOCK.
    An axiomatic characterization of wagering mechanisms. Journal of Economic Theory. (Forthcoming, 2014
    2
  35. Xin Liang, Ren-Cang Li.
    The hyperbolic quadratic eigenvalue problem. 2014
    2
  36. F Ortalo-Magné, A Prat.
    On the Political Economy of Urban Growth: Homeownership versus Affordability. American Economic Journal: Microeconomics, 2014
    2
  37. C Deser, A S Phillips, M A Alexander, B V Smoliak.
    Projecting North American climate over the next 50 years: uncertainty due to internal variability. J. Clim, 2014
    2
  38. N J YUAN, Y ZHENG, L ZHANG, X XIE.
    T-Finder: A Recommender System for Finding Passengers and Vacant Taxis. IEEE Transactions on Knowledge and Data Engineering, 2014
    2
  39. K Vakilinia, T-Y Chen, S V S Ranganathan, A R Williamson, D Divsalar, R D Wesel.
    Short-blocklength non-binary LDPC codes with feedback-dependent incremental transmissions. in Proc. 2014 IEEE Int. Symp. Inf. Theory (ISIT, 2014
    2
  40. D Jiang, G Chen, B C Ooi, K-L Tan.
    epic: an extensible and scalable system for processing big data. 2014
    2
  41. D Bernstein, C Chuengsatiansup, T Lange, P Schwabe.
    Kummer strikes back: new DH speed records. In Cryptology ePrint Archive, Report 2014/134, 2014
    2
  42. C Zimmer, F Mueller.
    Nocmsg: Scalable noc-based message passing. in International Symposium on Cluster, Cloud and Grid Computing, 2014
    2
  43. James Bornholt, Todd Mytkowicz, Kathryn S McKinley.
    Uncertain: a First-Order Type for Uncertain Data. In Proceedings of the 19th international conference on Architectural, 2014
    2
  44. Marco Marelli, Stefano Menini, Marco Baroni, Luisa Bentivogli, Raffaella Bernardi, Roberto Zamparelli.
    A SICK cure for the evaluation of compositional distributional semantic models. In Proceedings of LREC, Reykjavik, 2014
    2
  45. D Slepčev.
    Counterexample to regularity in average-distance problem. Ann. Inst. H. Poincaré (C, 2014
    2
  46. T Vos, Mathers CD.
    The burden of mental disorders: a comparison of methods between the Australian burden of disease studies and 320. JOURNAL OF PUBLIC HEALTH at Pennsylvania State U niversity on February, 2014
    2
  47. When on.
    or commitments. information. resource. FHWA, “Interim Guidance on MAP-21 Section 1319 Accelerated Decisionmaking in Environmental Reviews, 2014
    2
  48. J Bonneau, A Narayanan, A Miller, J Clark, J A Kroll, Felten.
    E.W.: Mixcoin: Anonymity for Bitcoin with accountable mixes. In: Financial Cryptography and Data Security, 2014
    2
  49. A Szabolcsi, J D Whang, V Zu.
    Quantifier words and their multifunctional(?) parts. Language and Linguistics, 2014
    2
  50. Amir Houmansadr, Edmund Wong, Vitaly Shmatikov.
    No Direction Home: The True Cost of Routing Around Decoys. In the 21st Annual Network & Distributed System Security Symposium (NDSS, 2014
    2
  51. D Afergan, E M Peck, E T Solovey, A Jenkins, S W Hincks, E T Brown, R Chang, R J Jacob.
    Dynamic difficulty using brain metrics of workload. In Proc. CHI 2014, 2014
    2
  52. J T Isaacs, A T Irish, F Quitin, U Madhow, J P Hespanha.
    Bayesian localization and mapping using GNSS SNR measurements. In Proc. of 2014 IEEE Position Location and Navigation Symposium, 2014
    2
  53. M-M Cheng, S Zheng, W-Y Lin, J Warrell, V Vineet, P Sturgess, N Crook, N Mitra, P Torr.
    ImageSpirit: Verbal guided image parsing. ACM TOG, 2014
    2
  54. E Angelino, E Kohler, A Waterland, M Seltzer, R P Adams.
    Accelerating MCMC via parallel predictive prefetching. In 30th Conference on Uncertainty in Artificial Intelligence, UAI ’14, 2014
    2
  55. Trappe SW, M Harber, A Creer.
    Single muscle fiber adaptations with marathon training. Accepted July 13, 2006 Decision Editor: Luigi Ferrucci, MD, PhD 458 GALBÁN ET AL. at Serial Record on February 27, 2014
    2
  56. T Rivoal, S Seuret.
    Hardy-Littlewood series and even continued fractions. J. Anal. Math, 2014
    2
  57. M Danelutto, Torquati.
    M.: Loop parallelism: a new skeleton perspective on data parallel patterns. Proc. of Intl. Euromicro PDP 2014: Parallel Distributed and network-based Processing. IEEE, 2014
    2
  58. Niku Määttänen, Marko Terviö.
    Income distribution and housing prices: An assignment model approach. Journal of Economic Theory, 2014
    2
  59. Eric Miles.
    Iterated group products and leakage resilience against NC 1. In ACM Innovations in Theoretical Computer Science conf. (ITCS, 2014
    2
  60. P Bailis, A Davidson, A Fekete, A Ghodsi, J M Hellerstein, I Stoica.
    Highly available transactions: Virtues and limitations. In VLDB, 2014
    2
  61. Milica Gašić, Steve Young.
    Gaussian processes for POMDP-based dialogue manager optimisation. IEEE Transactions on Audio, Speech, and Language Processing, 2014
    2
  62. Matthew Henderson, Blaise Thomson, Steve Young.
    Word-based dialog state tracking with recurrent neural networks. in Proc. of SIGdial, 2014
    2
  63. N Katta, O Alipourfard, J Rexford, D Walker.
    Infinite cacheflow in software-defined networks. in Proceedings of the HotSDN Workshop, HotSDN ’14, 2014
    2
  64. J Tan, D Carmon, D Baron.
    Signal estimation with additive error metrics in compressed sensing. IEEE Trans. Inf. Theory, 2014
    2
  65. D Coetzee, A Fox, M A Hearst, B Hartmann.
    Should your MOOC forum use a reputation system. In Proceedings of the 2014 Conference on Computer-Supported Cooperative Work, ACM, 2014
    2
  66. Sandro Coretti, Ueli Maurer, Bjorn Tackmann, Daniele Venturi.
    From single-bit to multi-bit public-key encryption via non-malleable codes. In Cryptology ePrint Archive, Report 2014/324, 2014
    2
  67. K Wang, B H Meyer, R Zhang, K Skadron, M R Stan.
    Walking pads: Fast power-supply pad-placement optimization. In ASP-DAC, 2014
    2
  68. Dennis Hofheinz, Victor Shoup.
    GNUC: A New Universal Composability Framework. Journal of Cryptology, 2014
    2
  69. S S Roy, F Vercauteren, I Verbauwhede.
    High precision discrete gaussian sampling on FPGAs. Selected Areas in Cryptography–SAC 2013, 2014
    2
  70. O van M Riedle.
    Gaans, Stochastic integration for Lévy processes with values in Banach spaces, Stoch. Proc. App. 119, 1952-1974 (2009) MR-2519352 EJP 19, 2014
    2
  71. D FRIED, S KOBOUROV.
    G.: Maps of computer science. In 7th IEEE PacificVis Symposium, 2014
    2
  72. I Beschastnikh, Y Brun, M D Ernst, A Krishnamurthy.
    Inferring models of concurrent systems from logs of their behavior with csight. In ACM/IEEE International Conference on Software Engineering (ICSE, 2014
    2
  73. M Diciolla, C H P Kim, M Kwiatkowska, A Mereacre.
    Synthesising optimal timing delays for timed i/o automata. In EMSOFT’14. ACM, 2014
    2
  74. N WADHWA, M RUBINSTEIN, F DURAND, W T FREEMAN.
    Riesz pyramid for fast phase-based video magnification. In Computational Photography (ICCP), 2014 IEEE International Conference on, IEEE, 2014
    2
  75. J T Geiger, F Weninger, J F Gemmeke, M Wöllmer, B Schuller, G Rigoll.
    Memory-enhanced neural networks and NMF for robust ASR. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 2014
    2