Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. Quentin Louveaux, Laurent Poirrier.
    An algorithm for the separation of two-row cuts. Mathematical Programming, 2014
    2
  2. N Malviya, A Weisberg, S Madden, M Stonebraker.
    Rethinking main memory oltp recovery. In Proc. of ICDE, 2014
    2
  3. C E Andrade, M G C Resende, H J Karloff, F K Miyazawa.
    Evolutionary algorithms for overlapping correlation clustering. In Proceedings of Genetic and Evolutionary Computation Conference (GECCO’14, 2014
    2
  4. L Barth, S I Fabrikant, S Kobourov, A Lubiw, M Nöllenburg, Y Okamoto, S Pupyrev, C Squarcella, T Ueckerdt, A Wolff.
    Semantic word cloud representations: Hardness and approximation algorithms. In LATIN, LNCS, 2014
    2
  5. Richard Socher, Andrej Karpathy, Quoc V Le, Christopher D Manning, Andrew Y Ng.
    Grounded compositional semantics for finding and describing images with sentences. In Transactions of the Association for Computational Linguistics, 2014
    2
  6. F X Lin, Z Wang, L Zhong.
    K2: A mobile operating system for heterogeneous coherence domains. In ASPLOS, 2014
    2
  7. M Geist, B Scherrer.
    Off-policy learning with eligibility traces: A survey. In Journal of Machine Learning Research 15:289–333, 2014
    2
  8. H E Jens, Glenn D Rudebusch.
    Estimating Shadow-Rate Term Structure Models with Near-Zero Yields. Journal of Financial Econometrics, 2014
    2
  9. M Steyvers, T S Wallsten, E C Merkle, B M Turner.
    Evaluating Probabilistic Forecasts with Bayesian Signal Detection Models. Risk Analysis, 2014
    2
  10. M Bauer, M Bruveris, P W Michor.
    R-transforms for Sobolev H 2 -metrics on spaces of plane curves. Geometry, Imaging and Computing, 1(1):1 – 56, 2014
    2
  11. Daniel Genkin, Adi Shamir, Eran Tromer.
    RSA key extraction via low-bandwidth acoustic cryptanalysis. In CRYPTO, 2014
    2
  12. M Barbeau, G Cervera, J Garcia-Alfaro, E Kranakis.
    A new analysis of the cognitive radio jump-stay algorithm under the asymmetric model. In IEEE ICC 2014 - Cognitive Radio and Networks Symposium, 2014
    2
  13. A M Abdel-Rehim, R B Morgan, W Wilcox.
    Improved seed methods for symmetric positive definite linear equations with multiple right-hand sides. Numer. Linear Algebra Appl, 2014
    2
  14. V Kreinovich.
    Decision Making under Interval Uncertainty (and beyond. Human-Centric Decision-Making Models for Social Sciences, 2014
    2
  15. Y Li, H L Nguyen, D P Woodruff.
    On sketching matrix norms and the top singular vector. In SODA, 2014
    1
  16. doi 10 10022013JA019498 R Centeno, H Socas-Navarro, B Lites, M Kubo, Z Frank, R Shine, T Tarbell, A Title, K Ichimoto, S Tsuneta, Y Katsukawa, Y Suematsu, T Shimizu, S Nagata.
    Emergence of Small-Scale Magnetic Loops in the Quiet-Sun. Journal of Geophysical Research (Space Physics, 2014
    1
  17. F Gleseke, K Polsterer, C E Oancea, C Igel.
    Speedy greedy feature selection: Better redshift estimation via massive parallism. In European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, 2014
    1
  18. D Binkley, N Gold, M Harman, J Krinke, S Yoo.
    Orbs: Language-independent program slicing. in Foundations of Software Engineering, 2014
    1
  19. S Zhang, Z Qian, J Wu, S Lu, L Epstein.
    Virtual network embedding with opportunistic resource sharing. IEEE Trans. Parallel Distrib. Syst, 2014
    1
  20. C Qian, X Sun, Y Wei, X Tang, J Sun.
    Realtime and Robust Hand Tracking from Depth. 2014
    1
  21. Elena Andreeva, Atul Luykx, Bart Mennink, Kan Yasuda.
    COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse. In FSE, 2014
    1
  22. E Tarameshloo, P W Fong, P Mohassel.
    On Protection in Federated Social Computing Systems. In Proceedings of the 4th ACM CODASPY’14, 2014
    1
  23. J Cheney, J Gibbons, J McKinna, P Stevens.
    Towards a Repository of BX Examples. In Proc. of BX 2014, 2014
    1
  24. K Schauwecker, A Zell.
    On-board dual-stereovision for the navigation of an autonomous mav. Journal of Intelligent and Robotic Systems, 2014
    1
  25. E Gilman, M Chaloupka, B Wiedoff, J Willson.
    Mitigating seabird bycatch during hauling by pelagic longline vessels. PLoS ONE 9(1): e84499. doi:10.1371/journal.pone.0084499 McCracken, M.L. 2014. Estimation of incidental interactions with sea turtles and seabirds. in the 2013 Hawaii deep-set longline fishery. NMFS Pacific Islands Fisheries Science Center Internal Report, PIFSC IR-14-022. Issued 24, 2014
    1
  26. Emile Richard, Guillaume Obozinski, Jean-Philippe Vert.
    Tight convex relaxations for sparse matrix factorization. arXiv preprint arXiv:1407.5158. 2014
    1
  27. Anne Canteaut, Thomas Fuhr, Henri Gilbert, Maŕıa Naya-Plasencia, JeanRené Reinhard.
    Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Full version. Lecture Notes in Computer Science, 2014
    1
  28. S M Cioaba, F Lazebnik, W Li.
    On the Spectrum of Wenger Graphs. J. Combin. Theory Ser. B, 2014
    1
  29. L Chen, H W Lim, Yang.
    G.: Cross-domain password-based authenticated key exchange revisited. ACM Trans. Inform. Syst. Secur, 2014
    1
  30. E Daucé.
    Toward STDP-based population action in large networks of spiking neurons. Proc ESANN’2014. D-Facto, 2014
    1
  31. C Wagner, P Singer, M Strohmaier, B Huberman.
    Semantic stability in social tagging streams. In Proceedings of the Twenty-Third International World Wide Web Conference, 2014
    1
  32. D Furtado, S J Trejo.
    Interethnic Marriages and Their Economic Effects. In International Handbook on the Economics of Migration; Constant, A.F., Zimmerman, K.F., Eds.; Edward Elgar Publishing, 2014
    1
  33. Y Liu, C Kliman-Silver, B Krishnamurthy, R Bell, A Mislove.
    Measurement and analysis of osn ad auctions. In COSN, 2014
    1
  34. C Chekuri, J Chuzhoy.
    Polynomial bounds for the grid-minor theorem. In Proc. of ACM STOC, 2014
    1
  35. J Xuan, M Monperrus.
    Test case purification for improving fault localization. In Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE). ACM, 2014
    1
  36. Ravindran Kannan, Santosh S Vempala, David P Woodruff.
    Principal component analysis and higher correlations for distributed data. In Proceedings of The 27th Conference on Learning Theory, 2014
    1
  37. D Wang, M Der, M Karami, L Saul, D McCoy, S Savage, G Voelker.
    Search + seizure: The effectiveness of interventions on seo campaigns. In Proc. ACM IMC’14, 2014
    1
  38. A S Al-Alamri, A I Cristea.
    Saudi Arabian Cultural Factors and Personalised ELearning. In: International Conference on Education and New Learning Technologies (EDULEARN14, 2014
    1
  39. E I Altman, E Kalotay.
    Ultimate recovery mixtures. Journal of Banking and Finance, 2014
    1
  40. M F DER, L K SAUL, S SAVAGE, G M VOELKER.
    Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise. In Proceedings of the ACM SIGKDD Conference (New, 2014
    1
  41. V St-Amour, M Felleisen.
    Feature-specific profiling. 2014
    1
  42. J G Morris, S Lindley, Wadler.
    P.: The least must speak with the greatest. 2014
    1
  43. T Liebig, N Piatkowski, C Bokermann, K Morik.
    Predictive trip planning – smart routing in smart cities. In Workshop Proceedings of the EDBT/ICDT 2014 Joint Conference, 2014
    1
  44. D Nguyen, D Trieschnigg, A S Do˘gruöz, R Gravel, M Theune, T Meder, F M G de Jong.
    Why gender and age prediction from tweets is hard: Lessons from a crowdsourcing experiment. In Proceedings of COLING 2014, 2014
    1
  45. L T Murray, L J Mickley, J O Kaplan, E D Sofen, M Pfeiffer, B Alexander.
    Factors controlling variability in the oxidative capacity of the troposphere since the Last Glacial Maximum, Atmos. Chem. Phys, 2014
    1
  46. J Pearl.
    Understanding Simpson’s paradox. The American Statistician, 2014
    1
  47. J Liu, Z Zhao, J Wang, J Ye.
    Safe Screening with Variational Inequalities and Its Application to LASSO. in JMLR Workshop and Conference Proceedings, Vol. 32: Proceedings of the 31st International Conference on Machine Learning, Second Cycle, 2014
    1
  48. M Nassef, A Badr, I Farag.
    An algorithm for browsing the referentially-compressed genomes. International Journal of Computer Applications, 2014
    1
  49. J L Vázquez.
    Recent progress in the theory of Nonlinear Diffusion with Fractional Laplacian Operators. In “Nonlinear elliptic and parabolic differential equations”, Disc. Cont. Dyn. Syst. - S 7, 2014
    1
  50. Florentin Smarandache.
    Quantum Causality Threshold and Paradoxes. 2014
    1
  51. G POLITO, S DUCASSE, L FABRESSE, N BOURAQADI, B VAN RYSEGHEM.
    Bootstrapping Reflective Systems: The Case of Pharo, in "Science of Computer Programming. 2014
    1
  52. E R Gansner, Y Hu, S G Kobourov.
    Viewing Abstract Data as Maps. In Handbook of Human Centric Visualization, 2014
    1
  53. D T Wagner, A Rice, A R Beresford.
    Device Analyzer: Large-scale mobile data collection. ACM SIGMETRICS Performance Evaluation Review, 2014
    1
  54. W Damm, E Möhlmann, Rakow.
    A.: Component based design of hybrid systems: A case study on concurrency and coupling. In: Proceedings of the 17th International Conference on Hybrid Systems: Computation and Control, 2014
    1
  55. Isak I Mujawar, Irfan I Mujawar, Devendra L Raokhande, D R Patil, U Gudaru.
    An Innovative TCR Compensator for Closed Loop Reactive Power Compensation. of Dynamic Loads” International Journal Of Innovative Research In Electrical, Electronics, Instrumentation And Control Engineering, 2014
    1
  56. Damir D Dzhafarov, Joseph R Mileti.
    The complexity of primes in computable UFDs. 2014
    1
  57. Manuel Kauers, Maximilian Jaroschek, Fredrik Johansson.
    Ore polynomials in Sage. In Computer Algebra and Polynomials, Lecture Notes in Computer Science, 2014
    1
  58. L Luo, N Chakraborty, K Sycara.
    Provably-good distributed algorithm for constrained multi-robot task assignment for grouped tasks. IEEE Transactions on Robotics, 2014
    1
  59. Shing-Yi Wang.
    Property rights and intra-household bargaining. Journal of Development Economics, 2014
    1
  60. J Arthur P Merolla, R Alvarez, J-M Bussat, K Boahen.
    A multicast tree router for multichip neuromorphic systems. IEEE Trans. Circuits Syst. I, Reg. Papers, 2014
    1
  61. Shike Mei, Jun Zhu, Xiaojin Zhu.
    Robust RegBayes: Selectively incorporating firstorder logic domain knowledge into bayesian models. In International Conference on Machine Learning, 2014
    1
  62. H O Song, R Girshick, S Jegelka, J Mairal, Z Harchaoui, T Darrell.
    On learning to localize objects with minimal supervision. in International Conference on Machine Learning (ICML, 2014
    1
  63. Gries, Joybrato Mukherjee.
    The dative alternation in South Asian English(es): Modelling predictors and predicting prototypes. Maechler, Ben Bolker, & Steven Walker, 2014
    1
  64. E Duchi, D Poulalhon, G Schaeffer.
    Uniform random sampling of simple branched coverings of the sphere by itself. In Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2014, 2014
    1
  65. A Abrams, I Schillebeeckx, R Pless.
    Structure from shadow motion. In International Conference on Computational Photography (ICCP, 2014
    1
  66. Meishan Zhang, Yue Zhang, Wanxiang Che, Ting Liu.
    Character-level Chinese Dependency Parsing. In Proceedings of the 52st ACL, 2014
    1
  67. F Knight, M Chadalapaka.
    Internet Small Computer System Interface (iSCSI. SCSI Features Update", RFC 7144, 2014
    1
  68. C Gentry, J Groth, Y Ishai, C Peikert, A Sahai, A Smith.
    Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs. Journal of Cryptology, 2014
    1
  69. C O’Flynn, Chen.
    Z.D.: ChipWhisperer: An OpenSource Platform for Hardware Embedded Security Research. In: Constructive Side-Channel Analysis and Secure Design - COSADE, 2014
    1
  70. A G Ramakrishnan R Srikanth.
    Context- Interframe Coding of MR Images. 14 Journal of Computer Applications (0975 – 8887) Volume 86 – No 11, 2014
    1
  71. A Petermann, M Junghanns, R Mueller, Rahm.
    E.: BIIIG: Enabling Business Intelligence with Integrated Instance Graphs. In: Proc. of Intl. Workshop on Graph Data Management (GDM, 2014
    1
  72. J E Fischer, W Jiang, A Kerne, C Greenhalgh, S D Ramchurn, S Reece.
    Supporting Team Coordination on the Ground: Requirements from a Mixed-Reality Game. In Proc Intl. Conf on Design of Cooperative Systems (COOP, 2014
    1
  73. B Nicenboim, S Vasishth, C Gattei, M Sigman, R Kliegl.
    Individual differences in longdistance dependency resolution. 2014
    1
  74. V G KIM, S CHAUDHURI, L GUIBAS, T FUNKHOUSER.
    Shape2Pose: Human-centric shape analysis. ACM TOG, 2014
    1
  75. D Silver, S Jana, D Boneh, E Chen, C Jackson.
    Password managers: Attacks and defenses. In 23rd USENIX Security Symposium (USENIX Security 14, 2014
    1
  76. MR3099122 BUJA, A BERK, R BROWN, L GEORGE, E PITKIN, E TRASKIN, M ZHANG, K and ZHAO, L.
    A conspiracy of random predictors and model violations against classical inference in regression. Available at arXiv:1404.1578. 2014
    1