Most Cited Computer Science Articles
This list is generated from documents in the CiteSeer^{x} database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeer^{x} database, since the database is continuously updated.
All Years
 1990
 1991
 1992
 1993
 1994
 1995
 1996
 1997
 1998
 1999
 2000
 2001
 2002
 2003
 2004
 2005
 2006
 2007
 2008
 2009
 2010
 2011
 2012
 2013
 2014
 2015

An algorithm for the separation of tworow cuts. Mathematical Programming, 20142

Rethinking main memory oltp recovery. In Proc. of ICDE, 20142

FRT2Chord: A DHT supporting seamless transition between onehop and multihop lookups with symmetric routing table. in Proc. ICOIN 2014, 20142

Evolutionary algorithms for overlapping correlation clustering. In Proceedings of Genetic and Evolutionary Computation Conference (GECCO’14, 20142

Semantic word cloud representations: Hardness and approximation algorithms. In LATIN, LNCS, 20142

Grounded compositional semantics for finding and describing images with sentences. In Transactions of the Association for Computational Linguistics, 20142

K2: A mobile operating system for heterogeneous coherence domains. In ASPLOS, 20142

Offpolicy learning with eligibility traces: A survey. In Journal of Machine Learning Research 15:289–333, 20142

Estimating ShadowRate Term Structure Models with NearZero Yields. Journal of Financial Econometrics, 20142

Evaluating Probabilistic Forecasts with Bayesian Signal Detection Models. Risk Analysis, 20142

Rtransforms for Sobolev H 2 metrics on spaces of plane curves. Geometry, Imaging and Computing, 1(1):1 – 56, 20142

RSA key extraction via lowbandwidth acoustic cryptanalysis. In CRYPTO, 20142

A new analysis of the cognitive radio jumpstay algorithm under the asymmetric model. In IEEE ICC 2014  Cognitive Radio and Networks Symposium, 20142

Improved seed methods for symmetric positive definite linear equations with multiple righthand sides. Numer. Linear Algebra Appl, 20142

Decision Making under Interval Uncertainty (and beyond. HumanCentric DecisionMaking Models for Social Sciences, 20142

On sketching matrix norms and the top singular vector. In SODA, 20141

Emergence of SmallScale Magnetic Loops in the QuietSun. Journal of Geophysical Research (Space Physics, 20141

Speedy greedy feature selection: Better redshift estimation via massive parallism. In European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, 20141

Orbs: Languageindependent program slicing. in Foundations of Software Engineering, 20141

Virtual network embedding with opportunistic resource sharing. IEEE Trans. Parallel Distrib. Syst, 20141

On Protection in Federated Social Computing Systems. In Proceedings of the 4th ACM CODASPY’14, 20141

Towards a Repository of BX Examples. In Proc. of BX 2014, 20141

Onboard dualstereovision for the navigation of an autonomous mav. Journal of Intelligent and Robotic Systems, 20141

Mitigating seabird bycatch during hauling by pelagic longline vessels. PLoS ONE 9(1): e84499. doi:10.1371/journal.pone.0084499 McCracken, M.L. 2014. Estimation of incidental interactions with sea turtles and seabirds. in the 2013 Hawaii deepset longline fishery. NMFS Pacific Islands Fisheries Science Center Internal Report, PIFSC IR14022. Issued 24, 20141

Multiple Differential Cryptanalysis of RoundReduced PRINCE (Full version. Lecture Notes in Computer Science, 20141

On the Spectrum of Wenger Graphs. J. Combin. Theory Ser. B, 20141

G.: Crossdomain passwordbased authenticated key exchange revisited. ACM Trans. Inform. Syst. Secur, 20141

Toward STDPbased population action in large networks of spiking neurons. Proc ESANN’2014. DFacto, 20141

Semantic stability in social tagging streams. In Proceedings of the TwentyThird International World Wide Web Conference, 20141

Interethnic Marriages and Their Economic Effects. In International Handbook on the Economics of Migration; Constant, A.F., Zimmerman, K.F., Eds.; Edward Elgar Publishing, 20141

Measurement and analysis of osn ad auctions. In COSN, 20141

Polynomial bounds for the gridminor theorem. In Proc. of ACM STOC, 20141

Test case purification for improving fault localization. In Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE). ACM, 20141

Principal component analysis and higher correlations for distributed data. In Proceedings of The 27th Conference on Learning Theory, 20141

Search + seizure: The effectiveness of interventions on seo campaigns. In Proc. ACM IMC’14, 20141

Saudi Arabian Cultural Factors and Personalised ELearning. In: International Conference on Education and New Learning Technologies (EDULEARN14, 20141

Ultimate recovery mixtures. Journal of Banking and Finance, 20141

Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise. In Proceedings of the ACM SIGKDD Conference (New, 20141

Featurespecific profiling. 20141

Predictive trip planning – smart routing in smart cities. In Workshop Proceedings of the EDBT/ICDT 2014 Joint Conference, 20141

Why gender and age prediction from tweets is hard: Lessons from a crowdsourcing experiment. In Proceedings of COLING 2014, 20141

Understanding Simpson’s paradox. The American Statistician, 20141

Safe Screening with Variational Inequalities and Its Application to LASSO. in JMLR Workshop and Conference Proceedings, Vol. 32: Proceedings of the 31st International Conference on Machine Learning, Second Cycle, 20141

An algorithm for browsing the referentiallycompressed genomes. International Journal of Computer Applications, 20141

Recent progress in the theory of Nonlinear Diffusion with Fractional Laplacian Operators. In “Nonlinear elliptic and parabolic differential equations”, Disc. Cont. Dyn. Syst.  S 7, 20141

Bloch’s conjecture for Catanese and Barlow surfaces. J. Diff. Geom, 20141

Viewing Abstract Data as Maps. In Handbook of Human Centric Visualization, 20141

Device Analyzer: Largescale mobile data collection. ACM SIGMETRICS Performance Evaluation Review, 20141

A.: Component based design of hybrid systems: A case study on concurrency and coupling. In: Proceedings of the 17th International Conference on Hybrid Systems: Computation and Control, 20141

An Innovative TCR Compensator for Closed Loop Reactive Power Compensation. of Dynamic Loads” International Journal Of Innovative Research In Electrical, Electronics, Instrumentation And Control Engineering, 20141

Ore polynomials in Sage. In Computer Algebra and Polynomials, Lecture Notes in Computer Science, 20141

Provablygood distributed algorithm for constrained multirobot task assignment for grouped tasks. IEEE Transactions on Robotics, 20141

Property rights and intrahousehold bargaining. Journal of Development Economics, 20141

An empiricalBayes approach to recovering linearly constrained nonnegative sparse signals. IEEE Trans. Signal Process, 20141

Information percolation for the Ising model: cutoff in three dimensions up to criticality, preprint. Available at arXiv:1401.6065. 26 EYAL LUBETZKY AND ALLAN SLY, 20141

A multicast tree router for multichip neuromorphic systems. IEEE Trans. Circuits Syst. I, Reg. Papers, 20141

Robust RegBayes: Selectively incorporating firstorder logic domain knowledge into bayesian models. In International Conference on Machine Learning, 20141

On learning to localize objects with minimal supervision. in International Conference on Machine Learning (ICML, 20141

The dative alternation in South Asian English(es): Modelling predictors and predicting prototypes. Maechler, Ben Bolker, & Steven Walker, 20141

Uniform random sampling of simple branched coverings of the sphere by itself. In Proceedings of the TwentyFifth Annual ACMSIAM Symposium on Discrete Algorithms, SODA 2014, 20141

Structure from shadow motion. In International Conference on Computational Photography (ICCP, 20141

Characterlevel Chinese Dependency Parsing. In Proceedings of the 52st ACL, 20141

Internet Small Computer System Interface (iSCSI. SCSI Features Update", RFC 7144, 20141

Using fully homomorphic hybrid encryption to minimize noninterative zeroknowledge proofs. Journal of Cryptology, 20141

Z.D.: ChipWhisperer: An OpenSource Platform for Hardware Embedded Security Research. In: Constructive SideChannel Analysis and Secure Design  COSADE, 20141

Context Interframe Coding of MR Images. 14 Journal of Computer Applications (0975 – 8887) Volume 86 – No 11, 20141

E.: BIIIG: Enabling Business Intelligence with Integrated Instance Graphs. In: Proc. of Intl. Workshop on Graph Data Management (GDM, 20141

Supporting Team Coordination on the Ground: Requirements from a MixedReality Game. In Proc Intl. Conf on Design of Cooperative Systems (COOP, 20141

Shape2Pose: Humancentric shape analysis. ACM TOG, 20141

Password managers: Attacks and defenses. In 23rd USENIX Security Symposium (USENIX Security 14, 20141