Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. D Lowe.
    Distinctive image features from scaleinvariant keypoints. In: International Journal of Computer Vision, 2004
    5621
  2. J Dean, S Ghemawat.
    MapReduce: Simplified data processing on large clusters. In: Proceedings of Operating Systems Design and Implementation. MapReduce for Machine Learning on Multicore, In: proceedings of Advances in Neural Information Processing Systems. NIPS 19, 306-313. Mahout project, [online]. http://lucene.apache.org/mahout, 2004
    2020
  3. J N Laneman, D N C Tse, G W Wornell.
    Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transactions on Information Theory, 2004
    1159
  4. C P Robert, G Casella.
    Monte Carlo statistical methods. 2004
    1014
  5. E von Hippel.
    Democratizing innovation. 2004
    990
  6. Y Boykov, V Kolmogorov.
    An experimental comparison of min-cut/max-flow algorithms for energy minimization in vision. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2004
    870
  7. R Dingledine, N Mathewson, P Syverson.
    Tor: The secondgeneration onion router. 2004
    857
  8. J Polastre, J Hill, D Culler.
    Versatile low power media access for wireless sensor networks. ACM Conference on Embedded Networked Sensor Systems (SenSys, 2004
    786
  9. V Kolmogorov, R Zabih.
    What energy functions can be minimized via graph cuts. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2004
    750
  10. Carsten Rother, Vladimir Kolmogorov, Andrew Blake.
    GrabCut”: interactive foreground extraction using iterated graph cuts. ACM Trans. Graph, 2004
    706
  11. Z Wang, A C Bovik, H R Sheikh, E P Simoncelli.
    Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE Trans. Image Processing, 2004
    696
  12. J L Herlocker, J A Konstan, L G Terveen, J T Riedl.
    Evaluating collaborative filtering recommender systems. ACM Trans. Inf. Syst, 2004
    688
  13. M Dorigo, T Stütlze.
    Ant Colony Optimization. 2004
    682
  14. G Csurka, C Dance, L Fan, J Willamowski, C Bray.
    Visual categorization with bags of keypoints. Workshop of European Conference on Computer Vision, 2004
    628
  15. P F Felzenszwalb, D P Huttenlocher.
    Efficient graph-based image segmentation. International Journal of Computer Vision, 2004
    586
  16. L von Ahn, L Dabbish.
    Labelling Images with a Computer Game. ACM Conference on Human Factors in Computing Systems, 2004
    571
  17. J R Anderson, D Bothell, M D Byrne, S Douglass, C Lebiere, Y Qin.
    An integrated theory of mind. Psychological Review, 2004
    569
  18. A Avizienis, J-C Laprie, B Randell, L C.
    Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. on Dependable and Secure Computing, 2004
    532
  19. Chris Lattner, Vikram Adve.
    LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. In CGO ’04: Proceedings of the international symposium on Code generation and optimization, 2004
    520
  20. R Olfati Saber, R M Murray.
    Consensus problems in networks of agents with switching topology and time-delays. IEEE Transactions On Automatic Control, 2004
    513
  21. Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris.
    Vivaldi: A decentralized network coordinate system. In Proceedings of the ACM SIGCOMM ’04 Conference, 2004
    501
  22. L Fei-Fei, R Fergus, Perona.
    P.: Learning generative visual models from few training examples: An incremental bayesian approach tested on 101 object categories. In: CVPR Workshop on Generative-Model Based Vision, 2004
    500
  23. W Ye, J Heidemann, D Estrin.
    Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM Transactions on Networking, 2004
    500
  24. B Y Zhao, L Huang, J Stribling, S C Rhea, A D Joseph, J D Kubiatowicz.
    Tapestry: A resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications, 2004
    495
  25. M Barnett, K R M Leino, W Schulte.
    The Spec# programming system: An overview. In, 2004
    485
  26. C Schuldt, L Laptev, B Caputo.
    Recognizing human actions: a local SVM approach. In IEEE ICPR, 2004
    469
  27. A Lindgren, A Doria, O Schelén.
    Probabilistic Routing in Intermittently Connected Networks. of Lecture Notes in Computer Science, 2004
    449
  28. D Martin, C Fowlkes, J Malik.
    Learning to detect natural image boundaries using local brightness, color and texture cues. in IEEE Trans. on Pattern Analysis and Machine Intelligence, 2004
    444
  29. D Aguayo, J Bicket, S Biswas, G Judd, R Morris.
    Linklevel measurements from an 802.11b mesh network. in International Conferences on Broadband Networks (BroadNets, 2004
    442
  30. D Rodrik, A Subramanian, F Trebbi.
    Institutions Rule: The Primacy of Institutions over Geography and Integration in Economic Development. Journal of Economic Growth, 2004
    439
  31. S Hankerson, A Menezes, S Vanstone.
    Guide to Elliptic Curve Cryptography. 2004
    436
  32. J N Al-Karaki, A E Kamal.
    Routing Techniques in Wireless Sensor Networks: a Survey. IEEE Wireless Communications Volume 11, Issue, 2004
    420
  33. D P Anderson.
    BOINC: A System for Public-Resource Computing and Storage. in Proc. of 5th IEEE/ACM Intl. Workshop on Grid Computing, 2004
    414
  34. J W Hui, D Culler.
    The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale. In proc. of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys'04, 2004
    413
  35. W Zhao, M H Ammar, E W Zegura.
    A message ferrying approach for data delivery in sparse mobile ad hoc networks. In MobiHoc, 2004
    397
  36. M Bertrand, E Duflo, S Mullainathan.
    How Much Should We Trust Differencesin-Differences Estimates? Quarterly. Journal of Economics February, 2004
    393
  37. A Chambolle.
    An algorithm for total variation minimization and applications. Journal of Mathematical Imaging and Vision, 2004
    385
  38. J Cortés, S Martı́nez, T Karatus, F Bullo.
    Coverage control for mobile sensing networks. IEEE Transactions on Robotics and Automation, 2004
    385
  39. J D Bendtsen, H Nielsen, G von Heijne, S Brunak.
    Improved prediction of signal peptides: SignalP. 2004
    384
  40. C Karlof, N Sastry, D Wagner.
    TinySec: a link layer security architecture for wireless sensor networks. In Proc. of the 2nd Int. Conf. on Embedded networked sensor systems, 2004
    376
  41. G W Imbens.
    Nonparametric estimation of average treatment effects under exogeneity: a review. Review of Economics and Statistics, Vol, 2004
    371
  42. P Felzenszwalb, D Huttenlocher.
    Efficient belief propagation for early vision. In Proc. CVPR, 2004
    369
  43. A Deshpande, C Guestrin, S R Madden, J M Hellerstein, W Hong.
    Model-driven Data Acquisition in Sensor Networks. In Proceedings of the Thirtieth International Conference on Very Large Data Bases VLDB Endowment, (VLDB’04, 2004
    365
  44. E Helpman, M J Melitz, S R Yeaple.
    Export versus FDI with Heterogeneous Firms. American Economic Review, 2004
    350
  45. Y Dodis, L Reyzin, A Smith.
    Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. in EUROCRYPT, ser. LNCS, 2004
    349
  46. M Kanehisa, S Goto, S Kawashima, Y Okuno, M Hattori.
    The KEGG resource for deciphering the genome. Nucleic Acids Res., 32(Database issue):D277–80, 2004
    339
  47. A K Jain, A Ross, S Prabhakar.
    An Introduction to Biometric Recognition. 2004
    336
  48. T Zimmermann, P Weißgerber, S Diehl, A Zeller.
    Mining version histories to guide software changes. In ICSE, 2004
    335
  49. D Nister.
    An efficient solution to the five-point relative pose problem. IEEE Pattern Analysis and Machine Intelligence, 2004
    334
  50. M Maróti, B Kusý, G Simon, A Lédeczi.
    The flooding time synchronization protocol. In Proc. 2nd ACM International Conference on Embedded Networked Sensor Systems (SenSys 2004, 2004
    334
  51. A Dunkels, B Gönvall, T Voigt.
    Contiki - a lightweight and flexible operating system for tiny networked sensors. In Proceedings of the First IEEE Workshop on Embedded Networked Sensors, 2004
    333
  52. J Daugman.
    How iris recognition works. IEEE Transactions on Circuits and Systems for Video Technology, 2004
    333
  53. T Brox, A Bruhn, N Papenberg, J Weickert.
    High accuracy optical flow estimation based on a theory for warping. In Proc. European Conference on Computer Vision (ECCV, 2004
    331
  54. I Tsochantaridis, T Hofmann, T Joachims, Y Altun.
    Support vector machine learning for interdependent and structured output spaces. In ICML, 2004
    330
  55. P O Hoyer.
    Non-negative matrix factorization with sparseness constraints,” The. Journal of Machine Learning Research, 2004
    325
  56. S Sen, J Wang.
    Analyzing Peer-To-Peer Traffic Across Large Networks. IEEE/ACM TON, 2004
    323
  57. R Guha, R Kumar, P Raghavan, A Tomkins.
    Propagation of trust and distrust. In WWW, 2004
    320
  58. R Szewczyk, A Mainwaring, J Polastre, J Anderson, D Culler.
    An analysis of a large scale habitat monitoring application. Sensys. 2004
    320
  59. L Zeng, B Benatallah, A H Ngu, M Dumas, J Kalagnanam, H Chang.
    Qos-aware middleware for web services composition. IEEE Trans. Softw. Eng, 2004
    316
  60. Kim HA, V Karp.
    Autograph: Toward automated, distributed worm signature detection. Proc. of the 13th USENIX Security Symp. USENIX Association, 2004
    315
  61. David Moore, John Leonard, Daniela Rus, Seth Teller.
    Robust distributed network localization with noisy range measurements. In Proceedings of the ACM SenSys ’04, 2004
    313
  62. B Leibe, A Leonardis, B Schiele.
    Combined object categorization and segmentation with an implicit shape model. In ECCV workshop on statistical learning in computer vision, 2004
    312
  63. C Jin, D X Wei, S H Low.
    FAST TCP: Motivation, architecture, algorithms, performance. In IEEE INFOCOM 2004, Hong Kong, 2004
    310
  64. S J Julier, J K Uhlmann.
    Unscented filtering and nonlinear estimation. Proceedings of the IEEE, 2004
    305
  65. B Greiner.
    An Online Recruitment System for Economic Experiments. Forschung und wissenschaftliches Rechnen 2003. GWDG Bericht 63. Gesellschaft für Wissenschaftliche Datenverarbeitung, 2004
    304
  66. R Kumar, J Novak, P Raghaven, A Tomkins.
    Structure and evolution of blogspace. Communications of the ACM, 2004
    299
  67. W Daelemans, J Zavrel, K Van der Sloot, A Van den Bosch.
    TiMBL: Tilburg Memory Based Learner, version 5.1, Reference Guide. 2004
    298
  68. F Bach, G R G Lanckriet, M.
    Multiple kernel learning, conic duality, and the smo algorithm. Proceedings of the 2004 International Conference on Machine Learning, 2004
    296
  69. D Boneh, X Boyen.
    Short signatures without random oracles. In Advances in Cryptology, Proc. EUROCRYPT 2004, LNCS 3027, 2004
    295
  70. R U Nabar, H Bölcskei, F W Kneubühler.
    Fading relay channels: performance limits and space-time signal design. IEEE Journal on Selected Areas in Communications, 2004
    295
  71. P Levis, N Patel, D Culler, S Shenker.
    Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In Proceedings of the 1st Symposium on Network System Design and Implementation (NSDI ’04, 2004
    293
  72. D Boneh, X Boyen, H Shacham.
    Short group signatures. In Proceedings of Advances in Cryptology (CRYPTO, 2004
    292
  73. S Singh, C Estan, G Varghese, S Savage.
    Automated Worm Fingerprinting. In OSDI’04: Proceedings of the 6th conference on Symposium on Opearting Systems Design Implementation, 2004
    291
  74. W Hu, T Tan, L Wang, S Maybank.
    A survey on visual surveillance of object motion and behaviors. IEEE Trans. Systems, Man, and Cybernetics- Part C: Applications and Reviews, 2004
    287
  75. M J Freedman, E Freudenthal, D Mazières.
    Democratizing content publication with Coral. In Proceedings of the 1st USENIX Symposium on Networked Systems Design and Implementation (NSDI ’04, 2004
    287
  76. M Abadi, C Fournet.
    Mobile values, new names, and secure communication. In Proc. POPL’01, 2004
    286
  77. L-L Xie, P R Kumar.
    A network information theory for wireless communication: scaling laws and optimal operation. IEEE Transactions on Information Theory, 2004
    285
  78. A Lakhina, M Crovella, C Diot.
    Diagnosing network-wide traffic anomalies. in ACM SIGCOMM, 2004
    283
  79. A R Bharambe, M Agrawal, S Seshan.
    Mercury: Supporting scalable multi-attribute range queries. In Proceedings of the ACM SIGCOMM Conference, 2004
    279
  80. L Xiong, L Liu.
    PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 2004
    278
  81. G Appenzeller, I Keslassy, N McKeown.
    Sizing Router Buffers. In Proceedings of ACM SIGCOMM’04, 2004
    276
  82. M Charikar, K Chen, M Farach-Colton.
    Finding frequent items in data streams. Theoretical Computer Science (TCS, 2004
    275
  83. H Iwaniec, E Kowalski.
    Analytic Number Theory. Amer. Math. Soc., Providence RI, 2004
    267
  84. R Kumar, D M Tullsen, P Ranganathan, N P Jouppi, K I Farkas.
    Single-ISA Heterogeneous Multi-Core Architectures for Multithreaded Workload Performance. In Proceedings of the 31st International Symposium on Computer Architecture, 2004
    266
  85. T Henderson, D Kotz, I Abyzov.
    The Changing Usage of a Mature Campus-Wide Wireless Network. In MobiCom ’04: Proceedings of the 10th annual international conference on Mobile computing and networking, 2004
    265
  86. D Hovemeyer, W Pugh.
    Finding Bugs is Easy. In SIGPLAN Notices, 2004
    264
  87. N Xu, S Rangwala, K Chintalapudi, D Ganesan, A Broad, R Govindan, D Estrin.
    A wireless sensor network for structural monitoring. in Proc. ACM Conf. Embedded Networked Sensor Systems (SenSys 2005, 2004
    263
  88. Pieter Abbeel, Andrew Y Ng.
    Apprenticeship learning via inverse reinforcement learning. In Proceedings of the twenty-first international conference on Machine learning, ICML ’04, 2004
    261