Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. D Lowe.
    Distinctive image features from scaleinvariant keypoints. In: International Journal of Computer Vision, 2004
  2. J Dean, S Ghemawat.
    MapReduce: Simplified data processing on large clusters. In: Proceedings of Operating Systems Design and Implementation. MapReduce for Machine Learning on Multicore, In: proceedings of Advances in Neural Information Processing Systems. NIPS 19, 306-313. Mahout project, [online]., 2004
  3. J N Laneman, D N C Tse, G W Wornell.
    Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transactions on Information Theory, 2004
  4. C P Robert, G Casella.
    Monte Carlo statistical methods. 2004
  5. E von Hippel.
    Democratizing innovation. 2004
  6. Y Boykov, V Kolmogorov.
    An experimental comparison of min-cut/max-flow algorithms for energy minimization in vision. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2004
  7. R Dingledine, N Mathewson, P Syverson.
    Tor: The secondgeneration onion router. 2004
  8. J Polastre, J Hill, D Culler.
    Versatile low power media access for wireless sensor networks. ACM Conference on Embedded Networked Sensor Systems (SenSys, 2004
  9. V Kolmogorov, R Zabih.
    What energy functions can be minimized via graph cuts. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2004
  10. Carsten Rother, Vladimir Kolmogorov, Andrew Blake.
    GrabCut”: interactive foreground extraction using iterated graph cuts. ACM Trans. Graph, 2004
  11. Z Wang, A C Bovik, H R Sheikh, E P Simoncelli.
    Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE Trans. Image Processing, 2004
  12. J L Herlocker, J A Konstan, L G Terveen, J T Riedl.
    Evaluating collaborative filtering recommender systems. ACM Trans. Inf. Syst, 2004
  13. M Dorigo, T Stütlze.
    Ant Colony Optimization. 2004
  14. G Csurka, C Dance, L Fan, J Willamowski, C Bray.
    Visual categorization with bags of keypoints. Workshop of European Conference on Computer Vision, 2004
  15. P F Felzenszwalb, D P Huttenlocher.
    Efficient graph-based image segmentation. International Journal of Computer Vision, 2004
  16. L von Ahn, L Dabbish.
    Labelling Images with a Computer Game. ACM Conference on Human Factors in Computing Systems, 2004
  17. J R Anderson, D Bothell, M D Byrne, S Douglass, C Lebiere, Y Qin.
    An integrated theory of mind. Psychological Review, 2004
  18. A Avizienis, J-C Laprie, B Randell, L C.
    Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. on Dependable and Secure Computing, 2004
  19. Chris Lattner, Vikram Adve.
    LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. In CGO ’04: Proceedings of the international symposium on Code generation and optimization, 2004
  20. R Olfati Saber, R M Murray.
    Consensus problems in networks of agents with switching topology and time-delays. IEEE Transactions On Automatic Control, 2004
  21. Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris.
    Vivaldi: A decentralized network coordinate system. In Proceedings of the ACM SIGCOMM ’04 Conference, 2004
  22. L Fei-Fei, R Fergus, Perona.
    P.: Learning generative visual models from few training examples: An incremental bayesian approach tested on 101 object categories. In: CVPR Workshop on Generative-Model Based Vision, 2004
  23. W Ye, J Heidemann, D Estrin.
    Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM Transactions on Networking, 2004
  24. B Y Zhao, L Huang, J Stribling, S C Rhea, A D Joseph, J D Kubiatowicz.
    Tapestry: A resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications, 2004
  25. M Barnett, K R M Leino, W Schulte.
    The Spec# programming system: An overview. In, 2004
  26. C Schuldt, L Laptev, B Caputo.
    Recognizing human actions: a local SVM approach. In IEEE ICPR, 2004
  27. A Lindgren, A Doria, O Schelén.
    Probabilistic Routing in Intermittently Connected Networks. of Lecture Notes in Computer Science, 2004
  28. D Martin, C Fowlkes, J Malik.
    Learning to detect natural image boundaries using local brightness, color and texture cues. in IEEE Trans. on Pattern Analysis and Machine Intelligence, 2004
  29. D Aguayo, J Bicket, S Biswas, G Judd, R Morris.
    Linklevel measurements from an 802.11b mesh network. in International Conferences on Broadband Networks (BroadNets, 2004
  30. D Rodrik, A Subramanian, F Trebbi.
    Institutions Rule: The Primacy of Institutions over Geography and Integration in Economic Development. Journal of Economic Growth, 2004
  31. S Hankerson, A Menezes, S Vanstone.
    Guide to Elliptic Curve Cryptography. 2004
  32. J N Al-Karaki, A E Kamal.
    Routing Techniques in Wireless Sensor Networks: a Survey. IEEE Wireless Communications Volume 11, Issue, 2004
  33. D P Anderson.
    BOINC: A System for Public-Resource Computing and Storage. in Proc. of 5th IEEE/ACM Intl. Workshop on Grid Computing, 2004
  34. J W Hui, D Culler.
    The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale. In proc. of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys'04, 2004
  35. W Zhao, M H Ammar, E W Zegura.
    A message ferrying approach for data delivery in sparse mobile ad hoc networks. In MobiHoc, 2004
  36. M Bertrand, E Duflo, S Mullainathan.
    How Much Should We Trust Differencesin-Differences Estimates? Quarterly. Journal of Economics February, 2004
  37. A Chambolle.
    An algorithm for total variation minimization and applications. Journal of Mathematical Imaging and Vision, 2004
  38. J Cortés, S Martı́nez, T Karatus, F Bullo.
    Coverage control for mobile sensing networks. IEEE Transactions on Robotics and Automation, 2004
  39. J D Bendtsen, H Nielsen, G von Heijne, S Brunak.
    Improved prediction of signal peptides: SignalP. 2004
  40. C Karlof, N Sastry, D Wagner.
    TinySec: a link layer security architecture for wireless sensor networks. In Proc. of the 2nd Int. Conf. on Embedded networked sensor systems, 2004
  41. G W Imbens.
    Nonparametric estimation of average treatment effects under exogeneity: a review. Review of Economics and Statistics, Vol, 2004
  42. P Felzenszwalb, D Huttenlocher.
    Efficient belief propagation for early vision. In Proc. CVPR, 2004
  43. A Deshpande, C Guestrin, S R Madden, J M Hellerstein, W Hong.
    Model-driven Data Acquisition in Sensor Networks. In Proceedings of the Thirtieth International Conference on Very Large Data Bases VLDB Endowment, (VLDB’04, 2004
  44. E Helpman, M J Melitz, S R Yeaple.
    Export versus FDI with Heterogeneous Firms. American Economic Review, 2004
  45. Y Dodis, L Reyzin, A Smith.
    Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. in EUROCRYPT, ser. LNCS, 2004
  46. M Kanehisa, S Goto, S Kawashima, Y Okuno, M Hattori.
    The KEGG resource for deciphering the genome. Nucleic Acids Res., 32(Database issue):D277–80, 2004
  47. A K Jain, A Ross, S Prabhakar.
    An Introduction to Biometric Recognition. 2004
  48. T Zimmermann, P Weißgerber, S Diehl, A Zeller.
    Mining version histories to guide software changes. In ICSE, 2004
  49. D Nister.
    An efficient solution to the five-point relative pose problem. IEEE Pattern Analysis and Machine Intelligence, 2004
  50. M Maróti, B Kusý, G Simon, A Lédeczi.
    The flooding time synchronization protocol. In Proc. 2nd ACM International Conference on Embedded Networked Sensor Systems (SenSys 2004, 2004
  51. A Dunkels, B Gönvall, T Voigt.
    Contiki - a lightweight and flexible operating system for tiny networked sensors. In Proceedings of the First IEEE Workshop on Embedded Networked Sensors, 2004
  52. J Daugman.
    How iris recognition works. IEEE Transactions on Circuits and Systems for Video Technology, 2004
  53. T Brox, A Bruhn, N Papenberg, J Weickert.
    High accuracy optical flow estimation based on a theory for warping. In Proc. European Conference on Computer Vision (ECCV, 2004
  54. I Tsochantaridis, T Hofmann, T Joachims, Y Altun.
    Support vector machine learning for interdependent and structured output spaces. In ICML, 2004
  55. P O Hoyer.
    Non-negative matrix factorization with sparseness constraints,” The. Journal of Machine Learning Research, 2004
  56. S Sen, J Wang.
    Analyzing Peer-To-Peer Traffic Across Large Networks. IEEE/ACM TON, 2004
  57. R Guha, R Kumar, P Raghavan, A Tomkins.
    Propagation of trust and distrust. In WWW, 2004
  58. R Szewczyk, A Mainwaring, J Polastre, J Anderson, D Culler.
    An analysis of a large scale habitat monitoring application. Sensys. 2004
  59. L Zeng, B Benatallah, A H Ngu, M Dumas, J Kalagnanam, H Chang.
    Qos-aware middleware for web services composition. IEEE Trans. Softw. Eng, 2004
  60. Kim HA, V Karp.
    Autograph: Toward automated, distributed worm signature detection. Proc. of the 13th USENIX Security Symp. USENIX Association, 2004
  61. David Moore, John Leonard, Daniela Rus, Seth Teller.
    Robust distributed network localization with noisy range measurements. In Proceedings of the ACM SenSys ’04, 2004
  62. B Leibe, A Leonardis, B Schiele.
    Combined object categorization and segmentation with an implicit shape model. In ECCV workshop on statistical learning in computer vision, 2004
  63. C Jin, D X Wei, S H Low.
    FAST TCP: Motivation, architecture, algorithms, performance. In IEEE INFOCOM 2004, Hong Kong, 2004
  64. S J Julier, J K Uhlmann.
    Unscented filtering and nonlinear estimation. Proceedings of the IEEE, 2004
  65. B Greiner.
    An Online Recruitment System for Economic Experiments. Forschung und wissenschaftliches Rechnen 2003. GWDG Bericht 63. Gesellschaft für Wissenschaftliche Datenverarbeitung, 2004
  66. R Kumar, J Novak, P Raghaven, A Tomkins.
    Structure and evolution of blogspace. Communications of the ACM, 2004
  67. W Daelemans, J Zavrel, K Van der Sloot, A Van den Bosch.
    TiMBL: Tilburg Memory Based Learner, version 5.1, Reference Guide. 2004
  68. F Bach, G R G Lanckriet, M.
    Multiple kernel learning, conic duality, and the smo algorithm. Proceedings of the 2004 International Conference on Machine Learning, 2004
  69. D Boneh, X Boyen.
    Short signatures without random oracles. In Advances in Cryptology, Proc. EUROCRYPT 2004, LNCS 3027, 2004
  70. R U Nabar, H Bölcskei, F W Kneubühler.
    Fading relay channels: performance limits and space-time signal design. IEEE Journal on Selected Areas in Communications, 2004
  71. P Levis, N Patel, D Culler, S Shenker.
    Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In Proceedings of the 1st Symposium on Network System Design and Implementation (NSDI ’04, 2004
  72. D Boneh, X Boyen, H Shacham.
    Short group signatures. In Proceedings of Advances in Cryptology (CRYPTO, 2004
  73. S Singh, C Estan, G Varghese, S Savage.
    Automated Worm Fingerprinting. In OSDI’04: Proceedings of the 6th conference on Symposium on Opearting Systems Design Implementation, 2004
  74. W Hu, T Tan, L Wang, S Maybank.
    A survey on visual surveillance of object motion and behaviors. IEEE Trans. Systems, Man, and Cybernetics- Part C: Applications and Reviews, 2004
  75. M J Freedman, E Freudenthal, D Mazières.
    Democratizing content publication with Coral. In Proceedings of the 1st USENIX Symposium on Networked Systems Design and Implementation (NSDI ’04, 2004
  76. M Abadi, C Fournet.
    Mobile values, new names, and secure communication. In Proc. POPL’01, 2004
  77. L-L Xie, P R Kumar.
    A network information theory for wireless communication: scaling laws and optimal operation. IEEE Transactions on Information Theory, 2004
  78. A Lakhina, M Crovella, C Diot.
    Diagnosing network-wide traffic anomalies. in ACM SIGCOMM, 2004
  79. A R Bharambe, M Agrawal, S Seshan.
    Mercury: Supporting scalable multi-attribute range queries. In Proceedings of the ACM SIGCOMM Conference, 2004
  80. L Xiong, L Liu.
    PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 2004
  81. G Appenzeller, I Keslassy, N McKeown.
    Sizing Router Buffers. In Proceedings of ACM SIGCOMM’04, 2004
  82. M Charikar, K Chen, M Farach-Colton.
    Finding frequent items in data streams. Theoretical Computer Science (TCS, 2004
  83. H Iwaniec, E Kowalski.
    Analytic Number Theory. Amer. Math. Soc., Providence RI, 2004
  84. R Kumar, D M Tullsen, P Ranganathan, N P Jouppi, K I Farkas.
    Single-ISA Heterogeneous Multi-Core Architectures for Multithreaded Workload Performance. In Proceedings of the 31st International Symposium on Computer Architecture, 2004
  85. T Henderson, D Kotz, I Abyzov.
    The Changing Usage of a Mature Campus-Wide Wireless Network. In MobiCom ’04: Proceedings of the 10th annual international conference on Mobile computing and networking, 2004
  86. D Hovemeyer, W Pugh.
    Finding Bugs is Easy. In SIGPLAN Notices, 2004
  87. N Xu, S Rangwala, K Chintalapudi, D Ganesan, A Broad, R Govindan, D Estrin.
    A wireless sensor network for structural monitoring. in Proc. ACM Conf. Embedded Networked Sensor Systems (SenSys 2005, 2004
  88. Pieter Abbeel, Andrew Y Ng.
    Apprenticeship learning via inverse reinforcement learning. In Proceedings of the twenty-first international conference on Machine learning, ICML ’04, 2004