Most Cited Computer Science Articles
This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.
All Years
| 1990
| 1991
| 1992
| 1993
| 1994
| 1995
| 1996
| 1997
| 1998
| 1999
| 2000
| 2001
| 2002
| 2003
| 2004
| 2005
| 2006
| 2007
| 2008
| 2009
| 2010
| 2011
| 2012
| 2013
| 2014
| 2015
-
S.Moon. What is twitter, a social network or a news media. In WWW, 2010420
-
A.: The pascal visual object classes (voc) challenge. Int. J. Comput. Vision, 2010260
-
Community detection in graphs. Physics Reports, 486(3C5):75 – 174, 2010249
-
Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI’10, 2010231
-
Earthquake shakes twitter users: real-time event detection by social sensors. In Proceedings of the 19th international conference on World wide web, 2010211
-
Pregel: a system for large-scale graph processing. In Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, SIGMOD ’10, 2010207
-
A survey on transfer learning. IEEE Transaction on Knowledge Discovery and Data Engineering, 2010207
-
HumanEva: Synchronized video and motion capture dataset and baseline algorithm for evaluation of articulated human motion. Int. J. Comput. Vis, 2010189
-
Measuring user influence in twitter: The million follower fallacy. ICWSM, 2010177
-
Benchmarking cloud serving systems with ycsb. In Proceedings of the 1st ACM symposium on Cloud computing, 2010160
-
The power of convex relaxation: near-optimal matrix completion. IEEE Transactions on Information Theory, 2010146
-
From frequency to meaning: Vector space models of semantics. Journal of artificial intelligence research, 2010141
-
Cassandra: a decentralized structured storage system. ACM SIGOPS Operating Systems Review, 2010137
-
Soylent: a word processor with a crowd inside. In UIST, 2010136
-
Contour Detection and Hierarchical Image Segmentation. IEEE Trans. PAMI, 2010135
-
Toward an architecture for never-ending language learning. In AAAI, 2010125
-
Hedera: Dynamic Flow Scheduling for Data Center Networks. In NSDI, 2010119
-
From tweets to polls: Linking text sentiment to public opinion time series. In ICWSM 2010, 2010118
-
Regression Discontinuity Designs in Economics. Journal of Economic Literature, 2010115
-
Maui: Making smartphones last longer with code offload. In MobiSys, 2010114
-
Enhanced local texture feature sets for face recognition under difficult lighting conditions. IEEE Trans. Image Process, 2010114
-
Kegg for representation and analysis of molecular networks involving diseases and drugs. Nucleic Acids Research, 38(suppl 1):D355–D360, 2010109
-
Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in cluster Scheduling. In EuroSys 2010, 2010107
-
Network coding for distributed storage systems. IEEE Transactions on Information Theory, 2010105
-
ZooKeeper: wait-free coordination for Internet-scale systems. In Proc. USENIX ATC, 2010103
-
Discriminative learning of local image descriptors. IEEE Trans. Pattern Anal. Mach. Intell, 2010102
-
Twister: A Runtime for iterative MapReduce. in Proceedings of the First International Workshop on MapReduce and its Applications of ACM HPDC 2010 conference, 201098
-
What is an object. In Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on, 201094
-
Financial Intermediation and Credit Policy in Business Cycle Analysis. In Handbook of Monetary Economics, edited by Benjamin M. Friedman and Michael Woodford, 201093
-
Efficient additive kernels via explicit feature maps. In CVPR, 201093
-
Predicting positive and negative links in online social networks. In Proc. WWW, 201092
-
Coupled semi-supervised learning for information extraction. In WSDM, 201091
-
CloudCmp: Comparing Public Cloud Providers. In Proceedings of the 2010 Internet Measurement Conference (IMC’10, 201091
-
Matrix completion with noise. Proc. of the IEEE, 201091
-
Dafny: an automatic program verifier for functional correctness. In LPAR-16, 201084
-
The multidimensional wisdom of crowds. In Neural Information Processing Systems Conference (NIPS, 201079
-
Accurate online power estimation and automatic battery behavior based power model generation for smartphones, in. Proceedings of the Eighth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis – CODES/ISSS ’10, ACM, 201079
-
Crowdsourcing graphical perception: Using mechanical turk to assess visualization design. In CHI ’10: Proceedings of the 28th international conference on Human factors in computing systems, 201077
-
Twitter as a corpus for sentiment analysis and opinion mining. Proceedings of LREC 2010, 201077
-
Secrets of optical flow estimation and their principles. In CVPR, 201077
-
CoreDet: A compiler and runtime system for deterministic multithreaded execution. In ASPLOS, 201077
-
Augmenting mobile 3G using WiFi. in Proc. 8th Int. Conf. Mobile Syst. Appl. Services, 201077
-
Trustvisor: Efficient TCB reduction and attestation. In Proceedings of the IEEE Symposium on Security and Privacy (SP’10). IEEE Computer Society, Los Alamitos, CA, 201076
-
Proximal methods for sparse hierarchical dictionary learning. in Proceedings of the 27th Annual International Conference on Machine Learning, 201076
-
cdec: A decoder, alignment, and learning framework for finite-state and context-free translation models. In Proc. of the ACL, 201075
-
A symbolic execution framework for JavaScript. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, 201075
-
Online learning for latent Dirichlet allocation. In Advances in Neural Information Processing Systems, 201074
-
Beyond Nyquist: Efficient Sampling of Sparse Bandlimited Signals. IEEE Transactions on Information Theory, 201074
-
Mapreduce: A Flexible Data Processing Tool. Comm. ACM, 201074
-
Predicting the popularity of online content. Communications of ACM, 201073
-
Message passing algorithms for compressed sensing: I. motivation and construction. in Proc. of Information Theory Workshop, 201073
-
Cascade object detection with deformable part models. In Proc. CVPR, 201073
-
F-ing modules. In TLDI, 201073
-
Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, 201072
-
Bonsai trees, or how to delegate a lattice basis. In EUROCRYPT, 201072
-
Large-scale incremental processing using distributed transactions and notifications. In Proc. 9th Symposium on Operating Systems Design and Implementation (OSDI’10, 201072
-
From theory to practice: Sub-Nyquist sampling of sparse wideband analog signals. IEEE J. Select. Topics Signal Processing, 201071
-
spam: The Underground on 140 Characters or Less. In Proceedings of the ACM Conference on Computer and Communications Security (CCS, 201071
-
PacketShader: a GPU-accelerated software router. In Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM, 201071
-
Empirical comparison of algorithms for network community detection. In Proceedings of the 19th International Conference on World Wide Web (WWW, 201071
-
Learning a hierarchy of discriminative space-time neighborhood features for human action recognition. In IEEE Int. Conf. on Computer Vision and Pattern Recognition, 201071
-
Is it really about me?: message content in social awareness streams. In Proceedings of the 2010 ACM conference on Computer supported cooperative work, CSCW ’10, 201071
-
Learning influence probabilities in social networks. In WSDM ’10: Proceedings of the 3rd ACM international conference on Web search and data mining, 201071
-
Modeling relationship strength in online social networks. In Proc. (19th) Int. Conf. on World Wide Web, WWW ’10, 201070
-
A latent variable model for geographic lexical variation. In Proc. of EMNLP. Jacob, 201069
-
Onix: A Distributed Control Platform for Large-scale Production Networks. In OSDI, 201068
-
Fully homomorphic encryption over the integers. Advances in Cryptology–EUROCRYPT, 201068
-
Constrained parametric min-cuts for automatic object segmentation. In Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on, 201068
-
Apex: extending Android permission model and enforcement with userdefined runtime constraints. In Proc. of the ASIACCS, 201068
-
Fully homomorphic encryption with relatively small key and ciphertext sizes. In Public Key Cryptography, 201067
-
A contextual-bandit approach to personalized news article recommendation. In Proceedings of the 19th International Conference on World Wide Web, 201067
-
SecondNet: A Data Center Network Virtualization Architecture with Bandwidth Guarantees. In Proceedings of ACM CoNext, 201067
-
Scheduling algorithms. Algorithms and Theory of Computation Handbook, 201067
-
Addressing Shared Resource Contention in Multicore Processors via Scheduling. Proc. of 15th Edition of Architectural Support for Programming Languages and Operating Systems, 201066
-
The benefit of group sparsity. Annals of Statistics, 201066
-
Detection and Analysis of Drive-byDownload Attacks and Malicious JavaScript Code. In International World Wide Web Conference (WWW, 201065
-
Tree-guided group Lasso for multi-task regression with structured sparsity. in Proceedings of the 27th International Conference on Machine Learning, 201065
-
Drift diffusion equations with fractional diffusion and the quasigeostrophic equation. Ann. of Math, 201064
-
Synthetic Control Methods for Comparative Case Studies: Estimating the Effect of California’s Tobacco Control Program. Journal of the American Statistical Association, 201064
-
Adapting visual category models to new domains. In ECCV, 201062