Most Cited Computer Science Articles

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. A Barto.
    Intrinsic motivation and reinforcement learning. Intrinsically Motivated Learning in Natural and Artificial Systems, 2013
    88
  2. S Apel, C Kastner, C Lengauer.
    Language-independent and automated software composition: The FeatureHouse experience. IEEE Trans. Softw. Eng, 2013
    67
  3. P Liang, M I Jordan, D Klein.
    Learning dependency-based compositional semantics. Computational Linguistics, 2013
    60
  4. A Cal̀ı, G Gottlob, M Kifer.
    Taming the infinite chase: Query answering under expressive relational constraints. J. of Artificial Intelligence Research, 2013
    56
  5. Sanjam Garg, Craig Gentry, Shai Halevi.
    Candidate multilinear maps from ideal lattices. Advances in Cryptology – EUROCRYPT 2013, volume 7881 of Lecture Notes in Computer Science, 2013
    45
  6. M-F Balcan, A Blum, A Gupta.
    Approximate clustering without the approximation. In Journal of ACM, 2013
    37
  7. B Dit, M Revelle, M Gethers, D Poshyvanyk.
    Feature location in source code: A taxonomy and survey. J. Software Maintenance & Evolution: Research and Practice, 2013
    35
  8. R Gennaro, C Gentry, B Parno, M Raykova.
    Quadratic span programs and succinct NIZKs without PCPs. EUROCRYPT 2013, volume 7881 of LNCS, 2013
    29
  9. G D’Ambrosio, G F Giudice, G Isidori, A Strumia.
    Minimal flavour violation: An effective field theory approach”, Nucl. Phys. B 645 (2002) 155 [hep-ph/0207036]. tel-00824019, version 1, 2013
    29
  10. Steven J Davis, R Jason Faberman, John C Haltiwanger.
    The Establishment-level Behavior of Vacancies and Hiring.” Quarterly. Journal of Economics, 2013
    28
  11. F Rusek, D Persson, B K Lau, E G Larsson, T L Marzetta, O Edfors, F Tufvesson.
    Scaling up MIMO: Opportunities and challenges with very large arrays. IEEE Signal Processing Magazine, 2013
    28
  12. C J Buehler, M Bosse, L McMillan.
    Non-Metric Image-Based Rendering for Video Stabilization. Proc. CVPR, Citation Christian Kurz, Tobias Ritschel, Elmar Elmar Eisemann, Thorsten Thormählen, and Hans-Peter Seidel, Generating Realistic Camera Shake for Virtual Scenes, Journal of Virtual Reality and Broadcasting, 2013
    27
  13. C C Aggarwal.
    Outlier Analysis. 2013
    25
  14. B Parno, C Gentry, J Howell, M Raykova.
    Pinocchio: Nearly practical verifiable computation. In Proceedings of the IEEE Symposium on Security and Privacy, 2013
    24
  15. Dan Boneh, Brent Waters.
    Constrained pseudorandom functions and their applications. Advances in Cryptology – ASIACRYPT 2013, Part II, 2013
    23
  16. J P Aumasson, L Henzen, W Meier, Naya-Plasencia.
    M.: Quark: A Lightweight Hash. J. Cryptology, 2013
    22
  17. J-S Coron, T Lepoint, M Tibouchi.
    Batch fully homomorphic encryption over the integers. IACR Cryptology ePrint Archive, 2013
    22
  18. Y Plan, R Vershynin.
    One-bit compressed sensing by linear programming. Comm. Pure and Applied Math, 2013
    21
  19. Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, Thomas Zacharias.
    Delegatable pseudorandom functions and applications. ACM CCS 13: 20th Conference on Computer and Communications Security, 2013
    21
  20. N Cesa-Bianchi, C Gentile, G Zappella.
    A gang of bandits. In Proc. NIPS, 2013
    21
  21. Benjamin Recht, Christopher Ré.
    Parallel stochastic gradient algorithms for large-scale matrix completion. Mathematical Programming Computation, 2013
    21
  22. Eneko Agirre, Daniel Cer, Mona Diab, Aitor GonzalezAgirre, Weiwei Guo.
    sem 2013 shared task: Semantic textual similarity. In Proceedings of the Second Joint Conference on Lexical and Computational Semantics and the Shared Task: Semantic Textual Similarity, 2013
    21
  23. F Zhang, Zhang Ed, G Belotti, S Ceccarelli, D, K Pithewan.
    Generalized Multi-Protocol Label Switching (GMPLS) Signaling Extensions for the evolving G.709 Optical Transport Networks Control. Work in Progress, 2013
    21
  24. E K Burke, M Gendreau, M Hyde, G Kendall, G Ochoa, E Ozcan, Qu.
    R.: Hyper-heuristics: a survey of the state of the art. Journal of the Operational Research Society (JORS, 2013
    21
  25. B Bagheri Hariri, D Calvanese, G D Giacomo, A Deutsch, M Montali.
    Verification of relational data-centric dynamic systems with external services. In Proc. of PODS, 2013
    21
  26. S Foss, D Korshunov, S Zachary.
    An Introduction to Heavytailed and Subexponential Distributions. Springer-Verlag, 2nd Edition. 14 Embrechts, Hashorva, Mikosch, 2013
    20
  27. S Garg, C Gentry, S Halevi, A Sahai, B Waters.
    Attribute-based encryption for circuits from multilinear maps. In CRYPTO, 2013
    20
  28. G P Huet.
    Residual theory in λ-calculus: A formal development. 1994) B. Accattoli hal-00780337, version 1 - 23, 2013
    20
  29. Raj Chetty, Emmanuel Saez.
    Teaching the Tax Code: Earnings Responses to an Experiment with EITC Recipients. American Economic Journal: Applied Economics, 2013
    19
  30. R NISHTALA, H FUGAL, S GRIMM, M KWIATKOWSKI, H LEE, H C LI, R MCELROY, M PALECZNY, D PEEK, P SAAB, D STAFFORD, T TUNG, V VENKATARAMANI.
    Scaling memcache at facebook. In Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation, 2013
    18
  31. C Monsanto, J Reich, N Foster, J Rexford, D Walker.
    Composing software-defined networks. In Proc. NSDI, 2013
    18
  32. J Brogaard, T J Hendershott, R Riordan.
    High frequency trading and price discovery, Working paper. 2013
    18
  33. Kenneth J Turner, Gavin A Campbell.
    The ACCENT policy wizard. 2013
    17
  34. X Hu, L Tang, J Tang, H Liu.
    Exploiting social relations for sentiment analysis in microblogging. Proceedings of WSDM, 2013
    17
  35. David A Matsa, Amalia R Miller.
    A Female Style in Corporate Leadership? Evidence from Quotas. Dataset.” American Economic Journal: Applied Economics, 2013
    17
  36. G Pelletier, K Sandlund, L-E Jonsson, M West.
    RObust Header Compression (ROHC): A Profile for TCP/IP. RFC 6846. 2013
    17
  37. Dorit Ron, Adi Shamir.
    Quantitative Analysis of the Full Bitcoin Transaction Graph. In Financial Cryptography and Data Security, 2013
    17
  38. C Benzmüller, L Paulson.
    Quantified multimodal logics in simple type theory. Logica Universalis (Special Issue on Multimodal Logics, 2013
    16
  39. F Reid, M Harrigan.
    An analysis of anonymity in the bitcoin system. In Security and Privacy in Social Networks, 2013
    16
  40. T Winter, U Zimmermann.
    Real-time dispatch of trams in storage yards. 36 Journal of Computer Applications (0975 – 8887) Volume 69– No.1, 2013
    16
  41. N Berestycki.
    Recent progress in coalescent theory. JEAN-STÉPHANE DHERSIN AND LINGLONG YUAN hal-00674190, version 3 - 23, 2013
    16
  42. Andreas Rossberg, Derek Dreyer.
    Mixin’ up the ML module system. ACM Transactions on Programming Languages and Systems (TOPLAS, 2013
    16
  43. J Teubner, L Woods.
    Data processing on FPGAs. Number 35 in Synthesis Lectures on Data Management. Morgan and Claypool Publishers, 2013
    16
  44. S Goldwasser, Y Kalai, R A Popa, V Vaikuntanathan, N Zeldovich.
    Reusable Garbled Circuits and Succinct Functional Encryption. In Proceedings of the ACM Symposium on Theory of Computing (STOC), STOC ’13, 2013
    15
  45. Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi.
    Practical multilinear maps over the integers. Advances in Cryptology – CRYPTO 2013, Part I, 2013
    15
  46. C Monsanto, J Reich, N Foster, J Rexford, D Walker.
    Composing Software Defined Networks. In Proc. NSDI, 2013
    15
  47. Sushant Jain, Alok Kumar, Subhasree Mandal, Joon Ong, Leon Poutievski, Arjun Singh, Subbaiah Venkata, Jim Wanderer, Junlan Zhou, Min Zhu, Jonathan Zolla, Urs Hölzle, Stephen Stuart, Amin Vahdat.
    B4: Experience with a globally-deployed software defined WAN. In SIGCOMM, 2013
    15
  48. S-J Hwang, P Schniter.
    Efficient Multicarrier Communication for Highly Spread Underwater Acoustic Channels. IEEE J. Sel. Areas Commun, 2013
    15
  49. M Brambilla, E Ferrante, M Birattari, M Dorigo.
    Swarm robotics: a review from the swarm engineering perspective. Swarm Intelligence, 2013
    15
  50. Y Bengio, A Courville, P Vincent.
    Representation learning: A review and new perspectives. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 2013
    15
  51. B Ni, G Wang, P Moulin.
    Rgbd-hudaact: A color-depth video database for human daily activity recognition. In Consumer Depth Cameras for Computer Vision, 2013
    15
  52. Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee.
    Attribute-based encryption for circuits. In Proceedings of the 45th annual ACM symposium on Symposium on theory of computing, STOC ’13, 2013
    14
  53. I Miers, C Garman, M Green, A D Rubin.
    Zerocoin: Anonymous Distributed E-Cash from Bitcoin. In IEEE Symposium on Security and Privacy, 2013
    14
  54. Dongsun Kim, Jaechang Nam, Jaewoo Song, Sunghun Kim.
    Automatic Patch Generation Learned from Human-Written Patches. In Proceedings of the 2013 International Conference on Software Engineering, 2013
    14
  55. O Owoputi, B OŠConnor, C Dyer, K Gimpel, N Schneider, N A Smith.
    Improved part-of-speech tagging for online conversational text with word clusters. In Proceedings of NAACL, 2013
    14
  56. M T Goodrich, C G Wagner.
    A framework for drawing planar graphs with curves and polylines. Journal of Algorithms, 2013
    14
  57. S Misailovic, D Kim, M Rinard.
    Parallelizing sequential programs with statistical accuracy tests. ISSN 1539-9087. . URL http://doi.acm.org/10.1145/2465787.2465790, 2013
    14
  58. J W Hatfield, S D Kominers, A Nichifor, M Ostrovsky, A Westkamp.
    Stability and competitive equilibrium in trading networks. Journal of Political Economy, 2013
    14
  59. Y JIANG, H KOPPULA, A SAXENA.
    Hallucinated humans as the hidden context for labeling 3D scenes. In CVPR, 2013
    14
  60. W Lloyd, M J Freedman, M Kaminsky, D G Andersen.
    Stronger semantics for low-latency geo-replicated storage. In NSDI, 2013
    13
  61. Henry S Farber, Robert G Valetta.
    Do Extended Unemployment Benefits Lengthen Unemployment Spells? Evidence from Recent. Cycles in the U.S. Labor Market. NBER Working Paper No, 2013
    13
  62. M Krötzsch, S Rudolph, Hitzler.
    P.: Complexities of Horn description logics. ACM Transactions on Computational Logic, 2013
    13
  63. J Donahue, Y Jia, O Vinyals, J Hoffman, N Zhang, E Tzeng, Darrell.
    T.: Decaf: A deep convolutional activation feature for generic visual recognition. arXiv preprint arXiv:1310.1531. 2013
    13
  64. N J MITRA, M PAULY, M WAND, D CEYLAN.
    Symmetry in 3d geometry: Extraction and applications. In Computer Graphics Forum, 2013
    13
  65. Malte Schwarzkopf, Andy Konwinski, Michael Abd-El-Malek, John Wilkes.
    Omega: Flexible, Scalable Schedulers for Large Compute Clusters. In Proceedings of the 8th ACM SIGOPS European Conference on Computer Systems (EuroSys ’13, 2013
    13
  66. D R Radev, P Muthukrishnan, V Qazvinian, A Abu-Jbara.
    The acl anthology network corpus. Language Resources and Evaluation Journal, 2013
    13
  67. A Calza, T Monacelli, L Stracca.
    Housing finance and monetary policy. Journal of the European Economic Association, 2013
    13
  68. F Brandt, V Conitzer, U Endriss.
    Computational social choice. 2013
    13
  69. Dirk Colbry.
    Matching 2.5D Scans for Face Recognition. Hiremath et al., International Journal of Advances in Computer Science and Technology, 2013
    13
  70. Cédric Fournet, Nikhil Swamy, Juan Chen, Pierre-Évariste Dagand, Pierre-Yves Strub, Benjamin Livshits.
    Fully abstract compilation to javascript. In Principles of Programming Languages (POPL, 2013
    13
  71. E Grefenstette, G Dinu, Y Zhang, M Sadrzadeh, M Baroni.
    Multi-step regression learning for compositional distributional semantics. In Proceedings of the Tenth International Conference on Computational Semantics. Association for Computational Linguistics, 2013
    13
  72. A Clark.
    Whatever Next? Predictive Brains, Situated Agents. and the Future of Cognitive Science. Behavioral and Brain Sciences, 2013
    12
  73. Victor Vu, Srinath Setty, Andrew J Blumberg, Michael Walfish.
    A hybrid architecture for interactive verifiable computation. In Proceedings of the 34th IEEE Symposium on Security and Privacy, Oakland ’13, 2013
    12
  74. T Sönmez.
    Bidding for Army Career Specialties: Improving the ROTC Branching Mechanism. Journal of Political Economy, 2013
    12
  75. J Schulman, J Ho, A Lee, I Awwal, H Bradlow, P Abbeel.
    Finding locally optimal, collision-free trajectories with sequential convex optimization. in Proceedings of Robotics: Science and Systems, 2013
    12
  76. J Arthur.
    The endoscopic classification of representations: Orthogonal and symplectic groups. Colloquium publications 61, Amer. Math. Soc, 2013
    12
  77. M Jaggi.
    Revisiting frank-wolfe: Projection-free sparse convex optimization. Proceedings of the International Conference on Machine Learning 30, 2013
    12
  78. E Stefanov, E Shi.
    Oblivistore: High performance oblivious cloud storage. In Proc. of IEEE Symposium on Security and Privacy, 2013
    12
  79. L B Chilton, G Little, D Edge, D S Weld, J A Landay.
    Cascade: crowdsourcing taxonomy creation. In CHI ’13: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM Request Permissions, 2013
    12
  80. M Baboulin, J J Dongarra, J Herrmann, S Tomov.
    Accelerating linear system solutions using randomization techniques. ACM Trans. Mathematical Software, 2013
    12
  81. Yuening Hu, Jordan Boyd-Graber, Brianna Satinoff, Alison Smith.
    Interactive topic modeling. Machine Learning Journal, 2013
    12
  82. M Desnoyers, McKenney PE, Stern AS, Dagenais MR, J Walpole.
    User-level implementations of readcopy update. IEEE Transactions on Parallel and Distributed Systems, 2013
    12
  83. M F Duarte, R G Baraniuk.
    Spectral compressive sensing. Applied and Computational Harmonic Analysis, 2013
    12
  84. M D Hoffman, D M Blei, C Wang, J Paisley.
    Stochastic variational inference. Journal of Machine Learning Research, 2013
    12
  85. A M Castaldo, C Whaley, S Samuel.
    Scaling lapack panel operations using parallel cache assignment. ACM Transactions on Mathematical Software (TOMS, 2013
    12
  86. Sanjam Garg, Craig Gentry, Amit Sahai, Brent Waters.
    Witness encryption and its applications. 45th Annual ACM Symposium on Theory of Computing, 2013
    12