Most Cited Computer Science Articles
This list is generated from documents in the CiteSeer^{x} database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeer^{x} database, since the database is continuously updated.
All Years
 1990
 1991
 1992
 1993
 1994
 1995
 1996
 1997
 1998
 1999
 2000
 2001
 2002
 2003
 2004
 2005
 2006
 2007
 2008
 2009
 2010
 2011
 2012
 2013
 2014
 2015

A.: The pascal visual object classes challenge  a retrospective. Int. J. Comput. Vision, 2014394

Fully automatic crossassociations. KDD, 2004, 79–88. Statistical Analysis and Data Mining DOI:10.1002/sam 52 Statistical Analysis and Data Mining, 201472

The role of inventories and speculative trading in the global market for crude oil. Journal of Applied Econometrics, 201443

On the equivalence of information retrieval methods for automated traceability link recovery. Proceedings of the IEEE International Conference on Program Comprehension (ICPC), IEEE Computer Society, 2010; 68–71. Copyright c© 2014, 201431

Functional signatures and pseudorandom functions. PKC 2014: 17th International Workshop on Theory and Practice in Public Key Cryptography, volume 8383 of Lecture Notes in Computer Science, 201425

Automatic exploit generation. Communications of the ACM, 201421

Distances in random graphs with infinite mean degrees. MR2275914 EJP 19, 201420

Providing secrecy with structured codes: Twouser Gaussian channels. IEEE Trans. Inf. Theory, 201420

One and done? Optimal decisions from very few samples. Cognitive science, 201418

Fastflow: highlevel and efficient streaming on multicore. In Sabri Pllana and Fatos Xhafa, editors, Programming Multicore and Manycore Computing Systems, Parallel and Distributed Computing, chapter 13, 201418

Fullyfunctional static and dynamic succinct trees. ACM Transactions on Algorithms, 201418

Heigen: Spectral analysis for billionscale graphs. TKDE, 201418

Criteria for Evaluating Network Access Server Protocols. RFC 3169, September 2001. Zorn Standards Track [Page 67] RFC 7155 Diameter NASREQ, 201418

Preferences for Redistribution and Perception of Fairness. An Experimental Study. Journal of the European Economic Association, 201416

Replacing a random oracle: Full domain hash from indistinguishability obfuscation. In EUROCRYPT, 201415

Onedimensional Brownian particle systems with rankdependent drifts. MR2473654 EJP 19, 201414

Truncation Noise in FixedPoint SFGs. IEE Electronics Letters, 201412

under review. Assessment of Cloud Liquid Water in CMIP3, CMIP5, and Contemporary GCMs and Reanalyses with, 201412

Extended Secure RTP Profile for Realtime Transport Control Protocol (RTCP)Based Feedback (RTP/SAVPF. RFC 5124, February 2008. Singh, et al. Standards Track [Page 9] RFC 7243 RTCP XR Bytes Discarded, 201412

Cyclicality of credit supply: Firm level evidence. Journal of Monetary Economics, 201411

Multitimescale nexting in a reinforcement learning robot. Adaptive Behavior, 201411

Pradeilles: Annealed large deviations for diffusions in a random Gaussian shear flow drift. Stochastic Process. 2001) 171–197. MR1840830 ECP 19, 201411

The HOLONOMIC ANSATZ II: Automatic DISCOVERY(!) and PROOF(!!) of Holonomic Determinant Evaluations, Annals of Combinatorics 11. http://www.math.rutgers.edu/~zeilberg/mamarim/mamarimhtml/ansatzII.html Douglas R. Hofstadter, http://www.soic.indiana.edu/people/profiles/hofstadterdouglas.shtml Doron Zeilberger, http://www.math.rutgers.edu/~zeilberg/ First Version, 201411

Optimal Taxation of Top Labor Incomes: A Tale of Three Elasticities. American Economic Journal: Economic Policy, 201411

Enhanced peroxynitrite formation is associated with vascular aging. MullerDelp / Cardiovascular Research 66 (2005) 374–383 383 at Pennsylvania State U niversity on February 27, 201410

The impact of link failure location on routing dynamics: A formal analysis. In Proc. ACM SIGCOMM Asia Workshop, 2005. ACM SIGCOMM Computer Communication Review 12 Volume 44, Number 1, 201410

Distributional Convergence for the Number of Symbol Comparisons Used by QuickSelect. MR3102458 EJP 19, 201410

Changes in agonistantagonist EMG, muscle CSA and force during strength training in middleaged and older people. DE BOER ET AL. at Serial Record on February 26, 20149

Where to Find My Next Passenger. In Proceedings of 13th ACM International Conference on Ubiquitous Computing. ACM Press: 109118 1: 54, 20149

Analysis of Boolean Functions. 20149

Rhombic embeddings of planar quadgraphs. Trans. Amer. Math. Soc, 20149

A C++ application programming interface for biased randomkey genetic algorithms. Optimization Methods and Software, 20149

Matrix representations of octonions and their applications. Advances in Applied Clifford Algebras, 10:61–90, 2000. Electronic Journal of Linear Algebra ISSN 10813810 A publication of the International Linear Algebra Society Volume 27, 20148

The table is the score : An augmentedreality interface for realtime, tangible, spectrographic performance. Proceedings of 2006 International Computer Music Conference, 2006, http://www.flong.com/texts/publications/pub icmc06/, Last visited, 20147

Tworound secure mpc from indistinguishability obfuscation. In TCC, 20147

Competition Between Exchanges: Lessons from the Battle of the Bund," 2013 CasadesusMasanell. Journal of Economics & Management Strategy, 20147

Latent bandits. In ICML, 20147

A shortest path representation for video summarisation. 12th International Conference on Image Analysis and Processing, 2003.Proceedings, 20147

Graph drawings with few slopes. Computational Geometry, 20146

Swarm robotics. Scholarpedia, 20146

RankBalanced Trees. ACM Trans. Algorithms (2014). To appear. ACM Transactions on Database Systems, 20146

Customer order scheduling to minimize total weighted completion time. Copyright ⓒ 2014 SERSC 325 Journal of Multimedia and Ubiquitous Engineering Vol.9, No.4, 20146

3d tracking and dynamic analysis of human head movements and attentional targets. in Proc. 2nd ACM/IEEE ICDSC, 20146

The Grothendieck constant is strictly smaller than Krivine’s bound. Forum Math. Pi, 20146

3D simulation and analysis of the radiation tolerance of voltage scaled digital circuit. in Proc. Int. Conf. Comput. Des., 2009, 20145

Visual ageing: unspecific decline of the responses to luminance and colour. Vision Res. 1996;36:3557–3566. Accepted May 31, 2005 Decision Editor: James R. Smith, PhD 1251GINKGO BILOBA AND VISUAL PROCESSING at Serial Record on M arch 1, 20145

Bubble Sort: An Archaeological Algorithmic Analysis, SIGCSE,2003, http://www.cs.duke.edu/~old/papers/bubble.pdf. 0.5 1.5 2.5 3.5 Bubble Sort Insertion Sort Selection Sort Quick Sort C language Java language Rekha dwivedi et al. International Journal of Computer Science & Engineering Technology (IJCSET) ISSN, 20145

Fast algorithms for maximizing submodular functions. In SODA, 20145

Austerity in MCMC land: Cutting the MetropolisHastings budget. In Proceedings of the 31st International Conference on Machine Learning, ICML ’14, 20145

D.: Visual Exploration and Discovery of Atypical Behavior in Financial Time Series Data using TwoDimensional Colormaps. In Information Visualization, 2007. IV ’07. 11th International Conference (2007, 20145

Bounded distortion mapping spaces for triangular meshes. ACM Trans. Graph, 20145

Distributed data management using mapreduce. ACM Comput. Surv, 20145

CakeML: A verified implementation of ML. In POPL, 20145

Towards scaling up Markov chain Monte Carlo: An adaptive subsampling approach. In Proceedings of the 31st International Conference on Machine Learning, ICML ’14, 20144

Aligned delegation. The American Economic Review, 20144

True scaleinvariant random spatial networks. Proceedings of the National Academy of Sciences 110, 20144

Collaborative Sparse Regression for Hyperspectral Unmixing. IEEE Trans. Geosci. Remote Sens, 20144

Adaptive piecewise polynomial estimation via trend filtering. Annals of Statistics, 20144

Charter of the Internet Architecture Board (IAB. BCP 39, RFC 2850, May 2000. Dawkins, et al. Informational [Page 27] RFC 7241 IEEE 802/IETF Relationship, 20144

W.: Efficient semiautomated assessment of annotation trustworthiness. Journal of Trust Management, 20144

NetKAT: Semantic foundations for networks. In POPL, 20144

Visualization of personal history for video navigation. In Proceedings of the Conference on Human Factors in Computing Systems, ACM, CHI, 20144

Extending Type Inference to Variational Programs. ACM Trans. Programming Languages and Systems (TOPLAS, 20144

Efficient nonmalleable codes and keyderivation for polysize tampering circuits. EUROCRYPT 2014, volume 8441 of LNCS, 20144

2014b), “What Central Bankers Need to Know about Forecasting Oil Prices. International Economic Review, 20144

An augmented incomplete factorization approach for computing the Schur complement in stochastic optimization. SIAM Journal on Scientific Computing, 20143

Gravity equations: Workhorse, toolkit, and cookbook, in. Gopinath, G., Helpman, E., Rogoff, K. (Eds.), Handbook of International Economics. Elsevier, 20143

Monetary Policy TradeOffs in an Estimated OpenEconomy DSGE Model. Journal of Economic Dynamics and Control, 20143

Reconciling Mobile App Privacy and Usability on Smartphones: Could User Privacy Profiles Help. In Proc. of the WWW'14, 20143

Distributed frequencypreserving optimal load control. IFAC World Congress, 20143

Saddlepoint approximation methods for pricing derivatives on discretely sampled realized variance. Applied Mathematical Finance, 20143

The still image lossy compression standard. JPEG, Encyclopedia of Information and Science Technology, Third Edition, 20143