Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. J Sambrook, E F Fritsch, T Maniatis
    Molecular Cloning: A Laboratory Manual, Vol. 1, 2nd edn Nucleic Acids Research, 1989
    10362
  2. V Vapnik
    Statistical Learning Theory. 1998
    9898
  3. T M Cover, J A Thomas
    Elements of Information Theory Series in Telecommunications, 1991
    9198
  4. T H Cormen, C E Leiserson, R L Rivest, C Stein
    Introduction to Algorithms. 1990
    9039
  5. A P Dempster, N M Laird, D B Rubin
    Maximum likelihood from incomplete data via the EM algorithm. 1977
    8999
  6. D E Goldberg
    Genetic Algorithms in Search, Optimization and Machine Learning, 1989
    8261
  7. C E Shannon, W Weaver
    The Mathematical Theory of Communication 1949
    7077
  8. E Gamma, R Helm, R Johnson, J Vlissides
    De- sign Patterns: Elements of Reusable Object-Oriented Software 1995
    5918
  9. J R Quinlan
    C4.5: Programs for Machine Learning 1993
    5414
  10. S F Altschul, T L Madden, A A Schaffer, J Zhang, Z Zhang, W Miller, D J Lipman
    Gapped BLAST and PSI-BLAST: a new generation of protein database search programs. Nucleic Acids Res. 25:3389–3402. 96 DING AND FERRY, 1997
    5384
  11. R Horn, C Johnson
    Matrix analysis 1999
    5089
  12. S F Altschul, W Gish, W Miller, E W Myers, D J Lipman
    Basic local alignment search tool Journal of Molecular Biology, 1990
    4956
  13. L Breiman, J Friedman, R Olshen, C Stone
    Classification and Regression Trees 1984
    4415
  14. J L Hennessy, D A Patterson
    Computer Architecture: A Quantitative Approach 1990
    4307
  15. S Haykin
    Neural Networks: A Comprehensive Foundation Upper Saddle River, NJ, 1999
    4270
  16. F SANGER, S NICKLEN, A R COULSON
    DNA sequencing with chain-terminating inhibitors Proceedings of the National Academy of Sciences, 1977
    4228
  17. Stuart Russell, Peter Norvig
    Artificial Intelligence: A Modern Approach Upper Saddle River (New Jersey, 1995
    4182
  18. R O Duda, P E Hart
    Pattern Classification and Scene Analysis 1973
    4161
  19. R Sutton, A Barto
    Reinforcement Learning, an introduction. 1998
    4148
  20. J Sambrook, E F Fritsch, T Maniatis
    Molecular cloning: a laboratory 1989
    4113
  21. S Boyd, L Vandenberghe
    Convex Optimization UNIVERSITY OF ALBERTA. Downloaded on December 22, 2008 at 12:22 from IEEE Xplore. Restrictions apply, 2004
    4072
  22. S Geman, D Geman
    Stochastic Relaxation, Gibbs Distributions, and the Bayesian Restoration of Images IEEE Trans. on Pattern Anal. and Machine Intel, 1984
    4041
  23. S Kirkpatrick, C D Gelatt, M P Vecchi
    Optimization by simulated annealing. Science, 1983
    3918
  24. O H Lowry, N J Rosebrough, A L Farr, R J Randall
    Protein measurement with the Folin phenol reagent 1951
    3828
  25. D Kahneman, A Tversky
    Prospect theory: An analysis of decision under risk. Econometrica, 1979
    3795
  26. R T Rockafellar, R J-B Wets
    Variational Analysis. 1997
    3743
  27. L A Zadeh
    Fuzzy sets Information and Control, 1965
    3724
  28. T Kohonen
    Self-Organizing Maps 1995
    3700
  29. J R Quinlan
    Induction of decision trees. Machine Learning, 1986
    3634
  30. C A R Hoare
    Communicating Sequential Processes. 1985
    3632
  31. S Brin, L Page
    The Anatomy of a Large-Scale Hypertextual Web Search Engine. in Proc. of 7th International WWW Conference, 1998
    3623
  32. F Black, M Scholes
    The pricing of options and corporate liabilities Journal of Political Economy, 1973
    3497
  33. P Billingsley
    Convergence of Probability Measures 1968
    3486
  34. R Hartley, A Zisserman
    Multiple View Geometry in Computer Vision, chap. 6 2000
    3470
  35. J Canny
    A computational approach to edge detection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1986
    3426
  36. Gerard SALTON, McGILL Michael
    Introduction to Modern Information Retrieval 0
    3416
  37. A J R Milner
    Communication and Concurrency 1989
    3412
  38. Yoav Benjamini, Yosef Hochberg
    Controlling the false discovery rate: A practical and powerful approach to multiple testing Journal of the Royal Statistical Society: Series B, 1995
    3397
  39. B Efron, R J Tibshirani
    An Introduction to the Bootstrap. 1994
    3323
  40. M Kass, A Witkin, D Terzopoulos
    Snakes: active contour models. International Journal of Computer Vision, 1988
    3267
  41. C L Liu, J W Layland
    Scheduling Algorithms for Multiprogramming in a Hard Real-Time Environment. Journal of the ACM, 1973
    3213
  42. R Rivest, A Shamir, L Adleman
    A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 1978
    3175
  43. R Bryant
    Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers, 1986
    3147
  44. C L Blake, C J Merz
    UCI repository of machine learning databases 1998
    3070
  45. H Towbin, T Staehelin, J Gordon
    Electrophoretic transfer of proteins from polyacrylamide gels to nitrocellulose sheets: procedure and some applications Proc. Natl. Acad. Sci. USA 76:4350–4354, 1979
    3041
  46. M Turk, A Penland
    Eigenfaces for recognition. Journal of Cognitive Neuroscience, 1991
    3017
  47. S Deerwester, S T Landauer T K Dumais, G W Furnas, R A Harshman
    Indexing by latent semantic analysis. Journal of the Society for Information Science, 1990
    3011
  48. D E Rumelhart, G E Hinton, R J Williams
    Learning internal representations by error propagation in Parallel Distributed Processing, 1986
    3002
  49. Jon M Kleinberg
    Authoritative sources in a hyperlinked environment. In Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA, 1998
    2990
  50. C ed Fellbaum
    WordNet: An Electronic Lexical Database 1998
    2956
  51. W Diffie, M E Hellman
    New Directions in Cryptography. IEEE Transactions on Information Theory, 1976
    2951
  52. S Ratnasamy, P Francis, M Handley, R Karp, S Shenker
    A Scalable Content-Addressable Network. In Proceedings of the ACM SIGCOMM '01 Conference, 2001
    2946
  53. J J LAFFONT, J TIROLE
    A Theory of Incentives in Procurement and Regulation, 1993
    2941
  54. R A Brooks
    A robust layered control system for a mobile robot IEEE Journal of Robotics and Automation, 1986
    2941
  55. R R Nelson, S G Winter
    An evolutionary theory of economic change 1982
    2898
  56. Rakesh Agrawal, Ramakrishnan Srikant
    Fast algorithms for mining association rules. In Proceedings of the 20th International Conference on Very Large Databases (VLDB, 1994
    2889
  57. R-E Bellman
    Dynamic Programming 1957
    2885
  58. J Shi, J Malik
    Normalized cuts and image segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000
    2769
  59. L Breiman
    Bagging predictors. Machine Learning, 1996
    2751
  60. G Schwarz
    Estimating the dimension of a model Ann. Stat, 1978
    2739
  61. A J Menezes, P C Van Oorschot, S A Vanstone
    Handbook of applied cryptography. 1997
    2706
  62. E M Clarke, D E Long, K L McMillan
    Compositional model checking. In LICS, 1989
    2663
  63. S G Mallat
    A Theory for Multiresolution Signal Decomposition: The Wavelet Representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1989
    2658
  64. R Baeza-Yates, B Ribeiro-Neto
    Modern Information Retrieval. 1999
    2652
  65. R Agrawal, T Imielinski, A Swami
    Mining Association Rules between Sets of Items in Large Databases. In Proceedings of the ACM SIGMOD International Conference on Management of Data, 1993
    2635
  66. D M Blei, A Y Ng, M I Jordan
    Latent dirichlet allocation. Journal of Machine Learning Research, 2003
    2630
  67. M Granovetter
    The strength of weak ties American Journal of Sociology, 0
    2624
  68. Thomas R Gruber
    A translation approach to portable ontology specifications. Knowledge Acquisition, 1993
    2610
  69. American Psychiatric Association
    Diagnostic and statistical manual of mental disorders 1994
    2598
  70. J D Hamilton
    Time Series Analysis 1994
    2558
  71. A Aho, J Hopcroft, J Ullman
    The Design and Analysis of Computer Algorithms 1974
    2553
  72. Altschul SF, Madden TL, Schaffer AA, J Zhang, Z Zhang
    Gapped BLAST and PSI-BLAST: a new generation of protein database search programs Nucleic Acids Res, 1997
    2544
  73. D B Johnson, D A Maltz
    Dynamic source routing in ad hoc wireless networks. in Mobile Computing, Imielinski and Korth, Eds, 1996
    2544
  74. N Metropolis, A W Rosenbluth, M N Rosenbluth, A H Teller, E Teller
    Equation of state calculations by fast computing machines J. Chem. Phys, 1953
    2515
  75. J Lafferty, A McCallum, F Pereira
    Conditional random fields: Probabilistic models for segmenting and labeling sequence data. In ICML-2001, 2001
    2499
  76. J F Allen
    Maintaining knowledge about temporal intervals. Communications of ACM, 1983
    2486