Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of May 20, 2012. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
  1. T H Cormen, C E Leiserson, R L Rivest
    Introduction to Algorithms 1991
    7126
  2. T M Cover, J A
    Thomas,“Elements of Information Theory 1991
    5993
  3. A P Dempster, N M Laird, D B Rubin
    Maximum likelihood from incomplete data via the em algorithm. Journal of Royal Statistical Society, Series B, 1977
    5972
  4. D E Goldberg
    Genetic Algorithms in Search, Optimization and Machine Learning, 1989
    5958
  5. E Gamma, R Helm, R Johnson, J Vlissides
    Design Patterns Elements of Reusable Object-orientated Software 1995
    4542
  6. C E Shannon
    The mathematical theory of communication Bell Systems Tech. J, 1948
    4067
  7. J Hennessy, D Patterson
    Computer Architecture: A Quantitative Approach 2003
    3593
  8. R O Duda, P E Hart
    Pattern Classification and Scene Analysis 1973
    3300
  9. John Hopcroft, andJeffreyUllman 2001 RajeevMotwani
    Introduction to Automata Theory, Languages, and Computation 0
    3256
  10. C A R Hoare
    Communicating sequential processes. ISSN 0001-0782. URL http://doi.acm.org/10.1145/359576, 1978
    3056
  11. L Breiman, J H Friedman, R A Olshen, C J Stone
    Classification and Regression Trees 1984
    3037
  12. I Stoica, R Morris, D Liben-Nowell, D Karger, M F Kaashoek, F Dabek, H Balakrishnan
    Chord: A scalable peer-to-peer lookup service for Internet applications. In SIGCOMM, 2001
    2971
  13. R Milner
    Communication and Concurrency 1989
    2920
  14. J R QUINLAN
    Induction of Decision Trees. 0
    2845
  15. R A Horn, Johnson
    C.R.: Matrix Analysis 1985
    2821
  16. D G Lowe
    Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vision, 0
    2804
  17. S Kirkpatrick, C D Gelatt, M P Vecchi
    Optimization by simulated annealing. Science, 1983
    2741
  18. R S Sutton, A G Barto
    Reinforcement Learning: An Introduction. 1998
    2674
  19. T Kohonen
    Self-Organizing Maps 1995
    2662
  20. G Salton, M McGill
    Introduction to Modern Information Retrieval 1986
    2658
  21. Randal E Bryant
    Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers, 1986
    2577
  22. C L Liu, J W Layland
    Scheduling algorithms for multiprogramming in a hard real-time environment. Journal of the Association for Computing Machinery, 1973
    2515
  23. S Brin, L Page
    The anatomy of a large-scale hypertextual web search engine. in: Proceedings of the 7th World Wide Web Conference, 1998
    2453
  24. R L Rivest, A Shamir, L Adleman
    A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 1978
    2440
  25. R Brooks
    A Robust Layered Control System for a Mobile Robot IEEE Journal of Robotics and Automation, 1986
    2415
  26. M Kass, A Witkin, D Terzopoulos
    Snakes: Active contour models. International Journal of Computer Vision, 1988
    2391
  27. S Ratnasamy, P Francis, M Handley, R Karp, S Shenker
    A scalable content-addressable network. SIGCOMM Computer Communication Review, 0
    2304
  28. J Canny
    A computational approach to edge detection IEEE Transactions on Pattern Analysis and Machine Intelligence, 1986
    2291
  29. David E Rumelhart, Geoffrey E Hinton, Ronald J Williams
    Learning internal representations by error propagation Parallel Distributed Processing, Vol, 1986
    2281
  30. W Diffie, M Hellman
    New directions in cryptography. IEEE Trans. Inform. Theory, 1976
    2230
  31. M Turk, A Pentland
    Eigenfaces for recognition. Journal of Cognitive Neuroscience, 1991
    2187
  32. R Hartley, A Zisserman
    Multiple View Geometry in Computer Vision 2003
    2175
  33. J M Kleinberg
    Authoritative sources in a hyperlinked environment. Journal of the ACM, 1999
    2152
  34. A V Aho, J E Hopcroft, J D Ullman
    The design and analysis of computer algorithms 1974
    2135
  35. L A Zadeh
    Fuzzy Sets Information and Control, 1965
    2105
  36. R Agrawal, R Srikant
    Fast Algorithm for Mining Association Rules. Proc. 20th Int’l Conf. Very Large Data Bases (VLDB ’94, 1994
    2096
  37. S Deerwester, S Dumais, T Landauer, G Furnas, R Harshman
    Indexing by latent semantic analysis. Journal of the American Society of Information Science, 1990
    2089
  38. L Time LAMPORT
    clocks and the ordering of events in a distributed system Cjzalp Babao(jlu, 1978
    2056
  39. R T Rockafellar
    Convex Analysis 1970
    2054
  40. V Jacobson
    avoidance and control Computer Communication Review, 1988
    2010
  41. A Menezes, P van Oorschot, S Vanstone
    Handbook of Applied Cryptography. 1997
    1990
  42. E M Clarke, O Grumberg, D A Peled
    Model Checking. 1999
    1975
  43. James F Allen
    Maintaining knowledge about temporal intervals Communications of the ACM, 1983
    1953
  44. L Breiman
    Bagging predictors. Machine Learning, 1996
    1940
  45. D Harel
    Statecharts: A visual formalism for complex systems. Science of Computer Programming, 1987
    1935
  46. S Floyd, V Jacobson
    Random Early Detection Gateways for Congestion Avoidance. IEEE/ACM Transactions on Networking, 1993
    1908
  47. P Billingsley
    Convergence of Probability Measures 1968
    1888
  48. T Imielinski, R Agrawal, A Swami
    Mining association rules between sets of items in large databases. Proc. ACM SIGMOD Conf. Management of Data, 0
    1885
  49. S Boyd, L Vandenberghe
    Convex Optimization 2004
    1867
  50. C H Papadimitriou
    Computational Complexity. 1994
    1867
  51. R Baeza-Yates, B Ribeiro-Neto
    Modern Information Retrieval. 1999
    1867
  52. R Bellman
    Dynamic Programming 1957
    1862
  53. F Black, M Scholes
    The pricing of options and corporate liabilities J. Political Economy, 1973
    1841
  54. S Mallat
    A Theory for Multiresolution Signal Decomposition: the Wavelet Representation. IEEE Trans. on Patt. Anal. Mach Intell, 1989
    1836
  55. T R Gruber
    A Translation Approach to Portable Ontology Specifications. Knowledge Acquisition, 1993
    1828
  56. G Booch, J Rumbaugh, I Jacobson
    The unified modeling language user guide 1999
    1804
  57. D Johnson, D Maltz
    Dynamic source routing in ad-hoc wireless networks routing protocols. In Mobile Computing, 1996
    1793
  58. J-C Latombe
    Robot Motion Planning 1991
    1760
  59. J Shi, J Malik
    Normalized cuts and image segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000
    1735
  60. J W Lloyd
    Foundations of Logic Programming 1987
    1722
  61. A Jain, R Dubes
    Algorithms for Clustering Data 1988
    1708
  62. Bradley Efron, Robert Tibshirani
    An Introduction to the Bootstrap 1994
    1694
  63. William E Lorensen, Harvey E Cline
    Marching cubes: A high resolution 3d surface construction algorithm. Computer Graphics, 1987
    1684
  64. S Altschul, W Gish, W Miller, E Myers, D Lipman
    Basic local alignment search tool Journal of Molecular Biology, 1990
    1679
  65. S F Altschul, T L Madden, A A Schaffer
    Gapped blast and psi-blast: a new generation of protein database search programs. Nucleic Acids Res. 25, 3389–3402. FU ET AL, 1997
    1671
  66. C E Perkins, E M Royer
    Ad Hoc On-Demand Distance Vector Routing. Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, Pages, 1999
    1662
  67. I Foster, C Kesselman, S Tuecke
    The anatomy of the Grid: Enabling scalable virtual organizations. International Journal of Supercomputing Applications, 0
    1660
  68. M A Fischler, R C Bolles
    Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography SUBMITTED TO IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 14, 1981
    1655
  69. Casner Schulzrinne, Jacobson Frederick
    RTP: A Transport Protocol for Real-Time Applications. 1996
    1650
  70. Y Freund, R E
    Schapire, Decision-theoretic generalization of on-line learning and an application to boosting. Journal of Computer and System Sciences, 1997
    1629
  71. R Alur, D L Dill
    A theory of timed automata. Theoretical Computer Science, 1994
    1626
  72. J Rumbaugh, M Blaha, W Premerlani, F Eddy, W Lorensen
    Object-Oriented Modeling and Design 1991
    1615
  73. P J Besl, N McKay
    A method for registration of 3-D shapes IEEE PAMI, 1992
    1603
  74. F P Preparata, M I Shamos
    Computational Geometry: An Introduction 1985
    1602
  75. C J C Burges
    A Tutorial on support vector machines for pattern recognition. Data Min. Knowledge Discovery, 0
    1594
  76. P Cousot, R Cousot
    Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints In Proceedings of the 4th Symposium on Principles of Programming Languages, 1977
    1588
  77. Mitchell P Marcus, Beatrice Santorini, Mary Ann Marcinkiewicz
    Building a large annotated corpus of English: The Penn Treebank. Computational Linguistics, 1993
    1587
  78. Glenn Shafer
    A mathematical theory of evidence 1976
    1567
  79. Will E Leland, Murad S Taqq, Walter Willinger, Daniel V Wilson
    On the selfsimilar nature of Ethernet traffic. In Deepinder P. Sidhu, editor, ACM SIGCOMM, 1993
    1567
  80. N Metropolis, A W Rosenbluth, M N Rosenbluth, A H Teller, E Teller
    Equation of state calculations by fast computing machines Journal of Chemical Physics, 1953
    1540
  81. D Fudenberg, J Tirole
    Game Theory 1993
    1533