Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. J Yoon, M Liu, B Noble
    Random waypoint considered harmful. In: Proc. of the IEEE INFOCOM, Vol.2, 2003
  2. J Portilla, V Strela, M Wainwright, E Simoncelli
    Image Denoising using Scale Mixtures of Gaussians in the Wavelet Domain. IEEE Transactions on Image Processing, 2003
  3. T Andersen, T Bollerslev, F X Diebold, P Labys
    Modeling and forecasting realized volatility. Econometrica, 2003
  4. S Rhea, D Geels, T Roscoe, J Kubiatowicz
    Handling churn in a dht. USENIX Annual Technical Conference, June-July, 2003
  5. J Laneman, G Wornell
    Distributed spacetime-coded protocols for exploiting cooperative diversity in wireless networks. IEEE Transactions on Information Theory, 2003
  6. I L Hofacker
    Vienna RNA secondary structure server. NAR, 2003
  7. Paul A Gompers, Joy L Ishii, Andrew Metrick
    Corporate governance and equity prices, Quarterly Journal of Economics, 2003
  8. T Clausen, P Jacquet
    Optimized Link State Routing Protocol (OLSR). RFC 3626, 2003
  9. Dejan Kostić, Adolfo Rodriguez, Jeannie Albrecht, Amin Vahdat
    Bullet: high bandwidth data dissemination using an overlay mesh. In Proceedings of the nineteenth ACM symposium on Operating systems principles, volume 37, 5 of Operating Systems Review, 2003
  10. K Toutanova, D Klein, CDManning, Y Singer
    Feature-rich part-of-speech tagging with a cyclic dependency network. In Proc. of NAACL, 2003
  11. Y Chawathe, S Ratnasamy, L Breslau, N Lanham, S Shenker
    Making gnutella-like P2P systems scalable. In Proceedings of the ACM SIGCOMM 2003 Conference, 2003
  12. C Y Lin, E H Hovy
    Automatic Evaluation of Summaries Using N-gram CoOccurrence Statistics In Proceedings of the HLT/NAACL 2003: Main Conference, 2003
  13. R C Shah, S Roy, S Jain, W Brunette
    Data mules: modeling a three-tier architecture for sparse sensor networks. In Proc. IEEE Workshop on Sensor Network Protocols and Applications, 2003
    Graphcut textures: Image and video synthesis using graph cuts. In Proceedings of SIGGRAPH, 2003
  15. K Skadron, M Stan, W Huang, S Velusamy, K Sankaranarayanan, D Tarjan
    Temperature-aware microarchitecture. 2003
  16. R Basri, D W
    Jacobs : Lambertian Reflection and Linear subspaces. IEEE Trans. on Pattern Analysis & Machine Intelligence, 2003
  17. M Herlihy, V Luchangco, M Moir, I William N Scherer
    Software transactional memory for dynamic-sized data structures. In PODC’03: Proceedings of the twenty-second annual Symposium on Principles of Distributed Computing, 2003
  18. G Caire, S Shamai, “On
    the Achievable Throughput of a Multiantenna Gaussian Broadcast Channel”,IEEE Transaction on Information Theory, 2003
  19. S Kachru, R Kallosh, A Linde, S P Trivedi
    De Sitter vacua in string theory,” Phys Rev. D, 2003
  20. W H DeLone, E R McLean
    The Delone And Mclean Model Of Information Systems Success: A Ten-Year Update. Journal of Management Information System, 2003
  21. L Giot, J S Bader, C Brouwer, A Chaudhuri, B Kuang, Y Li, Y L Hao, C E Ooi, B Godwin, E Vitols, G Vijayadamodar, P Pochart, H Machineni, M Welsh, Y Kong, B Zerhusen, R Malcolm, Z Varrone, A Collis, M Minto, S Burgess, L McDaniel, E Stimpson, F Spriggs, J Williams, K Neurath, N Ioime, M Agee, E Voss, K Furtak, R Renzulli, N Aanensen, S Carrolla, E Bickelhaupt, Y Lazovatsky, A DaSilva, J Zhong, C A Stanyon, R L Finley, K P White, M Braverman, T Jarvie, S Gold, M Leach, J Knight, R A Shimkets, M P McKenna, J Chant, J M Rothberg
    A protein interaction map of Drosophila melanogaster Science, 2003
  22. W Cohen, P Ravikumar, S Fienberg
    A comparison of string distance metrics for name-matching tasks. 2003
  23. V Matys, E Fricke, R Geffers, E Gossling, M Haubrock, R Hehl, K Hornischer, D Karas, A E Kel, O V Kel-Margoulis
    TRANSFAC: transcriptional regulation, from patterns to profiles Nucleic Acids Res, 2003
  24. M E Califf, R J Mooney
    Bottom-up Relational Learning of Pattern Matching Rules for Information Extraction. Journal of Machine Learning Research, 2003
  25. P M Podsakoff, S B MacKenzie, J Y Lee, N P Podsakoff
    Common method biases in behavioral research: a critical review of the literature and recommended remedies Journal of Applied Psychology, 2003
  26. T Dietz, E Ostrom, P C Stern
    The struggle to govern the commons Science, 2003
  27. T Garfinkel, B Pfaff, J Chow, M Rosenblum, D Boneh
    Terra: A virtual machine-based platform for trusted computing. ACM SIGOPS Operating Systems Review, 2003
  28. L Pastor, R Stambaugh
    Liquidity risk and expected stock returns. Journal of Political Economy, 2003
  29. A M Freeman
    The Measurement of Environmental and Resource Values, Theory and Methods DC: Resources for the Future, 2003
  30. D M Blei, M I Jordan
    Modeling annotated data. In Proceedings of the 26th annual international ACM SIGIR conference on Research and development in informaion retrieval, 2003
  31. I Horrocks, L Li
    A Software Framework for Matchmaking Based on Semantic Web Technology. In Proc. of the Twelfth International World Wide Web Conference (WWW 2003, 2003
  32. J Jeon, V Lavrenko, R Manmatha
    Automatic image annotation and retrieval using cross-media relevance models. In Proc. of the 26th international ACM SIGIR conference on Research and development in informaion retrieval, 2003
  33. B Yang, H Garcia-Molina
    Designing a SuperPeer Network. In Proceedings of the 19th International Conference on Data Engineering, 2003
  34. David H Autor, Frank Levy, Richard J Murnane
    The skill content of recent technological change: An empirical exploration. Quarterly Journal of Economics, 2003
  35. A Davison
    Real-time simultaneous localisation and mapping with a single camera. In Proc. Int. Conf. on Computer Vision(ICCV’03, 2003
  36. C Villani
    Topics in Optimal Transportation Graduate Studies in Mathematics 58. American Mathematical Society, Providence RI, 2003
  37. B Chun, D Culler, T Roscoe, A Bavier, L Peterson, M Wawrzoniak, M Bowman
    PlanetLab: An Overlay Testbed for Broad-Coverage Services. ACM Computer Communications Review, 2003
  38. W K Huh, J V Falvo, L C Gerke, A S Carroll, R W Howson, J S Weissman, E K O'Shea
    Global analysis of protein localization in budding yeast. Nature 2003
  39. S Pradhan, K Ramchandran
    Distributed source coding using syndromes (DISCUS): Design and construction. IEEE Transactions on Information Theory, 2003
  40. M Woodford
    Interest and Prices. 2003
  41. D J Abadi, D Carney, U Çetintemel, M Cherniack, C Convey, S Lee, M Stonebraker, N Tatbul, S Zdonik
    Aurora: a new model and architecture for data stream management. The VLDB Journal, 2003
  42. A Rao, S Ratnasamy, C Papadimitriou, S Shenker, I Stoica
    Geographic Routing without Location Information. ACM MOBICOM, 2003
  43. Saeed AI, V Sharov, J White, J Li, W Liang, N Bhagabati, J Braisted
    TM4: a free, open-source system for microarray data management and analysis. Biotechniques 34: 374–378 Klapa M, Currier T, Thiagarajan M, Sturn A, Snuffin M, Rezantsev A, Popov D, Ryltsov A, Kostukovich E, Borisovsky I, Liu Z, Vinsavich A, Trush, 2003
  44. M G Lagoudakis, R Parr
    Least-squares policy iteration. Journal of Machine Learning Research, 2003
  45. B Hassibi, B M Hochwald
    How much training is needed in multiple-antenna wireless links. IEEE Transactions on Information Theory, 2003
  46. T Kelly
    Scalable TCP: improving performance in highspeed wide area networks. ACM Computer Communication Review, 2003
  47. Glen Jeh, Jennifer Widom
    Scaling personalized web search. In Proceedings of the Twelfth International World Wide Web Conference (WWW, 2003
  48. N J A Harvey, M B Jones, S Saroiu, M Theimer, Wolman
    A.: SkipNet: a scalable overlay network with practical locality properties. In Proc. of the 4th USENIX Symp. on Internet Technologies and Systems (USITS’03, 2003
  49. Raghuram G Rajan, Luigi Zingales
    The Great Reversals: The Politics of Financial Development in the 20th Century. Journal of Financial Economics, 2003
  50. P A Chou, T Wu, K Jain
    Practical network coding. in 41st Allerton Conf. Communication, Control and Computing, 2003
  51. David Kempe, Alin Dobra, Johannes Gehrke
    Gossip-based computation of aggregate information. In 44th Annual IEEE Symposium on Foundations of Computer Science, 2003
  52. R L Tatusov, N D Fedorova, J D Jackson, A R Jacobs, B Kiryutin, E V Koonin, D M Krylov, R Mazumder, S L Mekhedov, A N Nikolskaya
    The COG database: An updated version includes eukaryotes BMC Bioinformatics, 2003
  53. A J Sellen, R H Harper
    The Myth of the Paperless Office. 2003
  54. R Huebsch, J M Hellerstein, N L Boon, T Loo, S Shenker, I Stoica
    Querying the internet with pier. 2003
  55. F Zambonelli, N Jennings, M Wooldridge
    Developing multiagent systems: The Gaia methodology. IEEE Transactions of Software Engineering and Methodology, 2003
  56. P Salovey, D A Pizarro
    The value of emotional intelligence. In, 2003
  57. Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda
    Performance anomaly of 802.11b. In Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003, 2003
    Faceted metadata for image search and browsing. Proceedings of the SIGCHI 2 hours 10 sec.2.3 minutes 128 seconds, 2003
  59. B Oksendal
    Stochastic Differential Equations 2003
  60. R Bhagwan, S Savage, G Voelker
    Understanding availability. In In Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS, 2003
  61. Tal Garnkel, Mendel Rosenblum
    A Virtual Machine Introspection Based Architecture for Intrusion Detection. In 10th ISOC Symposium on Network and Distributed Systems Security (SNDSS, 2003
  62. D Moore, C Shannon, G M Voelker, S Savage
    Internet Quarantine: Requirements for Containing Self-Propagating Code. Proceedings of IEEE INFOCOM, 2003
  63. Christopher A Sims
    Implications of Rational Inattention. Journal of Monetary Economics, 2003
  64. S Basu, R Pollack, M-F Roy
    Algorithms in real algebraic geometry 2003
  65. J Felsenstein
    Inferring Phylogenies Sinnauer Associates, Inc, 2003
  66. S Dumais, E Cutrell, J Cadiz, G Jancke, R Sarin, D C Robbins
    Stuff I’ve seen: a system for personal information retrieval and re-use. In Proc. of SIGIR ’03, 2003
  67. F Ye, G Zhong, J Cheng, S Lu, L Zhang
    Peas: A robust energy conserving protocol for long-lived sensor networks. In Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS ’03, 2003
  68. C Bettstetter, G Resta, P Santi
    The Node Distribution of the random waypoint mobility model for wireless ad hoc networks. in IEEE Trans. on Mobile Computing, 2003
  69. A Sendonaris, E Erkip, B Aazhang
    User cooperation diversity—Part I: system description. IEEE Trans. Commun, 2003
  70. Niels Provos
    Improving Host Security with System Call Policies. In Proceedings of the 12th USENIX Security Symposium, 2003
  71. R Szabo
    Quantum field theory on noncommutative spaces. Phys. Rept, 2003
  72. Bueno de Mesquita, Alastair Smith Bruce, Randolph M Siverson, James D Morrow
    The Logic of Political Survival 2003
  73. C Cranor, T Johnson, O Spataschek, V Shkapenyuk
    Gigascope: A Stream Database for Network Applications. 2003
  74. D Engler, K Ashcraft
    RacerX: Effective, static detection of race conditions and deadlocks. In SOSP, Nineteenth ACM Symposium on Operating Systems Principles, 2003
  75. T J Santner, B J Williams, W I Notz
    The Design and Analysis of Computer Experiments 2003
  76. B Liblit, A Aiken, A Zheng, M Jordan
    Bug isolation via remote program sampling. ACM SIGPLAN Conference on Programming Language Design and Implementation, 2003
  77. I Dhillon, S Mallela, D Modha
    Information-theoretic co-clustering. In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2003
  78. J Fakcharoenphol, S Rao, K Talwar
    A tight bound on approximating arbitrary metrics by tree metrics. in Proceedings of the 35th ACM Symposium on Theory of Computing, ACM, 2003
  79. K Gummadi, R Gummadi, S Ratnasamy, S Shenker, I Stoica
    The Impact of DHT Routing Geometry on Resilience and Proximity. In Proceedings of the ACM SIGCOMM, 2003
  80. S H Low
    A Duality Model of TCP and Queue Management Algorithms. IEEE/ACM Transactions on Networking, 2003
  81. James Aspnes, Gauri Shah
    Skip graphs. In Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2003
  82. R A Irizarry, B M Bolstad, F Collin, L M Cope, B Hobbs, T P Speed
    Summaries of Affymetrix GeneChip probe level data. Nucleic Acids Res, 2003