Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. P Felzenszwalb, R Girshick, D McAllester
    Cascade object detection with deformable part models. In Proc. CVPR, 2010
    73
  2. D L Donoho, A Maleki, A Montanari
    Message passing algorithms for compressed sensing: I. motivation and construction. in Proc. of Information Theory Workshop, 2010
    73
  3. G Szabo, B A Huberman
    Predicting the popularity of online content. Communications of ACM, 2010
    73
  4. Andreas Rossberg, Claudio Russo, Derek Dreyer
    F-ing modules. In TLDI, 2010
    73
  5. D Peng, F Dabek
    Large-scale incremental processing using distributed transactions and notifications. In Proc. 9th Symposium on Operating Systems Design and Implementation (OSDI’10, 2010
    72
  6. W Chen, C Wang, Wang
    Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, 2010
    72
  7. D Cash, D Hofheinz, E Kiltz, C Peikert
    Bonsai trees, or how to delegate a lattice basis. In EUROCRYPT, 2010
    72
  8. C Grier, K Thomas, V Paxson, M Zhang
    spam: The Underground on 140 Characters or Less. In Proceedings of the ACM Conference on Computer and Communications Security (CCS, 2010
    71
  9. A Kovashka, K Grauman
    Learning a hierarchy of discriminative space-time neighborhood features for human action recognition. In IEEE Int. Conf. on Computer Vision and Pattern Recognition, 2010
    71
  10. S HAN, K JANG, K PARK, S MOON
    PacketShader: a GPU-accelerated software router. In Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM, 2010
    71
  11. Andranik Tumasjan, Timm O Sprenger, Philipp G Sandner, Isabell M Welpe
    Predicting elections with Twitter: What 140 characters reveal about political sentiment In Proceedings of the 4th International AAAI Conference on Weblogs and Social, 2010
    71
  12. Jure Leskovec, Kevin J Lang, Michael Mahoney
    Empirical comparison of algorithms for network community detection. In Proceedings of the 19th International Conference on World Wide Web (WWW, 2010
    71
  13. M Naaman, J Boase, C-H Lai
    Is it really about me?: message content in social awareness streams. In Proceedings of the 2010 ACM conference on Computer supported cooperative work, CSCW ’10, 2010
    71
  14. A Goyal, F Bonchi, L V Lakshmanan
    Learning influence probabilities in social networks. In WSDM ’10: Proceedings of the 3rd ACM international conference on Web search and data mining, 2010
    71
  15. M Mishali, Y C Eldar
    From theory to practice: Sub-Nyquist sampling of sparse wideband analog signals. IEEE J. Select. Topics Signal Processing, 2010
    71
  16. R Xiang, J Neville, M Rogati
    Modeling relationship strength in online social networks. In Proc. (19th) Int. Conf. on World Wide Web, WWW ’10, 2010
    70
  17. Y Bu, B Howe, M Balazinska, M D Ernst
    Haloop: efficient iterative data processing on large clusters. 2010
    70
  18. A M Kaplan, M Haenlien
    Users of the world, unite! The challenges and opportunities of social media Business Horizons, 2010
    69
  19. Jacob Eisenstein, Brendan O’Connor, Noah A Smith, Eric P Xing
    A latent variable model for geographic lexical variation. In Proc. of EMNLP. Jacob, 2010
    69
  20. M Nauman, S Khan, X Zhang
    Apex: extending Android permission model and enforcement with userdefined runtime constraints. In Proc. of the ASIACCS, 2010
    68
  21. T Koponen, M Casado, N Gude, J Stribling, L Poutievski, M Zhu, R Ramanathan, Y Iwata, H Inoue, T Hama, S Shenker
    Onix: A Distributed Control Platform for Large-scale Production Networks. In OSDI, 2010
    68
  22. J Carreira, C Sminchisescu
    Constrained parametric min-cuts for automatic object segmentation. In Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on, 2010
    68
  23. K Lerman, R Ghosh
    Information contagion: An empirical study of spread of news on Digg and Twitter social networks in Proc. 4th Int. Conf. Weblogs and Social Media (ICWSM, 2010
    68
  24. M Van Dijk, C Gentry, S Halevi, V Vaikuntanathan
    Fully homomorphic encryption over the integers. Advances in Cryptology–EUROCRYPT, 2010
    68
  25. Csaba Szepesvári
    Algorithms for Reinforcement Learning. 2010
    68
  26. C Guo, G Lu, H J Wang, S Y
    SecondNet: A Data Center Network Virtualization Architecture with Bandwidth Guarantees. In Proceedings of ACM CoNext, 2010
    67
  27. A BESSEY, K BLOCK, B CHELF, A CHOU, B FULTON, S HALLEM, C HENRI-GROS, A KAMSKY, S MCPEAK, D ENGLER
    A few billion lines of code later: Using static analysis to find bugs in the real world Comm. ACM, 2010
    67
  28. N P Smart, F Vercauteren
    Fully homomorphic encryption with relatively small key and ciphertext sizes. In Public Key Cryptography, 2010
    67
  29. L Li, W Chu, J Langford, R E Schapire
    A contextual-bandit approach to personalized news article recommendation. In Proceedings of the 19th International Conference on World Wide Web, 2010
    67
  30. David Karger, Cliff Stein, Joel Wein
    Scheduling algorithms. Algorithms and Theory of Computation Handbook, 2010
    67
  31. H Jégou, M Douze, C Schmid, P Pérez
    Aggregating local descriptors into a compact image representation In CVPR, 2010
    66
  32. S Zhuravlev, S Blagodurov, A Fedorova
    Addressing Shared Resource Contention in Multicore Processors via Scheduling. Proc. of 15th Edition of Architectural Support for Programming Languages and Operating Systems, 2010
    66
  33. J Huang, T Zhang
    The benefit of group sparsity. Annals of Statistics, 2010
    66
  34. Jeff Mitchell, Mirella Lapata
    Composition in distributional models of semantics Cognitive Science, 2010
    65
  35. S Kim, E P Xing
    Tree-guided group Lasso for multi-task regression with structured sparsity. in Proceedings of the 27th International Conference on Machine Learning, 2010
    65
  36. M Cova, C Kruegel, G Vigna
    Detection and Analysis of Drive-byDownload Attacks and Malicious JavaScript Code. In International World Wide Web Conference (WWW, 2010
    65
  37. L Fang, Ed
    Security Framework for MPLS and GMPLS Networks", RFC 5920, 2010
    65
  38. G WANG, T S E NG
    The Impact of Virtualization on Network Performance of Amazon EC2 Data Center In Proceedings of the 29th conference on Information communications (INFOCOM’10, 2010
    64
  39. A Lewko, T Okamoto, A Sahai, K Takashima, B Waters
    Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In EUROCRYPT, 2010
    64
  40. Alberto Abadie, Alexis Diamond, Jens Hainmueller
    Synthetic Control Methods for Comparative Case Studies: Estimating the Effect of California’s Tobacco Control Program. Journal of the American Statistical Association, 2010
    64
  41. T Benson, A Akella, D A Maltz
    Network Traffic Characteristics of Data Centers in the Wild In Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 2010
    63
  42. Victoria Ivashina, David S Scharfstein
    Bank Lending During the Financial Crisis of 2008 Journal of Financial Economics, 2010
    63
  43. E Alpaydin
    Introduction to Machine Learning, 2010
    63
  44. A R Quinlan, I M Hall
    BEDTools: a flexible suite of utilities for comparing genomic features Bioinformatics, 2010
    62
  45. K Saenko, B Kulis, M Fritz, T Darrell
    Adapting visual category models to new domains. In ECCV, 2010
    62
  46. G Venkatesh, J Sampson, N Goulding, S Garcia, V Bryksin, J Lugo-Martinez, S Swanson, M B Taylor
    Conservation Cores: Reducing the Energy of Mature Computations. In Proceedings of the 15th International Conference on Architectural Support for Programming Languages and Operating Systems, 2010
    62
  47. H Prakken
    An abstract framework for argumentation with structured arguments. Argument and Computation, 2010
    62
  48. Mariacristina DeNardi, Eric French, John Jones
    Why do the Elderly Save? The Role of Medical Expenses Journal of Political Economy, 2010
    62
  49. R Rosati, A Almatelli
    Improving query answering over DL-Lite ontologies. In Proc. of KR 2010, 2010
    61
  50. J Froehlich, L Findlater, J Landay
    The design of eco-feedback technology Proc. CHI ’10, ACM Press, 2010
    61
  51. L Torresani, M Szummer, Fitzgibbon
    A.: Efficient object category recognition using classemes. In: Computer Vision–ECCV 2010, 2010
    61
  52. T Koo, A M Rush, M Collins, T Jaakkola, D Sontag
    Dual decomposition for parsing with nonprojective head automata. In Proc. of EMNLP, 2010
    61
  53. Dean Karlan, Jonathan Zinman
    Expanding Credit Access: Using Randomized Supply Decisions to Estimate the Impacts. Review of Financial Studies, 2010
    61
  54. M Gomez Rodriguez, J Leskovec, A Krause
    Inferring networks of diffusion and influence. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, 2010
    61
  55. T Berg-Kirkpatrick, A Bouchard-Cote, J DeNero, D Klein
    Painless unsupervised learning with features. In Proceedings of NAACL-HLT-10, 2010
    61
  56. D Blei, T L Griffiths, M I Jordan
    The nested Chinese restaurant process and Bayesian nonparametric inference of topic hierarchies. Journal of the ACM, 2010
    61
  57. Finn RD, J Mistry, J Tate
    Coggill P, Heger A, Pollington JE, Gavin OL Gunasekaran P, Ceric G, Forslund K, Holm L, Sonnhammer EL, Eddy SR, Bateman A, 2010
    60
  58. Z Kalal, J Matas, K Mikolajczyk
    P-n learning: Bootstrapping binary classifiers by structural constraints. In Comp. Vis. Patt. Recognition, 2010
    60
  59. K J Friston
    The free-energy principle: A unified brain theory Nature Reviews Neuroscience, 2010
    60
  60. J Ross, Lilly Irani, M Six Silberman, Andrew Zaldivar, Bill Tomlinson
    Who are the crowdworkers?: shifting demographics in mechanical turk. In CHI '10 Extended Abstracts on Human Factors in Computing Systems (CHI EA '10). ACM, 2010
    60
  61. B Aranda, P Achuthan, Y Alam-Faruque, I Armean, A Bridge, C Derow, M Feuermann, A T Ghanbarian, S Kerrien, J Khadake, J Kerssemakers, C Leroy, M Menden, M Michaut, L Montecchi-Palazzi, S N Neuhauser, S Orchard, V Perreau, B Roechert, K van Eijk, H Hermjakob
    The IntAct Molecular Interaction Database in 2010 Nucleic Acids Research, 2010
    59
  62. A Carroll, G Heiser
    An analysis of power consumption in a smartphone. in Proceedings of the 2010 USENIX conference on USENIX annual technical conference, 2010
    59
  63. S Agrawal, D Boneh, X Boyen
    Efficient lattice (h)ibe in the standard model. In EUROCRYPT, 2010
    59
  64. C Kreibich, N Weaver, B Nechaev, V Paxson
    Netalyzr: Illuminating the edge network In Proceedings of the ACM Internet Measurement Conference (IMC, 2010
    58
  65. S Vieweg, A L Hughes, K Starbird, L Palen
    Microblogging during two natural hazards events: what twitter may contribute to situational awareness In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2010
    58
  66. Caporaso JG, J Kuczynski, J Stombaugh, K Bittinger, Bushman FD, Costello EK, N Fierer, Pena AG, Goodrich JK, Gordon JI
    QIIME allows analysis of high-throughput community sequencing data. Nat Methods 7:335–336 Huttley GA, Kelley ST, Knights D, Koenig JE, Ley RE, Lozupone CA, McDonald D, Muegge BD, Pirrung M, Reeder J, Sevinsky JR, Tumbaugh PJ, Walters WA, Widmann J, Yatsunenko T, Zaneveld J, Knight R, 2010
    58
  67. R A Newcombe, A J Davison
    Live dense reconstruction with a single moving camera. IEEE Conference on Computer Vision and pattern Recognition, 2010
    58
  68. E Kalogerakis, A Hertzmann, K Singh
    Learning 3D mesh segmentation and labeling. ACM Transactions on Graphics (TOG, 2010
    58
  69. H Jégou, M Douze, C Schmid
    Improving bag-of-features for large scale image search. International Journal of Computer Vision, 2010
    58
  70. Y Peng, A Ganesh, J Wright, W Xu, Y Ma
    Rasl: Robust alignment by sparse and low-rank decomposition for linearly correlated images. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR, 2010
    58
  71. R Vernica, M J Carey, C Li
    Efficient parallel set-similarity joins using mapreduce. In SIGMOD, 2010
    58
  72. M Breitenstein, F Reichlin, B Leibe, E Koller-Meier, L Van Gool
    Robust tracking-by-detection using a detector confidence particle filter. In ICCV, 2010
    58
  73. Rajkumar Buyya, Rajiv Ranjan, Rodrigo N Calheiros
    InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services. In Proceedings of the 10th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP ’10, 2010
    58
  74. C Labovitz, S Iekel-Johnson, D McPherson, J Oberheide, F Jahanian
    Internet inter-domain traffic In Proc. of ACM SIGCOMM, 2010
    57
  75. Sabina Alkire, M E Santos
    Acute Multidimensional Poverty: A New Index for Developing Countries. OPHI Working Paper Series, 38. Oxford: Oxford Poverty and Human Development Initiative (OPHI, 2010
    57
  76. C Harrison, D Tan, D Morris
    Skinput: appropriating the body as an input surface. In Proceedings of CHI ’10, ACM, 2010
    56
  77. S Cooper, F Khatib, A Treuille, J Barbero, J Lee, M Beenen, A Leaver-Fay, D Baker, Z Popovic, F players
    Predicting protein structures with a multiplayer online game Nature, 2010
    56
  78. Blaise Thomson, Steve Young
    Bayesian update of dialogue state: A POMDP framework for spoken dialogue systems. Computer Speech & Language, 2010
    56
  79. V Toubiana, A Narayanan, D Boneh, H Nissenbaum, S Barocas
    Adnostic: Privacy preserving targeted advertising. in Proc. Network and Distributed System Security Sym, 2010
    56
  80. A Myronenko, X Song
    Point set registration: coherent point drift. IEEE Trans. Pattern Anal. Mach. Intell, 2010
    56
  81. World
    energy outlook 2010
    56
  82. J O’Madadhain, D Fisher, T Nelson, S White, Boey
    Y.B.: The jung (java universal network/graph) framework 2010
    56
  83. A Khisti, G W Wornell
    Secure transmission with multiple antennas - Part II: The MIMOME wiretap channel. IEEE Trans. Inf. Theory, 2010
    56