Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. Y Chen, A Ganapathi, R Griffith, R Katz
    The case for evaluating mapreduce performance using workload suites. In Proc. of MASCOTS, 2011
    46
  2. Craig Knox, Vivian Law, Timothy Jewison, Philip Liu, Son Ly, Alex Frolkis, Allison Pon, Kelly Banco, Christine Mak, Vanessa Neveu, Yannick Djoumbou, Roman Eisner, An Chi Guo, David S Wishart
    Drugbank 3.0: a comprehensive resource for omics research on drugs. Nucleic Acids Research, 39(suppl 1):D1035–D1041, 2011
    45
  3. S Sundaresan, W de Donato, N Feamster, R Teixeira, S Crawford, A Pescapè
    Broadband internet performance: a view from the gateway. In Proc. of ACM SIGCOMM, 2011
    45
  4. A Ritter, S Clark, Etzioni Mausam
    O.: Named entity recognition in tweets: An experimental study. Association for Computational Linguistics, 2011
    45
  5. A Shieh, S Kandula, A Greenberg, C Kim, B Saha
    Sharing the Data Center Network. In NSDI, 2011
    45
  6. Craig Gentry, Daniel Wichs
    Separating succinct non-interactive arguments from all falsifiable assumptions. In Lance Fortnow and Salil P. Vadhan, editors, 43rd ACM STOC, 2011
    45
  7. F Bach, R Jenatton, J Mairal, G Obozinski
    Convex optimization with sparsity-inducing norms. in Optimization for Machine Learning, 2011
    45
  8. S Akhshabi, A C Begen, C Dovrolis
    An experimental evaluation of rate-adaptation algorithms in adaptive streaming over http in Proceedings of ACM conference on Multimedia systems, 2011
    44
  9. J Teevan, D Ramage, M Morris
    Twittersearch: A comparison of microblog search and web search. In WSDM‟11, 2011
    44
  10. A Marcus, M S Bernstein, O Badar, D R Karger, S Madden, R C Miller
    Twitinfo: aggregating and visualizing microblogs for event exploration. In CHI ’11, ACM, 2011
    44
  11. Myle Ott, Yejin Choi, Claire Cardie, Jeffrey T Hancock
    Finding deceptive opinion spam by any stretch of the imagination. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics (ACL, 2011
    44
  12. K Levchenko, N Chachra, B Enright, M Felegyhazi, C Grier, T Halvorson, C Kanich, C Kreibich, H Liu, D McCoy, A Pitsillidis, N Weaver, V Paxson, G Voelker, S Savage
    Click trajectories: End-to-end analysis of the spam value chain. In Proc. 2011 IEEE Symp. Sec. & Privacy, 2011
    44
  13. M V Afonso, J M Bioucas-Dias, M A T Figueiredo
    An augmented Lagrangian approach to the constrained optimization formulation of imaging inverse problems. IEEE Trans. Im. Proc, 2011
    44
  14. A Wagner, J Wright, A Ganesh, Z Zhou, H Mobahi, Y Ma
    Towards a practical face recognition system: Robust alignment and illumination by sparse representation. IEEE Trans. Pattern Analysis and Machine Intelligence, 2011
    44
  15. O E Barndor¤-Nielsen, P R Hansen, A Lunde, N Shephard
    Multivariate realised kernels: consistent positive semi-de estimators of the covariation of equity prices with noise and non-synchronous trading. Journal of Econometrics. Forthcoming, 2011
    44
  16. D Altig, L Christiano, M Eichenbaum, J Linde
    Firm-specific capital, nominal rigidities and the business cycle. Review of Economic Dynamics, 2011
    44
  17. J Fan, Y Liao, M Mincheva
    High-dimensional covariance matrix estimation in approximate factor models Annals of Statistics, 2011
    44
  18. J Tsai, S Egelman, L Cranor, A Acquisti
    The Effect of Online Privacy Information on Purchasing Behavior. An Experimental Study,” Information Systems Research, 2011
    44
  19. M-M Cheng, G-X Zhang, N J Mitra, X Huang, S- M Hu
    Global contrast based salient region detection. In CVPR, 2011
    43
  20. A Sampson, W Dietl, E Fortuna
    EnerJ: Approximate data types for safe and general low-power computation. In PLDI, 2011
    43
  21. D Almond, J Currie
    Human Capital Development Before Age Five The Handbook of Labor Economics, 2011
    43
  22. John J Horton, David G Rand, Richard J Zeckhauser
    The Online Laboratory: Conducting Experiments in a Real Labor. Market.” Experimental Economics, 2011
    43
  23. D L Chen, Mooney
    R.J.: Learning to interpret natural language navigation instructions from observations. In: Proc. Nat’l Conf. on Artificial Intelligence (AAAI, 2011
    42
  24. A Felt, M Finifter, E Chin, S Hanna, D Wagner
    A survey of mobile malware in the wild In ACM SPSM, 2011
    42
  25. X Gabaix
    The Granular Origins of Aggregate Fluctuations. Econometrica, 2011
    42
  26. J Klensin, N Freed, M Rose, D Crocker
    SMTP Service Extension for 8-bit MIME Transport STD 71, RFC 6152, 2011
    42
  27. M Hopkins, J May
    Tuning as ranking. In EMNLP, 2011
    41
  28. A Chudik, M H Pesaran, E Tosetti
    Weak and strong cross section dependence and estimation of large panels. Econometrics Journal, 2011
    41
  29. United Nations
    Department of Economic and Social Affairs. World Population Prospects 2010, 2011
    41
  30. Hao Ma, Dengyong Zhou, Chao Liu, Michael R Lyu, Irwin King
    Recommender systems with social regularization. In Proceedings of the fourth ACM international conference on Web search and data mining, 2011
    40
  31. P Flicek
    Ensembl 2011 Nucleic Acids Res, 2011
    40
  32. C Callison-Burch, P Koehn, C Monz, O Zaidan
    Findings of the 2011 workshop on statistical machine translation. in Proceedings of the Sixth Workshop on Statistical Machine Translation, 2011
    40
  33. L Moreau, B Clifford, J Freire, J Futrelle, Y Gil, P Groth, N Kwasnikowska, S Miles, P Missier, J Myers, B Plale, Y Simmhan, E Stephan, Van
    den Bussche, J.: The open provenance model core specification (v1.1). Future Generation Computer Systems 27(6 2011
    40
  34. F Oggier, B Hassibi
    The secrecy capacity of the MIMO wiretap channel. IEEE Trans. Inf. Theory, 2011
    40
  35. Z Cheng, J Caverlee, K Lee, D Sui
    Exploring Millions of Footprints in Location Sharing Services. In: Fifth International AAAI Conference on Weblogs and Social, 2011
    39
  36. B Recht, C Re, S Wright, F Niu
    Hogwild: A lock-free approach to parallelizing stochastic gradient descent. In Advances in Neural Information Processing Systems, NIPS ’10, 2011
    39
  37. S Borkar, A A Chien
    The future of microprocessors. Communications of the ACM, 2011
    39
  38. Q LI, Y ZHENG, X XIE, Y CHEN, W LIU, W MA
    Mining user similarity based on location history. IN Proc. of the 16th International Conference on Advances in, 2011
    39
  39. Siu-Wing Cheng, Tamal K Dey
    Quality meshing with weighted Delaunay refinement. inria-00560388, version 1 - 28, 2011
    39
  40. I Oikonomidis, N Kyriazis, A Argyros
    Efficient model-based 3D tracking of hand articulations using Kinect In BMVC, 2011
    38
  41. R Socher, E H Huang, J Pennington, A Y Ng, C D Manning
    Dynamic pooling and unfolding recursive autoencoders for paraphrase detection. Advances in Neural Information Processing Systems, 2011
    38
  42. Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song
    Design and evaluation of a real-time url spam filtering service. In IEEE Symposium on Security and Privacy, 2011
    38
  43. M S Bernstein, J Brandt, R C Miller, D R Karger
    Crowds in two seconds: Enabling realtime crowd-powered interfaces. In UIST, ACM, 2011
    38
  44. D Meisner, C M Sadler, L A Barroso, W D Weber, T F Wenisch
    Power management of online data-intensive services. in ISCA, 2011
    38
  45. R Hoffmann, C Zhang, X Ling, L Zettlemoyer, D Weld
    Knowledge-based weak supervision for information extraction of overlapping relations. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies-Volume 1, 2011
    38
  46. M Blanco, D Engelmann, H T Normann
    A within-subject analysis of other-regarding preferences. Games and Economic Behavior, 2011
    38
  47. M Bagnulo, P Matthews, I van
    Beijnum, “Stateful NAT64: Network Address and Protocol Translation from. IPv6 Clients to IPv4 Servers,” RFC 6146 (Proposed Std), IETF, 2011
    38
  48. S R Becker, E J Candès, M C Grant
    Templates for convex cone problems with applications to sparse signal recovery. Math. Prog. Comp, 2011
    38
  49. O Ozel, K Tutuncuoglu, J Yang, S Ulukus, A Yener
    Transmission with energy harvesting nodes in fading wireless channels: Optimal policies. IEEE JSAC, 2011
    37
  50. W Liu, J Wang, S Kumar, S-F Chang
    Hashing with graphs. In ICML, 2011
    37
  51. C Wilson, H Ballani, T Karagiannis, A Rowtron
    Better Never than Late: Meeting Deadlines in Datacenter Networks. In ACM SIGCOMM, 2011
    37
  52. J Berclaz, F Fleuret, E Turetken, P Fua
    Multiple object tracking using Kshortest paths optimization. IEEE Trans. Pattern Anal. Mach. Intell, 2011
    37
  53. D Garcia-Romero, C Y
    Espy-Wilson, “Analysis of i-vector length normalization in speaker recognition systems in Proceedings of Interspeech, 2011
    37
  54. T Sauter, M Lobashov
    End-to-End Communication Architecture for Smart Grids IEEE Transactions on Industrial Electronics, 2011
    37
  55. Z Liu, M Lin, A Wierman, S Low, L Andrew
    Greening geographical load balancing. in SIGMETRICS, 2011
    37
  56. Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van
    Assche. The Keccak sponge function family – Updated VHDL package 2011
    37
  57. Kaushik Veeraraghavan, Dongyoon Lee, Benjamin Wester, Jessica Ouyang, Peter M Chen, Jason Flinn, Satish Narayanasamy
    Doubleplay: parallelizing sequential logging and replay. In ASPLOS, 2011
    37
  58. K Sankaralingam Amant, D Burger
    Dark Silicon and the End of Multicore Scaling Proc. of 38th Annual International Symposium on Computer Architecture, 2011
    36
  59. A Bessani, M Correia, B Quaresma, F André, P Sousa
    Depsky: dependable and secure storage in a cloud-of-clouds. In Proceedings of the sixth conference on Computer systems, EuroSys ’11, 2011
    36
  60. Jean-Baptiste Michel, Yuan K Shen, Aviva P Aiden, Adrian Veres, Matthew K Gray
    The Google Books Team Science, 2011
    36
  61. M Woodford
    Simple Analytics of the Government Expenditure Multiplier. American Economic Journal: Macroeconomics, 2011
    36
  62. Texas Education Code
    Texas school law bulletin 2011
    35
  63. M Gomez-Rodriguez, J Leskovec, A Krause
    Inferring Networks of Diffusion and Influence. In press ACM Transactions on Knowledge Discovery from Data (TKDD, 2011
    35
  64. Alan Heston, Robert Summers, Bettina Aten
    Penn World Table Version 7.0 University of Pennsylvania, 2011
    35
  65. S Sidiroglou-Douskos, S Misailovic, H Hoffmann, Rinard
    M.C.: Managing performance vs. accuracy trade-offs with loop perforation. In: FSE, 2011
    35
  66. D Beyer, M E Keremoglu
    CPAchecker: A tool for configurable software verification. In Proc. CAV, LNCS 6806, 2011
    35
  67. R Socher, J Pennington, E H Huang, A Y Ng, C D Manning
    Semisupervised recursive autoencoders for predicting sentiment distributions. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP, 2011
    35
  68. Georgios N Yannakakis, Julian Togelius
    Experience-driven Procedural Content Generation. University of Essex, 2011
    35
  69. S Scellato, A Noulas
    Socio-spatial Properties of Online Location-based Social Networks. In Proc. of AAAI ICWSM, 2011
    35
  70. R Schlegel, K Zhang, X yong Zhou, M Intwala, A Kapadia, X Wang
    Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones in NDSS, 2011
    35
  71. Hui Lin, Jeff Bilmes
    A Class of Submodular Functions for Document Summarization. In The 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies (ACL/HLT-2011, 2011
    35
  72. Janne Lindqvist, Justin Cranshaw, Jason Wiese, Jason Hong, John Zimmerman
    I’m the mayor of my house: examining why people use foursquare-a social-driven location sharing application. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2011
    35
  73. Michael A S Joyce, Ana Lasaosa, Ibrahim Stevens, Matthew Tong
    The Financial Market Impact of Quantitative Easing. in the United Kingdom.” International Journal of Central Banking, 2011
    35
  74. Yuliya Demyanyk, Otto Van Hemert
    Understanding the Subprime Mortgage Crisis Review of Financial Studies, 2011
    35
  75. J Bianchi
    Overborrowing and Systemic Externalities in the Business Cycle,” American Economic Review, 2011
    34
  76. F Dobrian, V Sekar, A Awan, I Stoica, D A Joseph, A Ganjam, J Zhan, H Zhang
    Understanding the impact of video quality on user engagement In Proc. SIGCOMM, 2011
    34
  77. W Lloyd, M J Freedman, M Kaminsky, D G Andersen
    Don’t settle for eventual: Scalable causal consistency for wide-area storage with COPS. In SOSP, 2011
    34
  78. Ernesto Jiménez-Ruiz, Bernardo Cuenca Grau
    LogMap: Logic-based and scalable ontology matching. In Proc. 10th International Semantic Web Conference (ISWC), Bonn (DE, 2011
    34
  79. P N Belhumeur, D W Jacobs, D J Kriegman, N Kumar
    Localizing parts of faces using a consensus of exemplars In CVPR, 2011
    34
  80. J Hoffart, M A Yosef, I Bordino, H Fürstenau, M Pinkal, M Spaniol, B Taneva, S Thater, G Weikum
    Robust disambiguation of named entities in text. In EMNLP, 2011
    34
  81. Mohammad Amin Sadeghi, Ali Farhadi
    Recognition using visual phrases. In Computer Vision and Pattern Recognition. IEEE, 2011
    34
  82. G FREHSE, C L GUERNIC, A DONZÉ, S COTTON, R RAY, O LEBELTEL, R RIPADO, A GIRARD, T DANG, O MALER
    SpaceEx: Scalable verification of hybrid systems. See Gopalakrishnan and Qadeer. 2011
    34
  83. H S Koppula, A Anand, T Joachims, A Saxena
    Semantic labeling of 3d point clouds for indoor scenes In In 25th annual, 2011
    34
  84. Feng Qian, Zhaoguang Wang, Alexandre Gerber, Zhuoqing Mao, Subhabrata Sen, Oliver Spatscheck
    Profiling resource usage for mobile applications: a cross-layer approach. In Proc. MobiSys 2011, 2011
    34