Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. S Boyd, L Vandenberghe
    Convex Optimization UNIVERSITY OF ALBERTA. Downloaded on December 22, 2008 at 12:22 from IEEE Xplore. Restrictions apply, 2004
    4072
  2. J Dean, S Ghemawat
    MapReduce: Simplified data processing on large clusters. In: Proceedings of Operating Systems Design and Implementation. MapReduce for Machine Learning on Multicore, In: proceedings of Advances in Neural Information Processing Systems. NIPS 19, 306-313. Mahout project, [online]. http://lucene.apache.org/mahout, 2004
    2020
  3. M C Golumbic
    Algorithmic Graph Theory and Perfect Graphs Ann. Discrete Math, 2004
    1182
  4. J N Laneman, D N C Tse, G W Wornell
    Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transactions on Information Theory, 2004
    1159
  5. D Johnson, C Perkins, J Arkko
    Mobility support in IPv6”, IETF RFC3775, 2004
    1141
  6. S Kumar, K Tamura, M Nei
    MEGA3: integrated software for molecular evolutionary genetics analysis and sequence alignment Briefings in Bioinformatics, 2004
    1029
  7. C P Robert, G Casella
    Monte Carlo statistical methods. 2004
    1014
  8. E von Hippel
    Democratizing innovation. 2004
    990
  9. OECD
    Employment outlook 2004
    947
  10. Y Boykov, V Kolmogorov
    An experimental comparison of min-cut/max-flow algorithms for energy minimization in vision. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2004
    870
  11. J Shawe-Taylor, N Cristianini
    Kernel methods for Pattern Analysis 2004
    859
  12. R Dingledine, N Mathewson, P Syverson
    Tor: The secondgeneration onion router. 2004
    857
  13. M E J Newman, M Girvan
    Finding and evaluating community structure in networks Physical Review E, 2004
    837
  14. J Polastre, J Hill, D Culler
    Versatile low power media access for wireless sensor networks. ACM Conference on Embedded Networked Sensor Systems (SenSys, 2004
    786
  15. V Kolmogorov, R Zabih
    What energy functions can be minimized via graph cuts. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2004
    750
  16. Carsten Rother, Vladimir Kolmogorov, Andrew Blake
    GrabCut”: interactive foreground extraction using iterated graph cuts. ACM Trans. Graph, 2004
    706
  17. Z Wang, A C Bovik, H R Sheikh, E P Simoncelli
    Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE Trans. Image Processing, 2004
    696
  18. T L Griffiths, M Steyvers
    Finding scientific topics Proc Natl Acad Sci U S A, 101 Suppl 1:5228–5235, 2004
    689
  19. J L Herlocker, J A Konstan, L G Terveen, J T Riedl
    Evaluating collaborative filtering recommender systems. ACM Trans. Inf. Syst, 2004
    688
  20. M Dorigo, T Stütlze
    Ant Colony Optimization. 2004
    682
  21. G Csurka, C Dance, L Fan, J Willamowski, C Bray
    Visual categorization with bags of keypoints. Workshop of European Conference on Computer Vision, 2004
    628
  22. M K
    Chattopadhyay et al, Phys Rev. B70, 2004
    618
  23. P Emsley, K Cowtan
    Coot: model-building tools for molecular graphics Acta Crystallogr. D Biol. Crystallogr, 2004
    593
  24. L von Ahn, L Dabbish
    Labelling Images with a Computer Game. ACM Conference on Human Factors in Computing Systems, 2004
    571
  25. J R Anderson, D Bothell, M D Byrne, S Douglass, C Lebiere, Y Qin
    An integrated theory of mind. Psychological Review, 2004
    569
  26. A Avizienis, J-C Laprie, B Randell, L C
    Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. on Dependable and Secure Computing, 2004
    532
  27. D Brickley, R V Guha
    RDF Vocabulary Description Language 1.0 RDF Schema”. W3C Recommendation, 2004
    524
  28. Chris Lattner, Vikram Adve
    LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. In CGO ’04: Proceedings of the international symposium on Code generation and optimization, 2004
    520
  29. S Lin, D J Costello
    Error control coding : Fundamentals and application (second edition IEEE trans. on consumer electronics, 2004
    518
  30. R Olfati Saber, R M Murray
    Consensus problems in networks of agents with switching topology and time-delays. IEEE Transactions On Automatic Control, 2004
    513
  31. H Kantz, T Schreiber
    Nonlinear Time Series Analysis 2004
    509
  32. Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris
    Vivaldi: A decentralized network coordinate system. In Proceedings of the ACM SIGCOMM ’04 Conference, 2004
    501
  33. L Fei-Fei, R Fergus, Perona
    P.: Learning generative visual models from few training examples: An incremental bayesian approach tested on 101 object categories. In: CVPR Workshop on Generative-Model Based Vision, 2004
    500
  34. W Ye, J Heidemann, D Estrin
    Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM Transactions on Networking, 2004
    500
  35. B Y Zhao, L Huang, J Stribling, S C Rhea, A D Joseph, J D Kubiatowicz
    Tapestry: A resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications, 2004
    495
  36. M Barnett, K R M Leino, W Schulte
    The Spec# programming system: An overview. In, 2004
    485
  37. M Hu, B Liu
    Mining and summarizing customer reviews In KDD’04, 2004
    473
  38. Ian Foster, Carl Kesselman
    The Grid 2: Blueprint for a New Computing Infrastructure 2004
    469
  39. C Schuldt, L Laptev, B Caputo
    Recognizing human actions: a local SVM approach. In IEEE ICPR, 2004
    469
  40. I Daubechies, M Defrise, C De Mol
    An iterative thresholding algorithm for linear inverse problems with a sparsity constraint Communications on Pure and Applied Mathematics, 2004
    468
  41. A Bateman, L Coin, R Durbin, R D Finn, V Hollich, S Griffiths-Jones, A Khanna, M Marshall, S Moxon, E L Sonnhammer, D J Studholme, C Yeats, S R Eddy
    The Pfam protein families database. Nucleic Acids Res;32(Database 2004
    459
  42. M Ghallab, D Nau, P Traverso
    Automated Planning, theory and practice 2004
    455
  43. A Lindgren, A Doria, O Schelén
    Probabilistic Routing in Intermittently Connected Networks. of Lecture Notes in Computer Science, 2004
    449
  44. D Martin, C Fowlkes, J Malik
    Learning to detect natural image boundaries using local brightness, color and texture cues. in IEEE Trans. on Pattern Analysis and Machine Intelligence, 2004
    444
  45. D Aguayo, J Bicket, S Biswas, G Judd, R Morris
    Linklevel measurements from an 802.11b mesh network. in International Conferences on Broadband Networks (BroadNets, 2004
    442
  46. D Rodrik, A Subramanian, F Trebbi
    Institutions Rule: The Primacy of Institutions over Geography and Integration in Economic Development. Journal of Economic Growth, 2004
    439
  47. S Hankerson, A Menezes, S Vanstone
    Guide to Elliptic Curve Cryptography. 2004
    436
  48. J N Al-Karaki, A E Kamal
    Routing Techniques in Wireless Sensor Networks: a Survey. IEEE Wireless Communications Volume 11, Issue, 2004
    420
  49. D P Anderson
    BOINC: A System for Public-Resource Computing and Storage. in Proc. of 5th IEEE/ACM Intl. Workshop on Grid Computing, 2004
    414
  50. A Clauset, Newman ME, C Moore
    Finding community structure in very large networks Phys Rev E Stat Nonlin Soft Matter Phys. 70:066111, 2004
    414
  51. J W Hui, D Culler
    The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale. In proc. of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys'04, 2004
    413
  52. W Zhao, M H Ammar, E W Zegura
    A message ferrying approach for data delivery in sparse mobile ad hoc networks. In MobiHoc, 2004
    397
  53. M Bertrand, E Duflo, S Mullainathan
    How Much Should We Trust Differencesin-Differences Estimates? Quarterly. Journal of Economics February, 2004
    393
  54. A Chambolle
    An algorithm for total variation minimization and applications. Journal of Mathematical Imaging and Vision, 2004
    385
  55. J Cortés, S Martı́nez, T Karatus, F Bullo
    Coverage control for mobile sensing networks. IEEE Transactions on Robotics and Automation, 2004
    385
  56. J D Bendtsen, H Nielsen, G von Heijne, S Brunak
    Improved prediction of signal peptides: SignalP. 2004
    384
  57. C Karlof, N Sastry, D Wagner
    TinySec: a link layer security architecture for wireless sensor networks. In Proc. of the 2nd Int. Conf. on Embedded networked sensor systems, 2004
    376
  58. G Rizzolatti, L Craighero
    The Mirror-neuron System Annual Review of Neuroscience, 2004
    375
  59. D G Blanchflower, A J Oswald
    Well-Being over Time in Britain and the USA,” Journal of Public Economics, 2004
    373
  60. G W Imbens
    Nonparametric Estimation of Average Treatment Effects Under Exogeneity: A. Review,” Review of Economics & Statistics, 2004
    370
  61. P Felzenszwalb, D Huttenlocher
    Efficient belief propagation for early vision. In Proc. CVPR, 2004
    369
  62. A Deshpande, C Guestrin, S R Madden, J M Hellerstein, W Hong
    Model-driven Data Acquisition in Sensor Networks. In Proceedings of the Thirtieth International Conference on Very Large Data Bases VLDB Endowment, (VLDB’04, 2004
    365
  63. C T Harbison, D B Gordon, T I Lee, N J Rinaldi, K D Macisaac, T W Danford, N M Hannett, J B Tagne, D B Reynolds, J Yoo, E G Jennings, J Zeitlinger, Pokholok
    Transcriptional regulatory code of a eukaryotic genome. Nature 2004
    361
  64. K Atkinson, W Han
    Elementary Numerical Analysis 2004
    350
  65. E Helpman, M J Melitz, S R Yeaple
    Export versus FDI with Heterogeneous Firms. American Economic Review, 2004
    350
  66. Y Dodis, L Reyzin, A Smith
    Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. in EUROCRYPT, ser. LNCS, 2004
    349
  67. R Cont, P Tankov
    Financial Modelling With Jump Processes 2004
    340
  68. M Kanehisa, S Goto, S Kawashima, Y Okuno, M Hattori
    The KEGG resource for deciphering the genome. Nucleic Acids Res., 32(Database issue):D277–80, 2004
    339
  69. A K Jain, A Ross, S Prabhakar
    An Introduction to Biometric Recognition. 2004
    336
  70. T Zimmermann, P Weißgerber, S Diehl, A Zeller
    Mining version histories to guide software changes. In ICSE, 2004
    335
  71. K Salen, E Zimmerman
    Rules of Play: Game Design Fundamentals 2004
    335
  72. A Bryman
    Social Research Methods 2004
    335
  73. D Nister
    An efficient solution to the five-point relative pose problem. IEEE Pattern Analysis and Machine Intelligence, 2004
    334
  74. M Maróti, B Kusý, G Simon, A Lédeczi
    The flooding time synchronization protocol. In Proc. 2nd ACM International Conference on Embedded Networked Sensor Systems (SenSys 2004, 2004
    334
  75. A Dunkels, B Gönvall, T Voigt
    Contiki - a lightweight and flexible operating system for tiny networked sensors. In Proceedings of the First IEEE Workshop on Embedded Networked Sensors, 2004
    333
  76. J Daugman
    How iris recognition works. IEEE Transactions on Circuits and Systems for Video Technology, 2004
    333
  77. David Culler, Deborah Estrin, Mani Srivastava
    Overview of wireless sensor networks 2004
    331
  78. T Brox, A Bruhn, N Papenberg, J Weickert
    High accuracy optical flow estimation based on a theory for warping. In Proc. European Conference on Computer Vision (ECCV, 2004
    331
  79. I Tsochantaridis, T Hofmann, T Joachims, Y Altun
    Support vector machine learning for interdependent and structured output spaces. In ICML, 2004
    330