Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. M FAIRCHILD
    D.: Color Appearance Models 2013
    248
  2. A Barto
    Intrinsic motivation and reinforcement learning. Intrinsically Motivated Learning in Natural and Artificial Systems, 2013
    88
  3. S Apel, C Kastner, C Lengauer
    Language-independent and automated software composition: The FeatureHouse experience. IEEE Trans. Softw. Eng, 2013
    67
  4. P Liang, M I Jordan, D Klein
    Learning dependency-based compositional semantics. Computational Linguistics, 2013
    60
  5. A Cal̀ı, G Gottlob, M Kifer
    Taming the infinite chase: Query answering under expressive relational constraints. J. of Artificial Intelligence Research, 2013
    56
  6. T D Little, T D Jorgensen, K M Lang, W G Moore
    On the joys of missing data 2013
    56
  7. Sanjam Garg, Craig Gentry, Shai Halevi
    Candidate multilinear maps from ideal lattices. Advances in Cryptology – EUROCRYPT 2013, volume 7881 of Lecture Notes in Computer Science, 2013
    45
  8. J Ramirez-Vallejo, M Porter, E
    Colombia: Organizing for Competitiveness, HBS, 2013
    42
  9. R S Bivand, E Pebesma, V Gómez-Rubio
    Applied Spatial Data Analysis with R 2013
    39
  10. P Shvaiko, J Euzenat
    Ontology Matching: State of the Art and Future Challenges IEEE Transactions on Knowledge and Data Engineering, 2013
    38
  11. M-F Balcan, A Blum, A Gupta
    Approximate clustering without the approximation. In Journal of ACM, 2013
    37
  12. B Dit, M Revelle, M Gethers, D Poshyvanyk
    Feature location in source code: A taxonomy and survey. J. Software Maintenance & Evolution: Research and Practice, 2013
    35
  13. K Bache, M Lichman
    UCI machine learning repository 2013
    34
  14. P Bazeley, Jackson
    K: Qualitative Data Analysis with NVivo 2013
    33
  15. E Vincent, J Barker, S Watanabe, J L Roux, F Nesta, M Matassoni
    The second ‘CHiME’ speech separation and recognition challenge: Datasets, tasks and baselines in Proc. ICASSP 2013, 2013
    33
  16. Stephen J Blumberg, Julian V Luke
    Wireless Substitution: Early Release of Estimates from the National Health Interview Survey, January–June 2013, Atlanta, Ga.: Centers for Disease Control and Prevention, 2013
    32
  17. Daniel Covitz, Nellie Liang, Gustavo A Suarez
    The Evolution of a Financial Crisis Panic in the Asset-Backed Commercial Paper Market”. Journal of Finance LXVII, 2013
    32
  18. A Liberati, Altman DG, J Tetzlaff
    Mulrow C, Gøtzsche PC, Ioannidis JP, Clarke M, Devereaux PJ, Kleijnen J, Moher D: The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate healthcare Oyama et al. Cardiovascular Diabetology 2014 13:21 Page 8 of 8 http://www.cardiab.com/content/13/1/2133. Kim M, Platt MJ, Shibasaki T, Quaggin SE, Backx PH, Seino S, Simpson JA, Drucker DJ: GLP-1, 2013
    30
  19. N Bitansky, R Canetti, A Chiesa, E Tromer
    Recursive composition and bootstrapping for SNARKS and proof-carrying data 45th ACM STOC, 2013
    30
  20. R Gennaro, C Gentry, B Parno, M Raykova
    Quadratic span programs and succinct NIZKs without PCPs. EUROCRYPT 2013, volume 7881 of LNCS, 2013
    29
  21. G D’Ambrosio, G F Giudice, G Isidori, A Strumia
    Minimal flavour violation: An effective field theory approach”, Nucl. Phys. B 645 (2002) 155 [hep-ph/0207036]. tel-00824019, version 1, 2013
    29
  22. Steven J Davis, R Jason Faberman, John C Haltiwanger
    The Establishment-level Behavior of Vacancies and Hiring.” Quarterly. Journal of Economics, 2013
    28
  23. F Rusek, D Persson, B K Lau, E G Larsson, T L Marzetta, O Edfors, F Tufvesson
    Scaling up MIMO: Opportunities and challenges with very large arrays. IEEE Signal Processing Magazine, 2013
    28
  24. C J Buehler, M Bosse, L McMillan
    Non-Metric Image-Based Rendering for Video Stabilization. Proc. CVPR, Citation Christian Kurz, Tobias Ritschel, Elmar Elmar Eisemann, Thorsten Thormählen, and Hans-Peter Seidel, Generating Realistic Camera Shake for Virtual Scenes, Journal of Virtual Reality and Broadcasting, 2013
    27
  25. P Martin, G Dubus, A&A
    also these proceedings 2013
    26
  26. C C Aggarwal
    Outlier Analysis. 2013
    25
  27. B Parno, C Gentry, J Howell, M Raykova
    Pinocchio: Nearly practical verifiable computation. In Proceedings of the IEEE Symposium on Security and Privacy, 2013
    24
  28. V V Acharya, P Schnabl, G Suarez
    Securitization without risk transfer Journal of Financial Economics, 2013
    24
  29. C Mbarushimana, Shahrabi
    A.: ”Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad Hoc Networks 21st International Conference on Advanced Information c○ 2013 NSP Natural Sciences Publishing Cor. Sci. Lett, 2013
    23
  30. J Nie Fox, Zhenghua, J Byrnes
    sem: Structural Equation Models. R package version 2013
    23
  31. Dan Boneh, Brent Waters
    Constrained pseudorandom functions and their applications. Advances in Cryptology – ASIACRYPT 2013, Part II, 2013
    23
  32. J P Aumasson, L Henzen, W Meier, Naya-Plasencia
    M.: Quark: A Lightweight Hash. J. Cryptology, 2013
    22
  33. D A Socolinsky, L B Wolff
    Multispectral Image Visualization Through First-Order Fusion IEEE Transactions on Image Processing, 2013
    22
  34. J-S Coron, T Lepoint, M Tibouchi
    Batch fully homomorphic encryption over the integers. IACR Cryptology ePrint Archive, 2013
    22
  35. Y Plan, R Vershynin
    One-bit compressed sensing by linear programming. Comm. Pure and Applied Math, 2013
    21
  36. Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, Thomas Zacharias
    Delegatable pseudorandom functions and applications. ACM CCS 13: 20th Conference on Computer and Communications Security, 2013
    21
  37. N Cesa-Bianchi, C Gentile, G Zappella
    A gang of bandits. In Proc. NIPS, 2013
    21
  38. Benjamin Recht, Christopher Ré
    Parallel stochastic gradient algorithms for large-scale matrix completion. Mathematical Programming Computation, 2013
    21
  39. Eneko Agirre, Daniel Cer, Mona Diab, Aitor GonzalezAgirre, Weiwei Guo
    sem 2013 shared task: Semantic textual similarity. In Proceedings of the Second Joint Conference on Lexical and Computational Semantics and the Shared Task: Semantic Textual Similarity, 2013
    21
  40. F Zhang, Zhang Ed, G Belotti, S Ceccarelli, D, K Pithewan
    Generalized Multi-Protocol Label Switching (GMPLS) Signaling Extensions for the evolving G.709 Optical Transport Networks Control. Work in Progress, 2013
    21
  41. E K Burke, M Gendreau, M Hyde, G Kendall, G Ochoa, E Ozcan, Qu
    R.: Hyper-heuristics: a survey of the state of the art. Journal of the Operational Research Society (JORS, 2013
    21
  42. B Bagheri Hariri, D Calvanese, G D Giacomo, A Deutsch, M Montali
    Verification of relational data-centric dynamic systems with external services. In Proc. of PODS, 2013
    21
  43. S Foss, D Korshunov, S Zachary
    An Introduction to Heavytailed and Subexponential Distributions. Springer-Verlag, 2nd Edition. 14 Embrechts, Hashorva, Mikosch, 2013
    20
  44. Centers
    for Disease Control and Prevention. School Health Programs: Improving the Health of Our Youth. At A Glance Atlanta, GA: Centers for Disease Control and Prevention, US Department of Health and Human Services; 2010. http://www.cdc.gov/ chronicdisease/resources/publications/aag/pdf/2010/dash-2010.pdf. Accessed September 27, 2013
    20
  45. S Garg, C Gentry, S Halevi, A Sahai, B Waters
    Attribute-based encryption for circuits from multilinear maps. In CRYPTO, 2013
    20
  46. G P Huet
    Residual theory in λ-calculus: A formal development. 1994) B. Accattoli hal-00780337, version 1 - 23, 2013
    20
  47. K L Clarkson, D P Woodruff
    Low rank approximation and regression in input sparsity time In Proceedings of the 45th annual ACM Symposium on Theory of Computing, STOC ’13, 2013
    19
  48. K A Forney A L, E M Oleson, J Barlow
    Line-transect abundance estimates of cetaceans in the Hawaiian EEZ. PIFSC Working Paper, 2013
    19
  49. Yann Algan, Pierre Cahuc
    Trust and Growth Annual Review of Economics, 2013
    19
  50. Raj Chetty, Emmanuel Saez
    Teaching the Tax Code: Earnings Responses to an Experiment with EITC Recipients. American Economic Journal: Applied Economics, 2013
    19
  51. R NISHTALA, H FUGAL, S GRIMM, M KWIATKOWSKI, H LEE, H C LI, R MCELROY, M PALECZNY, D PEEK, P SAAB, D STAFFORD, T TUNG, V VENKATARAMANI
    Scaling memcache at facebook. In Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation, 2013
    18
  52. J M Bardeen
    Gauge-invariant cosmological perturbations. Phys Rev. D 1980, 2013
    18
  53. C Monsanto, J Reich, N Foster, J Rexford, D Walker
    Composing software-defined networks. In Proc. NSDI, 2013
    18
  54. Z Liu, P Wang, T Zha
    Land-price dynamics and macroeconomic fluctuations Econometrica, 2013
    18
  55. Organizational
    institutional issues in climate change adaptation and risk management:Iinsights from practitioners’ survey in Caroline Abate, Atlaw Alemu, and Mahamadou Namori, 2013
    18
  56. J Brogaard, T J Hendershott, R Riordan
    High frequency trading and price discovery, Working paper. 2013
    18
  57. C Chew, G Eysenbach
    Pandemics in the age of twitter: Content analysis of tweets during the 2009 h1n1 outbreak,” PlosOne, 2013
    18
  58. Saif M Mohammad, Peter D Turney
    Crowdsourcing a word-emotion association lexicon 2013
    17
  59. Y Cai, C Daskalakis, S M 2012b Weinberg
    Optimal Multi-Dimensional Mechanism Design: Reducing Revenue to Welfare Maximization In the 53rd Annual IEEE Symposium on Foundations of Computer Science (FOCS, 2013
    17
  60. Kenneth J Turner, Gavin A Campbell
    The ACCENT policy wizard. 2013
    17
  61. X Hu, L Tang, J Tang, H Liu
    Exploiting social relations for sentiment analysis in microblogging. Proceedings of WSDM, 2013
    17
  62. David A Matsa, Amalia R Miller
    A Female Style in Corporate Leadership? Evidence from Quotas. Dataset.” American Economic Journal: Applied Economics, 2013
    17
  63. G Pelletier, K Sandlund, L-E Jonsson, M West
    RObust Header Compression (ROHC): A Profile for TCP/IP. RFC 6846. 2013
    17
  64. Dorit Ron, Adi Shamir
    Quantitative Analysis of the Full Bitcoin Transaction Graph. In Financial Cryptography and Data Security, 2013
    17
  65. B Bross, W J Han, J R Ohm, G J Sullivan, Y K Wang, T Wiegand
    High Efficiency Video Coding (HEVC) text specification draft 10 JCT-VC of ITU-T SG 16 WP 3 and ISO/IEC JTC 1/SC 29/WG 11, 2013
    17
  66. B Dubois, H Feldman, C Jacova
    et al.: Research criteria for the diagnosis of Alzheimer's disease: revising the NINCDS-ADRDA criteria Lancet Neurol 6, 734 746 (2007) version 1, 2013
    16
  67. A Berger, C Bouwman
    How Does Capital Affect Bank Performance during Financial Crises Journal of Financial Economics, 2013
    16
  68. C Benzmüller, L Paulson
    Quantified multimodal logics in simple type theory. Logica Universalis (Special Issue on Multimodal Logics, 2013
    16
  69. F Reid, M Harrigan
    An analysis of anonymity in the bitcoin system. In Security and Privacy in Social Networks, 2013
    16
  70. T Winter, U Zimmermann
    Real-time dispatch of trams in storage yards. 36 Journal of Computer Applications (0975 – 8887) Volume 69– No.1, 2013
    16
  71. N Berestycki
    Recent progress in coalescent theory. JEAN-STÉPHANE DHERSIN AND LINGLONG YUAN hal-00674190, version 3 - 23, 2013
    16
  72. Andreas Rossberg, Derek Dreyer
    Mixin’ up the ML module system. ACM Transactions on Programming Languages and Systems (TOPLAS, 2013
    16
  73. E Weisberg, C Boulton, Kelly LM
    et al. Inhibition of mutant FLT3 receptors in leukemia cells by the small molecule tyrosine kinase inhibitor PKC412 Cancer Cell. 2002;1:433-443 28 bloodjournal.hematologylibrary.org at PENN STATE UNIVERSITY on February 21, 2013
    16
  74. D Creal, S J Koopman, A Lucas
    Generalized autoregressive score models with applications J of Applied Econometrics, 2013
    16
  75. Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer
    Fast reductions from RAMs to delegatable succinct constraint satisfaction problems In Proceedings of the 4th Innovations in Theoretical Computer Science Conference, ITCS ’13, 2013
    16
  76. J Teubner, L Woods
    Data processing on FPGAs. Number 35 in Synthesis Lectures on Data Management. Morgan and Claypool Publishers, 2013
    16
  77. S Goldwasser, Y Kalai, R A Popa, V Vaikuntanathan, N Zeldovich
    Reusable Garbled Circuits and Succinct Functional Encryption. In Proceedings of the ACM Symposium on Theory of Computing (STOC), STOC ’13, 2013
    15
  78. Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
    Practical multilinear maps over the integers. Advances in Cryptology – CRYPTO 2013, Part I, 2013
    15
  79. C Monsanto, J Reich, N Foster, J Rexford, D Walker
    Composing Software Defined Networks. In Proc. NSDI, 2013
    15