Most Cited Computer Science Citations
This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.
All Years
| 1990
| 1991
| 1992
| 1993
| 1994
| 1995
| 1996
| 1997
| 1998
| 1999
| 2000
| 2001
| 2002
| 2003
| 2004
| 2005
| 2006
| 2007
| 2008
| 2009
| 2010
| 2011
| 2012
| 2013
| 2014
| 2015
-
D.: Color Appearance Models 2013248
-
Intrinsic motivation and reinforcement learning. Intrinsically Motivated Learning in Natural and Artificial Systems, 201388
-
Language-independent and automated software composition: The FeatureHouse experience. IEEE Trans. Softw. Eng, 201367
-
Learning dependency-based compositional semantics. Computational Linguistics, 201360
-
Taming the infinite chase: Query answering under expressive relational constraints. J. of Artificial Intelligence Research, 201356
-
On the joys of missing data 201356
-
Candidate multilinear maps from ideal lattices. Advances in Cryptology – EUROCRYPT 2013, volume 7881 of Lecture Notes in Computer Science, 201345
-
Colombia: Organizing for Competitiveness, HBS, 201342
-
Ontology Matching: State of the Art and Future Challenges IEEE Transactions on Knowledge and Data Engineering, 201338
-
Approximate clustering without the approximation. In Journal of ACM, 201337
-
Genetic Matching for Estimating Causal Effects: A General Multivariate Matching Method for Achieving Balance in Observational Studies Review of Economics and Statistics, 201336
-
Feature location in source code: A taxonomy and survey. J. Software Maintenance & Evolution: Research and Practice, 201335
-
UCI machine learning repository 201334
-
The second ‘CHiME’ speech separation and recognition challenge: Datasets, tasks and baselines in Proc. ICASSP 2013, 201333
-
Wireless Substitution: Early Release of Estimates from the National Health Interview Survey, January–June 2013, Atlanta, Ga.: Centers for Disease Control and Prevention, 201332
-
The Evolution of a Financial Crisis Panic in the Asset-Backed Commercial Paper Market”. Journal of Finance LXVII, 201332
-
Mulrow C, Gøtzsche PC, Ioannidis JP, Clarke M, Devereaux PJ, Kleijnen J, Moher D: The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate healthcare Oyama et al. Cardiovascular Diabetology 2014 13:21 Page 8 of 8 http://www.cardiab.com/content/13/1/2133. Kim M, Platt MJ, Shibasaki T, Quaggin SE, Backx PH, Seino S, Simpson JA, Drucker DJ: GLP-1, 201330
-
Recursive composition and bootstrapping for SNARKS and proof-carrying data 45th ACM STOC, 201330
-
Quadratic span programs and succinct NIZKs without PCPs. EUROCRYPT 2013, volume 7881 of LNCS, 201329
-
Minimal flavour violation: An effective field theory approach”, Nucl. Phys. B 645 (2002) 155 [hep-ph/0207036]. tel-00824019, version 1, 201329
-
The Establishment-level Behavior of Vacancies and Hiring.” Quarterly. Journal of Economics, 201328
-
Scaling up MIMO: Opportunities and challenges with very large arrays. IEEE Signal Processing Magazine, 201328
-
Non-Metric Image-Based Rendering for Video Stabilization. Proc. CVPR, Citation Christian Kurz, Tobias Ritschel, Elmar Elmar Eisemann, Thorsten Thormählen, and Hans-Peter Seidel, Generating Realistic Camera Shake for Virtual Scenes, Journal of Virtual Reality and Broadcasting, 201327
-
also these proceedings 201326
-
Outlier Analysis. 201325
-
Pinocchio: Nearly practical verifiable computation. In Proceedings of the IEEE Symposium on Security and Privacy, 201324
-
Securitization without risk transfer Journal of Financial Economics, 201324
-
A.: ”Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad Hoc Networks 21st International Conference on Advanced Information c○ 2013 NSP Natural Sciences Publishing Cor. Sci. Lett, 201323
-
Constrained pseudorandom functions and their applications. Advances in Cryptology – ASIACRYPT 2013, Part II, 201323
-
M.: Quark: A Lightweight Hash. J. Cryptology, 201322
-
Multispectral Image Visualization Through First-Order Fusion IEEE Transactions on Image Processing, 201322
-
Batch fully homomorphic encryption over the integers. IACR Cryptology ePrint Archive, 201322
-
One-bit compressed sensing by linear programming. Comm. Pure and Applied Math, 201321
-
Delegatable pseudorandom functions and applications. ACM CCS 13: 20th Conference on Computer and Communications Security, 201321
-
A gang of bandits. In Proc. NIPS, 201321
-
Parallel stochastic gradient algorithms for large-scale matrix completion. Mathematical Programming Computation, 201321
-
sem 2013 shared task: Semantic textual similarity. In Proceedings of the Second Joint Conference on Lexical and Computational Semantics and the Shared Task: Semantic Textual Similarity, 201321
-
R.: Hyper-heuristics: a survey of the state of the art. Journal of the Operational Research Society (JORS, 201321
-
Verification of relational data-centric dynamic systems with external services. In Proc. of PODS, 201321
-
An Introduction to Heavytailed and Subexponential Distributions. Springer-Verlag, 2nd Edition. 14 Embrechts, Hashorva, Mikosch, 201320
-
Does Disability Insurance Receipt Discourage Work? Using Examiner Assignment to Estimate Causal Effects of SSDI Receipt. American Economics Review, 201320
-
for Disease Control and Prevention. School Health Programs: Improving the Health of Our Youth. At A Glance Atlanta, GA: Centers for Disease Control and Prevention, US Department of Health and Human Services; 2010. http://www.cdc.gov/ chronicdisease/resources/publications/aag/pdf/2010/dash-2010.pdf. Accessed September 27, 201320
-
Attribute-based encryption for circuits from multilinear maps. In CRYPTO, 201320
-
Residual theory in λ-calculus: A formal development. 1994) B. Accattoli hal-00780337, version 1 - 23, 201320
-
Low rank approximation and regression in input sparsity time In Proceedings of the 45th annual ACM Symposium on Theory of Computing, STOC ’13, 201319
-
Line-transect abundance estimates of cetaceans in the Hawaiian EEZ. PIFSC Working Paper, 201319
-
Trust and Growth Annual Review of Economics, 201319
-
Teaching the Tax Code: Earnings Responses to an Experiment with EITC Recipients. American Economic Journal: Applied Economics, 201319
-
Scaling memcache at facebook. In Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation, 201318
-
Gauge-invariant cosmological perturbations. Phys Rev. D 1980, 201318
-
Composing software-defined networks. In Proc. NSDI, 201318
-
Land-price dynamics and macroeconomic fluctuations Econometrica, 201318
-
institutional issues in climate change adaptation and risk management:Iinsights from practitioners’ survey in Caroline Abate, Atlaw Alemu, and Mahamadou Namori, 201318
-
Pandemics in the age of twitter: Content analysis of tweets during the 2009 h1n1 outbreak,” PlosOne, 201318
-
Optimal Multi-Dimensional Mechanism Design: Reducing Revenue to Welfare Maximization In the 53rd Annual IEEE Symposium on Foundations of Computer Science (FOCS, 201317
-
The ACCENT policy wizard. 201317
-
Exploiting social relations for sentiment analysis in microblogging. Proceedings of WSDM, 201317
-
A Female Style in Corporate Leadership? Evidence from Quotas. Dataset.” American Economic Journal: Applied Economics, 201317
-
Quantitative Analysis of the Full Bitcoin Transaction Graph. In Financial Cryptography and Data Security, 201317
-
High Efficiency Video Coding (HEVC) text specification draft 10 JCT-VC of ITU-T SG 16 WP 3 and ISO/IEC JTC 1/SC 29/WG 11, 201317
-
et al.: Research criteria for the diagnosis of Alzheimer's disease: revising the NINCDS-ADRDA criteria Lancet Neurol 6, 734 746 (2007) version 1, 201316
-
Multimedia Broadcast/Multicast Service (MBMS); Protocols and codecs 3GPP TS 26.346 10.7.0, 201316
-
How Does Capital Affect Bank Performance during Financial Crises Journal of Financial Economics, 201316
-
Quantified multimodal logics in simple type theory. Logica Universalis (Special Issue on Multimodal Logics, 201316
-
An analysis of anonymity in the bitcoin system. In Security and Privacy in Social Networks, 201316
-
Real-time dispatch of trams in storage yards. 36 Journal of Computer Applications (0975 – 8887) Volume 69– No.1, 201316
-
Recent progress in coalescent theory. JEAN-STÉPHANE DHERSIN AND LINGLONG YUAN hal-00674190, version 3 - 23, 201316
-
Mixin’ up the ML module system. ACM Transactions on Programming Languages and Systems (TOPLAS, 201316
-
et al. Inhibition of mutant FLT3 receptors in leukemia cells by the small molecule tyrosine kinase inhibitor PKC412 Cancer Cell. 2002;1:433-443 28 bloodjournal.hematologylibrary.org at PENN STATE UNIVERSITY on February 21, 201316
-
Generalized autoregressive score models with applications J of Applied Econometrics, 201316
-
Fast reductions from RAMs to delegatable succinct constraint satisfaction problems In Proceedings of the 4th Innovations in Theoretical Computer Science Conference, ITCS ’13, 201316
-
Data processing on FPGAs. Number 35 in Synthesis Lectures on Data Management. Morgan and Claypool Publishers, 201316
-
Reusable Garbled Circuits and Succinct Functional Encryption. In Proceedings of the ACM Symposium on Theory of Computing (STOC), STOC ’13, 201315
-
Practical multilinear maps over the integers. Advances in Cryptology – CRYPTO 2013, Part I, 201315
-
Composing Software Defined Networks. In Proc. NSDI, 201315
-
4). Lucky thirteen: Breaking the TLS and DTLS record protocols. Retrieved July 5, 2013 from http://www.isg.rhul.ac.uk/tls/Lucky13.html Department of Commerce, NIST, 201315