This website does readability filtering of other pages. All styles, scripts, forms and ads are stripped. If you want your website excluded or have other feedback, use this form.

CiteSeerX — Statistics - Most Cited Citations in Computer Science

Most Cited Computer Science Citations

This list is generated from documents in the CiteSeerx database as of March 19, 2015. This list is automatically generated and may contain errors. The list is generated in batch mode and citation counts may differ from those currently in the CiteSeerx database, since the database is continuously updated.

All Years | 1990 | 1991 | 1992 | 1993 | 1994 | 1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015
  1. M R Garey, D S Johnson Computers and Intractability: A Guide to the Theory of NPCompleteness” W.H. Feeman and 1979 11468
  2. J Sambrook, E F Fritsch, T Maniatis Molecular Cloning: A Laboratory Manual, Vol. 1, 2nd edn Nucleic Acids Research, 1989 10362
  3. V Vapnik Statistical Learning Theory. 1998 9898
  4. T M Cover, J A Thomas Elements of Information Theory Series in Telecommunications, 1991 9198
  5. U K Laemmli Cleavage of structural proteins during the assembly of the head of bacteriophage T4. Nature 227:680–685 1970 9092
  6. T H Cormen, C E Leiserson, R L Rivest, C Stein Introduction to Algorithms. 1990 9039
  7. A P Dempster, N M Laird, D B Rubin Maximum likelihood from incomplete data via the EM algorithm. 1977 8999
  8. D E Goldberg Genetic Algorithms in Search, Optimization and Machine Learning, 1989 8261
  9. J Pearl Probabilistic Reasoning in Intelligent Systems 1988 7473
  10. C E Shannon, W Weaver The Mathematical Theory of Communication 1949 7077
  11. E Gamma, R Helm, R Johnson, J Vlissides De- sign Patterns: Elements of Reusable Object-Oriented Software 1995 5918
  12. D Lowe Distinctive Image Features from Scale-Invariant Keypoints. 2004 5621
  13. J R Quinlan C4.5: Programs for Machine Learning 1993 5414
  14. S F Altschul, T L Madden, A A Schaffer, J Zhang, Z Zhang, W Miller, D J Lipman Gapped BLAST and PSI-BLAST: a new generation of protein database search programs. Nucleic Acids Res. 25:3389–3402. 96 DING AND FERRY, 1997 5384
  15. C Bishop Neural networks for pattern recognition 1998 5335
  16. R Horn, C Johnson Matrix analysis 1999 5089
  17. S F Altschul, W Gish, W Miller, E W Myers, D J Lipman Basic local alignment search tool Journal of Molecular Biology, 1990 4956
  18. M M Bradford A rapid and sensitive method for the quantitation of microgram quantities of protein utilizing the principle of protein-dye binding. Anal. Biochem 1976 4768
  19. L R Rabiner A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE, 1989 4585
  20. L Breiman, J Friedman, R Olshen, C Stone Classification and Regression Trees 1984 4415
  21. P CHOMCZYNSKI, SACCH Single-step method of RNA isolation by acid guanidinium thiocyanate-phenol-chloroform extraction Analytical Biochemistry, 1987 4402
  22. J L Hennessy, D A Patterson Computer Architecture: A Quantitative Approach 1990 4307
  23. S Haykin Neural Networks: A Comprehensive Foundation Upper Saddle River, NJ, 1999 4270
  24. F SANGER, S NICKLEN, A R COULSON DNA sequencing with chain-terminating inhibitors Proceedings of the National Academy of Sciences, 1977 4228
  25. Stuart Russell, Peter Norvig Artificial Intelligence: A Modern Approach Upper Saddle River (New Jersey, 1995 4182
  26. R O Duda, P E Hart Pattern Classification and Scene Analysis 1973 4161
  27. R Sutton, A Barto Reinforcement Learning, an introduction. 1998 4148
  28. J Hopcroft, J Ullman Introduction to Automata Theory, Languages, and Computation 1979 4124
  29. J Sambrook, E F Fritsch, T Maniatis Molecular cloning: a laboratory 1989 4113
  30. S Boyd, L Vandenberghe Convex Optimization UNIVERSITY OF ALBERTA. Downloaded on December 22, 2008 at 12:22 from IEEE Xplore. Restrictions apply, 2004 4072
  31. S Geman, D Geman Stochastic Relaxation, Gibbs Distributions, and the Bayesian Restoration of Images IEEE Trans. on Pattern Anal. and Machine Intel, 1984 4041
  32. J Cohen Statistical power analysis for the behavioral sciences 1988 4022
  33. S Kirkpatrick, C D Gelatt, M P Vecchi Optimization by simulated annealing. Science, 1983 3918
  34. I Stoica A scalable peer-to-peer lookup service for internet applications. 2001 3835
  35. C-C Chang, C-J Lin Libsvm: a library for support vector machines. 0 3829
  36. O H Lowry, N J Rosebrough, A L Farr, R J Randall Protein measurement with the Folin phenol reagent 1951 3828
  37. D Kahneman, A Tversky Prospect theory: An analysis of decision under risk. Econometrica, 1979 3795
  38. R T Rockafellar, R J-B Wets Variational Analysis. 1997 3743
  39. L A Zadeh Fuzzy sets Information and Control, 1965 3724
  40. J D Thompson, D G Higgins, T J Gibson CLUSTAL W: Improving the sensitivity of progressive multiple sequence alignment through sequence weighing, position-specific gap penalties and weight matrix choice Nucleic Acids Res, 1994 3720
  41. T Kohonen Self-Organizing Maps 1995 3700
  42. J R Quinlan Induction of decision trees. Machine Learning, 1986 3634
  43. C A R Hoare Communicating Sequential Processes. 1985 3632
  44. S Brin, L Page The Anatomy of a Large-Scale Hypertextual Web Search Engine. in Proc. of 7th International WWW Conference, 1998 3623
  45. J Maldacena The large N limit of superconformal field theories and supergravity. 1998 3581
  46. F Black, M Scholes The pricing of options and corporate liabilities Journal of Political Economy, 1973 3497
  47. P Billingsley Convergence of Probability Measures 1968 3486
  48. J Lave, E Wenger Situated learning: Legitimate peripheral participation 1993 3476
  49. R Hartley, A Zisserman Multiple View Geometry in Computer Vision, chap. 6 2000 3470
  50. J Canny A computational approach to edge detection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1986 3426
  51. Gerard SALTON, McGILL Michael Introduction to Modern Information Retrieval 0 3416
  52. A J R Milner Communication and Concurrency 1989 3412
  53. Yoav Benjamini, Yosef Hochberg Controlling the false discovery rate: A practical and powerful approach to multiple testing Journal of the Royal Statistical Society: Series B, 1995 3397
  54. I H Witten, E Frank Data Mining: Practical machine learning tools and techniques, 2nd Edition 2005 3369
  55. B Efron, R J Tibshirani An Introduction to the Bootstrap. 1994 3323
  56. M Kass, A Witkin, D Terzopoulos Snakes: active contour models. International Journal of Computer Vision, 1988 3267
  57. C L Liu, J W Layland Scheduling Algorithms for Multiprogramming in a Hard Real-Time Environment. Journal of the ACM, 1973 3213
  58. N Saitou, M Nei The neighbor-joining method: a new method for reconstructing phylogenetic trees. Mol Biol Evol 4:406–425 1987 3185
  59. R Rivest, A Shamir, L Adleman A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 1978 3175
  60. J Koza Genetic Programming: On the Programming of Computers by Means of Natural Selection 1992 3167
  61. R Bryant Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers, 1986 3147
  62. C L Blake, C J Merz UCI repository of machine learning databases 1998 3070
  63. H Towbin, T Staehelin, J Gordon Electrophoretic transfer of proteins from polyacrylamide gels to nitrocellulose sheets: procedure and some applications Proc. Natl. Acad. Sci. USA 76:4350–4354, 1979 3041
  64. J Holland Adaption in Natural and Artificial Systems, The 1975 3026
  65. M Turk, A Penland Eigenfaces for recognition. Journal of Cognitive Neuroscience, 1991 3017
  66. S Deerwester, S T Landauer T K Dumais, G W Furnas, R A Harshman Indexing by latent semantic analysis. Journal of the Society for Information Science, 1990 3011
  67. D E Rumelhart, G E Hinton, R J Williams Learning internal representations by error propagation in Parallel Distributed Processing, 1986 3002
  68. Jon M Kleinberg Authoritative sources in a hyperlinked environment. In Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA, 1998 2990
  69. C ed Fellbaum WordNet: An Electronic Lexical Database 1998 2956
  70. W Diffie, M E Hellman New Directions in Cryptography. IEEE Transactions on Information Theory, 1976 2951
  71. S Ratnasamy, P Francis, M Handley, R Karp, S Shenker A Scalable Content-Addressable Network. In Proceedings of the ACM SIGCOMM '01 Conference, 2001 2946
  72. J J LAFFONT, J TIROLE A Theory of Incentives in Procurement and Regulation, 1993 2941
  73. R A Brooks A robust layered control system for a mobile robot IEEE Journal of Robotics and Automation, 1986 2941
  74. K Fukunaga Introduction to Statistical Pattern Recognition 1990 2911
  75. R R Nelson, S G Winter An evolutionary theory of economic change 1982 2898
  76. Rakesh Agrawal, Ramakrishnan Srikant Fast algorithms for mining association rules. In Proceedings of the 20th International Conference on Very Large Databases (VLDB, 1994 2889
  77. R-E Bellman Dynamic Programming 1957 2885
  78. T S Kuhn The structure of scientific revolutions 1962 2800
  79. J Shi, J Malik Normalized cuts and image segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000 2769
  80. L Breiman Bagging predictors. Machine Learning, 1996 2751
  81. G Schwarz Estimating the dimension of a model Ann. Stat, 1978 2739
  82. A J Menezes, P C Van Oorschot, S A Vanstone Handbook of applied cryptography. 1997 2706
  83. M A Fischler, R C Bolles RANdom SAmple Consensus: a paradigm for model fitting with applications to image analysis and automated cartography Graphics and Image Processing, 1981 2689
  84. E M Clarke, D E Long, K L McMillan Compositional model checking. In LICS, 1989 2663
  85. S G Mallat A Theory for Multiresolution Signal Decomposition: The Wavelet Representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1989 2658
  86. R Baeza-Yates, B Ribeiro-Neto Modern Information Retrieval. 1999 2652
  87. D L Swofford PAUP: phylogenetic analysis using parsimony. Version 4.0b8. Sinauer Associates. 2001 2637
  88. R Agrawal, T Imielinski, A Swami Mining Association Rules between Sets of Items in Large Databases. In Proceedings of the ACM SIGMOD International Conference on Management of Data, 1993 2635
  89. D M Blei, A Y Ng, M I Jordan Latent dirichlet allocation. Journal of Machine Learning Research, 2003 2630
  90. M Granovetter The strength of weak ties American Journal of Sociology, 0 2624
  91. B Silverman Density Estimation for Statistics and Data Analysis 1986 2614
  92. Thomas R Gruber A translation approach to portable ontology specifications. Knowledge Acquisition, 1993 2610
  93. American Psychiatric Association Diagnostic and statistical manual of mental disorders 1994 2598
  94. J D Hamilton Time Series Analysis 1994 2558
  95. A Aho, J Hopcroft, J Ullman The Design and Analysis of Computer Algorithms 1974 2553
  96. Altschul SF, Madden TL, Schaffer AA, J Zhang, Z Zhang Gapped BLAST and PSI-BLAST: a new generation of protein database search programs Nucleic Acids Res, 1997 2544
  97. D B Johnson, D A Maltz Dynamic source routing in ad hoc wireless networks. in Mobile Computing, Imielinski and Korth, Eds, 1996 2544
  98. N Metropolis, A W Rosenbluth, M N Rosenbluth, A H Teller, E Teller Equation of state calculations by fast computing machines J. Chem. Phys, 1953 2515
  99. J Lafferty, A McCallum, F Pereira Conditional random fields: Probabilistic models for segmenting and labeling sequence data. In ICML-2001, 2001 2499
  100. J F Allen Maintaining knowledge about temporal intervals. Communications of ACM, 1983 2486
Next 100 → Powered by:

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University