I questioned my self "What does it mean to be a high cited paper?". I believe, high cited papers have a very big impact and influence in their fields. Impact and influence in this context include creating a new field or area of research, a novel approach to problem, or even changing paradigm of the field completely. What about computer science? What kind of high cited papers shape the field? It would be wonderful if I could know what kind of papers and researches that already shape the field that I passionate about!
Therefore, I decided to start this project and start collecting the high cited papers in computer science, read the papers, and then write the main idea and summary of each paper as a blog post. Ideally each blog post will contain:
- The field of establishment of that paper.
- The problem it wants to solve.
- The solution it provides.
- The evaluation for future works.
- Contribution to the field of work.
- Critical review (my own opinion of that paper).
I searched the Internet for the most influential and most cited works in computer science and found there sources:
- https://en.wikipedia.org/wiki/List_of_important_publications_in_computer_science
- http://citeseerx.ist.psu.edu/stats/articles
- http://www.journals.elsevier.com/computer-science-review/most-cited-articles/
From all those sources here are the list of papers I want to read:
- From Wikipedia (Source I)
- Computing Machinery and Intelligence (source full paper)
- A Proposal for the Dartmouth Summer Research Project on Artificial Intelligence (source full paper)
- Fuzzy sets (source full paper)
- An Inductive Inference Machine (source full paper)
- Language identification in the limit (source full paper)
- On the uniform convergence of relative frequencies of events to their probabilities (source full paper)
- A theory of the learnable (source full paper)
- Learning representations by back-propagating errors (source full paper)
- Induction of Decision Trees (source full paper)
- Learning Quickly When Irrelevant Attributes Abound: A New Linear-threshold Algorithm
- Learning to predict by the method of Temporal difference
- Learnability and the Vapnik–Chervonenkis dimension
- Cryptographic limitations on learning boolean formulae and finite automata
- The strength of weak learnability
- Learning in the presence of malicious errors
- A training algorithm for optimum margin classifiers
- A fast learning algorithm for deep belief nets
- Knowledge-based analysis of microarray gene expression data by using support vector machines
- Collaborative networks: A new scientific discipline
- Collaborative Networks: Reference Modeling
- On the translation of languages from left to right
- Semantics of Context-Free Languages
- A program data flow analysis procedure
- A Unified Approach to Global Program Optimization
- gprof: A Call Graph Execution Profiler
- Compilers: Principles, Techniques and Tools
- Colossus computer
- First Draft of a Report on the EDVAC
- Architecture of the IBM System/360
- The case for the reduced instruction set computer
- Comments on "the Case for the Reduced Instruction Set Computer"
- The CRAY-1 Computer System
- Validity of the Single Processor Approach to Achieving Large Scale Computing Capabilities
- A Case for Redundant Arrays of Inexpensive Disks (RAID)
- The case for a single-chip multiprocessor
- The Rendering Equation
- Elastically deformable models
- The Phase Correlation Image Alignment Method
- Determining Optical Flow
- An Iterative Image Registration Technique with an Application to Stereo Vision
- The Laplacian Pyramid as a compact image code
- Stochastic relaxation, Gibbs distributions, and the Bayesian restoration of images
- Snakes: Active contour models
- Condensation – conditional density propagation for visual tracking
- Object recognition from local scale-invariant features
- A relational model for large shared data banks
- Binary B-Trees for Virtual Memory
- Relational Completeness of Data Base Sublanguages
- The Entity Relationship Model – Towards a Unified View of Data
- SEQUEL: A structured English query language
- The notions of consistency and predicate locks in a database system
- Federated database systems for managing distributed, heterogeneous, and autonomous databases
- Mining association rules between sets of items in large databases
- A Vector Space Model for Automatic Indexing
- Extended Boolean Information Retrieval
- A Statistical Interpretation of Term Specificity and Its Application in Retrieval
- An experimental timesharing system
- The Working Set Model for Program Behavior
- Virtual Memory, Processes, and Sharing in MULTICS
- The nucleus of a multiprogramming system
- A note on the confinement problem
- The UNIX Time-Sharing System
- Weighted voting for replicated data
- Experiences with Processes and Monitors in Mesa
- Scheduling Techniques for Concurrent Systems
- A Fast File System for UNIX
- The Design of the UNIX Operating System
- The Design and Implementation of a Log-Structured File System
- Microkernel operating system architecture and Mach
- An Implementation of a Log-Structured File System for UNIX
- Soft Updates: A Solution to the Metadata Update problem in File Systems
- The FORTRAN Automatic Coding System
- Recursive functions of symbolic expressions and their computation by machine, part I
- ALGOL 60
- The next 700 programming languages
- Fundamental Concepts in Programming Languages
- Lambda Papers
- Structure and Interpretation of Computer Programs
- Comprehending Monads
- Towards a Theory of Type Structure
- An axiomatic basis for computer programming
- Probabilistic representation of formal languages
- Two-level morphology: A general computational model of word-form recognition and production
- A tutorial on hidden Markov models and selected applications in speech recognition
- Transformation-based error-driven learning and natural language processing: A case study in part-of-speech tagging
- Realization of Natural-Language Interfaces Using Lazy Functional Programming
- Software engineering: Report of a conference sponsored by the NATO Science Committee
- A Description of the Model-View-Controller User Interface Paradigm in the Smalltalk-80 System
- Go To Statement Considered Harmful
- On the criteria to be used in decomposing systems into modules
- Hierarchical Program Structures
- A technique for software module specification with examples
- Structured Design
- The Emperor's Old Clothes
- The Mythical Man-Month: Essays on Software Engineering
- No Silver Bullet: Essence and Accidents of Software Engineering
- The Cathedral and the Bazaar
- Statecharts: A Visual Formalism For Complex Systems
- Untraceable electronic mail, return addresses, and digital pseudonyms
- Anonymity Loves Company: Usability and the Network Effect
- New Directions in Cryptography
- A Method For Obtaining Digital Signatures And Public-Key Cryptosystems
- Security, Authentication, and Public Key Systems
- Password security: a case history
- Measuring password guessability for an entire university
- The Protection of Information in Computer Systems
- Thirty Years later: Lessons from the Multics Security Evaluation
- A Note on the Confinement Problem
- Reflections on Trusting Trust
- An Empirical Study of the Robustness of Windows NT Applications Using Random Testing
- Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
- Remembrance of Data Passed
- From Citeseerx (Source II)
- Statistical Learning Theory. 1998
- Introduction to Algorithms. 1990
- Maximum likelihood from incomplete data via the EM algorithm. 1977
- Distinctive image features from scaleinvariant keypoints. In: International Journal of Computer Vision, 2004
- Gapped BLAST and PSI-BLAST: a new generation of protein database search programs. Nucleic Acids Res. 1997
- A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE, 1989
- Reinforcement Learning, an introduction. 1998
- Optimization by simulated annealing. Science, 1983
- A scalable peer-to-peer lookup service for internet applications. 2001
- Libsvm: a library for support vector machines. 0
- Prospect theory: An analysis of decision under risk. Econometrica, 1979
- Variational Analysis. 1997
- Induction of decision trees. Machine Learning, 1986
- Communicating Sequential Processes. 1985
- The Anatomy of a Large-Scale Hypertextual Web Search Engine. in Proc. of 7th International WWW Conference, 1998
- The large N limit of superconformal field theories and supergravity. 1998
- A computational approach to edge detection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1986
- An Introduction to the Bootstrap. 1993
- Snakes: active contour models. International Journal of Computer Vision, 1988
- Scheduling Algorithms for Multiprogramming in a Hard Real-Time Environment. Journal of the ACM, 1973
- A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 1978
- Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers, 1986
- Eigenfaces for recognition. Journal of Cognitive Neuroscience, 1991
- Indexing by latent semantic analysis. Journal of the Society for Information Science, 1990
- Authoritative sources in a hyperlinked environment. In Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA, 1998
- New Directions in Cryptography. IEEE Transactions on Information Theory, 1976
- A Scalable Content-Addressable Network. In Proceedings of the ACM SIGCOMM '01 Conference, 2001
- Fast algorithms for mining association rules. In Proceedings of the 20th International Conference on Very Large Databases (VLDB, 1994
- Normalized cuts and image segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000
- Bagging predictors. Machine Learning, 1996
- Handbook of Applied Cryptography. 1996
- Compositional model checking. In LICS, 1
- A Theory for Multiresolution Signal Decomposition: The Wavelet Representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1989
- Modern Information Retrieval. 1999
- PAUP: phylogenetic analysis using parsimony. Version 4.0b8. Sinauer Associates. 2001
- Mining Association Rules between Sets of Items in Large Databases. In Proceedings of the ACM SIGMOD International Conference on Management of Data, 1993
- Latent dirichlet allocation. Journal of Machine Learning Research, 2003
- A translation approach to portable ontology specifications. Knowledge Acquisition, 1993
- Dynamic source routing in ad hoc wireless networks. in Mobile Computing, Imielinski and Korth, Eds, 1996
- Conditional random fields: Probabilistic models for segmenting and labeling sequence data. In ICML-2001, 2001
- Maintaining knowledge about temporal intervals. Communications of ACM, 1983
- A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 1998
- A decision-theoretic generalization of on-line learning and an application to boosting. J Comput Syst Sci, 1997
- Ad-hoc ondemand distance vector routing. In Proc. of the Mobile Computing Systems and Applications, 1999
- Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 1978
- Emerging of Scaling in Random Networks. Science, 1999
- Computational Complexity. 1994
- Congestion avoidance and control. ACM Computer Communication Review; Proceedings of the Sigcomm ’88 Symposium, 1988
- The capacity of wireless networks. IEEE Trans. on Information Theory, 2000
- The PageRank citation ranking: Bringing order to the Web. 1998
- Support vector networks. Machine Learning 20, 1995
- R-Trees: A dynamic index structure for spatial searching. In Proceedings of the 1984 ACM-SIGMOD Conference, 1984
- Random Early Detection Gateways for Congestion avoidance. IEEE/ACM Trans. Network, Vol, 1993
- The evolution of cooperation. 1984
- STATECHARTS: A Visual Formalism for Complex Systems. Science of Computer Programming, 1987
- The Anatomy of the Grid: Enabling Scalable Virtual Organizations. International Journal of Supercomputer Applications, 2001
- Rapid object detection using a boosted cascade of simple features. in Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR ’01, 2001
- Marching Cubes: A high resolution 3D surface construction algorithm. Computer Graphics (SIGGRAPH ’87 Proceedings, 1987
- Learning with kernels. 2002
- Building a Large Annotated Corpus of English: The Penn Treebank. Computational Linguistics, 1993
- Economic Growth. 1995
- Noncommutative Geometry. 1994
- A Theory of Timed Automata. Theoretical Computer Science, 1994
- The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology, 1986
- An Iterative Image Registration Technique with an Application to Stereo Vision. Proceedings of Image Understanding Workshop, 1981
- Data Mining: Concepts and techniques. 2001
- RTP: A Transport Protocol for Real-Time Applications. Internet RFC 1889, Internet Engineering Task Force (IETF, 1996
- Regression shrinkage and selection via the lasso. J. R. Statist. Soc. B, 1996
- Some methods for classification and analysis of multivariate observations. In Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability, LM LE Cam & J Neyman (eds.), Univeristy of California, 1967
- Capacity of multi-antenna Gaussian channels. European Trans. Telecommun, 1999
- On Random Graphs. I. Publ. Math. Debrecen, 1959
- MapReduce: Simplified data processing on large clusters. In: Proceedings of Operating Systems Design and Implementation. MapReduce for Machine Learning on Multicore, In: proceedings of Advances in Neural Information Processing Systems. NIPS 19, 306-313. Mahout project, [online]. http://lucene.apache.org/mahout, 2004
- Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom 2000, 2000
- On the self-similar nature of Ethernet traffic (extended version. IEEE/ACM Transaction on Networking, 1994
- How to share a secret. Communications of the ACM, 1979
- Particle swarm optimization. Proceedings of the 1995 IEEE International Conference on Neural Networks (Perth, Australia), IEEE Service Center, Piscataway, NJ, IV, 1995
- Economic action and social structure : the problem of embeddedness. American Journal of Sociology, Volume, 1985
- Randomized algorithms. 1995
- Random Graphs. 1985
- A Heteroskedasticity-Consistent Covariance Matrix Estimator and a Direct Test for Heteroskedasticity. Econometrica, 1980\
- A Course in Game Theory. 1994
- Histograms of oriented gradients for human detection. International Conference on Computer Vision and Pattern Recognition, 2005
- Metaphors we live by. 1980
- Compressive sensing. IEEE Trans. on Information Theory, 0
- The semantic web. Scientific American, 2001
- Determining optical flow. Artificial Intelligence, 1981
- Text Categorization with Support Vector Machines: Learning with Many Relevant Features. In Proceedings of the Tenth European Conference on Machine Learning, 1998
- A combined corner and edge detector. Alvey Vision Conference, 1988
- Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems. In Proceedings of the 18th IFIP/ACM International Conference on Distributed Systems Platforms (Middleware 2001, 2001
- Endogenous Technological Change. Journal of Political Economy, 1990
- A generalized processor sharing approach to flow control - the single node case. IEEE/ACM Trans. on Networking, 1993
- Atomic decomposition by basis pursuit. SIAM J. Sci. Comp, 1998
- An Introduction to Kolmogorov Complexity and Its Applications. 1993
- Social capital in the creation of human capital. American Journal of Sociology, 1988
- Optimality Theory: Constraint interaction in generative grammar. 1993
- Gpsr: Greedy perimeter stateless routing for wireless networks. In Proceedings of MOBICOM, 0
- Experiments with a new boosting algorithm. In International Conference on Machine Learning, 1996
- Orthonormal bases of compactly supported wavelets[J. Communications on Pure and Applied Mathematics, 1988
- On limits of wireless communications in a fading environment when using mutiple antennas. Wireless Personal Communications, 1998
- A theory of the learnable. Communications of the Association for Computing Machinery, 1984
- From Elsevier (Source III)
- Certifying algorithms
- Traditional and recent approaches in background modeling for foreground detection: An overview
- Linear Temporal Logic Symbolic Model Checkin
- Contextual music information retrieval and recommendation: State of the art and challenges
- Motion planning algorithms for molecular simulations: A survey
- Taxonomy of attacks and defense mechanisms in P2P reputation systems-Lessons for reputation system designers
- The renaming problem in shared memory systems: An introduction
- Conjunctive and boolean grammars: The true general case of the context-free grammars
- Data mining of social networks represented as graphs
- A survey on Security Issues of Reputation Management Systems for Peer-to-Peer Networks
- Verification conditions for source-level imperative programs
- Textual data compression in computational biology: Algorithmic techniques
- Service quality in P2P streaming systems
- A survey of timed automata for the development of real-time systems
- A survey on relay placement with runtime and approximation guarantees
- Computational models for networks of tiny artifacts: A survey
- DAG-based attack and defense modeling: Don't miss the forest for the attack trees
- Growth properties of power-free languages
- Confronting intractability via parameters
- Which security policies are enforceable by runtime monitors? A survey
- Current status and key issues in image steganography: A survey
- Urban pervasive applications: Challenges, scenarios and case studies
- Distributed algorithm engineering for networks of tiny artifacts
- Streaming techniques and data aggregation in networks of tiny artefacts
- A survey on tree matching and XML retrieval
That's the list of influential paper that I want to read. I don't know if I can finish this project but one thing that I'm sure of, I will learn a lot from this project.
While the list itself is intimidating, I believe I will meet a lot of challenges in the process working on this project like understanding the paper or even just getting the paper. If in any case you read this page and find yourself have any paper that I in my reading list, please leave a comment where I can download it, or you can email directly to anang[dot]dista[dot]satria[at]gmail.com. Any help for the success of this project really appreciated. Thank you :)
UPDATE: I created this blog to work on this project.
Most Influential and Most Cited Works in CS Project
UPDATE: I created this blog to work on this project.
Most Influential and Most Cited Works in CS Project
No comments:
Post a Comment