Most cited source documents in the ResearchIndex database as of January 2001

This list only includes documents in the ResearchIndex database. Citations where one or more authors of the citing and cited articles match are not included. The data is automatically generated and may contain errors.

ResearchIndex homepage   All years   1990   1991   1992   1993   1994   1995   1996   1997   1998   1999   2000   2001

1.   A Method for Obtaining Digital Signatures and Public-Key Cryptosystems - R.L. Rivest, A.. (1978)   (Correct)
An encryption method is presented with the novel property that publicly revealing an encryption key does not...

2.   Congestion Avoidance and Control - Van Jacobson, Michael J. Karels (1988)   (Correct)
This paper is a brief description of (i) -- (v) and the rationale behind them. (vi) is an algorithm recently...

3.   Rewrite Systems - Nachum Dershowitz, Jean-Pierre.. (1990)   (Correct)
Completion Completion has recently been put in a more abstract framework [ Bachmair-etal, 1986 ] , an...

4.   Systematic Software Development Using VDM - Cliff B. Jones (1995)   (Correct)
ion and Program Synthesis, volume 75: Math. Studies of Information Processing of Lecture Notes in Computer...

5.   Finding Structure in Time - Jeffrey L. Elman (1990)   (Correct)
Time underlies many interesting human behaviors. Thus, the question of how to represent time in connectionist...

6.   The Stable Model Semantics For Logic Programming - Michael Gelfond, Vladimir.. (1988)   (Correct)
We propose a new declarative semantics for logic programs with negation. Its formulation is quite simple; at...

7.   RSVP: A New Resource ReSerVation Protocol - Lixia Zhang, Steve Deering.. (1993)   (Correct)
this article we describe another.

8.   A Scheme for Real-Time Channel Establishment in Wide-Area Networks - Domenico Ferrari (1990)   (Correct)
Multimedia communication involving digital audio and/or digital video has rather strict delay requirements. A...

9.   Mining Association Rules between Sets of Items in Large Databases - Rakesh Agrawal, Tomasz.. (1993)   (Correct)
We are given a large database of customer transactions. Each transaction consists of items purchased by a...

10.   Implementing Mathematics with The Nuprl Proof Development System - R. L. Constable, S. F.. (1986)   (Correct)
types have existential type. In Proceedings of 12th ACM Symposium on 284 BIBLIOGRAPHY Principles of...

11.   On the Self-Similar Nature of Ethernet Traffic - Will E. Leland, et al. (1993)   (Correct)
We demonstrate that Ethernet local area network (LAN) traffic is statistically self-similar, that none of the...

12.   Term Rewriting Systems - J.W. Klop (1992)   (Correct)
Reduction Systems : : : : : : : : : : : : : : : : : : : : : 3 1.1 Basic notions : : : : : : : : : : : : : : :...

13.   Genetic Programming - John R. Koza (1997)   (Correct)
Introduction Genetic programming is a domain-independent problem-solving approach in which computer programs...

14.   Random Early Detection Gateways for Congestion Avoidance - Sally Floyd, Van Jacobson (1993)   (Correct)
This paper presents Random Early Detection (RED) gateways for congestion avoidance in packet-switched...

15.   Implementation and Performance of Munin - John Carter, John Bennett.. (1991)   (Correct)
Munin is a distributed shared memory (DSM) system that allows shared memory parallel programs to be executed...

16.   Fast Algorithms for Mining Association Rules - Rakesh Agrawal, Ramakrishnan.. (1994)   (Correct)
We consider the problem of discovering association rules between items in a large database of sales...

17.   Intelligence Without Reason - Rodney A. Brooks (1991)   (Correct)
Computers and Thought are the two categories that together define Artificial Intelligence as a discipline. ...

18.   The Cascade-Correlation Learning Architecture - Scott E. Fahlman, Christian.. (1991)   (Correct)
Cascade-Correlation is a new architecture and supervised learning algorithm for artificial neural networks....

19.   Generalized additive models - Trevor Hastie, Robert Tibshirani (1990)   (Correct)
This article describes flexible statistical methods that may be used to identify and characterize the effect...

20.   A New Method for Solving Hard Satisfiability Problems - Bart Selman, Hector Levesque.. (1992)   (Correct)
We introduce a greedy local search procedure called GSAT for solving propositional satisfiability problems....

21.   Bagging Predictors - Leo Breiman   (Correct)
Bagging predictors is a method for generating multiple versions of a predictor and using these to get an...

22.   TreadMarks: Distributed Shared Memory on Standard Workstations and.. - Pete Keleher, Alan L.. (1994)   (Correct)
TreadMarks is a distributed shared memory (DSM) system for standard Unix systems such as SunOS and Ultrix....

23.   Fine-Grained Mobility in the Emerald System - Eric Jul, Henry Levy, Norman.. (1988)   (Correct)
Emerald is an object-based language and system designed for the construction of distributed programs. An...

24.   Constraint Logic Programming: A Survey - Joxan Jaffar, Michael J. Maher (1994)   (Correct)
Machine This section discusses some major issues in the design of an abstract machine for the execution of...

25.   Building a large annotated corpus of English: the Penn Treebank - Mitchell P. Marcus, Beatrice .. (1993)   (Correct)
this paper, we review our experience with constructing one such large annotated corpus---the Penn Treebank, a...

26.   A Semantics of Multiple Inheritance - Luca Cardelli (1988)   (Correct)
this paper is to present a clean semantics of multiple inheritance and to show that, in the context of...

27.   PVM 3 USER'S GUIDE AND REFERENCE MANUAL - Al Geist, Adam Beguelin, Jack.. (1994)   (Correct)
This report is the PVM version 3.3 users' guide and reference manual. It contains an overview of PVM, and how...

28.   Pattern Recognition and Neural Networks - B. Ripley (1996)   (Correct)
Introduction Page 4: The book by Przytula & Prasanna (1993) discusses in detail the parallel implementation...

29.   Exokernel: an operating system architecture for application-level.. - Dawson R. Engler, M.. (1995)   (Correct)
We describe an operating system architecture that securely multiplexes machine resources while permitting an...

30.   Proof Verification and the Hardness of Approximation Problems - Sanjeev Arora, Carsten Lund.. (1992)   (Correct)
We show that every language in NP has a probablistic verifier that checks membership proofs for it using...

31.   Proof Verification and Hardness of Approximation Problems - Sanjeev Arora, Carsten Lund.. (1992)   (Correct)
The class PCP(f(n); g(n)) consists of all languages L for which there exists a polynomial-time ...

32.   The Object-Oriented Database System Manifesto - Malcolm Atkinson, Francois.. (1989)   (Correct)
This paper attempts to define an object-oriented database system. It describes the main features and...

33.   Inductive Logic Programming - Stephen Muggleton (1992)   (Correct)
A new research area, Inductive Logic Programming, is presently emerging. While inheriting various positive...

34.   Virtual Time and Global States of Distributed Systems - Friedemann Mattern (1989)   (Correct)
A distributed system can be characterized by the fact that the global state is distributed and that a common...

35.   A Framework for Defining Logics - Robert Harper, Furio Honsell.. (1987)   (Correct)
The Edinburgh Logical Framework (LF) provides a means to define (or present) logics. It is based on a...

36.   KQML as an agent communication language - Tim Finin, Yannis Labrou, James .. (1994)   (Correct)
This document and other information on the KRSS group is available as http://www.cs.umbc.edu/kse/krss/.

37.   KQML as an Agent Communication Language - Tim Finin, Richard Fritzson.. (1994)   (Correct)
This paper describes the design of and experimentation with the Knowledge Query and Manipulation Language...

38.   Performance of Optical Flow Techniques - J.L. Barron, D.J. Fleet, S.S.. (1992)   (Correct)
While different optical flow techniques continue to appear, there has been a lack of quantitative evaluation...

39.   Lambda Calculi with Types - Henk Barendregt (1992)   (Correct)
ion is said to bind the free variable x in M . For example, we say that x:yx has x as bound and y as free...

40.   A Hierarchical Internet Object Cache - Anawat Chankhunthod, Michael.. (1995)   (Correct)
This paper discusses the design and performance of a proxy-cache designed to make Internet information...

41.   Logical Foundations of Object-Oriented and Frame-Based Languages - Michael Kifer, Georg.. (1990)   (Correct)
We propose a novel formalism, called Frame Logic (abbr., F-logic), that accounts in a clean and declarative...

42.   Parallel Programming in Split-C - David Culler (1993)   (Correct)
We introduce the Split-C language, a parallel extension of C intended for high performance programming on...

43.   The Lorel Query Language for Semistructured Data - Serge Abiteboul, Dallan Quass.. (1997)   (Correct)
We present the Lorel language, designed for querying semistructured data. Semistructured data is becoming...

44.   Indexing by Latent Semantic Analysis - Scott Deerwester, Susan T.. (1990)   (Correct)
A new method for automatic indexing and retrieval is described. The approach is to take advantage of implicit...

45.   Efficient Software-Based Fault Isolation - Robert Wahbe, Steven Lucco.. (1993)   (Correct)
One way to provide fault isolation among cooperating software modules is to place each in its own address...

46.   Globus: A Metacomputing Infrastructure Toolkit - Ian Foster, Carl Kesselman (1996)   (Correct)
Emerging high-performance applications require the ability to exploit diverse, geographically distributed...

47.   Interpretation as Abduction - Jerry R. Hobbs, Mark Stickel.. (1990)   (Correct)
Abduction is inference to the best explanation. In the TACITUS project at SRI we have developed an approach...

48.   Stacked Generalization - David H. Wolpert (1990)   (Correct)
This paper introduces stacked generalization, a scheme for minimizing the generalization error rate of one...

49.   Constraint Query Languages - Paris C. Kanellakis, Gabriel M. .. (1990)   (Correct)
We investigate the relationship between programming with constraints and database query languages. We show...

50.   Where the Really Hard Problems Are - Peter Cheeseman, Bob Kanefsky.. (1991)   (Correct)
It is well known that for many NP-complete problems, such as K-Sat, etc., typical cases are easy to solve; so...

51.   Querying Semi-Structured Data - Serge Abiteboul (1997)   (Correct)
this paper BibTex files [Lam94] that present the advantage of being more familiar to researchers than other...

52.   Revised Report on the Algorithmic Language Scheme - William Clinger, JONATHAN Rees.. (1991)   (Correct)
syntax K 2 Con constants, including quotations I 2 Ide identifiers (variables) E 2 Exp expressions \Gamma 2...

53.   Improved Approximation Algorithms for Maximum Cut and Satisfiability.. - M. X. Goemans, D.P.. (1995)   (Correct)
ing with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to 1997...

54.   The essence of functional programming - Philip Wadler (1992)   (Correct)
This paper explores the use monads to structure functional programs. No prior knowledge of monads or category...

55.   The PERFECT Club Benchmarks: Effective Performance Evaluation of.. - The PERFECT Club: M.. (1988)   (Correct)
This report consists of two major portions. First is the presentation of a methodology for measuring the...

56.   Irrelevant Features and the Subset Selection Problem - George John (1994)   (Correct)
We address the problem of finding a subset of features that allows a supervised induction algorithm to induce...

57.   Comprehending Monads - Philip Wadler (1992)   (Correct)
Introduces monads as a way to structure functional programs and to manage array update.

58.   Hard and Easy Distributions of SAT Problems - David Mitchell, Bart Selman.. (1992)   (Correct)
We report results from large-scale experiments in satisfiability testing. As has been observed by others,...

59.   Yacc: Yet Another Compiler-Compiler - Stephen Johnson (1979)   (Correct)
Computer program input generally has some structure; in fact, every computer program that does input can be...

60.   Foundations for the Study of Software Architecture - Dewayne Perry, Alexander L. Wolf (1992)   (Correct)
The purpose of this paper is to build the foundation for software architecture. We first develop an ...

61.   Experiments with a New Boosting Algorithm - Yoav Freund, Robert E. Schapire (1996)   (Correct)
In an earlier paper, we introduced a new "boosting" algorithm called AdaBoost which, theoretically, can be...

62.   The BSD Packet Filter: A New Architecture for User-level Packet.. - Steven McCanne, Van.. (1992)   (Correct)
Many versions of Unix provide facilities for user-level packet capture, making possible the use of general...

63.   The NAS Parallel Benchmarks - D. Bailey et al. (1994)   (Correct)
A new set of benchmarks has been developed for the performance evaluation of highly parallel supercomputers....

64.   End-To-End Arguments In System Design - J.H. Saltzer, D.P. Reed, D.D.. (1984)   (Correct)
This paper presents a design principle that helps guide placement of functions among the modules of a...

65.   Self-Similarity in World Wide Web Traffic: Evidence and Possible.. - Mark Crovella, Azer.. (1996)   (Correct)
Recently the notion of self-similarity has been shown to apply to wide-area and local-area network traffic....

66.   Proof-Carrying Code - George C. Necula (1997)   (Correct)
This paper describes proof-carrying code (PCC), a mechanism by which a host system can determine with...

67.   Learning Bayesian Networks: The Combination of Knowledge and.. - David Heckerman, Dan Geiger.. (1994)   (Correct)
We describe a Bayesian approach for learning Bayesian networks from a combination of prior knowledge and...

68.   A Language with Distributed Scope - Luca Cardelli (1995)   (Correct)
Obliq is a lexically-scoped, untyped, interpreted language that supports distributed object-oriented...

69.   Reinforcement Learning: A Survey - Leslie Pack Kaelbling, Michael.. (1996)   (Correct)
This paper surveys the field of reinforcement learning from a computer-science perspective. It is written to...

70.   View-Based and Modular Eigenspaces for Face Recognition - Alex Pentland, Baback.. (1994)   (Correct)
In this work we describe experiments with eigenfaces for recognition and interactive search in a large-scale...

71.   Camera Self-Calibration: Theory and Experiments - O.D. Faugeras, Q.-T. Luong S.J. .. (1992)   (Correct)
The problem of finding the internal orientation of a camera (camera calibration) is extremely important for...

72.   Fronts Propagating with Curvature Dependent Speed: Algorithms Based.. - Stanley Osher, James.. (1988)   (Correct)
This paper appeared as Osher, S., and Sethian, J.A., Journal of Computational Physics, 79, pp.12-49, (1988)...

73.   An introduction to disk drive modeling - Chris Ruemmler, John Wilkes (1994)   (Correct)
This paper has been published in IEEE Computer 27(3):17--29, March 1994. It supersedes HP Labs technical...

74.   Fast Planning Through Planning Graph Analysis - Avrim L. Blum, Merrick L. Furst (1995)   (Correct)
We introduce a new approach to planning in STRIPS-like domains based on constructing and analyzing a compact...

75.   QMR: a Quasi-Minimal Residual Method for Non-Hermitian Linear Systems - Roland W. Freund.. (1991)   (Correct)
this paper, we present a novel BCGlike approach, the quasi-minimal residual (QMR) method, which overcomes the...

76.   Relational Queries Computable in Polynomial Time - Neil Immerman (1986)   (Correct)
We characterize the polynomial time computable queries as those expressible in relational calculus plus a...

77.   Progressive Meshes - Hugues Hoppe (1996)   (Correct)
In the quest for realism in computer graphics, highly detailed geometric models are rapidly becoming...

78.   A Query Language and Optimization Techniques for Unstructured Data - Peter Buneman, Susan.. (1996)   (Correct)
For certain database tasks that require great flexibility, some people are turning to a new kind of data...

79.   Partial Constraint Satisfaction - Eugene C. Freuder, Richard J.. (1992)   (Correct)
A constraint satisfaction problem involves finding values for variables subject to constraints on which...

80.   Interior Point Methods In Semidefinite Programming With Applications.. - Farid Alizadeh (1995)   (Correct)
We study the semidefinite programming problem (SDP), i.e the optimization problem of a linear function of a...

81.   A New Fast and Efficient Image Codec Based on Set Partitioning in.. - Amir Said, William A.. (1996)   (Correct)
Embedded zerotree wavelet (EZW) coding, introduced by J. M. Shapiro, is a very effective and computationally...

82.   Partitioning of Unstructured Problems for Parallel Processing - Horst D. Simon (1994)   (Correct)
Many large scale computational problems are based on unstructured computational domains. Primary examples are...

83.   Limits of Instruction-Level Parallelism - David W. Wall (1990)   (Correct)
Growing interest in ambitious multiple-issue machines and heavilypipelined machines requires a careful...

84.   Querying Object-Oriented Databases - N. Kifer, W. Kim, Y. Sagiv (1992)   (Correct)
We present a novel language for querying object-oriented databases. The language is built around the idea of...

85.   Caching in the Sprite Network File System - Michael N. Nelson, Brent B.. (1988)   (Correct)
The Sprite network operating system uses large main-memory disk block caches to achieve high performance in...

86.   Munin: Distributed Shared Memory Based on Type--Specific Memory.. - John K. Bennett, John B.. (1990)   (Correct)
We are developing Munin y , a system that allows programs written for shared memory multiprocessors to be...

87.   Munin: Distributed Shared Memory Based on Type-Specific Memory.. - John K. Bennett, John B.. (1990)   (Correct)
We are developing Munin, a system that allows programs written for shared memory multiprocessors to be...

88.   Semidefinite Programming - Lieven Vandenberghe, et al. (1994)   (Correct)
In semidefinite programming one minimizes a linear function subject to the constraint that an affine...

89.   APRIL: A Processor Architecture for Multiprocessing - Anant Agarwal, Beng-Hong Lim.. (1990)   (Correct)
Processors in large#scale multiprocessors must be able to tolerate large communication latencies and ...

90.   The Algorithmic Analysis of Hybrid Systems - R. Alur, C. Courcoubetis, N.. (1995)   (Correct)
We present a general framework for the formal specification and algorithmic analysis of hybrid systems. A...

91.   Querying the World Wide Web - Alberto Mendelzon, George A.. (1997)   (Correct)
The World Wide Web is a large, heterogeneous, distributed collection of documents connected by hypertext...

92.   The CN2 Induction Algorithm - Peter Clark, Tim Niblett (1989)   (Correct)
Systems for inducing concept descriptions from examples are valuable tools for assisting in the task of...

93.   A Logic Programming Language with Lambda-Abstraction, Function.. - Dale Miller (1991)   (Correct)
ion, Function Variables, and Simple Unification Dale Miller Department of Computer and Information Science...

94.   Uniprocessor Garbage Collection Techniques - Paul R. Wilson (1992)   (Correct)
We survey basic garbage collection algorithms, and variations such as incremental and generational...

95.   A Fast And High Quality Multilevel Scheme For Partitioning Irregular.. - George Karypis, Vipin .. (1998)   (Correct)
F3.819e+05> Recently, a number of researchers have investigated a class of graph partitioning algorithms...

96.   Objects and Views - Serge Abiteboul, Anthony Bonner (1991)   (Correct)
Object-oriented databases have been introduced primarily to ease the development of database applications....

97.   An Extended Set of Fortran Basic Linear Algebra Subprograms - Jack J. Dongarra, Jeremy Du.. (1986)   (Correct)
This paper describes an extension to the set of Basic Linear Algebra Subprograms. The extensions are targeted...

98.   Fast Effective Rule Induction - William W. Cohen (1995)   (Correct)
Many existing rule learning systems are computationally expensive on large noisy datasets. In this paper we...

99.   Recursive Distributed Representations - Jordan B. Pollack (1990)   (Correct)
A long-standing difficulty for connectionist modeling has been how to represent variable-sized recursive data...

100.   The x-Kernel: An Architecture for Implementing Network Protocols - Norman C. Hutchinson, Larry .. (1991)   (Correct)
This paper describes a new operating system kernel, called the x-kernel, that provides an explicit...

ResearchIndex homepage