# | Title | Journal | Year | Citations |
---|
1 | Graph-Based Algorithms for Boolean Function Manipulation | IEEE Transactions on Computers | 1986 | 6,529 |
2 | The gem5 simulator | Computer Architecture News | 2011 | 3,750 |
3 | Discrete Cosine Transform | IEEE Transactions on Computers | 1974 | 3,511 |
4 | A Nonlinear Mapping for Data Structure Analysis | IEEE Transactions on Computers | 1969 | 2,685 |
5 | The Contract Net Protocol: High-Level Communication and Control in a Distributed Problem Solver | IEEE Transactions on Computers | 1980 | 2,617 |
6 | The SimpleScalar tool set, version 2.0 | Computer Architecture News | 1997 | 1,878 |
7 | How to Make a Multiprocessor Computer That Correctly Executes Multiprocess Programs | IEEE Transactions on Computers | 1979 | 1,766 |
8 | Spatial Planning: A Configuration Space Approach | IEEE Transactions on Computers | 1983 | 1,744 |
9 | Deadlock-Free Message Routing in Multiprocessor Interconnection Networks | IEEE Transactions on Computers | 1987 | 1,721 |
10 | Priority inheritance protocols: an approach to real-time synchronization | IEEE Transactions on Computers | 1990 | 1,593 |
11 | Application of Fuzzy Logic to Approximate Reasoning Using Linguistic Synthesis | IEEE Transactions on Computers | 1977 | 1,550 |
12 | Fourier Descriptors for Plane Closed Curves | IEEE Transactions on Computers | 1972 | 1,490 |
13 | SPEC CPU2006 benchmark descriptions | Computer Architecture News | 2006 | 1,466 |
14 | Distortion invariant object recognition in the dynamic link architecture | IEEE Transactions on Computers | 1993 | 1,430 |
15 | Graph-Theoretical Methods for Detecting and Describing Gestalt Clusters | IEEE Transactions on Computers | 1971 | 1,407 |
16 | Examining smart-card security under the threat of power analysis attacks | IEEE Transactions on Computers | 2002 | 1,344 |
17 | Binary Decision Diagrams | IEEE Transactions on Computers | 1978 | 1,276 |
18 | EIE | Computer Architecture News | 2016 | 1,251 |
19 | Multifacet's general execution-driven multiprocessor simulator (GEMS) toolset | Computer Architecture News | 2005 | 1,250 |
20 | A Projection Pursuit Algorithm for Exploratory Data Analysis | IEEE Transactions on Computers | 1974 | 1,232 |
21 | Neural-network-based fuzzy logic control and decision system | IEEE Transactions on Computers | 1991 | 1,231 |
22 | Hitting the memory wall | Computer Architecture News | 1995 | 1,211 |
23 | Some Computer Organizations and Their Effectiveness | IEEE Transactions on Computers | 1972 | 1,076 |
24 | Parallel Processing with the Perfect Shuffle | IEEE Transactions on Computers | 1971 | 1,070 |
25 | Topological properties of hypercubes | IEEE Transactions on Computers | 1988 | 1,063 |
26 | ISAAC | Computer Architecture News | 2016 | 1,031 |
27 | Algorithm-Based Fault Tolerance for Matrix Operations | IEEE Transactions on Computers | 1984 | 982 |
28 | A group-theoretic model for symmetric interconnection networks | IEEE Transactions on Computers | 1989 | 981 |
29 | Privacy-Preserving Public Auditing for Secure Cloud Storage | IEEE Transactions on Computers | 2013 | 980 |
30 | A Branch and Bound Algorithm for Feature Subset Selection | IEEE Transactions on Computers | 1977 | 965 |
31 | Fat-trees: Universal networks for hardware-efficient supercomputing | IEEE Transactions on Computers | 1985 | 953 |
32 | GRASP: a search algorithm for propositional satisfiability | IEEE Transactions on Computers | 1999 | 953 |
33 | The Representation and Matching of Pictorial Structures | IEEE Transactions on Computers | 1973 | 952 |
34 | Static Scheduling of Synchronous Data Flow Programs for Digital Signal Processing | IEEE Transactions on Computers | 1987 | 949 |
35 | A Parallel Algorithm for the Efficient Solution of a General Class of Recurrence Equations | IEEE Transactions on Computers | 1973 | 940 |
36 | Trace Scheduling: A Technique for Global Microcode Compaction | IEEE Transactions on Computers | 1981 | 940 |
37 | Access and Alignment of Data in an Array Processor | IEEE Transactions on Computers | 1975 | 925 |
38 | An Implicit Enumeration Algorithm to Generate Tests for Combinational Logic Circuits | IEEE Transactions on Computers | 1981 | 915 |
39 | Eyeriss | Computer Architecture News | 2016 | 833 |
40 | Performance Analysis Using Stochastic Petri Nets | IEEE Transactions on Computers | 1982 | 831 |
41 | PRIME | Computer Architecture News | 2016 | 823 |
42 | A Regular Layout for Parallel Adders | IEEE Transactions on Computers | 1982 | 818 |
43 | Photonic Networks-on-Chip for Future Generations of Chip Multiprocessors | IEEE Transactions on Computers | 2008 | 812 |
44 | A Class of Algorithms for Fast Digital Image Registration | IEEE Transactions on Computers | 1972 | 798 |
45 | Performance analysis of k-ary n-cube interconnection networks | IEEE Transactions on Computers | 1990 | 777 |
46 | Grid coverage for surveillance and target location in distributed sensor networks | IEEE Transactions on Computers | 2002 | 763 |
47 | Clustering Using a Similarity Measure Based on Shared Near Neighbors | IEEE Transactions on Computers | 1973 | 742 |
48 | Algorithms for Reporting and Counting Geometric Intersections | IEEE Transactions on Computers | 1979 | 722 |
49 | Fuzzy systems as universal approximators | IEEE Transactions on Computers | 1994 | 718 |
50 | Generalized Hypercube and Hyperbus Structures for a Computer Network | IEEE Transactions on Computers | 1984 | 717 |
51 | MorphoSys: an integrated reconfigurable system for data-parallel and computation-intensive applications | IEEE Transactions on Computers | 2000 | 697 |
52 | DRAMSim2: A Cycle Accurate Memory System Simulator | IEEE Computer Architecture Letters | 2011 | 696 |
53 | Performance Evaluation and Design Trade-Offs for Network-on-Chip Interconnect Architectures | IEEE Transactions on Computers | 2005 | 678 |
54 | SPLASH | Computer Architecture News | 1992 | 669 |
55 | Correlation Matrix Memories | IEEE Transactions on Computers | 1972 | 666 |
56 | On the Acceleration of Test Generation Algorithms | IEEE Transactions on Computers | 1983 | 656 |
57 | Optimum broadcasting and personalized communication in hypercubes | IEEE Transactions on Computers | 1989 | 654 |
58 | Aircraft Identification by Moment Invariants | IEEE Transactions on Computers | 1977 | 638 |
59 | Edge and Curve Detection for Visual Scene Analysis | IEEE Transactions on Computers | 1971 | 635 |
60 | A Direct Method of Nonparametric Measurement Selection | IEEE Transactions on Computers | 1971 | 635 |
61 | Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers | IEEE Transactions on Computers | 2009 | 622 |
62 | The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines | Synthesis Lectures on Computer Architecture | 2009 | 618 |
63 | Performance of Processor-Memory Interconnections for Multiprocessors | IEEE Transactions on Computers | 1981 | 614 |
64 | Design of a Massively Parallel Processor | IEEE Transactions on Computers | 1980 | 605 |
65 | Debugging Parallel Programs with Instant Replay | IEEE Transactions on Computers | 1987 | 604 |
66 | The NYU Ultracomputer—Designing an MIMD Shared Memory Parallel Computer | IEEE Transactions on Computers | 1983 | 600 |
67 | Automatic abstraction and fault tolerance in cortical microachitectures | Computer Architecture News | 2011 | 596 |
68 | Coda: a highly available file system for a distributed workstation environment | IEEE Transactions on Computers | 1990 | 595 |
69 | On a Pin Versus Block Relationship For Partitions of Logic Graphs | IEEE Transactions on Computers | 1971 | 583 |
70 | On Evaluating the Performability of Degradable Computing Systems | IEEE Transactions on Computers | 1980 | 577 |
71 | A Branch and Bound Algorithm for Computing k-Nearest Neighbors | IEEE Transactions on Computers | 1975 | 570 |
72 | On a Class of Multistage Interconnection Networks | IEEE Transactions on Computers | 1980 | 567 |
73 | EVENODD: an efficient scheme for tolerating double disk failures in RAID architectures | IEEE Transactions on Computers | 1995 | 517 |
74 | “Hot spot” contention and combining in multistage interconnection networks | IEEE Transactions on Computers | 1985 | 513 |
75 | A Two's Complement Parallel Array Multiplication Algorithm | IEEE Transactions on Computers | 1973 | 506 |
76 | Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks | IEEE Transactions on Computers | 2004 | 505 |
77 | Continuous Shading of Curved Surfaces | IEEE Transactions on Computers | 1971 | 503 |
78 | Guided Self-Scheduling: A Practical Scheduling Scheme for Parallel Supercomputers | IEEE Transactions on Computers | 1987 | 489 |
79 | Power provisioning for a warehouse-sized computer | Computer Architecture News | 2007 | 481 |
80 | Overview of the SpiNNaker System Architecture | IEEE Transactions on Computers | 2013 | 479 |
81 | Fourier Preprocessing for Hand Print Character Recognition | IEEE Transactions on Computers | 1972 | 476 |
82 | On the Mapping Problem | IEEE Transactions on Computers | 1981 | 473 |
83 | Multiple-Valued Logic—its Status and its Future | IEEE Transactions on Computers | 1984 | 469 |
84 | Clock Synchronization in Distributed Real-Time Systems | IEEE Transactions on Computers | 1987 | 463 |
85 | The Application of Constrained Least Squares Estimation to Image Restoration by Digital Computer | IEEE Transactions on Computers | 1973 | 460 |
86 | A New Solution to Coherence Problems in Multicache Systems | IEEE Transactions on Computers | 1978 | 460 |
87 | The SPLASH-2 programs | Computer Architecture News | 1995 | 458 |
88 | Combining Crypto with Biometrics Effectively | IEEE Transactions on Computers | 2006 | 457 |
89 | The Performance of Multistage Interconnection Networks for Multiprocessors | IEEE Transactions on Computers | 1983 | 455 |
90 | A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks | IEEE Transactions on Computers | 2007 | 455 |
91 | Elections in a Distributed Computing System | IEEE Transactions on Computers | 1982 | 454 |
92 | Application of the Karhunen-Loève Expansion to Feature Selection and Ordering | IEEE Transactions on Computers | 1970 | 452 |
93 | Clock skew optimization | IEEE Transactions on Computers | 1990 | 451 |
94 | A Partitioning Strategy for Nonuniform Problems on Multiprocessors | IEEE Transactions on Computers | 1987 | 449 |
95 | Evaluating associativity in CPU caches | IEEE Transactions on Computers | 1989 | 449 |
96 | The ILLIAC IV Computer | IEEE Transactions on Computers | 1968 | 445 |
97 | Cnvlutin | Computer Architecture News | 2016 | 444 |
98 | Concurrent error detection using watchdog processors-a survey | IEEE Transactions on Computers | 1988 | 443 |
99 | Stochastic neural computation. I. Computational elements | IEEE Transactions on Computers | 2001 | 439 |
100 | Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm | IEEE Transactions on Computers | 2016 | 436 |