Technical Reports
Parent: Department of Computer Science & Engineering
eScholarship stats: Breakdown by Item for November, 2024 through February, 2025
Item | Title | Total requests | Download | View-only | %Dnld |
---|---|---|---|---|---|
8dp743qb | UbiSketch: Bringing Sketching out of the Closet | 2,174 | 31 | 2,143 | 1.4% |
1bm0k1w0 | Preble: Efficient Distributed Prompt Scheduling for LLM Serving | 424 | 117 | 307 | 27.6% |
3wt008fk | Rotational Position Optimization (RPO) Disk Scheduling | 215 | 9 | 206 | 4.2% |
2qm3k10c | The hardness of k-means clustering | 139 | 54 | 85 | 38.8% |
6ps421k5 | Dahu: Improved Data Center Multipath Forwarding | 117 | 3 | 114 | 2.6% |
11h2x8kh | One Dimensional Knapsack | 104 | 1 | 103 | 1.0% |
1405b1bz | Network Telescopes: Technical Report | 95 | 24 | 71 | 25.3% |
83c3k6jb | Fast Transient Simulation of Lossy Transmission Lines | 89 | 4 | 85 | 4.5% |
00n325f2 | Approximation Methods for Thin Plate Spline Mappings and Principal Warps | 83 | 20 | 63 | 24.1% |
6x3149f2 | Critical-Path Aware Processor Architectures | 83 | 8 | 75 | 9.6% |
7b13d6cw | Recognizing Cars | 82 | 20 | 62 | 24.4% |
6mj094vk | An Efficient FPGA Implementation of Scalable Matrix Inversion Core using QR Decomposition | 79 | 6 | 73 | 7.6% |
9cd141mn | Place-Its: Location-Based Reminders on Mobile Phones | 77 | 9 | 68 | 11.7% |
6034x9r2 | Optimizing the Knapsack Problem | 74 | 5 | 69 | 6.8% |
6f6904sc | CACTI-IO Technical Report | 74 | 1 | 73 | 1.4% |
13g341vx | Resource Reclamation in Distributed Hash Tables | 72 | 2 | 70 | 2.8% |
4bf9f938 | ASIC Clouds: Specializing the Datacenter | 70 | 11 | 59 | 15.7% |
7sb3s217 | Fulcrum -- An Open-Implementation Approach to Context-Aware Publish / Subscribe | 69 | 0 | 69 | 0.0% |
4436n65h | APST-DV: Divisible Load Scheduling and Deployment on the Grid | 67 | 3 | 64 | 4.5% |
91p660vv | Incremental Sparse Binary Vector Similarity Search in High-Dimensional Space | 66 | 2 | 64 | 3.0% |
96d3z9qb | Accuracy Bounds For The Scaled Bitmap Data Structure | 63 | 3 | 60 | 4.8% |
8969r8tc | Algorithms for manifold learning | 58 | 6 | 52 | 10.3% |
9dw8h2t7 | Iago Attacks: Why The System Call API Is a Bad Untrusted RPC Interface | 55 | 6 | 49 | 10.9% |
8gc2k3kw | Analysis of Targeted Advertising in Snapchat Political Ads | 52 | 22 | 30 | 42.3% |
3g06f6cr | The Non-Volatile Memory Technology Database (NVMDB) | 49 | 3 | 46 | 6.1% |
6v11p5b0 | A Practical Microcylinder Appearance Model for Cloth Rendering | 45 | 7 | 38 | 15.6% |
6082g6mf | Alternatives to the k-means algorithm that find better clusterings | 43 | 9 | 34 | 20.9% |
29d3b140 | Review of “Laser soliton microcombs heterogeneously integrated on silicon” at a Introductory Graduate Laser Course Level | 41 | 6 | 35 | 14.6% |
5b87j38b | S2Sim: Smart Grid Swarm Simulator | 40 | 3 | 37 | 7.5% |
2748x928 | Escape From Return-Oriented Programming: Return-oriented Programming without Returns (on the x86) | 39 | 7 | 32 | 17.9% |
94p735xh | Bitmap algorithms for counting active flows on high speed links | 38 | 27 | 11 | 71.1% |
3bg711fs | BuildingRules: A Trigger-Action Based System to Manage Complex Commercial Buildings | 36 | 2 | 34 | 5.6% |
4w0246js | NetBump: User-extensible Active Queue Management with Bumps on the Wire | 36 | 7 | 29 | 19.4% |
8wn4m97p | Echidna: Programmable Schematics to Simplify PCB Design | 36 | 7 | 29 | 19.4% |
0f02d3bm | Destroying Flash Memory-Based Storage Devices | 35 | 3 | 32 | 8.6% |
1td8x6g5 | Context Based Object Categorization: A Critical Survey | 35 | 11 | 24 | 31.4% |
8rx3b221 | New directions in traffic measurement and accounting | 34 | 25 | 9 | 73.5% |
12k0q8jr | Comprehensive Modeling Methodologies for NoC Router Estimation | 33 | 2 | 31 | 6.1% |
3dw2p389 | Automatic Color Calibration for Large Camera Arrays | 33 | 15 | 18 | 45.5% |
9tq826n1 | Verilogo: Proactive Phishing Detection via Logo Recognition | 33 | 7 | 26 | 21.2% |
324465dv | Gullfoss: Accelerating and Simplifying Data Movement among Heterogeneous Computing and Storage Resources | 32 | 5 | 27 | 15.6% |
39n9f558 | Power Side Channels in Security ICs: Hardware Countermeasures | 32 | 0 | 32 | 0.0% |
5gh377sq | Experience in Building a Comparative Performance Analysis Engine for a Commercial System | 32 | 2 | 30 | 6.3% |
9wx7m5z6 | CitiSense - Adaptive Services for Community-Driven Behavioral and Environmental Monitoring to Induce Change | 32 | 5 | 27 | 15.6% |
59n9766x | The ActiveClass Project: Experiments in Encouraging Classroom Participation | 31 | 6 | 25 | 19.4% |
6ct8p4tj | FTP-M: An FTP-like Multicast File Transfer Application | 31 | 4 | 27 | 12.9% |
6tt9z3n5 | Battery Provisioning and Associated Costs for Data Center Power Capping | 31 | 4 | 27 | 12.9% |
2cq4b381 | Metric Learning to Rank | 30 | 7 | 23 | 23.3% |
52m1h315 | Personal Pollution Monitoring: Mobile Real-Time Air-Quality in Daily Life | 30 | 5 | 25 | 16.7% |
80n3m1fj | Encode-then-encipher encryption: How to exploit nonces or redundacy in plaintexts for efficient cryptography | 30 | 4 | 26 | 13.3% |
Note: Due to the evolving nature of web traffic, the data presented here should be considered approximate and subject to revision. Learn more.