Technical Reports
Parent: Department of Computer Science & Engineering
eScholarship stats: History by Item for November, 2024 through February, 2025
Item | Title | Total requests | 2025-02 | 2025-01 | 2024-12 | 2024-11 |
---|---|---|---|---|---|---|
8dp743qb | UbiSketch: Bringing Sketching out of the Closet | 2,174 | 682 | 484 | 421 | 587 |
1bm0k1w0 | Preble: Efficient Distributed Prompt Scheduling for LLM Serving | 424 | 83 | 103 | 104 | 134 |
3wt008fk | Rotational Position Optimization (RPO) Disk Scheduling | 215 | 12 | 14 | 100 | 89 |
2qm3k10c | The hardness of k-means clustering | 139 | 22 | 32 | 53 | 32 |
6ps421k5 | Dahu: Improved Data Center Multipath Forwarding | 117 | 31 | 32 | 25 | 29 |
11h2x8kh | One Dimensional Knapsack | 104 | 30 | 26 | 22 | 26 |
1405b1bz | Network Telescopes: Technical Report | 95 | 16 | 21 | 32 | 26 |
83c3k6jb | Fast Transient Simulation of Lossy Transmission Lines | 89 | 21 | 22 | 19 | 27 |
00n325f2 | Approximation Methods for Thin Plate Spline Mappings and Principal Warps | 83 | 14 | 16 | 19 | 34 |
6x3149f2 | Critical-Path Aware Processor Architectures | 83 | 19 | 22 | 31 | 11 |
7b13d6cw | Recognizing Cars | 82 | 21 | 23 | 16 | 22 |
6mj094vk | An Efficient FPGA Implementation of Scalable Matrix Inversion Core using QR Decomposition | 79 | 16 | 21 | 25 | 17 |
9cd141mn | Place-Its: Location-Based Reminders on Mobile Phones | 77 | 19 | 23 | 18 | 17 |
6034x9r2 | Optimizing the Knapsack Problem | 74 | 16 | 23 | 15 | 20 |
6f6904sc | CACTI-IO Technical Report | 74 | 27 | 9 | 17 | 21 |
13g341vx | Resource Reclamation in Distributed Hash Tables | 72 | 20 | 16 | 20 | 16 |
4bf9f938 | ASIC Clouds: Specializing the Datacenter | 70 | 18 | 17 | 14 | 21 |
7sb3s217 | Fulcrum -- An Open-Implementation Approach to Context-Aware Publish / Subscribe | 69 | 20 | 19 | 17 | 13 |
4436n65h | APST-DV: Divisible Load Scheduling and Deployment on the Grid | 67 | 19 | 21 | 14 | 13 |
91p660vv | Incremental Sparse Binary Vector Similarity Search in High-Dimensional Space | 66 | 15 | 22 | 18 | 11 |
96d3z9qb | Accuracy Bounds For The Scaled Bitmap Data Structure | 63 | 14 | 22 | 15 | 12 |
8969r8tc | Algorithms for manifold learning | 58 | 19 | 18 | 14 | 7 |
9dw8h2t7 | Iago Attacks: Why The System Call API Is a Bad Untrusted RPC Interface | 55 | 13 | 10 | 18 | 14 |
8gc2k3kw | Analysis of Targeted Advertising in Snapchat Political Ads | 52 | 15 | 9 | 16 | 12 |
3g06f6cr | The Non-Volatile Memory Technology Database (NVMDB) | 49 | 14 | 14 | 11 | 10 |
6v11p5b0 | A Practical Microcylinder Appearance Model for Cloth Rendering | 45 | 13 | 12 | 13 | 7 |
6082g6mf | Alternatives to the k-means algorithm that find better clusterings | 43 | 5 | 13 | 13 | 12 |
29d3b140 | Review of “Laser soliton microcombs heterogeneously integrated on silicon” at a Introductory Graduate Laser Course Level | 41 | 12 | 27 | 2 | |
5b87j38b | S2Sim: Smart Grid Swarm Simulator | 40 | 10 | 15 | 9 | 6 |
2748x928 | Escape From Return-Oriented Programming: Return-oriented Programming without Returns (on the x86) | 39 | 13 | 6 | 10 | 10 |
94p735xh | Bitmap algorithms for counting active flows on high speed links | 38 | 9 | 12 | 6 | 11 |
3bg711fs | BuildingRules: A Trigger-Action Based System to Manage Complex Commercial Buildings | 36 | 14 | 13 | 3 | 6 |
4w0246js | NetBump: User-extensible Active Queue Management with Bumps on the Wire | 36 | 8 | 20 | 4 | 4 |
8wn4m97p | Echidna: Programmable Schematics to Simplify PCB Design | 36 | 9 | 8 | 8 | 11 |
0f02d3bm | Destroying Flash Memory-Based Storage Devices | 35 | 9 | 6 | 8 | 12 |
1td8x6g5 | Context Based Object Categorization: A Critical Survey | 35 | 17 | 10 | 4 | 4 |
8rx3b221 | New directions in traffic measurement and accounting | 34 | 19 | 8 | 4 | 3 |
12k0q8jr | Comprehensive Modeling Methodologies for NoC Router Estimation | 33 | 15 | 8 | 5 | 5 |
3dw2p389 | Automatic Color Calibration for Large Camera Arrays | 33 | 6 | 10 | 14 | 3 |
9tq826n1 | Verilogo: Proactive Phishing Detection via Logo Recognition | 33 | 9 | 7 | 13 | 4 |
324465dv | Gullfoss: Accelerating and Simplifying Data Movement among Heterogeneous Computing and Storage Resources | 32 | 11 | 10 | 9 | 2 |
39n9f558 | Power Side Channels in Security ICs: Hardware Countermeasures | 32 | 12 | 9 | 7 | 4 |
5gh377sq | Experience in Building a Comparative Performance Analysis Engine for a Commercial System | 32 | 7 | 8 | 9 | 8 |
9wx7m5z6 | CitiSense - Adaptive Services for Community-Driven Behavioral and Environmental Monitoring to Induce Change | 32 | 10 | 10 | 6 | 6 |
59n9766x | The ActiveClass Project: Experiments in Encouraging Classroom Participation | 31 | 13 | 4 | 4 | 10 |
6ct8p4tj | FTP-M: An FTP-like Multicast File Transfer Application | 31 | 13 | 8 | 4 | 6 |
6tt9z3n5 | Battery Provisioning and Associated Costs for Data Center Power Capping | 31 | 6 | 11 | 7 | 7 |
2cq4b381 | Metric Learning to Rank | 30 | 7 | 8 | 6 | 9 |
52m1h315 | Personal Pollution Monitoring: Mobile Real-Time Air-Quality in Daily Life | 30 | 9 | 8 | 8 | 5 |
80n3m1fj | Encode-then-encipher encryption: How to exploit nonces or redundacy in plaintexts for efficient cryptography | 30 | 11 | 9 | 6 | 4 |
Note: Due to the evolving nature of web traffic, the data presented here should be considered approximate and subject to revision. Learn more.