Technical Reports
Parent: Department of Computer Science & Engineering
eScholarship stats: History by Item for September through December, 2024
Item | Title | Total requests | 2024-12 | 2024-11 | 2024-10 | 2024-09 |
---|---|---|---|---|---|---|
8dp743qb | UbiSketch: Bringing Sketching out of the Closet | 1,857 | 421 | 587 | 593 | 256 |
1bm0k1w0 | Preble: Efficient Distributed Prompt Scheduling for LLM Serving | 467 | 104 | 134 | 132 | 97 |
9514v2jb | FPGA Implementation of Adaptive Weight Calculation Core Using QRD-RLS Algorithm | 460 | 4 | 3 | 4 | 449 |
3wt008fk | Rotational Position Optimization (RPO) Disk Scheduling | 250 | 100 | 89 | 47 | 14 |
2qm3k10c | The hardness of k-means clustering | 143 | 53 | 32 | 40 | 18 |
7b13d6cw | Recognizing Cars | 140 | 16 | 22 | 52 | 50 |
1405b1bz | Network Telescopes: Technical Report | 116 | 32 | 26 | 31 | 27 |
83c3k6jb | Fast Transient Simulation of Lossy Transmission Lines | 109 | 19 | 27 | 37 | 26 |
00n325f2 | Approximation Methods for Thin Plate Spline Mappings and Principal Warps | 104 | 19 | 34 | 34 | 17 |
6ps421k5 | Dahu: Improved Data Center Multipath Forwarding | 97 | 25 | 29 | 23 | 20 |
11h2x8kh | One Dimensional Knapsack | 94 | 22 | 26 | 26 | 20 |
13g341vx | Resource Reclamation in Distributed Hash Tables | 78 | 20 | 16 | 26 | 16 |
6x3149f2 | Critical-Path Aware Processor Architectures | 78 | 31 | 11 | 18 | 18 |
9cd141mn | Place-Its: Location-Based Reminders on Mobile Phones | 76 | 18 | 17 | 22 | 19 |
6034x9r2 | Optimizing the Knapsack Problem | 75 | 15 | 20 | 26 | 14 |
6mj094vk | An Efficient FPGA Implementation of Scalable Matrix Inversion Core using QR Decomposition | 75 | 25 | 17 | 13 | 20 |
7sb3s217 | Fulcrum -- An Open-Implementation Approach to Context-Aware Publish / Subscribe | 69 | 17 | 13 | 25 | 14 |
91p660vv | Incremental Sparse Binary Vector Similarity Search in High-Dimensional Space | 69 | 18 | 11 | 22 | 18 |
6f6904sc | CACTI-IO Technical Report | 68 | 17 | 21 | 23 | 7 |
4436n65h | APST-DV: Divisible Load Scheduling and Deployment on the Grid | 63 | 14 | 13 | 21 | 15 |
96d3z9qb | Accuracy Bounds For The Scaled Bitmap Data Structure | 62 | 15 | 12 | 21 | 14 |
8gc2k3kw | Analysis of Targeted Advertising in Snapchat Political Ads | 59 | 16 | 12 | 17 | 14 |
6082g6mf | Alternatives to the k-means algorithm that find better clusterings | 52 | 13 | 12 | 21 | 6 |
9dw8h2t7 | Iago Attacks: Why The System Call API Is a Bad Untrusted RPC Interface | 47 | 18 | 14 | 9 | 6 |
4bf9f938 | ASIC Clouds: Specializing the Datacenter | 43 | 14 | 21 | 4 | 4 |
8969r8tc | Algorithms for manifold learning | 42 | 14 | 7 | 13 | 8 |
0f02d3bm | Destroying Flash Memory-Based Storage Devices | 40 | 8 | 12 | 12 | 8 |
3g06f6cr | The Non-Volatile Memory Technology Database (NVMDB) | 39 | 11 | 10 | 14 | 4 |
23v0c369 | A Diary Study of Mobile Information Needs | 38 | 5 | 7 | 17 | 9 |
6v11p5b0 | A Practical Microcylinder Appearance Model for Cloth Rendering | 38 | 13 | 7 | 10 | 8 |
2cq4b381 | Metric Learning to Rank | 36 | 6 | 9 | 13 | 8 |
59n9766x | The ActiveClass Project: Experiments in Encouraging Classroom Participation | 36 | 4 | 10 | 11 | 11 |
9tq826n1 | Verilogo: Proactive Phishing Detection via Logo Recognition | 33 | 13 | 4 | 11 | 5 |
2748x928 | Escape From Return-Oriented Programming: Return-oriented Programming without Returns (on the x86) | 32 | 10 | 10 | 10 | 2 |
324465dv | Gullfoss: Accelerating and Simplifying Data Movement among Heterogeneous Computing and Storage Resources | 31 | 9 | 2 | 11 | 9 |
3dw2p389 | Automatic Color Calibration for Large Camera Arrays | 30 | 14 | 3 | 10 | 3 |
49d79511 | BuildingSherlock: Fault Management Framework for HVAC Systems in Commercial Buildings | 30 | 4 | 7 | 18 | 1 |
8wn4m97p | Echidna: Programmable Schematics to Simplify PCB Design | 30 | 8 | 11 | 7 | 4 |
94p735xh | Bitmap algorithms for counting active flows on high speed links | 29 | 6 | 11 | 9 | 3 |
5gh377sq | Experience in Building a Comparative Performance Analysis Engine for a Commercial System | 28 | 9 | 8 | 5 | 6 |
52m1h315 | Personal Pollution Monitoring: Mobile Real-Time Air-Quality in Daily Life | 27 | 8 | 5 | 12 | 2 |
5jd3c1gv | ORION 2.0: A Fast and Accurate NoC Power and Area Model for Early-Stage Design Space Exploration | 24 | 3 | 8 | 8 | 5 |
7hf8346g | Characterizing Flash Memory: Anomalies, Observations, and Applications | 24 | 8 | 6 | 7 | 3 |
80n3m1fj | Encode-then-encipher encryption: How to exploit nonces or redundacy in plaintexts for efficient cryptography | 24 | 6 | 4 | 11 | 3 |
0fk6869g | Sorting 100 TB on Google Compute Engine | 23 | 1 | 5 | 8 | 9 |
6cq720mg | Flame: Efficient and Robust Hardware Load Balancing Flame: Efficient and Robust Hardware Load Balancing for Data Center Routers | 23 | 5 | 9 | 8 | 1 |
8h1713t5 | NetShare: Virtualizing Data Center Networks across Services | 22 | 6 | 3 | 9 | 4 |
8rx3b221 | New directions in traffic measurement and accounting | 22 | 4 | 3 | 12 | 3 |
9x03j4sf | HYPERCUTS: A Decision Tree Based Algorithm for Fast Packet | 22 | 4 | 12 | 6 | |
0vx7j8zc | Liquid Types: Type Refinement via Predicate Abstraction | 21 | 1 | 7 | 10 | 3 |
Note: Due to the evolving nature of web traffic, the data presented here should be considered approximate and subject to revision. Learn more.