Technical Reports
Parent: Department of Computer Science & Engineering
eScholarship stats: Breakdown by Item for May through August, 2024
Item | Title | Total requests | Download | View-only | %Dnld |
---|---|---|---|---|---|
1bm0k1w0 | Preble: Efficient Distributed Prompt Scheduling for LLM Serving | 1,144 | 422 | 722 | 36.9% |
8dp743qb | UbiSketch: Bringing Sketching out of the Closet | 455 | 36 | 419 | 7.9% |
7b13d6cw | Recognizing Cars | 135 | 56 | 79 | 41.5% |
00n325f2 | Approximation Methods for Thin Plate Spline Mappings and Principal Warps | 117 | 23 | 94 | 19.7% |
11h2x8kh | One Dimensional Knapsack | 109 | 2 | 107 | 1.8% |
83c3k6jb | Fast Transient Simulation of Lossy Transmission Lines | 98 | 3 | 95 | 3.1% |
9cd141mn | Place-Its: Location-Based Reminders on Mobile Phones | 98 | 19 | 79 | 19.4% |
6ps421k5 | Dahu: Improved Data Center Multipath Forwarding | 94 | 29 | 65 | 30.9% |
2qm3k10c | The hardness of k-means clustering | 91 | 58 | 33 | 63.7% |
96d3z9qb | Accuracy Bounds For The Scaled Bitmap Data Structure | 83 | 3 | 80 | 3.6% |
8gc2k3kw | Analysis of Targeted Advertising in Snapchat Political Ads | 80 | 27 | 53 | 33.8% |
3cq2532h | Three Brown Mice: See How They Run | 78 | 28 | 50 | 35.9% |
7sb3s217 | Fulcrum -- An Open-Implementation Approach to Context-Aware Publish / Subscribe | 76 | 4 | 72 | 5.3% |
0f02d3bm | Destroying Flash Memory-Based Storage Devices | 74 | 36 | 38 | 48.6% |
13g341vx | Resource Reclamation in Distributed Hash Tables | 74 | 4 | 70 | 5.4% |
23v0c369 | A Diary Study of Mobile Information Needs | 73 | 39 | 34 | 53.4% |
4bf9f938 | ASIC Clouds: Specializing the Datacenter | 73 | 36 | 37 | 49.3% |
6034x9r2 | Optimizing the Knapsack Problem | 73 | 3 | 70 | 4.1% |
6f6904sc | CACTI-IO Technical Report | 73 | 31 | 42 | 42.5% |
3dw2p389 | Automatic Color Calibration for Large Camera Arrays | 72 | 26 | 46 | 36.1% |
1405b1bz | Network Telescopes: Technical Report | 67 | 15 | 52 | 22.4% |
6x3149f2 | Critical-Path Aware Processor Architectures | 67 | 9 | 58 | 13.4% |
91p660vv | Incremental Sparse Binary Vector Similarity Search in High-Dimensional Space | 66 | 4 | 62 | 6.1% |
4436n65h | APST-DV: Divisible Load Scheduling and Deployment on the Grid | 65 | 2 | 63 | 3.1% |
3wt008fk | Rotational Position Optimization (RPO) Disk Scheduling | 62 | 6 | 56 | 9.7% |
51v4s0p7 | Improving the Speed and Scalability of Distributed Simulations of Sensor Networks | 58 | 19 | 39 | 32.8% |
6v11p5b0 | A Practical Microcylinder Appearance Model for Cloth Rendering | 58 | 32 | 26 | 55.2% |
6mj094vk | An Efficient FPGA Implementation of Scalable Matrix Inversion Core using QR Decomposition | 54 | 10 | 44 | 18.5% |
7hf8346g | Characterizing Flash Memory: Anomalies, Observations, and Applications | 54 | 30 | 24 | 55.6% |
8h1713t5 | NetShare: Virtualizing Data Center Networks across Services | 53 | 37 | 16 | 69.8% |
0fk6869g | Sorting 100 TB on Google Compute Engine | 51 | 26 | 25 | 51.0% |
59n9766x | The ActiveClass Project: Experiments in Encouraging Classroom Participation | 50 | 11 | 39 | 22.0% |
5b87j38b | S2Sim: Smart Grid Swarm Simulator | 48 | 30 | 18 | 62.5% |
2cq4b381 | Metric Learning to Rank | 47 | 17 | 30 | 36.2% |
49d79511 | BuildingSherlock: Fault Management Framework for HVAC Systems in Commercial Buildings | 46 | 32 | 14 | 69.6% |
62f8k8cq | Learning to Traverse Image Manifolds | 46 | 33 | 13 | 71.7% |
9278h2ww | Hardening the NOVA File System | 46 | 26 | 20 | 56.5% |
8969r8tc | Algorithms for manifold learning | 45 | 9 | 36 | 20.0% |
03c092nw | High Resolution Video Playback in Immersive Virtual Environments | 44 | 31 | 13 | 70.5% |
9tq826n1 | Verilogo: Proactive Phishing Detection via Logo Recognition | 44 | 18 | 26 | 40.9% |
7682n2h8 | Estimating Profitability of Alternative Crypto-currencies | 43 | 18 | 25 | 41.9% |
7s6184dq | SAFE: Fast, Verifiable Sanitization for SSDs | 43 | 19 | 24 | 44.2% |
8rx3b221 | New directions in traffic measurement and accounting | 43 | 27 | 16 | 62.8% |
0ks7796c | Services, SOAs and Integration at Scale | 42 | 25 | 17 | 59.5% |
0rg4w4qb | PeopleTones: Exploring Peripheral Cues in the Wild Using Mobile Phones | 42 | 21 | 21 | 50.0% |
1td8x6g5 | Context Based Object Categorization: A Critical Survey | 42 | 26 | 16 | 61.9% |
22t3w1wm | Reproducible User-Level Simulation of Multi-Threaded Workloads | 42 | 34 | 8 | 81.0% |
3v3179bj | Programming Bulk-Incremental Dataflows | 42 | 30 | 12 | 71.4% |
4dt6h2g9 | Uniform Hashing with Multiple Passbits | 42 | 31 | 11 | 73.8% |
65x0x6nv | Automatic Protocol Inference: Unexpected Means of Identifying Protocols | 42 | 31 | 11 | 73.8% |
Disclaimer: due to the evolving nature of the web traffic we receive and the methods we use to collate it, the data presented here should be considered approximate and subject to revision.