Technical Reports

Parent: Department of Computer Science & Engineering

eScholarship stats: History by Item for April through July, 2024

ItemTitleTotal requests2024-072024-062024-052024-04
1bm0k1w0Preble: Efficient Distributed Prompt Scheduling for LLM Serving998309413276
8dp743qbUbiSketch: Bringing Sketching out of the Closet8154461287423
7b13d6cwRecognizing Cars13632253445
11h2x8khOne Dimensional Knapsack11627292139
00n325f2Approximation Methods for Thin Plate Spline Mappings and Principal Warps11438273217
9cd141mnPlace-Its: Location-Based Reminders on Mobile Phones10230221436
2qm3k10cThe hardness of k-means clustering10026172235
83c3k6jbFast Transient Simulation of Lossy Transmission Lines9731231825
96d3z9qbAccuracy Bounds For The Scaled Bitmap Data Structure7926241217
3wt008fkRotational Position Optimization (RPO) Disk Scheduling7614123119
6ps421k5Dahu: Improved Data Center Multipath Forwarding7431171511
7sb3s217Fulcrum -- An Open-Implementation Approach to Context-Aware Publish / Subscribe7225181019
1405b1bzNetwork Telescopes: Technical Report6718141421
3cq2532hThree Brown Mice: See How They Run67164425
6034x9r2Optimizing the Knapsack Problem672521417
6f6904scCACTI-IO Technical Report67279823
59n9766xThe ActiveClass Project: Experiments in Encouraging Classroom Participation651671527
91p660vvIncremental Sparse Binary Vector Similarity Search in High-Dimensional Space6420151019
4bf9f938ASIC Clouds: Specializing the Datacenter6218121319
4436n65hAPST-DV: Divisible Load Scheduling and Deployment on the Grid592114915
6mj094vkAn Efficient FPGA Implementation of Scalable Matrix Inversion Core using QR Decomposition571761321
3dw2p389Automatic Color Calibration for Large Camera Arrays56218189
13g341vxResource Reclamation in Distributed Hash Tables53272051
0f02d3bmDestroying Flash Memory-Based Storage Devices522012614
6x3149f2Critical-Path Aware Processor Architectures511619412
23v0c369A Diary Study of Mobile Information Needs502261210
51v4s0p7Improving the Speed and Scalability of Distributed Simulations of Sensor Networks502015105
6v11p5b0A Practical Microcylinder Appearance Model for Cloth Rendering46185815
8gc2k3kwAnalysis of Targeted Advertising in Snapchat Political Ads46201412
2cq4b381Metric Learning to Rank44178613
324465dvGullfoss: Accelerating and Simplifying Data Movement among Heterogeneous Computing and Storage Resources42155715
4wm358htNVTM: A Transactional Interface for Next-Generation Non-Volatile Memories41186710
62h3k2mvLearning and Making Decisions When Costs and Probabilities are Both Unknown41166910
7682n2h8Estimating Profitability of Alternative Crypto-currencies41165812
9jh7v86qRandom projection trees and low dimension manifolds411513310
9tq826n1Verilogo: Proactive Phishing Detection via Logo Recognition41202712
3jk5613hDetecting Compromised Routers via Packet Forwarding Behavior40125815
8rx3b221New directions in traffic measurement and accounting39173712
8969r8tcAlgorithms for manifold learning38910415
6082g6mfAlternatives to the k-means algorithm that find better clusterings37814510
0ks7796cServices, SOAs and Integration at Scale33191310
2v29675wA Multiple Level Network Approach for Clock Skew Minimization with Process Variations3319437
7hf8346gCharacterizing Flash Memory: Anomalies, Observations, and Applications33163410
7s92736pSage Algorithms for Knapsack Problem33143511
8h1713t5NetShare: Virtualizing Data Center Networks across Services33172311
9dh0r7hfCAPTCHA-based Image Labeling on the Soylent Grid3372717
7w80w06sRecognizing Groceries in situ Using in vitro Training Data3217582
0fk6869gSorting 100 TB on Google Compute Engine3114746
5b87j38bS2Sim: Smart Grid Swarm Simulator31151213
80n3m1fjEncode-then-encipher encryption: How to exploit nonces or redundacy in plaintexts for efficient cryptography3112928

Disclaimer: due to the evolving nature of the web traffic we receive and the methods we use to collate it, the data presented here should be considered approximate and subject to revision.