Technical Reports
Parent: Department of Computer Science & Engineering
eScholarship stats: History by Item for April through July, 2024
Item | Title | Total requests | 2024-07 | 2024-06 | 2024-05 | 2024-04 |
---|---|---|---|---|---|---|
1bm0k1w0 | Preble: Efficient Distributed Prompt Scheduling for LLM Serving | 998 | 309 | 413 | 276 | |
8dp743qb | UbiSketch: Bringing Sketching out of the Closet | 815 | 44 | 61 | 287 | 423 |
7b13d6cw | Recognizing Cars | 136 | 32 | 25 | 34 | 45 |
11h2x8kh | One Dimensional Knapsack | 116 | 27 | 29 | 21 | 39 |
00n325f2 | Approximation Methods for Thin Plate Spline Mappings and Principal Warps | 114 | 38 | 27 | 32 | 17 |
9cd141mn | Place-Its: Location-Based Reminders on Mobile Phones | 102 | 30 | 22 | 14 | 36 |
2qm3k10c | The hardness of k-means clustering | 100 | 26 | 17 | 22 | 35 |
83c3k6jb | Fast Transient Simulation of Lossy Transmission Lines | 97 | 31 | 23 | 18 | 25 |
96d3z9qb | Accuracy Bounds For The Scaled Bitmap Data Structure | 79 | 26 | 24 | 12 | 17 |
3wt008fk | Rotational Position Optimization (RPO) Disk Scheduling | 76 | 14 | 12 | 31 | 19 |
6ps421k5 | Dahu: Improved Data Center Multipath Forwarding | 74 | 31 | 17 | 15 | 11 |
7sb3s217 | Fulcrum -- An Open-Implementation Approach to Context-Aware Publish / Subscribe | 72 | 25 | 18 | 10 | 19 |
1405b1bz | Network Telescopes: Technical Report | 67 | 18 | 14 | 14 | 21 |
3cq2532h | Three Brown Mice: See How They Run | 67 | 16 | 44 | 2 | 5 |
6034x9r2 | Optimizing the Knapsack Problem | 67 | 25 | 21 | 4 | 17 |
6f6904sc | CACTI-IO Technical Report | 67 | 27 | 9 | 8 | 23 |
59n9766x | The ActiveClass Project: Experiments in Encouraging Classroom Participation | 65 | 16 | 7 | 15 | 27 |
91p660vv | Incremental Sparse Binary Vector Similarity Search in High-Dimensional Space | 64 | 20 | 15 | 10 | 19 |
4bf9f938 | ASIC Clouds: Specializing the Datacenter | 62 | 18 | 12 | 13 | 19 |
4436n65h | APST-DV: Divisible Load Scheduling and Deployment on the Grid | 59 | 21 | 14 | 9 | 15 |
6mj094vk | An Efficient FPGA Implementation of Scalable Matrix Inversion Core using QR Decomposition | 57 | 17 | 6 | 13 | 21 |
3dw2p389 | Automatic Color Calibration for Large Camera Arrays | 56 | 21 | 8 | 18 | 9 |
13g341vx | Resource Reclamation in Distributed Hash Tables | 53 | 27 | 20 | 5 | 1 |
0f02d3bm | Destroying Flash Memory-Based Storage Devices | 52 | 20 | 12 | 6 | 14 |
6x3149f2 | Critical-Path Aware Processor Architectures | 51 | 16 | 19 | 4 | 12 |
23v0c369 | A Diary Study of Mobile Information Needs | 50 | 22 | 6 | 12 | 10 |
51v4s0p7 | Improving the Speed and Scalability of Distributed Simulations of Sensor Networks | 50 | 20 | 15 | 10 | 5 |
6v11p5b0 | A Practical Microcylinder Appearance Model for Cloth Rendering | 46 | 18 | 5 | 8 | 15 |
8gc2k3kw | Analysis of Targeted Advertising in Snapchat Political Ads | 46 | 20 | 14 | 12 | |
2cq4b381 | Metric Learning to Rank | 44 | 17 | 8 | 6 | 13 |
324465dv | Gullfoss: Accelerating and Simplifying Data Movement among Heterogeneous Computing and Storage Resources | 42 | 15 | 5 | 7 | 15 |
4wm358ht | NVTM: A Transactional Interface for Next-Generation Non-Volatile Memories | 41 | 18 | 6 | 7 | 10 |
62h3k2mv | Learning and Making Decisions When Costs and Probabilities are Both Unknown | 41 | 16 | 6 | 9 | 10 |
7682n2h8 | Estimating Profitability of Alternative Crypto-currencies | 41 | 16 | 5 | 8 | 12 |
9jh7v86q | Random projection trees and low dimension manifolds | 41 | 15 | 13 | 3 | 10 |
9tq826n1 | Verilogo: Proactive Phishing Detection via Logo Recognition | 41 | 20 | 2 | 7 | 12 |
3jk5613h | Detecting Compromised Routers via Packet Forwarding Behavior | 40 | 12 | 5 | 8 | 15 |
8rx3b221 | New directions in traffic measurement and accounting | 39 | 17 | 3 | 7 | 12 |
8969r8tc | Algorithms for manifold learning | 38 | 9 | 10 | 4 | 15 |
6082g6mf | Alternatives to the k-means algorithm that find better clusterings | 37 | 8 | 14 | 5 | 10 |
0ks7796c | Services, SOAs and Integration at Scale | 33 | 19 | 1 | 3 | 10 |
2v29675w | A Multiple Level Network Approach for Clock Skew Minimization with Process Variations | 33 | 19 | 4 | 3 | 7 |
7hf8346g | Characterizing Flash Memory: Anomalies, Observations, and Applications | 33 | 16 | 3 | 4 | 10 |
7s92736p | Sage Algorithms for Knapsack Problem | 33 | 14 | 3 | 5 | 11 |
8h1713t5 | NetShare: Virtualizing Data Center Networks across Services | 33 | 17 | 2 | 3 | 11 |
9dh0r7hf | CAPTCHA-based Image Labeling on the Soylent Grid | 33 | 7 | 2 | 7 | 17 |
7w80w06s | Recognizing Groceries in situ Using in vitro Training Data | 32 | 17 | 5 | 8 | 2 |
0fk6869g | Sorting 100 TB on Google Compute Engine | 31 | 14 | 7 | 4 | 6 |
5b87j38b | S2Sim: Smart Grid Swarm Simulator | 31 | 15 | 1 | 2 | 13 |
80n3m1fj | Encode-then-encipher encryption: How to exploit nonces or redundacy in plaintexts for efficient cryptography | 31 | 12 | 9 | 2 | 8 |
Disclaimer: due to the evolving nature of the web traffic we receive and the methods we use to collate it, the data presented here should be considered approximate and subject to revision.