Now showing items 9743-9762 of 18674

    • The k-best paths in Hidden Markov Models. Algorithms and Applications to Transmembrane Protein Topology Recognition. 

      Golod, Daniil (University of Waterloo, 2009-08-26)
      Traditional algorithms for hidden Markov model decoding seek to maximize either the probability of a state path or the number of positions of a sequence assigned to the correct state. These algorithms provide only a ...
    • A k-Conjugacy Class Problem 

      Roberts, Collin (University of Waterloo, 2007-09-07)
      In any group G, we may extend the definition of the conjugacy class of an element to the conjugacy class of a k-tuple, for a positive integer k. When k = 2, we are forming the conjugacy classes of ordered pairs, when k ...
    • k-Connectedness and k-Factors in the Semi-Random Graph Process 

      Koerts, Hidde (University of Waterloo, 2022-12-20)
      The semi-random graph process is a single-player graph game where the player is initially presented an edgeless graph with n vertices. In each round, the player is offered a vertex u uniformly at random and subsequently ...
    • K-theory for C*-Algebras and for Topological Spaces 

      Xiao, Rui Philip (University of Waterloo, 2015-04-27)
      K-theory is the study of a collection of abelian groups that are invariant to C*-algebras or to locally compact Hausdorff spaces. These groups are useful for distinguishing C*-algebras and topological spaces, and they are ...
    • Kalman Filter Based Sensor Placement For Burgers Equation 

      Zonov, Stanislav (University of Waterloo, 2019-06-03)
      The algorithm used for determining sensor placement in this thesis will be based on the Kalman filter. This filter is very famous and its application are numerous - some examples include aircraft navigation, finance and ...
    • Kampung Resilience: Mitigating threats of eviction in Kampung Muara Baru 

      D'Sa, Dhisana (University of Waterloo, 2023-01-25)
      The following research investigates the National Capital Integrated Coastal Development (NCICD) master plan within the context of Muara Baru, Jakarta, as a neo-colonial practice that threatens to displace marginalized urban ...
    • Keeping it simple. Short stories written by the young generation in post-war Germany. 

      Baumann, Julia (University of Waterloo, 2017-08-30)
      This thesis deals with selected short stories written by the so-called “young generation” in post-war Germany. To emphasize the importance of the historical, social and political background for the popularity of the short ...
    • Keeping Up With the Joneses: Electricity Consumption, Publicity and Social Network Influence in Milton, Ontario 

      Deline, Mary Elizabeth (University of Waterloo, 2010-05-21)
      Abstract This study used an exploratory research focus to investigate if making electricity consumption public and subject to social norms and networks resulted in consumption decreases for households in Milton, Ontario. ...
    • Kernel Methods and Measures for Classification with Transparency, Interpretability and Accuracy in Health Care 

      Carrington, André (University of Waterloo, 2018-09-05)
      Support vector machines are a popular method in machine learning. They learn from data about a subject, for example, lung tumors in a set of patients, to classify new data, such as, a new patient’s tumor. The new tumor is ...
    • Kernel Methods in Computer-Aided Constructive Drug Design 

      Wong, William Wai Lun (University of Waterloo, 2009-05-14)
      A drug is typically a small molecule that interacts with the binding site of some target protein. Drug design involves the optimization of this interaction so that the drug effectively binds with the target protein while ...
    • Kernel- vs. User-Level Networking: A Ballad of Interrupts and How to Mitigate Them 

      Cai, Peter (University of Waterloo, 2023-07-06)
      Networking performance has become especially important in the current age with growing demands on services over the Internet. Recent advances in network controllers has exposed bottlenecks in various parts of network ...
    • Kernelized Supervised Dictionary Learning 

      Jabbarzadeh Gangeh, Mehrdad (University of Waterloo, 2013-04-25)
      The representation of a signal using a learned dictionary instead of predefined operators, such as wavelets, has led to state-of-the-art results in various applications such as denoising, texture analysis, and face ...
    • Key Agreement over Wiretap Models with Non-Causal Side Information 

      Zibaeenejad, Ali (University of Waterloo, 2012-06-20)
      The security of information is an indispensable element of a communication system when transmitted signals are vulnerable to eavesdropping. This issue is a challenging problem in a wireless network as propagated signals ...
    • Key Compression for Isogeny-Based Cryptosystems 

      Leonardi, Christopher (University of Waterloo, 2016-04-21)
      We present a method for key compression in quantum-resistant isogeny-based cryptosystems, which reduces storage and transmission costs of per-party public information by a factor of two, with no effect on the security level ...
    • Key establishment --- security models, protocols and usage 

      Ustaoglu, Berkant (University of Waterloo, 2008-07-30)
      Key establishment is the process whereby two or more parties derive a shared secret, typically used for subsequent confidential communication. However, identifying the exact security requirements for key establishment ...
    • Key Principles for Indigenous and non-Indigenous Collaborative Impact Assessment in Canada 

      Pfeffer, Jordan Elizabeth (University of Waterloo, 2022-11-07)
      Impact assessment (IA) is an influential planning tool used to evaluate the potential effects, benefits, and risks of project-level resource development. Indigenous peoples are often disproportionately affected by the ...
    • Key Randomization Countermeasures to Power Analysis Attacks on Elliptic Curve Cryptosystems 

      Ebeid, Nevine Maurice (University of Waterloo, 2007-04-25)
      It is essential to secure the implementation of cryptosystems in embedded devices agains side-channel attacks. Namely, in order to resist differential (DPA) attacks, randomization techniques should be employed to ...
    • Keyframe-based monocular SLAM: design, survey, and future directions 

      Younes, Georges; Asmar, Daniel; Shammas, Elie; Zelek, John (Elsevier, 2017-12-01)
      Extensive research in the field of monocular SLAM for the past fifteen years has yielded workable systems that found their way into various applications in robotics and augmented reality. Although filter-based monocular ...
    • The Keystone XL Pipeline Dispute: A Strategic Analysis 

      Payganeh, Sevda (University of Waterloo, 2013-09-03)
      TransCanada Corporation has proposed the Keystone XL pipeline project to transfer crude bitumen from the oil sand fields in northern Alberta, Canada, to oil refineries located in the southern part of the United States. ...
    • KG-Pipeline: An Automated Knowledge Graph Generation Framework 

      Vezvaei, Alireza (University of Waterloo, 2022-09-16)
      Knowledge Graphs (KGs) have many applications, specifically in information retrieval and question answering. Community projects are conducted for building large-scale KGs with crowdsourcing, but building KGs with this ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages