Now showing items 2435-2454 of 3027

    • Schema clustering and retrieval for multi-domain pay-as-you-go data intergration systems 

      Mahmoud, Hatem (University of Waterloo, 2010-07-08)
      A data integration system offers a single interface to multiple structured data sources. Many application contexts (e.g., searching structured data on the web) involve the integration of large numbers of structured data ...
    • Score tests based on a finite mixture model of Markov processes under intermittent observation 

      Jiang, Shu; Cook, Richard J. (Wiley, 2019-07-20)
      A mixture model is described, which accommodates different Markov processes governing disease progression in a finite set of latent classes. We give special attention to the setting in which individuals are examined ...
    • Score Tests for Association Under Response-dependent Sampling Designs for Expensive Covariates 

      Lawless, Jerald F. (Oxford Journals, 2015-11-27)
      Response-dependent sampling is widely used in settings where certain variables are expensive to obtain. Estimation has been thoroughly investigated but recent applications have emphasized tests of association for expensive ...
    • Scrappy: Using Scrap Material as Infill to Make Fabrication More Sustainable 

      Wall, Ludwig Wilhelm; Jacobson, Alec; Vogel, Daniel; Schneider, Oliver (ACM Press, 2021-05-06)
      We present a software system for fused deposition modelling 3D printing that replaces infill material with scrap to reduce material and energy consumption. Example scrap objects include unused 3D prints from prototyping ...
    • The search for an excluded minor characterization of ternary Rayleigh matroids 

      Phillips, Stephanie (University of Waterloo, 2008-01-24)
      Rayleigh matroids are a class of matroids with sets of bases that satisfy a strong negative correlation property. Interesting characteristics include the existence of an efficient algorithm for sampling the bases of a ...
    • Second-tier Cache Management to Support DBMS Workloads 

      Li, Xuhui (University of Waterloo, 2011-10-24)
      Enterprise Database Management Systems (DBMS) often run on computers with dedicated storage systems. Their data access requests need to go through two tiers of cache, i.e., a database bufferpool and a storage server cache, ...
    • Secure Protocols for Key Pre-distribution, Network Discovery, and Aggregation in Wireless Sensor Networks 

      Henry, Kevin John (University of Waterloo, 2015-07-21)
      The term sensor network is used to refer to a broad class of networks where several small devices, called sensors, are deployed in order to gather data and report back to one or more base stations. Traditionally, sensors ...
    • Securing Cloud Computations with Oblivious Primitives from Intel SGX 

      Sasy, Sajin (University of Waterloo, 2017-12-12)
      We are witnessing a confluence between applied cryptography and secure hardware systems in enabling secure cloud computing. On one hand, work in applied cryptography has enabled efficient, oblivious data-structures and ...
    • Security Analysis of Isogeny-Based Cryptosystems 

      Leonardi, Christopher (University of Waterloo, 2020-08-20)
      Let $E$ be a supersingular elliptic curve over a finite field. In this document we study public-key encryption schemes which use non-constant rational maps from $E$. The purpose of this study is to determine if such ...
    • A Security Analysis of Some Physical Content Distribution Systems 

      Jiayuan, Sui (University of Waterloo, 2008-05-21)
      Content distribution systems are essentially content protection systems that protect premium multimedia content from being illegally distributed. Physical content distribution systems form a subset of content distribution ...
    • Security and Ownership Verification in Deep Reinforcement Learning 

      Wang, Shelly (University of Waterloo, 2022-07-15)
      Deep reinforcement learning (DRL) has seen many successes in complex tasks such as robot manipulation, autonomous driving, and competitive games. However, there are few studies on the security threats against DRL systems. ...
    • Security and Privacy Analysis of Employee Monitoring Applications 

      Campbell, Adam (University of Waterloo, 2023-08-21)
      Workplace surveillance is not a new issue; however, recently there has been increasing adoption of Employee Monitoring Applications (EMAs) that observe employees' digital behaviour. This trend was advanced by the increase ...
    • Security Configuration Management in Intrusion Detection and Prevention Systems 

      Alsubhi, Khalid (University of Waterloo, 2016-04-18)
      Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against a variety of attacks that can compromise the security and proper functioning of an enterprise information system. IDPSs ...
    • Security Evaluations of GitHub's Copilot 

      Asare, Owura (University of Waterloo, 2023-08-11)
      Code generation tools driven by artificial intelligence have recently become more popular due to advancements in deep learning and natural language processing that have increased their capabilities. The proliferation of ...
    • Security for Rural Public Computing 

      Ur Rahman, Sumair (University of Waterloo, 2008-09-15)
      Current research on securing public computing infrastructure like Internet kiosks has focused on the use of smartphones to establish trust in a computing platform or to offload the processing of sensitive information, and ...
    • Security in Key Agreement: Two-Party Certificateless Schemes 

      Swanson, Colleen Marie (University of Waterloo, 2008-12-22)
      The main goal of cryptography is to enable secure communication over a public channel; often a secret shared among the communicating parties is used to achieve this. The process by which these parties agree on such a shared ...
    • Security Models and Proofs for Key Establishment Protocols 

      Ng, Eddie M. (University of Waterloo, 2005)
      In this thesis we study the problem of secure key establishment, motivated by the construction of secure channels protocols to protect information transmitted over an open network. In the past, the purported security of ...
    • SEEDS: Secure Decentralized Storage for Authentication Material 

      Dukovac, Stefanie (University of Waterloo, 2022-03-03)
      Applications that use passwords or cryptographic keys to authenticate users or perform cryptographic operations rely on centralized solutions. Trusted Platform Modules (TPMs) do not offer a way to replicate material, making ...
    • Selectable Heaps and Their Application to Lazy Search Trees 

      Zhang, Lingyi (University of Waterloo, 2021-04-29)
      We show the O(log n) time extract minimum function of efficient priority queues can be generalized to the extraction of the k smallest elements in O(k log(n/k)) time. We first show the heap-ordered tree selection of Kaplan ...
    • Selected Topics in Variable Annuities 

      Wang, Yumin (University of Waterloo, 2021-06-22)
      Variable annuities are long-term insurance products. They have become one of the most popular savings/investment vehicles over the past two decades due to their flexible investment options, stable long-term guarantees, and ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages