Now showing items 487-506 of 1570

    • Evaluating and Comparing Generative-based Chatbots Based on Process Requirements 

      Lins dos Santos, Luis Fernando (University of Waterloo, 2023-12-06)
      Business processes refer to the sequences of tasks and information flows needed to achieve a specific goal. Such processes are used in multiple sectors, such as healthcare, manufacturing, banking, among others. They can ...
    • Evaluating Clusterings by Estimating Clarity 

      Whissell, John (University of Waterloo, 2012-10-12)
      In this thesis I examine clustering evaluation, with a subfocus on text clusterings specifically. The principal work of this thesis is the development, analysis, and testing of a new internal clustering quality measure ...
    • Evaluating Deep Learning-based Vulnerability Detection Models on Realistic Datasets 

      Arumugam, Krishna Kanth (University of Waterloo, 2023-05-23)
      The impact of software vulnerabilities on daily-used software systems is alarming. Despite numerous proposed deep learning-based models to automate vulnerability detection, the detection of software vulnerabilities remains ...
    • Evaluating Entity Relationship Recommenders in a Complex Information Retrieval Context 

      Thomas, Jack (University of Waterloo, 2014-05-21)
      Information Retrieval, as a field, has long subscribed to an orthodox evaluation approach known as the Cranfield paradigm. This approach and the assumptions that underpin it have been essential to building the traditional ...
    • Evaluating Information Retrieval Systems With Multiple Non-Expert Assessors 

      Li, Le (University of Waterloo, 2013-08-21)
      Many current test collections require the use of expert judgments during construction. The true label of each document is given by an expert assessor. However, the cost and effort associated with expert training and judging ...
    • Evaluating Library Configurations 

      Oshikoji, Kimiisa (University of Waterloo, 2012-06-07)
      A wide range of libraries are available for a developer to choose from when building a software system, but once the library is chosen, the developer must determine which version of the library to use. Is there some ...
    • Evaluating Re-authentication Strategies for Smartphones 

      Agarwal, Lalit (University of Waterloo, 2016-08-04)
      Re-authenticating users may be necessary for smartphone authentication schemes that leverage user behavior, device context, or task sensitivity. However, due to the unpredictable nature of re-authentication, users may get ...
    • Evaluating Singing for Computer Input Using Pitch, Interval and Melody 

      Zinck, Graeme (University of Waterloo, 2022-09-02)
      In voice-based interfaces, non-verbal features represent a simple and underutilized design space for hands-free, language-agnostic interactions. This work evaluates the performance of three fundamental types of voice-based ...
    • Evaluating the Ability of Commercial Search Engines to Help People Answer Health Questions 

      Setayesh Ghajar, Kamyar (University of Waterloo, 2023-12-18)
      The act of seeking information pertaining to medical treatments and self-diagnosis is one of the applications of search engines. However online documents and websites offer convenience and efficiency in accessing information, ...
    • Evaluating the Effectiveness of Code2Vec for Bug Prediction When Considering That Not All Bugs Are the Same 

      Baron, Kilby (University of Waterloo, 2020-09-21)
      Bug prediction is an area of research focused on predicting where in a software project future bugs will occur. The purpose of bug prediction models is to help companies spend their quality assurance resources more ...
    • Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios 

      Khan, Hassan (University of Waterloo, 2016-08-10)
      Smartphones contain a wealth of personal and corporate data. Several surveys have reported that about half of the smartphone owners do not configure primary authentication mechanisms (such as PINs, passwords, and fingerprint- ...
    • Evaluating the Speed and Accuracy of Touch Input at the Edge of a Table 

      Joshi, Nikhita (University of Waterloo, 2019-12-11)
      Tables, desks, and counters are often nearby, motivating their use as interactive surfaces. However, they are typically cluttered with objects. As an alternative, we explore touch input along the 'edge' of table-like ...
    • Evaluating Unattended Technology, a Subset of Calm Technology 

      Levin, Vladimir (University of Waterloo, 2008-09-26)
      Information is a central theme of the twenty-first century. This is evident in the fact that everyday objects are being augmented to provide information. Thus, ubiquitous computing – providing information using everyday ...
    • An Evaluation of Contextual Suggestion 

      Dean-Hall, Adriel (University of Waterloo, 2014-01-23)
      This thesis examines techniques that can be used to evaluate systems that solve the complex task of suggesting points of interest to users. A traveller visiting an unfamiliar, foreign city might be looking for a place to ...
    • Evaluation of Incentive-compatible Differentiated Scheduling for Packet-switched Networks 

      Lin, Yunfeng (University of Waterloo, 2005)
      Communication applications have diverse network service requirements. For instance, <em>Voice over IP</em> (VoIP) demands short end-to-end delay, whereas <em>File Transfer Protocol</em> (FTP) benefits more from high ...
    • Evaluation of Shortest Path Query Algorithm in Spatial Databases 

      Lim, Heechul (University of Waterloo, 2003)
      Many variations of algorithms for finding the shortest path in a large graph have been introduced recently due to the needs of applications like the Geographic Information System (GIS) or Intelligent Transportation System ...
    • Eventual Durability of ACID Transactions in Database Systems 

      Kashi, Tejasvi (University of Waterloo, 2023-08-17)
      Modern database systems that support ACID transactions, and applications built around these databases, may choose to sacrifice transaction durability for performance when they deem it necessary. While this approach may ...
    • Eventually Durable State Machines 

      Kathuria, Kriti (University of Waterloo, 2024-07-05)
      Typically, applications are designed to guarantee durability of the data they store. Durability is achieved by replicating client write requests to multiple machines. This replication adds to the time it takes for the ...
    • Evidence Combination in Hidden Markov Models for Gene Prediction 

      Brejova, Bronislava (University of Waterloo, 2005)
      This thesis introduces new techniques for finding genes in genomic sequences. Genes are regions of a genome encoding proteins of an organism. Identification of genes in a genome is an important step in the annotation ...
    • Evidence-based Software Process Recovery 

      Hindle, Abram (University of Waterloo, 2010-10-27)
      Developing a large software system involves many complicated, varied, and inter-dependent tasks, and these tasks are typically implemented using a combination of defined processes, semi-automated tools, and ad hoc practices. ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages