Browsing Computer Science by Title
Now showing items 487-506 of 1570
-
Evaluating and Comparing Generative-based Chatbots Based on Process Requirements
(University of Waterloo, 2023-12-06)Business processes refer to the sequences of tasks and information flows needed to achieve a specific goal. Such processes are used in multiple sectors, such as healthcare, manufacturing, banking, among others. They can ... -
Evaluating Clusterings by Estimating Clarity
(University of Waterloo, 2012-10-12)In this thesis I examine clustering evaluation, with a subfocus on text clusterings specifically. The principal work of this thesis is the development, analysis, and testing of a new internal clustering quality measure ... -
Evaluating Deep Learning-based Vulnerability Detection Models on Realistic Datasets
(University of Waterloo, 2023-05-23)The impact of software vulnerabilities on daily-used software systems is alarming. Despite numerous proposed deep learning-based models to automate vulnerability detection, the detection of software vulnerabilities remains ... -
Evaluating Entity Relationship Recommenders in a Complex Information Retrieval Context
(University of Waterloo, 2014-05-21)Information Retrieval, as a field, has long subscribed to an orthodox evaluation approach known as the Cranfield paradigm. This approach and the assumptions that underpin it have been essential to building the traditional ... -
Evaluating Information Retrieval Systems With Multiple Non-Expert Assessors
(University of Waterloo, 2013-08-21)Many current test collections require the use of expert judgments during construction. The true label of each document is given by an expert assessor. However, the cost and effort associated with expert training and judging ... -
Evaluating Library Configurations
(University of Waterloo, 2012-06-07)A wide range of libraries are available for a developer to choose from when building a software system, but once the library is chosen, the developer must determine which version of the library to use. Is there some ... -
Evaluating Re-authentication Strategies for Smartphones
(University of Waterloo, 2016-08-04)Re-authenticating users may be necessary for smartphone authentication schemes that leverage user behavior, device context, or task sensitivity. However, due to the unpredictable nature of re-authentication, users may get ... -
Evaluating Singing for Computer Input Using Pitch, Interval and Melody
(University of Waterloo, 2022-09-02)In voice-based interfaces, non-verbal features represent a simple and underutilized design space for hands-free, language-agnostic interactions. This work evaluates the performance of three fundamental types of voice-based ... -
Evaluating the Ability of Commercial Search Engines to Help People Answer Health Questions
(University of Waterloo, 2023-12-18)The act of seeking information pertaining to medical treatments and self-diagnosis is one of the applications of search engines. However online documents and websites offer convenience and efficiency in accessing information, ... -
Evaluating the Effectiveness of Code2Vec for Bug Prediction When Considering That Not All Bugs Are the Same
(University of Waterloo, 2020-09-21)Bug prediction is an area of research focused on predicting where in a software project future bugs will occur. The purpose of bug prediction models is to help companies spend their quality assurance resources more ... -
Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios
(University of Waterloo, 2016-08-10)Smartphones contain a wealth of personal and corporate data. Several surveys have reported that about half of the smartphone owners do not configure primary authentication mechanisms (such as PINs, passwords, and fingerprint- ... -
Evaluating the Speed and Accuracy of Touch Input at the Edge of a Table
(University of Waterloo, 2019-12-11)Tables, desks, and counters are often nearby, motivating their use as interactive surfaces. However, they are typically cluttered with objects. As an alternative, we explore touch input along the 'edge' of table-like ... -
Evaluating Unattended Technology, a Subset of Calm Technology
(University of Waterloo, 2008-09-26)Information is a central theme of the twenty-first century. This is evident in the fact that everyday objects are being augmented to provide information. Thus, ubiquitous computing – providing information using everyday ... -
An Evaluation of Contextual Suggestion
(University of Waterloo, 2014-01-23)This thesis examines techniques that can be used to evaluate systems that solve the complex task of suggesting points of interest to users. A traveller visiting an unfamiliar, foreign city might be looking for a place to ... -
Evaluation of Incentive-compatible Differentiated Scheduling for Packet-switched Networks
(University of Waterloo, 2005)Communication applications have diverse network service requirements. For instance, <em>Voice over IP</em> (VoIP) demands short end-to-end delay, whereas <em>File Transfer Protocol</em> (FTP) benefits more from high ... -
Evaluation of Shortest Path Query Algorithm in Spatial Databases
(University of Waterloo, 2003)Many variations of algorithms for finding the shortest path in a large graph have been introduced recently due to the needs of applications like the Geographic Information System (GIS) or Intelligent Transportation System ... -
Eventual Durability of ACID Transactions in Database Systems
(University of Waterloo, 2023-08-17)Modern database systems that support ACID transactions, and applications built around these databases, may choose to sacrifice transaction durability for performance when they deem it necessary. While this approach may ... -
Eventually Durable State Machines
(University of Waterloo, 2024-07-05)Typically, applications are designed to guarantee durability of the data they store. Durability is achieved by replicating client write requests to multiple machines. This replication adds to the time it takes for the ... -
Evidence Combination in Hidden Markov Models for Gene Prediction
(University of Waterloo, 2005)This thesis introduces new techniques for finding genes in genomic sequences. Genes are regions of a genome encoding proteins of an organism. Identification of genes in a genome is an important step in the annotation ... -
Evidence-based Software Process Recovery
(University of Waterloo, 2010-10-27)Developing a large software system involves many complicated, varied, and inter-dependent tasks, and these tasks are typically implemented using a combination of defined processes, semi-automated tools, and ad hoc practices. ...