Now showing items 1233-1252 of 1567

    • Scalable Scientific Computing Algorithms Using MapReduce 

      Xiang, Jingen (University of Waterloo, 2013-09-03)
      Cloud computing systems, like MapReduce and Pregel, provide a scalable and fault tolerant environment for running computations at massive scale. However, these systems are designed primarily for data intensive computational ...
    • Scaling Machine Learning Data Repair Systems for Sparse Datasets 

      Attia, Omar (University of Waterloo, 2021-01-21)
      Machine learning data repair systems (e.g. HoloClean) have achieved state-of-the-art performance for the data repair problem on many datasets. However, these systems face significant challenges with sparse datasets. In ...
    • Scalpel: Optimizing Query Streams Using Semantic Prefetching 

      Bowman, Ivan (University of Waterloo, 2005)
      Client applications submit streams of relational queries to database servers. For simple requests, inter-process communication costs account for a significant portion of user-perceived latency. This trend increases ...
    • Schema clustering and retrieval for multi-domain pay-as-you-go data intergration systems 

      Mahmoud, Hatem (University of Waterloo, 2010-07-08)
      A data integration system offers a single interface to multiple structured data sources. Many application contexts (e.g., searching structured data on the web) involve the integration of large numbers of structured data ...
    • Scrappy: Using Scrap Material as Infill to Make Fabrication More Sustainable 

      Wall, Ludwig Wilhelm; Jacobson, Alec; Vogel, Daniel; Schneider, Oliver (ACM Press, 2021-05-06)
      We present a software system for fused deposition modelling 3D printing that replaces infill material with scrap to reduce material and energy consumption. Example scrap objects include unused 3D prints from prototyping ...
    • Second-tier Cache Management to Support DBMS Workloads 

      Li, Xuhui (University of Waterloo, 2011-10-24)
      Enterprise Database Management Systems (DBMS) often run on computers with dedicated storage systems. Their data access requests need to go through two tiers of cache, i.e., a database bufferpool and a storage server cache, ...
    • Secure Protocols for Key Pre-distribution, Network Discovery, and Aggregation in Wireless Sensor Networks 

      Henry, Kevin John (University of Waterloo, 2015-07-21)
      The term sensor network is used to refer to a broad class of networks where several small devices, called sensors, are deployed in order to gather data and report back to one or more base stations. Traditionally, sensors ...
    • Securing Cloud Computations with Oblivious Primitives from Intel SGX 

      Sasy, Sajin (University of Waterloo, 2017-12-12)
      We are witnessing a confluence between applied cryptography and secure hardware systems in enabling secure cloud computing. On one hand, work in applied cryptography has enabled efficient, oblivious data-structures and ...
    • A Security Analysis of Some Physical Content Distribution Systems 

      Jiayuan, Sui (University of Waterloo, 2008-05-21)
      Content distribution systems are essentially content protection systems that protect premium multimedia content from being illegally distributed. Physical content distribution systems form a subset of content distribution ...
    • Security and Ownership Verification in Deep Reinforcement Learning 

      Wang, Shelly (University of Waterloo, 2022-07-15)
      Deep reinforcement learning (DRL) has seen many successes in complex tasks such as robot manipulation, autonomous driving, and competitive games. However, there are few studies on the security threats against DRL systems. ...
    • Security and Privacy Analysis of Employee Monitoring Applications 

      Campbell, Adam (University of Waterloo, 2023-08-21)
      Workplace surveillance is not a new issue; however, recently there has been increasing adoption of Employee Monitoring Applications (EMAs) that observe employees' digital behaviour. This trend was advanced by the increase ...
    • Security Configuration Management in Intrusion Detection and Prevention Systems 

      Alsubhi, Khalid (University of Waterloo, 2016-04-18)
      Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against a variety of attacks that can compromise the security and proper functioning of an enterprise information system. IDPSs ...
    • Security Evaluations of GitHub's Copilot 

      Asare, Owura (University of Waterloo, 2023-08-11)
      Code generation tools driven by artificial intelligence have recently become more popular due to advancements in deep learning and natural language processing that have increased their capabilities. The proliferation of ...
    • Security for Rural Public Computing 

      Ur Rahman, Sumair (University of Waterloo, 2008-09-15)
      Current research on securing public computing infrastructure like Internet kiosks has focused on the use of smartphones to establish trust in a computing platform or to offload the processing of sensitive information, and ...
    • SEEDS: Secure Decentralized Storage for Authentication Material 

      Dukovac, Stefanie (University of Waterloo, 2022-03-03)
      Applications that use passwords or cryptographic keys to authenticate users or perform cryptographic operations rely on centralized solutions. Trusted Platform Modules (TPMs) do not offer a way to replicate material, making ...
    • Selectable Heaps and Their Application to Lazy Search Trees 

      Zhang, Lingyi (University of Waterloo, 2021-04-29)
      We show the O(log n) time extract minimum function of efficient priority queues can be generalized to the extraction of the k smallest elements in O(k log(n/k)) time. We first show the heap-ordered tree selection of Kaplan ...
    • Selective Flooding in Ad Hoc Networks 

      Iu, Ming-Yee (University of Waterloo, 2002)
      An ad hoc network is a collection of mobile wireless devices that cooperate with each other to route packets amongst themselves. The main difficulty in designing routing algorithms for such a network is the large number ...
    • A Self-Management Approach to Configuring Wireless Infrastructure Networks 

      Ahmed, Nabeel (University of Waterloo, 2006)
      Wireless infrastructure networks provide high-speed wireless connectivity over a small geographical area. The rapid proliferation of such networks makes their management not only more important but also more difficult. ...
    • Self-supervised Video Representation Learning by Exploiting Video Speed Changes 

      Chen, Lizhe (University of Waterloo, 2022-04-29)
      In recent research, the self-supervised video representation learning methods have achieved improvement by exploring video’s temporal properties, such as playing speeds and temporal order. These works inspire us to exploit ...
    • Semantic code search using Code2Vec: A bag-of-paths model 

      Arumugam, Lakshmanan (University of Waterloo, 2020-05-14)
      The world is moving towards an age centered around digital artifacts created by individuals, not only are the digital artifacts being created at an alarming rate, also the software to manage such artifacts is increasing ...


      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages