Now showing items 1446-1465 of 1551

    • “Transport Me Away”: Fostering Flow in Open Offices through Virtual Reality 

      Ruvimova, Anastasia; Kim, Junhyeok; Fritz, Thomas; Hancock, Mark; Shepherd, David C. (ACM, 2020-04-21)
      Open offices are cost-effective and continue to be popular. However, research shows that these environments, brimming with distractions and sensory overload, frequently hamper productivity. Our research investigates the ...
    • TreeGen: a monotonically impure functional language 

      Hackett, Alistair Finn (University of Waterloo, 2020-08-19)
      We present TreeGen, an impure functional language designed to express, consume, and validate JSON-like documents, as well as generate text files. The language aims to provide a more reliable and flexible way to create ...
    • Triangular Bézier Surfaces with Approximate Continuity 

      Liu, Yingbin (University of Waterloo, 2008-05-15)
      When interpolating a data mesh using triangular Bézier patches, the requirement of C¹ or G¹ continuity imposes strict constraints on the control points of adjacent patches. However, fulfillment of these continuity ...
    • Trifecta: Faster High-throughput Three-party Computation over WAN using Multi-fan-in Logic Gates 

      Faraji, Sina (University of Waterloo, 2022-11-29)
      Multi-party computation (MPC) has been a very active area of research and recent industrial deployments exist. Practical MPC is currently limited to low-latency, high- throughput network setups, i.e., local-area networks ...
    • Trust Region Methods for Training Neural Networks 

      Kinross, Colleen (University of Waterloo, 2017-11-09)
      Artificial feed-forward neural networks (ff-ANNs) serve as powerful machine learning models for supervised classification problems. They have been used to solve problems stretching from natural language processing to ...
    • Trust-based Incentive Mechanisms for Community-based Multiagent Systems 

      Kastidou, Georgia (University of Waterloo, 2010-06-16)
      In this thesis we study peer-based communities which are online communities whose services are provided by their participant agents. In order to improve the services an agent enjoys in these communities, we need to improve ...
    • A Trust-based Message Evaluation and Propagation Framework in Vehicular Ad-Hoc Networks 

      Chen, Chen (University of Waterloo, 2010-01-18)
      In this paper, we propose a trust-based message propagation and evaluation framework to support the effective evaluation of information sent by peers and the immediate control of false information in a VANET. More specifically, ...
    • Turning Open Government Data Portals into Interactive Databases 

      Liu, Chang (University of Waterloo, 2022-09-21)
      The launch of open governmental data portals (OGDPs), such as data.gov, data.gov.in, and open.canada.ca, have popularized the open data movement of the last decade, which now includes numerous other portals from other ...
    • TwitSong: A current events computer poet and the thorny problem of assessment. 

      Lamb, Carolyn (University of Waterloo, 2018-11-29)
      This thesis is driven by the question of how computers can generate poetry, and how that poetry can be evaluated. We survey existing work on computer-generated poetry and interdisciplinary work on how to evaluate this type ...
    • Two Affine Scaling Methods for Solving Optimization Problems Regularized with an L1-norm 

      Li, Zhirong (University of Waterloo, 2010-09-30)
      In finance, the implied volatility surface is plotted against strike price and time to maturity. The shape of this volatility surface can be identified by fitting the model to what is actually observed in the market. The ...
    • Two Coalitional Models for Network Formation and Matching Games 

      Branzei, Simina (University of Waterloo, 2011-08-23)
      This thesis comprises of two separate game theoretic models that fall under the general umbrella of network formation games. The first is a coalitional model of interaction in social networks that is based on the idea ...
    • Two results on words 

      Tan, Shuo (University of Waterloo, 2013-08-30)
      The study of combinatorial patterns of words has raised great interest since the early 20th century. In this master's thesis presentation we study two combinatorial patterns. The first pattern is “abelian k-th power free” ...
    • A Two-Tier Storage Interface for Low-Latency Kubernetes Deployments 

      Ionita, Teodor Alexandru (University of Waterloo, 2022-05-11)
      Orchestration systems are responsible for automating the management of software deployments on computer systems, managing large numbers of machines. Edge computing is a decentralized compute model describing how compute ...
    • A Type System With Containers 

      Thode, Michael (University of Waterloo, 2021-10-04)
      In this thesis, we will introduce the concept of containers as they apply to programming languages. Encapsulation is a common topic in programming languages with well understood benefits. Here, we will investigate its ...
    • UCAnDoModels: A Context-based Model Editor for Editing and Debugging UML Class and State-Machine Diagrams 

      Pourali, Parsa; Atlee, Joanne M. (ACM/IEEE, 2019-09)
      Practitioners face cognitive challenges when using model editors to edit and debug UML models, which make them reluctant to adopt modelling. To assist practitioners in their modelling tasks, we have developed effective ...
    • Unbiased Statistical Estimation and Valid Confidence Intervals Under Differential Privacy 

      Covington, Christian (University of Waterloo, 2022-07-13)
      We present a method for producing unbiased parameter estimates and valid confidence intervals under the constraints of differential privacy, a formal framework for limiting individual information leakage from sensitive ...
    • Unconditionally Secure Cryptography: Signature Schemes, User-Private Information Retrieval, and the Generalized Russian Cards Problem 

      Swanson, Colleen M (University of Waterloo, 2013-05-23)
      We focus on three different types of multi-party cryptographic protocols. The first is in the area of unconditionally secure signature schemes, the goal of which is to provide users the ability to electronically sign ...
    • Unconventional Applications of Compiler Analysis 

      Selby, Jason W. A. (University of Waterloo, 2011-08-30)
      Previously, compiler transformations have primarily focused on minimizing program execution time. This thesis explores some examples of applying compiler technology outside of its original scope. Specifically, ...
    • Understanding and Efficiently Servicing HTTP Streaming Video Workloads 

      Summers, Jim (University of Waterloo, 2016-09-28)
      Live and on-demand video streaming has emerged as the most popular application for the Internet. One reason for this success is the pragmatic decision to use HTTP to deliver video content. However, while all web servers ...
    • Understanding and Enhancing CDCL-based SAT Solvers 

      Zulkoski, Edward (University of Waterloo, 2018-08-02)
      Modern conflict-driven clause-learning (CDCL) Boolean satisfiability (SAT) solvers routinely solve formulas from industrial domains with millions of variables and clauses, despite the Boolean satisfiability problem being ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages