Now showing items 1449-1468 of 1551

    • Trifecta: Faster High-throughput Three-party Computation over WAN using Multi-fan-in Logic Gates 

      Faraji, Sina (University of Waterloo, 2022-11-29)
      Multi-party computation (MPC) has been a very active area of research and recent industrial deployments exist. Practical MPC is currently limited to low-latency, high- throughput network setups, i.e., local-area networks ...
    • Trust Region Methods for Training Neural Networks 

      Kinross, Colleen (University of Waterloo, 2017-11-09)
      Artificial feed-forward neural networks (ff-ANNs) serve as powerful machine learning models for supervised classification problems. They have been used to solve problems stretching from natural language processing to ...
    • Trust-based Incentive Mechanisms for Community-based Multiagent Systems 

      Kastidou, Georgia (University of Waterloo, 2010-06-16)
      In this thesis we study peer-based communities which are online communities whose services are provided by their participant agents. In order to improve the services an agent enjoys in these communities, we need to improve ...
    • A Trust-based Message Evaluation and Propagation Framework in Vehicular Ad-Hoc Networks 

      Chen, Chen (University of Waterloo, 2010-01-18)
      In this paper, we propose a trust-based message propagation and evaluation framework to support the effective evaluation of information sent by peers and the immediate control of false information in a VANET. More specifically, ...
    • Turning Open Government Data Portals into Interactive Databases 

      Liu, Chang (University of Waterloo, 2022-09-21)
      The launch of open governmental data portals (OGDPs), such as data.gov, data.gov.in, and open.canada.ca, have popularized the open data movement of the last decade, which now includes numerous other portals from other ...
    • TwitSong: A current events computer poet and the thorny problem of assessment. 

      Lamb, Carolyn (University of Waterloo, 2018-11-29)
      This thesis is driven by the question of how computers can generate poetry, and how that poetry can be evaluated. We survey existing work on computer-generated poetry and interdisciplinary work on how to evaluate this type ...
    • Two Affine Scaling Methods for Solving Optimization Problems Regularized with an L1-norm 

      Li, Zhirong (University of Waterloo, 2010-09-30)
      In finance, the implied volatility surface is plotted against strike price and time to maturity. The shape of this volatility surface can be identified by fitting the model to what is actually observed in the market. The ...
    • Two Coalitional Models for Network Formation and Matching Games 

      Branzei, Simina (University of Waterloo, 2011-08-23)
      This thesis comprises of two separate game theoretic models that fall under the general umbrella of network formation games. The first is a coalitional model of interaction in social networks that is based on the idea ...
    • Two results on words 

      Tan, Shuo (University of Waterloo, 2013-08-30)
      The study of combinatorial patterns of words has raised great interest since the early 20th century. In this master's thesis presentation we study two combinatorial patterns. The first pattern is “abelian k-th power free” ...
    • A Two-Tier Storage Interface for Low-Latency Kubernetes Deployments 

      Ionita, Teodor Alexandru (University of Waterloo, 2022-05-11)
      Orchestration systems are responsible for automating the management of software deployments on computer systems, managing large numbers of machines. Edge computing is a decentralized compute model describing how compute ...
    • A Type System With Containers 

      Thode, Michael (University of Waterloo, 2021-10-04)
      In this thesis, we will introduce the concept of containers as they apply to programming languages. Encapsulation is a common topic in programming languages with well understood benefits. Here, we will investigate its ...
    • UCAnDoModels: A Context-based Model Editor for Editing and Debugging UML Class and State-Machine Diagrams 

      Pourali, Parsa; Atlee, Joanne M. (ACM/IEEE, 2019-09)
      Practitioners face cognitive challenges when using model editors to edit and debug UML models, which make them reluctant to adopt modelling. To assist practitioners in their modelling tasks, we have developed effective ...
    • Unbiased Statistical Estimation and Valid Confidence Intervals Under Differential Privacy 

      Covington, Christian (University of Waterloo, 2022-07-13)
      We present a method for producing unbiased parameter estimates and valid confidence intervals under the constraints of differential privacy, a formal framework for limiting individual information leakage from sensitive ...
    • Unconditionally Secure Cryptography: Signature Schemes, User-Private Information Retrieval, and the Generalized Russian Cards Problem 

      Swanson, Colleen M (University of Waterloo, 2013-05-23)
      We focus on three different types of multi-party cryptographic protocols. The first is in the area of unconditionally secure signature schemes, the goal of which is to provide users the ability to electronically sign ...
    • Unconventional Applications of Compiler Analysis 

      Selby, Jason W. A. (University of Waterloo, 2011-08-30)
      Previously, compiler transformations have primarily focused on minimizing program execution time. This thesis explores some examples of applying compiler technology outside of its original scope. Specifically, ...
    • Understanding and Efficiently Servicing HTTP Streaming Video Workloads 

      Summers, Jim (University of Waterloo, 2016-09-28)
      Live and on-demand video streaming has emerged as the most popular application for the Internet. One reason for this success is the pragmatic decision to use HTTP to deliver video content. However, while all web servers ...
    • Understanding and Enhancing CDCL-based SAT Solvers 

      Zulkoski, Edward (University of Waterloo, 2018-08-02)
      Modern conflict-driven clause-learning (CDCL) Boolean satisfiability (SAT) solvers routinely solve formulas from industrial domains with millions of variables and clauses, despite the Boolean satisfiability problem being ...
    • Understanding Minimax Optimization in Modern Machine Learning 

      Zhang, Guojun (University of Waterloo, 2021-07-21)
      Recent years has seen a surge of interest in building learning machines through adversarial training. One type of adversarial training is through a discriminator or an auxiliary classifier, such as Generative Adversarial ...
    • Understanding Mode and Modality Transfer in Unistroke Gesture Input 

      Henderson, Jay (University of Waterloo, 2021-10-22)
      Unistroke gestures are an attractive input method with an extensive research history, but one challenge with their usage is that the gestures are not always self-revealing. To obtain expertise with these gestures, interaction ...
    • Understanding NUMA Effects on Memory Allocation and Reclamation 

      Kim, Daewoo (University of Waterloo, 2023-04-21)
      Memory management in multicore systems is a well studied area. Many approaches to memory management have been developed and tuned with specific hardware architectures in mind, capitalizing on hardware characteristics to ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages