Now showing items 347-366 of 1553

    • Designing Persuasively using Playful Elements 

      Wehbe, Rina Renee (University of Waterloo, 2021-09-14)
      Alongside productivity and communication, computers are a valuable tool for diversion and amusement. Game Designers leverage the multifaceted world of computing to create applications that can be developed persuasively; ...
    • Designing Survivable Wavelength Division Multiplexing (WDM) Mesh Networks 

      Haque, Anwar (University of Waterloo, 2007-04-18)
      This thesis focuses on the survivable routing problem in WDM mesh networks where the objective is to minimize the total number of wavelengths used for establishing working and protection paths in the WDM networks. The past ...
    • Desired Features and Design Methodologies of Secure Authenticated Key Exchange Protocols in the Public-Key Infrastructure Setting 

      Wang, Hao-Hsien (University of Waterloo, 2004)
      The importance of an authenticated key exchange (AKE) protocol has long been known in the field of cryptography. Two of the questions still being asked today are (1) what properties or features does a secure AKE ...
    • Detecting Exploitable Vulnerabilities in Android Applications 

      Sankarapandian, Shivasurya (University of Waterloo, 2021-05-27)
      The world is moving towards remote-first and giving rise to many mobile tools and applications to get the work done. As more applications are moving towards the cloud and therefore require remote access, the attack surface ...
    • Detecting Feature-Interaction Hotspots in Automotive Software using Relational Algebra 

      Muscedere, Bryan James (University of Waterloo, 2018-05-14)
      Modern software projects are programmed by multiple teams, consist of millions of lines of code, and are split into separate components that, during runtime, may not be contained in the same process. Due to these complexities, ...
    • Detecting Feature-Interaction Symptoms in Automotive Software Using Lightweight Analysis 

      Muscedere, Bryan J.; Hackman, Robert; Anbarnam, Davood; Atlee, Joanne M.; Davis, Ian J.; Godfrey, Michael W. (IEEE, 2019-02)
      Modern automotive software systems are large, com- plex, and feature rich; they can contain over 100 million lines of code, comprising hundreds of features distributed across multiple electronic control units (ECUs), all ...
    • Detecting Hand-Ball Events in Video 

      Miller, Nicholas (University of Waterloo, 2008-08-27)
      We analyze videos in which a hand interacts with a basketball. In this work, we present a computational system which detects and classifies hand-ball events, given the trajectories of a hand and ball. Our approach is to ...
    • Detecting Network Intrusions from Authentication Logs 

      Bian, Haibo (University of Waterloo, 2019-09-19)
      Recently, network infiltrations due to advanced persistent threats (APTs) have grown significantly, resulting in considerable loses to businesses and organizations. APTs are stealthy attacks with the primary objective of ...
    • Detecting Test Clones with Static Analysis 

      Jain, Divam (University of Waterloo, 2013-09-27)
      Large-scale software systems often have correspondingly complicated test suites, which are diffi cult for developers to construct and maintain. As systems evolve, engineers must update their test suite along with changes ...
    • Detecting Vulnerable JavaScript Libraries in Hybrid Android Applications 

      Volodin, Nikita (University of Waterloo, 2019-02-15)
      Smartphone devices are very popular. There are a lot of devices being sold, a lot of applications that are created and a lot of people using those applications. However, mobile applications could only be created in the ...
    • Detection of Feature Interactions in Automotive Active Safety Features 

      Juarez Dominguez, Alma L. (University of Waterloo, 2012-05-02)
      With the introduction of software into cars, many functions are now realized with reduced cost, weight and energy. The development of these software systems is done in a distributed manner independently by suppliers, ...
    • Determining the Effectiveness of Multi-user, Hybrid, Human-Computer Assessments for High Recall Information Retrieval Systems 

      Alagappan, Solaiappan (University of Waterloo, 2022-08-23)
      Electronic Discovery (eDiscovery), a use-case of High-Recall Information Retrieval (HRIR), seeks to obtain substantially all and only the relevant documents responsive to a request for production in litigation. Applications ...
    • Determining the Utility of Key-term Highlighting for High Recall Information Retrieval Systems 

      Wang, Xue Jun (University of Waterloo, 2021-09-28)
      High-recall information retrieval (HRIR) is an important tool used in tasks such as electronic discovery ("eDiscovery") and systematic review of medical research. Applications of HRIR often uses a human as its oracle to ...
    • Deterministic Unimodularity Certification and Applications for Integer Matrices 

      Pauderis, Colton (University of Waterloo, 2013-09-23)
      The asymptotically fastest algorithms for many linear algebra problems on integer matrices, including solving a system of linear equations and computing the determinant, use high-order lifting. For a square nonsingular ...
    • Dialog Response Generation Using Adversarially Learned Latent Bag-of-Words 

      Khan, Kashif (University of Waterloo, 2020-08-28)
      Dialog response generation is the task of generating response utterance given a query utterance. Apart from generating relevant and coherent responses, one would like the dialog generation model to generate diverse and ...
    • Differential Privacy for Nearest Neighbor Queries 

      Lepert, Emily (University of Waterloo, 2022-08-16)
      We examine the problem of providing differential privacy for nearest neighbor queries. Very few mechanisms exist that achieve this, most notable geo-indistinguishability in the context of location privacy. However it uses ...
    • Differentially Private Learning with Noisy Labels 

      Mohapatra, Shubhankar (University of Waterloo, 2020-05-28)
      Supervised machine learning tasks require large labelled datasets. However, obtaining such datasets is a difficult task and often leads to noisy labels due to human errors or adversarial perturbation. Recent studies have ...
    • Differentially Private Online Aggregation 

      Sivasubramaniam, Harry (University of Waterloo, 2022-01-13)
      Database operations are often performed in batch mode, i.e. the analyst issuing the query must wait till the database has been processed in its entirety before getting feedback. Batch mode is inadequate for large databases ...
    • Differentially Private Searchable Symmetric Encryption Scheme with Configurable Pattern Leakage 

      Shang, Zhiwei (University of Waterloo, 2019-12-19)
      Searchable symmetric encryption (SSE) allows a data owner to outsource its data to a cloud server while maintaining the ability to search over it. Most existing SSE schemes leak access-pattern leakage, and thus are vulnerable ...
    • Differentially Private Simple Genetic Algorithms 

      Humphries, Thomas (University of Waterloo, 2021-12-13)
      We study the differentially private (DP) selection problem, where the goal is to select an item from a set of candidates that approximately maximizes a given objective function. The most common solution to this problem is ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages