Now showing items 469-488 of 1539

    • Enhancements to Hidden Markov Models for Gene Finding and Other Biological Applications 

      Vinar, Tomas (University of Waterloo, 2005)
      In this thesis, we present enhancements of hidden Markov models for the problem of finding genes in DNA sequences. Genes are the parts of DNA that serve as a template for synthesis of proteins. Thus, gene finding ...
    • Enhancing Data Processing on Clouds with Hadoop/HBase 

      Zhang, Chen (University of Waterloo, 2011-10-12)
      In the current information age, large amounts of data are being generated and accumulated rapidly in various industrial and scientific domains. This imposes important demands on data processing capabilities that can extract ...
    • Entity Matching and Disambiguation Across Multiple Knowledge Graphs 

      Farag, Michael (University of Waterloo, 2019-06-10)
      Knowledge graphs are considered an important representation that lie between free text on one hand and fully-structured relational data on the other. Knowledge graphs are a back-bone of many applications on the Web. With ...
    • Entropy-based aggregate posterior alignment techniques for deterministic autoencoders and implications for adversarial examples 

      Ghose, Amur (University of Waterloo, 2020-08-27)
      We present results obtained in the context of generative neural models — specifically autoencoders — utilizing standard results from coding theory. The methods are fairly elementary in principle, yet, combined with the ...
    • Enumerating Query Plans via Conditional Tableau Interpolation 

      Feng, Eva Hu (University of Waterloo, 2023-04-21)
      Database query optimization studies the problem of finding equivalent and efficient query execution plans for user queries under schema constraints. Logic-based approaches to query optimization leverage automated theorem ...
    • Equality Operators for Constant-weight Codewords with Applications in (Keyword) PIR 

      Akhavan Mahdavi, Rasoul (University of Waterloo, 2021-09-21)
      Homomorphic encryption allows computation to be performed on data while in encrypted form. However, the computational overhead of a circuit that is run using homomorphic encryption depends on the number of multiplications ...
    • Equivalence of Queries with Nested Aggregation 

      DeHaan, David (University of Waterloo, 2009-12-11)
      Query equivalence is a fundamental problem within database theory. The correctness of all forms of logical query rewriting—join minimization, view flattening, rewriting over materialized views, various semantic optimizations ...
    • Erosion, Self-Organization, and Procedural Modeling 

      Pytel, Alexei (University of Waterloo, 2015-01-16)
      Procedural modeling of natural objects such as coastlines and terrains in combination with their characteristic erosion features involves integration of appropriate physical models with the procedural approach and culminates ...
    • Error Correction of Second-Generation Sequencing Reads 

      Marinier, Eric (University of Waterloo, 2014-12-16)
      The introduction of second-generation DNA sequencers has enabled researchers to explore biological information in ways never before possible. These sequencers provide increased throughput over first-generation sequencers ...
    • Error Detection in Number-Theoretic and Algebraic Algorithms 

      Vasiga, Troy Michael John (University of Waterloo, 2008-08-26)
      CPU's are unreliable: at any point in a computation, a bit may be altered with some (small) probability. This probability may seem negligible, but for large calculations (i.e., months of CPU time), the likelihood of an ...
    • Evaluating and Characterizing the Performance of 802.11 Networks 

      Abedi, Ali (University of Waterloo, 2017-09-05)
      The 802.11 standard has become the dominant protocol for Wireless Local Area Networks (WLANs). As an indication of its current and growing popularity, it is estimated that over 20 billion WiFi chipsets will be shipped ...
    • Evaluating and Comparing Generative-based Chatbots Based on Process Requirements 

      Lins dos Santos, Luis Fernando (University of Waterloo, 2023-12-06)
      Business processes refer to the sequences of tasks and information flows needed to achieve a specific goal. Such processes are used in multiple sectors, such as healthcare, manufacturing, banking, among others. They can ...
    • Evaluating Clusterings by Estimating Clarity 

      Whissell, John (University of Waterloo, 2012-10-12)
      In this thesis I examine clustering evaluation, with a subfocus on text clusterings specifically. The principal work of this thesis is the development, analysis, and testing of a new internal clustering quality measure ...
    • Evaluating Deep Learning-based Vulnerability Detection Models on Realistic Datasets 

      Arumugam, Krishna Kanth (University of Waterloo, 2023-05-23)
      The impact of software vulnerabilities on daily-used software systems is alarming. Despite numerous proposed deep learning-based models to automate vulnerability detection, the detection of software vulnerabilities remains ...
    • Evaluating Entity Relationship Recommenders in a Complex Information Retrieval Context 

      Thomas, Jack (University of Waterloo, 2014-05-21)
      Information Retrieval, as a field, has long subscribed to an orthodox evaluation approach known as the Cranfield paradigm. This approach and the assumptions that underpin it have been essential to building the traditional ...
    • Evaluating Information Retrieval Systems With Multiple Non-Expert Assessors 

      Li, Le (University of Waterloo, 2013-08-21)
      Many current test collections require the use of expert judgments during construction. The true label of each document is given by an expert assessor. However, the cost and effort associated with expert training and judging ...
    • Evaluating Library Configurations 

      Oshikoji, Kimiisa (University of Waterloo, 2012-06-07)
      A wide range of libraries are available for a developer to choose from when building a software system, but once the library is chosen, the developer must determine which version of the library to use. Is there some ...
    • Evaluating Re-authentication Strategies for Smartphones 

      Agarwal, Lalit (University of Waterloo, 2016-08-04)
      Re-authenticating users may be necessary for smartphone authentication schemes that leverage user behavior, device context, or task sensitivity. However, due to the unpredictable nature of re-authentication, users may get ...
    • Evaluating Singing for Computer Input Using Pitch, Interval and Melody 

      Zinck, Graeme (University of Waterloo, 2022-09-02)
      In voice-based interfaces, non-verbal features represent a simple and underutilized design space for hands-free, language-agnostic interactions. This work evaluates the performance of three fundamental types of voice-based ...
    • Evaluating the Ability of Commercial Search Engines to Help People Answer Health Questions 

      Setayesh Ghajar, Kamyar (University of Waterloo, 2023-12-18)
      The act of seeking information pertaining to medical treatments and self-diagnosis is one of the applications of search engines. However online documents and websites offer convenience and efficiency in accessing information, ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages