Browsing Computer Science by Title
Now showing items 489-508 of 1547
-
Evaluating Library Configurations
(University of Waterloo, 2012-06-07)A wide range of libraries are available for a developer to choose from when building a software system, but once the library is chosen, the developer must determine which version of the library to use. Is there some ... -
Evaluating Re-authentication Strategies for Smartphones
(University of Waterloo, 2016-08-04)Re-authenticating users may be necessary for smartphone authentication schemes that leverage user behavior, device context, or task sensitivity. However, due to the unpredictable nature of re-authentication, users may get ... -
Evaluating Singing for Computer Input Using Pitch, Interval and Melody
(University of Waterloo, 2022-09-02)In voice-based interfaces, non-verbal features represent a simple and underutilized design space for hands-free, language-agnostic interactions. This work evaluates the performance of three fundamental types of voice-based ... -
Evaluating the Ability of Commercial Search Engines to Help People Answer Health Questions
(University of Waterloo, 2023-12-18)The act of seeking information pertaining to medical treatments and self-diagnosis is one of the applications of search engines. However online documents and websites offer convenience and efficiency in accessing information, ... -
Evaluating the Effectiveness of Code2Vec for Bug Prediction When Considering That Not All Bugs Are the Same
(University of Waterloo, 2020-09-21)Bug prediction is an area of research focused on predicting where in a software project future bugs will occur. The purpose of bug prediction models is to help companies spend their quality assurance resources more ... -
Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios
(University of Waterloo, 2016-08-10)Smartphones contain a wealth of personal and corporate data. Several surveys have reported that about half of the smartphone owners do not configure primary authentication mechanisms (such as PINs, passwords, and fingerprint- ... -
Evaluating the Speed and Accuracy of Touch Input at the Edge of a Table
(University of Waterloo, 2019-12-11)Tables, desks, and counters are often nearby, motivating their use as interactive surfaces. However, they are typically cluttered with objects. As an alternative, we explore touch input along the 'edge' of table-like ... -
Evaluating Unattended Technology, a Subset of Calm Technology
(University of Waterloo, 2008-09-26)Information is a central theme of the twenty-first century. This is evident in the fact that everyday objects are being augmented to provide information. Thus, ubiquitous computing – providing information using everyday ... -
An Evaluation of Contextual Suggestion
(University of Waterloo, 2014-01-23)This thesis examines techniques that can be used to evaluate systems that solve the complex task of suggesting points of interest to users. A traveller visiting an unfamiliar, foreign city might be looking for a place to ... -
Evaluation of Incentive-compatible Differentiated Scheduling for Packet-switched Networks
(University of Waterloo, 2005)Communication applications have diverse network service requirements. For instance, <em>Voice over IP</em> (VoIP) demands short end-to-end delay, whereas <em>File Transfer Protocol</em> (FTP) benefits more from high ... -
Evaluation of Shortest Path Query Algorithm in Spatial Databases
(University of Waterloo, 2003)Many variations of algorithms for finding the shortest path in a large graph have been introduced recently due to the needs of applications like the Geographic Information System (GIS) or Intelligent Transportation System ... -
Eventual Durability of ACID Transactions in Database Systems
(University of Waterloo, 2023-08-17)Modern database systems that support ACID transactions, and applications built around these databases, may choose to sacrifice transaction durability for performance when they deem it necessary. While this approach may ... -
Evidence Combination in Hidden Markov Models for Gene Prediction
(University of Waterloo, 2005)This thesis introduces new techniques for finding genes in genomic sequences. Genes are regions of a genome encoding proteins of an organism. Identification of genes in a genome is an important step in the annotation ... -
Evidence-based Software Process Recovery
(University of Waterloo, 2010-10-27)Developing a large software system involves many complicated, varied, and inter-dependent tasks, and these tasks are typically implemented using a combination of defined processes, semi-automated tools, and ad hoc practices. ... -
Evolution and Architecture of Open Source Software Collections: A Case Study of Debian
(University of Waterloo, 2012-08-29)Software has been studied at a variety of granularities. Code, classes, groups of classes, programs and finally large scale applications have been examined in detail. What lies beyond is the study of software collections ... -
An Ex-Ante Rational Distributed Resource Allocation System using Transfer of Control Strategies for Preemption with Applications to Emergency Medicine
(University of Waterloo, 2012-08-20)Within the artificial intelligence subfield of multiagent systems, one challenge that arises is determining how to efficiently allocate resources to all agents in a way that maximizes the overall expected utility. In this ... -
Exception Handling in C∀
(University of Waterloo, 2021-10-04)The C∀ (Cforall) programming language is an evolutionary refinement of the C programming language, adding modern programming features without changing the programming paradigms of C. One of these modern programming features ... -
An Experimental Analysis of Multi-Perspective Convolutional Neural Networks
(University of Waterloo, 2018-05-16)Modelling the similarity of sentence pairs is an important problem in natural language processing and information retrieval, with applications in tasks such as paraphrase identification and answer selection in question ... -
Experimental Analysis of Opportunistic Communication for Vehicular Internet Access
(University of Waterloo, 2008-08-18)This thesis examines the problem of using 802.11 hotspots for vehicular Internet access. In this access paradigm, a user in a vehicle performs batch transfers by opportunistically communicating with roadside 802.11 access ... -
Expert System and a Rule Set Development Method for Urban Behaviour Planning
(University of Waterloo, 2020-05-15)Today, autonomous vehicles have the capacity to achieve fully autonomous driving in predefined environments. This ability can be in part attributed to advancements in motion planning, which plans the vehicle’ behaviours ...