Now showing items 614-633 of 1547

    • Graph-Based Spatial-Temporal Cluster Evolution: Representation, Analysis, and Implementation 

      da Silva Portugal, Ivens (University of Waterloo, 2023-08-28)
      Spatial-temporal data are information about real-world entities that exist in a location, the spatial dimension, and during a period of time, the temporal dimension. These real-world entities, such as vehicles, people, or ...
    • Graph-theoretic Properties of Control Flow Graphs and Applications 

      Kumar, Neeraj (University of Waterloo, 2015-08-25)
      This thesis deals with determining appropriate width parameters of control flow graphs so that certain computationally hard problems of practical interest become efficiently solvable. A well-known result of Thorup states ...
    • GraphflowDB: Scalable Query Processing on Graph-Structured Relations 

      Mhedhbi, Amine (University of Waterloo, 2023-10-02)
      Finding patterns over graph-structured datasets is ubiquitous and integral to a wide range of analytical applications, e.g., recommendation and fraud detection. When expressed in the high-level query languages of database ...
    • Grey Level Visual Cryptography for General Access Structures 

      MacPherson, Lesley (University of Waterloo, 2002)
      Visual cryptography, first introduced by Naor and Shamir, allows a secret (black and white) image to be encoded and distributed to a set of participants such that certain predefined sets of participants may reconstruct the ...
    • A Grouped Hamming Network 

      Logan, Bryan (University of Waterloo, 2010-08-30)
      A distributed hash table (DHT) is a type of peer-to-peer (P2P) network that, like traditional hash tables, maps keys to values. Unlike traditional hash tables, however, the data is distributed across a network with each ...
    • GRS: Combining Generation and Revision in Unsupervised Sentence Simplification 

      Dehghan, Mohammad (University of Waterloo, 2022-08-30)
      Text simplification is a task in the natural language processing field that alters a given text to reduce the structural and lexical complexity of the text while preserving the underlying meaning. We can classify existing ...
    • Guidance Under Uncertainty: Employing a Mediator Framework in Bilateral Incomplete-Information Negotiations 

      Shew, James (University of Waterloo, 2008-09-24)
      Bilateral incomplete-information negotiations of multiple issues present a difficult yet common negotiation problem that is complicated to solve from a mechanism design perspective. Unlike multilateral situations, where ...
    • Guided Testing of Concurrent Programs Using Value Schedules 

      Chen, Jun (University of Waterloo, 2009-09-29)
      Testing concurrent programs remains a difficult task due to the non-deterministic nature of concurrent execution. Many approaches have been proposed to tackle the complexity of uncovering potential concurrency bugs. ...
    • Hadez, a Framework for the Specification and Verification of Hypermedia Applications 

      Morales-Germán, Daniel (University of Waterloo, 2000)
      In recent years, several methodologies for the development of hypermedia applications have been proposed. These methodologies are, primarily, guidelines to be followed during the design process. They also indicate what ...
    • Halfway to Halfspace Testing 

      Harms, Nathaniel (University of Waterloo, 2017-10-18)
      In this thesis I study the problem of testing halfspaces under arbitrary probability distributions, using only random samples. A halfspace, or linear threshold function, is a boolean function f : Rⁿ → {±1} defined as the ...
    • Harnessing Neural Dynamics as a Computational Resource 

      Stöckel, Andreas (University of Waterloo, 2022-01-10)
      Researchers study nervous systems at levels of scale spanning several orders of magnitude, both in terms of time and space. While some parts of the brain are well understood at specific levels of description, there are few ...
    • Harnessing the Power of Generative Models for Mobile Continuous and Implicit Authentication 

      Tahoun, Ezzeldin (University of Waterloo, 2021-06-30)
      Authenticating a user's identity lies at the heart of securing any information system. A trade off exists currently between user experience and the level of security the system abides by. Using Continuous and Implicit ...
    • Hash Families and Cover-Free Families with Cryptographic Applications 

      Zaverucha, Gregory (University of Waterloo, 2010-09-28)
      This thesis is focused on hash families and cover-free families and their application to problems in cryptography. We present new necessary conditions for generalized separating hash families, and provide new explicit ...
    • Health Misinformation in Search and Social Media 

      Ghenai, Amira (University of Waterloo, 2019-11-28)
      People increasingly rely on the Internet in order to search for and share health-related information. Indeed, searching for and sharing information about medical treatments are among the most frequent uses of online data. ...
    • 'Healthy' Coreference: Applying Coreference Resolution to the Health Education Domain 

      Hirtle, David Z. (University of Waterloo, 2008-08-26)
      This thesis investigates coreference and its resolution within the domain of health education. Coreference is the relationship between two linguistic expressions that refer to the same real-world entity, and resolution ...
    • Hedging Costs for Variable Annuities 

      Azimzadeh, Parsiad (University of Waterloo, 2013-09-03)
      A general methodology is described in which policyholder behaviour is decoupled from the pricing of a variable annuity based on the cost of hedging it, yielding two sequences of weakly coupled systems of partial differential ...
    • Hedging with a Correlated Asset: An Insurance Approach 

      Wang, Jian (University of Waterloo, 2005)
      Hedging a contingent claim with an asset which is not perfectly correlated with the underlying asset results in an imperfect hedge. The residual risk from hedging with a correlated asset is priced using an actuarial ...
    • Hermite form computation of matrices of differential polynomials 

      Kim, Myung Sub (University of Waterloo, 2009-08-27)
      Given a matrix A in F(t)[D;\delta]^{n\times n} over the ring of differential polynomials, we first prove the existence of the Hermite form H of A over this ring. Then we determine degree bounds on U and H such that UA=H. ...
    • Hermite Forms of Polynomial Matrices 

      Gupta, Somit (University of Waterloo, 2011-08-23)
      This thesis presents a new algorithm for computing the Hermite form of a polynomial matrix. Given a nonsingular n by n matrix A filled with degree d polynomials with coefficients from a field, the algorithm computes the ...
    • A Hierarchical Pedestrian Behaviour Model to Reproduce Realistic Human Behaviour in a Traffic Environment 

      Larter, Scott (University of Waterloo, 2022-03-07)
      Understanding pedestrian behaviour in traffic environments is a crucial step in the development and testing of autonomous vehicles. As the environment's most vulnerable road users, pedestrians introduce an element of ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages