Now showing items 66-85 of 1561

    • Alternative Approaches for Analysis of Bin Packing and List Update Problems 

      Kamali, Shahin (University of Waterloo, 2014-09-22)
      In this thesis we introduce and evaluate new algorithms and models for the analysis of online bin packing and list update problems. These are two classic online problems which are extensively studied in the literature and ...
    • Alternative Measures for the Analysis of Online Algorithms 

      Dorrigiv, Reza (University of Waterloo, 2010-04-08)
      In this thesis we introduce and evaluate several new models for the analysis of online algorithms. In an online problem, the algorithm does not know the entire input from the beginning; the input is revealed in a sequence ...
    • Analysis and Optimization of TrueType Font Bytecode 

      Liu, Zeming (University of Waterloo, 2018-12-19)
      TrueType is one of the most widely used vectorized font formats. It can be optimally rendered on screens with different resolutions and different font sizes thanks to hints expressed as bytecode programs. Font engines ...
    • An Analysis of Human Aspects of Collaborative Group Members in OSS development 

      Sheik Saleem, Sheik Shameer (University of Waterloo, 2021-04-23)
      Open Source Software development is a collective activity that involves different software developers who may differ from each other. Although, previous researchers have focused on technical aspects like code factors, ...
    • An Analysis of Network-Partitioning Failures in Cloud Systems 

      Alquraan, Ahmed (University of Waterloo, 2018-12-10)
      We present a comprehensive study of 136 system failures attributed to network-partitioning faults from 25 widely used distributed systems. We found that the majority of the failures led to catastrophic effects, such as ...
    • An Analysis of Partial Network Partitioning Failures in Modern Distributed Systems 

      Alfatafta, Mohammed (University of Waterloo, 2020-01-03)
      We present a comprehensive study of system failures from 12 popular systems caused by a peculiar type of network partitioning faults: partial partitions. Partial partitions isolate a set of nodes from some, but not all, ...
    • Analysis of Randomized Algorithms in Real Algebraic Geometry 

      Elliott, Jesse (University of Waterloo, 2020-09-02)
      Consider the problem of computing at least one point in each connected component of a smooth real algebraic set. This is a basic and important operation in real and semi-algebraic geometry: it gives an upper bound on the ...
    • Analysis of Textual and Non-Textual Sources of Sentiment in Github 

      De Zoysa, Nalin (University of Waterloo, 2020-05-29)
      Github is a collaborative platform that is used primarily for the development of software. In order to gain more insight into how teams work on Github, we wish to analyze the sentiment content available via communication ...
    • Analysis of the Weight Function for Implicit Moving Least Squares Techniques 

      Yao, Zhujun (University of Waterloo, 2014-05-22)
      In this thesis, I analyze the weight functions used in moving least squares (MLS) methods to construct implicit surfaces that interpolate or approximate polygon soup. I found that one previous method that presented an ...
    • An Analysis on The Network Structure of Influential Communities in Twitter 

      Schunk, Adam (University of Waterloo, 2019-02-21)
      Over the past years online social networks have become a major target for marketing strategies, generating a need for methods to efficiently spread information through these networks. Close knit communities have developed ...
    • Analytic Combinatorics in Several Variables: Effective Asymptotics and Lattice Path Enumeration 

      Melczer, Stephen (University of Waterloo, 2017-06-26)
      The field of analytic combinatorics, which studies the asymptotic behaviour of sequences through analytic properties of their generating functions, has led to the development of deep and powerful tools with applications ...
    • Analytics for Everyone 

      El Gebaly, Kareem (University of Waterloo, 2018-05-23)
      Analyzing relational data typically involves tasks that facilitate gaining familiarity or insights and coming up with findings or conclusions based on the data. This process is usually practiced by data experts, such as ...
    • Analyzing Adversarial Examples: A Framework to Study Adversary Knowledge 

      Fenaux, Lucas (University of Waterloo, 2024-01-22)
      Adversarial examples are malicious inputs to trained machine learning models supplied to trigger a misclassification. This type of attack has been studied for close to a decade, and we find that there is a lack of study ...
    • Analyzing Barehand Input Mappings for Video Timeline Control and Object Pointing on Smart TVs 

      Zhang, Futian (University of Waterloo, 2021-09-21)
      Smart TVs are getting popular in recent few years. Given the emerging feature of distant bare hand control, one challenge is how to perform common tasks with this new input modality. Two tasks are discussed in this thesis ...
    • Analyzing the Signal Strength of 2,946 Clients Operating in 446 WiFi Networks 

      Jacob, Midul (University of Waterloo, 2020-09-02)
      In this thesis we analyze data that was collected over a 24 hour period from 446 access points that provide connections for 2,946 clients. The data was obtained from deployments of modern commercial Google Wifi access ...
    • Analyzing Threats of Large-Scale Machine Learning Systems 

      Lukas, Nils (University of Waterloo, 2024-02-22)
      Large-scale machine learning systems such as ChatGPT rapidly transform how we interact with and trust digital media. However, the emergence of such a powerful technology faces a dual-use dilemma. While it can have many ...
    • Android Access Control Recommendation as a Deep Learning Task 

      Vagavolu, Dheeraj (University of Waterloo, 2023-09-25)
      Android enforces access control checks to protect sensitive framework APIs. If not properly protected, framework APIs can open the door for malicious apps to access sensitive resources without having the necessary privileges. ...
    • Animating Coupling between Inviscid Free-Surface Liquids and Elastic Deformable Bodies 

      Zarifi, Omar (University of Waterloo, 2017-08-16)
      Driven by demand for high-fidelity computer-generated imagery, physics-based animation has become an exciting frontier of research in computer science. Simulations of fluids and their interactions with other objects in the ...
    • Anonymous, Secure and Efficient Vehicular Communications 

      Sun, Xiaoting (University of Waterloo, 2007-09-20)
      Vehicular communication networking is a promising approach for facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, it is subject to various malicious abuses and ...
    • Answering Object Queries over Knowledge Bases with Expressive Underlying Description Logics 

      Wu, Jiewen (University of Waterloo, 2013-10-25)
      Many information sources can be viewed as collections of objects and descriptions about objects. The relationship between objects is often characterized by a set of constraints that semantically encode background knowledge ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages