Browsing Computer Science by Title
Now showing items 66-85 of 1561
-
Alternative Approaches for Analysis of Bin Packing and List Update Problems
(University of Waterloo, 2014-09-22)In this thesis we introduce and evaluate new algorithms and models for the analysis of online bin packing and list update problems. These are two classic online problems which are extensively studied in the literature and ... -
Alternative Measures for the Analysis of Online Algorithms
(University of Waterloo, 2010-04-08)In this thesis we introduce and evaluate several new models for the analysis of online algorithms. In an online problem, the algorithm does not know the entire input from the beginning; the input is revealed in a sequence ... -
Analysis and Optimization of TrueType Font Bytecode
(University of Waterloo, 2018-12-19)TrueType is one of the most widely used vectorized font formats. It can be optimally rendered on screens with different resolutions and different font sizes thanks to hints expressed as bytecode programs. Font engines ... -
An Analysis of Human Aspects of Collaborative Group Members in OSS development
(University of Waterloo, 2021-04-23)Open Source Software development is a collective activity that involves different software developers who may differ from each other. Although, previous researchers have focused on technical aspects like code factors, ... -
An Analysis of Network-Partitioning Failures in Cloud Systems
(University of Waterloo, 2018-12-10)We present a comprehensive study of 136 system failures attributed to network-partitioning faults from 25 widely used distributed systems. We found that the majority of the failures led to catastrophic effects, such as ... -
An Analysis of Partial Network Partitioning Failures in Modern Distributed Systems
(University of Waterloo, 2020-01-03)We present a comprehensive study of system failures from 12 popular systems caused by a peculiar type of network partitioning faults: partial partitions. Partial partitions isolate a set of nodes from some, but not all, ... -
Analysis of Randomized Algorithms in Real Algebraic Geometry
(University of Waterloo, 2020-09-02)Consider the problem of computing at least one point in each connected component of a smooth real algebraic set. This is a basic and important operation in real and semi-algebraic geometry: it gives an upper bound on the ... -
Analysis of Textual and Non-Textual Sources of Sentiment in Github
(University of Waterloo, 2020-05-29)Github is a collaborative platform that is used primarily for the development of software. In order to gain more insight into how teams work on Github, we wish to analyze the sentiment content available via communication ... -
Analysis of the Weight Function for Implicit Moving Least Squares Techniques
(University of Waterloo, 2014-05-22)In this thesis, I analyze the weight functions used in moving least squares (MLS) methods to construct implicit surfaces that interpolate or approximate polygon soup. I found that one previous method that presented an ... -
An Analysis on The Network Structure of Influential Communities in Twitter
(University of Waterloo, 2019-02-21)Over the past years online social networks have become a major target for marketing strategies, generating a need for methods to efficiently spread information through these networks. Close knit communities have developed ... -
Analytic Combinatorics in Several Variables: Effective Asymptotics and Lattice Path Enumeration
(University of Waterloo, 2017-06-26)The field of analytic combinatorics, which studies the asymptotic behaviour of sequences through analytic properties of their generating functions, has led to the development of deep and powerful tools with applications ... -
Analytics for Everyone
(University of Waterloo, 2018-05-23)Analyzing relational data typically involves tasks that facilitate gaining familiarity or insights and coming up with findings or conclusions based on the data. This process is usually practiced by data experts, such as ... -
Analyzing Adversarial Examples: A Framework to Study Adversary Knowledge
(University of Waterloo, 2024-01-22)Adversarial examples are malicious inputs to trained machine learning models supplied to trigger a misclassification. This type of attack has been studied for close to a decade, and we find that there is a lack of study ... -
Analyzing Barehand Input Mappings for Video Timeline Control and Object Pointing on Smart TVs
(University of Waterloo, 2021-09-21)Smart TVs are getting popular in recent few years. Given the emerging feature of distant bare hand control, one challenge is how to perform common tasks with this new input modality. Two tasks are discussed in this thesis ... -
Analyzing the Signal Strength of 2,946 Clients Operating in 446 WiFi Networks
(University of Waterloo, 2020-09-02)In this thesis we analyze data that was collected over a 24 hour period from 446 access points that provide connections for 2,946 clients. The data was obtained from deployments of modern commercial Google Wifi access ... -
Analyzing Threats of Large-Scale Machine Learning Systems
(University of Waterloo, 2024-02-22)Large-scale machine learning systems such as ChatGPT rapidly transform how we interact with and trust digital media. However, the emergence of such a powerful technology faces a dual-use dilemma. While it can have many ... -
Android Access Control Recommendation as a Deep Learning Task
(University of Waterloo, 2023-09-25)Android enforces access control checks to protect sensitive framework APIs. If not properly protected, framework APIs can open the door for malicious apps to access sensitive resources without having the necessary privileges. ... -
Animating Coupling between Inviscid Free-Surface Liquids and Elastic Deformable Bodies
(University of Waterloo, 2017-08-16)Driven by demand for high-fidelity computer-generated imagery, physics-based animation has become an exciting frontier of research in computer science. Simulations of fluids and their interactions with other objects in the ... -
Anonymous, Secure and Efficient Vehicular Communications
(University of Waterloo, 2007-09-20)Vehicular communication networking is a promising approach for facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, it is subject to various malicious abuses and ... -
Answering Object Queries over Knowledge Bases with Expressive Underlying Description Logics
(University of Waterloo, 2013-10-25)Many information sources can be viewed as collections of objects and descriptions about objects. The relationship between objects is often characterized by a set of constraints that semantically encode background knowledge ...