UWSpace will be migrating to a new version of its software from July 29th to August 1st. UWSpace will be offline for all UW community members during this time.

Now showing items 21-40 of 1576

    • Quantitative Testing of Probabilistic Phase Unwrapping Methods 

      Moran, Jodi (University of Waterloo, 2001)
      The reconstruction of a phase surface from the observed principal values is required for a number of applications, including synthetic aperture radar (SAR) and magnetic resonance imaging (MRI). However, the process of ...
    • Grey Level Visual Cryptography for General Access Structures 

      MacPherson, Lesley (University of Waterloo, 2002)
      Visual cryptography, first introduced by Naor and Shamir, allows a secret (black and white) image to be encoded and distributed to a set of participants such that certain predefined sets of participants may reconstruct the ...
    • Volume Visualisation Via Variable-Detail Non-Photorealistic Illustration 

      McKinley, Joanne (University of Waterloo, 2002)
      The rapid proliferation of 3D volume data, including MRI and CT scans, is prompting the search within computer graphics for more effective volume visualisation techniques. Partially because of the traditional association ...
    • A Views-Based Design Framework for Web Applications 

      Brown, David (University of Waterloo, 2002)
      Web application design is a broad term that refers to any aspect of designing a Web application, including designing Web interfaces to data. There are a number of commercial software tools available that employ various ...
    • Probabilistic Program Analysis for Software Component Reliability 

      Mason, Dave (University of Waterloo, 2002)
      Components are widely seen by software engineers as an important technology to address the "software crisis''. An important aspect of components in other areas of engineering is that system reliability can be estimated ...
    • Agile Architecture Recovery 

      Svetinovic, Davor (University of Waterloo, 2002)
      Many software development projects start with an existing code base that has to be tightly integrated into a new system. In order to make a robust system that will achieve the desired business goals, developers must be ...
    • Selective Flooding in Ad Hoc Networks 

      Iu, Ming-Yee (University of Waterloo, 2002)
      An ad hoc network is a collection of mobile wireless devices that cooperate with each other to route packets amongst themselves. The main difficulty in designing routing algorithms for such a network is the large number ...
    • An Architecture for Geographically-Oriented Service Discovery on the Internet 

      Li, Qiyan (University of Waterloo, 2002)
      Most of the service discovery protocols available on the Internet are built upon its logical structure. This phenomenon can be observed frequently from the way in which they behave. For instance, Jini and SLP service ...
    • A Collapsing Method for Efficient Recovery of Optimal Edges 

      Hu, Mike (University of Waterloo, 2002)
      In this thesis we present a novel algorithm, <I>HyperCleaning*</I>, for effectively inferring phylogenetic trees. The method is based on the quartet method paradigm and is guaranteed to recover the best supported edges ...
    • Autonomous Cooperating Web Crawlers 

      McLearn, Greg (University of Waterloo, 2002)
      A web crawler provides an automated way to discover web events ? creation, deletion, or updates of web pages. Competition among web crawlers results in redundant crawling, wasted resources, and less-than-timely discovery ...
    • Exploitation of Redundant Inverse Term Frequency for Answer Extraction 

      Lynam, Thomas Richard (University of Waterloo, 2002)
      An automatic question answering system must find, within a corpus,short factual answers to questions posed in natural language. The process involves analyzing the question, retrieving information related to the question, ...
    • Software Architecture Recovery based on Pattern Matching 

      Sartipi, Kamran (University of Waterloo, 2003)
      Pattern matching approaches in reverse engineering aim to incorporate domain knowledge and system documentation in the software architecture extraction process, hence provide a user/tool collaborative environment for ...
    • On Fine-Grained Access Control for XML 

      Zhuo, Donghui (University of Waterloo, 2003)
      Fine-grained access control for XML is about controlling access to XML documents at the granularity of individual elements or attributes. This thesis addresses two problems related to XML access controls. The first is ...
    • Indexing Compressed Text 

      He, Meng (University of Waterloo, 2003)
      As a result of the rapid growth of the volume of electronic data, text compression and indexing techniques are receiving more and more attention. These two issues are usually treated as independent problems, but approaches ...
    • Numerical Methods for Nonlinear Equations in Option Pricing 

      Pooley, David (University of Waterloo, 2003)
      This thesis explores numerical methods for solving nonlinear partial differential equations (PDEs) that arise in option pricing problems. The goal is to develop or identify robust and efficient techniques that ...
    • Mining Topic Signals from Text 

      Al-Halimi, Reem Khalil (University of Waterloo, 2003)
      This work aims at studying the effect of word position in text on understanding and tracking the content of written text. In this thesis we present two uses of word position in text: topic word selectors and topic flow ...
    • Evaluation of Shortest Path Query Algorithm in Spatial Databases 

      Lim, Heechul (University of Waterloo, 2003)
      Many variations of algorithms for finding the shortest path in a large graph have been introduced recently due to the needs of applications like the Geographic Information System (GIS) or Intelligent Transportation System ...
    • Algorithms for Normal Forms for Matrices of Polynomials and Ore Polynomials 

      Cheng, Howard (University of Waterloo, 2003)
      In this thesis we study algorithms for computing normal forms for matrices of Ore polynomials while controlling coefficient growth. By formulating row reduction as a linear algebra problem, we obtain a fraction-free ...
    • Towards Automatic Initial Buffer Configuration 

      Ku, Fei Yen (University of Waterloo, 2003)
      Buffer pools are blocks of memory used in database systems to retain frequently referenced pages. Configuring the buffer pools is a difficult and manual task that involves determining the amount of memory to devote to ...
    • Toward an improved understanding of software change 

      Zou, Lijie (University of Waterloo, 2003)
      Structural changes, including moving, renaming, merging and splitting are important design change decisions made by programmers. However, during the process of software evolution, this information often gets lost. ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages