Now showing items 12709-12728 of 15611

    • Second homes in Mexico: An exploration of the social connections of international residents in the city of Merida 

      Aguilar Mendez, Laura (University of Waterloo, 2017-06-13)
      Owners of second homes construct complex relationships with the people and place they live in especially when the property is located across national borders. While previous research on second homes identified numerous ...
    • The Second Line 

      Ma, Xin (University of Waterloo, 2013-09-04)
      A political boundary divided the City of Shenzhen in 1978. The southern portion is designated as a Special Economic Zone (SEZ), while the northern region remains a part of hinterland China. The divide creates a geographical ...
    • Second Skin: Painting Architecture 

      Boutari, Stephanie (University of Waterloo, 2015-01-08)
      This thesis is a creative and conceptual inquiry into the role of surface or skin in architectural theory and practice, and the nature of its relationship to architecture’s form, structure, and depth. The surface of ...
    • “Second Tier Cool”: Residents’ Experiences of a Mid-Size City’s Gentrifying Downtown 

      Davies, Beth (University of Waterloo, 2016-09-27)
      Ubiquitous depictions of life in a big city evoke images of young professionals enjoying craft beers on patios, eating out at trendy bistro-lounges, and biking on dedicated cycling lanes to work.   Positive portrayals of ...
    • Second-tier Cache Management to Support DBMS Workloads 

      Li, Xuhui (University of Waterloo, 2011-10-24)
      Enterprise Database Management Systems (DBMS) often run on computers with dedicated storage systems. Their data access requests need to go through two tiers of cache, i.e., a database bufferpool and a storage server cache, ...
    • Secrecy Resilience of Authorization Policies and Its Application to Role Mining 

      GUO, QIANG (University of Waterloo, 2021-09-21)
      We propose and study a new property that we call secrecy resilience in the context of authorization policies that are used to secure information systems. An authorization policy expresses whether a principal (e.g., a user ...
    • Secure and Privacy-Preserving Vehicular Communications 

      Lin, Xiaodong (University of Waterloo, 2008-05-13)
      Road safety has been drawing increasing attention in the public, and has been subject to extensive efforts from both industry and academia in mitigating the impact of traffic accidents. Recent advances in wireless technology ...
    • Secure and Unclonable Integrated Circuits 

      Stangherlin, Kleber Hugo (University of Waterloo, 2022-09-26)
      Semiconductor manufacturing is increasingly reliant in offshore foundries, which has raised concerns with counterfeiting, piracy, and unauthorized overproduction by the contract foundry. The recent shortage of semiconductors ...
    • A Secure Business Framework for File Purchasing Application in Vehicular Ad Hoc Networks 

      Yuan, Shuang (University of Waterloo, 2008-06-20)
      Vehicular ad hoc networks (VANETs) are gaining growing interest from both industry and academia. Driven by road safety requirements, the car manufacturers, transportation authorities and communications standards organizations ...
    • Secure Cloud Storage 

      Luo, Jeff Yucong (University of Waterloo, 2014-05-27)
      The rapid growth of Cloud based services on the Internet invited many critical security attacks. Consumers and corporations who use the Cloud to store their data encounter a difficult trade-off of accepting and bearing the ...
    • Secure Computation and Proportionally Fair Collaboration in Federated Learning of Histopathology Images 

      Hosseini, Seyedeh Maryam (University of Waterloo, 2023-01-24)
      The prediction power of deep learning models depends on the size and quality of the training data. Having access to large-scale datasets enables the model to more precisely estimate the underlying distribution of the data. ...
    • Secure Data Acquisition for Physics-based Side Channel Cybersecurity 

      Propp, Aaron (University of Waterloo, 2023-08-18)
      Cyber-physical systems (CPSs), such as planes and water treatment plants, are increasingly connected to the Internet. Connecting CPSs to the Internet allows for greater productivity but also increases the attack surface ...
    • Secure Data Aggregation and Access Control in Cloud Assisted eHealth Care System 

      Barua, Mrinmoy (University of Waterloo, 2014-09-11)
      Recently electronic health (eHealth) care system has drawn a lot of attention from the research community and the industry to face the challenge of rapidly growing elderly population and ever rising health care spending. ...
    • Secure Data Aggregation Protocol with Byzantine Robustness for Wireless Sensor Networks 

      Khalifa, Tarek (University of Waterloo, 2007-09-27)
      Sensor networks are dense wireless networks constituting of small and low-cost sensors that collect and disseminate sensory data. They have gained great attention in recent years due to their ability to offer economical ...
    • Secure Harmonized Speed Under Byzantine Faults for Autonomous Vehicle Platoons Using Blockchain Technology 

      Hussein, Noon (University of Waterloo, 2023-08-31)
      Autonomous Vehicle (AV) platooning holds the promise of safer and more efficient road transportation. By coordinating the movements of a group of vehicles, platooning offers benefits such as reduced energy consumption, ...
    • Secure Protocols for Key Pre-distribution, Network Discovery, and Aggregation in Wireless Sensor Networks 

      Henry, Kevin John (University of Waterloo, 2015-07-21)
      The term sensor network is used to refer to a broad class of networks where several small devices, called sensors, are deployed in order to gather data and report back to one or more base stations. Traditionally, sensors ...
    • Secure Provision of Reactive Power Ancillary Services in Competitive Electricity Markets 

      El-Samahy, Ismael (University of Waterloo, 2008-05-09)
      The research work presented in this thesis discusses various complex issues associated with reactive power management and pricing in the context of new operating paradigms in deregulated power systems, proposing appropriate ...
    • Secure Schemes for Semi-Trusted Environment 

      Tassanaviboon, Anuchart (University of Waterloo, 2012-01-13)
      In recent years, two distributed system technologies have emerged: Peer-to-Peer (P2P) and cloud computing. For the former, the computers at the edge of networks share their resources, i.e., computing power, data, and network ...
    • Securing Cloud Computations with Oblivious Primitives from Intel SGX 

      Sasy, Sajin (University of Waterloo, 2017-12-12)
      We are witnessing a confluence between applied cryptography and secure hardware systems in enabling secure cloud computing. On one hand, work in applied cryptography has enabled efficient, oblivious data-structures and ...
    • Securing IP Mobility Management for Vehicular Ad Hoc Networks 

      Taha, Sanaa Mohamed Ahmed (University of Waterloo, 2013-04-17)
      The proliferation of Intelligent Transportation Systems (ITSs) applications, such as Internet access and Infotainment, highlights the requirements for improving the underlying mobility management protocols for Vehicular ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages