Now showing items 1605-1624 of 1976

    • A Scalable, Secure, and Energy-Efficient Image Representation for Wireless Systems 

      Woo, Tim (University of Waterloo, 2004)
      The recent growth in wireless communications presents a new challenge to multimedia communications. Digital image transmission is a very common form of multimedia communication. Due to limited bandwidth and broadcast ...
    • Scaling Laws for Vehicular Networks 

      Lu, Ning (University of Waterloo, 2015-01-29)
      Equipping automobiles with wireless communications and networking capabilities is becoming the frontier in the evolution to the next generation intelligent transportation systems (ITS). By means of vehicle-to-vehicle (V2V) ...
    • Scaling Permissioned Blockchains via Sharding 

      MAO, CHUNYU (University of Waterloo, 2023-01-25)
      Traditional distributed systems, such as those used in banking and real estate, require a trusted third party to operate and maintain them, which is highly dependent on the reliability of the operator. Since Bitcoin was ...
    • Scenario Modeling and Execution for Simulation Testing of Automated-Driving Systems 

      Barbosa de Queiroz, Rodrigo (University of Waterloo, 2022-09-28)
      Automated Driving Systems (ADS) have the potential to significantly impact the future of ground mobility. However, safety assurance is still a major obstacle. Field testing alone is impractical and simulation is required ...
    • Scene Representations for Generalizable Novel View Synthesis 

      Abdelkareem, Youssef (University of Waterloo, 2023-04-04)
      Novel view synthesis involves generating novel views of a scene when seen from different viewpoints. It offers numerous applications in computer vision domains such as telepresence, virtual reality, re-cinematography, etc. ...
    • Scheduling in a Multi-Sector Wireless Cell 

      Lin, Chao-Wen (University of Waterloo, 2009-10-29)
      In this thesis, we propose a scheduling problem for the downlink of a single cell system with multiple sectors. We formulate an optimization problem based on a generalized round robin scheme that aims at minimizing the ...
    • Scheduling in Large Scale MIMO Downlink Systems 

      Bayesteh, Alireza (University of Waterloo, 2008-04-16)
      This dissertation deals with the problem of scheduling in wireless MIMO (Multiple-Input Multiple-Output) downlink systems. The focus is on the large-scale systems when the number of subscribers is large. In part one, ...
    • Scheduling in omnidirectional relay wireless networks 

      Wang, Shuning (University of Waterloo, 2013-09-25)
      The capacity of multiuser wireless network, unclear for many years, has always been a hot research topic. Many different operation schemes and coding techniques have been proposed to enlarge the achievable rate region. And ...
    • Scheduling of Overload-Tolerant Computation and Multi-Mode Communication in Real-Time Systems 

      Azim, Akramul (University of Waterloo, 2014-12-10)
      Real-time tasks require sufficient resources to meet deadline constraints. A component should provision sufficient resources for its workloads consisting of tasks to meet their deadlines. Supply and demand bound functions ...
    • Scheduling Schemes using Connective Stability 

      Costa, Thilan (University of Waterloo, 2012-08-21)
      Large systems are often constructed using small subsystems which are connected. These interconnections can lead to complex behavior; for example, the entire system may become unstable even if each of the individual subsystems ...
    • Scratchpad Memory Management For Multicore Real-Time Embedded Systems 

      Wasly, Saud (University of Waterloo, 2018-08-10)
      Multicore systems will continue to spread in the domain of real-time embedded systems due to the increasing need for high-performance applications. This research discusses some of the challenges associated with employing ...
    • Secrecy Resilience of Authorization Policies and Its Application to Role Mining 

      GUO, QIANG (University of Waterloo, 2021-09-21)
      We propose and study a new property that we call secrecy resilience in the context of authorization policies that are used to secure information systems. An authorization policy expresses whether a principal (e.g., a user ...
    • Secure and Privacy-Preserving Vehicular Communications 

      Lin, Xiaodong (University of Waterloo, 2008-05-13)
      Road safety has been drawing increasing attention in the public, and has been subject to extensive efforts from both industry and academia in mitigating the impact of traffic accidents. Recent advances in wireless technology ...
    • Secure and Unclonable Integrated Circuits 

      Stangherlin, Kleber Hugo (University of Waterloo, 2022-09-26)
      Semiconductor manufacturing is increasingly reliant in offshore foundries, which has raised concerns with counterfeiting, piracy, and unauthorized overproduction by the contract foundry. The recent shortage of semiconductors ...
    • A Secure Business Framework for File Purchasing Application in Vehicular Ad Hoc Networks 

      Yuan, Shuang (University of Waterloo, 2008-06-20)
      Vehicular ad hoc networks (VANETs) are gaining growing interest from both industry and academia. Driven by road safety requirements, the car manufacturers, transportation authorities and communications standards organizations ...
    • Secure Cloud Storage 

      Luo, Jeff Yucong (University of Waterloo, 2014-05-27)
      The rapid growth of Cloud based services on the Internet invited many critical security attacks. Consumers and corporations who use the Cloud to store their data encounter a difficult trade-off of accepting and bearing the ...
    • Secure Data Acquisition for Physics-based Side Channel Cybersecurity 

      Propp, Aaron (University of Waterloo, 2023-08-18)
      Cyber-physical systems (CPSs), such as planes and water treatment plants, are increasingly connected to the Internet. Connecting CPSs to the Internet allows for greater productivity but also increases the attack surface ...
    • Secure Data Aggregation and Access Control in Cloud Assisted eHealth Care System 

      Barua, Mrinmoy (University of Waterloo, 2014-09-11)
      Recently electronic health (eHealth) care system has drawn a lot of attention from the research community and the industry to face the challenge of rapidly growing elderly population and ever rising health care spending. ...
    • Secure Data Aggregation Protocol with Byzantine Robustness for Wireless Sensor Networks 

      Khalifa, Tarek (University of Waterloo, 2007-09-27)
      Sensor networks are dense wireless networks constituting of small and low-cost sensors that collect and disseminate sensory data. They have gained great attention in recent years due to their ability to offer economical ...
    • Secure Harmonized Speed Under Byzantine Faults for Autonomous Vehicle Platoons Using Blockchain Technology 

      Hussein, Noon (University of Waterloo, 2023-08-31)
      Autonomous Vehicle (AV) platooning holds the promise of safer and more efficient road transportation. By coordinating the movements of a group of vehicles, platooning offers benefits such as reduced energy consumption, ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages