UWSpace will be migrating to a new version of its software from July 29th to August 1st. UWSpace will be offline for all UW community members during this time.

Now showing items 670-689 of 1986

    • Feedback and Cooperation in Wireless Networks 

      Abdoli Hoseinabadi, Mohammad Javad (University of Waterloo, 2012-09-18)
      The demand for wireless data services has been dramatically growing over the last decade. This growth has been accompanied by a significant increase in the number of users sharing the same wireless medium, and as a result, ...
    • Fictitious Mean-field Reinforcement Learning for Distributed Load Balancing 

      Fardno, Fatemeh (University of Waterloo, 2022-09-29)
      In this work, we study the application of multi-agent reinforcement learning (RL) in distributed systems. In particular, we consider a setting in which strategic clients compete over a set of heterogeneous servers. Each ...
    • Finding Patterns in Static Analysis Alerts: Improving Actionable Alert Ranking 

      Hanam, Quinn (University of Waterloo, 2014-09-02)
      Static analysis (SA) tools that find bugs by inferring programmer beliefs (e.g., FindBugs) are commonplace in today’s software industry. While they find a large number of actual defects, they are often plagued by high rates ...
    • Fine-grained data access control with attribute-hiding policy for cloud-based IoT 

      Hao, Jialu; Huang, Cheng; Ni, Jianbing; Rong, Hong; Xian, Ming; Shen, Xuemin (Sherman) (Elsevier, 2019-04-22)
      Ciphertext-policy attribute-based encryption (CP-ABE) is a promising approach to achieve fine-grained access control over the outsourced data in Internet of Things (IoT). However, in the existing CP-ABE schemes, the access ...
    • Finite Field Multiplier Architectures for Cryptographic Applications 

      El-Gebaly, Mohamed (University of Waterloo, 2000)
      Security issues have started to play an important role in the wireless communication and computer networks due to the migration of commerce practices to the electronic medium. The deployment of security procedures requires ...
    • Finite-Difference Time-Domain Simulations of Light Scattering from Retinal Photoreceptors 

      Abdallah, Samer S. (University of Waterloo, 2007-09-28)
      Recently, a novel optical imaging technique was successfully used in measuring the functional response of living retinal tissues. The technique, functional ultra high resolution optical coherence tomography, measures ...
    • FlaKat: A Machine Learning-Based Categorization Framework for Flaky Tests 

      Lin, Shizhe (University of Waterloo, 2023-01-26)
      Flaky tests can pass or fail non-deterministically, without alterations to a software system. Such tests are frequently encountered by developers and hinder the credibility of test suites. Thus, flaky tests have caught the ...
    • Flexibility Provisions from Energy Hubs for Sustainable Energy Systems 

      Alharbi, Walied (University of Waterloo, 2018-09-25)
      Power systems have some inherent level of flexibility built into the system, to meet the continuous mismatches between the supply and demand. Variability and uncertainty are not new to power systems as loads change over ...
    • Flexibility Provisions from Energy Storage Systems and Loads in Smart Grid 

      Alrumayh, Omar (University of Waterloo, 2021-02-22)
      Electric power systems are experiencing a movement toward increasing the share of renewable energy sources (RESs), while having to cope with the retirement of conventional generating units to facilitate an eco-friendly ...
    • Flexible 3-Dimensional Hybrid ZnO Nanowire/a-Si:H Thin-Film Solar Cells 

      Pathirane, Minoli (University of Waterloo, 2016-07-19)
      ZnO nanowires were conformally coated with hydrogenated amorphous Si (a-Si:H) p-i-n thin-film to form three-dimensional (3-D) radial-junction (RJ) nanowire solar cell arrays (NWSCs). These NWSCs are a promising architecture ...
    • A Flexible Ultralight Hardware Security Module for EPC RFID Tags 

      Ayoub, Ahmed (University of Waterloo, 2021-10-01)
      Due to the rapid growth of using Internet of Things (IoT) devices in daily life, the need to achieve an acceptable level of security and privacy for these devices is rising. Security risks may include privacy threats like ...
    • A Focus+Context Approach to Alleviate Cognitive Challenges of Editing and Debugging UML Models 

      Pourali, Parsa; Atlee, Joanne M. (IEEE, 2019-09)
      Model-Driven Engineering has been proposed to increase the productivity of developing a software system. Despite its benefits, it has not been fully adopted in the software industry. Research has shown that modelling tools ...
    • Forensic Analysis in Access Control: a Case-Study of a Cloud Application 

      Huang, Xiaowei (University of Waterloo, 2019-11-27)
      We discuss a case-study we have conducted on forensic analysis in access control. The case-study is an application in the Amazon Web Services (AWS) cloud provider. Forensic analysis is the investigation and analysis of ...
    • Forest Fire Prediction Using Heterogeneous Data Sources and Machine Learning Methods 

      Kaur, Parveen (University of Waterloo, 2023-08-18)
      Forest fires pose a significant and urgent threat to ecosystems and human lives, necessitating accurate prediction for effective mitigation strategies. Predicting forest fires has been a longstanding challenge due to the ...
    • Formal Verification of Instruction Dependencies in Microprocessors 

      Shehata, Hazem (University of Waterloo, 2011-08-19)
      In microprocessors, achieving an efficient utilization of the execution units is a key factor in improving performance. However, maintaining an uninterrupted flow of instructions is a challenge due to the data and control ...
    • Foveated Sampling Architectures for CMOS Image Sensors 

      Saffih, Fayçal (University of Waterloo, 2005)
      Electronic imaging technologies are faced with the challenge of power consumption when transmitting large amounts of image data from the acquisition imager to the display or processing devices. This is especially a concern ...
    • Foveated Stereo Video Compression for Visual Telepresence 

      Fok, Stanley (University of Waterloo, 2002)
      This thesis focuses on the design of a foveated stereo video compression algorithm for visual telepresence applications. In a typical telepresence application, a user at the local site views real-time stereo video recorded ...
    • FPGA Implementation of a Clockless Stochastic LDPC Decoder 

      Christopher, Ceroici (University of Waterloo, 2014-05-16)
      This thesis presents a clockless stochastic low-density parity-check (LDPC) decoder implemented on a Field-Programmable Gate Array (FPGA). Stochastic computing reduces the wiring complexity necessary for decoding by ...
    • FPGA-Based Lossless Data Compression Using GNU Zip 

      Rigler, Suzanne (University of Waterloo, 2007-01-23)
      Lossless data compression algorithms are widely used by data communication systems and data storage systems to reduce the amount of data transferred and stored. GNU Zip (GZIP) [1] is a popular compression utility that ...
    • FPGA-Based Testbed for Fault Injection on SHA-256 

      Jose, Najma (University of Waterloo, 2015-01-21)
      In real world applications, cryptographic algorithms are implemented in hardware or software on specific devices. An active attacker may inject faults during the computation process and careful analysis of faulty results ...


      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages