Now showing items 118-137 of 3034

    • Analysis of Plasmons Sustained on the Surface of Graphene 

      Lyon, Keenan (University of Waterloo, 2014-08-11)
      This thesis is broken into two parts, both dealing with the role of two-dimensional graphene in electronic and optical applications. The first section develops a phenomenological relationship for the polarizability of the ...
    • Analysis of Randomized Algorithms in Real Algebraic Geometry 

      Elliott, Jesse (University of Waterloo, 2020-09-02)
      Consider the problem of computing at least one point in each connected component of a smooth real algebraic set. This is a basic and important operation in real and semi-algebraic geometry: it gives an upper bound on the ...
    • Analysis of some risk models involving dependence 

      Cheung, Eric C.K. (University of Waterloo, 2010-08-12)
      The seminal paper by Gerber and Shiu (1998) gave a huge boost to the study of risk theory by not only unifying but also generalizing the treatment and the analysis of various risk-related quantities in one single mathematical ...
    • An Analysis of Stockwell Transforms, with Applications to Image Processing 

      Ladan, John (University of Waterloo, 2014-04-30)
      Time-frequency analysis is a powerful tool for signal analysis and processing. The Fourier transform and wavelet transforms are used extensively as is the Short-Time Fourier Transform (or Gabor transform). In 1996 the ...
    • Analysis of Textual and Non-Textual Sources of Sentiment in Github 

      De Zoysa, Nalin (University of Waterloo, 2020-05-29)
      Github is a collaborative platform that is used primarily for the development of software. In order to gain more insight into how teams work on Github, we wish to analyze the sentiment content available via communication ...
    • Analysis of the Weight Function for Implicit Moving Least Squares Techniques 

      Yao, Zhujun (University of Waterloo, 2014-05-22)
      In this thesis, I analyze the weight functions used in moving least squares (MLS) methods to construct implicit surfaces that interpolate or approximate polygon soup. I found that one previous method that presented an ...
    • Analysis of Time Dependent Aggregate Claims 

      Xu, Di (University of Waterloo, 2016-07-22)
      Estimation of aggregate claim amounts is a fundamental task in Actuarial science, based on which risk theory, ruin theory and reinsurance theory can be studied. Properties, including moments, Laplace transforms, and ...
    • An Analysis on The Network Structure of Influential Communities in Twitter 

      Schunk, Adam (University of Waterloo, 2019-02-21)
      Over the past years online social networks have become a major target for marketing strategies, generating a need for methods to efficiently spread information through these networks. Close knit communities have developed ...
    • Analytic Combinatorics in Several Variables: Effective Asymptotics and Lattice Path Enumeration 

      Melczer, Stephen (University of Waterloo, 2017-06-26)
      The field of analytic combinatorics, which studies the asymptotic behaviour of sequences through analytic properties of their generating functions, has led to the development of deep and powerful tools with applications ...
    • Analytic Methods and Combinatorial Plants 

      Chizewer, Jeremy (University of Waterloo, 2024-04-08)
      Combinatorial structures have broad applications in computer science, from error-correcting codes to matrix multiplication. Many analytic tools have been developed for studying these structures. In this thesis, we examine ...
    • Analytics for Everyone 

      El Gebaly, Kareem (University of Waterloo, 2018-05-23)
      Analyzing relational data typically involves tasks that facilitate gaining familiarity or insights and coming up with findings or conclusions based on the data. This process is usually practiced by data experts, such as ...
    • Analyzing Adversarial Examples: A Framework to Study Adversary Knowledge 

      Fenaux, Lucas (University of Waterloo, 2024-01-22)
      Adversarial examples are malicious inputs to trained machine learning models supplied to trigger a misclassification. This type of attack has been studied for close to a decade, and we find that there is a lack of study ...
    • Analyzing Barehand Input Mappings for Video Timeline Control and Object Pointing on Smart TVs 

      Zhang, Futian (University of Waterloo, 2021-09-21)
      Smart TVs are getting popular in recent few years. Given the emerging feature of distant bare hand control, one challenge is how to perform common tasks with this new input modality. Two tasks are discussed in this thesis ...
    • Analyzing Quantum Cryptographic Protocols Using Optimization Techniques 

      Sikora, Jamie William Jonathon (University of Waterloo, 2012-05-22)
      This thesis concerns the analysis of the unconditional security of quantum cryptographic protocols using convex optimization techniques. It is divided into the study of coin-flipping and oblivious transfer. We first examine ...
    • Analyzing the Signal Strength of 2,946 Clients Operating in 446 WiFi Networks 

      Jacob, Midul (University of Waterloo, 2020-09-02)
      In this thesis we analyze data that was collected over a 24 hour period from 446 access points that provide connections for 2,946 clients. The data was obtained from deployments of modern commercial Google Wifi access ...
    • Analyzing Threats of Large-Scale Machine Learning Systems 

      Lukas, Nils (University of Waterloo, 2024-02-22)
      Large-scale machine learning systems such as ChatGPT rapidly transform how we interact with and trust digital media. However, the emergence of such a powerful technology faces a dual-use dilemma. While it can have many ...
    • Analyzing Tree Attachments in 2-Crossing-Critical Graphs with a V8 Minor 

      Bedsole, Carter (University of Waterloo, 2023-04-25)
      The crossing number of a graph is the minimum number of pairwise edge crossings in a drawing of the graph in the plane. A graph G is k-crossing-critical if its crossing number is at least k and if every proper subgraph H ...
    • Android Access Control Recommendation as a Deep Learning Task 

      Vagavolu, Dheeraj (University of Waterloo, 2023-09-25)
      Android enforces access control checks to protect sensitive framework APIs. If not properly protected, framework APIs can open the door for malicious apps to access sensitive resources without having the necessary privileges. ...
    • Angles, Majorization, Wielandt Inequality and Applications 

      Lin, Minghua (University of Waterloo, 2013-05-29)
      In this thesis we revisit two classical definitions of angle in an inner product space: real-part angle and Hermitian angle. Special attention is paid to Krein’s inequality and its analogue. Some applications are given, ...
    • Animating Coupling between Inviscid Free-Surface Liquids and Elastic Deformable Bodies 

      Zarifi, Omar (University of Waterloo, 2017-08-16)
      Driven by demand for high-fidelity computer-generated imagery, physics-based animation has become an exciting frontier of research in computer science. Simulations of fluids and their interactions with other objects in the ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages