Now showing items 2982-3001 of 3018

    • “Wait and see” vaccinating behavior during a pandemic: a game theoretic analysis 

      Bhattacharyya, Samit; Bauch, Chris T. (Elsevier, 2011-07-26)
      During the 2009 H1N1 pandemic, many individuals adopted a “wait and see” approach to vaccinating until further information was available on the course of the pandemic and emerging vaccine risks. This behaviour implies two ...
    • Waiting Time Distributions in the Preemptive Accumulating Priority Queue 

      Fajardo, Val Andrei; Drekic, Steve (Springer, 2017-03-01)
      We consider a queueing system in which a single server attends to N priority classes of customers. Upon arrival to the system, a customer begins to accumulate priority linearly at a rate which is distinct to the class to ...
    • A walk through quantum noise: a study of error signatures and characterization methods 

      Carignan-Dugas, Arnaud (University of Waterloo, 2019-09-17)
      The construction of large scale quantum computing devices might be one of the most exciting and promising endeavors of the 21st century, but it also comes with many challenges. As quantum computers are supplemented with ...
    • Walking Onions: Scaling Distribution of Information Safely in Anonymity Networks 

      Komlo, Chelsea (University of Waterloo, 2020-08-07)
      Scaling anonymity networks offers unique security challenges, as attackers can exploit differing views of the network’s topology to perform epistemic and route capture attacks. Anonymity networks in practice, such as ...
    • Wall turbulence response to surface cooling and formation of strongly stable stratified boundary layers 

      Atoufi, Amir; Scott, K. Andrea; Waite, Michael L (AIP, 2019-08-20)
      This paper investigates the processes by which stable boundary layers are formed through strong surface cooling imposed on neutrally stratified wall-bounded turbulence using high-resolution direct numerical simulation at ...
    • Wasserstein Adversarial Robustness 

      Wu, Kaiwen (University of Waterloo, 2020-09-21)
      Deep models, while being extremely flexible and accurate, are surprisingly vulnerable to ``small, imperceptible'' perturbations known as adversarial attacks. While the majority of existing attacks focus on measuring ...
    • Wasserstein Autoencoders with Mixture of Gaussian Priors for Stylized Text Generation 

      Ghabussi, Amirpasha (University of Waterloo, 2021-01-28)
      Probabilistic text generation is an important application of Natural Language Processing (NLP). Variational autoencoders and Wasserstein autoencoders are two widely used methods for text generation. New research efforts ...
    • WatchTrace: Design and Evaluation of an At-Your-Side Gesture Paradigm 

      Siddhpuria, Shaishav (University of Waterloo, 2017-11-16)
      In this thesis, we present the exploration and evaluation of a gesture interaction paradigm performed with arms at rest at the side of one's body. This gesture stance is informed persisting challenges in mid-air arm gesture ...
    • Wave Refraction Effects in High Intensity Focused Ultrasound 

      Burnett, Lauren (University of Waterloo, 2019-01-22)
      High-Intensity Focused Ultrasound (HIFU) is a promising field of research being developed as an alternative to surgery and radiation therapy for the treatment of tumours. Within this field, many current methods of ...
    • Weak Moment Maps in Multisymplectic Geometry 

      Herman, Jonathan (University of Waterloo, 2018-07-04)
      We introduce the notion of a weak (homotopy) moment map associated to a Lie group action on a multisymplectic manifold. We show that the existence/uniqueness theory governing these maps is a direct generalization from ...
    • Weakly-supervised Semantic Segmentation with Regularized Loss Hyperparameter Search 

      Ji, Zongliang (University of Waterloo, 2021-09-20)
      Weakly supervised segmentation signi cantly reduces user annotation e ort. Recently, regularized loss was proposed for single object class segmentation under image-level weak supervision. Regularized loss consists of ...
    • Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput 

      Engler, Steven (University of Waterloo, 2020-08-10)
      The Tor anonymity network has millions of daily users and thousands of volunteer-run relays, but growing it further has several research and deployment challenges. One such challenge is supporting the increase in bandwidth ...
    • Web Data Integration for Non-Expert Users 

      El-Roby, Ahmed (University of Waterloo, 2018-04-26)
      oday, there is an abundance of structured data available on the web in the form of RDF graphs and relational (i.e., tabular) data. This data comes from heterogeneous sources, and realizing its full value requires integrating ...
    • Web Search, Web Tutorials & Software Applications: Characterizing and Supporting the Coordinated Use of Online Resources for Performing Work in Feature-Rich Software 

      Fourney, Adam (University of Waterloo, 2015-08-06)
      Web search and other online resources serve an integral role in how people learn and use feature-rich software (e.g., Adobe Photoshop) on a daily basis. Users depend on web resources both as a first line of technical ...
    • A Web-based Statistical Analysis Framework 

      Chodos, David (University of Waterloo, 2007-04-26)
      Statistical software packages have been used for decades to perform statistical analyses. Recently, the emergence of the Internet has expanded the potential for these packages. However, none of the existing packages have ...
    • Website Fingerprinting on LEO Satellite Internet 

      Singh, Prabhjot (University of Waterloo, 2024-01-24)
      Although encrypted channels, like those provided by anonymity networks such as Tor, have been put into effect, network adversaries have proven their capability to undermine users' browsing privacy through website fingerprinting ...
    • Website Fingerprinting: Attacks and Defenses 

      Wang, Tao (University of Waterloo, 2016-01-13)
      Website fingerprinting attacks allow a local, passive eavesdropper to determine a client's web activity by leveraging features from her packet sequence. These attacks break the privacy expected by users of privacy technologies, ...
    • Weighting Document Genre in Enterprise Search 

      Yeung, Peter Chun Kai (University of Waterloo, 2007-08-14)
      The creation of an Enterprise Search system involves many challenges that are not present in Web search. Searching a corporate collection is influenced both by the structure of the data present in the collection and by ...
    • The Weil conjectures 

      Hayman, Colin (University of Waterloo, 2008-01-24)
      In discussing the question of rational points on algebraic curves, we are usually concerned with ℚ. André Weil looked instead at curves over finite fields; assembling the counts into a function, he discovered that it ...
    • Welch Bounds and Quantum State Tomography 

      Belovs, Aleksandrs (University of Waterloo, 2008-12-22)
      In this thesis we investigate complete systems of MUBs and SIC-POVMs. These are highly symmetric sets of vectors in Hilbert space, interesting because of their applications in quantum tomography, quantum cryptography and ...


      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages