Now showing items 2382-2401 of 3004

    • Robust Search Methods for Rational Drug Design Applications 

      Sadjad, Bashir (University of Waterloo, 2009-12-08)
      The main topic of this thesis is the development of computational search methods that are useful in drug design applications. The emphasis is on exhaustiveness of the search method such that it can guarantee a certain level ...
    • Robust Visual Recognition Using Multilayer Generative Neural Networks 

      Tang, Yichuan (University of Waterloo, 2010-08-25)
      Deep generative neural networks such as the Deep Belief Network and Deep Boltzmann Machines have been used successfully to model high dimensional visual data. However, they are not robust to common variations such as ...
    • Robustly Complete Temporal Logic Control Synthesis for Nonlinear Systems 

      Li, Yinan (University of Waterloo, 2019-12-18)
      Modern systems such as spacecrafts and autonomous vehicles are complex yet safety-critical, and therefore the control methods that can deal with different dynamics and constraints while being provably correct are sought ...
    • Robustness in Automatic Physical Database Design 

      El Gebaly, Kareem (University of Waterloo, 2007-08-17)
      Automatic physical database design tools rely on ``what-if'' interfaces to the query optimizer to estimate the execution time of the training query workload under different candidate physical designs. The tools use these ...
    • Robustness in Dimensionality Reduction 

      Liang, Jiaxi (University of Waterloo, 2016-04-14)
      Dimensionality reduction is widely used in many statistical applications, such as image analysis, microarray analysis, or text mining. This thesis focuses on three problems that relate to the robustness in dimension ...
    • Role of Domain Ignorance in Software Development 

      Mehrotra, Gaurav (University of Waterloo, 2011-05-19)
      Several have reported observations that sometimes ignorance of the domain in a software development project is useful for promoting the elicitation of tacit assumptions and out- of-the-box ideas. This thesis reports work ...
    • The Role of Instructional Design in Persuasion: A Comics Approach for Improving Cybersecurity 

      Zhang-Kennedy, Leah; Chiasson, Sonia; Biddle, Robert (Taylor & Francis, 2016-03)
      Although computer security technologies are the first line of defence to secure users, their success is dependent on individuals’ behaviour. It is therefore necessary to persuade users to practice good computer security. ...
    • Role Of Word-Of-Mouth For Programs Of Voluntary Vaccination: A Game-Theoretic Approach 

      Bhattacharyya, Samit; Bauch, Chris T.; Breban, Romulus (Elsevier, 2015-11-01)
      We propose a model describing the synergetic feedback between word-of-mouth (WoM) and epidemic dynamics controlled by voluntary vaccination. The key feature consists in combining a game-theoretic model for the spread of ...
    • Root-Locus Theory for Infinite-Dimensional Systems 

      Monifi, Elham (University of Waterloo, 2007-09-27)
      In this thesis, the root-locus theory for a class of diffusion systems is studied. The input and output boundary operators are co-located in the sense that their highest order derivatives occur at the same endpoint. It is ...
    • RootChord 

      Cwik, Lukasz (University of Waterloo, 2010-04-29)
      We present a distributed data structure, which we call "RootChord". To our knowledge, this is the first distributed hash table which is able to adapt to changes in the size of the network and answer lookup queries within ...
    • Rough Set Based Rule Evaluations and Their Applications 

      Li, Jiye (University of Waterloo, 2007-03-06)
      Knowledge discovery is an important process in data analysis, data mining and machine learning. Typically knowledge is presented in the form of rules. However, knowledge discovery systems often generate a huge amount ...
    • Routing, Scheduling, and Sorting in Consolidated Networks 

      Van Dyk, Madison (University of Waterloo, 2024-04-25)
      Modern parcel logistic networks are designed to ship demand between given origin, destination pairs of nodes in an underlying directed network. Efficiency dictates that volume needs to be consolidated at intermediate nodes ...
    • Ruin Analysis in a Discrete-time Sparre Andersen Model with External Financial Activities and Random Dividends 

      Kim, Sung Soo (University of Waterloo, 2013-08-28)
      In this thesis, we consider a risk model which incorporates multiple threshold levels characterizing an insurer's minimal capital requirement, dividend paying situations, and external financial activities. Our model is ...
    • SafeDS: Safe Data Structures for C++ 

      Ghorshi, Seyedeh Setareh (University of Waterloo, 2022-09-01)
      Memory corruption vulnerabilities in low-level languages such as C/C++ have been a problem in computer security for a long time. Accordingly, there has been a wide variety of proposed solutions for detecting or preventing ...
    • Safety-Critical Control for Dynamical Systems under Uncertainties 

      Wang, Chuanzheng (University of Waterloo, 2024-02-15)
      Control barrier functions (CBFs) and higher-order control barrier functions (HOCBFs) have shown great success in addressing control problems with safety guarantees. These methods usually find the next safe control input ...
    • Safety-Oriented Stability Biases for Continual Learning 

      Gaurav, Ashish (University of Waterloo, 2020-01-24)
      Continual learning is often confounded by “catastrophic forgetting” that prevents neural networks from learning tasks sequentially. In the case of real world classification systems that are safety-validated prior to ...
    • Sample size and robust marginal methods for cluster-randomized trials with censored event times 

      Cook, Richard J.; Zhong, Yujie (Wiley, 2015-03-15)
      In cluster-randomized trials, intervention effects are often formulated by specifying marginal models, fitting them under a working independence assumption, and using robust variance estimates to address the association ...
    • Sampling-based Predictive Database Buffer Management 

      Vanderkooy, Theodore (University of Waterloo, 2023-09-25)
      This thesis presents a database buffer caching policy that uses information about long- running scans to estimate future accesses. These estimates are used to approximate the optimal caching policy, which requires knowledge ...
    • Sandwich and probe problems for excluding paths 

      Figueiredo, Celina Miraglia Herrera de; Spirkl, Sophie (Elsevier, 2018-12-31)
      Let Pk denote an induced path on k vertices. For k ≥ 5, we show that the Pk-free sandwich problem, partitioned probe problem, and unpartitioned probe problem are NP-complete. For k ≤ 4, it is known that the Pk-free sandwich ...
    • The Sandwich Problem for Decompositions and Almost Monotone Properties 

      Chudnovsky, Maria; Figueiredo, Celina Miraglia Herrera de; Spirkl, Sophie (Springer Nature, 2018)
      We consider the graph sandwich problem and introduce almost monotone properties, for which the sandwich problem can be reduced to the recognition problem. We show that the property of containing a graph in C as an induced ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages