Now showing items 2423-2442 of 2994

    • Security for Rural Public Computing 

      Ur Rahman, Sumair (University of Waterloo, 2008-09-15)
      Current research on securing public computing infrastructure like Internet kiosks has focused on the use of smartphones to establish trust in a computing platform or to offload the processing of sensitive information, and ...
    • Security in Key Agreement: Two-Party Certificateless Schemes 

      Swanson, Colleen Marie (University of Waterloo, 2008-12-22)
      The main goal of cryptography is to enable secure communication over a public channel; often a secret shared among the communicating parties is used to achieve this. The process by which these parties agree on such a shared ...
    • Security Models and Proofs for Key Establishment Protocols 

      Ng, Eddie M. (University of Waterloo, 2005)
      In this thesis we study the problem of secure key establishment, motivated by the construction of secure channels protocols to protect information transmitted over an open network. In the past, the purported security of ...
    • SEEDS: Secure Decentralized Storage for Authentication Material 

      Dukovac, Stefanie (University of Waterloo, 2022-03-03)
      Applications that use passwords or cryptographic keys to authenticate users or perform cryptographic operations rely on centralized solutions. Trusted Platform Modules (TPMs) do not offer a way to replicate material, making ...
    • Selectable Heaps and Their Application to Lazy Search Trees 

      Zhang, Lingyi (University of Waterloo, 2021-04-29)
      We show the O(log n) time extract minimum function of efficient priority queues can be generalized to the extraction of the k smallest elements in O(k log(n/k)) time. We first show the heap-ordered tree selection of Kaplan ...
    • Selected Topics in Variable Annuities 

      Wang, Yumin (University of Waterloo, 2021-06-22)
      Variable annuities are long-term insurance products. They have become one of the most popular savings/investment vehicles over the past two decades due to their flexible investment options, stable long-term guarantees, and ...
    • Selection models for efficient two-phase design of family studies 

      Zhong, Yujie; Cook, Richard (John Wiley & Sons, Ltd., 2021-01-30)
      Family studies routinely employ biased sampling schemes in which individuals are randomly chosen from a disease registry and genetic and phenotypic data are obtained from their consenting relatives. We view this as a ...
    • Selective Flooding in Ad Hoc Networks 

      Iu, Ming-Yee (University of Waterloo, 2002)
      An ad hoc network is a collection of mobile wireless devices that cooperate with each other to route packets amongst themselves. The main difficulty in designing routing algorithms for such a network is the large number ...
    • Self-Complementary Arc-Transitive Graphs and Their Imposters 

      Mullin, Natalie Ellen (University of Waterloo, 2009-01-28)
      This thesis explores two infinite families of self-complementary arc-transitive graphs: the familiar Paley graphs and the newly discovered Peisert graphs. After studying both families, we examine a result of Peisert which ...
    • Self-Dual Graphs 

      Hill, Alan (University of Waterloo, 2002)
      The study of self-duality has attracted some attention over the past decade. A good deal of research in that time has been done on constructing and classifying all self-dual graphs and in particular polyhedra. We ...
    • A Self-Management Approach to Configuring Wireless Infrastructure Networks 

      Ahmed, Nabeel (University of Waterloo, 2006)
      Wireless infrastructure networks provide high-speed wireless connectivity over a small geographical area. The rapid proliferation of such networks makes their management not only more important but also more difficult. ...
    • Self-Similarity of Images and Non-local Image Processing 

      Glew, Devin (University of Waterloo, 2011-06-28)
      This thesis has two related goals: the first involves the concept of self-similarity of images. Image self-similarity is important because it forms the basis for many imaging techniques such as non-local means denoising ...
    • Self-supervised Video Representation Learning by Exploiting Video Speed Changes 

      Chen, Lizhe (University of Waterloo, 2022-04-29)
      In recent research, the self-supervised video representation learning methods have achieved improvement by exploring video’s temporal properties, such as playing speeds and temporal order. These works inspire us to exploit ...
    • Semantic code search using Code2Vec: A bag-of-paths model 

      Arumugam, Lakshmanan (University of Waterloo, 2020-05-14)
      The world is moving towards an age centered around digital artifacts created by individuals, not only are the digital artifacts being created at an alarming rate, also the software to manage such artifacts is increasing ...
    • Semantic Distance in WordNet: A Simplified and Improved Measure of Semantic Relatedness 

      Scriver, Aaron (University of Waterloo, 2006)
      Measures of semantic distance have received a great deal of attention recently in the field of computational lexical semantics. Although techniques for approximating the semantic distance of two concepts have existed ...
    • A Semantic Distance of Natural Language Queries Based on Question-Answer Pairs 

      Xiong, Kun (University of Waterloo, 2014-08-21)
      Many Natural Language Processing (NLP) techniques have been applied in the field of Question Answering (QA) for understanding natural language queries. Practical QA systems classify a natural language query into vertical ...
    • Semantic Order Compatibilities and Their Discovery 

      Mirsafian, Melicaalsadat (University of Waterloo, 2019-09-20)
      Ordered domains such as numbers and dates are common in real-life datasets. The SQL standard includes an ORDER BY clause to sort the results, and there has been research work on formalizing, reasoning about, and automatically ...
    • Semantic Search and Visual Exploration of Computational Notebooks 

      Li, Xingjun (University of Waterloo, 2021-08-12)
      Code search is an important and frequent activity for developers using computational notebooks (e.g., Jupyter). The flexibility of notebooks brings challenges for effective code search, where classic search interfaces for ...
    • Semantic-Based Context-Aware Service Discovery in Pervasive-Computing Environments 

      El-Sayed, Abdur-Rahman (University of Waterloo, 2007-01-08)
      Recent technological advancements are enabling the vision of pervasive or ubiquitous computing to become a reality. Service discovery is vital in such a computing paradigm, where a great number of devices and software ...
    • A Semi-Supervised Approach to the Construction of Semantic Lexicons 

      Ahmadi, Mohamad Hasan (University of Waterloo, 2012-03-21)
      A growing number of applications require dictionaries of words belonging to semantic classes present in specialized domains. Manually constructed knowledge bases often do not provide sufficient coverage of specialized ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages