Now showing items 2778-2797 of 2985

    • Topological Quantum Computation and Protected Gates 

      Sijher, Sumit (University of Waterloo, 2015-12-22)
      This thesis serves to give a mathematical overview of topological quantum computation and to apply the theory to characterize desirable fault-tolerant operations called protected gates. Topological quantum computation is ...
    • Topology-Awareness and Re-optimization Mechanism for Virtual Network Embedding 

      Butt, Nabeel (University of Waterloo, 2010-01-15)
      Embedding of virtual network (VN) requests on top of a shared physical network poses an intriguing combination of theoretical and practical challenges. Two major problems with the state-of-the-art VN embedding algorithms ...
    • Total Relation Recall: High-Recall Relation Extraction 

      Liu, Xinyu (University of Waterloo, 2021-04-28)
      As Knowledge Graphs (KGs) become important in a wide range of applications, including question-answering and recommender systems, more and more enterprises have recognized the value of constructing KGs with their own data. ...
    • Touch Crossing-Based Selection and the Pin-and-Cross Technique 

      Luo, Yuexing (University of Waterloo, 2015-05-13)
      This thesis focuses on the evaluation, exploration and demonstration of crossing paradigm with touch modality. Under the scenario of crossing selection, the target is selected by stroking through a boundary 'goal' instead ...
    • Toward a unified global regulatory capital framework for life insurers 

      Sharara, Ishmael (University of Waterloo, 2011-03-07)
      In many regions of the world, the solvency regulation of insurers is becoming more principle-based and market oriented. However, the exact forms of the solvency standards that are emerging in individual jurisdictions are ...
    • Toward an improved understanding of software change 

      Zou, Lijie (University of Waterloo, 2003)
      Structural changes, including moving, renaming, merging and splitting are important design change decisions made by programmers. However, during the process of software evolution, this information often gets lost. ...
    • Toward an Interoperable and Centralized Consent Centric Access Control Model for Healthcare Resources: Model and Implementation 

      Mousaid, Hassan (University of Waterloo, 2020-09-29)
      Although patients have the legal right in Canada and many other countries to specify how, when and by whom their medical records can be accessed, the harsh reality is that in almost all cases using existing systems and ...
    • Toward an Understanding of Software Code Cloning as a Development Practice 

      Kapser, Cory (University of Waterloo, 2009-09-30)
      Code cloning is the practice of duplicating existing source code for use elsewhere within a software system. Within the research community, conventional wisdom has asserted that code cloning is generally a bad practice, ...
    • Toward Improved Understanding and Management of Software Clones 

      Wang, Wei (University of Waterloo, 2012-05-03)
      The cloning of code is controversial as a development practice. Empirical studies on the long-term effects of cloning on software quality and maintainability have produced mixed results. Some studies have found that cloning ...
    • Toward Secure Trust and Reputation Systems for Electronic Marketplaces 

      Kerr, Reid Charles (University of Waterloo, 2007-05-03)
      In electronic marketplaces, buying and selling agents may be used to represent buyers and sellers respectively. When these marketplaces are large, repeated transactions between traders may be rare. This makes it difficult ...
    • Towards a New Generation of Permissioned Blockchain Systems 

      Gorenflo, Christian (University of Waterloo, 2020-05-14)
      With the release of Satoshi Nakamoto's Bitcoin system in 2008 a new decentralized computation paradigm, known as blockchain, was born. Bitcoin promised a trading network for virtual coins, publicly available for anyone to ...
    • Towards a Trait Model of Video Game Preferences 

      Fortes Tondello, Gustavo; Valtchanov, Deltcho; Reetz, Adrian; Wehbe, Rina Renee; Orji, Rita; Nacke, Lennart (Taylor & Francis, 2018-04-19)
      Typologies for understanding players’ preferences toward different gameplay styles have gained popularity in research. However, attempts to model players’ preferences are based on type models instead of trait models, ...
    • Towards A Workload-Driven Flow Scheduler For Modern Datacenters 

      Naouach, Mohamed Malek (University of Waterloo, 2018-10-05)
      Modern datacenters run different applications with various communication requirements in terms of bandwidth and deadlines. Of particular interest are deadlines that are driving web-search workloads e.g. when submitting ...
    • Towards an Enhanced Dependency Graph 

      Meidani, Seyed Mehran (University of Waterloo, 2022-12-22)
      Dependency graphs are at the heart of software analytics tasks like change impact analysis, test selection, and maintenance analysis. Despite their importance, current approaches to extract and analyze dependency graphs ...
    • Towards Automatic Initial Buffer Configuration 

      Ku, Fei Yen (University of Waterloo, 2003)
      Buffer pools are blocks of memory used in database systems to retain frequently referenced pages. Configuring the buffer pools is a difficult and manual task that involves determining the amount of memory to devote to ...
    • Towards Automating Protein Structure Determination from NMR Data 

      Gao, Xin (University of Waterloo, 2009-09-29)
      Nuclear magnetic resonance (NMR) spectroscopy technique is becoming exceedingly significant due to its capability of studying protein structures in solution. However, NMR protein structure determination has remained a ...
    • Towards Better Methods of Stereoscopic 3D Media Adjustment and Stylization 

      Istead, Lesley (University of Waterloo, 2018-05-30)
      Stereoscopic 3D (S3D) media is pervasive in film, photography and art. However, working with S3D media poses a number of interesting challenges arising from capture and editing. In this thesis we address several of these ...
    • Towards Better Static Analysis Security Testing Methodologies 

      Aloraini, Bushra (University of Waterloo, 2020-09-24)
      Software vulnerabilities have been a significant attack surface used in cyberattacks, which have been escalating recently. Software vulnerabilities have caused substantial damage, and thus there are many techniques to ...
    • Towards Data-Leveraged Behavioral Policy Design for Alleviating Peak Electricity Demand 

      Pat, Ankit (University of Waterloo, 2016-01-20)
      The problem of managing peak electricity demand is of significant importance to utility providers. In Ontario, electricity consumption achieves its peak during the afternoon hours in summer. Electricity generation units ...
    • Towards Effective Measurement of Membership Privacy Risk for Machine Learning Models 

      Duddu, Vasisht (University of Waterloo, 2022-07-18)
      Machine learning (ML) models are trained on data which can be sensitive. Membership inference attacks (MIAs) infer whether a particular data record was used to train an ML model. This violates the membership privacy of an ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages