Now showing items 2861-2880 of 3013

    • Tsirelson's problems and entanglement breaking rank 

      Prakash, Jitendra (University of Waterloo, 2018-08-13)
      There are two main themes of this thesis. In the first part, we study the various sets of correlations arising in the study of non-local games and Tsirelson's problems. In the second part we introduce the notion of ...
    • Turning Open Government Data Portals into Interactive Databases 

      Liu, Chang (University of Waterloo, 2022-09-21)
      The launch of open governmental data portals (OGDPs), such as data.gov, data.gov.in, and open.canada.ca, have popularized the open data movement of the last decade, which now includes numerous other portals from other ...
    • Turnpike Property for Generalized Linear-Quadratic Optimal Control Problem 

      Li, Zhuqing (University of Waterloo, 2023-04-28)
      The turnpike phenomenon describes the long time behavior of optimally controlled systems whose optimal trajectories over a sufficiently large time horizon stay for most of the time close to a prescribed trajectory of the ...
    • TwitSong: A current events computer poet and the thorny problem of assessment. 

      Lamb, Carolyn (University of Waterloo, 2018-11-29)
      This thesis is driven by the question of how computers can generate poetry, and how that poetry can be evaluated. We survey existing work on computer-generated poetry and interdisciplinary work on how to evaluate this type ...
    • Two Affine Scaling Methods for Solving Optimization Problems Regularized with an L1-norm 

      Li, Zhirong (University of Waterloo, 2010-09-30)
      In finance, the implied volatility surface is plotted against strike price and time to maturity. The shape of this volatility surface can be identified by fitting the model to what is actually observed in the market. The ...
    • Two Coalitional Models for Network Formation and Matching Games 

      Branzei, Simina (University of Waterloo, 2011-08-23)
      This thesis comprises of two separate game theoretic models that fall under the general umbrella of network formation games. The first is a coalitional model of interaction in social networks that is based on the idea ...
    • Two combinatorial problems from craniosynostosis 

      Rundstrom, Mathieu Erik Charles (University of Waterloo, 2022-09-08)
      The art of cranial vault remodelling surgery is amazing and fascinating, but remains much of that, an art, to this day. In this thesis, we provide two mathematical approaches to tackle cranial vault remodelling surgery, ...
    • Two results on words 

      Tan, Shuo (University of Waterloo, 2013-08-30)
      The study of combinatorial patterns of words has raised great interest since the early 20th century. In this master's thesis presentation we study two combinatorial patterns. The first pattern is “abelian k-th power free” ...
    • Two- and Three-Dimensional Coding Schemes for Wavelet and Fractal-Wavelet Image Compression 

      Alexander, Simon (University of Waterloo, 2001)
      This thesis presents two novel coding schemes and applications to both two- and three-dimensional image compression. Image compression can be viewed as methods of functional approximation under a constraint on the amount ...
    • A two-phase model for chronic disease processes under intermittent inspection 

      Wu, Ying; Cook, Richard J. (Wiley, 2017-06-15)
      A model is developed for chronic diseases with an indolent phase that is followed by a phase with more active disease resulting in progression and damage. The time scales for the intensity functions for the active phase ...
    • The two-space homogenization method 

      Murley, Jonathan (University of Waterloo, 2012-10-04)
      In this thesis, we consider the two-space homogenization method, which produces macroscopic expressions out of descriptions of the behaviour of the microstructure. Specifically, we focus on its application to poroelastic ...
    • A Two-Tier Storage Interface for Low-Latency Kubernetes Deployments 

      Ionita, Teodor Alexandru (University of Waterloo, 2022-05-11)
      Orchestration systems are responsible for automating the management of software deployments on computer systems, managing large numbers of machines. Edge computing is a decentralized compute model describing how compute ...
    • A Type System With Containers 

      Thode, Michael (University of Waterloo, 2021-10-04)
      In this thesis, we will introduce the concept of containers as they apply to programming languages. Encapsulation is a common topic in programming languages with well understood benefits. Here, we will investigate its ...
    • Type-Aware Optimizations with Imperfect Types 

      Ikosin, Jeremiah (University of Waterloo, 2024-05-10)
      JavaScript, a programming language originally designed for web browsers, has become ubiquitous, experiencing adoption across multiple platforms. Its dynamic type system and prototype-based object orientation are well-known ...
    • UCAnDoModels: A Context-based Model Editor for Editing and Debugging UML Class and State-Machine Diagrams 

      Pourali, Parsa; Atlee, Joanne M. (ACM/IEEE, 2019-09)
      Practitioners face cognitive challenges when using model editors to edit and debug UML models, which make them reluctant to adopt modelling. To assist practitioners in their modelling tasks, we have developed effective ...
    • Unavoidable Minors of Large 5-Connected Graphs 

      Shantanam, Abhinav (University of Waterloo, 2016-08-24)
      This thesis shows that, for every positive integer $n \geq 5$, there exists a positive integer $N$ such that every $5-$connected graph with at least $N$ vertices has a minor isomorphic to one of thirty explicitly defined ...
    • Unbiased Statistical Estimation and Valid Confidence Intervals Under Differential Privacy 

      Covington, Christian (University of Waterloo, 2022-07-13)
      We present a method for producing unbiased parameter estimates and valid confidence intervals under the constraints of differential privacy, a formal framework for limiting individual information leakage from sensitive ...
    • Unconditionally Secure Cryptography: Signature Schemes, User-Private Information Retrieval, and the Generalized Russian Cards Problem 

      Swanson, Colleen M (University of Waterloo, 2013-05-23)
      We focus on three different types of multi-party cryptographic protocols. The first is in the area of unconditionally secure signature schemes, the goal of which is to provide users the ability to electronically sign ...
    • Unconventional Applications of Compiler Analysis 

      Selby, Jason W. A. (University of Waterloo, 2011-08-30)
      Previously, compiler transformations have primarily focused on minimizing program execution time. This thesis explores some examples of applying compiler technology outside of its original scope. Specifically, ...
    • Under-Ice Fluid Dynamics in Freshwater Lakes: Implications for Ecology in a Changing Climate 

      Hanson, Taylor (University of Waterloo, 2021-08-24)
      An abundance of evidence exists to support the notion of annual winter blooms of phytoplankton, particularly diatoms, persistent in the surface waters of freshwater lakes located in temperate and boreal climatic zones. ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages