Now showing items 653-672 of 2993

    • A Design Space for Distributed Producer-Consumer Data Structures Using RDMA 

      Sharma, Manoj Kumar (University of Waterloo, 2020-08-26)
      Remote Direct Memory Access (RDMA) has become a standard networking technology and is prominently used in high-performance applications. While RDMA can provide both excellent performance and novel capabilities, it can ...
    • Design, Analysis, and Optimization of Isogeny-Based Key Establishment Protocols 

      LeGrow, Jason Travis (University of Waterloo, 2020-08-19)
      We analyze the Commutative Supersingular Isogeny Diffie-Hellman protocol (CSIDH), a novel supersingular isogeny-based key establishment protocol. Our analysis is from three perspectives: Quantum Cryptanalysis. Building ...
    • Designing a Foot Input System for Productive Work at a Standing Desk 

      Saunders, William (University of Waterloo, 2015-03-13)
      In this thesis we present Tap-Kick-Click, a foot interaction system for controlling common desktop applications. This system enables computer workers to take healthy and productive breaks from using a keyboard and mouse ...
    • Designing a Privacy-Aware Location Proof Architecture 

      Luo, Wanying (University of Waterloo, 2010-04-15)
      Although location-based applications have existed for several years, verifying the correctness of a user's claimed location is a challenge that has only recently gained attention in the research community. Existing ...
    • Designing a Unity Plugin to Predict Expected Affect in Games Using Biophilia 

      Zhang, Licheng (University of Waterloo, 2022-09-28)
      Video games can generate different emotional states and affective reactions, but it can sometimes be difficult for a game’s visual designer to predict the emotional response a player might experience when designing a game ...
    • Designing Efficient Algorithms for Combinatorial Repairable Threshold Schemes 

      Kacsmar, Bailey (University of Waterloo, 2018-10-23)
      Repairable secret sharing schemes are secret sharing schemes where, without the original dealer who distributed the shares, the participants can combine information from their shares to perform a computation that ...
    • Designing Gunslinger: An Intermodal Large Display Interaction 

      Liu, Mingyu (University of Waterloo, 2015-05-19)
      In this thesis, we introduce Gunslinger, a mid-air barehand interaction technique using hand postures to trigger command modes and small finger and hand movements for events and parameter control. Unlike past work, Gunslinger ...
    • Designing Intelligent Systems to Support Workspace Collaboration 

      Jahangirzadeh Soure, Ehsan (University of Waterloo, 2023-02-06)
      Complex problems and interprofessional work require more resources to be involved, which has been possible through collaboration. Collaborative work is evolving from physical collaboration to more virtual forms through ...
    • Designing Persuasive Technology to Reduce Peak Electricity Demand in Ontario Homes 

      Sugarman, Valerie (University of Waterloo, 2014-10-20)
      When it comes to environmental sustainability, the time that electricity is consumed matters. For example, using an air conditioner on a hot summer afternoon as the power grid is strained necessitates the use of more ...
    • Designing Persuasively using Playful Elements 

      Wehbe, Rina Renee (University of Waterloo, 2021-09-14)
      Alongside productivity and communication, computers are a valuable tool for diversion and amusement. Game Designers leverage the multifaceted world of computing to create applications that can be developed persuasively; ...
    • Designing Survivable Wavelength Division Multiplexing (WDM) Mesh Networks 

      Haque, Anwar (University of Waterloo, 2007-04-18)
      This thesis focuses on the survivable routing problem in WDM mesh networks where the objective is to minimize the total number of wavelengths used for establishing working and protection paths in the WDM networks. The past ...
    • Desired Features and Design Methodologies of Secure Authenticated Key Exchange Protocols in the Public-Key Infrastructure Setting 

      Wang, Hao-Hsien (University of Waterloo, 2004)
      The importance of an authenticated key exchange (AKE) protocol has long been known in the field of cryptography. Two of the questions still being asked today are (1) what properties or features does a secure AKE ...
    • Detectability of Singularly Perturbed Systems 

      Vu, Leonard Phong (University of Waterloo, 2005)
      A form of detectability, known as the input-output-to-state stability property, for singularly perturbed systems is examined in this work. This work extends the result of a paper by Christofides & Teel wherein they ...
    • Detecting an Odd Hole 

      Chudnovsky, Maria; Scott, Alex; Seymour, Paul; Spirkl, Sophie (Association for Computing Machinery, 2020-02)
      We give a polynomial-time algorithm to test whether a graph contains an induced cycle with length more than three and odd.
    • Detecting and distinguishing transitions in ecological systems: model and data-driven approaches 

      Bury, Thomas (University of Waterloo, 2020-01-22)
      There exists a plethora of systems that have the capacity to undergo sudden transitions that result in a significantly different state or dynamic. Consider the collapse of fisheries, outbreak of disease or transition to a ...
    • Detecting Exploitable Vulnerabilities in Android Applications 

      Sankarapandian, Shivasurya (University of Waterloo, 2021-05-27)
      The world is moving towards remote-first and giving rise to many mobile tools and applications to get the work done. As more applications are moving towards the cloud and therefore require remote access, the attack surface ...
    • Detecting Feature-Interaction Hotspots in Automotive Software using Relational Algebra 

      Muscedere, Bryan James (University of Waterloo, 2018-05-14)
      Modern software projects are programmed by multiple teams, consist of millions of lines of code, and are split into separate components that, during runtime, may not be contained in the same process. Due to these complexities, ...
    • Detecting Feature-Interaction Symptoms in Automotive Software Using Lightweight Analysis 

      Muscedere, Bryan J.; Hackman, Robert; Anbarnam, Davood; Atlee, Joanne M.; Davis, Ian J.; Godfrey, Michael W. (IEEE, 2019-02)
      Modern automotive software systems are large, com- plex, and feature rich; they can contain over 100 million lines of code, comprising hundreds of features distributed across multiple electronic control units (ECUs), all ...
    • Detecting Hand-Ball Events in Video 

      Miller, Nicholas (University of Waterloo, 2008-08-27)
      We analyze videos in which a hand interacts with a basketball. In this work, we present a computational system which detects and classifies hand-ball events, given the trajectories of a hand and ball. Our approach is to ...
    • Detecting Network Intrusions from Authentication Logs 

      Bian, Haibo (University of Waterloo, 2019-09-19)
      Recently, network infiltrations due to advanced persistent threats (APTs) have grown significantly, resulting in considerable loses to businesses and organizations. APTs are stealthy attacks with the primary objective of ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages