Now showing items 661-680 of 3004

    • Designing a Unity Plugin to Predict Expected Affect in Games Using Biophilia 

      Zhang, Licheng (University of Waterloo, 2022-09-28)
      Video games can generate different emotional states and affective reactions, but it can sometimes be difficult for a game’s visual designer to predict the emotional response a player might experience when designing a game ...
    • Designing Efficient Algorithms for Combinatorial Repairable Threshold Schemes 

      Kacsmar, Bailey (University of Waterloo, 2018-10-23)
      Repairable secret sharing schemes are secret sharing schemes where, without the original dealer who distributed the shares, the participants can combine information from their shares to perform a computation that ...
    • Designing Gunslinger: An Intermodal Large Display Interaction 

      Liu, Mingyu (University of Waterloo, 2015-05-19)
      In this thesis, we introduce Gunslinger, a mid-air barehand interaction technique using hand postures to trigger command modes and small finger and hand movements for events and parameter control. Unlike past work, Gunslinger ...
    • Designing Intelligent Systems to Support Workspace Collaboration 

      Jahangirzadeh Soure, Ehsan (University of Waterloo, 2023-02-06)
      Complex problems and interprofessional work require more resources to be involved, which has been possible through collaboration. Collaborative work is evolving from physical collaboration to more virtual forms through ...
    • Designing Persuasive Technology to Reduce Peak Electricity Demand in Ontario Homes 

      Sugarman, Valerie (University of Waterloo, 2014-10-20)
      When it comes to environmental sustainability, the time that electricity is consumed matters. For example, using an air conditioner on a hot summer afternoon as the power grid is strained necessitates the use of more ...
    • Designing Persuasively using Playful Elements 

      Wehbe, Rina Renee (University of Waterloo, 2021-09-14)
      Alongside productivity and communication, computers are a valuable tool for diversion and amusement. Game Designers leverage the multifaceted world of computing to create applications that can be developed persuasively; ...
    • Designing Survivable Wavelength Division Multiplexing (WDM) Mesh Networks 

      Haque, Anwar (University of Waterloo, 2007-04-18)
      This thesis focuses on the survivable routing problem in WDM mesh networks where the objective is to minimize the total number of wavelengths used for establishing working and protection paths in the WDM networks. The past ...
    • Desired Features and Design Methodologies of Secure Authenticated Key Exchange Protocols in the Public-Key Infrastructure Setting 

      Wang, Hao-Hsien (University of Waterloo, 2004)
      The importance of an authenticated key exchange (AKE) protocol has long been known in the field of cryptography. Two of the questions still being asked today are (1) what properties or features does a secure AKE ...
    • Detectability of Singularly Perturbed Systems 

      Vu, Leonard Phong (University of Waterloo, 2005)
      A form of detectability, known as the input-output-to-state stability property, for singularly perturbed systems is examined in this work. This work extends the result of a paper by Christofides & Teel wherein they ...
    • Detecting an Odd Hole 

      Chudnovsky, Maria; Scott, Alex; Seymour, Paul; Spirkl, Sophie (Association for Computing Machinery, 2020-02)
      We give a polynomial-time algorithm to test whether a graph contains an induced cycle with length more than three and odd.
    • Detecting and distinguishing transitions in ecological systems: model and data-driven approaches 

      Bury, Thomas (University of Waterloo, 2020-01-22)
      There exists a plethora of systems that have the capacity to undergo sudden transitions that result in a significantly different state or dynamic. Consider the collapse of fisheries, outbreak of disease or transition to a ...
    • Detecting Exploitable Vulnerabilities in Android Applications 

      Sankarapandian, Shivasurya (University of Waterloo, 2021-05-27)
      The world is moving towards remote-first and giving rise to many mobile tools and applications to get the work done. As more applications are moving towards the cloud and therefore require remote access, the attack surface ...
    • Detecting Feature-Interaction Hotspots in Automotive Software using Relational Algebra 

      Muscedere, Bryan James (University of Waterloo, 2018-05-14)
      Modern software projects are programmed by multiple teams, consist of millions of lines of code, and are split into separate components that, during runtime, may not be contained in the same process. Due to these complexities, ...
    • Detecting Feature-Interaction Symptoms in Automotive Software Using Lightweight Analysis 

      Muscedere, Bryan J.; Hackman, Robert; Anbarnam, Davood; Atlee, Joanne M.; Davis, Ian J.; Godfrey, Michael W. (IEEE, 2019-02)
      Modern automotive software systems are large, com- plex, and feature rich; they can contain over 100 million lines of code, comprising hundreds of features distributed across multiple electronic control units (ECUs), all ...
    • Detecting Hand-Ball Events in Video 

      Miller, Nicholas (University of Waterloo, 2008-08-27)
      We analyze videos in which a hand interacts with a basketball. In this work, we present a computational system which detects and classifies hand-ball events, given the trajectories of a hand and ball. Our approach is to ...
    • Detecting Network Intrusions from Authentication Logs 

      Bian, Haibo (University of Waterloo, 2019-09-19)
      Recently, network infiltrations due to advanced persistent threats (APTs) have grown significantly, resulting in considerable loses to businesses and organizations. APTs are stealthy attacks with the primary objective of ...
    • Detecting Test Clones with Static Analysis 

      Jain, Divam (University of Waterloo, 2013-09-27)
      Large-scale software systems often have correspondingly complicated test suites, which are diffi cult for developers to construct and maintain. As systems evolve, engineers must update their test suite along with changes ...
    • Detecting Vulnerable JavaScript Libraries in Hybrid Android Applications 

      Volodin, Nikita (University of Waterloo, 2019-02-15)
      Smartphone devices are very popular. There are a lot of devices being sold, a lot of applications that are created and a lot of people using those applications. However, mobile applications could only be created in the ...
    • Detection of Feature Interactions in Automotive Active Safety Features 

      Juarez Dominguez, Alma L. (University of Waterloo, 2012-05-02)
      With the introduction of software into cars, many functions are now realized with reduced cost, weight and energy. The development of these software systems is done in a distributed manner independently by suppliers, ...
    • The determination of structured Hessian matrices via automatic differentiation 

      Embaye, Samuel (University of Waterloo, 2014-09-23)
      In using automatic differentiation (AD) for Hessian computation, efficiency can be achieved by exploiting the sparsity existing in the derivative matrix. However, in the case where the Hessian is dense, this cannot be done ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages