Now showing items 673-692 of 2998

    • Detecting Hand-Ball Events in Video 

      Miller, Nicholas (University of Waterloo, 2008-08-27)
      We analyze videos in which a hand interacts with a basketball. In this work, we present a computational system which detects and classifies hand-ball events, given the trajectories of a hand and ball. Our approach is to ...
    • Detecting Network Intrusions from Authentication Logs 

      Bian, Haibo (University of Waterloo, 2019-09-19)
      Recently, network infiltrations due to advanced persistent threats (APTs) have grown significantly, resulting in considerable loses to businesses and organizations. APTs are stealthy attacks with the primary objective of ...
    • Detecting Test Clones with Static Analysis 

      Jain, Divam (University of Waterloo, 2013-09-27)
      Large-scale software systems often have correspondingly complicated test suites, which are diffi cult for developers to construct and maintain. As systems evolve, engineers must update their test suite along with changes ...
    • Detecting Vulnerable JavaScript Libraries in Hybrid Android Applications 

      Volodin, Nikita (University of Waterloo, 2019-02-15)
      Smartphone devices are very popular. There are a lot of devices being sold, a lot of applications that are created and a lot of people using those applications. However, mobile applications could only be created in the ...
    • Detection of Feature Interactions in Automotive Active Safety Features 

      Juarez Dominguez, Alma L. (University of Waterloo, 2012-05-02)
      With the introduction of software into cars, many functions are now realized with reduced cost, weight and energy. The development of these software systems is done in a distributed manner independently by suppliers, ...
    • The determination of structured Hessian matrices via automatic differentiation 

      Embaye, Samuel (University of Waterloo, 2014-09-23)
      In using automatic differentiation (AD) for Hessian computation, efficiency can be achieved by exploiting the sparsity existing in the derivative matrix. However, in the case where the Hessian is dense, this cannot be done ...
    • Determining relaxation times for porous media: Theory, measurement, and the inverse problem 

      Li, Yijia (University of Waterloo, 2007-08-03)
      This thesis provides an introduction to and analysis of the problem of determining nuclear magnetic resonance (NMR) relaxation times of porous media by using the so-called Carr-Purcell-Meiboom-Gill (CPMG) technique. We ...
    • Determining the Effectiveness of Multi-user, Hybrid, Human-Computer Assessments for High Recall Information Retrieval Systems 

      Alagappan, Solaiappan (University of Waterloo, 2022-08-23)
      Electronic Discovery (eDiscovery), a use-case of High-Recall Information Retrieval (HRIR), seeks to obtain substantially all and only the relevant documents responsive to a request for production in litigation. Applications ...
    • Determining the Utility of Key-term Highlighting for High Recall Information Retrieval Systems 

      Wang, Xue Jun (University of Waterloo, 2021-09-28)
      High-recall information retrieval (HRIR) is an important tool used in tasks such as electronic discovery ("eDiscovery") and systematic review of medical research. Applications of HRIR often uses a human as its oracle to ...
    • Deterministic Unimodularity Certification and Applications for Integer Matrices 

      Pauderis, Colton (University of Waterloo, 2013-09-23)
      The asymptotically fastest algorithms for many linear algebra problems on integer matrices, including solving a system of linear equations and computing the determinant, use high-order lifting. For a square nonsingular ...
    • Development and Application of Models and Diagnostics for Geophysical Fluid Flows 

      Storer, Benjamin (University of Waterloo, 2019-01-07)
      This thesis presents the development and application of numerical tools for simulating and diagnosing quasi-geostrophic fluid systems. In this thesis we present a new numerical model called SPIQG that is pseudo-spectral ...
    • Dialog Response Generation Using Adversarially Learned Latent Bag-of-Words 

      Khan, Kashif (University of Waterloo, 2020-08-28)
      Dialog response generation is the task of generating response utterance given a query utterance. Apart from generating relevant and coherent responses, one would like the dialog generation model to generate diverse and ...
    • Diameter and Rumour Spreading in Real-World Network Models 

      Mehrabian, Abbas (University of Waterloo, 2015-04-20)
      The so-called 'small-world phenomenon', observed in many real-world networks, is that there is a short path between any two nodes of a network, whose length is much smaller that the network's size, typically growing as a ...
    • Differential Equations and Depth First Search for Enumeration of Maps in Surfaces 

      Brown, Daniel (University of Waterloo, 1999)
      A map is an embedding of the vertices and edges of a graph into a compact 2-manifold such that the remainder of the surface has components homeomorphic to open disks. With the goal of proving the Four Colour Theorem, ...
    • The Differential Geometry of Instantons 

      Smith, Benjamin (University of Waterloo, 2009-08-07)
      The instanton solutions to the Yang-Mills equations have a vast range of practical applications in field theories including gravitation and electro-magnetism. Solutions to Maxwell's equations, for example, are abelian gauge ...
    • Differential Operators on Manifolds with G2-Structure 

      Suan, Caleb (University of Waterloo, 2020-12-16)
      In this thesis, we study differential operators on manifolds with torsion-free G2-structure. In particular, we use an identification of the spinor bundle S of such a manifold M with the bundle R ⊕ T*M to reframe statements ...
    • Differential Privacy for Nearest Neighbor Queries 

      Lepert, Emily (University of Waterloo, 2022-08-16)
      We examine the problem of providing differential privacy for nearest neighbor queries. Very few mechanisms exist that achieve this, most notable geo-indistinguishability in the context of location privacy. However it uses ...
    • Differentially Private Learning with Noisy Labels 

      Mohapatra, Shubhankar (University of Waterloo, 2020-05-28)
      Supervised machine learning tasks require large labelled datasets. However, obtaining such datasets is a difficult task and often leads to noisy labels due to human errors or adversarial perturbation. Recent studies have ...
    • Differentially Private Online Aggregation 

      Sivasubramaniam, Harry (University of Waterloo, 2022-01-13)
      Database operations are often performed in batch mode, i.e. the analyst issuing the query must wait till the database has been processed in its entirety before getting feedback. Batch mode is inadequate for large databases ...
    • Differentially Private Searchable Symmetric Encryption Scheme with Configurable Pattern Leakage 

      Shang, Zhiwei (University of Waterloo, 2019-12-19)
      Searchable symmetric encryption (SSE) allows a data owner to outsource its data to a cloud server while maintaining the ability to search over it. Most existing SSE schemes leak access-pattern leakage, and thus are vulnerable ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages