Now showing items 674-693 of 2985

    • The determination of structured Hessian matrices via automatic differentiation 

      Embaye, Samuel (University of Waterloo, 2014-09-23)
      In using automatic differentiation (AD) for Hessian computation, efficiency can be achieved by exploiting the sparsity existing in the derivative matrix. However, in the case where the Hessian is dense, this cannot be done ...
    • Determining relaxation times for porous media: Theory, measurement, and the inverse problem 

      Li, Yijia (University of Waterloo, 2007-08-03)
      This thesis provides an introduction to and analysis of the problem of determining nuclear magnetic resonance (NMR) relaxation times of porous media by using the so-called Carr-Purcell-Meiboom-Gill (CPMG) technique. We ...
    • Determining the Effectiveness of Multi-user, Hybrid, Human-Computer Assessments for High Recall Information Retrieval Systems 

      Alagappan, Solaiappan (University of Waterloo, 2022-08-23)
      Electronic Discovery (eDiscovery), a use-case of High-Recall Information Retrieval (HRIR), seeks to obtain substantially all and only the relevant documents responsive to a request for production in litigation. Applications ...
    • Determining the Utility of Key-term Highlighting for High Recall Information Retrieval Systems 

      Wang, Xue Jun (University of Waterloo, 2021-09-28)
      High-recall information retrieval (HRIR) is an important tool used in tasks such as electronic discovery ("eDiscovery") and systematic review of medical research. Applications of HRIR often uses a human as its oracle to ...
    • Deterministic Unimodularity Certification and Applications for Integer Matrices 

      Pauderis, Colton (University of Waterloo, 2013-09-23)
      The asymptotically fastest algorithms for many linear algebra problems on integer matrices, including solving a system of linear equations and computing the determinant, use high-order lifting. For a square nonsingular ...
    • Development and Application of Models and Diagnostics for Geophysical Fluid Flows 

      Storer, Benjamin (University of Waterloo, 2019-01-07)
      This thesis presents the development and application of numerical tools for simulating and diagnosing quasi-geostrophic fluid systems. In this thesis we present a new numerical model called SPIQG that is pseudo-spectral ...
    • Dialog Response Generation Using Adversarially Learned Latent Bag-of-Words 

      Khan, Kashif (University of Waterloo, 2020-08-28)
      Dialog response generation is the task of generating response utterance given a query utterance. Apart from generating relevant and coherent responses, one would like the dialog generation model to generate diverse and ...
    • Diameter and Rumour Spreading in Real-World Network Models 

      Mehrabian, Abbas (University of Waterloo, 2015-04-20)
      The so-called 'small-world phenomenon', observed in many real-world networks, is that there is a short path between any two nodes of a network, whose length is much smaller that the network's size, typically growing as a ...
    • Differential Equations and Depth First Search for Enumeration of Maps in Surfaces 

      Brown, Daniel (University of Waterloo, 1999)
      A map is an embedding of the vertices and edges of a graph into a compact 2-manifold such that the remainder of the surface has components homeomorphic to open disks. With the goal of proving the Four Colour Theorem, ...
    • The Differential Geometry of Instantons 

      Smith, Benjamin (University of Waterloo, 2009-08-07)
      The instanton solutions to the Yang-Mills equations have a vast range of practical applications in field theories including gravitation and electro-magnetism. Solutions to Maxwell's equations, for example, are abelian gauge ...
    • Differential Operators on Manifolds with G2-Structure 

      Suan, Caleb (University of Waterloo, 2020-12-16)
      In this thesis, we study differential operators on manifolds with torsion-free G2-structure. In particular, we use an identification of the spinor bundle S of such a manifold M with the bundle R ⊕ T*M to reframe statements ...
    • Differential Privacy for Nearest Neighbor Queries 

      Lepert, Emily (University of Waterloo, 2022-08-16)
      We examine the problem of providing differential privacy for nearest neighbor queries. Very few mechanisms exist that achieve this, most notable geo-indistinguishability in the context of location privacy. However it uses ...
    • Differentially Private Learning with Noisy Labels 

      Mohapatra, Shubhankar (University of Waterloo, 2020-05-28)
      Supervised machine learning tasks require large labelled datasets. However, obtaining such datasets is a difficult task and often leads to noisy labels due to human errors or adversarial perturbation. Recent studies have ...
    • Differentially Private Online Aggregation 

      Sivasubramaniam, Harry (University of Waterloo, 2022-01-13)
      Database operations are often performed in batch mode, i.e. the analyst issuing the query must wait till the database has been processed in its entirety before getting feedback. Batch mode is inadequate for large databases ...
    • Differentially Private Searchable Symmetric Encryption Scheme with Configurable Pattern Leakage 

      Shang, Zhiwei (University of Waterloo, 2019-12-19)
      Searchable symmetric encryption (SSE) allows a data owner to outsource its data to a cloud server while maintaining the ability to search over it. Most existing SSE schemes leak access-pattern leakage, and thus are vulnerable ...
    • Differentially Private Simple Genetic Algorithms 

      Humphries, Thomas (University of Waterloo, 2021-12-13)
      We study the differentially private (DP) selection problem, where the goal is to select an item from a set of candidates that approximately maximizes a given objective function. The most common solution to this problem is ...
    • Differentially-private Multiparty Clustering 

      Ahmed, Abdelrahman (University of Waterloo, 2023-09-13)
      In an era marked by the widespread application of Machine Learning (ML) across diverse domains, the necessity of privacy-preserving techniques has become paramount. The Euclidean k-Means problem, a fundamental component ...
    • Digital Rights Management and Code Obfuscation 

      Sethi, Amit (University of Waterloo, 2004)
      Digital Rights Management (DRM) involves retaining control over digital information, even after it has been made public. Preventing illegal file sharing on the Internet, which is a topic that has recently received a large ...
    • Digital Signature Scheme Variations 

      Dunbar, Fiona (University of Waterloo, 2002)
      A digital signature scheme is the process of signing an electronic message that can be transmitted over a computer network. Digital signatures provide message authentication that can be proved to a third party. With ...
    • Digital Signature Schemes Based on Hash Functions 

      Lafrance, Philip (University of Waterloo, 2017-04-19)
      Cryptographers and security experts around the world have been awakened to the reality that one day (potentially soon) large-scale quantum computers may be available. Most of the public-key cryptosystems employed today on ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages