Now showing items 691-710 of 3003

    • Differentially Private Learning with Noisy Labels 

      Mohapatra, Shubhankar (University of Waterloo, 2020-05-28)
      Supervised machine learning tasks require large labelled datasets. However, obtaining such datasets is a difficult task and often leads to noisy labels due to human errors or adversarial perturbation. Recent studies have ...
    • Differentially Private Online Aggregation 

      Sivasubramaniam, Harry (University of Waterloo, 2022-01-13)
      Database operations are often performed in batch mode, i.e. the analyst issuing the query must wait till the database has been processed in its entirety before getting feedback. Batch mode is inadequate for large databases ...
    • Differentially Private Searchable Symmetric Encryption Scheme with Configurable Pattern Leakage 

      Shang, Zhiwei (University of Waterloo, 2019-12-19)
      Searchable symmetric encryption (SSE) allows a data owner to outsource its data to a cloud server while maintaining the ability to search over it. Most existing SSE schemes leak access-pattern leakage, and thus are vulnerable ...
    • Differentially Private Simple Genetic Algorithms 

      Humphries, Thomas (University of Waterloo, 2021-12-13)
      We study the differentially private (DP) selection problem, where the goal is to select an item from a set of candidates that approximately maximizes a given objective function. The most common solution to this problem is ...
    • Differentially-private Multiparty Clustering 

      Ahmed, Abdelrahman (University of Waterloo, 2023-09-13)
      In an era marked by the widespread application of Machine Learning (ML) across diverse domains, the necessity of privacy-preserving techniques has become paramount. The Euclidean k-Means problem, a fundamental component ...
    • Digital Rights Management and Code Obfuscation 

      Sethi, Amit (University of Waterloo, 2004)
      Digital Rights Management (DRM) involves retaining control over digital information, even after it has been made public. Preventing illegal file sharing on the Internet, which is a topic that has recently received a large ...
    • Digital Signature Scheme Variations 

      Dunbar, Fiona (University of Waterloo, 2002)
      A digital signature scheme is the process of signing an electronic message that can be transmitted over a computer network. Digital signatures provide message authentication that can be proved to a third party. With ...
    • Digital Signature Schemes Based on Hash Functions 

      Lafrance, Philip (University of Waterloo, 2017-04-19)
      Cryptographers and security experts around the world have been awakened to the reality that one day (potentially soon) large-scale quantum computers may be available. Most of the public-key cryptosystems employed today on ...
    • Digital Signcryption 

      Smith, Clayton D. (University of Waterloo, 2005)
      Signcryption is a new cryptographic primitive which simultaneously provides both confidentiality and authenticity. Previously, these two goals had been considered separately, with encryption schemes providing confidentiality ...
    • Digraph Algebras over Discrete Pre-ordered Groups 

      Chan, Kai-Cheong (University of Waterloo, 2013-01-25)
      This thesis consists of studies in the separate fields of operator algebras and non-associative algebras. Two natural operator algebra structures, A ⊗_max B and A ⊗_min B, exist on the tensor product of two given unital ...
    • Digraphs with All Induced Directed Cycles of the Same Length are not → χ -Bounded 

      Carbonero, Alvaro; Hompe, Patrick; Moore, Benjamin; Spirkl, Sophie (2022-10-07)
      For t > 2, let us call a digraph D t-chordal if all induced directed cycles in D have length equal to t. In an earlier paper, we asked for which t it is true that t-chordal graphs with bounded clique number have bounded ...
    • Dilation methods in semigroup dynamics and noncommutative convexity 

      Humeniuk, Adam (University of Waterloo, 2022-08-25)
      Since seminal work of Stinespring, Arveson, and others, dilation theory has been an indispensable tool for understanding operator algebras. Dilations are fundamental to the representation theory of operator systems and ...
    • Dimensional dependence of the Stokes-Einstein relation and its violation 

      Charbonneau, Benoit; Charbonneau, Patrick; Jin, Yuliang; Parisi, Giorgio; Zamponi, Francesco (American Institute of Physics, 2013-10-28)
      We generalize to higher spatial dimensions the Stokes-Einstein relation (SER) as well as the leading correction to diffusivity in finite systems with periodic boundary conditions, and validate these results with numerical ...
    • Dimensionality Reduction of the Chemical Master Equation 

      Kathanaruparambil Sukumaran, Midhun (University of Waterloo, 2019-01-11)
      The dynamics of biochemical systems show significant variability when the reactant populations are small. Standard approaches via deterministic modeling exclude such variability. A well established stochastic model, the ...
    • Direct and Expressive Type Inference for the Rank 2 Fragment of System F 

      Lushman, Bradley (University of Waterloo, 2007-09-20)
      This thesis develops a semiunification-based type inference procedure for the rank 2 fragment of System F, with an emphasis on practical considerations for the adoption of such a procedure into existing programming ...
    • Direct Numerical Simulation of Salt Fingering Gravity Currents and Double-Diffusive Rayleigh-Taylor Instabilities 

      Penney, Jared (University of Waterloo, 2017-01-18)
      Double-diffusion refers to a class of instabilities that develops when the density of a fluid depends on two components with different diffusivities. For example, when warm, salty water is layered over cool, fresh water, ...
    • Direct Numerical Simulations of the Degeneration and Shear Instability of Large and Small Amplitude Basin Scale Internal Waves at Varied Aspect Ratios 

      Grace, Andrew (University of Waterloo, 2018-08-14)
      This thesis presents high resolution simulations of the degeneration and shear instability of standing waves, or seiches, of varying amplitudes and aspect ratios in a continuously stratified fluid. It is well known that ...
    • Direct User Calls from the Kernel: Design and Implementation 

      Wang, Weihan (University of Waterloo, 2007-09-25)
      Traditional, general-purpose operating systems strictly separate user processes from the kernel. Processes can only communicate with the kernel through system calls. As a means to ensure system security, system calls ...
    • Directional Control of Generating Brownian Path under Quasi Monte Carlo 

      Liu, Kai (University of Waterloo, 2012-09-10)
      Quasi-Monte Carlo (QMC) methods are playing an increasingly important role in computational finance. This is attributed to the increased complexity of the derivative securities and the sophistication of the financial models. ...
    • Directly Learning Tractable Models for Sequential Inference and DecisionMaking 

      Melibari, Mazen (University of Waterloo, 2016-06-21)
      Probabilistic graphical models such as Bayesian networks and Markov networks provide a general framework to represent multivariate distributions while exploiting conditional independence. Over the years, many approaches ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages