Now showing items 867-886 of 3001

    • Empirical Likelihood Method for Ratio Estimation 

      Dong, Bin (University of Waterloo, 2011-03-17)
      Empirical likelihood, which was pioneered by Thomas and Grunkemeier (1975) and Owen (1988), is a powerful nonparametric method of statistical inference that has been widely used in the statistical literature. In this ...
    • Empirical Likelihood Methods for Pretest-Posttest Studies 

      Chen, Min (University of Waterloo, 2015-01-21)
      Pretest-posttest trials are an important and popular method to assess treatment effects in many scientific fields. In a pretest-posttest study, subjects are randomized into two groups: treatment and control. Before the ...
    • Empirical Likelihood Methods for Some Incomplete Data Problems 

      Che, Menglu (University of Waterloo, 2020-12-18)
      Incomplete data often brings difficulty to estimations and inferences. A complete case (CC) analysis, in most cases, leads to biased estimates, or it may not have the desired estimation efficiency. In this thesis, we develop ...
    • Empirical Likelihood Quantile Regression for Right-Censored Data 

      Huang, Shimeng (University of Waterloo, 2018-12-17)
      Quantile estimation of time-to-event data plays a key role in many medical applications, especially conditional on covariates of interest. In such settings, bias due to model misspecification is an important concern. As ...
    • AN EMPIRICAL STUDY OF DIFFERENT BRANCHING STRATEGIES FOR CONSTRAINT SATISFACTION PROBLEMS 

      Park, Vincent Se-jin (University of Waterloo, 2004)
      Many real life problems can be formulated as constraint satisfaction problems <i>(CSPs)</i>. Backtracking search algorithms are usually employed to solve <i>CSPs</i> and in backtracking search the choice of branching ...
    • An Empirical Study on Bash Language Usage in Github 

      Li, Zheyang (University of Waterloo, 2021-05-27)
      The Bourne-again shell (Bash) is a prevalent scripting language for orchestrating shell commands and managing resources in Unix-like environments. At the time of writing, it is one of the mainstream shell dialects that ...
    • Empirical validation of the Gamification User Types Hexad scale in English and Spanish 

      Fortes Tondello, Gustavo; Mora, Alberto; Marczewski, Andrzej; Nacke, Lennart (Elsevier, 2018-10-13)
      Gamification, the use of game elements in non-game systems, is now established as a relevant research field in human-computer interaction (HCI). Several empirical studies have shown that gameful interventions can increase ...
    • Enabling Censorship Tolerant Networking 

      Oliver, Earl (University of Waterloo, 2013-01-25)
      Billions of people in the world live under heavy information censorship. We propose a new class of delay tolerant network (DTN), known as a censorship tolerant network (CTN), to counter the growing practice of Internet-based ...
    • Enabling Cross-lingual Information Retrieval for African Languages 

      Ogundepo, Odunayo (University of Waterloo, 2023-04-28)
      Language diversity in NLP is critical in enabling the development of tools for a wide range of users. However, there are limited resources for building such tools for many languages, particularly those spoken in Africa. ...
    • Enabling Expressive Keyboard Interaction with Finger, Hand, and Hand Posture Identification 

      Zheng, Jingjie (University of Waterloo, 2017-09-13)
      The input space of conventional physical keyboards is largely limited by the number of keys. To enable more actions than simply entering the symbol represented by a key, standard keyboards use combinations of modifier keys ...
    • Enabling Language-Specific Transformations in Language-Agnostic Program Reduction 

      Zhao, Gaosen (University of Waterloo, 2023-08-30)
      When a program P triggers a bug in a language implementation, program reduction can reduce P by removing program elements that are irrelevant to the bug, to facilitate debugging. Program reduction has been widely used in ...
    • Enabling Post-Quantum Signatures in DNSSEC: One ARRF at a time 

      Goertzen, Jason (University of Waterloo, 2022-12-19)
      The Domain Name System Security Extensions (DNSSEC) provide authentication of DNS responses using digital signatures. DNS relies on UDP as its primary delivery method which imposes several constraints, with the most notable ...
    • Enabling Techniques to support Reliable Smartphone-Based Motion Gesture Interaction 

      Kamal, Ankit (University of Waterloo, 2015-01-06)
      When using motion gestures - 3D movements of a mobile phone - as an input modality, one significant challenge is how to teach end users the movement parameters necessary to successfully issue a command. Is a simple video ...
    • Encoding XQuery using <em>System F</em> 

      Xia, Yun (University of Waterloo, 2005)
      Since the World Wide Web Consortium (W3C) has recommended XQuery as the standard XML query language, the interest in using existing relational technology to query the XML data has dramatically increased. The most significant ...
    • Encrypted Web Traffic Classification Using Deep Learning 

      Akbari Azirani, Iman (University of Waterloo, 2021-05-19)
      Traffic classification is essential in network management for operations ranging from capacity planning, performance monitoring, volumetry, and resource provisioning, to anomaly detection and security. Recently, it has ...
    • End-to-End Encrypted Group Messaging with Insider Security 

      Unger, Nik (University of Waterloo, 2021-08-11)
      Our society has become heavily dependent on electronic communication, and preserving the integrity of this communication has never been more important. Cryptography is a tool that can help to protect the security and privacy ...
    • End-to-end Neural Information Retrieval 

      Yang, Wei (University of Waterloo, 2019-04-30)
      In recent years we have witnessed many successes of neural networks in the information retrieval community with lots of labeled data. Yet it remains unknown whether the same techniques can be easily adapted to search ...
    • End-to-End Whole Slide Image Classification and Search using Set Representations 

      You, Bo Yang (University of Waterloo, 2022-08-31)
      Due to the sheer size of gigapixel whole slide images (WSIs), it is difficult to apply deep learning and computer vision algorithms for digital pathology. Traditional approaches rely on extracting meaningful patches from ...
    • Energy Efficient RPL Routing Protocol in Smart Buildings 

      Rezaei, Elnaz (University of Waterloo, 2014-06-20)
      Energy is an important factor that must be considered by multi-hop wireless mesh routing protocols because most sensors are powered by batteries with a limited capacity. We focus on the industry-standard RPL (Routing ...
    • Energy Shaping for Systems with Two Degrees of Underactuation 

      Ng, Wai Man (University of Waterloo, 2012-01-11)
      In this thesis we are going to study the energy shaping problem on controlled Lagrangian systems with degree of underactuation less than or equal to two. Energy shaping is a method of stabilization by designing a suitable ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages