Browsing Mathematics (Faculty of) by Title
Now showing items 931-950 of 2994
-
Evaluating Clusterings by Estimating Clarity
(University of Waterloo, 2012-10-12)In this thesis I examine clustering evaluation, with a subfocus on text clusterings specifically. The principal work of this thesis is the development, analysis, and testing of a new internal clustering quality measure ... -
Evaluating Deep Learning-based Vulnerability Detection Models on Realistic Datasets
(University of Waterloo, 2023-05-23)The impact of software vulnerabilities on daily-used software systems is alarming. Despite numerous proposed deep learning-based models to automate vulnerability detection, the detection of software vulnerabilities remains ... -
Evaluating Entity Relationship Recommenders in a Complex Information Retrieval Context
(University of Waterloo, 2014-05-21)Information Retrieval, as a field, has long subscribed to an orthodox evaluation approach known as the Cranfield paradigm. This approach and the assumptions that underpin it have been essential to building the traditional ... -
Evaluating Information Retrieval Systems With Multiple Non-Expert Assessors
(University of Waterloo, 2013-08-21)Many current test collections require the use of expert judgments during construction. The true label of each document is given by an expert assessor. However, the cost and effort associated with expert training and judging ... -
Evaluating Large Degree Isogenies between Elliptic Curves
(University of Waterloo, 2010-12-20)An isogeny between elliptic curves is an algebraic morphism which is a group homomorphism. Many applications in cryptography require evaluating large degree isogenies between elliptic curves efficiently. For ordinary curves ... -
Evaluating Library Configurations
(University of Waterloo, 2012-06-07)A wide range of libraries are available for a developer to choose from when building a software system, but once the library is chosen, the developer must determine which version of the library to use. Is there some ... -
Evaluating Re-authentication Strategies for Smartphones
(University of Waterloo, 2016-08-04)Re-authenticating users may be necessary for smartphone authentication schemes that leverage user behavior, device context, or task sensitivity. However, due to the unpredictable nature of re-authentication, users may get ... -
Evaluating Singing for Computer Input Using Pitch, Interval and Melody
(University of Waterloo, 2022-09-02)In voice-based interfaces, non-verbal features represent a simple and underutilized design space for hands-free, language-agnostic interactions. This work evaluates the performance of three fundamental types of voice-based ... -
Evaluating the Ability of Commercial Search Engines to Help People Answer Health Questions
(University of Waterloo, 2023-12-18)The act of seeking information pertaining to medical treatments and self-diagnosis is one of the applications of search engines. However online documents and websites offer convenience and efficiency in accessing information, ... -
Evaluating the Effectiveness of Code2Vec for Bug Prediction When Considering That Not All Bugs Are the Same
(University of Waterloo, 2020-09-21)Bug prediction is an area of research focused on predicting where in a software project future bugs will occur. The purpose of bug prediction models is to help companies spend their quality assurance resources more ... -
Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios
(University of Waterloo, 2016-08-10)Smartphones contain a wealth of personal and corporate data. Several surveys have reported that about half of the smartphone owners do not configure primary authentication mechanisms (such as PINs, passwords, and fingerprint- ... -
Evaluating the Speed and Accuracy of Touch Input at the Edge of a Table
(University of Waterloo, 2019-12-11)Tables, desks, and counters are often nearby, motivating their use as interactive surfaces. However, they are typically cluttered with objects. As an alternative, we explore touch input along the 'edge' of table-like ... -
Evaluating Unattended Technology, a Subset of Calm Technology
(University of Waterloo, 2008-09-26)Information is a central theme of the twenty-first century. This is evident in the fact that everyday objects are being augmented to provide information. Thus, ubiquitous computing – providing information using everyday ... -
An Evaluation of Contextual Suggestion
(University of Waterloo, 2014-01-23)This thesis examines techniques that can be used to evaluate systems that solve the complex task of suggesting points of interest to users. A traveller visiting an unfamiliar, foreign city might be looking for a place to ... -
Evaluation of Incentive-compatible Differentiated Scheduling for Packet-switched Networks
(University of Waterloo, 2005)Communication applications have diverse network service requirements. For instance, <em>Voice over IP</em> (VoIP) demands short end-to-end delay, whereas <em>File Transfer Protocol</em> (FTP) benefits more from high ... -
Evaluation Of Serogroup C And Acwy Meningococcal Vaccine Programs: Projected Impact On Disease Burden According To A Stochastic Two-Strain Dynamic Model
(Elsevier, 2015-01-01)Objective: Advisory committees in Canada and the United States have updated recommendations for quadrivalent meningococcal conjugate vaccines against serogroups A, C, W135, and Y. Our objective was to evaluate optimally ... -
Evaluation of Shortest Path Query Algorithm in Spatial Databases
(University of Waterloo, 2003)Many variations of algorithms for finding the shortest path in a large graph have been introduced recently due to the needs of applications like the Geographic Information System (GIS) or Intelligent Transportation System ... -
Even Cycle and Even Cut Matroids
(University of Waterloo, 2011-05-20)In this thesis we consider two classes of binary matroids, even cycle matroids and even cut matroids. They are a generalization of graphic and cographic matroids respectively. We focus on two main problems for these classes ... -
Even pairs and prism corners in square-free Berge graphs
(Elsevier, 2018-07)Let G be a Berge graph such that no induced subgraph is a 4-cycle or a line-graph of a bipartite subdivision of K4. We show that every such graph G either is a complete graph or has an even pair. -
Event History Analysis in Longitudinal Cohort Studies with Intermittent Inspection Times
(University of Waterloo, 2016-01-20)Event history studies based on disease clinic data often face several complications. Specifically, patients visit the clinic irregularly, and the intermittent inspection times depend on the history of disease-related ...