Now showing items 1-20 of 2212

    • Data Augmentation For Text Classification Tasks 

      Tamming, Daniel (University of Waterloo, 2020-08-12)
      Thanks to increases in computing power and the growing availability of large datasets, neural networks have achieved state of the art results in many natural language process- ing (NLP) and computer vision (CV) tasks. ...
    • LightPlay: An Ambient Light System for Video Game Indicators and Notifications 

      Fung, Kin Pong (University of Waterloo, 2020-08-11)
      Video games often have indicators and notifications to convey in-game information. However, displaying these visuals on-screen come with trade-offs, such as consuming screen real estate and an inability for them to be ...
    • Topics in early and late Universe cosmology 

      Sarma Boruah, Supranta (University of Waterloo, 2020-08-11)
      In this thesis, we explore different problems in various areas of cosmology. The inflationary paradigm has been very successful in explaining cosmological observations. However, some problems still linger on. In the ...
    • Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput 

      Engler, Steven (University of Waterloo, 2020-08-10)
      The Tor anonymity network has millions of daily users and thousands of volunteer-run relays, but growing it further has several research and deployment challenges. One such challenge is supporting the increase in bandwidth ...
    • Variational Inference for Text Generation: Improving the Posterior 

      Balasubramanian, Vikash (University of Waterloo, 2020-08-10)
      Learning useful representations of data is a crucial task in machine learning with wide ranging applications. In this thesis we explore improving representations of models based on variational inference by improving the ...
    • Walking Onions: Scaling Distribution of Information Safely in Anonymity Networks 

      Komlo, Chelsea (University of Waterloo, 2020-08-07)
      Scaling anonymity networks offers unique security challenges, as attackers can exploit differing views of the network’s topology to perform epistemic and route capture attacks. Anonymity networks in practice, such as ...
    • Join Cardinality Estimation Graphs: Analyzing Pessimistic and Optimistic Estimators Through a Common Lens 

      Chen, Jeremy Yujui (University of Waterloo, 2020-08-07)
      Join cardinality estimation is a fundamental problem that is solved in the query optimizers of database management systems when generating efficient query plans. This problem arises both in systems that manage relational ...
    • Feature Identification 

      Shaw, Justin (University of Waterloo, 2020-08-04)
      We present several methods for identifying time periods of interest (features) in a wide range of data sets. The gamma method is a computationally inexpensive, flexible feature identification method which uses a comparison ...
    • Quantum Turing Machines and Quantum Prover-Verifier Interactions 

      Molina Prieto, Abel (University of Waterloo, 2020-07-31)
      We present results on quantum Turing machines and on prover-verifier interactions. In our work on quantum Turing machines, we continue the line of research opened by Yao (1993), who proved that quantum Turing machines ...
    • Counting Pentagons in Triangle-free Binary Matroids 

      Brown, Adam (University of Waterloo, 2020-07-30)
      A rank-n binary matroid is a spanning subset E of F₂ⁿ\{0}, a triangle is a set of three elements from E which sum to zero, and the density of a rank-n binary matroid is |E|/2ⁿ. We begin by giving a new exposition of a ...
    • On the Effectiveness of Incremental Fact Extraction and Analysis 

      Anbarnam, Davood (University of Waterloo, 2020-07-30)
      Today's software projects can be huge. They often consist of millions of lines of code, have multiple teams working on them and are constantly evolving. It is no surprise then that developers sometimes seek the help of ...
    • Recurrence in Algebraic Dynamics 

      Hossain, Ehsaan (University of Waterloo, 2020-07-28)
      The Dynamical Mordell--Lang Conjecture states that if a polynomial orbit has infinite intersection with a closed set in an algebraic variety, then the intersection must occur periodically. Although this problem is unsolved ...
    • Survivable Virtual Network Embedding in Transport Networks 

      Shahriar, Nashid (University of Waterloo, 2020-07-28)
      Network Virtualization (NV) is perceived as an enabling technology for the future Internet and the 5th Generation (5G) of mobile networks. It is becoming increasingly difficult to keep up with emerging applications’ Quality ...
    • Iterative Edit-based Unsupervised Sentence Simplification 

      Kumar, Dhruv (University of Waterloo, 2020-07-28)
      We present a new iterative approach towards unsupervised edit-based sentence simplification. Our approach is guided by a scoring function to select simplified sentences generated after iteratively performing word and ...
    • Some Problems in Multiplicative and Additive Number Theory 

      Elma, Ertan (University of Waterloo, 2020-07-27)
      In this thesis, we obtain several results in number theory. Let $k\geqslant 1$ be a natural number and $\omega_k(n)$ denote the number of distinct prime factors of a natural number $n$ with multiplicity $k$. We estimate ...
    • Applications of Operator Systems in Dynamics, Correlation Sets, and Quantum Graphs 

      Kim, Se Jin (University of Waterloo, 2020-07-24)
      The recent works of Kalantar-Kennedy, Katsoulis-Ramsey, Ozawa, and Dykema-Paulsen have demonstrated that many problems in the theory of operator algebras and quantum information can be approached by looking at various ...
    • Statistical Methods for Event History Data under Response Dependent Sampling and Incomplete Observation 

      Shi, Yidan (University of Waterloo, 2020-07-17)
      This thesis discusses statistical problems in event history data analysis including survival analysis and multistate models. Research questions in this thesis are motivated by the Nun Study, which contains longevity data ...
    • Exploiting Token and Path-based Representations of Code for Identifying Security-Relevant Commits 

      Keshav Ram, Achyudh Ram (University of Waterloo, 2020-07-15)
      Public vulnerability databases such as CVE and NVD account for only 60% of security vulnerabilities present in open-source projects and are known to suffer from inconsistent quality. Over the last two years, there has been ...
    • Improving post-quantum cryptography through cryptanalysis 

      Schanck, John (University of Waterloo, 2020-07-15)
      Large quantum computers pose a threat to our public-key cryptographic infrastructure. The possible responses are: Do nothing; accept the fact that quantum computers might be used to break widely deployed protocols. Mitigate ...
    • A Comprehensive Study of Declarative Modelling Languages 

      Bandali, Amin (University of Waterloo, 2020-07-14)
      Declarative behavioural modelling is a powerful modelling paradigm that enables users to model system functionality abstractly and formally. An abstract model is a concise and compact representation of key characteristics ...


      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages