This is the collection for the University of Waterloo's Cheriton School of Computer Science .

Research outputs are organized by type (eg. Master Thesis, Article, Conference Paper).

Waterloo faculty, students, and staff can contact us or visit the UWSpace guide to learn more about depositing their research.

Recent deposits

  • Parameter and Structure Learning Techniques for Sum Product Networks 

    Rashwan, Abdullah (University of Waterloo, 2019-09-25)
    Probabilistic graphical models (PGMs) provide a general and flexible framework for reasoning about complex dependencies in noisy domains with many variables. Among the various types of PGMs, sum-product networks (SPNs) ...
  • Source Code Stylometry and Authorship Attribution for Open Source 

    Watson, Daniel (University of Waterloo, 2019-09-23)
    Public software repositories such as GitHub make transparent the development history of an open source software system. Source code commits, discussions about new features and bugs, and code reviews are stored and carefully ...
  • Parallel Paths Analysis Using Function Call Graphs 

    Naeimian, Arman (University of Waterloo, 2019-09-23)
    Call graphs have been used widely in different software engineering areas. Since call graphs provide us with detailed information about the structure of software elements and components and how they are connected with each ...
  • SFour: A Protocol for Cryptographically Secure Record Linkage at Scale 

    Khurram, Muhammad Basit (University of Waterloo, 2019-09-23)
    The prevalence of various (and increasingly large) datasets presents the challenging problem of discovering common entities dispersed across disparate datasets. Solutions to the private record linkage problem (PRL) aim to ...
  • Modelling, Design, and Control of Energy Systems: A Data-Driven Approach 

    Kazhamiaka, Fiodar (University of Waterloo, 2019-09-23)
    In 2018, nearly two-thirds of newly installed global power generation has come from renewable energy sources. Distributed installations of solar photovoltaic (PV) panels have been at the forefront of this global energy ...
  • Local and Cooperative Autonomous Vehicle Perception from Synthetic Datasets 

    Hurl, Braden (University of Waterloo, 2019-09-23)
    The purpose of this work is to increase the performance of autonomous vehicle 3D object detection using synthetic data. This work introduces the Precise Synthetic Image and LiDAR (PreSIL) dataset for autonomous vehicle ...
  • Passenger Response to Driving Style in an Autonomous Vehicle 

    Dillen, Nicole (University of Waterloo, 2019-09-23)
    Despite rapid advancements in automated driving systems (ADS), current human-computer interaction research tends to focus more on the safety driver in lower level vehicles. The future of automated driving lies in higher ...
  • Semantic Order Compatibilities and Their Discovery 

    Mirsafian, Melicaalsadat (University of Waterloo, 2019-09-20)
    Ordered domains such as numbers and dates are common in real-life datasets. The SQL standard includes an ORDER BY clause to sort the results, and there has been research work on formalizing, reasoning about, and automatically ...
  • MLOD: A multi-view 3D object detection based on robust feature fusion method 

    Deng, Jian (University of Waterloo, 2019-09-19)
    This thesis presents Multi-view Labelling Object Detector (MLOD). The detector takes an RGB image and a LIDAR point cloud as input and follows the two-stage object detection framework. A Region Proposal Network (RPN) ...
  • Data-intensive Scheduling 

    MENG, XIAO (University of Waterloo, 2019-09-19)
    In many modern data management scenarios, we encounter tasks, operations or computational phases that are data-intensive where the sheer volume of data proves to be overwhelming to handle and becomes a performance bottleneck. ...
  • A Machine Learning Approach for RDP-based Lateral Movement Detection 

    Bai, Zhenyu (University of Waterloo, 2019-09-19)
    Detecting cyber threats has been an on-going research endeavor. In this era, advanced persistent threats (APTs) can incur significant costs for organizations and businesses. The ultimate goal of cybersecurity is to thwart ...
  • Detecting Network Intrusions from Authentication Logs 

    Bian, Haibo (University of Waterloo, 2019-09-19)
    Recently, network infiltrations due to advanced persistent threats (APTs) have grown significantly, resulting in considerable loses to businesses and organizations. APTs are stealthy attacks with the primary objective of ...
  • Domain Ordering and Box Cover Problems for Beyond Worst-Case Join Processing 

    Alway, Kaleb (University of Waterloo, 2019-09-17)
    Join queries are a fundamental computational task in relational database management systems. For decades, complex joins were most often computed by decomposing the query into a query plan made of a sequence of binary joins. ...
  • A+ Indexes: Highly Flexible Adjacency Lists in Graph Database Management Systems 

    Khaliq, Shahid (University of Waterloo, 2019-09-17)
    Adjacency lists are the most fundamental storage structure in existing graph database management systems (GDBMSs) to index input graphs. Adjacency lists are universally linked-list like per-vertex structures that allow ...
  • Procedurally Rhetorical Verb-Centric Frame Semantics as a Knowledge Representation for Argumentation Analysis of Biochemistry Articles 

    Alliheedi, Mohammed (University of Waterloo, 2019-09-05)
    The central focus of this thesis is rhetorical moves in biochemistry articles. Kanoksilapatham has provided a descriptive theory of rhetorical moves that extends Swales' CARS model to the complete biochemistry article. ...
  • A Power-Efficient Smart Lighting System: Modeling, Implementation and Evaluation 

    Aussat, Yerbol (University of Waterloo, 2019-09-03)
    Lighting load accounts for approximately one third of overall energy consumption in modern office buildings. To reduce this load, we have designed a smart lighting control system that attempts to minimize power consumption, ...
  • Compilation Techniques for Actively Secure Mixed Mode Two Party Computation 

    Norton, Alex (University of Waterloo, 2019-09-03)
    Secure multiparty computation allows two or more parties to compute a function without leaking unnecessary information about their inputs to other parties. In traditional secure multiparty computation protocols, the function ...
  • Towards Pixel-Level OOD Detection for Semantic Segmentation 

    Angus, Matt (University of Waterloo, 2019-08-30)
    There exists wide research surrounding the detection of out of distribution sample for image classification. Safety critical applications, such as autonomous driving, would benefit from the ability to localise the unusual ...
  • 3D Online Multi-Object Tracking for Autonomous Driving 

    Balasubramanian, Venkateshwaran (University of Waterloo, 2019-08-29)
    This research work focuses on exploring a novel 3D multi-object tracking architecture: 'FANTrack: 3D Multi-Object Tracking with Feature Association Network' for autonomous driving, based on tracking by detection and online ...
  • Predicting Repository Upkeep with Textual Personality Analysis 

    Sachs, Alexander (University of Waterloo, 2019-08-29)
    GitHub is an excellent democratic source of software. Unlike traditional work groups however, GitHub repositories are primarily anonymous and virtual. Traditional strategies for improving the productivity of a work group ...

View more


University of Waterloo Library
200 University Avenue West
Waterloo, Ontario, Canada N2L 3G1
519 888 4883

All items in UWSpace are protected by copyright, with all rights reserved.

DSpace software

Service outages