Now showing items 21-40 of 1544

    • Quantitative Testing of Probabilistic Phase Unwrapping Methods 

      Moran, Jodi (University of Waterloo, 2001)
      The reconstruction of a phase surface from the observed principal values is required for a number of applications, including synthetic aperture radar (SAR) and magnetic resonance imaging (MRI). However, the process of ...
    • Selective Flooding in Ad Hoc Networks 

      Iu, Ming-Yee (University of Waterloo, 2002)
      An ad hoc network is a collection of mobile wireless devices that cooperate with each other to route packets amongst themselves. The main difficulty in designing routing algorithms for such a network is the large number ...
    • Agile Architecture Recovery 

      Svetinovic, Davor (University of Waterloo, 2002)
      Many software development projects start with an existing code base that has to be tightly integrated into a new system. In order to make a robust system that will achieve the desired business goals, developers must be ...
    • Autonomous Cooperating Web Crawlers 

      McLearn, Greg (University of Waterloo, 2002)
      A web crawler provides an automated way to discover web events ? creation, deletion, or updates of web pages. Competition among web crawlers results in redundant crawling, wasted resources, and less-than-timely discovery ...
    • A Views-Based Design Framework for Web Applications 

      Brown, David (University of Waterloo, 2002)
      Web application design is a broad term that refers to any aspect of designing a Web application, including designing Web interfaces to data. There are a number of commercial software tools available that employ various ...
    • An Architecture for Geographically-Oriented Service Discovery on the Internet 

      Li, Qiyan (University of Waterloo, 2002)
      Most of the service discovery protocols available on the Internet are built upon its logical structure. This phenomenon can be observed frequently from the way in which they behave. For instance, Jini and SLP service ...
    • Grey Level Visual Cryptography for General Access Structures 

      MacPherson, Lesley (University of Waterloo, 2002)
      Visual cryptography, first introduced by Naor and Shamir, allows a secret (black and white) image to be encoded and distributed to a set of participants such that certain predefined sets of participants may reconstruct the ...
    • Volume Visualisation Via Variable-Detail Non-Photorealistic Illustration 

      McKinley, Joanne (University of Waterloo, 2002)
      The rapid proliferation of 3D volume data, including MRI and CT scans, is prompting the search within computer graphics for more effective volume visualisation techniques. Partially because of the traditional association ...
    • Probabilistic Program Analysis for Software Component Reliability 

      Mason, Dave (University of Waterloo, 2002)
      Components are widely seen by software engineers as an important technology to address the "software crisis''. An important aspect of components in other areas of engineering is that system reliability can be estimated ...
    • Exploitation of Redundant Inverse Term Frequency for Answer Extraction 

      Lynam, Thomas Richard (University of Waterloo, 2002)
      An automatic question answering system must find, within a corpus,short factual answers to questions posed in natural language. The process involves analyzing the question, retrieving information related to the question, ...
    • A Collapsing Method for Efficient Recovery of Optimal Edges 

      Hu, Mike (University of Waterloo, 2002)
      In this thesis we present a novel algorithm, <I>HyperCleaning*</I>, for effectively inferring phylogenetic trees. The method is based on the quartet method paradigm and is guaranteed to recover the best supported edges ...
    • On Fine-Grained Access Control for XML 

      Zhuo, Donghui (University of Waterloo, 2003)
      Fine-grained access control for XML is about controlling access to XML documents at the granularity of individual elements or attributes. This thesis addresses two problems related to XML access controls. The first is ...
    • Effects of Developmental Heuristics for Natural Language Learning 

      Engels, Steve (University of Waterloo, 2003)
      Machine learning in natural language has been a widely pursued area of research. However, few learning techniques model themselves after human learning, despite the nature of the task being closely connected to human ...
    • Software Architecture Recovery based on Pattern Matching 

      Sartipi, Kamran (University of Waterloo, 2003)
      Pattern matching approaches in reverse engineering aim to incorporate domain knowledge and system documentation in the software architecture extraction process, hence provide a user/tool collaborative environment for ...
    • Computer Aided Ferret Design 

      Siu, Selina (University of Waterloo, 2003)
      Ferrets are amusing, flexible creatures that have been under represented in computer models. Because their bodies can assume almost any curved shape, splines are the natural tool for modelling ferrets. Surface pasting ...
    • Offset Surface Light Fields 

      Ang, Jason (University of Waterloo, 2003)
      For producing realistic images, reflection is an important visual effect. Reflections of the environment are important not only for highly reflective objects, such as mirrors, but also for more common objects such as ...
    • A Geometric B-Spline Over the Triangular Domain 

      Ingram, Christopher (University of Waterloo, 2003)
      For modelling curves, B-splines [3] are among the most versatile control schemes. However, scaling this technique to surface patches has proven to be a non-trivial endeavor. While a suitable scheme exists for rectangular ...
    • Indexing Compressed Text 

      He, Meng (University of Waterloo, 2003)
      As a result of the rapid growth of the volume of electronic data, text compression and indexing techniques are receiving more and more attention. These two issues are usually treated as independent problems, but approaches ...
    • A Parameterized Algorithm for Upward Planarity Testing of Biconnected Graphs 

      Chan, Hubert (University of Waterloo, 2003)
      We can visualize a graph by producing a geometric representation of the graph in which each node is represented by a single point on the plane, and each edge is represented by a curve that connects its two ...
    • Towards Automatic Initial Buffer Configuration 

      Ku, Fei Yen (University of Waterloo, 2003)
      Buffer pools are blocks of memory used in database systems to retain frequently referenced pages. Configuring the buffer pools is a difficult and manual task that involves determining the amount of memory to devote to ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages