Browsing Computer Science by Title
Now showing items 1198-1217 of 1557
-
Retrieving Supporting Evidence for Generative Question Answering
(University of Waterloo, 2023-12-18)Current large language models (LLMs) can exhibit near-human levels of performance on many natural language-based tasks, including open-domain question answering. Unfortunately, at this time, they also convincingly hallucinate ... -
Revisiting Password Rules: Facilitating Human Management of Passwords
(IEEE, 2016-06)Password rules were established in the context of past security concerns. Recent work in computer security challenges the conventional wisdom of expert password advice, such as change your passwords often, do not reuse ... -
Rhyme, Rhythm, and Rhubarb: Using Probabilistic Methods to Analyze Hip Hop, Poetry, and Misheard Lyrics
(University of Waterloo, 2010-08-30)While text Information Retrieval applications often focus on extracting semantic features to identify the topic of a document, and Music Information Research tends to deal with melodic, timbral or meta-tagged data of songs, ... -
RitHM: A Modular Software Framework for Runtime Monitoring Supporting Complete and Lossy Traces
(University of Waterloo, 2015-10-01)Runtime verification (RV) is an effective and automated method for specification based offline testing as well as online monitoring of complex real-world systems. Firstly, a software framework for RV needs to exhibit certain ... -
RMA: A Pattern Based J2EE Development Tool
(University of Waterloo, 2004)The development process for creating J2EE web applications is complex and tedious, and is thus error prone. The quality of a J2EE web application depends on correctness of code as well as the efficiency and flexibility ... -
RNA Homology Searches Using Pair Seeding
(University of Waterloo, 2005)Due to increasing numbers of non-coding RNA (ncRNA) being discovered recently, there is interest in identifying homologs of a given structured RNA sequence. Exhaustive homology searching for structured RNA molecules using ... -
Road Condition Sensing Using Deep Learning and Wireless Signals
(University of Waterloo, 2020-08-14)Similar to human car drivers, future driverless cars need to sense the condition of road surfaces so that they can adjust their speed and distance from other cars. This awareness necessitates the need for a sensing mechanism ... -
Robot Social Engineering
(University of Waterloo, 2020-07-06)This thesis establishes the new field of Robot Social Engineering. We define Robot Social Engineering as the use of social abilities and techniques by robots to manipulate others in order to achieve a goal. We build the ... -
Robust Search Methods for Rational Drug Design Applications
(University of Waterloo, 2009-12-08)The main topic of this thesis is the development of computational search methods that are useful in drug design applications. The emphasis is on exhaustiveness of the search method such that it can guarantee a certain level ... -
Robust Visual Recognition Using Multilayer Generative Neural Networks
(University of Waterloo, 2010-08-25)Deep generative neural networks such as the Deep Belief Network and Deep Boltzmann Machines have been used successfully to model high dimensional visual data. However, they are not robust to common variations such as ... -
Robustness in Automatic Physical Database Design
(University of Waterloo, 2007-08-17)Automatic physical database design tools rely on ``what-if'' interfaces to the query optimizer to estimate the execution time of the training query workload under different candidate physical designs. The tools use these ... -
Role of Domain Ignorance in Software Development
(University of Waterloo, 2011-05-19)Several have reported observations that sometimes ignorance of the domain in a software development project is useful for promoting the elicitation of tacit assumptions and out- of-the-box ideas. This thesis reports work ... -
The Role of Instructional Design in Persuasion: A Comics Approach for Improving Cybersecurity
(Taylor & Francis, 2016-03)Although computer security technologies are the first line of defence to secure users, their success is dependent on individuals’ behaviour. It is therefore necessary to persuade users to practice good computer security. ... -
RootChord
(University of Waterloo, 2010-04-29)We present a distributed data structure, which we call "RootChord". To our knowledge, this is the first distributed hash table which is able to adapt to changes in the size of the network and answer lookup queries within ... -
Rough Set Based Rule Evaluations and Their Applications
(University of Waterloo, 2007-03-06)Knowledge discovery is an important process in data analysis, data mining and machine learning. Typically knowledge is presented in the form of rules. However, knowledge discovery systems often generate a huge amount ... -
SafeDS: Safe Data Structures for C++
(University of Waterloo, 2022-09-01)Memory corruption vulnerabilities in low-level languages such as C/C++ have been a problem in computer security for a long time. Accordingly, there has been a wide variety of proposed solutions for detecting or preventing ... -
Safety-Oriented Stability Biases for Continual Learning
(University of Waterloo, 2020-01-24)Continual learning is often confounded by “catastrophic forgetting” that prevents neural networks from learning tasks sequentially. In the case of real world classification systems that are safety-validated prior to ... -
Sampling-based Predictive Database Buffer Management
(University of Waterloo, 2023-09-25)This thesis presents a database buffer caching policy that uses information about long- running scans to estimate future accesses. These estimates are used to approximate the optimal caching policy, which requires knowledge ... -
Saving Electrical Energy in Commercial Buildings
(University of Waterloo, 2012-08-27)With the commercial and institutional building sectors using approximately 29% and 34% of all electrical energy consumption in Canada and the United States, respectively, saving electrical energy in commercial and institutional ... -
Scala with Explicit Nulls
(University of Waterloo, 2019-12-20)The Scala programming language unifies the object-oriented and functional styles of programming. One common source of errors in Scala programs is null references. In this dissertation, I present a modification to the Scala ...