Now showing items 1198-1217 of 1557

    • Retrieving Supporting Evidence for Generative Question Answering 

      Huo, Siqing (University of Waterloo, 2023-12-18)
      Current large language models (LLMs) can exhibit near-human levels of performance on many natural language-based tasks, including open-domain question answering. Unfortunately, at this time, they also convincingly hallucinate ...
    • Revisiting Password Rules: Facilitating Human Management of Passwords 

      Zhang-Kennedy, Leah; Chiasson, Sonia; van Oorschot, Paul (IEEE, 2016-06)
      Password rules were established in the context of past security concerns. Recent work in computer security challenges the conventional wisdom of expert password advice, such as change your passwords often, do not reuse ...
    • Rhyme, Rhythm, and Rhubarb: Using Probabilistic Methods to Analyze Hip Hop, Poetry, and Misheard Lyrics 

      Hirjee, Hussein (University of Waterloo, 2010-08-30)
      While text Information Retrieval applications often focus on extracting semantic features to identify the topic of a document, and Music Information Research tends to deal with melodic, timbral or meta-tagged data of songs, ...
    • RitHM: A Modular Software Framework for Runtime Monitoring Supporting Complete and Lossy Traces 

      Joshi, Yogi (University of Waterloo, 2015-10-01)
      Runtime verification (RV) is an effective and automated method for specification based offline testing as well as online monitoring of complex real-world systems. Firstly, a software framework for RV needs to exhibit certain ...
    • RMA: A Pattern Based J2EE Development Tool 

      Chen, Jun (University of Waterloo, 2004)
      The development process for creating J2EE web applications is complex and tedious, and is thus error prone. The quality of a J2EE web application depends on correctness of code as well as the efficiency and flexibility ...
    • RNA Homology Searches Using Pair Seeding 

      Darbha, Sriram (University of Waterloo, 2005)
      Due to increasing numbers of non-coding RNA (ncRNA) being discovered recently, there is interest in identifying homologs of a given structured RNA sequence. Exhaustive homology searching for structured RNA molecules using ...
    • Road Condition Sensing Using Deep Learning and Wireless Signals 

      Ameli, Soroush (University of Waterloo, 2020-08-14)
      Similar to human car drivers, future driverless cars need to sense the condition of road surfaces so that they can adjust their speed and distance from other cars. This awareness necessitates the need for a sensing mechanism ...
    • Robot Social Engineering 

      Postnikoff, Brittany (University of Waterloo, 2020-07-06)
      This thesis establishes the new field of Robot Social Engineering. We define Robot Social Engineering as the use of social abilities and techniques by robots to manipulate others in order to achieve a goal. We build the ...
    • Robust Search Methods for Rational Drug Design Applications 

      Sadjad, Bashir (University of Waterloo, 2009-12-08)
      The main topic of this thesis is the development of computational search methods that are useful in drug design applications. The emphasis is on exhaustiveness of the search method such that it can guarantee a certain level ...
    • Robust Visual Recognition Using Multilayer Generative Neural Networks 

      Tang, Yichuan (University of Waterloo, 2010-08-25)
      Deep generative neural networks such as the Deep Belief Network and Deep Boltzmann Machines have been used successfully to model high dimensional visual data. However, they are not robust to common variations such as ...
    • Robustness in Automatic Physical Database Design 

      El Gebaly, Kareem (University of Waterloo, 2007-08-17)
      Automatic physical database design tools rely on ``what-if'' interfaces to the query optimizer to estimate the execution time of the training query workload under different candidate physical designs. The tools use these ...
    • Role of Domain Ignorance in Software Development 

      Mehrotra, Gaurav (University of Waterloo, 2011-05-19)
      Several have reported observations that sometimes ignorance of the domain in a software development project is useful for promoting the elicitation of tacit assumptions and out- of-the-box ideas. This thesis reports work ...
    • The Role of Instructional Design in Persuasion: A Comics Approach for Improving Cybersecurity 

      Zhang-Kennedy, Leah; Chiasson, Sonia; Biddle, Robert (Taylor & Francis, 2016-03)
      Although computer security technologies are the first line of defence to secure users, their success is dependent on individuals’ behaviour. It is therefore necessary to persuade users to practice good computer security. ...
    • RootChord 

      Cwik, Lukasz (University of Waterloo, 2010-04-29)
      We present a distributed data structure, which we call "RootChord". To our knowledge, this is the first distributed hash table which is able to adapt to changes in the size of the network and answer lookup queries within ...
    • Rough Set Based Rule Evaluations and Their Applications 

      Li, Jiye (University of Waterloo, 2007-03-06)
      Knowledge discovery is an important process in data analysis, data mining and machine learning. Typically knowledge is presented in the form of rules. However, knowledge discovery systems often generate a huge amount ...
    • SafeDS: Safe Data Structures for C++ 

      Ghorshi, Seyedeh Setareh (University of Waterloo, 2022-09-01)
      Memory corruption vulnerabilities in low-level languages such as C/C++ have been a problem in computer security for a long time. Accordingly, there has been a wide variety of proposed solutions for detecting or preventing ...
    • Safety-Oriented Stability Biases for Continual Learning 

      Gaurav, Ashish (University of Waterloo, 2020-01-24)
      Continual learning is often confounded by “catastrophic forgetting” that prevents neural networks from learning tasks sequentially. In the case of real world classification systems that are safety-validated prior to ...
    • Sampling-based Predictive Database Buffer Management 

      Vanderkooy, Theodore (University of Waterloo, 2023-09-25)
      This thesis presents a database buffer caching policy that uses information about long- running scans to estimate future accesses. These estimates are used to approximate the optimal caching policy, which requires knowledge ...
    • Saving Electrical Energy in Commercial Buildings 

      Case, Ryan (University of Waterloo, 2012-08-27)
      With the commercial and institutional building sectors using approximately 29% and 34% of all electrical energy consumption in Canada and the United States, respectively, saving electrical energy in commercial and institutional ...
    • Scala with Explicit Nulls 

      Nieto Rodriguez, Abel (University of Waterloo, 2019-12-20)
      The Scala programming language unifies the object-oriented and functional styles of programming. One common source of errors in Scala programs is null references. In this dissertation, I present a modification to the Scala ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages