Browsing Computer Science by Title
Now showing items 334-353 of 1563
-
Design and Implementation of Family Polymorphism for Interactive Theorem Proving
(University of Waterloo, 2023-06-13)With the growing practice of mechanizing language metatheories, it has become ever more pressing that interactive theorem provers make it easy to write reusable, extensible code and proofs. This thesis presents a novel ... -
Design and Management of Collaborative Intrusion Detection Networks
(University of Waterloo, 2013-04-30)In recent years network intrusions have become a severe threat to the privacy and safety of computer users. Recent cyber attacks compromise a large number of hosts to form botnets. Hackers not only aim at harvesting private ... -
Design and Study of Emotions in Virtual Humans for Assistive Technologies
(University of Waterloo, 2016-04-27)This thesis presents the design and study of emotionally aligned prompts given by virtual humans for persons with cognitive disabilities such as Alzheimer’s disease and related dementias (ADRD). Our goal is to understand ... -
Design and Validation of a Context-Aware Publish-Subscribe Model
(University of Waterloo, 2015-12-21)A system is said to be context-aware if it can extract, interpret and use contextual information to adapt its functionality and enhance its utility. Context awareness allows the application to gain sensitivity for many ... -
Design of a Knowledge Acquisition Tool using A Constructivist Approach for Creating Tailorable Patient Education Materials
(University of Waterloo, 2005)Research in patient education suggests that tailored educational materials can improve patient's understanding of a treatment plan and help to achieve patient engagement and compliance. The goal of the HealthDoc Project ... -
Design of a Recommender System for Participatory Media Built on a Tetherless Communication Infrastructure
(University of Waterloo, 2008-09-18)We address the challenge of providing low-cost, universal access of useful information to people in different parts of the globe. We achieve this by following two strategies. First, we focus on the delivery of information ... -
A Design of Theft Detection Framework for Smart Grid Network
(University of Waterloo, 2015-10-28)Energy loss and energy theft are two serious problems in modern grid which produce huge waste and cost. The smart grid with its ability to collect information about the behaviors of suppliers and customers is expected to ... -
A Design Space for Distributed Producer-Consumer Data Structures Using RDMA
(University of Waterloo, 2020-08-26)Remote Direct Memory Access (RDMA) has become a standard networking technology and is prominently used in high-performance applications. While RDMA can provide both excellent performance and novel capabilities, it can ... -
Designing a Foot Input System for Productive Work at a Standing Desk
(University of Waterloo, 2015-03-13)In this thesis we present Tap-Kick-Click, a foot interaction system for controlling common desktop applications. This system enables computer workers to take healthy and productive breaks from using a keyboard and mouse ... -
Designing a Privacy-Aware Location Proof Architecture
(University of Waterloo, 2010-04-15)Although location-based applications have existed for several years, verifying the correctness of a user's claimed location is a challenge that has only recently gained attention in the research community. Existing ... -
Designing a Unity Plugin to Predict Expected Affect in Games Using Biophilia
(University of Waterloo, 2022-09-28)Video games can generate different emotional states and affective reactions, but it can sometimes be difficult for a game’s visual designer to predict the emotional response a player might experience when designing a game ... -
Designing Efficient Algorithms for Combinatorial Repairable Threshold Schemes
(University of Waterloo, 2018-10-23)Repairable secret sharing schemes are secret sharing schemes where, without the original dealer who distributed the shares, the participants can combine information from their shares to perform a computation that ... -
Designing Gunslinger: An Intermodal Large Display Interaction
(University of Waterloo, 2015-05-19)In this thesis, we introduce Gunslinger, a mid-air barehand interaction technique using hand postures to trigger command modes and small finger and hand movements for events and parameter control. Unlike past work, Gunslinger ... -
Designing Intelligent Systems to Support Workspace Collaboration
(University of Waterloo, 2023-02-06)Complex problems and interprofessional work require more resources to be involved, which has been possible through collaboration. Collaborative work is evolving from physical collaboration to more virtual forms through ... -
Designing Persuasive Technology to Reduce Peak Electricity Demand in Ontario Homes
(University of Waterloo, 2014-10-20)When it comes to environmental sustainability, the time that electricity is consumed matters. For example, using an air conditioner on a hot summer afternoon as the power grid is strained necessitates the use of more ... -
Designing Persuasively using Playful Elements
(University of Waterloo, 2021-09-14)Alongside productivity and communication, computers are a valuable tool for diversion and amusement. Game Designers leverage the multifaceted world of computing to create applications that can be developed persuasively; ... -
Designing Survivable Wavelength Division Multiplexing (WDM) Mesh Networks
(University of Waterloo, 2007-04-18)This thesis focuses on the survivable routing problem in WDM mesh networks where the objective is to minimize the total number of wavelengths used for establishing working and protection paths in the WDM networks. The past ... -
Desired Features and Design Methodologies of Secure Authenticated Key Exchange Protocols in the Public-Key Infrastructure Setting
(University of Waterloo, 2004)The importance of an authenticated key exchange (AKE) protocol has long been known in the field of cryptography. Two of the questions still being asked today are (1) what properties or features does a secure AKE ... -
Detecting Exploitable Vulnerabilities in Android Applications
(University of Waterloo, 2021-05-27)The world is moving towards remote-first and giving rise to many mobile tools and applications to get the work done. As more applications are moving towards the cloud and therefore require remote access, the attack surface ... -
Detecting Feature-Interaction Hotspots in Automotive Software using Relational Algebra
(University of Waterloo, 2018-05-14)Modern software projects are programmed by multiple teams, consist of millions of lines of code, and are split into separate components that, during runtime, may not be contained in the same process. Due to these complexities, ...