Search
Now showing items 1-10 of 40
Dynamic square patterns in two dimensional neural fields
(2015-07-29)
The goal of this thesis is to study the emergence of spatiotemporal waves in neural field models. Neural field models aim to describe the activity of populations of neurons at a mesoscopic scale, considering averaged ...
Towards measuring privacy
(2015-04-01)
The acceptable threshold for privacy is an individual choice, informed by culture, tradition and experience. That it is important, conversely, is self-evident. We use it to moderate personal information disclosure, how ...
TandemTable: Supporting Conversations and Language Learning Using a Multi-Touch Digital Table
(Association for Computing Machinery, 2015-06-03)
We present TandemTable, a multi-touch tabletop system designed to break down communication barriers between partners, with a special focus on supporting those who are learning languages. The design was guided by a grounding ...
CORE: a framework for the automatic repair of concurrency bugs
(2015-01-01)
Desktop computers now contain 2, 4 or even 8 processors. To benefit from them programs must be written to work in parallel. If writing good code is hard, writing good parallel code is much harder. Parallelization adds ...
Dynamic probabilistic network protection in large-scale failure scenarios
(2015-01-01)
Large-scale failure resulting from natural disasters or intentional attacks is now considered a serious risk for communication network infrastructure. In these events, simultaneous damages in several links and nodes may ...
Effects of dietary fermentable material on innate and adaptive immune measures in male and female rats under resting and immunized conditions
(2015-02-01)
Sex-based differences in immune parameters are well recognized, and recent evidence suggests differences in microbiota composition between sexes, necessitating assessment of effects of dietary fermentable material (DFM) ...
On the potential of intent-based access control (IBAC) in preventing insider threats
(2015-11-01)
Existing access control mechanisms are based on the concepts of identity enrollment and recognition, and assume that recognized identity is synonymous with ethical actions. However, statistics over the years show that the ...
Analysis of resistance nodulation division efflux pumps in Acinetobacter baumannii
(2015-01-01)
Strains from Canadian hospitals were classified as A. baumannii, A. pitti, or A. osocomialis and the most commonly expressed resistance nodulation division (RND) efflux pump was adeFGH. A collection of A. baumannii isolates ...
Investigation of dye-sensitized solar cell performance with single chirality semiconducting carbon nanotubes
(2015-03-01)
In this work, the performance, electrical transport, and optical properties of dye-sensitized solar cells (DSSCs) assembled with single-walled carbon nanotubes (SWNTs) of a single chirality in the photoanode were ...
A location privacy model and framework for mobile toy computing
(2015-08-01)
Many toys on the market are becoming integrated with the sensory and networking capabilities of mobile technology. Toy computing is an emerging area of research with the characteristics of physical computing, services ...