This decommissioned ERA site remains active temporarily to support our final migration steps to https://ualberta.scholaris.ca, ERA's new home. All new collections and items, including Spring 2025 theses, are at that site. For assistance, please contact erahelp@ualberta.ca.
Theses and Dissertations
This collection contains theses and dissertations of graduate students of the University of Alberta. The collection contains a very large number of theses electronically available that were granted from 1947 to 2009, 90% of theses granted from 2009-2014, and 100% of theses granted from April 2014 to the present (as long as the theses are not under temporary embargo by agreement with the Faculty of Graduate and Postdoctoral Studies). IMPORTANT NOTE: To conduct a comprehensive search of all UofA theses granted and in University of Alberta Libraries collections, search the library catalogue at www.library.ualberta.ca - you may search by Author, Title, Keyword, or search by Department.
To retrieve all theses and dissertations associated with a specific department from the library catalogue, choose 'Advanced' and keyword search "university of alberta dept of english" OR "university of alberta department of english" (for example). Past graduates who wish to have their thesis or dissertation added to this collection can contact us at erahelp@ualberta.ca.
Items in this Collection
- 2Reinforcement Learning
- 1Android Malware Detection, Static Analysis, Factorization Machine
- 1Cloud Computing
- 1Continuous Action Space
- 1Deterministic Policy
- 1Differentiable Optimization
-
Fall 2023
With the increasing complexity and capacity of modern Field-Programmable Gate Arrays (FPGAs), there is a growing demand for efficient FPGA computer-aided design (CAD) tools, particularly at the placement stage. While some previous works, such as RLPlace, have explored the efficacy of single-state...
-
Fall 2021
Malware classification is a critical task in cybersecurity. It offers insights on the threats posed to victim devices from different malware and aids in the designing of precautionary measures. In real world applications, due to the vast amount of malware present in the networks, real-time...
-
Fall 2018
With the increasing popularity of Android smart phones in recent years, the amount of Android malware is growing rapidly. Due to its great threat and damage to mobile phone users, Android malware detection has become increasingly important in cyber security. Traditional methods for android...
-
Spring 2020
With the popularity of smart mobile devices, the need to control mobile devices using voice is increasing. Also, there is greater expectation for the accuracy of keyword spotting. Many existing researches have applied neural networks to keyword spotting, and have great performances. However, at...
-
Spring 2020
Natural Language Processing (NLP) and understanding aims to read from unformatted text to accomplish different tasks. As a first step, it is necessary to represent text as a simplified model. Traditionally, Vector Space Model (VSM) is most commonly used, in which text is represented as a bag of...
-
Spring 2019
The development of modern machine learning systems not only provides the opportunity of applications in various fields but also creates many challenges. The core of machine learning is to train a model based on a dataset, which can be posed as solving an optimization problem, usually expressed...
-
On the Application of Continuous Deterministic Reinforcement Learning in Neural Architecture Search
DownloadSpring 2021
Architecture evaluation is a major bottleneck of Neural Architecture Search (NAS). Recent trends have seen a shift in favor of weight-sharing networks capable of superimposing all possible candidate architectures in a search space. Nevertheless, this technique is not beyond reproach, and has...
-
Fall 2015
Providing service in cloud is a popular trend nowadays. Users request resources from a shared pool in a framework like Hadoop, and the Hadoop fair scheduler controls the progress of tasks from users. In cloud, usually multiple resource types are available. The heterogeneous user demands and...