Domain: 54 computer science

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Year | Item Type
Jump to: 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1996
Number of items: 622.

2014

Aertsen, M.Y. (2014) Verifying functional requirements in multi-layer networks: a case for formal description of computer networks.

Akbar, Nurul (2014) Analysing Persuasion Principles in Phishing Emails.

Amrin, Nabila (2014) The Impact of Cyber Security on SMEs.

Anagnostopoulos, Nikolaos Athanasios (2014) Optical fault injection attacks in smart card chips and an evaluation of countermeasures against them.

Anagnostopoulos, Nikolaos Athanasios (2014) Optical fault injection attacks in smart card chips and an evaluation of countermeasures against them.

Aregay, Tesfay (2014) Ranking Factors for Web Search : Case Study in the Netherlands.

Arzoglou, Ektor (2014) A modeling approach for secure business processing.

Badarinath Hampiholi, Brinda (2014) Secure & privacy-preserving eID systems with Attribute-Based Credentials.

Beckers, Mr D.K. (2014) Information waste on the World Wide Web: combating the clutter.

Berg, Boudewijn van den (2014) Visual tracking of magnetic microrobots in biomedical research applications.

Berg, F.I. van der (2014) Model checking LLVM IR using LTSmin : using relaxed memory model semantics.

Biesbroek, Rudolf (2014) Last-mile lightpath services : on packet-switched shared infrastructure.

Bokhove, Tom (2014) Public data visualisation in traffic, based on local, real-time monitoring.

Bolhuis, M (2014) Using an NFC-equipped mobile phone as a token in physical access control.

Bolscher, P.S. (2014) Automated external fraud prevention in the public sector.

Bookholt, Erik (2014) The Impact of Enterprise Architecture on Business Performance.

Boom, N. (2014) XRM at a bilateral trade organisation.

Bortolameotti, Riccardo (2014) C&C Botnet Detection over SSL.

Bos, J.C.H. (2014) Synthesizable Specification of a VLIW Processor in the Functional Hardware Description Language CλaSH.

Bos, S.L. (2014) Improving the well-being of independently living seniors using ICT How can a personal service be used to improve the self-efficacy, social engagement and security awareness of independently living seniors?

Brinke, Hans ten (2014) Hide and sneak - Perceptions in The Virtual Storyteller.

Broekema, C.D. (2014) Modelling loitering character agents in conflict situations: Visualizing and evaluating interpersonal conflict strategies.

Broenink, Ralph (2014) Finding Relations Between Botnet C&Cs for Forensic Purposes.

Bronkhorst, T.A.W. (2014) Hardware design of a cooperative adaptive cruise control system using a functional programming language.

Claase, Marcella (2014) Why do users bond with online services? : a literature review on the conceptualization of online user bonding in the context of online services.

Corradin, M.C. (2014) Then and Now: On The Maturity of Cybercrime Markets - A study on regulation enforcement of forums in the online underground trading economy.

Davelaar, K.I. (2014) Protecting high school students from bullying: Bully Shield.

Demkes, K.H. (2014) Automated tuning of an algorithm for the vehicle routing problem.

Dijk, T.G. van (2014) Tuning the Parameters of a Loading Algorithm.

Drenthen, S. (2014) Towards continuous delivery in system integration projects : introducing a strategy to achieve continuous delivery and test automation with FitNesse.

Duraisingam, Prithivi Ram (2014) Crack detection in semiconductor products : machine vision techniques for detection of cracks in semiconductor products.

Elderen, Sybren van (2014) Beating Logic: Dependent types with time for synchronous circuits.

Erich, Floris Marc Arden (2014) Improving information system development and operations using the DevOps conceptual framework.

Galen, Rick van (2014) Design and feasibility of mobile peer-to-peer payment systems.

Gielen, M W (2014) Prioritizing Computer Forensics Using Triage Techniques.

Haji Ghasemi, Maryam (2014) Symbolic model checking using Zero-suppressed Decision Diagrams.

Heer, G.W.A. de (2014) Instance Pointcuts.

Hek, J. (2014) Clustering the results from brainstorm sessions.

Heling, Yoran (2014) Biased Random Periodic Switching in Direct Connect.

Hendriks, Luuk (2014) SSH Compromise Detection using NetFlow and IPFIX.

Hessels, Stefan (2014) Adoption of Personal Health Records (PHR) in The Netherlands: A study using the PRIMA-model.

Heuven, D.W. (2014) Opportunistic sensing & Aggregation network Using Smartphones and Sensor nodes.

Hoek, Marissa (2014) Generating Dutch focalized stories about interaction in a serious game.

Hummel, Tim (2014) Exploring Effects of Electromagnetic Fault Injection on a 32-bit High Speed Embedded Device Microprocessor.

Jochemsen, M.C. (2014) An exploration of content-driven commerce.

Jong, Berend J.M. de (2014) A basis for the next VHDL revision.

Jonker, M. (2014) Flow-based SSH Dictionary Attack Detection: the Effects of Aggregation.

Joustra, Yme (2014) Forecasting of wind power production in the Netherlands.

Kamp, T.R. van de (2014) Combining ABCs with ABE: Privacy-Friendly Key Generation for Smart Card Based Attribute-Based Encryption.

Kamphuis, Gertjan (2014) Adding Quality of Service to Disruption Tolerant Networking using the ORWAR routing protocol for use in military MANETs.

Kandziora, Jorne (2014) Runtime assertion checking of multithreaded Java programs - An extension of the STROBE framework.

Kars, J. (2014) Improved performance by integrated corrugator and converter scheduling.

Karuppiah Ramachandran, Vignesh Raja (2014) Characterization of Communication Mechanisms for Implantable Body Sensor Networks.

Keeris, P.J.C. (2014) Improving the boarding process of external insiders in large organisations.

Kegel, R.H.P. (2014) Development and Validation of a Personal Information Security Assistant Architecture.

Knippers, D. (2014) Querying Uncertain Data in XML.

Kooij, W.J. (2014) Playout delay of TV broadcasting.

Krist, J.O. (2014) The effect of residential storage and conrrol on the distribution net compared to central storage and control.

LU, Yuan (2014) Item availability restricted.

Loker, Andre (2014) Evaluating data structures for runtime storage of aspect instances.

Meijer, J.J.G. (2014) Improving Reachability Analysis in Ltsmin - Guards, Read, Write and Copy Dependencies for mcrl2, Promela and Dve.

Mirchev, Hristofor (2014) Creating a Modular AspectJ Foundation for Simple and Rapid Extension Implementation.

Molen, N.J van der (2014) Item availability restricted.

Nienhuis, J. (2014) Using Change Management to improve CRM User Acceptance.

Oude Elferink, Wout (2014) Fingerprint acquisition with a smartphone camera.

Pallett, Dennis (2014) Improving Query Performance of Holistic Aggregate Queries for Real-Time Data Exploration.

Paramartha, Mohammad Anggasta (2014) Design and Instantiation of Reference Architecture of Pluggable Service Platform in E-Commerce.

Peters, Rifca Marcella (2014) How Turn-Taking Influences the Perception of a Suspect in Police Interviews.

Pluimers, Peter (2014) Item availability restricted.

Reiling, Mark (2014) Implementation of a Monocular Structured Light Vision System for Pipe Inspection Robot PIRATE.

Ringlever, J.J. (2014) Improved timetabling for a public transport company from cost as well as passenger perspective.

Ringlever, J.J. (2014) Improved timetabling for a public transport company from cost as well as passenger perspective.

Roditi, Alexandra (2014) Quantifying the Contribution of Enterprise Architecture to Business Goals.

Roskam, Ronald (2014) Evaluation of Online Public Sexual Health Care in the Netherlands: A Scenario-Based User Evaluation.

Ruiter, Mark de (2014) Performance measurement of Hermite-based multi-carrier communication.

Schipper, Ruurd de (2014) The usefulness of IT innovation classification for business model innovation.

Skute, Igors (2014) Brand Equity and Co-Creation Potential in the Social Media Environment: an Analysis of Brand Engagement with Community Influencers.

Smid, Wietse (2014) Ad-hoc context-driven changes in a business process management system.

Snoyl, K.E.R. (2014) De effecten van het gebruik van het F-LinQ fotolijstje op de verbondenheid tussen ouderen en hun (klein)kinderen.

Spenkelink, H.F. (2014) The Adoption Process of Cryptocurrencies - Identifying factors that influence the adoption of cryptocurrencies from a multiple stakeholder perspective.

Spoor, R.J.F. (2014) Design of a wall latching device.

Spruijt, Robert (2014) Selecting a BI Architecture that fits Organisation's Requirements.

Staicu, Cristian-Alexandru (2014) Evaluation of HIMMO with Long Identifiers, an Extension of the HIMMO Key Establishment Scheme.

Steeg, D.P.M.H. van der (2014) Item availability restricted.

Stijntjes, Ingo (2014) ASSESSMENT OF AUTOMATED CROWD BEHAVIOUR ANALYSIS BASED ON OPTICAL FLOW.

Tax, Niek (2014) Scaling Learning to Rank to Big Data: Using MapReduce to parallelise Learning to Rank.

Utomo, Diana (2014) A framework for cloud adoption from Enterprise Architecture and Business Perspective. Validation case study: The implementation of cloud-based contact distribution in Philips Consumer Lifestyle.

Van Nee, F.D. (2014) To a new hardware design methodology: A case study of the cochlea model.

Verbij, Ruud Paul (2014) Dutch e-voting opportunities. Risk assessment framework based on attacker resources.

Vries, W.B. de (2014) How asymmetric is the Internet? A Study to support DDoS Mitigation approaches.

Wagenaar, J.C.N. (2014) Collaborative Cyber Security in the Retail Sector.

Wapperom, Sjoerd (2014) Computational Modelling of Suspect Behaviour in Police Interviews.

Weber, Vincent (2014) UTFM - a Next Generation Language and Tool for Feature Modeling.

Welling, Ruud (2014) Conflict detection and analysis for single-pushout high-level replacement.

Werf, S.J. van der (2014) Measuring Workload at a ProRail Control Post.

Westenberg, R.M. (2014) Managing customer innovation in the financial services industry: A technology acceptance perspective.

Wevers, Gerben G.A. (2014) Hardware Accelerator Sharing within an MPSoC with a connectionless NoC.

Wiegers, R.F.P. (2014) Behavior specification for ontologically grounded conceptual models.

Wielstra, Biense Adrianus (2014) Assessing the Impact of Business Process Redesign Decisions on Internal Control within Banks: A Methodology.

Wierbosch, Mark (2014) It is raining packets.

Witte, N. (2014) Technology Acceptance of Business Meetings in a 3D Virtual Environment Supported by a Content Management System.

Zaga, Cristina (2014) Engaging child-robot interaction in a collaborative task.

ter Maat, Roel (2014) A Framework for Modular Implementation of Domain-Specific Event-Based Applications.

van Hurne, I. (2014) Towards a Unifying Framework for Modelling and Executing Model Transformations.

van Kleef, NTM (2014) Making people matches using Supervised Machine Learning algorithms.

van Lenthe, J.M. (2014) Combining Multiple Malware Detection Approaches for Achieving Higher Accuracy.

van den Bosch, S.F. (2014) Designing Secure Enterprise Architectures A comprehensive approach: framework, method, and modelling language.

2013

Beek, Daan van (2013) Comparing the LTSmin and NuSMV reachability tools via automatic translation of their respective input languages.

Been, Henry (2013) Finding you on the Internet: Entity resolution on Twitter accounts and real world people.

Bruijn, Vincent de (2013) Model-based testing with graph grammers.

Bullée, Jan-Willem (2013) Detection of leadership in informal (small) groups based on CCTV information.

Companjen, Ben (2013) Probabilistically matching author names to researchers.

Cornelissen, Richard (2013) Towards a methodology-growing framework.

Davison, David (2013) A framework for creating semantic wikis for biomedical research laboratories.

Duerink, Hendrik Lodewijk (2013) Information System Data Flow within Performance Based Logistics.

Fluttert, Ernst (2013) Deciding between mobile implementation platforms - A multi-criteria decision system for implementation platforms for mobile applications.

Franssen, Tim K.C. (2013) Gesture recognition in streaming motion data using offline training with a limited training set.

Gennep, Bart van (2013) In the eye of the wizard : effects of (mutual) gaze on an avatar mediated conversation.

Hemert, Teun van (2013) Implementing flexible, extensible composition operators.

Heus, Marije de (2013) Design and evaluation of a recommender system for high school courses in the Netherlands.

Hoekerd, P.G. (2013) Using existing software to build a virtual community for telemedicine.

Huijgen, Arris (2013) Effciently protecting virtualized desktop infrastructures against malware - Performance comparison between traditional- and centralized antivirus.

Hullu, Clermond de (2013) Architectural design of modular ESB systems.

Ionita, Dan (2013) Current established risk assessment methodologies and tools.

Keijl, Edwin (2013) Picalilly: sharing photos through locative social media.

Knoben, L. and Otten, M. and Fransen, R. (2013) De waterzuivering als Petrinet: het voorspellen van overstromingen.

Kolthof, Peter (2013) Vaardigheden van middelbare scholieren voor het selecteren van informatie op het internet.

Kuipers, Elles (2013) Passend onderwijs via de elektronische leeromgeving promotie digitaal.

Laarakkers, Mark (2013) Generating continuation passing style code for the co-op language.

Misra, Gaurav (2013) Permeance of ICT in crime in India.

Moll, René (2013) A DFT based synchronization scheme for chirped communication.

Nguyen, A.D. (2013) Integration of IEC 61850 mms and lte to support remote control communications in electricity distribution grid.

Olthuis, Ferry (2013) A comparison of state space reduction techniques in SCOOP.

Oude Veldhuis, M. (2013) Multi-target user interface design and generation using model-driven engineering.

Pasveer, Marco (2013) Importance sampling for probabilistic timed automata.

Pham, Giang T. (2013) Integration of IEC 61850 MMS and LTE to support smart metering communications.

Postema, B.F. (2013) Fluid survival tool: a model checker for Hybrid Petri nets.

Riet, M. van 't (2013) Trace-based debugging for advanced-dispatching programming languages.

Roemers, Arnout (2013) An adapter-aware, non-intrusive dependency injection framework for Java.

Saman Yan, Daian Geivid (2013) The effect of Testing and Feedback in Digital Game-based Learning.

Satria, Triadimas Arief (2013) Seamless service continuity in cloud based lte systems.

Schade, Christiaan Leonard (2013) FCScan: A new lightweight and effective approach for detecting malicious content in electronic documents.

Sepulveda Bradford, G.U. (2013) What happens when a robot favors someone?: how a museum-guide robot uses gaze behavior to address multiple persons while storytelling about art.

Smits, Pieter (2013) Rationales for Modern ICT Implementation into Schools: a case of tablet PCs.

Smulders, Edwin (2013) User Space Memory Analysis.

Steeneken, Anna (2013) Tablet Gebruik voor Activerende Leeractiviteiten: Een exploratieve case study binnen het Vlaams beroeps en technisch secundair onderwijs.

Tesfay, Tesfahun Aregawy (2013) Automatic distribution analysis of business processes for cloud-based BPM.

Tijhuis, K. (2013) Methods for modelling unit operations in chemical process simulators.

Ugen, Mattijs (2013) Scalable performance for a forensic database application.

Valtulina, Luca (2013) Seamless distributed mobility management(dmm) solution in cloud based lte systems.

Veen, G.F.P. van (2013) Brain Invaders - Finding the paradox of control in a p300-game through the use of distractions.

Verver, Maks (2013) Practical improvements to parity game solving.

Vonk, J. (2013) Formal specification and verification of OpenCL Kernel optimization.

Wal, Jelmer ter (2013) Specification and verification of selected parts of the Java Collections Framework using JML* and KeY.

Wit, Jeroen de (2013) Continuous forensic readiness.

Zarghami, S. (2013) Middleware for Internet of things.

2012

Alam, Ashiful (2012) Business information management and the cloud.

Alofs, Thijs (2012) The Interactive Storyteller A multi-user tabletop board game interface to support social interaction in AI-based interactive storytelling.

Bamberg, Rob (2012) Non-deterministic generalised stochastic petri nets modelling and analysis.

Beusink, J.W.C. (2012) Secure access contol to personal sensor information in federations of personal networks.

Biggelaar, M.E.C. van den (2012) Social media in het middelbaar beroepsonderwijs? Kansen en belemmeringen van social media voor het taal- en rekenonderwijs in het middelbaar beroepsonderwijs.

Brandon, Merel (2012) Effect personality matching on robot acceptance : effect of robot-user personality matching on the acceptance of domestic assistant robots for elderly.

Brands, E.H.T.B. (2012) Flow-based monitoring of GTP traffic in cellular networks.

Broek, Jurgen Gijs van den (2012) Real-world analyses of internet protocols.

Brugman, Ivo (2012) A multimodal interactive system for creative expressions.

Bruintjes, Harold (2012) Bridging GROOVE to the world using a conceptual language model.

Burgman, Ronald (2012) Partial-order reduction based on probe sets.

Chen, Zhen (2012) Workflow management solution for a security management application.

Dijk, Tom van (2012) The parallelization of binary decision diagram operations for model checking.

Donker, J.H. (2012) Handfish - tunable heterogenous multi-core simulators on multi-core hosts.

Epskamp, S.G. (2012) On the influence of stereographic 3D on user dependent direct projected augmented reality in the OR.

Gehring, Felix (2012) Software performance prediction in early development phases: A UML- and simulation-based approach.

Gerritsen, Jan-Henk (2012) Detecting synchronization conflicts for horizontally decentralized relational databases.

Groot, R.E.J. (2012) IT-based risks in advergame campaigns : a focus on fairness and privacy.

Heijden, Rens W. van der (2012) SeDyA: secure dynamic aggregation in VANETs.

Heukels, Rolf (2012) Predicting user behavior using transition probability.

Hijmans, Remco (2012) Comparing grid-based features and classification settings, in an off-line supervised human action detection and recognition task.

Hobert, L.H.X. (2012) A study on platoon formations and reliable communication in vehicle platoons.

Hoeve, Thijs ten (2012) Model based testing of a PLC based interlocking system.

Hofste, J. (2012) Scalable identity extraction and ranking in Tracks Inspector.

Huang, Liting (2012) Secure and privacy-preserving broadcast authentication for IVC.

Jansen, M. (2012) Improving inattentive operation of peripheral touch controls.

Jonkman, F. (2012) Nonverbal behaviour of an embodied storyteller.

Kalsbeek, Maarten van (2012) Interface and interaction design patterns for e-commerce checkouts.

Keuper, D. (2012) XNU: a security evaluation.

Kuperus, Jasper (2012) Catching criminals by chance: a probabilistic approach to named entity recognition using targeted feedback.

Liu, Peng (2012) Test bed and sensor platform for building usage profiling.

Loch, Frieder (2012) Hierarchical gestures: ggestural shortcuts for touchscreen devices.

Middag, Jacob (2012) Convergence of an implicit runge-kutta discontinuous Galerkin method using smooth limiters.

Mols, Emiel (2012) Sharding Spotify search.

Noppen, I. (2012) Assessing the benefits of spectrum sharing in wireless access networks.

Oostinga, Ruben (2012) A java bridge for LSTMIN.

Ottow, Christiaan (2012) Hacking the next web: penetration testing over IPv6.

Sburlea, Andreea Ioana (2012) Brighten up your mind! Effects of light priming and encouraging feedback on the neural and behavioral responses in a general knowledge task.

Scheerens, Daan (2012) Practical indoor localization using bluetooth.

Schot, N. (2012) QoS-aware model-driven SOA using SoaML.

Siaw, Tien Loong (2012) Saturation for LTSmin.

Spijker, Hanno (2012) Improving information dissemination in sparse vehicular networks by adding satellite communication.

Stapersma, Paul (2012) E�cient query evaluation on probabilistic XML data : derived from a glue process with skeleton & flesh.

Stemmer, Joel (2012) detecting outliers in web-based network traffic.

Stoica, Mircea (2012) Detecting the no-control state in self-paced Brain-Computer Interfaces.

Stokkink, Gerjan (2012) Quiescent transition systems.

Teka, Abelneh Y. (2012) Analysis of indirect influence relations in goal-oriented requirements engineering.

Terwellen, Christian (2012) Evaluating the behavior of embedded control software - using a modular software-in-the-loop simulation environment and a domain specific modeling language for plant modeling.

Verberkt, S.L.C. (2012) Claiming security properties in a service oriented architecture.

Vermolen, R.M. (2012) The red queen’s race: from delivery stories to effort estimation: an empirical study.

Wagenaar, P. (2012) Detecting botnets using file system indicators.

Wevers, Lesley (2012) A persistent functional language for concurrent transaction processing.

Wicaksono, Sulistyo Unggul (2012) Enterprise knowledge : reference architecture for visualization and prototype implementation using Wiki.

Wieringa, Wilko (2012) User Handover in a Cross Media Device Environment, A Coaching Service for Physical Activity.

Wu, Xian (2012) Modeling and performance evaluation of wirelesshart.

Zandberg, Martin (2012) Optimization of aspect-instantiation strategies in the JIT-compiler.

Zanderink, Arnold (2012) Drum assistant.

2011

Adolfsen, Martijn (2011) Industrial validation of test coverage quality.

Bergervoet, Erwin Josephus (2011) Let the game do the talking : the influence of explicitness and game behavior on comprehension in an educational computer game.

Boer Rookhuiszen, Roan (2011) Generation of German narrative probability exercises.

Bosems, Steven (2011) A Performance Analysis of Model Transformations and Tools.

Brinke, Steven te (2011) First-order function dispatch in a Java-like programming language.

Bruintjes, Tom M. (2011) Design of a Fused Multiply-Add Floating-Point and Integer Datapath.

Camacho Camacho, José Manuel (2011) Assembler a bgp-compatible multipath inter-domain routing protocol.

Dalen, J.J.M. van (2011) Designing a tool for norm interventions in IT strategy projects.

Dam, Franciscus Jozua van (2011) A stripline antenna for radiated immunity testng.

Dekens, Berend (2011) Mapping of a DAB Radio Decoder to Homogeneous Multi-Core SoC : a case study to evaluate a NLP based mapping flow.

Delden, R.W. van (2011) Design of therapeutic TagTile games for children with unilateral spastic cerebral paresis.

Eerenberg, E. (2011) Towards distributed information retrieval based on economic models.

Ende, Frederik van den (2011) Interference Nulling via a Resistor-Weighted Op-Amp Vector Modulator.

Fritz, Jako (2011) Hybrid Intrusion detection network monitoring with honeypots.

Goos, Sander (2011) A model driven approach to modernizing legacy information systems.

Grisel, I.G.J. (2011) Multimodal user interface for robotized flexible endoscopy.

Hakvoort, Gido (2011) Immersion and affect in a brain-computer interface game.

Ham, Wim van der (2011) An Appraisal Based Model of A�ect for a Negotiating Agent.

Harleman, T. (2011) Towards a generic model for audit trails.

Hassani, A.Z. (2011) Touch versus in-air Hand Gestures: Evaluating the acceptance by seniors of Human-Robot Interaction using Microsoft Kinect.

Hegeman, Erik (2011) InfoSupport - On the Quality of Quality Models.

Hu, Danchao (2011) Using actor-network theory to understand inter-organizational network aspects for strategic information systems planning.

Jeeninga, Jesper (2011) Improving communication between computer programmers and domain experts : creating a generic scenario description language to aid the process of describing scenarios for emergency response training simulators.

Jong, Maurits D. de (2011) Network Management in a Distributed System.

Kanis, Zwier (2011) Classification of Semantically Coherent Segments in Web Pages.

Klifman, T.E. (2011) Propagation of Annotations in a Streaming Context.

Kortüm, Michael (2011) Non-invasive imaging with UWB.

Lastdrager, Elmer (2011) Securing Patient Information in Medical Databases.

Meijer, Michael (2011) On a Design Space for Aggregating over Sliding Windows on a Stream.

Nijenhuis, C.F. (2011) Automatic generation of graphical domain ontology editors.

Noltes, Johan (2011) Data location compliance in cloud computing.

Nouta, Christiaan Alexander (2011) Data processing networks made easy : improving development possibilities for people with limited computer science knowledge.

Obbink, Michel (2011) Social interaction in a cooperative brain-computer interface game.

Op 't Land, Sjoerd (2011) Ranging and localisation error mitigation in indoor obstructed direct path conditions.

Ottenhof, Robbert H.J. (2011) Towards automated truancy detection.

Oude Maatman, Ruud (2011) Design and evaluate a deployment process for the ES benefits management method.

Pater, Elwin (2011) Partial Order Reduction for PINS.

Peng, Yuxi (2011) Face Recognition at a Distance: a study of super resolution.

Posthumus, Wytse Jan (2011) The situated cognitive engineering tool.

Rajput, Abdul Ghani (2011) Properties Relevant for Inferring Provenance.

Schot, Vincent (2011) Social norms to motivate IT use.

Schutte, Rik (2011) Maintaining the causal thread of execution in distributed and multilanguage software.

Sluijsmans, Dennis (2011) Performance Evaluation of Data Dissemination Protocols for an Infrastructure-to-Vehicle Cooperative Traffic Light Application.

Veen, Dirk van (2011) Secure searching through encrypted data - Creating an efficient Hidden Vector Encryption construction using Inner Product Encryption.

Visser, Thomas (2011) Toward a model for incremental grounding in dialogue systems.

Wal, Tjalling van der (2011) Streaming workflow transformation.

Wanders, Brend (2011) Exploring signalling pathways as a serious game.

Warmer, Martin (2011) Detection of web based command & control channels.

Wiekens, Adri (2011) Feedback presentation for physical activity coaching: by an embodied conversational agent or by a simple e-mail?

2010

Admiraal, A.J. (2010) Automated ANTLR tree walker generation.

Ahmed, F. (2010) Relations between semidefinite, copositive, semi-infinite and integer programming.

Alemneh, E. (2010) Sharing nonlinear gates in the presence of glitches.

Baardman, Roel (2010) Cumulus Humilis : wireless mesh-networking for gliders.

Bakker, P.J. (2010) Train composition using motion as a common context.

Bijker, Remko (2010) Efficient pointcut projection.

Bouwhuis, Wilco (2010) Modelleren van de Neocortex : analyse en simulatie op grote schaal.

Bragt, Jasper (2010) Towards believable characters in the virtual storyteller.

Brugge, Jonathan (2010) Implementing and simulating the cross-entropy ant system.

Bukhsh, Faiza Allah (2010) Enhanced ICoNos maturity model.

Costa, Alvise (2010) Context - Free - Language Parser for Advanced Network Intrusion Detection.

Diephuis, Maurits (2010) A framework for robust forensic image identification.

Feng, Yuan (2010) Modified potential approach to efficient, linear and symmetric values for TU-games.

Franssens, Anne (2010) Impact of multiple inquires on the bluetooth discovery process : and its application to localization.

Ganzeboom, Mario S. (2010) User-independent recognition of dynamic hand gestures using a dataglove.

Hartholt, Woutske (2010) Beslissingsondersteuning voor het aanpassen van de online OK-planning.

Hartog, M.R. den (2010) Shunt planning : an integral approach of matching, parking and routing.

Hoeksma, Ruben (2010) Price of anarchy for machine scheduling games with sum of completion times objective.

Hollander, Emiel (2010) Dynamic access control.

Horst, Arie (2010) Sport coach : online activity using wireless sensor network.

Hove, D. ten (2010) Change management within SysML requirements models.

Jochems, Bart (2010) Detecting emotional intensity peaks in narrative conversational settings.

Kant, Gijs (2010) Distributed state space generation for graphs up to isomorphism.

Khadka, Ravi (2010) Model-driven development of service compositions : transformation from service choreography to service orchestrations.

Kok, Guido (2010) Cloud computing & confidentiality.

Kroes, S. (2010) Domain specific embedded languages and model driven engineering.

Lange, R-J. de (2010) Provenance aware sensor networks for real-time data analysis.

Lansink, M. (2010) Hair simulation and rendering.

Lavooij, K. (2010) Near-real time statistics gathered from a continuous and voluminous data mutation stream.

Moel, E.L. de (2010) Expanding the usability of recorded lectures : a new age in teaching and classroom instruction.

Palsma, T. (2010) Discovering groups using short messages from social network profiles : using hierarchically organized concepts to discover relations.

Paul, Ronald (2010) Realization and high level specification of facial expressions for embodied agents.

Peterson, R.S. (2010) Testing real-time requirements for integrated systems.

Pothoven, Tristan (2010) Workflow usage in the healthcare environment.

Punter, C.M. (2010) Multi-source entity resolution.

Qiu, Xian (2010) Bin packing games.

Schwartzenberg, J. (2010) Using machine learning techniques for advanced passive operating system fingerprinting.

Sijtema, Marten (2010) Managing variability in model transformations for model-driven product lines : extending the ATL model transformation language with variability management capabilities.

Sikkens, B. (2010) The storage and retrieval of sensor data and its annotations.

Slomp, G.H. (2010) Reducing UPPAAL models through control flow analysis.

Spijkerman, Wietze (2010) Tool support for change impact analysis in requirement models : exploiting semantics of requirement relations as traceabilitt relations.

Stuurman, Gijs (2010) Action semantics applied to model driven engineering.

Teijgeler, Stefan (2010) Connecting GROOVE to the world using XMI.

Telgen, M.G. (2010) Realistic route choice modeling.

Ugryumova, D. (2010) Control design for a chemical disinfection process using the residence time distribution.

Valk, J.J. van der (2010) The in uence of a target motion model on the exact Bayesian filter recursion; research by particle filtering.

Vlieg, Edwin (2010) Usage patterns for user-centric service composition.

Voorst, B. van (2010) Cluster-based collection selection in uncooperative distributed information retrieval.

Wester, Rinse (2010) A dataflow architecture for beamforming operations.

Yin, Haihan (2010) Developing a generic debugger for advanced-dispatching languages.

Zanden, Guido van der (2010) Quality assessment of medical health records using information extraction.

2009

Akker, H. op den (2009) On adressee prediction for remote hybrid meeting settings or how to use multiple modalities in predicting whether or not you are being addressed in a live hybrid meeting environment.

Asuncion, C.H. (2009) Goal-driven service mediation solution.

Baaij, C. (2009) CλasH : from Haskell to hardware.

Balen , J. van (2009) A virtual billiard assistant.

Barbosa, Rafael Ramos Regis (2009) On Access Network Identification and Characterization.

Blom, Koen (2009) DVB-S signal tracking techniques for mobile hased arrays.

Bockting, S. (2009) Collection selection for distributed web search : using highly discriminative keys, query-driven indexing and ColRank.

Boot, L. (2009) Facial expressions in EEG/EMG recordings.

Bos, W.J. (2009) Interactive signaling network analysis tool.

Braak, Timon D. ter (2009) Run-time spatial resource management in heterogeneous MPSoCs.

Brand, A. (2009) An investigation in qualities of software variability.

Chauhan, P. (2009) Study the impact of smile and tail dependence on the prices of European style bivariate equity and interest rate derivatives using Copulas and UVDD model.

Diepenmaat, J. (2009) Object XML mappings.

Domburg, R.S.A. van (2009) Empirical evaluation of change impact predictions using a requirements management tool with formal relation types : a quasi-experiment.

Everse, Wouter M. (2009) Modelling and Verification of a Shortest Path Tree Protocol for Wireless Sensor Networks : Towards a Platform for Formal Veri�cation Experiments.

Galen, J. van (2009) Modelling, simulation and impelementation of an optical beam forming network control software system.

Garcia Garcia, A. (2009) Optical phase synchronization in coherent optical beamformers for phased array receive antennas.

Graaff, V. de (2009) Towards distributed information access : possibilities and implementation.

Hagen, Gijs (2009) Het schrijven van een nieuw werkboek: hoofdstuk elektriciteit. 2e klas Havo/VWO.

Hagendoorn, B. (2009) Viscous coupling between bio-inspired hair-sensors.

Hong, L. (2009) Implementation and tuning of optical singlesideband modulation in ring resonator-based optical beam forming systems for phased-array receive antennas.

Houtman, J. (2009) Bringing scalability/failover to a complex producer/consumer implementation.

Jeckmans, A.J.P. (2009) Practical Client Puzzle from Repeated Squaring.

Kingma, J. (2009) Combined VCO/Mixer for satellite receiver in CMOS.

Klaassen, R. (2009) COPD home interaction device.

Koelewijn, J.W. (2009) Resource operations model in a dynamic world.

Kok, I. de (2009) The influence of videoconferencing and an emotional feedback support system on polyadic negotiations.

Kooijman, M. (2009) Haskell as a higher order structural hardware description language.

Kroon, E. (2009) Layered configuration management for software product lines.

Kuperus, Johan (2009) Wave monitoring using wireless sensor nodes.

Laar, B. v.d. (2009) Actual and imagined movement in BCI gaming.

Laarman, A. (2009) An Ontology-Based Metalanguage with Explicit Instantiation.

Logtenberg, Jeroen (2009) Multi-user interaction with molecular visualizations on a multi-touch table.

Looman, S.A.M. (2009) Impact Analysis of Changes in Functional Requirements in the Behavioral View of Software Architectures.

Lucassen, T. (2009) Adaptive support of human attention allocation using cognitive models.

Meertens, Lucas O. (2009) EPC to BPEL transformations.

Meij, D.P.L. van der (2009) A metamodeling approach to incremental model changes.

Meijerink, Roland (2009) Begrip in kaart: Hoe kan het gebruik van begrippenkaarten het begrip van leerlingen in 3VWO op het gebied van optica verbeteren?

Muis, Allard (2009) Patterns in data conversion.

Mutter, T. (2009) Partition-based network load balanced routing in large scale multi-sink wireless Sensor Networks.

Nijkamp, Barry (2009) Using functional design patterns to improve exports to management information systems.

Nouwens, I.C.C. (2009) Predicting dialogue state transitions using prosodic markers: Exploring AMI Corpus backchannels.

Ooms, Matthijs (2009) Provenance management in practice.

Oosting, W.M.H. (2009) Design and evaluation of a community of practice to support IT implementation/migration processes : a case study about the design of a CoP within the Suite4Basisgegevens migration.

Oostrum, A. van (2009) A model and specification for development of enterprise application frameworks.

Perk, Anno (2009) Reflection in large IT Projects : a method for project success focussing on soft factors.

Poortema, Anne (2009) Training clients using e-learning : developing an e-learning model for an international software vendor.

Rietema, Richard (2009) Automatic Verification and Analysis of Test Results of Océ Printers.

Rombouts, Wolf (2009) Context-Concept chemie en van Hiele's abstractieniveaus.

Roodenburg, S.B. (2009) Scheduling the sequential hardware-in-the-loop simulator.

Rubio Paniza, E. (2009) Design and evaluation of an MSP-based body area network management architecture using JMX.

Rutgers, Jochem (2009) VHDL voor het voortgezet onderwijs: Een nieuwe lesmodule over hardware voor informatica.

Satink, Laurens (2009) The adaptive presentation assistant using grammar-based recognition to support the process of presenting.

Schippers, Jorrit (2009) A massively scalable architecture for instant messaging & presence.

Schot, Jurgen (2009) The privacy governance framework : effectively dealing with privacy legislation.

Schouten, J.H. (2009) Optimisation of packet scheduling in wireless networks.

Span, Ruben (2009) Towards an enterprise performance management solution : a method to design and implement enterprise performance management.

Stolp, D.G.A. (2009) Using ontology mapping to automate derivation of transformations for data integration.

Sulistyo, Pythia (2009) Inter-Organizational Strategic Information Systems Planning (IOSISP) in Network Perspective: How Network Governance Influences IOSISP Effectiveness Evaluation of Healthcare, Government and logistic/Transport Industry Sectors in the Netherlands.

Tariq, T. (2009) Extending CACI : implementing support functions for the context producer and designing a security Framework.

Tijmes, M. (2009) Simulation of a ring resonator-based optical beamformer system for phased-array receive antennas.

Tjink-Kam-Jet, Kien-Tsoi T.E. (2009) Result merging for efficient distributed information retrieval.

Tommassen, P. (2009) Wacky Pirate Hijinks : causing and resolving conflict between autonomous agents in a virtual storyworld.

Veldhuis, J.W. (2009) Tool support for a metamodeling approach for reasoning about requirements.

Veldman, I. (2009) Matching profiles from social network sites : similarity calculations with social network support.

Vliek, G. (2009) Detecting spam machines, a netflow-data based approach.

Vrielink, Jasper D. (2009) Phased array processing: direction of arrival estimation on reconfigurable hardware.

Vries, E. de (2009) Touchscreen interaction for healthcare applications.

Weele, J.H.D. ter (2009) Onderzoek naar de gebruikersvriendelijkheid van boekingsformulieren.

Westmijze, M. (2009) Memory optimizations on the sequential hardware-in-the-loop simulator.

Wolterink, T.J.L. (2009) Operational Semantics Applied to Model Driven Engineering.

2008

Babakhani, Bayan (2008) Implementation of a 2D master-slave system.

Berg, Ruben van den (2008) Interaction capabilities of Second Life : a framework to determine Second Life's suitability for a 3D virtual world application.

Bezemer, Maarten (2008) Analysing gCSP models using runtime and model analysis algorithms.

Bloem, E.J.W. van (2008) The user oriented knowledge management method : a knowledge management method for a small organization with a distributed environment.

Bloem, R.J.G. van (2008) A data transformation walkthrough.

Blumink, Remco (2008) Implementing and communicating with SHILS.

Boros, H. (2008) Context Discovery Adapter (CDA) Protocol.

Bosch, Stephan (2008) FollowMe! : distributed movement coordination in wireless sensor and actuator networks.

Brink, Tim van den (2008) Ketenarchitectuur : succes- en faalfactoren bij de invoering van het digitaal klantdossier.

Brinkman, E. (2008) Recognition of the emotion in abstract expressionistic paintings using a machine learning approach.

Broekhuizen, V.P. (2008) Security for EPC discovery services.

Daemen, P. (2008) ZMP based control in 3D passive dynamic walking.

Dam, Arjan (2008) Geographic routing in wireless sensor networks for surveillance : introducing a novel routing algorithm: GZOR.

Damman, B. (2008) Representing PCTL counterexamples.

Deddens, M.K. (2008) Toepasbaar risicomanagement in software ontwikkelingsprojecten : ontwerp en toepassing van een risicomanagementmethode voor software ontwikkelingsprojecten binnen Centric IT Solutions.

Driezen, Wouter (2008) Service-oriented and open-source software as potential markets for applications markets : analysis of the possible added value of Capgemini outsourcing's Dutch applications management service center.

Eenennaam, E.M. van (2008) Providing over-the-horizon awareness to driver support systems by means of multi-hop ad hoc vehicle -to-vehicle communication.

Engelsman, W. (2008) Method for requirements management and modeling.

Es, Frank J. van (2008) Type inference for graph transformation systems.

Fournier, Bas (2008) Preprocessing on bilingual data for Statistical Machine Translation.

Franssens, Anne (2008) Analysis of Reed Solomon error correcting codes on reconfigurable hardware.

Gaiser, Vincent Alexander (2008) Improving spatial awareness in an indoor environment with wireless positioning technology.

Gerards, M. (2008) Streaming reduction circuit for sparse matrix vector multiplication in FPGAs.

Gils, F.M.D.M. van (2008) PodVinder : spoken document retrieval for Dutch pod- and vodcasts.

Griffioen, H.T. (2008) Design of clock cleaner : a fast locking PLL.

Haanstra, Sander (2008) Analyzing and improving generalization over time in CSP-based Brain-Computer Interfaces.

Habib, Mena Badieh (2008) An intelligent system for automated arabic text categorization.

Henzen, S.F. (2008) A framework for service-oriented extensions to Ruby on Rails.

Ho, Yoeng Woey (2008) .NET integration TEAHA.

Hogt, N.A. (2008) Aanbevelingen voor een architectuur voor het regionale zorgsysteem.

Houwelingen, Jan Willem van (2008) Relevance and usability of enterprise architectures during post merger IT integrations.

Idserda, K. (2008) Simultaneous binding proxy mobile IPv6.

Jevring, Markus (2008) Automatic management of bluetooth networks for indoor localization.

Jonge, Marc de (2008) The SpinJ model checker : a fast, extensible, object-oriented model checker.

Jongeling, R. (2008) Signature modification for Compose?/.NET : implications of signature modification for generic compilers and behavioral signatures of types.

Jonker, J. (2008) Wizard of Oz for gesture prototyping.

Kaijen, J.A.H. (2008) Management of risk & information security data.

Kessel, Ruud van (2008) Querying Probabilistic XML.

Klein Wolterink, W. (2008) A content-based routing protocol for mobile ad-hoc networks using a distributed connected k-Hop dominating set as a backbone.

Klooster, J-W. van 't (2008) Context, design and implementation of a control system for ring resonator-based optical beam forming networks.

Kruiskamp, Michel (2008) FastSOA : achieving high-performance service oriented architectures.

Linders, Stefan (2008) Opportunities and limitations of using SOA concepts and technologies for building BI applications : a Delphi study.

Lonnee, J. (2008) A scalable repository based on a meta-modelling architecture.

Looise, M.J. (2008) Inter-level consistency checking between requirements and design artefacts.

Lootsma, Marten (2008) Design of the global software structure and controller framework for the 3TU soccer robot.

Lopez, J.M. (2008) Dynamic service composition in an innovative communication environment.

Mahrof, Dlovan Hoshiar (2008) Design of a fully integrated RF transceiver using noise modulation.

Melissen, Arthur (2008) Exploring neglected avenues in the modelling of attribution theory.

Meppelink, Lianne (2008) Towards interoperability between existing VoIP systems.

Munsterman, Thijs Pieter (2008) Exploring software scalability : and a method for evaluating and improving software scalability.

Nijmeijer, Tom (2008) Automatic classification of television commercials.

Nijssen, Bobby J.W. (2008) Cooperative Intelligent Transportation Systems Building a demonstrator for the CVIS-project on the Informatieve Weg.

Oever, Daniel van 't (2008) CoNSoLe: A Domain Specific Language for Network Services.

Oostrum, A.R. (2008) A service register as an information intermediary : towards a structured design approach for service registers.

Oude Alink, M.S. (2008) Increasing the spurious-free dynamic range of an integrated spectrum analyzer.

Oude Bos, Danny (2008) BrainBasher : a multi-modal BCI game for research and demonstration.

Pasch, M. (2008) Bye-bye couch potato : body movement in the gaming experience.

Roolvink, S. (2008) Detecting attacks involving DNS servers : a netflow data based approach.

Schabbink, Johan (2008) Design of a capacitive based closed-loop displacement sensor.

Schilpzand, M.P. (2008) X-Stream in MaDAM : new junction modelling in macroscopic dynamic traffic assignment models.

Scholte, Theodoor (2008) Managing continuous uncertain data by a probabilistic XML database management system.

Sealy, Timothy (2008) Implementation of aggregation based Resource Management in DiffServ (RMD) Quality of Service Model (QOSM).

Steen, H. van der (2008) Design of animation and debug facilities for gCSP.

Tigelaar, Almer S. (2008) Automatic discussion summarization : a study of Internet fora.

Timmer, M. (2008) Evaluating and predicting actual test coverage.

Twelkemeijer, R. (2008) Design of an audio power amplifier with a notch in the output impedance.

Uithol, Michiel (2008) Security in domain-driven design.

Velner, J. (2008) Integrated state-of-charge circuit for rechargeable batteries.

Vos, Geert (2008) Issues of iterative mda-bades software development processes.

Vries, A.J.K. de (2008) Improving reliability of streaming radio.

Werf, R.J. van der (2008) The Embodied Conversational Agent Toolkit : a new modularization approach.

Wijngaarden, Pieter van (2008) Error tolerance analysis of the Telefónica de España optical fibre network.

Wit, Joost de (2008) Evaluating recommender systems : an evaluation framework to predict user satisfaction for recommender systems in an electronic programme guide context.

2007

Ambrosius, Frank (2007) Modelling and distributed controller design of the bodeRC paper-path setup.

Ambrosius, R.B.P. (2007) Elektronische leeromgeving met gebarentaalherkenning : Grafische user interface oplossingen voor ambigu¨ıteitproblemen van een gebarentaalherkenner voor een elektronische leeromgeving voor dove en slechthorende kleuters.

Atketin, Namik (2007) Ontwikkeling van een interactieve model-gedreven E-formulier generator.

Baalman, Philippus (2007) Van mono naar multi: een automatische VJ.

Baesjou, Bertrand (2007) Improving dependability of OSS access to a hierarchical distributed ad-hoc NMS.

Bergen, Marcel van (2007) Design and prototyping of a human-computer interface for a desktop tele-classroom conference application.

Bosman, Yoran Maxim (2007) Incorporating Functional Design Patterns In Software Development.

Bouwmeester, Egbert (2007) Continuous Classes of Power Amplifiers.

Buurman, H.A. (2007) Virtual Storytelling: Emotions for the narrator.

Derwort, Selmer (2007) IT governance: de doelen en de middelen: In kaart brengen van IT governance in theorie en praktijk.

Dijk, Michel van (2007) Analysis and control of nonlinear oscillators.

Doorn, Gerrit Hendrikus van (2007) Accelerated playback of meeting recordings.

Elling, Erwin (2007) Tools for fun and fruitful meetings. : “Don’t let meetings make you go bananas!”.

Fountain, Stefan J. (2007) Success prediction induction framework : success models for online applications, introducing network effects and trust constructs.

Franken, Michel (2007) Ankle actuation for planar bipedal robots.

Gribnau, Erwin (2007) Analysis, design & implementation of a high-performance main-memory object database for Splice2.

Heddema, R.R. (2007) Strategy for a robot soccer team - Let’s play robot soccer -.

Hegge, Stephan (2007) Predicting end-to-end network characteristics on mobile devices.

Herms, K.G.F. (2007) Body pose tracking in the Watching Window : a system that tracks both hands in a virtual reality environment.

Heuts, R.P. (2007) Mobile interface design for dynamic environments.

Hoogsteder, V.J.M. (2007) Strategic performance measurement for eBuddy.

Huisman, Rolf (2007) Bugspray for composition filters.

Jansen, Lisette (2007) Panze: A Multimodal Preschool Music Education System.

Kalter, Stefan Reijmer (2007) Vertical collaboration in open source business.

Kernkamp, Reinier (2007) Alignment of Requirements & Architectural Design In a Blended Delivery Model.

Klaver, Ruud (2007) Using NSIS (Next Steps in Signaling) for support of QoS aware multimedia services.

Kock, Arien S. (2007) Enhancing Synthetic Speech with Filled Pauses.

Kok, J. (2007) The design of a Delta Impact analysis model for data warehouses.

Kooijman, Ruben (2007) See, hear, listen : head movements and the sensitive artificial listener.

Kooistra, Cornelis (2007) Design and testing of embedded control software for the ViewCorrect Plotter.

Koster, J. (2007) Influencing tabletop interaction speed: directness and device.

Kosters, Dennis (2007) Invloed van slimme meters op de energiebalans: Een analyse van de invloed van het slimme meter systeem op een netbeheerder en zijn ondersteunende IT, binnen het kader van de energiebalans.

Kosters, T. (2007) Van gasbel naar gasstel : een onderzoek naar de inrichting van de shipper op de gasmarkt.

Krijnen, Bram (2007) Heat flow modeling in copiers.

Kuperus, J.H. (2007) Nested quantification in graph transformation rules.

Kuppeveld, Teun van (2007) Model-based redesign of a self-balancing scooter.

Leong, Frank (2007) Design of an oscillator for satellite reception.

Maatjes, N.C. (2007) Automated transformations from ECA rules to Jess.

Molderink, Albert (2007) Feasibility Analysis of MPEG decoding on reconfigurable hardware.

Nguyen, V.Y. (2007) Optimising techniques for model checkers.

Nguyen, Viet Yen (2007) Optimising techniques for model checkers.

Nijdam, N.A. (2007) Facial rendering.

Odijk, M. (2007) Novel sensor structures for enhanced redox cycling.

Oijen, Joost van (2007) A Framework to support the influence of culture on nonverbal behavior generation in Embodied Conversational Agents.

Oldenkamp, H.A. (2007) Probabilistic model checking : a comparison of tools.

Olthof, Mark (2007) Performance & Scalability of a Spatial Database in a GIS-Web Service Environment.

Ooms, Wendy (2007) Providing AAA with the Diameter protocol for multi-domain interacting services.

Oostveen, Laurens van (2007) Conductivity gradient focusing by pervaporationand osmosis-induced fluxes.

Ordelmans, L. (2007) The Creation of a Flexible, Functional Simulation Generator for the Montium Tile Processor.

Os, Roel van (2007) Optimizing XML information retrieval query execution at the physical level.

Papegaaij, E. (2007) The Tree Processing Language: Defining the structure and behaviour of a tree.

Penning, M.P.J. (2007) Boosting LUCK: Improving the language understanding capabilities of Kaitito.

Portengen, Rik (2007) Phased array antenna processing on reconfigurable hardware.

Pot, Wouter (2007) A machine learning approach for generating expressive musical transcriptions.

Poulisse, Gert-Jan (2007) Exploiting inter-conceptual relationships to boost SVM classification.

Prins, Martin (2007) Fast retransmission for multicast IPTV.

Putten, Ing. A.E. van (2007) Behavioural hybrid process calculus translation to modelica.

Reede, Joost (2007) On A-Select and Federated Identity Management Systems.

Reuderink, Boris (2007) Fusion for Audio-Visual Laughter Detection.

Roes, J.B.M. (2007) Identifying and solving overlap between messaging standards with the help of domain models, illustrated with HR-XML’s SIDES and SEP.

Roo, A.J. de (2007) Towards more robust advice : message flow analysis for composition Filters and its Application.

Rozen, Riemer van (2007) A Debugging Framework for NIPS.

Sambeek, M. van (2007) Real-time shadow generation for 3D simulations using modern hardware.

Scholten, F.B. (2007) The concern-oriented software architecture analysis method.

Sierhuis, Pim (2007) Het voorkomen van prestatieverlies bij de koppeling met Web services: ... en de rol van standaardisatie daarbij.

Siles Del Castillo, Hugo (2007) Hybrid Content-Based Collaborative-Filtering Music Recommendations.

Smulders, Bram (2007) SQLbusRT : real time data distribution and storage.

Sombekke, N.B.H. (2007) Graph-Based Semantics of the .NET Intermediate Language.

Spenkelink, Roy David (2007) Porting Compose* to the Java Platform.

Staal, Eric (2007) Simulation with Hamiltonian mechanics : creating a module for 20-sim.

Stellinga, Anne (2007) A low-power second-order sampling receiver for Bluetooth.

Tinselboer, Koen (2007) The use of rare key indexing for distributed web search.

Tuijn, Jasper Aartse (2007) Partial session mobility in context aware IP-based multimedia subsystem.

Tuin, Vincent van der (2007) Computer-Aided Security Surveillance : design of the Quo Vadis Object Tracker.

Veelen, P. van (2007) Clustered acoustic modelling in speech recognition.

Veen, Marcel van der (2007) Sparse matrix vector multiplication on a field programmable gate array.

Verdonkschot, S.F.G. (2007) Design and implementation of a trusted RFID reader.

Versloot, Corne (2007) Cross-document named entity coreference resolution for Dutch as a pre-process for named entity based text mining.

Vervuurt, Mark (2007) Modeling business process variability : a search for innovative solutions to business process variability modeling problems.

Vlasveld, J. (2007) On context in context-aware ICT applications.

Wijgerse, Steven (2007) Generating realistic city boundaries using two-dimensional Perlin noise.

Witteman, M.T. (2007) Efficient proximity detection among mobile clients using the GSM network.

Zwerus, Robert (2007) Storing Personal Information Management data: Akonadi - unifying PIM data for KDE.

2006

Backx, Niels (2006) On the design of a mobile e-health platform ¿ towards deployment flexibility.

Berens, Menno (2006) De tevredenheid over shared service centers in de publieke sector : het succes van shared service centers en de oorzaken daarvan in de inrichting en het functioneren van de klant-leverancierrelatie.

Boorsma, Simon (2006) Ketenintegratie van het intermediaire distributiekanaal in de verzekeringsbranche : huidige ontwikkelingen in de verzekeringsbranche en de mogelijkheden voor Zevenwouden Verzekeringen om ketenintegratie te realiseren¿.

Bos, Pieter (2006) Interacting with a virtual conductor.

Boschman, S.R. (2006) Performing transformations on .NET intermediate language code.

Braam, G.J.M. (2006) Supporting multi-modal and multi-medial user interfaces from an embedded environment.

Broekhuijsen, Jeroen (2006) 2D Upper Body Pose Estimation from Monocular Images.

Brouwer, L.J. (2006) Monitoring van een ASR-systeem : het gebruik van interne confidencewaarden en teletekstondertiteling om de Word-Error-Rate van een herkenning te voorspellen.

Buth, Maarten Dimmen (2006) Ball-handling motion control for soccer playing mini-robots.

Cheng, W. (2006) The design of a new power combining technique for the RF power amplifiers.

Conradi, Olaf (2006) Fine-grained Join Point Model in Compose.

Derks, Theo (2006) Health at home.

Dijk, J.J. van (2006) Entiteitreconciliatie ondanks beperkte overlap door middel van objectgelijkheid : casus ¿Koppelen van persoonsgegevens zonder een gemeenschappelijke identificatie¿.

Dimitrova, Desislava C. (2006) Performance evaluation of RMD (Resource Management in DIFFSERV) within NSIS (Next Steps In Signaling).

Doornenbal, Ing. Dirk (2006) Analysis and redesign of the compose*language.

Engelen, L. van (2006) Massively parallel quantization implementation using simulated annealing.

Groen, Ruud (2006) Modelleren en analyseren van een Ethernet switch.

Groot, Paul de (2006) Enhancing the performance and testability of the MI20 robot soccer system.

Hassink, N. and Schopman, M.G. (2006) Gesture recognition in a meeting environment.

Heerde, Harold van (2006) Life-cycle privacy policies for the ambient intelligence.

Hulswit, D.R. (2006) Automatic interpretation of Nijntje-images.

Ingberg, G. (2006) Location aware performance measurements.

Kattenbelt, M.A. (2006) Towards an explicit-state model checking framework.

Kemna, Tim (2006) Bisimulation minimisation and probabilistic model checking.

Koop, O.R. (2006) Continuous and discontinuous Galerkin finite element methods of variational Boussinesq water-wave models.

Kreuk, N.A.W. (2006) The Turkish option market.

Leenslag, Wilco (2006) Werkwijze ter beoordeling van IT governance op basis van geaccepteerde methodes op het terrein van IT governance.

Linnenbank, Tristan (2006) Architectural Principles for Large Scale Web sites: a Case Study.

Linthorst, Henk-Jan (2006) De mogelijkheden van ICT in het effectiever en efficiënter functioneren van de diabetesketen.

Meijer, Gijs (2006) Performance measurement of IT investments.

Nguyen, H.Q. (2006) Analysis of crosscutting concerns in QVT-based model transformations.

Noordhuizen, Paul (2006) Analyzing aspects in production : plans for software product lines.

Nusman, Daan (2006) Real-time full-body motion capture in virtual worlds.

Overbeek, J.F. (2006) Meta Object Facility (MOF): investigation of the state of the art.

Puming, Liu (2006) Service agreements and facilities for M-health vital sign monitoring.

Rorije, R.J. (2006) Input/output in functional languages : using algebraic uniontTypes.

Rovers, Kenneth C. (2006) Front-end research for a low-cost spectrum analyser : receiver system and topology study.

Schrijver, Bert Jan (2006) Classificeren met vertrouwen : contextgevoelige tekstclassificatie met betrouwbaarheidsindicatie.

Sikkes, Bart (2006) A stable matching based adaptive subcarrier assignment method for multimodal fibre access networks.

Sirchia, Riccardo (2006) Realtime softwarematige radarscan conversie : met GPU programmeren.

Slabbers, Nanda (2006) Narration for virtual storytelling.

Smelik, R.M. (2006) Specification and Construction of Control Flow Semantics : a generic approach using graph transformations.

Speelziek, M.D. (2006) Evaluating rapide using the FRODO service discovery protocol.

Spenkelink, Dennis (2006) Incremental Compilation in Compose*.

Steeden, Remco van (2006) Communication-centric debug of systems-on-chip using networks-on-chip.

Steen, J.L.P.J. van der (2006) Investigation of the band gap widening effect in thin silicon double gate MOSFETs.

Steghuis, Claudia (2006) Service granularity in SOA-projects : a trade-off analysis.

Stehouwer, J.H. (2006) Cue phrase selection methods for textual classification problems.

Swartjes, Ivo (2006) The Plot Thickens : bringing structure and meaning into automated story generation.

Tetteroo, Arend-Jan (2006) Bomb-Proof Server : benodigde technieken en producten voor een high availability systeem en hun consequenties voor beschikbaarheid.

Veldhuijsen, Gerald van (2006) DICOM Image Retrieval.

Verbree, A.T. (2006) On the structuring of discussion transcripts based on utterances automatically classified.

Vrielink, S.B. (2006) Situational reinforcement learning : learning and combining local policies by using heuristic state preference values.

Vrijkorte, A.B. (2006) Semantics in service-oriented architectures.

Wasbeek, Edwin van (2006) A repository for the management of artifacts in system engineering.

Winkel, J.D. te (2006) Applying Composition Filters to C.

Yang, Furong (2006) Short term electricity price forecast model.

2005

Boedeltje, Michel Ronald (2005) In response to your inquiry : Automatic E-mail Answer Suggestion in a Dutch Contact Centre.

Borkent, Michiel (2005) De- and recomposition of expression in music performance.

Borssum Waalkes, Bart (2005) Managing Genome Databases.

Burgwal, M.D. (2005) Serving the Montium : design of an energy-efficient processor-network interface.

Havinga, W. (2005) Designating join points in Compose* : a predicate-based superimposition selector language for Compose.

Holzenspies, Philip (2005) SILC: SPRITE Input Language with C(++).

Klaij, Bastiaan (2005) Toegepast tokenizen voor natuurlijke taal verwerking : automatische analyse van platte en opgemaakte tekst.

Nijenhuis, Barry (2005) Smart sign for smart surroundings.

Oosterhof, N.N. (2005) Application patterns in functional languages.

Timmer, M. (2005) How to identify the speed limiting factor of a TCP flow.

Weijden, Erik van der (2005) Structuring argumentation in meetings : Visualizing the argument structure.

Withaar, T. (2005) Analyzing joint-measurements using 3D scancs and statistical models.

2004

Ananda, Artha Sejati (2004) Design and simulation of non-zero and zero dispersion optical lattice wavelength filters.

Balkema, Wietse (2004) Realization and characterization of a 2.4 GHz radio system based on frequency offset division multiple access.

Bekkaoui, A. (2004) Link performance of the time offset transmitted reference system.

Bui, Cuong (2004) Write-intensive applications with DLAP.

Evers, Sander (2004) Form follows function. Editor GUIs in a functional style.

Roelofsen, Floris (2004) Contextual Reasoning - Complexity Analysis and Decision Procedures -.

Sözer, Hasan (2004) A peer-to-peer file sharing system for wireless ad-hoc networks.

2003

He, Xiaobo and Mayasari, Elisabeth E. (2003) A Design of Software Architecture for “SHAPE” Workforce Management Game.

2002

Nurdin, H.I. (2002) Mathematical modelling of bias and uncertainty in accident risk assessment.

2001

Agung Julius, A.A. (2001) Evolution of the modal densities of a class of stochastic hybrid systems.

Donckers, L. (2001) Energy Efficient TCP.

2000

Schiphorst, R. (2000) Demonstration of the Software-Radio Concept.

1996

Hiemstra, D. (1996) Using statistical methods to create a bilingual dictionary.

This list was generated on Fri Nov 28 05:08:31 2014 CET.