Domain: 54 computer science

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Year | Item Type
Jump to: 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1996
Number of items: 517.

2014

ter Maat, Roel (2014) A Framework for Modular Implementation of Domain-Specific Event-Based Applications.

Stijntjes, Ingo (2014) ASSESSMENT OF AUTOMATED CROWD BEHAVIOUR ANALYSIS BASED ON OPTICAL FLOW.

Meijer, J.J.G. (2014) Improving Reachability Analysis in Ltsmin - Guards, Read, Write and Copy Dependencies for mcrl2, Promela and Dve.

Kooij, W.J. (2014) Playout delay of TV broadcasting.

Hendriks, Luuk (2014) SSH Compromise Detection using NetFlow and IPFIX. Item availability restricted.

Van Nee, F.D. (2014) To a new hardware design methodology: A case study of the cochlea model.

Dijk, T.G. van (2014) Tuning the Parameters of a Loading Algorithm.

Aertsen, M.Y. (2014) Verifying functional requirements in multi-layer networks: a case for formal description of computer networks.

2013

Moll, René (2013) A DFT based synchronization scheme for chirped communication.

Olthuis, Ferry (2013) A comparison of state space reduction techniques in SCOOP.

Roemers, Arnout (2013) An adapter-aware, non-intrusive dependency injection framework for Java.

Hullu, Clermond de (2013) Architectural design of modular ESB systems.

Tesfay, Tesfahun Aregawy (2013) Automatic distribution analysis of business processes for cloud-based BPM.

Veen, G.F.P. van (2013) Brain Invaders - Finding the paradox of control in a p300-game through the use of distractions.

Beek, Daan van (2013) Comparing the LTSmin and NuSMV reachability tools via automatic translation of their respective input languages.

Wit, Jeroen de (2013) Continuous forensic readiness.

Ionita, Dan (2013) Current established risk assessment methodologies and tools.

Knoben, L. and Otten, M. and Fransen, R. (2013) De waterzuivering als Petrinet: het voorspellen van overstromingen.

Fluttert, Ernst (2013) Deciding between mobile implementation platforms - A multi-criteria decision system for implementation platforms for mobile applications.

Bullée, Jan-Willem (2013) Detection of leadership in informal (small) groups based on CCTV information.

Huijgen, Arris (2013) Effciently protecting virtualized desktop infrastructures against malware - Performance comparison between traditional- and centralized antivirus.

Schade, Christiaan Leonard (2013) FCScan: A new lightweight and effective approach for detecting malicious content in electronic documents.

Been, Henry (2013) Finding you on the Internet: Entity resolution on Twitter accounts and real world people.

Postema, B.F. (2013) Fluid survival tool: a model checker for Hybrid Petri nets.

Vonk, J. (2013) Formal specification and verification of OpenCL Kernel optimization.

Laarakkers, Mark (2013) Generating continuation passing style code for the co-op language.

Franssen, Tim K.C. (2013) Gesture recognition in streaming motion data using offline training with a limited training set.

Hemert, Teun van (2013) Implementing flexible, extensible composition operators.

Pasveer, Marco (2013) Importance sampling for probabilistic timed automata.

Duerink, Hendrik Lodewijk (2013) Information System Data Flow within Performance Based Logistics.

Pham, Giang T. (2013) Integration of IEC 61850 MMS and LTE to support smart metering communications.

Nguyen, A.D. (2013) Integration of IEC 61850 mms and lte to support remote control communications in electricity distribution grid.

Tijhuis, K. (2013) Methods for modelling unit operations in chemical process simulators.

Zarghami, S. (2013) Middleware for Internet of things.

Bruijn, Vincent de (2013) Model-based testing with graph grammers.

Oude Veldhuis, M. (2013) Multi-target user interface design and generation using model-driven engineering.

Kuipers, Elles (2013) Passend onderwijs via de elektronische leeromgeving promotie digitaal.

Misra, Gaurav (2013) Permeance of ICT in crime in India.

Keijl, Edwin (2013) Picalilly: sharing photos through locative social media.

Companjen, Ben (2013) Probabilistically matching author names to researchers.

Smits, Pieter (2013) Rationales for Modern ICT Implementation into Schools: a case of tablet PCs.

Ugen, Mattijs (2013) Scalable performance for a forensic database application.

Valtulina, Luca (2013) Seamless distributed mobility management(dmm) solution in cloud based lte systems.

Satria, Triadimas Arief (2013) Seamless service continuity in cloud based lte systems.

Wal, Jelmer ter (2013) Specification and verification of selected parts of the Java Collections Framework using JML* and KeY.

Steeneken, Anna (2013) Tablet Gebruik voor Activerende Leeractiviteiten: Een exploratieve case study binnen het Vlaams beroeps en technisch secundair onderwijs.

Saman Yan, Daian Geivid (2013) The effect of Testing and Feedback in Digital Game-based Learning.

Cornelissen, Richard (2013) Towards a methodology-growing framework.

Riet, M. van 't (2013) Trace-based debugging for advanced-dispatching programming languages.

Smulders, Edwin (2013) User Space Memory Analysis.

Hoekerd, P.G. (2013) Using existing software to build a virtual community for telemedicine.

Kolthof, Peter (2013) Vaardigheden van middelbare scholieren voor het selecteren van informatie op het internet.

Sepulveda Bradford, G.U. (2013) What happens when a robot favors someone?: how a museum-guide robot uses gaze behavior to address multiple persons while storytelling about art.

2012

Oostinga, Ruben (2012) A java bridge for LSTMIN.

Brugman, Ivo (2012) A multimodal interactive system for creative expressions.

Wevers, Lesley (2012) A persistent functional language for concurrent transaction processing.

Hobert, L.H.X. (2012) A study on platoon formations and reliable communication in vehicle platoons.

Teka, Abelneh Y. (2012) Analysis of indirect influence relations in goal-oriented requirements engineering.

Noppen, I. (2012) Assessing the benefits of spectrum sharing in wireless access networks.

Bruintjes, Harold (2012) Bridging GROOVE to the world using a conceptual language model.

Sburlea, Andreea Ioana (2012) Brighten up your mind! Effects of light priming and encouraging feedback on the neural and behavioral responses in a general knowledge task.

Alam, Ashiful (2012) Business information management and the cloud.

Kuperus, Jasper (2012) Catching criminals by chance: a probabilistic approach to named entity recognition using targeted feedback.

Verberkt, S.L.C. (2012) Claiming security properties in a service oriented architecture.

Hijmans, Remco (2012) Comparing grid-based features and classification settings, in an off-line supervised human action detection and recognition task.

Middag, Jacob (2012) Convergence of an implicit runge-kutta discontinuous Galerkin method using smooth limiters.

Wagenaar, P. (2012) Detecting botnets using file system indicators.

Gerritsen, Jan-Henk (2012) Detecting synchronization conflicts for horizontally decentralized relational databases.

Stoica, Mircea (2012) Detecting the no-control state in self-paced Brain-Computer Interfaces.

Zanderink, Arnold (2012) Drum assistant.

Brandon, Merel (2012) Effect personality matching on robot acceptance : effect of robot-user personality matching on the acceptance of domestic assistant robots for elderly.

Wicaksono, Sulistyo Unggul (2012) Enterprise knowledge : reference architecture for visualization and prototype implementation using Wiki.

Terwellen, Christian (2012) Evaluating the behavior of embedded control software - using a modular software-in-the-loop simulation environment and a domain specific modeling language for plant modeling.

Stapersma, Paul (2012) E�cient query evaluation on probabilistic XML data : derived from a glue process with skeleton & flesh.

Brands, E.H.T.B. (2012) Flow-based monitoring of GTP traffic in cellular networks.

Ottow, Christiaan (2012) Hacking the next web: penetration testing over IPv6.

Donker, J.H. (2012) Handfish - tunable heterogenous multi-core simulators on multi-core hosts.

Loch, Frieder (2012) Hierarchical gestures: ggestural shortcuts for touchscreen devices.

Groot, R.E.J. (2012) IT-based risks in advergame campaigns : a focus on fairness and privacy.

Jansen, M. (2012) Improving inattentive operation of peripheral touch controls.

Spijker, Hanno (2012) Improving information dissemination in sparse vehicular networks by adding satellite communication.

Kalsbeek, Maarten van (2012) Interface and interaction design patterns for e-commerce checkouts.

Hoeve, Thijs ten (2012) Model based testing of a PLC based interlocking system.

Wu, Xian (2012) Modeling and performance evaluation of wirelesshart.

Bamberg, Rob (2012) Non-deterministic generalised stochastic petri nets modelling and analysis.

Jonkman, F. (2012) Nonverbal behaviour of an embodied storyteller.

Epskamp, S.G. (2012) On the influence of stereographic 3D on user dependent direct projected augmented reality in the OR.

Zandberg, Martin (2012) Optimization of aspect-instantiation strategies in the JIT-compiler.

Burgman, Ronald (2012) Partial-order reduction based on probe sets.

Scheerens, Daan (2012) Practical indoor localization using bluetooth.

Heukels, Rolf (2012) Predicting user behavior using transition probability.

Schot, N. (2012) QoS-aware model-driven SOA using SoaML.

Stokkink, Gerjan (2012) Quiescent transition systems.

Broek, Jurgen Gijs van den (2012) Real-world analyses of internet protocols.

Siaw, Tien Loong (2012) Saturation for LTSmin.

Hofste, J. (2012) Scalable identity extraction and ranking in Tracks Inspector.

Heijden, Rens W. van der (2012) SeDyA: secure dynamic aggregation in VANETs.

Beusink, J.W.C. (2012) Secure access contol to personal sensor information in federations of personal networks.

Huang, Liting (2012) Secure and privacy-preserving broadcast authentication for IVC.

Mols, Emiel (2012) Sharding Spotify search.

Biggelaar, M.E.C. van den (2012) Social media in het middelbaar beroepsonderwijs? Kansen en belemmeringen van social media voor het taal- en rekenonderwijs in het middelbaar beroepsonderwijs.

Gehring, Felix (2012) Software performance prediction in early development phases: A UML- and simulation-based approach.

Liu, Peng (2012) Test bed and sensor platform for building usage profiling.

Alofs, Thijs (2012) The Interactive Storyteller A multi-user tabletop board game interface to support social interaction in AI-based interactive storytelling.

Dijk, Tom van (2012) The parallelization of binary decision diagram operations for model checking.

Vermolen, R.M. (2012) The red queen’s race: from delivery stories to effort estimation: an empirical study.

Wieringa, Wilko (2012) User Handover in a Cross Media Device Environment, A Coaching Service for Physical Activity.

Chen, Zhen (2012) Workflow management solution for a security management application.

Keuper, D. (2012) XNU: a security evaluation.

Stemmer, Joel (2012) detecting outliers in web-based network traffic.

2011

Bosems, Steven (2011) A Performance Analysis of Model Transformations and Tools.

Goos, Sander (2011) A model driven approach to modernizing legacy information systems.

Dam, Franciscus Jozua van (2011) A stripline antenna for radiated immunity testng.

Ham, Wim van der (2011) An Appraisal Based Model of A�ect for a Negotiating Agent.

Camacho Camacho, José Manuel (2011) Assembler a bgp-compatible multipath inter-domain routing protocol.

Nijenhuis, C.F. (2011) Automatic generation of graphical domain ontology editors.

Kanis, Zwier (2011) Classification of Semantically Coherent Segments in Web Pages.

Noltes, Johan (2011) Data location compliance in cloud computing.

Nouta, Christiaan Alexander (2011) Data processing networks made easy : improving development possibilities for people with limited computer science knowledge.

Oude Maatman, Ruud (2011) Design and evaluate a deployment process for the ES benefits management method.

Bruintjes, Tom M. (2011) Design of a Fused Multiply-Add Floating-Point and Integer Datapath.

Delden, R.W. van (2011) Design of therapeutic TagTile games for children with unilateral spastic cerebral paresis.

Dalen, J.J.M. van (2011) Designing a tool for norm interventions in IT strategy projects.

Warmer, Martin (2011) Detection of web based command & control channels.

Wanders, Brend (2011) Exploring signalling pathways as a serious game.

Peng, Yuxi (2011) Face Recognition at a Distance: a study of super resolution.

Wiekens, Adri (2011) Feedback presentation for physical activity coaching: by an embodied conversational agent or by a simple e-mail?

Brinke, Steven te (2011) First-order function dispatch in a Java-like programming language.

Boer Rookhuiszen, Roan (2011) Generation of German narrative probability exercises.

Fritz, Jako (2011) Hybrid Intrusion detection network monitoring with honeypots.

Hakvoort, Gido (2011) Immersion and affect in a brain-computer interface game.

Jeeninga, Jesper (2011) Improving communication between computer programmers and domain experts : creating a generic scenario description language to aid the process of describing scenarios for emergency response training simulators.

Adolfsen, Martijn (2011) Industrial validation of test coverage quality.

Hegeman, Erik (2011) InfoSupport - On the Quality of Quality Models.

Ende, Frederik van den (2011) Interference Nulling via a Resistor-Weighted Op-Amp Vector Modulator.

Bergervoet, Erwin Josephus (2011) Let the game do the talking : the influence of explicitness and game behavior on comprehension in an educational computer game.

Schutte, Rik (2011) Maintaining the causal thread of execution in distributed and multilanguage software.

Dekens, Berend (2011) Mapping of a DAB Radio Decoder to Homogeneous Multi-Core SoC : a case study to evaluate a NLP based mapping flow.

Grisel, I.G.J. (2011) Multimodal user interface for robotized flexible endoscopy.

Jong, Maurits D. de (2011) Network Management in a Distributed System.

Kortüm, Michael (2011) Non-invasive imaging with UWB.

Meijer, Michael (2011) On a Design Space for Aggregating over Sliding Windows on a Stream.

Pater, Elwin (2011) Partial Order Reduction for PINS.

Sluijsmans, Dennis (2011) Performance Evaluation of Data Dissemination Protocols for an Infrastructure-to-Vehicle Cooperative Traffic Light Application.

Klifman, T.E. (2011) Propagation of Annotations in a Streaming Context.

Rajput, Abdul Ghani (2011) Properties Relevant for Inferring Provenance.

Op 't Land, Sjoerd (2011) Ranging and localisation error mitigation in indoor obstructed direct path conditions.

Veen, Dirk van (2011) Secure searching through encrypted data - Creating an efficient Hidden Vector Encryption construction using Inner Product Encryption.

Lastdrager, Elmer (2011) Securing Patient Information in Medical Databases.

Obbink, Michel (2011) Social interaction in a cooperative brain-computer interface game.

Schot, Vincent (2011) Social norms to motivate IT use.

Wal, Tjalling van der (2011) Streaming workflow transformation.

Posthumus, Wytse Jan (2011) The situated cognitive engineering tool.

Hassani, A.Z. (2011) Touch versus in-air Hand Gestures: Evaluating the acceptance by seniors of Human-Robot Interaction using Microsoft Kinect.

Visser, Thomas (2011) Toward a model for incremental grounding in dialogue systems.

Harleman, T. (2011) Towards a generic model for audit trails.

Ottenhof, Robbert H.J. (2011) Towards automated truancy detection.

Eerenberg, E. (2011) Towards distributed information retrieval based on economic models.

Hu, Danchao (2011) Using actor-network theory to understand inter-organizational network aspects for strategic information systems planning.

2010

Wester, Rinse (2010) A dataflow architecture for beamforming operations.

Diephuis, Maurits (2010) A framework for robust forensic image identification.

Stuurman, Gijs (2010) Action semantics applied to model driven engineering.

Admiraal, A.J. (2010) Automated ANTLR tree walker generation.

Hartholt, Woutske (2010) Beslissingsondersteuning voor het aanpassen van de online OK-planning.

Qiu, Xian (2010) Bin packing games.

Hove, D. ten (2010) Change management within SysML requirements models.

Kok, Guido (2010) Cloud computing & confidentiality.

Voorst, B. van (2010) Cluster-based collection selection in uncooperative distributed information retrieval.

Teijgeler, Stefan (2010) Connecting GROOVE to the world using XMI.

Costa, Alvise (2010) Context - Free - Language Parser for Advanced Network Intrusion Detection.

Ugryumova, D. (2010) Control design for a chemical disinfection process using the residence time distribution.

Baardman, Roel (2010) Cumulus Humilis : wireless mesh-networking for gliders.

Jochems, Bart (2010) Detecting emotional intensity peaks in narrative conversational settings.

Yin, Haihan (2010) Developing a generic debugger for advanced-dispatching languages.

Palsma, T. (2010) Discovering groups using short messages from social network profiles : using hierarchically organized concepts to discover relations.

Kant, Gijs (2010) Distributed state space generation for graphs up to isomorphism.

Kroes, S. (2010) Domain specific embedded languages and model driven engineering.

Hollander, Emiel (2010) Dynamic access control.

Bijker, Remko (2010) Efficient pointcut projection.

Bukhsh, Faiza Allah (2010) Enhanced ICoNos maturity model.

Moel, E.L. de (2010) Expanding the usability of recorded lectures : a new age in teaching and classroom instruction.

Lansink, M. (2010) Hair simulation and rendering.

Franssens, Anne (2010) Impact of multiple inquires on the bluetooth discovery process : and its application to localization.

Brugge, Jonathan (2010) Implementing and simulating the cross-entropy ant system.

Sijtema, Marten (2010) Managing variability in model transformations for model-driven product lines : extending the ATL model transformation language with variability management capabilities.

Khadka, Ravi (2010) Model-driven development of service compositions : transformation from service choreography to service orchestrations.

Bouwhuis, Wilco (2010) Modelleren van de Neocortex : analyse en simulatie op grote schaal.

Feng, Yuan (2010) Modified potential approach to efficient, linear and symmetric values for TU-games.

Punter, C.M. (2010) Multi-source entity resolution.

Lavooij, K. (2010) Near-real time statistics gathered from a continuous and voluminous data mutation stream.

Hoeksma, Ruben (2010) Price of anarchy for machine scheduling games with sum of completion times objective.

Lange, R-J. de (2010) Provenance aware sensor networks for real-time data analysis.

Zanden, Guido van der (2010) Quality assessment of medical health records using information extraction.

Telgen, M.G. (2010) Realistic route choice modeling.

Paul, Ronald (2010) Realization and high level specification of facial expressions for embodied agents.

Slomp, G.H. (2010) Reducing UPPAAL models through control flow analysis.

Ahmed, F. (2010) Relations between semidefinite, copositive, semi-infinite and integer programming.

Alemneh, E. (2010) Sharing nonlinear gates in the presence of glitches.

Hartog, M.R. den (2010) Shunt planning : an integral approach of matching, parking and routing.

Horst, Arie (2010) Sport coach : online activity using wireless sensor network.

Peterson, R.S. (2010) Testing real-time requirements for integrated systems.

Valk, J.J. van der (2010) The in uence of a target motion model on the exact Bayesian filter recursion; research by particle filtering.

Sikkens, B. (2010) The storage and retrieval of sensor data and its annotations.

Spijkerman, Wietze (2010) Tool support for change impact analysis in requirement models : exploiting semantics of requirement relations as traceabilitt relations.

Bragt, Jasper (2010) Towards believable characters in the virtual storyteller.

Bakker, P.J. (2010) Train composition using motion as a common context.

Vlieg, Edwin (2010) Usage patterns for user-centric service composition.

Ganzeboom, Mario S. (2010) User-independent recognition of dynamic hand gestures using a dataglove.

Schwartzenberg, J. (2010) Using machine learning techniques for advanced passive operating system fingerprinting.

Pothoven, Tristan (2010) Workflow usage in the healthcare environment.

2009

Schippers, Jorrit (2009) A massively scalable architecture for instant messaging & presence.

Meij, D.P.L. van der (2009) A metamodeling approach to incremental model changes.

Oostrum, A. van (2009) A model and specification for development of enterprise application frameworks.

Balen , J. van (2009) A virtual billiard assistant.

Laar, B. v.d. (2009) Actual and imagined movement in BCI gaming.

Lucassen, T. (2009) Adaptive support of human attention allocation using cognitive models.

Laarman, A. (2009) An Ontology-Based Metalanguage with Explicit Instantiation.

Brand, A. (2009) An investigation in qualities of software variability.

Rietema, Richard (2009) Automatic Verification and Analysis of Test Results of Océ Printers.

Meijerink, Roland (2009) Begrip in kaart: Hoe kan het gebruik van begrippenkaarten het begrip van leerlingen in 3VWO op het gebied van optica verbeteren?

Houtman, J. (2009) Bringing scalability/failover to a complex producer/consumer implementation.

Klaassen, R. (2009) COPD home interaction device.

Bockting, S. (2009) Collection selection for distributed web search : using highly discriminative keys, query-driven indexing and ColRank.

Kingma, J. (2009) Combined VCO/Mixer for satellite receiver in CMOS.

Rombouts, Wolf (2009) Context-Concept chemie en van Hiele's abstractieniveaus.

Baaij, C. (2009) CλasH : from Haskell to hardware.

Blom, Koen (2009) DVB-S signal tracking techniques for mobile hased arrays.

Oosting, W.M.H. (2009) Design and evaluation of a community of practice to support IT implementation/migration processes : a case study about the design of a CoP within the Suite4Basisgegevens migration.

Rubio Paniza, E. (2009) Design and evaluation of an MSP-based body area network management architecture using JMX.

Vliek, G. (2009) Detecting spam machines, a netflow-data based approach.

Meertens, Lucas O. (2009) EPC to BPEL transformations.

Domburg, R.S.A. van (2009) Empirical evaluation of change impact predictions using a requirements management tool with formal relation types : a quasi-experiment.

Tariq, T. (2009) Extending CACI : implementing support functions for the context producer and designing a security Framework.

Boot, L. (2009) Facial expressions in EEG/EMG recordings.

Asuncion, C.H. (2009) Goal-driven service mediation solution.

Kooijman, M. (2009) Haskell as a higher order structural hardware description language.

Hagen, Gijs (2009) Het schrijven van een nieuw werkboek: hoofdstuk elektriciteit. 2e klas Havo/VWO.

Looman, S.A.M. (2009) Impact Analysis of Changes in Functional Requirements in the Behavioral View of Software Architectures.

Hong, L. (2009) Implementation and tuning of optical singlesideband modulation in ring resonator-based optical beam forming systems for phased-array receive antennas.

Sulistyo, Pythia (2009) Inter-Organizational Strategic Information Systems Planning (IOSISP) in Network Perspective: How Network Governance Influences IOSISP Effectiveness Evaluation of Healthcare, Government and logistic/Transport Industry Sectors in the Netherlands.

Bos, W.J. (2009) Interactive signaling network analysis tool.

Kroon, E. (2009) Layered configuration management for software product lines.

Veldman, I. (2009) Matching profiles from social network sites : similarity calculations with social network support.

Westmijze, M. (2009) Memory optimizations on the sequential hardware-in-the-loop simulator.

Everse, Wouter M. (2009) Modelling and Verification of a Shortest Path Tree Protocol for Wireless Sensor Networks : Towards a Platform for Formal Veri�cation Experiments.

Galen, J. van (2009) Modelling, simulation and impelementation of an optical beam forming network control software system.

Logtenberg, Jeroen (2009) Multi-user interaction with molecular visualizations on a multi-touch table.

Diepenmaat, J. (2009) Object XML mappings.

Barbosa, Rafael Ramos Regis (2009) On Access Network Identification and Characterization.

Akker, H. op den (2009) On adressee prediction for remote hybrid meeting settings or how to use multiple modalities in predicting whether or not you are being addressed in a live hybrid meeting environment.

Weele, J.H.D. ter (2009) Onderzoek naar de gebruikersvriendelijkheid van boekingsformulieren.

Wolterink, T.J.L. (2009) Operational Semantics Applied to Model Driven Engineering.

Garcia Garcia, A. (2009) Optical phase synchronization in coherent optical beamformers for phased array receive antennas.

Schouten, J.H. (2009) Optimisation of packet scheduling in wireless networks.

Mutter, T. (2009) Partition-based network load balanced routing in large scale multi-sink wireless Sensor Networks.

Muis, Allard (2009) Patterns in data conversion.

Vrielink, Jasper D. (2009) Phased array processing: direction of arrival estimation on reconfigurable hardware.

Jeckmans, A.J.P. (2009) Practical Client Puzzle from Repeated Squaring.

Nouwens, I.C.C. (2009) Predicting dialogue state transitions using prosodic markers: Exploring AMI Corpus backchannels.

Ooms, Matthijs (2009) Provenance management in practice.

Perk, Anno (2009) Reflection in large IT Projects : a method for project success focussing on soft factors.

Koelewijn, J.W. (2009) Resource operations model in a dynamic world.

Tjink-Kam-Jet, Kien-Tsoi T.E. (2009) Result merging for efficient distributed information retrieval.

Braak, Timon D. ter (2009) Run-time spatial resource management in heterogeneous MPSoCs.

Roodenburg, S.B. (2009) Scheduling the sequential hardware-in-the-loop simulator.

Tijmes, M. (2009) Simulation of a ring resonator-based optical beamformer system for phased-array receive antennas.

Chauhan, P. (2009) Study the impact of smile and tail dependence on the prices of European style bivariate equity and interest rate derivatives using Copulas and UVDD model.

Satink, Laurens (2009) The adaptive presentation assistant using grammar-based recognition to support the process of presenting.

Kok, I. de (2009) The influence of videoconferencing and an emotional feedback support system on polyadic negotiations.

Schot, Jurgen (2009) The privacy governance framework : effectively dealing with privacy legislation. Item availability restricted.

Veldhuis, J.W. (2009) Tool support for a metamodeling approach for reasoning about requirements.

Vries, E. de (2009) Touchscreen interaction for healthcare applications.

Span, Ruben (2009) Towards an enterprise performance management solution : a method to design and implement enterprise performance management.

Graaff, V. de (2009) Towards distributed information access : possibilities and implementation.

Poortema, Anne (2009) Training clients using e-learning : developing an e-learning model for an international software vendor.

Nijkamp, Barry (2009) Using functional design patterns to improve exports to management information systems.

Stolp, D.G.A. (2009) Using ontology mapping to automate derivation of transformations for data integration.

Rutgers, Jochem (2009) VHDL voor het voortgezet onderwijs: Een nieuwe lesmodule over hardware voor informatica.

Hagendoorn, B. (2009) Viscous coupling between bio-inspired hair-sensors.

Tommassen, P. (2009) Wacky Pirate Hijinks : causing and resolving conflict between autonomous agents in a virtual storyworld.

Kuperus, Johan (2009) Wave monitoring using wireless sensor nodes.

2008

Ho, Yoeng Woey (2008) .NET integration TEAHA.

Klein Wolterink, W. (2008) A content-based routing protocol for mobile ad-hoc networks using a distributed connected k-Hop dominating set as a backbone.

Bloem, R.J.G. van (2008) A data transformation walkthrough.

Henzen, S.F. (2008) A framework for service-oriented extensions to Ruby on Rails.

Lonnee, J. (2008) A scalable repository based on a meta-modelling architecture.

Oostrum, A.R. (2008) A service register as an information intermediary : towards a structured design approach for service registers.

Hogt, N.A. (2008) Aanbevelingen voor een architectuur voor het regionale zorgsysteem.

Habib, Mena Badieh (2008) An intelligent system for automated arabic text categorization.

Bezemer, Maarten (2008) Analysing gCSP models using runtime and model analysis algorithms.

Franssens, Anne (2008) Analysis of Reed Solomon error correcting codes on reconfigurable hardware.

Haanstra, Sander (2008) Analyzing and improving generalization over time in CSP-based Brain-Computer Interfaces.

Nijmeijer, Tom (2008) Automatic classification of television commercials.

Tigelaar, Almer S. (2008) Automatic discussion summarization : a study of Internet fora.

Jevring, Markus (2008) Automatic management of bluetooth networks for indoor localization.

Oude Bos, Danny (2008) BrainBasher : a multi-modal BCI game for research and demonstration.

Pasch, M. (2008) Bye-bye couch potato : body movement in the gaming experience.

Oever, Daniel van 't (2008) CoNSoLe: A Domain Specific Language for Network Services.

Boros, H. (2008) Context Discovery Adapter (CDA) Protocol.

Klooster, J-W. van 't (2008) Context, design and implementation of a control system for ring resonator-based optical beam forming networks.

Nijssen, Bobby J.W. (2008) Cooperative Intelligent Transportation Systems Building a demonstrator for the CVIS-project on the Informatieve Weg.

Schabbink, Johan (2008) Design of a capacitive based closed-loop displacement sensor.

Mahrof, Dlovan Hoshiar (2008) Design of a fully integrated RF transceiver using noise modulation.

Twelkemeijer, R. (2008) Design of an audio power amplifier with a notch in the output impedance.

Steen, H. van der (2008) Design of animation and debug facilities for gCSP.

Griffioen, H.T. (2008) Design of clock cleaner : a fast locking PLL.

Lootsma, Marten (2008) Design of the global software structure and controller framework for the 3TU soccer robot.

Roolvink, S. (2008) Detecting attacks involving DNS servers : a netflow data based approach.

Lopez, J.M. (2008) Dynamic service composition in an innovative communication environment.

Wijngaarden, Pieter van (2008) Error tolerance analysis of the Telefónica de España optical fibre network.

Timmer, M. (2008) Evaluating and predicting actual test coverage.

Wit, Joost de (2008) Evaluating recommender systems : an evaluation framework to predict user satisfaction for recommender systems in an electronic programme guide context.

Melissen, Arthur (2008) Exploring neglected avenues in the modelling of attribution theory.

Munsterman, Thijs Pieter (2008) Exploring software scalability : and a method for evaluating and improving software scalability.

Kruiskamp, Michel (2008) FastSOA : achieving high-performance service oriented architectures.

Bosch, Stephan (2008) FollowMe! : distributed movement coordination in wireless sensor and actuator networks.

Dam, Arjan (2008) Geographic routing in wireless sensor networks for surveillance : introducing a novel routing algorithm: GZOR.

Babakhani, Bayan (2008) Implementation of a 2D master-slave system.

Sealy, Timothy (2008) Implementation of aggregation based Resource Management in DiffServ (RMD) Quality of Service Model (QOSM).

Blumink, Remco (2008) Implementing and communicating with SHILS.

Vries, A.J.K. de (2008) Improving reliability of streaming radio. Item availability restricted.

Gaiser, Vincent Alexander (2008) Improving spatial awareness in an indoor environment with wireless positioning technology.

Oude Alink, M.S. (2008) Increasing the spurious-free dynamic range of an integrated spectrum analyzer.

Velner, J. (2008) Integrated state-of-charge circuit for rechargeable batteries.

Looise, M.J. (2008) Inter-level consistency checking between requirements and design artefacts.

Berg, Ruben van den (2008) Interaction capabilities of Second Life : a framework to determine Second Life's suitability for a 3D virtual world application.

Vos, Geert (2008) Issues of iterative mda-bades software development processes.

Brink, Tim van den (2008) Ketenarchitectuur : succes- en faalfactoren bij de invoering van het digitaal klantdossier.

Kaijen, J.A.H. (2008) Management of risk & information security data. Item availability restricted.

Scholte, Theodoor (2008) Managing continuous uncertain data by a probabilistic XML database management system.

Engelsman, W. (2008) Method for requirements management and modeling.

Linders, Stefan (2008) Opportunities and limitations of using SOA concepts and technologies for building BI applications : a Delphi study.

Gils, F.M.D.M. van (2008) PodVinder : spoken document retrieval for Dutch pod- and vodcasts.

Fournier, Bas (2008) Preprocessing on bilingual data for Statistical Machine Translation.

Eenennaam, E.M. van (2008) Providing over-the-horizon awareness to driver support systems by means of multi-hop ad hoc vehicle -to-vehicle communication.

Kessel, Ruud van (2008) Querying Probabilistic XML.

Brinkman, E. (2008) Recognition of the emotion in abstract expressionistic paintings using a machine learning approach.

Houwelingen, Jan Willem van (2008) Relevance and usability of enterprise architectures during post merger IT integrations.

Damman, B. (2008) Representing PCTL counterexamples.

Broekhuizen, V.P. (2008) Security for EPC discovery services. Item availability restricted.

Uithol, Michiel (2008) Security in domain-driven design.

Driezen, Wouter (2008) Service-oriented and open-source software as potential markets for applications markets : analysis of the possible added value of Capgemini outsourcing's Dutch applications management service center.

Jongeling, R. (2008) Signature modification for Compose?/.NET : implications of signature modification for generic compilers and behavioral signatures of types.

Idserda, K. (2008) Simultaneous binding proxy mobile IPv6.

Gerards, M. (2008) Streaming reduction circuit for sparse matrix vector multiplication in FPGAs.

Werf, R.J. van der (2008) The Embodied Conversational Agent Toolkit : a new modularization approach.

Jonge, Marc de (2008) The SpinJ model checker : a fast, extensible, object-oriented model checker.

Bloem, E.J.W. van (2008) The user oriented knowledge management method : a knowledge management method for a small organization with a distributed environment.

Deddens, M.K. (2008) Toepasbaar risicomanagement in software ontwikkelingsprojecten : ontwerp en toepassing van een risicomanagementmethode voor software ontwikkelingsprojecten binnen Centric IT Solutions.

Meppelink, Lianne (2008) Towards interoperability between existing VoIP systems.

Es, Frank J. van (2008) Type inference for graph transformation systems.

Jonker, J. (2008) Wizard of Oz for gesture prototyping.

Schilpzand, M.P. (2008) X-Stream in MaDAM : new junction modelling in macroscopic dynamic traffic assignment models.

Daemen, P. (2008) ZMP based control in 3D passive dynamic walking.

2007

Rozen, Riemer van (2007) A Debugging Framework for NIPS.

Oijen, Joost van (2007) A Framework to support the influence of culture on nonverbal behavior generation in Embodied Conversational Agents.

Stellinga, Anne (2007) A low-power second-order sampling receiver for Bluetooth.

Pot, Wouter (2007) A machine learning approach for generating expressive musical transcriptions.

Doorn, Gerrit Hendrikus van (2007) Accelerated playback of meeting recordings.

Kernkamp, Reinier (2007) Alignment of Requirements & Architectural Design In a Blended Delivery Model.

Dijk, Michel van (2007) Analysis and control of nonlinear oscillators.

Gribnau, Erwin (2007) Analysis, design & implementation of a high-performance main-memory object database for Splice2.

Franken, Michel (2007) Ankle actuation for planar bipedal robots.

Maatjes, N.C. (2007) Automated transformations from ECA rules to Jess.

Putten, Ing. A.E. van (2007) Behavioural hybrid process calculus translation to modelica.

Herms, K.G.F. (2007) Body pose tracking in the Watching Window : a system that tracks both hands in a virtual reality environment.

Penning, M.P.J. (2007) Boosting LUCK: Improving the language understanding capabilities of Kaitito.

Huisman, Rolf (2007) Bugspray for composition filters.

Veelen, P. van (2007) Clustered acoustic modelling in speech recognition.

Tuin, Vincent van der (2007) Computer-Aided Security Surveillance : design of the Quo Vadis Object Tracker.

Oostveen, Laurens van (2007) Conductivity gradient focusing by pervaporationand osmosis-induced fluxes.

Bouwmeester, Egbert (2007) Continuous Classes of Power Amplifiers.

Versloot, Corne (2007) Cross-document named entity coreference resolution for Dutch as a pre-process for named entity based text mining.

Verdonkschot, S.F.G. (2007) Design and implementation of a trusted RFID reader.

Bergen, Marcel van (2007) Design and prototyping of a human-computer interface for a desktop tele-classroom conference application.

Kooistra, Cornelis (2007) Design and testing of embedded control software for the ViewCorrect Plotter.

Leong, Frank (2007) Design of an oscillator for satellite reception.

Witteman, M.T. (2007) Efficient proximity detection among mobile clients using the GSM network.

Ambrosius, R.B.P. (2007) Elektronische leeromgeving met gebarentaalherkenning : Grafische user interface oplossingen voor ambigu¨ıteitproblemen van een gebarentaalherkenner voor een elektronische leeromgeving voor dove en slechthorende kleuters.

Kock, Arien S. (2007) Enhancing Synthetic Speech with Filled Pauses.

Poulisse, Gert-Jan (2007) Exploiting inter-conceptual relationships to boost SVM classification.

Nijdam, N.A. (2007) Facial rendering.

Prins, Martin (2007) Fast retransmission for multicast IPTV.

Molderink, Albert (2007) Feasibility Analysis of MPEG decoding on reconfigurable hardware.

Reuderink, Boris (2007) Fusion for Audio-Visual Laughter Detection.

Wijgerse, Steven (2007) Generating realistic city boundaries using two-dimensional Perlin noise.

Sombekke, N.B.H. (2007) Graph-Based Semantics of the .NET Intermediate Language.

Krijnen, Bram (2007) Heat flow modeling in copiers.

Sierhuis, Pim (2007) Het voorkomen van prestatieverlies bij de koppeling met Web services: ... en de rol van standaardisatie daarbij.

Siles Del Castillo, Hugo (2007) Hybrid Content-Based Collaborative-Filtering Music Recommendations.

Derwort, Selmer (2007) IT governance: de doelen en de middelen: In kaart brengen van IT governance in theorie en praktijk.

Roes, J.B.M. (2007) Identifying and solving overlap between messaging standards with the help of domain models, illustrated with HR-XML’s SIDES and SEP.

Baesjou, Bertrand (2007) Improving dependability of OSS access to a hierarchical distributed ad-hoc NMS.

Bosman, Yoran Maxim (2007) Incorporating Functional Design Patterns In Software Development.

Koster, J. (2007) Influencing tabletop interaction speed: directness and device. Item availability restricted.

Kosters, Dennis (2007) Invloed van slimme meters op de energiebalans: Een analyse van de invloed van het slimme meter systeem op een netbeheerder en zijn ondersteunende IT, binnen het kader van de energiebalans.

Heuts, R.P. (2007) Mobile interface design for dynamic environments.

Kuppeveld, Teun van (2007) Model-based redesign of a self-balancing scooter.

Vervuurt, Mark (2007) Modeling business process variability : a search for innovative solutions to business process variability modeling problems.

Ambrosius, Frank (2007) Modelling and distributed controller design of the bodeRC paper-path setup.

Kuperus, J.H. (2007) Nested quantification in graph transformation rules.

Odijk, M. (2007) Novel sensor structures for enhanced redox cycling.

Reede, Joost (2007) On A-Select and Federated Identity Management Systems.

Vlasveld, J. (2007) On context in context-aware ICT applications.

Atketin, Namik (2007) Ontwikkeling van een interactieve model-gedreven E-formulier generator.

Nguyen, V.Y. (2007) Optimising techniques for model checkers.

Nguyen, Viet Yen (2007) Optimising techniques for model checkers.

Os, Roel van (2007) Optimizing XML information retrieval query execution at the physical level.

Jansen, Lisette (2007) Panze: A Multimodal Preschool Music Education System.

Tuijn, Jasper Aartse (2007) Partial session mobility in context aware IP-based multimedia subsystem.

Olthof, Mark (2007) Performance & Scalability of a Spatial Database in a GIS-Web Service Environment.

Portengen, Rik (2007) Phased array antenna processing on reconfigurable hardware.

Spenkelink, Roy David (2007) Porting Compose* to the Java Platform.

Hegge, Stephan (2007) Predicting end-to-end network characteristics on mobile devices.

Oldenkamp, H.A. (2007) Probabilistic model checking : a comparison of tools.

Ooms, Wendy (2007) Providing AAA with the Diameter protocol for multi-domain interacting services.

Sambeek, M. van (2007) Real-time shadow generation for 3D simulations using modern hardware.

Smulders, Bram (2007) SQLbusRT : real time data distribution and storage.

Kooijman, Ruben (2007) See, hear, listen : head movements and the sensitive artificial listener.

Staal, Eric (2007) Simulation with Hamiltonian mechanics : creating a module for 20-sim.

Veen, Marcel van der (2007) Sparse matrix vector multiplication on a field programmable gate array.

Zwerus, Robert (2007) Storing Personal Information Management data: Akonadi - unifying PIM data for KDE.

Hoogsteder, V.J.M. (2007) Strategic performance measurement for eBuddy.

Heddema, R.R. (2007) Strategy for a robot soccer team - Let’s play robot soccer -.

Fountain, Stefan J. (2007) Success prediction induction framework : success models for online applications, introducing network effects and trust constructs.

Ordelmans, L. (2007) The Creation of a Flexible, Functional Simulation Generator for the Montium Tile Processor.

Papegaaij, E. (2007) The Tree Processing Language: Defining the structure and behaviour of a tree.

Scholten, F.B. (2007) The concern-oriented software architecture analysis method.

Kok, J. (2007) The design of a Delta Impact analysis model for data warehouses.

Tinselboer, Koen (2007) The use of rare key indexing for distributed web search.

Elling, Erwin (2007) Tools for fun and fruitful meetings. : “Don’t let meetings make you go bananas!”.

Roo, A.J. de (2007) Towards more robust advice : message flow analysis for composition Filters and its Application.

Klaver, Ruud (2007) Using NSIS (Next Steps in Signaling) for support of QoS aware multimedia services.

Kosters, T. (2007) Van gasbel naar gasstel : een onderzoek naar de inrichting van de shipper op de gasmarkt.

Baalman, Philippus (2007) Van mono naar multi: een automatische VJ.

Kalter, Stefan Reijmer (2007) Vertical collaboration in open source business.

Buurman, H.A. (2007) Virtual Storytelling: Emotions for the narrator.

2006

Broekhuijsen, Jeroen (2006) 2D Upper Body Pose Estimation from Monocular Images.

Wasbeek, Edwin van (2006) A repository for the management of artifacts in system engineering.

Sikkes, Bart (2006) A stable matching based adaptive subcarrier assignment method for multimodal fibre access networks.

Doornenbal, Ing. Dirk (2006) Analysis and redesign of the compose*language.

Nguyen, H.Q. (2006) Analysis of crosscutting concerns in QVT-based model transformations.

Noordhuizen, Paul (2006) Analyzing aspects in production : plans for software product lines.

Winkel, J.D. te (2006) Applying Composition Filters to C.

Linnenbank, Tristan (2006) Architectural Principles for Large Scale Web sites: a Case Study.

Hulswit, D.R. (2006) Automatic interpretation of Nijntje-images.

Buth, Maarten Dimmen (2006) Ball-handling motion control for soccer playing mini-robots.

Kemna, Tim (2006) Bisimulation minimisation and probabilistic model checking.

Tetteroo, Arend-Jan (2006) Bomb-Proof Server : benodigde technieken en producten voor een high availability systeem en hun consequenties voor beschikbaarheid.

Schrijver, Bert Jan (2006) Classificeren met vertrouwen : contextgevoelige tekstclassificatie met betrouwbaarheidsindicatie.

Koop, O.R. (2006) Continuous and discontinuous Galerkin finite element methods of variational Boussinesq water-wave models.

Stehouwer, J.H. (2006) Cue phrase selection methods for textual classification problems.

Veldhuijsen, Gerald van (2006) DICOM Image Retrieval.

Linthorst, Henk-Jan (2006) De mogelijkheden van ICT in het effectiever en efficiënter functioneren van de diabetesketen.

Berens, Menno (2006) De tevredenheid over shared service centers in de publieke sector : het succes van shared service centers en de oorzaken daarvan in de inrichting en het functioneren van de klant-leverancierrelatie.

Groot, Paul de (2006) Enhancing the performance and testability of the MI20 robot soccer system.

Dijk, J.J. van (2006) Entiteitreconciliatie ondanks beperkte overlap door middel van objectgelijkheid : casus ¿Koppelen van persoonsgegevens zonder een gemeenschappelijke identificatie¿.

Speelziek, M.D. (2006) Evaluating rapide using the FRODO service discovery protocol.

Conradi, Olaf (2006) Fine-grained Join Point Model in Compose.

Rovers, Kenneth C. (2006) Front-end research for a low-cost spectrum analyser : receiver system and topology study.

Hassink, N. and Schopman, M.G. (2006) Gesture recognition in a meeting environment.

Derks, Theo (2006) Health at home. Item availability restricted.

Spenkelink, Dennis (2006) Incremental Compilation in Compose*.

Rorije, R.J. (2006) Input/output in functional languages : using algebraic uniontTypes.

Bos, Pieter (2006) Interacting with a virtual conductor.

Steen, J.L.P.J. van der (2006) Investigation of the band gap widening effect in thin silicon double gate MOSFETs.

Boorsma, Simon (2006) Ketenintegratie van het intermediaire distributiekanaal in de verzekeringsbranche : huidige ontwikkelingen in de verzekeringsbranche en de mogelijkheden voor Zevenwouden Verzekeringen om ketenintegratie te realiseren¿.

Heerde, Harold van (2006) Life-cycle privacy policies for the ambient intelligence.

Ingberg, G. (2006) Location aware performance measurements.

Engelen, L. van (2006) Massively parallel quantization implementation using simulated annealing.

Overbeek, J.F. (2006) Meta Object Facility (MOF): investigation of the state of the art.

Groen, Ruud (2006) Modelleren en analyseren van een Ethernet switch.

Brouwer, L.J. (2006) Monitoring van een ASR-systeem : het gebruik van interne confidencewaarden en teletekstondertiteling om de Word-Error-Rate van een herkenning te voorspellen.

Slabbers, Nanda (2006) Narration for virtual storytelling.

Backx, Niels (2006) On the design of a mobile e-health platform ¿ towards deployment flexibility.

Verbree, A.T. (2006) On the structuring of discussion transcripts based on utterances automatically classified.

Dimitrova, Desislava C. (2006) Performance evaluation of RMD (Resource Management in DIFFSERV) within NSIS (Next Steps In Signaling).

Meijer, Gijs (2006) Performance measurement of IT investments.

Boschman, S.R. (2006) Performing transformations on .NET intermediate language code.

Nusman, Daan (2006) Real-time full-body motion capture in virtual worlds.

Sirchia, Riccardo (2006) Realtime softwarematige radarscan conversie : met GPU programmeren. Item availability restricted.

Vrijkorte, A.B. (2006) Semantics in service-oriented architectures.

Puming, Liu (2006) Service agreements and facilities for M-health vital sign monitoring.

Steghuis, Claudia (2006) Service granularity in SOA-projects : a trade-off analysis.

Yang, Furong (2006) Short term electricity price forecast model. Item availability restricted.

Vrielink, S.B. (2006) Situational reinforcement learning : learning and combining local policies by using heuristic state preference values.

Smelik, R.M. (2006) Specification and Construction of Control Flow Semantics : a generic approach using graph transformations.

Braam, G.J.M. (2006) Supporting multi-modal and multi-medial user interfaces from an embedded environment.

Swartjes, Ivo (2006) The Plot Thickens : bringing structure and meaning into automated story generation.

Kreuk, N.A.W. (2006) The Turkish option market.

Cheng, W. (2006) The design of a new power combining technique for the RF power amplifiers.

Kattenbelt, M.A. (2006) Towards an explicit-state model checking framework.

Leenslag, Wilco (2006) Werkwijze ter beoordeling van IT governance op basis van geaccepteerde methodes op het terrein van IT governance.

2005

Withaar, T. (2005) Analyzing joint-measurements using 3D scancs and statistical models.

Oosterhof, N.N. (2005) Application patterns in functional languages.

Borkent, Michiel (2005) De- and recomposition of expression in music performance.

Havinga, W. (2005) Designating join points in Compose* : a predicate-based superimposition selector language for Compose.

Timmer, M. (2005) How to identify the speed limiting factor of a TCP flow.

Boedeltje, Michel Ronald (2005) In response to your inquiry : Automatic E-mail Answer Suggestion in a Dutch Contact Centre.

Holzenspies, Philip (2005) SILC: SPRITE Input Language with C(++).

Burgwal, M.D. (2005) Serving the Montium : design of an energy-efficient processor-network interface.

Nijenhuis, Barry (2005) Smart sign for smart surroundings.

Weijden, Erik van der (2005) Structuring argumentation in meetings : Visualizing the argument structure.

Klaij, Bastiaan (2005) Toegepast tokenizen voor natuurlijke taal verwerking : automatische analyse van platte en opgemaakte tekst.

2004

Sözer, Hasan (2004) A peer-to-peer file sharing system for wireless ad-hoc networks.

Roelofsen, Floris (2004) Contextual Reasoning - Complexity Analysis and Decision Procedures -.

Ananda, Artha Sejati (2004) Design and simulation of non-zero and zero dispersion optical lattice wavelength filters.

Evers, Sander (2004) Form follows function. Editor GUIs in a functional style.

Bekkaoui, A. (2004) Link performance of the time offset transmitted reference system.

Balkema, Wietse (2004) Realization and characterization of a 2.4 GHz radio system based on frequency offset division multiple access.

Bui, Cuong (2004) Write-intensive applications with DLAP.

2003

He, Xiaobo and Mayasari, Elisabeth E. (2003) A Design of Software Architecture for “SHAPE” Workforce Management Game.

2002

Nurdin, H.I. (2002) Mathematical modelling of bias and uncertainty in accident risk assessment.

2001

Donckers, L. (2001) Energy Efficient TCP.

Agung Julius, A.A. (2001) Evolution of the modal densities of a class of stochastic hybrid systems.

2000

Schiphorst, R. (2000) Demonstration of the Software-Radio Concept.

1996

Hiemstra, D. (1996) Using statistical methods to create a bilingual dictionary.

This list was generated on Thu Apr 17 05:07:22 2014 CEST.