University of Twente Student Theses

Login

Domain: 54 computer science

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Year | Item Type
Jump to: 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1996
Number of items: 3174.

2024

Antonowycz, A.J. (2024) Computing Electro-Optical and Radar coverage in near real-time.

Apriyandi, Dimas (2024) A Smart Tourism Platform Reference Architecture for Developing Countries.

Arum, S.R. van (2024) TumbleTooth, an ADL-based home rehabilitation aid for hand-stroke patients.

Belois, T.M.L. van (2024) Parents, You Are Not the Only Ones Struggling With Childrens’ Questions : Exploring Childrens’ Preference for Clarification Methods Used by Voice Assistants.

Bleeker, Chris (2024) Measuring Code Modernity in Rust.

Blok, J.E. (2024) Digital Product Passports : Increasing Transparency in the Fashion Industry.

Bohlmeijer, M.W. (2024) Systematic Literature Review on Interaction Design used for Museum Learning.

Bolten, Marjolein (2024) Monitoring training load and identifying fatigue in young elite speed skaters using machine learning methods.

Bonenkamp, Jetske (2024) From Pit Stops to Paragraphs : Automatic Generation of Formula One Live Blogs based on Structured Race Data.

Born, H. van den (2024) Creating an educational escape room piece about individual climate positive changes in day-to-day life.

Bos, Wouter F.A. (2024) Generating Piping & Instrumentation Diagrams from Static Fault Trees.

Bostelaar, Thomas (2024) Test-Time Adaptation for Skin Lesion Classification.

Brok, F.J. den (2024) Abstract vs. Literal Sound Design for VR.

Buijsse, R.W.A. (2024) Enable triple-loop learning: integrating soft information and human-machine interaction in data-driven decision-making.

Dieten, J. J. van (2024) Attention Mechanisms in Natural Language Processing.

Dijkstra, Stijn (2024) Finding Smaller Parity Game Solutions by Identifying and Solving Subgames using Oink.

Dodeja, Ujjwal (2024) BaatCheet : Android chat application coupling End-to-End encryption and LSB substitution.

Floor, D. (2024) Code comprehension in the multi-paradigm environment Kotlin.

Goud, Hanneke (2024) Using graphic design to attract female high school students to the field of creative coding.

Gravier, Emil (2024) Leveraging Machine Learning and Geo-Analytics in Automatic Valuation Models to advance Real Estate Valuation.

Greuter, K.O. (2024) A Repository for Testing Compliance to the Internet of Things (IoT) Security Standards.

Guo, Haoyu (2024) Construction of Predictive Model to Provide Personalized Advice on Reducing CRF on the POLARIS Dataset.

Gupta, Pratyush (2024) A Comprehensive Study on Feature Detection Algorithms and Fine-Tuning Methods for Efficient Metadata Extraction in Construction Drawings.

Haterd, Rik van de (2024) Enhancing Privacy and Security in IoT Environments through Secure Multiparty Computation.

Have, C.J. ten (2024) Change point detection of fatigue using the martingale statistic.

Heegde, B.E.R. ter (2024) Building a Generalized DNS Resilience Tool using the Internet Yellow Pages.

Heinen, Floris (2024) Improving the creation of AIGs from reactive synthesis.

Hilbrants, ir. MSc K.Y. (2024) Development of a Machine Learning Model to Detect Freezing of Gait in Parkinson Patients.

Huijstee, Michiel van (2024) Enhancing Learning Management Systems : A Novel Approach to Improve Usability through Learning Analytics.

Huveneers, Maartje (2024) The Effective Use of Limited Feedback to Personalize a Mixed Model for Human Activity Recognition.

Iperen, M.M.A.P. van (2024) Unveiling the hidden threats : An approach to solve the cost metric of an Attack Tree.

Iperen, M.M.A.P. van (2024) Unveiling the hidden threats : An approach to solve the cost metric of an Attack Tree.

Jeltes, M. (2024) Analyzing the use of renewable energy in Dutch web hosting through DNS measurement data.

Jong, Koen de (2024) Transformation from OntoUML models to the OpenAPI Specification.

Kasteren, L.N. van (2024) Chimney fire prediction in IJsselland.

Kat, V.B. (2024) Bridging the Semantic Gap : Semantic Interoperability for IoT Integrations on iPaaS Architectures.

Kessels, J.C. (2024) Deep reinforcement learning to support dynamic decision-making in a transport network amid travel- and handling time uncertainty.

Khalil, Saad (2024) Differentially Private Synthetic Data Generation using Large Language Models.

Khoirunnisa, Elvin (2024) A Reference Model of Operation and Maintenance (O&M) Strategies for Community-based Photovoltaic (PV) Microgrids on Small Islands.

Koning, Ruben de (2024) A Comparative Study of Event Detection Algorithms for Energy Disaggregation.

Krabbenborg, J. (2024) A Novel Approach Using Smoothing to Detect Errors in OpenPose Estimated Running Data.

Kyryk, Oleksii (2024) Enhancing Spatial Relationships Detection in text : Analyzing methodologies and managing ambiguity.

Lizarazo Fuentes, Louis Daniël (2024) Forecasting Microbiology Laboratory Test Volumes using Time Series Models.

Matcov, Alexandru (2024) Explainable AI in Credit Risk Assessment for External Customers.

Nadar, Aditya (2024) Perspective Interactions : Detecting Multimodal Social interactions from an Egocentric View.

Narkar, Manya (2024) Optimal Passwordless Continuous Authentication Measures for Remote Employees.

Nijboer, T.M. (2024) Kickstarting the Next Step in Urban Mobility. Design of an Interactive Design Tool & a New Urban Electric Vehicle.

Noort, Luc van (2024) Sensor Framework For Pediatric Cerebral Palsy Ankle Foot Orthosis : Development and Technical Validation.

Oosting, E. (2024) A fast instruction language for functional programs.

Overkamp, N.M. (2024) ReScan : High performance mass scan responder.

Overvelde, R.M. (2024) Towards a method for improving the coherence between the reference architectures within the Dutch public sector.

Peters, Siem (2024) Option pricing using Generative Adversarial Networks.

Qureshi, Faizan Mazhar (2024) Image Tampering Detection in Social Media.

Ramchand, Tasneem (2024) Website Navigation Structures: Eliciting Mental Models Using Card Sorting.

Reve, S.J. van het (2024) Detecting Rare Diseases : Autoencoders for Detecting Anomalies in Medical Imaging.

Riahi, T. (2024) Contactless Heartbeat Estimation with FMCW Radar.

Roelink, D.J. (2024) Optimization of return freight selection.

Ruiter, J. de (2024) Developing Effective Autonomous Driving for Sim Racing through Reinforcement Learning in Assetto Corsa.

Runhaar, T.P. (2024) Secure AI-Enhanced Student Engagement Analysis.

Safavi-Zadeh, Daniel (2024) Unravelling the Information Asymmetry in Threat Intelligence.

Santen, Julian van (2024) Using LLM Chatbots to Improve the Learning Experience in Functional Programming Courses.

Schoute, M. (2024) Rowing Reimagined Extended.

Schrijver, G. (2024) Evaluating Generalisability, Limitations, and Adaptations in Social Network Analytics-Based Insurance Fraud Detection.

Shanmuganathan, M.P. (2024) A Strategic Decision Analysis Framework for Software-as-a-Service Selection : A Systematic Data-Driven Approach.

Smit, T.T. (2024) Investigating RISC-V hardware for autonomy in space, exact emulation-based fault injection on a hardware accelerator.

Stal, D. ter and Bongers, M.T.M. and Postma, S.F. and Vrenegoor, S.I. (2024) Artificiele Intelligentie bij het bepalen van technische uitdagingen bij rectumchirurgie.

Stekelenburg, A.V. (2024) Solving Parity Games: Combining Progress Measures and Tangle Learning.

Stouten, Thomas (2024) Modeling the effectiveness of treatment for Rheumatoid Arthritis with UPPAAL.

Tsankov, Anton S. (2024) Leveraging Information Visualization, Pattern Identification, and Anomaly Detection in Support of Tactical Analysis of Healthcare Contracts.

Tufto, Darrell (2024) Predicting Quality Issues in Manufactured Goods by means of Process Mining in Enterprise Resource Planning Systems.

Turenhout, Lieke (2024) Cognitive Enhancement through Play: Crafting an Engaging Game-Based Intervention for Alzheimer's Disease.

Vaish, Puru (2024) Fourier Insights in Machine Learning : Bridging the Augmentation Gap through Frequency-basis Functions.

Vanoušek, Mikuláš (2024) Controllability of Laplacian Leader Follower Dynamics : Algorithmic Approach.

Vanoušek, Mikuláš (2024) Controllability of Laplacian Leader Follower Dynamics : Algorithmic Approach.

Veen, S.E. van der (2024) A Formal Proof for the Correctness of Tangle Learning.

Velthuis, Wout (2024) Analysing bottlenecks in production processes with the help of process mining.

Voorend, Rosalie (2024) Deep Learning Applications for Finding Geometric Constraints of Chronic Subdural Hematomas.

Vree, E.A. de (2024) Forging a differential tester for Haskell compilers using Xsmith.

Vuolo, M.R. (2024) Towards applications’ fingerprinting through the usage of NetFlow/IPFIX technology.

Weening, J. (2024) Classifying Companies Based on Textual Webpage Data: A Comparative Analysis.

Wetering, T. van de (2024) Exploring Layer-specific Quantization in CNN-based Selective Sweep Detection.

Wijhe, Victor van (2024) Signal Processing with AMD Adaptive Compute Acceleration Platform (ACAP) for Applications in Radio Astronomy.

Wittingen, E.M. (2024) Deductive verification for SYCL.

Zagema, S.G.C. (2024) FedNIP : A Statistical Heterogeneity Aware Dynamic Ranking Algorithm for Federated Learning.

Zentveld, B.N. (2024) Improving BearingPoint Netherlands’ consultant-to-project KPIs by introducing a consultant-to-project assignment model.

Zhao, Zhenqi (2024) Exploring Lexical Alignment Influences in Price Bargain Chatbot.

Zwol, Jan van (2024) Splitting the watermark up, a steganographic watermarking algorithm for H.264 with reduced image distortion.

2023

Aanen, Mattijs (2023) GNSS-Based Time Synchronisation for Distributed Radio Localisation on Software-Defined Radio.

Abdela, Nesredin (2023) Deep learning-based Digital Surface Model (DSM) generation using SAR image and building footprint data.

Abeywardana, Hasini (2023) Near real-time analysis of tactics techniques and procedures of attacker groups on their relevancy to an Organisation.

Adamse, J.C.W. (2023) UAV deployment for flood-resilient mobile networks: a data-driven analysis for the Netherlands.

Admiraal, C.P. (2023) Calculating the modernity of popular python projects.

Ahmad, Sadat (2023) Designing a detailed telemetry dashboard for sim-racers.

Albertsson, Vincent Gustav (2023) Analyzing descriptive captions for crime recognition in surveillance footage.

Alikhujaev, A. (2023) Microservices In IoT-based Remote Patient Monitoring Systems: Redesign of a Monolith.

Alvear Cárdenas, Juan Diego de (2023) Digital Transformation Management for CDOs.

Amato, Alessandra (2023) Applications of Early Warning Systems for Customer Segmentation of Wholesale Banking Clients.

Amerongen, J. van (2023) A qualitative comparison of specification techniques for microservice architectures.

Amouei, Morteza (2023) Classification of urban morphology and its relationship with air pollution using deep learning.

Amptmeijer, R.S. (2023) An Interactive Installation for the MuseumFabriek in Enschede.

Andrei, Vlad-Cristian (2023) The security impact of DNS and TLS on the websites reconnaissance process.

Andringa, André (2023) Irregular Polygon Strip Packing for the Production Process Transition of the Fashion Industry.

Anoniem, A. (2023) Item availability restricted.

Arend, M.Q.T.P. van der (2023) The LAMP Framework - A language-agnostic code quality assurance framework for multi-paradigm languages.

Ariëns, D.L.R. (2023) Self-assembled Magnetic Carpets for Cargo-Transport of Millimetric Planar Objects.

Arva, Denis (2023) Secure Integration of Third-Party Code in SaaS.

Assen, M.H. van (2023) Integrating the Five Steps of Plotting: A Plotting Tool Design.

Averchenko, Illya (2023) Computer Vision for Crime Recognition Based on Skeleton Trajectories.

Bachir Kaddis Beshay, Amir (2023) Cold-start Active Learning for Text Classification of Business Documents.

Badrajan, Alen (2023) Technical and Security challenges of Cloud-based Storage Management for IoT Devices.

Bakker, Jeffrey (2023) Short-Term Passenger Flow Forecasting in Public Transportation Networks Under Event Conditions.

Barathidhasan, Shanmathi (2023) Deep Learning Framework for Urban Impervious Surface Mapping Using Open Multisource Geospatial Data.

Beijnum, A.C.W. van (2023) Haly : Automated evaluation of hardening techniques in Android and iOS apps.

Bel Makhfi, Abdel Aziz (2023) Reliable low-latency networking: many radios, many paths.

Benitah, R.J. (2023) Cyclist weight inference from bicycle-mounted sensor data.

Berendse, S.E. (2023) Towards explainable machine learning for prediction of disease progression.

Berg, C. van den (2023) Design of a No Reference Random Bin Picking System For Metal Plate Parts.

Berg, Thomas van den (2023) The effect of IP prefixes on BGP visibility.

Bessi, Maouheb (2023) Trajectory Prediction on an ego-bike with IMU and camera using a Multi-State Constraint Kalman Filter​.

Beune, P.F. (2023) Lightweight Public Key Infrastructure for IoT.

Bijker, K. (2023) Can you feel my sign? Sending shapes to a haptic display.

Bilgin, Mustafa Hayri (2023) Enhancing Fault Diagnosis in Cyber-Physical Systems : A Model-Based Approach with Bayesian Networks.

Blum, Paul (2023) Lexical Alignment in Collaborative Interactions with a Conversational Agent.

Boerman, J.G.J. (2023) Formal verification of a sequential SCC algorithm.

Boersma, Kitty (2023) So long and thanks for all the (big) fish : exploring cybercrime in Dutch Telegram groups.

Boom, Mark (2023) Data Structures and Heuristics for State Elimination in Markov Models.

Borkar, S.D. (2023) Enhancing Robot Camera Localization through Image Retrieval via Generalized Contrastive Loss and Re-Ranking.

Bos, Jochem (2023) Item availability restricted.

Bos, S.E. ten (2023) Investigating the Effectiveness of Machine Learning Algorithms in Predicting Bitcoin Prices and Improving Trading Strategies.

Bosman, Joris (2023) Fine-tuning GPT-3 for data visualization code generation.

Botnarenco, Daniel (2023) Automating Scientific Paper Screening with ChatGPT: An Evaluation of Efficiency and Accuracy.

Bottinelli, Sara (2023) A Study of Organization Level E-mail Phishing Awareness.

Bozea, Diana-Alexandra (2023) Secure Steganography Based on GAN Image Morphing: Implementation and Analysis.

Bozhilov, Yancho (2023) Differences between conversational and query-response approaches in multimodal interplay with a robot.

Braak, Bjorn van (2023) Experiments with different methods for class imbalance and bias in customers' credit risk assessment with little or no credit history.

Braam, H.L.H. (2023) Understanding the Impacts of Google’s CT Policy Update on the WebPKI.

Brattinga, M. (2023) Protecting against internal attackers with hardware-aided proxy re-encryption.

Breggeman, Floris Tenzin (2023) An Authentication Service for Domestic Self-Hosting.

Broek, Desmond van den (2023) Creating a general process to measure API performance : generating a KPI-driven dashboard at Air France KLM.

Broekhuis, S. B. (2023) Incorporating User Inputs for Improved JSON Schema Inference.

Broers, Noah (2023) How Organizations Institutionalize Corporate Digital Responsibility in their Culture and the Influence on Employees’ Digital Responsible Behavior.

Brouwer, E.E.B. (2023) Development of a Location-Based Game to help new students discover the UT Campus and Enschede.

Brouwer, R.J. (2023) Differentiating user groups within an educational dashboard using log data.

Bruderer, M.A (2023) Satellite to Radar: Sequence to Sequence Learning for precipitation nowcasting.

Bucur, Matei (2023) Exploring Large Language Models and Retrieval Augmented Generation for Automated Form Filling.

Budin, Batu (2023) ERP Systems and Process Mining.

Budnyk, Yevhenii (2023) LyrAIX - tweaking the style.

Bui, M. (2023) Optimal care for geriatric hip fracture patients : an interdisciplinary perspective on preoperative decision-making and postoperative rehabilitation.

Bui, M. (2023) Optimal care for geriatric hip fracture patients : an interdisciplinary perspective on preoperative decision-making and postoperative rehabilitation.

Buis, Geert (2023) Applying game-theory to evaluate incentives for cooperative behaviour between households within the distribution grid.

Burgt, A.P. van der (2023) AI in the Wild : Robust evaluation and optimized fine-tuning of machine learning algorithms deployed on the edge.

Böhmer, Kevin (2023) Radiation resilience evaluation of a Flash-based FPGA with a soft RISC-V Core.

Chatzimichail, Kyriakos (2023) Synchronization improvement in automotive Ethernet networks.

Choi, Jeong Young (2023) Machine Learning Approaches in Extending the Capabilities of a Thermal Anemometer for Horticultural Applications.

Christou, G. (2023) On Services Exposed by DNS Infrastructure: A KINDNS Investigation.

Ciresica, V. (2023) Authentication method for Windows OS based on location classification using WiFi signals.

Clemente, Jean Louis (2023) Segmentation of Railway tracks, Contact cables and Catenary cables from a LiDAR Point Cloud.

Contecha Montes, J.A. (2023) An Enterprise Architecture based Big Data Analytics Capability Deployment Reference Architecture to improve Business Value.

Coste, S.F. (2023) Crowd analysis on edge devices : a comparative study of neural networks on blurred images.

Croonen, Elke (2023) Artificial intelligence for tool and action detection in laparoscopic fundoplication surgery videos.

Darici, F.E. (2023) Analyzing Video Quality Assessment Methods on Computer Graphics Animation Videos.

Dekker, Bram (2023) Semi-supervised point cloud segmentation on railway data.

Demosthenous, Avgerinos (2023) Machine operation prediction using CSI for Industrial IoT networks.

Dhawan, Sonakashi (2023) Hybrid Machine Learning (ML) Models in Banking : An Approach for the B2B Sector.

Dieperink, D. (2023) Investigating the use of acoustic features to understand human social interaction from speech.

Dijkstra, R.M. (2023) European Commission Digitalisation: Strategy Meets Policy.

Dong, Zheyu (2023) Design of User Interface for Sewer Management Web Application.

Dongen, Fabian van (2023) Kubernetes, IoT and the Automation of Penetration Testing.

Dop, L.T.J. (2023) Classifying ransomware victims’ nationalities based on leak page entries.

Doychev, K. (2023) Need for convergence speed : how do graph metrics influence the convergence speed of Markov chains?

Driessen, Famke (2023) A quantitative assessment method for microservices granularity to improve maintainability.

Dringa, Brianna (2023) Performance and Security Analysis of Privacy-Preserved IoT Applications.

Eijkemans, J.W. (2023) Sneakily Purposeful Games : A new design strategy for motor-based serious games.

Eijken, Margriet (2023) Energy efficient scheduling in data centers.

El Habashy, Mohamed (2023) Biomarker Based COVID Severity Prediction and Data Quality Exploration.

Elburg, R.S. van (2023) Designing a gamification for promotion and recruitment.

Elsten, Julian M. (2023) Exploring the potential use of FaaS within an iPaaS infrastructure.

Engelenhoven, A. van (2023) CAST : Clustering Attention using Surrogate Tokens for Efficient Transformers.

Engers, V.P.G. van (2023) Efficient Deep Learning for Automotive Radar Perception.

Essers, Tom (2023) Technology Assessment for Quantum Computing in the Energy Sector.

Eugelink, J.P. (2023) Applying machine learning methods to the Menzis district nursing benchmark.

Eyk, Jan-Niclas van (2023) Fighting Phishing at the Website Host.

Fernhout, M.M. (2023) A Deep Learning Approach for Assessing Micrographs of Fibre Reinforced Composite Laminates.

Fishchuk, Vitalii (2023) Adversarial attacks on neural text detectors.

Fitria, Silvi (2023) A Comparison of Deep Neural Networks for Sales Forecasting.

Flake, Beitske (2023) Network Inference-Based Prediction of Epidemics: A Case Study on Mexican State COVID-19 Infection Counts.

Fobbe, Franziska (2023) Look at this, not that! – Improving the alignment of PIP-Net with domain knowledge.

Fontein, R.L.H. (2023) Investigating DNS Information Flow In Corporate Networks.

Galati, David (2023) Exposing the Brain of a Robot.

Gangireddy, Rajesh (2023) Knowing the Unknown : Open-World Recognition for Biodiversity Datasets.

Gansel, Antoine (2023) Sub-quadratic Privacy Preserving Cohort Selection.

Garalov, Toghrul (2023) Raspberry-Pi based IDS for IoT.

Gavilanes, Jose Oswaldo (2023) Improving Performance with OpenPose: Analyzing Post-Run Feedback through a Prescriptive Dashboard.

Gebremariam, T.H. (2023) Digital Twin and Securing IoT Applications in Industry 4.0.

Gerdes, Thorben (2023) Enhancing soil health measurements for food forest projects.

Ghadiri, Radmehr (2023) Security and Performance Analysis of Edge Computing in IoT.

Goor, J.G.L. (2023) Log Parsing in Software-Defined Networking to generate DyNetKAT models.

Goswami, H. (2023) A framework for detecting and preventing DoS attacks in automotive ethernet switches.

Goudswaard, A.T. (2023) Value Assessment of Digital Twins.

Graaf, Silas de (2023) Investigating Availability Computation with Exponential Failure Rates and Fixed-Time Repair Delays.

Greveling, Mark (2023) Ultrasound: a reliable method to measure muscle forces around the foot?

Groen, J.J. (2023) Suitability of gamification methods in a lifestyle application against obesity and diabetes.

Groot Roessink, J. (2023) Influence of Biological Cues on Monocular Depth Estimation.

Groote Veldman, W.J. (2023) Optimizing BLE Gateway Positioning in Aviation Industry: An Algorithm Based on Link Budget and Log-Distance Path Loss.

Grooters, T. (2023) Analysis of automated Virtual Machine generation and automation around system testing at TKH Airport Solutions.

Guo, Zinan (2023) Vital Sign Detection Using a Thermal Camera.

Gülbey, Baran (2023) Semantic model of the Computing Capacity matching within the FAIR Data Train.

Gülsüm, Kağan (2023) Formalizing a generalized diagonalization argument in Isabelle/HOL.

Haarman, M.H.J. (2023) The Impact of Instagram Use on Mental Health : A Study of the Moderating Effect of Social Anxiety.

Hagens, Florian (2023) Efficient Task Dispatching for Real-Time Systems: A Case Study in FreeRTOS.

Halchenko, V. (2023) Using transformer architecture and natural language processing for detecting offensive content and cyberbullying.

Harbers, Thom (2023) To what extent do uncertainty, sentiment, and authors influence the amount of anthropomorphic behavior on social media?

Harten, A. van (2023) The role of WebSDR usage in open source intelligence gathering during geopolitical events.

Harten, R.H. van (2023) AI Enabled Slice Resource Management for Improved QoS in WiFi-based IoT Networks.

Hartmans, L.A. (2023) Predicting Soil Moisture for Improved Environmental Sustainability: A Multivariate Time-Series Forecasting Approach using Machine Learning.

Haverkamp, Indy (2023) Analyzing Advantages and Limitations of Combining Cryptography and Steganography Across Applications: A Systematic Review.

Heij, A.C. (2023) Solving the 5x5x5 Rubik’s cube: heuristic approach.

Heijningen, Pieter van (2023) Exploring The State of Rate Limiting in IPv6.

Heinrich, Carl Vico (2023) Hand luggage overflow prediction at KLM.

Helvoort, L.F.A. van (2023) DumpingMapper : illegal dumping detection from high spatial resolution satellite imagery.

Hendriks, J.J. (2023) Interactive Segmentation in Space-time Memory Networks.

Hendriks, K.W. (2023) Data Governance Structures in Data Mesh Architectures.

Hendriks, Max (2023) Consider it Parsed!

Hendriks, Remi (2023) Improving anycast census at scale.

Hentschel, J. (2023) Point cloud segmentation via active learning in the context of railway infrastructure.

Hessels, Ruben (2023) A Data Quality Assessment of the Suspicious Transactions.

Hesson, Alexandru (2023) Detecting GAN-generated face morphs using human iris characteristics.

Heuvel, L.P.W. van den (2023) Diffuse more objects with fewer labels.

Hinojosa, Luis G. (2023) Analysis of node performance in lightweight key management protocols in IoT networks.

Ho, H.P. (2023) Unplugged Versus Plugged Gamification : A Comparative Study in Higher Education on Engagement, Motivation and Teachers’ Perception.

Hoff, A.W. (2023) Evaluation of Multiple Machine Learning Algorithms and Glycemic Variability Indices for Predictions of Glucose Levels in Type 2 Diabetes Mellitus Based on Continous Glucose Monitoring and Activity Data.

Hofman, M. (2023) Novel Deep Learning Methods for Modeling and Prediction of Abdominal Aortic Aneurysm Growth.

Hofsté, G. te (2023) Evaluation of On-line Reconfiguration Techniques for a Distributed Avionic Middleware.

Hoftijzer, D.M. (2023) Language-Based Augmentation to Address Shortcut Learning in Object-Goal Navigation.

Hoogendoorn, T.A.D. (2023) Survey of explainability within process mining.

Horneț, Victor (2023) Introducing Typeling: an Imperative Programming Language with Algebraic Data Types.

Horst, L. van der (2023) Saving energy in cellular networks through resource sharing.

Huh, Jeongyeon (2023) Bayesian-Network updating using novel clinical data.

Ignat, R. (2023) Inclusion vs exclusion oriented clarifying questions for conversational product search.

Imre, Baris (2023) Using a Multi-Scale Patching With Vision Transformers for 3D Image Segmentation.

Irokosu, Anthony (2023) Performance Comparison of CNN-based Semantic Segmentation on Indoor and Outdoor Scenes.

Jansen, Benjamin (2023) Enabling Predictive Maintenance through Efficient Data Warehousing – A Case Study.

Janssen, M. (2023) A parser generator for visibly pushdown languages : translating between VPLs.

Japink, Patrick (2023) Redis, Apache Kafka, RabbitMQ: Effect of choosing Event-streaming middleware upon architectural constraints defined by Non-functional requirements in Event-driven microservice architectures.

Jaspar, S.L.J.O. (2023) Generalization capabilities of a learning from demonstration framework capturing a human controller.

Jaspar, S.L.J.O. (2023) Generalization capabilities of a learning from demonstration frameworkcapturing a human controller.

Jeeva, Joshua Anith Singh (2023) Risk Assessment of Humanoid Robot EVE-r3.

Jellema, Hylke Jesse (2023) Privacy-Friendly Room Occupancy Measurement System.

Jerkovic, Christian (2023) GAN Generated Morphing Attack Detection by Analyzing the Geometry of Pupils.

Jiang, Yuling (2023) Patch-Based Morphing Attack Detection.

Jonker, Scott (2023) Continuous representation of kernels used in convolutional neural networks.

Jonkers, J.W. (2023) Scrutinizing Sounds: A Study on Reconstruction Based Anomaly Detection in Vinyl Records’ Audio Data.

Joseph, A.M. (2023) Investigating vision transformers for human activity recognition from skeletal data.

Jánosi, József-Hunor (2023) Two-Stage Overfitting of Neural Network-Based Video Coding In-Loop Filter.

Kaewborisut, D.B.Q. (2023) Self-generated 3D point cloud with raw data from FMCW radar.

Kahnt, Laura (2023) Proxies and Balancing for Shared Flow in Older Adult Cyclists.

Kalidindi, Kaush (2023) Ontogenetic Epistemology of AI: An Investigation into the Role of Machine Learning in Knowledge Production Through its Genesis and Genealogy.

Kanagasabapathi, Dhanasekaran (2023) Spatiotemporal analysis for fire forecasting using deep learning techniques in google earth engine : a case study for the Indian state of Uttarakhand.

Kang, J. (2023) User-Driven Knowledge Graph Expansion via Ontology Matching and Question Answering.

Kantharajappa, Kushal (2023) Point localization on 3D hand meshes and point clouds.

Karlsson, August (2023) Enabling Cyber Threat Intelligence Sharing for Resource Constrained IoT.

Karytsas, Konstantinos (2023) Model-Free Reinforcement Learning Control of a Pneumatic-Driven Soft Continuum Robot.

Kazi, Raef (2023) Navigating Semantic Shifts : A Visual Tool for Exploring Word Meaning Change.

Kerkhoven, Tim (2023) Monitoring Service-level Agreements for Logistics Service Providers.

Kerssens, M. (2023) The FAIR-iT framework : Towards the adoption of the FAIR principles in an enterprise context.

Ketkale, N. (2023) Alleviating negative emotions associated with goal failure with the use of musical data representation.

Kiviniemi, O.L.N. (2023) Fraction farm : tangible learning experiences for learning fractions.

Kivits, Enno (2023) Input Variable Selection for a Classification Algorithm to Predict Personalised Health Advice in Secondary Prevention : A Pilot Study.

Klampe, T. (2023) Creating and evaluating Grammatical Error Correction models with arbitrary error correction profiles.

Klinkert, Julia L. (2023) Optical See-Through vs. Video See-Through Mixed Reality for Rehabilitation : Exploring the effects of mixed reality on the experience of motor rehabilitation of ABI patients through the eyes of the patient and therapist.

Kloosterman, C. (2023) Ontwikkeling van Artificial Intelligence in de Zorg en de Rol en Betrokkenheid van Stakeholders.

Kobes, W.J. (2023) Governmental domain name management : policy versus practice.

Kobes, W.J. (2023) Governmental domain name management : policy versus practice.

Kobzev, Vladimir (2023) Dia : a Domain Specific Language for Scripted Dialogues and Cutscenes.

Koch, Maximilian Alexander (2023) Turning Chaos into Meaning : A Chat GPT-Assisted Exploration of COVID-19 Narratives.

Koehorst, G.S. (2023) Generating natural language triage advice at Dutch out-of-hours primary care centers.

Kok, M. (2023) Prominence detection in spoken Dutch using prosodic features and machine learning.

Kok, M.R. (2023) Household electricity load forecasting for demand side management applications.

Kokkeler, C.J. (2023) PROMISE : Process Mining for SMEs: a Methodology.

Koldenhof, Dylan (2023) Neural Network Backdoor Removal by Reconstructing Triggers and Pruning Channels.

Koomen, S.B. (2023) Text generation for quests in multiplayer role-playing video games.

Koornstra, J.S.D. (2023) Predicting Ego-Bicycle Trajectory : An LSTM-based Approach Using Camera and IMU.

Koryugin, D. (2023) Analysing and alerting on application logs within Kubernetes infrastructure.

Kreuger, Robin (2023) Review of social media traffic at the DNS resolvers and their security implementation.

Kruiper, T.R. (2023) Area-Optimized RISC-V-Based Control System for 22nm FDSOI Analog and Mixed-Signal Test Chips.

Kruk, Niels (2023) Design of an Efficient Map-Based Programming Language.

Kugis, R. (2023) Pace yourself! The effects of optic flow on biomechanics of movement and perceived effort.

Kulikowski, Dawid (2023) Cross-layer design approach for dynamic control over Wi-Fi network slices: bringing QoS Diversity to Wi-Fi based IoT networks.

Kulyk, D. (2023) Combining object detection and eye tracking to identify points of interest for VR art exhibition visitors.

Kurnia, Aldi Doanta (2023) Interoperability Simulator for Data Spaces.

Lagerburg, R.A. (2023) Overcoming Challenges in Software Development Projects: An Integrated Approach for Small and Medium Enterprises (SMEs).

Lange, W.J de (2023) Exploring the Use of Sentiment Data in machine learning stock Market Predictions.

Laso, P. (2023) Quantifying white matter hyperintensity and brain volumes in heterogeneous clinical and low-field portable mri.

Laso Mielgo, Pablo (2023) Quantifying white matter hyperintensity and brain volumes in heterogeneous clinical and low-field portable MRI.

Lazorenko, D. (2023) Satellite nowcasting of cloud coverage via machine learning.

Ledelay, Joël (2023) Verification of distributed locks : a case study.

Lee, Ari (2023) Enhancing the Self-Regulated Learning Process Using a Brain-Computer Interface with Auditory Neurofeedback.

Leefer van Leeuwen, Maxmilian (2023) Color Emotions without Blue Light : Effect of a Blue Light Filter on the Emotional Perception of Colors.

Leenders, R.C. (2023) Exploring the Role of Generated Backchannels in Human-CA Collaboration : Implications for Task Duration and User Perception.

Leeuwen, R. van (2023) The Perceived Time Theft of TikTok : The Influence of Self-Assessed Social Media Addiction on the Accuracy of Estimating Time Spent on Social Media: A Study among TikTok Users.

Leijzer, Anne (2023) Social support embedded in a mobile phone application to reduce unwanted smartphone usage among students.

Li, C. (2023) Catheter modelling and force estimation in endovascular application.

Limbeek, T.F. (2023) Design and implementation of destination tracking and velocity control as an addition to a boids-inspired traffic simulation.

Linden, M.M. van der (2023) Federated Learning for Indoor Human Activity Recognition: Adapting to Changing Realistic Environments.

Liu, Siyuan (2023) A Cloud-based platform Reference Model for Remote Control and Monitoring for Laboratories of Inspection and Certification Companies.

Liu, Yujie (2023) Testing and Mutation Testing for GPU Kernels.

Loevezijn, J.P. van (2023) Aligning Information Systems Management and Risk Management to achieve Enterprise Resilience.

Looijenga, M.S. (2023) Hele taak eerst in databaseonderwijs.

Lummen, D.L.M. (2023) Is Telegram the new Darknet? A comparison of traditional and emerging digital criminal marketplaces.

Lüdeke, Tjard (2023) RehaBuddy : Development and evaluation of a mobile technology to support a patient-centered goal-setting process in physiotherapy.

M Sri Rangan, W. (2023) Creating accurate valuation models for real estate properties.

Maas, R.F. (2023) A ranking metric for event impact in safety-security co-analysis.

Macarie, Mihai (2023) Fuzzing Android Automotive's CAN interface.

Magzoub, Z. (2023) Toxic comment classification in discord.

Majkut, Kristóf (2023) k-Anonymization Module Prepared for Change : a flexible architecture for the easy replaceability of algorithms and data sources with proof-of-concept implementation.

Maranatha, Yesaya Galatia (2023) Auditable Data Sharing in Logistic Data Space: Design and Implementation of IDS Clearing House for Logistic Data Space.

Meenhuis, J.E. and Barodi, R.N.W. and Sijtsma, T. (2023) Ontwerpen van een machine learning algoritme om hemodynamische verslechtering te voorspellen bij volwassen IC-patiënten.

Meerhof, J.J. (2023) Membership Inference Attacks on Federated Horizontal Gradient Boosted Decision Trees.

Meijer, J.J.W. (2023) Towards Future Proof Cryptographic Implementations: Side-Channel Analysis On Post-Quantum Key Encapsulation Mechanism CRYSTALS - Kyber.

Meijerman, T.R.I. (2023) Blocking Techniques on Privacy-Preserving Record Linkage.

Melero Martinez, D. (2023) IOTA-MSS : a pay-per-play music streaming system based on IOTA.

Melinceanu, Victor (2023) Finding maximal cliques in uniform hypergraphs using Baum-Eagon inequality.

Mendler, Gereon (2023) Gossip Layer Optimization for the IOTA Network.

Michael, Michael (2023) Moisture Optimization and Heating Process Automation of Freeze-Dried Coffee Production: A Case Study at Jacobs Douwe Egberts Peet's.

Michaylov, K.D. (2023) Exploring the Use of Steganography and Steganalysis in Forensic Investigations for Analysing Digital Evidence.

Middelkoop, Daan (2023) Mapping Hardware Descriptions to Bittide Synchronized Multiprocessors for Instruction Level Parallelism.

Mihai, Ilie-Sebastian (2023) A Systematic Evaluation of Microservice Architectures Resulting from Domain-Driven and Dataflow-Driven Decomposition.

Mihalache, Nicolae (2023) Scaling Out with Microservices: A Database-Centric Approach to Monolithic Application Decomposition.

Miksik, M. (2023) Fine-tuning transformer models for commit message generation and autocompletion.

Mintuș, Sandu-Victor (2023) Support New Programming Language in RefDetect.

Mishra, M.K. (2023) Generating Video Game Quests From Stories.

Mo, Alexander (2023) Transformer Offline Reinforcement Learning for Downlink Link Adaptation.

Mocanu, D. (2023) Modeling and Analyzing Board Games through Markov Decision Processes.

Mol, G. (2023) Developing a platform for the KUKA iDo social robot.

Morad, Peshmerge (2023) Towards a Standard Fine-Grained Part-of-Speech Tagging for Northern Kurdish.

Morales Ortega, Luis Rodrigoandrés (2023) A Digital Twin for Ground Water Table Monitoring.

Mourik, F.G. van (2023) IterSHAP: an XAI feature selection method for small high-dimensional datasets.

Mulder, Tim (2023) A personalized dashboard for sim racing.

Muller, M.W. (2023) SPaS: Sparse Parameterized Shortcut Connections for Dynamic Sparse-to-Sparse Training.

Mustaf, Mergim (2023) A Framework for Integrated Prescriptive Maintenance and Production Planning and Control Simulation Models.

Mutruc, Vlad (2023) User Centric Quality of Service Improvement in IoT Networks: A closed Loop Approach.

Mysliwiec, D. (2023) AI-Composed Music for User Preference Using Reinforcement Learning.

Naik, Nilay Prashant (2023) Application Portfolio Management Maturity : A Grounded Theory investigation on the processes and expected benefits.

Nambinayakanahalli Hanumantha, Dharanish (2023) Improving the autonomous navigation of a care robot by following social norms in a care environment.

Nardi Dei da Filicaia Dotti, F. (2023) Use of camera sensors to deduce relative velocity of bicycles to prevent accidents.

Nechiti, Alexandru-Tudor (2023) Anomaly Detection in Blockchain Networks.

Neinders, L.J. (2023) Improving Trackmania Reinforcement Learning Performance : A Comparison of Sophy and Trackmania AI.

Neta, Liran (2023) Adjusting Clarifying Questions to User’s Profile.

Neupane, Nischal (2023) Explaining Hiccup Predictor using Layerwise Relevance Propagation.

Nielen, J.J. van (2023) Dynamic Detection and Classification of Persistence Techniques in Windows Malware.

Nizamudeen, M.F. (2023) Investigating the Impact of AI Tools on Programming Education.

Nofulla, Jorges (2023) Deep Learning-based Change Detection and Classification for Airborne Laser Scanning Data.

Onofrei, Andrea (2023) Impact of Advertial Data Augmentation on Robust Indoor Scene Recognition: An Evaluation Study.

Oorschot, D.H.M.A. van (2023) VCLLVM: A Transformation Tool for LLVM IR programs to aid Deductive Verification.

Oosterhout, Janneke van (2023) Formal Verification of Lightweight Decentralized Attribute-based Encryption.

Oosterhout, S.H. (2023) AI as a Creative Catalyst : AIs role in design, and measuring AI-based idea generation.

Oral, Lara (2023) Move4Music : An Adaptive Sound System To Prompt Connection During Neurodiverse Dyadic Interactions.

Othmer, Benjamin (2023) An Empirical Study of Directory Service Dependencies.

Palanikumar, C. (2023) A process mining framework for continual service improvements.

Pan, An (2023) Party on? Inferring campus parties from WiFi logging.

Pandey, S.S. (2023) A Comparative study of BERT-CNN and GCN for Hate Speech Detection.

Park, Sanghyeop (2023) Personal Artificial Intelligence Coach For ‘League Of Legends’.

Patel, Nishit (2023) Downscaling Land Surface Temperature using SAR images : A Machine Learning framework.

Paulissen, J.W.H. (2023) KamerMaker : A Novel Approach to the Reconstruction of Personal Indoor Spaces in Virtual Environments.

Paulussen, Z.M. (2023) Facilitating the co-creation of AI-enhanced HRM systems: A systematic literature review.

Peetsma, Jasper (2023) The Development of a Novel Method for Measuring Biomechanical Features of Agility Using Markerless Motion Capture.

Pennings, H.E. (2023) On the use of pre-trained image classifiers for fingerprint-based indoor localization.

Peters, D.J.T. (2023) Integrating operational and tactical decision-making in spare part inventory management.

Petrov, A.P. (2023) Experimentally finding graphs that minimize Wiener-entropy.

Petrov, Aleksandar (2023) Applying Heat Maps on a Traffic Sign Detection Case Study.

Peut, A.M. van de (2023) Breathless Battles : The Optimization of an eHealth Application for Support in Self-Management for COPD patients with Complex Chronic Conditions through Human-Centered Design.

Phan, T.H.G. (2023) An Implementation Methodology for Augmented Reality Applications.

Pieterse, Wybe (2023) The difference in UX between open and closed questions for novice users in conversational search.

Pintilie, Alexandra (2023) Data collection and user engagement in eHealth applications focused on canine health.

Pirinski, Vasil (2023) Effectiveness of Modular analysis on Attack Trees using Binary Decision Diagrams.

Pištek, Andrej (2023) Dynamic variable reordering for Binary Decision Diagrams.

Pompe, Babiche L. (2023) Empathic chatbot for complaint handling in customer service.

Poozhiyil, Aditya (2023) Exploring Multimodal Data for Crime Recognition.

Popa, Andrei (2023) Gotta adjust them all! : Dynamic Difficulty Adjustment of Role-Playing Games Through Procedural Generation of Non-Player Characters.

Popovs, V. (2023) Item availability restricted.

Postma, Mart (2023) Best Practices for Big Data Management in the Sports Industry.

Preuß, Oliver Ludger (2023) Multi-Objective Algorithm Configuration on Multi-Modal Multi-Objective Optimization Problems.

Raczkiewicz, Michal (2023) Better Approach To Mobile Ad-hoc Networking in MaritimeManet.

Raicevicius, K. (2023) Digital finance and its effects on businesses, governments and society.

Rarenco, Andrei (2023) Investigating the Performance of Deep Learning Algorithms for Muscle Activation On/Off-Set Detection in Horse Surface Electromyography (sEMG) Data.

Raven Garcia, J. (2023) A geometric port-Hamiltonian modelling and simulation framework for morphing-wing UAVs.

Ravichandran, R. (2023) Improving accuracy of vehicle tracking by fusing IMU and GPS.

Redelijkheid, M.N.F. de (2023) Monitoring network traffic and responding to malicious traffic for IoT devices in 5G network slices.

Resing, Marvin (2023) Industrial Cobot Sound Design Study : Audio Design Principles for Industrial Human-Robot Interaction.

Reus, M.B.C. (2023) Graph generation for synthetic stock data.

Reuvers, E. (2023) Extracting information from audio data gathered in a virtual reality museum tour to determine personal preferences.

Reyers, P.M. (2023) A comparative analysis of audio steganography methods and tools.

Ridder, Frank (2023) Adaptive Random Forest on FPGA.

Rienstra, K.D. (2023) Assessing the Potential of FHIR as a Standard.

Rietberg, Max (2023) Quantified Photoacoustics for Carotid Artery Imaging.

Rietberg, Max (2023) Quantified Photoacoustics for Carotid Artery Imaging.

Rijnbergen, K.J. (2023) Pattern Analysis of Time Series Data.

Ritsema, Stan (2023) A Disentangled Representation Learning Approach for Deblurring Microscopy Images.

Roerink, Jasper (2023) Ordering policy optimisation for forecast driven orders within HTM-Aerotec.

Room, J.T. (2023) Transducer selection & protocol compliance detection algorithm design as a basis for automated point-of-care lung ultrasound screening of tuberculosis.

Ruiter, Justin (2023) Understanding money flow in ransomware.

Rump, Arthur (2023) Apollo++: Automated Assessment of Learning Outcomes in Programming Projects.

Rus, A.C. (2023) NAISS : Network Authentication of Images to Stop e-Skimmers.

Rusnac, Nicolae (2023) Improving the Performance of Multi-Objective Evolutionary Algorithms for Fault Tree Inference.

Saaltink, Caz (2023) Solving BFL Queries: From BDDs to Quantified SAT.

Sakhi, Tarek (2023) Effectiveness of natural language processing techniques in categorizing scientific articles by research methodology.

Salce, Miss Yasmin (2023) Applying a Machine Learning Model to Estimate the Current State of Charge of Energy Storage Devices.

Sallander, J.G.D. (2023) DumpingMapper : Illegal dumping detection from high spatial resolution satellite imagery.

Samy, Omar (2023) Tracing Data Utility for Noise Adding Plugins in Process Mining.

Satici, Arda (2023) Leveraging Machine Learning and Process Mining to Treat Anaemia with the Help of Prescription Records.

Savin, Nicu (2023) Exploring Indoor Localization with Transformer-Based Models : A CNN-Transformer Hybrid Approach for WiFi Fingerprinting.

Scholz, C. (2023) Interactive Music Installation: Raising awareness about the lack of diversity at music festivals.

Schulz, C. (2023) Design and Evaluation of a Prototype for a Platform for AI algorithms in Medical Imaging : A Human-Centered Approach.

Schuurman, S.J. (2023) Assessing Interoperability Assessment.

Seinhorst, J. (2023) Order optimization : a comparative analysis of heuristics and machine learning.

Seinstra, Valerie (2023) Information security awareness training to combat social engineering attacks : A Meta-Analysis.

Sessink, Joost (2023) Parallelising a probabilistic model checker.

Shametaj, E. (2023) Sim racing : a performance-enhancing dashboard.

Sharma, A.K. (2023) Securing the Digital Frontier : Identifying and Closing Security Gaps with MITRE ATT&CK and Open-Source Detection Controls.

Shynkar, Albina (2023) Investigating the influence of code generating technologies on learning process of novice programmers in higher education computer science course.

Siani, Costanza (2023) Unleashing the Potential : Experimental Study on the Effectiveness of Nudging Strategies in Webpage Design for Emerging Fintech Startups.

Siderius, J.C. (2023) Teaching (Tiny)ML using a tangible educational kit.

Singh, Daksh (2023) Modelling habitat suitability for the leopard in southern India through Ensemble Species Distribution Modelling.

Smale, R. (2023) Platform-independent runtime quality metrics for integrations.

Smeets, Tom (2023) µScope: A Reusable Interface For Debugging STM32 Microcontrollers.

Smienk, Jeroen (2023) Natural language search for personal information retrieval : Benefits and limitations to the user’s experience in bookkeeping software.

Smit, Gijs de (2023) Cycling Maneuver Prediction Using Bicycle-mounted Motion Sensors.

Socha, Konrad (2023) Fuzzy Markov chains.

Sokolovas, Erikas (2023) Multimodal Neural Networks and Data Preprocessing for Ship Trajectory Prediction Using AIS, Radar, ENC and Weather Data.

Sombroek, E.S. (2023) Establishing a TCP connection between a Graphical User Interface and the controller of a robot.

Sonneveld, J.J. (2023) Profiling Users by Access Behaviour Using Data Available to a Security Operations Center.

Souvannasouck, M.K. (2023) Modeling and Analyzing Treatment Protocols for Pediatric Asthma Management Using the UPPAAL Timed Automata Framework.

Stapel, F.T.A. (2023) Automated Grade Classification and Route Generation with Affordances on Climbing Training Boards.

Stavropoulos, T. (2023) A comparative analysis of network data distribution in active DNS measurements. ZDNS vs OpenINTEL.

Stelzer, Lilly (2023) Influencing modern art experience through atmosphere in a virtual reality museum.

Straková, S. (2023) User-based Tailoring with Reinforcement Learning for an mHealth, COPD-focused Intervention for Increasing Physical Activity.

Streapco, Lia (2023) Morphing Attack Detection (MAD) based on the location of the corneal specular highlights.

Stribos, R. (2023) A comparison of anomaly detection algorithms with applications on recoater streaking in an additive manufacturing process.

Sueters, M.L. (2023) Reducing the total travelling distance of order picking in a warehouse by introducing class-based storage.

Sun, Mengjie (2023) Ad Quality Analysis : Data Scientist Internship Report.

Sun, Yifan (2023) Effectiveness of Fourier-basis noise on improving adversarial robustness.

Sun, Yiyou (2023) Confidential.

Sun, Zhirou (2023) Impact of auditory modality on user experience during augmented outdoor tourism navigation and exploration tasks.

Surojaya, Ali (2023) Development of Deep Learning Model for Building Opening Detection as the Application of Unmanned Aerial Vehicle (UAV) in Urban Search and Rescue Mission.

Surya, Siddharth (2023) Detection of Japanese Knotweed Beside the Road using Deep Learning.

Tan, J. (2023) Hollow-pass : hide your pattern password from shoulder surfers.

Teymurlu, Ibrahim (2023) Understanding the Dynamic Sparse Training Models.

Tobé, Mathijs (2023) Measuring pleasantness of bicyclists through heart rate variability over self-reports.

Tran, Duc Duc (2023) Applying compress techniques to lower latency on real time object detection application in Android device.

Tran, T.H.A (2023) Explainable Artificial Intelligence in Job Recommendation Systems.

Treub, Tjebbe (2023) Enhancing the Shopping Experience in Flooring Specialty Stores with Phygital Design.

Uchoa Bezerra, H. (2023) Applying nucleotide sequence alignment techniques to side channel analysis.

Uilkema, Tim H. (2023) Selecting the Optimal Machine Learning Framework for LiDAR-Based Railroad Inspection and Maintenance at Strukton Rail: A Comprehensive Evaluatio.

Umamahesh Ritty, Nikitha (2023) Predicting product characteristics using neural networks.

Valtas, Georgios (2023) Does Prior Knowledge Affect CNN and LSTM Models on Classifying Improper Sitting Postures?

Veerman, M.L. (2023) Asset Localization using the Bluetooth Fingerprinting technique.

Veld, N.E.D. in het (2023) Control of the Production Cell on Raspberry Pi using a real-time robot-software framework.

Veldmaat, J.P. (2023) Designing a Testbed for Human Activity Recognition Using Multiple ESP32 Microcontrollers with Wi-Fi and Serial Data Transfer.

Velikov, Kristiyan (2023) Enhancing Semantic Segmentation for Indoor Environments: Integrating Depth Information into Neural Networks.

Velmurugan, Pranesh (2023) Species Distribution Modelling : A Multimodal Learning Approach.

Veltman, Mike (2023) Comparative Study of Fault Detection and Diagnosis for Low-Speed Ball Bearings.

Venugopal, Arun (2023) A regression-based Convolutional Neural Network for yield estimation of soybean.

Verschuren, S.P. (2023) On the effects of smoothing on machine learning performance in fatigue detection using sensor data.

Veverita, Valeria (2023) LSTM Modelling for Energy Prediction in the Current Global Context.

Vianen, S. van (2023) Design and development of a sports data warehouse for FC Twente.

Visser, P. (2023) xBib : the language design and implementation of a transformation language.

Vissers, W.K. (2023) Detecting stomata with computer vision for plant breeding.

Viste, N. (2023) Implementation of a visual editor for SHACL-based metadata schemas.

Vlastuin, A. van (2023) Using Machine Learning to Improve the Cost Estimation Process at a Versatile Manufacturing Company.

Vo, N.M. (2023) Touch-screen application’s design guidelines for older adults with dementia.

Vorage, J.V.W. (2023) Heuristics of the graph covering problem.

Vos, D. (2023) Losslessly compressing radio spectrum related data for archival.

Vos, Gerton de (2023) Smart devices bij Defensie, van reactief naar proactief?

Vos, R.H.A. (2023) Creating a defense against face de-identification.

Voskamp, L.G. (2023) Visualising holistic patient profiles for breast cancer patients with cancer-related fatigue.

Voskeuil, A.F. (2023) The influence of an embodied coxswain on the social presence within Virtual Reality rowing.

Vreeman, H.S. (2023) A new approach to reducing the negative effects of social media on the well-being : profile badges.

Waal, Monique de (2023) Designing a graphical user interface for gait analysis in dogs.

Wal, P.R.D. van der (2023) Diversifying Multilayer Perceptron Ensembles in a Truly Sparse Context.

Wang, Boxuan (2023) Examining Lexical Alignment in Human-Agent Conversations with GPT-3.5 and GPT-4 Models.

Wang, JInze (2023) The development of an interactive mountain bike simulator to help injured mountain riders reduce the fear of re-injury while cornering.

Weger, K.J. de (2023) A Fault Tree Dedicated Web Interface Design: Portfolio Website Displaying Fault Tree Explanation and Visualisation Projects.

Wehning, T. (2023) Improving Performance of Multiple Sequence Alignment through Maximal Exact Match Identification.

Weiss, Jonathan (2023) Cyber Supply Chain Risk Management in the Netherlands: Investigating Structural Elements and Drivers in the Context of EU-Cybersecurity Regulation.

Wentink, J.S. (2023) Envisioning future applications of Augmented Reality: An agriculture 4.0 case study.

Wentink, M. (2023) Creating and evaluating a lyrics generator specialized in rap lyrics with a high rhyme density.

Wentzel, S.D. (2023) Exploring the relationship between linguistic alignment and sentiment - in online discussions.

Werf, Jasper van der (2023) Learning Behaviour of Sparse Point-Voxel Convolution: Semantic Segmentation of Railway LiDAR scans.

Wesselink, Bram (2023) Reducing resource utilization when simulating hardware in CLaSH.

Wiesniakowski, K. (2023) Predicting time series of water levels using advanced AI models.

Willegers, Jonathan (2023) The Face of the Farm on Social Media: Human, Animal, Plant, or Robot?

Willemsen, L.G. (2023) A Simple Homomorphic Obfuscation Scheme over Automorphisms.

Winters, A. (2023) Automated control prioritization based on generating sector-based threat profiles.

Wit, R.A. (2023) Interactive feedback in museums.

Witmans, R.C.H. (2023) Improving nothingness : refactorings on whitespace.

Witt, S.J. (2023) An Internet-wide investigation of publicly accessible databases.

Wolters, Antoon (2023) Anomaly detection in IoT network traffic.

Wu, X. (2023) LoRa-where? Analysing signal pick-up from LoRaWAN sensors in the wild.

Yang, J. (2023) Item availability restricted.

Yildiz, Bugra Veysel (2023) The State of HTTPS Configuration of Public Websites Around the World.

Youn, Myungwon (2023) ALERT: Smart Lecture Room : Monitoring students’ concentration levels and providing feedback and stimulation, to improve learning quality.

Yuceturk, Salih Eren (2023) Enhancing Early Disease Diagnosis: Analysis of a Cassava Plant Dataset.

Zandbergen, Nikki (2023) QuestionMark : designing a benchmark for probabilistic databases.

Zeilstra, Pieter (2023) Explainable Diagnoses Prediction For General Practitioners.

Zenden, R. van (2023) The identity mangement solution that improves data sharing in logistics.

Zeng, Y. (2023) Learning data augmentation policies for computer vision using additive Fourier-basis noise.

Zhang, xuhao (2023) Design and Impact of Activation Functions for Sparse Neural Networks.

Zu, Xinrui (2023) Fast and Precise Lung CT Image Generation via Diffusion Models.

Zubavičius, R. (2023) Fluid properties estimation and pressure drop sensing based on Coriolis flow sensor using machine learning.

Zubcu, Cristian (2023) Effect of Normalization Techniques on Modernity Signatures in Source Code Analysis.

Zwiers, Jeroen (2023) BLE-based Relative Positioning in the Context of Targeted Bike-to-Vehicle (B2V) Communication.

Šerkšnas, Jurgis (2023) Implementing & Integrating Live Mission Recording with Starter Drones.

2022

Aanstoot, D. (2022) Graph rewriters as components.

Abbema, F. van (2022) Performing Bisimulation Minimisation To Parity Game Strategies To Improve Controller Quality.

Afia, A. (2022) The impact of graph properties on the complexity of attack tree analysis.

Ahmadov, Parviz (2022) Evaluating pose estimation and object detection models for the application in the minisoccerbal project.

Albers, Etiënne H.M. (2022) Environmental considerations in supply chain decisions: Proposing a new methodology for locating cross-docking terminals considering CO2e emissions.

Ammerlaan, W.S. (2022) Enabling joint exploration of virtual environments for treatment of substance use disorders using an asymmetric virtual reality approach.

Amur, Sri Harsh (2022) Intelligent Wifi Access Points for Diverse User needs: QoS Slicing in SDN Controlled APs.

Anghel, C. (2022) Effect of image quality in computer vision for semantic segmentation of road images.

Anjanappa, Geethanjali (2022) Deep learning on 3D point clouds for safety-related asset management in buildings.

Annink, E.B. (2022) Preventing soft-errors and hardware trojans in embedded RISC-V cores.

Anwar, Mian Tashfeen Shahid (2022) Techniques to Process point cloud data to perform HAR using Machine learning.

Arrieta Larraza, N. (2022) Few-shot deep learning models for acoustic scene classification in low-complexity scenarios.

Artolozaga, I. (2022) From personal to community knowledge : stimulating knowledge sharing among student groups in knowledge management platforms through interaction design.

Assaad, Malek (2022) Link Vulnerability Aware Task Deployment over Edge and Cloud.

Avramov, V.R. (2022) Automated grading of programming exams with JUnit and Semgrep.

Baas, T. (2022) Creating standardized process mining applications based on the open trip model.

Bakker, D.R. (2022) Autonomous emulation of adversary procedures in the (pre-)compromise domain.

Balamurali, S. (2022) An exploratory study to design and evaluate a dialogue system for a robot assisting the elderly in a care environment.

Baligudam, R. (2022) A Systematic Study of Gender and Religion Bias in Stories.

Bals, J. (2022) A comparative analysis of the multi-factor authentication protocols presented in the literature.

Batenburg, B. (2022) Performance of DNS over QUIC.

Bauhuis, Jan-Willem (2022) The future use of radiotherapy in the treatment of NSCLC and SCLC: a prediction.

Beernink, G.J. (2022) Taking the quantum leap: Preparing DNSSEC for Post Quantum Cryptography.

Belchev, B. (2022) Recommendations on bias : detect, mitigate, repeat.

Beld, J.J. van de (2022) Multimodal post-operative complication prediction for elderly patients with hip fractures.

Benkhelifa, M.R. (2022) Layout management on an interactive tabletop system.

Berenschot, L. (2022) Vital signs monitoring with an FMCW radar sensor.

Berg, M.A van den (2022) The estimation of rodent population in an area with the use of IR&RGB camera images and USV sounds.

Berge, C. ten (2022) Reverse engineer discontinued KUKA I-do robots and make them applicable for educative use.

Bhaskar, Rushvanth (2022) A Day in the Life of NTP : Analysis of NTPPool Traffic.

Bhutto, Muhammad Ramish (2022) Automating Privacy Policy Extraction And Summarization.

Biabani, Hamza Azhar (2022) A Closer Look at the Email Phishing Landscape.

Biswas, Biman (2022) Deep Learning-based Multimodal Fusion of Sentinel-1 and Sentinel-2 Data for Mapping Deforested Areas in the Amazon Rainforest.

Blankestijn, Arjan (2022) Millimeter-Wave Connectivity in Real World Vehicle-To-Vehicle Network Scenarios.

Bleumink, C. (2022) Verifying the Rewrite Rules of VerCors Using Interactive Theorem Provers.

Bloemen, S.P.R. (2022) Designing a dashboard development methodology for heterogeneous stakeholders in Dutch nursing homes.

Boe, M. (2022) Realtime and Onboard fault diagnosis of UAV motors using RNN prediction model.

Boer, S. de (2022) Pre-Processing Whole-Genome Datasets To Improve The Execution Time Of Selective Sweep Detection Tools.

Boeve, T. (2022) Comparative analysis between fast and basic scalar multiplication used in elliptic curve cryptography.

Bojorge-Alvarez, J. (2022) Re-assessing the effectiveness perimeter security & exploring attack surfaces at the Port of Rotterdam.

Boksem, Jorn (2022) Finding ways to improve the prediction accuracy of a model that predicts the outcome of a football match using machine learning.

Boretskii, I. (2022) Developing a system for suggesting alternative ways of visualizing data.

Bosch, R.R. (2022) Solving the dynamic container relocation problem to minimize transportation costs using approximate dynamic programming.

Bosma, H.R. (2022) Audio-visual Correlation from Cross-modal Attention in Self-supervised Transformers on Videos of Musical Performances.

Bourbon de Parme, Carlos de (2022) Detecting Stomata with Computer Vision for Plant Breeding.

Bovenkerk, Jasper (2022) Generating IMU data from video using deep neural networks for use in animal activity recognition.

Boysen, Yannic (2022) Evaluating Recurrent Neural Networks as Solution to User Action Prediction.

Bozov, P. (2022) 3D point cloud segmentation and automation for railway catenary arches.

Brandt, Jacco Hermanus (2022) Effectiveness of Oblivious RAM in cloud storage services.

Brattinga, M. (2022) LSTM-based Indoor Localization with Transfer Learning.

Bravo de Medina Arribas, J. (2022) Decisive Image Characteristics to Perform Image Steganography in DCT.

Bree, Sjoerd van (2022) Testing Copositivity in Pentadiagonal Matrices.

Bremer, B. (2022) Design of a fast control system reacting to non-sinusoidal voltage fluctuations.

Brink, K. van den (2022) FLEX : Force Linear to Exponential. Improving time series forecasting models for hydrological level using a scalable ensemble machine learning approach.

Brink, W. van den (2022) Weighed and found legacy : modernity signatures for PHP systems using static analysis.

Broeder, Gies den (2022) Human Activity Recognition using a mmWave Radar.

Broekhof, Ivo (2022) Replication and Analysis of the Berry-Sethi Parser for Ambiguous Regular Expressions.

Bruggink, T. (2022) Data & AI policies united: Picked to pieces.

Brugman, S.R.D. (2022) The development of a real-time monitoring system for fatigue detection on truckers.

Bujorianu, Alex (2022) Developing a Recommendation Algorithm for Patients Using the Healthentia Platform.

Bunda, S.T. (2022) Limited Resource Optimization for Face Recognition Neural Networks: Sub-byte quantization of MobileFaceNet using QKeras.

Campomanes V, Florencio (2022) Estimating Consumer Food Accessibility Across Urban-Rural Catchment Areas in Ethiopia.

Chae, Heejin (2022) Prototyping gamification of lifestyle application for prevention of obesity in young adults.

Chattopadhyay, A. (2022) Resilience of DNS infrastructure against DDoS attacks.

Chen, Y. (2022) GameEvolver: A tool to potentially automatically improve board games.

Chen, Yang Sophie (2022) Enhancing the Web Browsing Experience on Mobile Devices with AR Glasses.

Choi, Sua (2022) The design of ‘League of Legends’ decision support system for inexperienced players.

Choi, Y. (2022) Case studies for the necessity of the blockchain in self-sovereign identity.

Christiano, B.G. (2022) Formalization of tangle and tangle learning algorithm.

Chávez Sáenz, L. (2022) Creating interactive custom controller installations to improve a museum exhibition.

Claessen, C.T. (2022) Text Mining to Improve Education : An Evaluation of Text Mining in the Student Feedback Process.

Claßen, P. (2022) A practical approach to assessing critical continuity properties of assets in business & IT continuity management.

Copae, D.V. (2022) Using augmented software requirements for automatic classification.

Corts, R. (2022) Accelerating selective sweep detection software with the GPU architecture.

Couwenberg, F. (2022) Extracting Unseen Classes From Capsule Network Feature Space.

Couwenbergh, W. (2022) Detection of areas of interest in bending strain data for pipelines through 1D object detection.

Covaci, Andrei - Ion (2022) Wi-Fi MAC address randomization vs Crowd Monitoring.

Dadhich, S. (2022) Increasing the accuracy of rodent detection and estimation of the population with sensor fusion.

Daskalov, V.D. (2022) Bio marker-based COVID severity prediction and data quality exploration.

Davids, Aron (2022) Identifying plot holes in narrative stories by simulating events.

Di Flumeri, MSc Francesco (2022) Explainable AI for supporting operators in manufacturing machines maintenance: Evaluating different techniques of explainable AI for a machine learning model that can be used in a manufacturing environment.

Dibbets, V.L. (2022) Team-based learning through an interactive online medium.

Dichev, Konstantin (2022) Validating Belbin Roles Based on University Students' Discord Messages.

Diks, Vincent (2022) Detecting and interfacing urban litter using computer vision.

Dullaert, S.A. (2022) Friction and resistance as modalities for physicalizing data.

Duong, X.L. (2022) Estimate motor unit organization in Nociceptive Flexion Reflex using Convolutive Blindsource Separation and statistical signal analysis.

Eijkel, D.J. (2022) Anycast in the SCION Internet Architecture.

Elkady, O. (2022) SLAM for smart bikes.

Elskamp, David (2022) Visual Classification on HR-Crime dataset.

Erkko, M.A. (2022) Speeding up parametric model checking using GPGPU computation.

Eshy, A. (2022) Human activity recognition using two millimeter-wave radars.

Fattahi Mehr, Omid (2022) Data Augmentation using Fourier-Basis Noise.

Ferla, R.I. (2022) Exploring the GANformer for Face Generation : investigating the segmentation and smile augmentation potential.

Fujioka, T. (2022) Investigation of TOA/TDOA localization in the presence of receiver sensor position error.

Fürst, J. (2022) Validating XAI techniques in medical image diagnosis: A venture towards algorithm transparency in a socio-technical system.

Gadelmawla, Omar (2022) Exploiting shadows to infer 3D structures.

Gaisins, E. (2022) Are We All Back on Campus?

Geest, J.S.T. van der (2022) Preparing for wildfires avoidance by analyzing land cover maps.

Gemund, A.P. van (2022) Simultaneous Localization and Mapping In Smart Bikes.

Georgieva, Gergana N. (2022) Last-Mile Delivery Drone Acceptance: Increased knowledge does not imply increased acceptance.

Gerretzen, B.M. (2022) Information leakage via Certificate Transparency.

Gilbers, Jander (2022) Automatic Inference of Fault Trees using Reinforcement Learning.

Gkovopoulos, Georgios (2022) Design of a 3D printed actuation platform for concentric tube robots.

González-Novo López, F. (2022) Bike lane quality estimation under variable speed conditions using off-the-shelf motion sensors.

Gorgan, Andrei (2022) Enabling faster processing of big-data using GPU decompression.

Gorgan, D. A. (2022) Evaluating the practicality of using Blockchain in different use cases in the supply chain sector.

Gougoulis Dimitriadis, E. (2022) Sixthsense : outdoor collision avoidance assistant for the blind and visually impaired.

Graesel, H.S. (2022) Trust in Artificial Intelligence? The role of mental models, openness, and anthropomorphism in human-agent teams.

Grievink, Guus (2022) Model-based Probabilistic Diagnostics of Cyber-Physical Systems.

Groffen, M.M.L. (2022) Exploring identity matching for low quality images with the help of a pipeline for synthetic face generation.

Groot, Justin de (2022) Comparing alternative methods for a priori optimization of the slow-mode closure for the Lorenz 96 system.

Groot, N.E. de (2022) Improving data value by using best of worlds approach from government (authoritative), community and commercial data : a case of topographical data in the Netherlands.

Guducu, Izzet Berke (2022) Weighted Abstract Syntax Trees for Program Comprehension in Java.

Gulhane, Devesh (2022) What Face Would You Like To Have? : The Effects of an Avatar's Facial Features on Social Presence.

Guru Rao, Sathvik (2022) Ontology Matching using Domain-specific knowledge and Semantic Similarity.

Haarhuis, L.M. (2022) Exploring business opportunities of sentiment analysis : a guideline for businesses, from implementation to business value generation.

Hagens, B. (2022) Analysis of Stochastic Behaviour in Sokoban.

Halim, Ricco (2022) Decentralization, Scalability, and Security Trade-off in Blockchain System: Comparison on Different Approaches.

Harmsma, W.H. (2022) Automated detection of hidden failures in heating and photovoltaic systems of ‘Nul-op-de-meter’-housing Projects.

Hartog, D den (2022) Event record-based evaluation of business scenarios in the logistics domain using process mining.

Hauser, Brand (2022) GridShield on a Multilayered Electric Grid.

He, Wenruo (2022) Augmenting and Graph Scaling for Context-Aware Citation Recommendations.

Heeringa, T.J. (2022) The Effect of Higher Order Activation Functions on Infinitely wide Neural Networks.

Heijden, G.A.M. van der (2022) Building a sense inventory for Dutch healthcare abbreviations.

Heijnsbergen, I.M. van (2022) Importance of system dynamics in project management : a collection of case studies.

Hendriksen, S.J.F. (2022) Viability of anomaly detection aid for vessel traffic service operators.

Herbowo, Keanu Nurherbyanto (2022) Comparing Zero-Knowledge Proof Protocols for Practical Open Source Self-Sovereign Identity Systems.

Heuver, J. (2022) Markerless stride segmentation for canine pose estimation.

Hijlkema, Frank (2022) Direction-of-Arrival Estimation Using A Machine Learning Framework.

Hlukhau, Ihar (2022) Multiphoton microscopy for in-tissue imaging of micro-robots.

Hoevers, S.J. (2022) Discourse on Discord : An analysis of relations between users.

Hofstee, S.B.H.C. (2022) Analysis of pruning methods for compact neural networks on embedded devices.

Hoheisel, R.E. (2022) Ransomware as a tool for diversion and coverup. A possible modus operandi for advanced persistent threats? A (practical) Investigation into the Use of Ransomware as Masquerade and Distraction.

Hol, Valentijn (2022) Bit-packing and Hashing Evaluation in Explicit-state Model Checking.

Hoogteijling, S. (2022) The electrophysiological signature of epilepsy studied by artificial intelligence and explainable artificial intelligence.

Hop, Ivan J. (2022) On the Performance of Algorithms for Quantitative Verification.

Horn, D.M.J. van (2022) Process improvement using machine learning.

Horst, Jonas ter (2022) Machine Learning for Exchange Traded Fund Price Predictions.

Horst, Reinier L.C. van der (2022) Error Estimation for Output Prediction of Photovoltaic Systems.

Houtsma, R. (2022) An Explainable Machine Learning Approach to Risk-Adaptive Access Control.

Houtsma, Ramon (2022) An Explainable Machine Learning Approach to Risk-Adaptive Access Control.

Hove, K.W. van (2022) Threat analysis of RPKI relying party software.

Hristov, P. (2022) Designing an intrusion detection system for a Kubernetes cluster.

Huijsmans, Maarten (2022) The chatbot usability scale : an evaluation of the Dutch version of the BUS-11.

Huisma, G. (2022) Recursive island parsing : monadic lake parser combinators.

Hulter, J.G. (2022) Improving the integrated development environment of a legacy software platform.

Huynh, Mr. Quang Long Q.L. (2022) Analysis on relations between graph metrics and average consensus algorithm convergence speed.

Irfan, Tekinerdogan (2022) Online platform for supporting the development of assistive technology tools for disabled people.

Iskandar, Kevin (2022) 2FA SMSs: Influence of Cybersecurity Behavior & OTP Message Content on Security2FA SMSs: Influence of Cybersecurity Behavior & OTP Message Content on Security.

Isnaynizahra, N. (2022) Dashboard as a decision support tool to minimize empty miles in shipping network : locating region for improvement.

Jacobs, M.J.F. (2022) A software development project ontology.

Jafarli, Sevinj (2022) Providing DNS Security in Post-Quantum Era with Hash-Based Signatures.

Jangamguravepalli Bramhanadareddy, Deepika (2022) Modern customer expectations and their effects on Digital Transformation in SMEs.

Jansen, L.J.A. (2022) Assessing smart home security : a Zigbee case study.

Jansen, L.W.L. (2022) About the effect of white-box membership inference attacks on federated learning in large networks.

Janssen, N.E. (2022) The Evolution of Data Storage Architectures : Examining the Value of the Data Lakehouse.

Jaworski, M.Z. (2022) Particle swarm optimization of custom bitcoin trading algorithm.

Johannink, M.G. (2022) The impact of IT outsourcing on IT effectiveness.

Johanns, S.I. (2022) Performance comparison of FAME and MPB for simulating wave bands of photonic crystals.

Jutte, Annemarie (2022) The smart annotation tool : optimizing semi-automated behavioural annotation using an AutoML framework supported by classification correctness prediction.

Jutte, Annemarie (2022) The smart annotation tool : optimizing semi-automated behavioural annotation using an AutoML framework supported by classification correctness prediction.

Kalbiyev, A. (2022) Affective dialogue generation for video games.

Kampen, C.M. van (2022) Zero Downtime Schema Migrations in Highly Available Databases.

Karsten, Jarik (2022) Improving usability at BetterBe through API analysis.

Kasteel, M.B.M. (2022) Understanding textual interpretations with and without emoji.

Kellaway, M.C. (2022) Accelerating the SCION IP Gateway using programmable data planes.

Kempen, Lindsay (2022) ExpressTTS: Augmentation for Speech Recognition with Expressive Speech Synthesis.

Kenzhebay, Meruyert (2022) Planar roof structure extraction from Very High-Resolution aerial images and Digital Surface Models using deep learning.

Kerkhof, R.G. (2022) Benchmarking Car Dealership Efficiency using DEA NSBM.

Kester, L. (2022) Providing tailored advice for preparing for the ethics assessment procedure.

Kesteren, L. van (2022) Differentiating between facial landmark shifts due to pose variation and morphing.

Khan, Etienne (2022) Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers.

Khanal, Binita (2022) Using Machine Learning to Predict the Risk of Human-Elephant Conflict in the Nepal-India Transboundary Region.

Khavrona, Roman (2022) Analysing Internet route changes related to the Russia-Ukraine war using BGP historical data.

Kim, Hyeon Kyeong (2022) Visual Programming Environment to Generate Arduino Code for Wearable Toolkit.

Kim, Woong (2022) Design and Control of Efficient and Powerful Robot Joints.

Klink, Karel van (2022) Quantum Key Distribution in a Pan-European Network of National Research and Education Networks, Qualitative and Quantitative Aspects of Implementing a Quantum Key Distribution Network.

Klooster, L. (2022) VR CyberEducation : improving the human factor in cybersecurity through an educational virtual reality program.

Koc, M.A. (2022) Raising cybersecurity awareness of University of Twente students.

Koelewijn, Dirk (2022) Transformers on a Diet: Semi-Supervised Generative Adversarial Networks for Reducing Transformers' Hunger for Data in Aspect-Based Sentiment Analysis.

Koning, B. de (2022) Extracting Sections From PDF-Formatted CTI Reports.

Kooij, D. (2022) A Study on the Evolution of the Dutch Web.

Kool, B.B. (2022) Application of a neural network to the shift scheduling problem in supermarkets.

Koval, M. (2022) Blockchain in dairy supply chains : a literature review.

Kruif, Cato de (2022) Using d-NFGs to identify and eliminate dead code in C# programs.

Kuiper, Stef (2022) 3D Printing of Continuous Glass Fibre Reinforced Polypropylene Composites.

Kurzhals, H.D. (2022) Challenges and approaches related to AI-driven grading of open exam questions in higher education : human in the loop.

Kwakkel, D.J. (2022) Measuring well-being with a conversational agent.

Lange, MSc. Amy de (2022) Trial-and-Mirror: Enabling climbing movement exploration with interactive puppetry design to enhance out-of-action perceptual motor skill acquisition.

Lange, Valerian (2022) MapColPal - a color palette generation and testing tool for thematic maps.

Le, T.A.D (2022) Enhancing IMU-based smartphone context detection using Transformer.

Le, T.N.H. (2022) Aggregation in probabilistic databases : implemented for DuBio.

Leemans, T.T.J. (2022) Towards Serverless Enterprises: Developing the Enterprise Serverless Assessment (ESA) to assess and improve an organization’s fit and readiness for Serverless technology.

Leeuwen, Tessa van (2022) Project Management Methodology for Robotic Process Automation Implementation.

Lenders, L.B.L. (2022) Physical Perception of a VR Handshake.

Li, Q. (2022) Co-attention-based pairwise learning for author name disambiguation.

Li, S. (2022) MBench : a benchmark suite designed for database schema migration.

Liang, Y. (2022) Pose estimation with deep neural network trained on tiny datasets.

Liberato, M. (2022) SecBERT : Analyzing reports using BERT-like models.

Lin, T.Z. (2022) Past, present, and future of cybersecurity for ICT-professionals.

Lippur, Kristo (2022) Effects of edge computing growth on demand of data centre services.

Liu, Yujie (2022) Help Rich Info Get Richer: Enriching a semi-structured dataset using a Semantic Web approach.

Lobeek, Jaap (2022) A 3D deep learning method for the prediction of breast tumor response to neoadjuvant chemotherapy using MR images without the need for a tumor segmentation.

Logendran, T. (2022) Automatic Lung Aeration Assessment for Pediatric Lung Ultrasound Imaging.

Loohuis, Ingmar (2022) Exploring the Prognostic Value of Deep Learning Image-to-Image Registration for Immunotherapy Patient Monitoring.

Lorini, Giulia (2022) Addressing the Ransomware threat: TTP-based defensive recommendations and a strategy for achieving resilience.

Loukaidou, M. (2022) Towards a gamified recommender system to facilitate cognitive function in children with dementia.

Lucas, R.H. (2022) Supervised contrastive learning to overcome inconsistencies in exhaled breath data.

Luchtmeijer, D. L. (2022) Improving solutions of Service Engineer Planning using Mixed Integer Programming and Slack Induction by String Removal.

Luchtmeijer, Dorian L. (2022) Improving solutions of Service Engineer Planning using Mixed Integer Programming and Slack Induction by String Removal.

Malek, Michael (2022) Textual Clustering for Telecommunication Accident Recommendations.

Man, T. (2022) Modelling Security Architectures of Collaborative Networks.

Mansvelder, F.M. (2022) Dutch language specific KPI exploration and recommendation for maintenance scheduling.

Marčetić, N. (2022) Community-based design to help older adults to increase their physical activity.

Mauritz, R.R. (2022) Planning in supply networks using aggregated resource feasibility.

Mazilu, I. (2022) Defocus blur synthesis and deblurring through interpolation in the latent space.

Meent, Tijmen van de (2022) A comparative study on lightweight authentication protocols in IoT.

Meijer, M.P. (2022) An Approach at Social Relation Recognition in Egocentric Videos using Pose Estimation.

Menifer, Savio (2022) Firefly Island: Exploring intimacy in social VR.

Merchan, M. (2022) Anomaly detection in IoT : federated learning approach on the IoT-23 Dataset.

Mesie, P. (2022) The Effect Of Context Removal In Sentiment Analysis On News Articles.

Meulenkamp, T. (2022) Parser Benchmarking for Legacy Languages.

Meyers, B.J. (2022) Analysing the resilience of 5G networks in the Netherlands.

Middelraad, F. (2022) This laptop has great coffee : training a Dutch ABSA model from customer reviews.

Minnen, Matthijs van (2022) CNN Accelerator Throughput Improvement using High-Level Synthesis for FPGA.

Miu, Ioana (2022) A Reference Model for Decarbonising the Passenger Aviation Ecosystem.

Moghaddar, A.A. (2022) Enhancement of Formula One Driver Performance by Group Driven Process Learning.

Mokhtar, A.B.A. (2022) Object Detection For Top View Images In Dairy Farming.

Molder, S. te (2022) Improving the order picking performance at Scania Production Zwolle.

Molenaar, K. (2022) Real-world performance analysis of signcryption and sign-then-encrypt schemes for resource-constrained IoT devices.

Mollah, H. (2022) User stories applied for end-to-end web testing.

Mulder, P.W. (2022) A comparative analysis of the computation cost and energy consumption of relevant curves of ECC presented in literature.

Nae, Teodora (2022) Predicting COVID severity using machine learning methods : -Comparison between real life and mimic dataset-.

Naguine, P.V. (2022) Subpopulation Process Comparison and Bottleneck Analysis: A Case Study of Frozen Shoulder.

Nair, M.G.N (2022) Item availability restricted.

Nastase, Tudor (2022) Improving safety of e-bikes with automated systems: using an ad-hoc sensor network to prevent car to e-bike accidents.

Navarro Di Pasquale, J. (2022) Robust training using a push-pull inhibition layer for adversarial robustness in convolutional neural networks.

Neacsu, T. (2022) From EDIFACT to OpenTripModel: analysis, migration and guidelines based on data from real-world logistics companies.

Nedelchev, Kristian (2022) Performance evaluation of Map implementations in Java, Python and C#.

Nelson, D.J. (2022) Privacy-preserving counterfactual explanations to help humans contest AI-based decisions.

Ni, Xuefei (2022) Gamification design for enhancing user experience of rail travellers.

Niculae, T.F. (2022) Edge server placement on traffic lights for smart city services.

Nieuwenhuis, S. (2022) Exploring the Implementation of Network Architecture Search (NAS) for TinyML Applications.

Nijhuis, S.P.G. (2022) Dark web markets : what can they teach us?

Nijhuis, W.H. (2022) An audio based feature detector for shavers using Artificial Intelligence.

Nijkamp, Bas (2022) A High Throughput Sorting Accelerator using an Intel PAC FPGA.

Nijland, J.G.W. (2022) Gamification of cyber security awareness training for phishing against university students.

Nijskens, Lotte (2022) Contrast generalisation in deep learning-based brain MRI-to-CT synthesis.

Nisslmueller, Utz (2022) LOLBin detection through unsupervised learning : An approach based on explicit featurization of the command line and parent-child relationships.

Niu, Z. (2022) Develop and adopt the organizational cybersecurity culture in the Covid-19 teleworking scenario.

Nowee, Stijn (2022) Reliability analysis of Triple Modular Redundancy.

Oberhofer, L. (2022) Item availability restricted.

Olmezoglu, C. (2022) Causal analysis of safety violations in DyNetKAT.

Ooijevaar, I.H.J. (2022) Design of a user-friendly controller for the Sunram 7 with safety features to assist radiologists in MRI-guided breast biopsy.

Paalvast, Olivier (2022) Representing Ultra Low Dose CT scans as Chest X-Rays : how far can and do we need to go?

Palande, Shalvi (2022) Breathe with me : Designing and Evaluating Wearable Visual and Vibrotactile Displays for Colocated Breathing Synchronization.

Pandey, Shivang (2022) Snow Depth and SWE estimation using Multi-sensor Microwave and Optical Remote Sensing Time series Data for Indian Himalayas.

Pasquarelli, Leonardo (2022) Extending Java Collections for List and Set Data Structures.

Pavlov, Nikolay (2022) Data Visualizations and Modeling of Environmental Risks in Green Areas.

Pavlov, V. (2022) Security aspects of digital twins in IoT platform.

Pawirotaroeno, Rezfan (2022) Space Internet Congestion Control : optimising loss-based congestion control algorithms for increased throughput over satellite-terrestrial communication networks.

Peeters, BSc Bart (2022) Exploring human relationship recognition in egocentric videos using deep learning techniques.

Peeters, D.W.M. (2022) Physicalization of dynamic, physiological data.

Pennestri, Pietro. (2022) An FPGA based sensor fusion algorithm for IMU data processing.

Perik, L.W. (2022) An analysis of the decentralization and effectiveness of Lightning Network.

Peters, M.D.J. (2022) Extending explainability of generative classifiers with prototypical parts.

Petrasch, Melissa-Kim (2022) The Physicality of AI and its meaning for Sustainable AI : A Discussion of Sustainable AI for Sustainable Fashion and how to Approach it.

Pham, Nguyen Hoang Dung (2022) Dynamically Allocating Network Resources for Teleoperation Applications using Intent-based Inference.

Pocheva, Venelina (2022) Outsourcing Prioritization for Bottleneck Processes Using Process Mining: A Logistics Case Study.

Popov, Dimitar (2022) How Does Encouragement in Human-Robot Interaction Affect People’s Pro-Social Behavior? An Experimental Study on Human-Robot Interactions.

Popovici, Andrei (2022) Analysing Real-Time Vision-Based Pose Estimation Algorithms for RITH Purposes on Embedded Devices.

Prakken, E.B. (2022) Design, modeling, and control of a novel multirotor UAV with embedded 3D-printed thrust force sensor.

Prasad, Akshay (2022) Investigating whether typosquatting targets children.

Prasad, Pralad (2022) Automatic Clinical Deterioration Monitoring using Machine Learning Techniques Post Surgery.

Przadka, Bartosz (2022) CAD model reconstruction from the LiDAR scan of the catenary arch.

Qazi, A. (2022) Cars and social media : a greener future.

Rademaker, F.M. (2022) Subpopulation process comparison for in-hospital treatment processes : a case study for sepsis treatment.

Rajan, MSc Vaibhav (2022) Generating temporal 3D city models of Shahjahanabad for exploratory ground-level visibility analysis.

Ramón Gómez, Nerea (2022) An end-to-end approach to a Reinforcement Learning application in the transport logistics.

Ranjan, H. (2022) Item availability restricted.

Reitsma, B. (2022) Improving the Planning Process of a Complex Pickup & Delivery Problem by Applying a Constructive Heuristic and an Adaptive Large Neighbourhood Search.

Rekker, W. (2022) Verification of a SysML railway specification with a translation to UPPAAL.

Rengers, J.J. (2022) DDS in a Zero Trust Cloud Native Environment in the Naval Domain.

Rietvelt, D.C.J.C (2022) Extracting information from funding opportunities using state-of-the-art NLP method BERT with minimized data annotation.

Rikken, T.W. (2022) The application of hidden Markov models for economic state prediction and the calculation of economic state transition probabilities.

Rikkers, Vasco (2022) The Use of Story-based Gamification in USB-based Attack Prevention.

Riphagen, Quinten (2022) The deepfake problem : Developing a novel maturity model for forensic image authentication research.

Ritmeester, J.C. (2022) Comparison of common signal pre-processing techniques for long-term sEMG-based knee angle estimation.

Rizvi, Mohammad Abbas (2022) Automated Electronic Component Selection : a Machine Learning approach.

Roelink, M.J. (2022) zk-SCHNAPS : enforcing arbitrary password policies in a zero-knowledge password protocol.

Roode, G. de (2022) User privacy in cryptocurrencies.

Ros, M.F. (2022) Exploring Fishing Vessel Activity Classifications using Machine Learning.

Rutgers, Nils (2022) Point cloud based semantic segmentation for catenary systems using deep learning : Compressibility of a PointNet++ network.

Römer, J.G.W.T. (2022) Real-time pitch detection using resource constrained IoT device.

Sanchez, Bryan (2022) Automatic detection and estimation of the area of buildings.

Sandberg, Aaron (2022) Can data from Twitter produce useful feature suggestions in the audio streaming service field? - An example of Spotify.

Santen, A. van (2022) Spot the difference : Using Procrustes analysis on semantic features to enhance the performance of Facial Recognition Systems.

Santiago Garcia, Eric (2022) Country-independent MRTD layout extraction and its applications.

Sastry, Srikumar (2022) Super Paretos: Bayesian Active Meta Learning for Spatial Transferability of Deep Learning Models.

Schaaf, Jurre van der (2022) Using reinforcement learning to control hydrofoils.

Schaik, Eric van (2022) Improving the Informativeness of Abstractive Opinion Summarization.

Schmit, C. (2022) Offloading Strategies for the Rendering Process in Edge-enabled Virtual Reality Games.

Scholte, Harmen (2022) Regrowing Strategies for Dynamic Sparse Training.

Scholten, Jeroen (2022) Gain insights in the logistic processes at Amsterdam Schiphol Airport and determine solutions to limit capacity bottlenecks.

Schooltink, F. (2022) A simulation of the ecological impact of three smartphone strategies.

Schuttert, W.J. (2022) Design and Optimisation of Roller Coaster Elements using Reinforcement Learning.

Schwemin, L. (2022) Artificial Intelligence Conversational Agents : Using Card Sorting to evaluate the Chatbot Usability Scale (BUS-11), and investigate this in relation to Chatbot Experience.

Seip, H.M.C. (2022) Hospital robots : an experimental study on communicating urgency using non-semantic speech and built-in LED’s.

Shafee, T. (2022) Governance of cloud storage - A secure cloud storage strategy to maximize data sovereignty.

Shi, Z. (2022) Mining and Utilizing Patent Related Data in Quantifying the Societal Impact of Security Technologies.

Shumye, A.M. (2022) Planning the last-mile delivery of humanitarian aid using drones and trucks.

Siderova, Aleksandra (2022) Tree Transduction as a Means for Efficient Sentence Simplification.

Sierink, T.G. (2022) Active Reconstruction Attacks on 2D Range Databases.

Sijs, R.F.B. van der (2022) Item availability restricted.

Singh, Shalini (2022) FIFA 2022 game analysis using machine learning & computer vision.

Sloot, Emma (2022) Electronic health record from a lab information system.

Smit, P.J.M. (2022) Visual place recognition under image corruptions.

Smits, J.J. (2022) Improving integration Platforms as a Service through the addition of enterprise data catalog features.

Smits, J.P.G. (2022) Callisto - Selecting Effective Mutation Operators for Mutation Testing.

Snoijer, Jesse (2022) Are classical features still relevant in the era of deep learning?

Solovyeva, Olga (2022) Investigation of Quality Measures in Cyclists’ Dataset Using Dimensionality Reduction Techniques.

Sowa, A.M. (2022) Development of a computer vision-based system for recognising fatigue of truck drivers.

Sreenivas, Gokul (2022) Mapping the hotel booking experience of an online travel agency (OTA) to optimize the payment flow and improve localization.

Staal, P.J. (2022) On Productive, Low-Level Languages for Real-World FPGAs.

Stam, R.G.R. (2022) Assessing organizations’ readiness for Agile at Scale adoption.

Stanculeanu, G.O. (2022) Assessing Russia’s isolation from the web following their invasion of Ukraine using the DNS root system.

Steerneman, E.H. (2022) Exploring the effect of merging techniques on the performance of merged sparse neural networks in a highly distributed setting.

Stoev, Martin (2022) Online Parent Monitoring Tool.

Stoian, N.A. (2022) Towards deep learning frameworks for the analysis of magnetic flux leakage captures.

Stoica, E. (2022) A student’s take on challenges of AI-driven grading in higher education.

Straathof, T. (2022) Prediction of energy consumption of rail freight transports using machine learning.

Strijbosch, D. (2022) Proposing an ontology for human-related crime recognition in videos.

Suijdendorp, B. (2022) Item availability restricted.

Sustronk, J.J. (2022) Analysing Cyber Threat Intelligence Data Using Fully Homomorphic Encryption.

Szabó, Krisztián (2022) Morphing robust face recognition.

Szewczyk, J. (2022) Item availability restricted.

Tareke, Bedru Wudye (2022) Visible cadastral boundary extraction using VHR remote sensing images: A deep learning approach.

Tazelaar, Steven (2022) Automatic labeling of road quality using machine learning.

Theodorakopoulos, Daphne (2022) Identifying Covid-19 Shortages with the Help of an Automatically Constructed Knowledge Graph.

Tian, X. (2022) Reconstruction-based Anomaly Detection with Machine Learning for High Throughput Scanning Electron Microscope Defect Inspection.

Tijink, M.L. (2022) Fusing Forensic Features and a Face RecognitionSystem on Lookalike Faces.

Tilburg, A. van (2022) Submodular functions and M-convex sets.

Tilburg, A. van (2022) Submodular functions and M-convex sets.

Timmerman, L.D. (2022) WM/Reuters fixing rate prediction for algorithmic FX trading using machine learning.

Timmerman, Luc (2022) Performance Testing Owl, Parser Generator for Visibly Pushdown Grammars.

Tintelen, B.F.M. van (2022) Feature extraction and selection on sparse, complex, sensor-based exhaled-breath data sets.

Todorovic, D.Q. (2022) Bringing Intelligence to Wireless Sensor Nodes: Improving Energy Efficiency and Communication Reliability in Sensor Nodes.

Tolboom, L.C. (2022) Exploring type 2 asthma phenotypes and taking steps towards measurements of respiratory mechanics during exercise.

Tomov, N. (2022) Converting binary decision diagrams to and-inverter graphs using prime-irredundant covers.

Tonchev, Viktor (2022) Using accelerometer and gyroscope sensors to differentiate between eating movements associated with different foods.

Trusin, Cristian (2022) The effect of the Russian-Ukrainian conflict on the Internet from the perspective of Internet eXchanges.

Tsige, Girma Zewdie (2022) Scan-vs-BIM automated registration using columns segmented by deep learning for construction progress monitoring.

Tsintsov, Y.K. (2022) A Comparison Between the Effectiveness of a Virtually and a Physically Present Robot when Evoking Prosocial Behavior in Humans.

Urban, Wojciech (2022) Studying human behaviour to prevent successful spear-phishing attempts.

Vada, H. (2022) Comparative analysis of multi-factor authentication schemes for Internet of Things.

Vaish, P. (2022) On multi-stage job processing with asymmetric transition costs between operations.

Varenhorst, I.A.M. (2022) GridShield : Robust Control Algorithms to Prevent Power Outages.

Veldman, T.C. (2022) A Machine Learning Approach to the Detection of Malfunctions in HVAC Units.

Verburg, F.M. (2022) Exploring explainability and robustness of point cloud segmentation deep learning model by visualization.

Verheijen, D. (2022) Teaching Array Verification Using Snap!

Verio, I. (2022) Low Cost Connectivity for Household Appliances using Low Power Wide Area Network (LPWAN).

Verkerk, Lotte (2022) Improving the planning process by developing a forecasting model : predicting future demand based on historical information.

Vieth, Z.J. (2022) Point cloud classification and segmentation of catenary systems.

Vinne, Sietze van der (2022) Impact of user density increase on 802.11ax based Network Optimization.

Visser, Jesse Wiebe (2022) Automated Detection of Provisioning Events and Prey in Nestbox Video Footage.

Voortman, N.E.F. (2022) Modelling OSA Diagnosis and Treatment using UPPAAL.

Vos, Matthijs (2022) Capability Maturity Measurement of a Security Operations Center through Analysis Detection.

Vossebeld, F.R. (2022) Towards understanding social interactions through audio signals.

Vries, Ernst de (2022) Improving the creation process of digital platforms : a design pattern reference model.

Vries, M.P. de (2022) Private Information Retrieval applied to Biometric Verification.

Vuijk, J.G.J. (2022) Device-free monitoring of vital signs to support emotion-aware music systems for people with dementia.

Waard, D. de (2022) User preference in conditional and unconditional grounding in turn-based spoken dialogue systems.

Walsh, Ricky (2022) Finding Balance: A Study of Class Imbalance in Deep Learning Classification of Breast Cancer.

Wasserfuhr, Veit (2022) A Literature Review of Methods, Approaches and Tools to Automate the Process of Systematic Literature Reviews.

Waterval, R. (2022) How information sharing on online social networks may allow for personalized cyberattacks.

Weers, F.R.T. (2022) MaskCLIP : masking improves transfer for visual models trained with natural language supervision.

Wei, Kaiyu (2022) Dynamic Parameter Tuning Method With Presets For Metaheuristics.

Werf, Dagmar van der (2022) Assisting Self-study at the University of Twente Through Student Tutors and Digital Solutions.

Wevers, K.J.M. (2022) Is a hot dog a sandwich? Generating conversation starters that categorize a word in an unusual way.

Wiefferink, C.A. (2022) APEx: Zero-shot Cross-Knowledge Graph Named Entity Extraction leveraging Wikification.

Wierik, H.R. te (2022) Developing a gamification program to motivate users in pre-existing e-learning courses.

Wijk, M.G.W. van (2022) The Quest for the Best Thread-Safe Java List.

Wijngaard, Jelle van den (2022) Placement of Electric Vehicle Charging Stations in Congestion Games.

Wilmes, Daniel (2022) A general optimization framework for soft robotic actuators with analytical gradients.

Wismadi, M.T. (2022) The relation between street pattern and traffic congestion, an investigation through machine learning approach.

With, A.J.V. de (2022) SpiroPlay: a study to evaluate gamified spirometry in asthmatic children.

Witlox, K.H.D. (2022) Secure Blocking for Record Linkage.

Witte, S.W. de (2022) Designing a camera-based automated food tracking app.

Wittendorp, T.J.J. (2022) Pig localization using computer vision.

Wolbers, P.W. (2022) Posture as stress indicator in eSports.

Woudstra, Martijn (2022) Designing a container management solution to improve flexibility and portability, and reducing cost for iPaaS solutions.

Xu, Zihao (2022) Overground vs. treadmill: where is my horse running? Context detection based on IMU data.

Yin, L. (2022) Characterizing types of convolution in CNN for step detection using IMU data.

Yousefimashhoor, S. (2022) Deep learning on MLS point clouds : feasibility of improving semantic segmentation result using part segmentation.

Zhang, F. (2022) Dashboard design for MiniSoccerBal 3.0.

Zhao, Wenjie (2022) How different virtual reality environments influence job interview anxiety.

Zhu, Tingting (2022) The Media Bias of COVID-19 in Different Countries.

Zhu, Zhiyong (2022) Improving the Personal Health Train approach with Electronic Data Capture Systems.

Zieverink, Niek (2022) Frog Counting Tool.

2021

Aalten, Thijs van (2021) Online optimization of EMG using a hybrid model approach.

Abraham, R. (2021) Symbolic LTL Reactive Synthesis.

Adriani, J (2021) Measuring Eating Speed with the Sensory Interactive Table.

Agen, Wouter van (2021) Concept development for Line isolation cutter.

Agustini, Try (2021) Sentiment Analysis on Social Media using Machine Learning-Based Approach.

Akkerman, H.J. (2021) Using credibility to stop the spread of fake news.

Albers, J. (2021) Item availability restricted.

Alberts, K.J. (2021) Comparison of different types of auto-encoders for data cleaning.

Aljabary, Mahmoud (2021) Automatic Generic Web Information Extraction at Scale.

Allahverdiyeva, Aydan (2021) Empathetic Textual Speech of Conversational Agents in Client-Centered Therapy.

Ampudia, Ricardo (2021) Visible Light Positioning for Unmanned Aerial Vehicles.

Anaigoundanpudur Karthikeyan, Naveenaa (2021) Cryptographic Implementation of Issuer Policy for Self Sovereign Identity Systems.

Apriyadi, R.A. (2021) MODEST language syntax for structural model parameters.

Arora, G.S. (2021) Exploring Possibilities to Improve Distant Dining Experience for Young Expats with their Loved Ones over Time and Space Gap Issues.

Arva, D. (2021) Using artificial intelligence to mitigate file injection attacks in emails.

Assen, Jorrit van (2021) General Game Playing with imperfect information in GROOVE.

Assies, Daniël (2021) Developing a Smart Telemetry Feedback System for Sim Racing.

Averkin, Konstantin (2021) You are the weakest link - identifying single-rack points of failure in the DNS.

Aņikevičs, Germans (2021) Relationship Between Vendor Popularity and Prices on Dark Web Marketplaces.

Bakker, J. (2021) Calculating the Risk of Valve Failures when Maintaining Water Supply Networks.

Balciunas, J.K. (2021) Real-Time Interrupt-driven Concurrency (RTIC) for Modern Application Processors.

Basarabă, R.C. (2021) Investigating safety and security interactions using the BDMP formalism : case study of a DDoS attack on Liberia.

Bayuaji, Rayhan Aryoseno (2021) Designing Compassionate Technology for Mental Health.

Beekman, L.J.D. (2021) Procedural location generation with weighted attribute grammars.

Beijnum, A.C.W. van (2021) The state of DNSSEC provisioning automation.

Belt, S.P. van den (2021) Facial marks : detection and integration into a facial recognition system.

Benjamins, Stan and Duin, Jesse van der and Nie, Heleen van and Plekkenpol, Luca (2021) Hoe wordt EUS de beste keus? : Optimaliseren van endo-ultrasonografische beoordeling ter onderscheiding van T1 en T2+ rectale carcinomen met behulp van deep learning.

Berends, S.B. (2021) ML Governance Within Banking: A study into the oversight of ML model development and compliance.

Berg, S.C.B. van den (2021) A simulation-based serious game in appointment scheduling for service facilities in health care.

Berghuis, Lars (2021) Using the Wisdom of the Crowd to Digitalize : Designing a workshop-based process selection method for the identification of suitable RPA processes.

Beune, P.F. (2021) Classifying the Network Capacity of the Dutch IPv4 Address Space.

Bhowmick, Anubrata (2021) Markers of Brain Resilience.

Bink, T.I. (2021) Requirements for disseminating sensing information to caregivers of persons with dementia.

Birton, Laurentiu (2021) Compressed Convolutional Neural Networks for the Classification of Electrocardiogram Signals on Embedded Devices.

Blondel, Joppe (2021) Distributed Control Algorithm for Cooperative Autonomous Driving Vehicles Inspired by Flocking Behaviour.

Boekhoudt, N. (2021) Decriminalisation of cannabis : the effects on the drug market via the dark web.

Boer, Frans de (2021) Active Learning on Embedded Devices.

Boer, S.L. (2021) Depth estimation on synthesized stereo image-pairs using a generative adversarial network.

Boer, S.O. de (2021) Digital Identity; A cyber resilience evaluation of the European digital identity e-commerce requirements.

Boer, S.O. de (2021) Digital Identity : A cyber resilience evaluation of the European digital identity e-commerce requirements.

Boerrigter, T.H. (2021) Augmenting the process of schema matching with machine learning-based Intelligence Amplification.

Bollen, L.M. (2021) Hardware acceleration of sweep detection using Clash : Computer Architecture for Embedded Systems.

Bommel, J. R. van (2021) Active Learning during Federated Learning for Object Detection.

Bos, J.P. (2021) Forecasting the controllability of electricity consumersusing sparse multi-granularity time series data.

Bos, N.D (2021) Improving the Chess Elo System With Process Mining.

Bos, P. (2021) Program verification for quantum algorithms.

Bos, P.M. (2021) Personal learning records : supporting metacognition cycles to improve the learning of programming.

Bouma, G (2021) Web Server Loads under Visitor Surges : A Model-Based Prediction.

Bouman, S.M. (2021) Personal Visualization in a Citizen Science Portal.

Bousias, Dimitrios (2021) Towards view-invariant Gait Recognition from monocular video based on Human Pose Estimation.

Bovenkamp, Jasper van de (2021) Dinner Time! : How to support children with autism spectrum disorder and their parents in better eating habits?

Braakhuis, J.A. (2021) Design of a Reactive DNS Measurement System.

Braks, J.G.J. (2021) Determining the way of walking by leveraging CSI.

Braşoveanu, R. (2021) Item availability restricted.

Bree, R.J. van (2021) Data augmentation for regularizing learned world models in reinforcement learning.

Broekhuis, Stijn (2021) The Importance of Coding Styles within Industries.

Bronkhorst, M. (2021) A pen is all you need : online handwriting recognition using transformers.

Bruxvoort, Xadya van (2021) Towards the design of legally privacy-proof and ethically justified data-driven fraud risk assessment algorithms.

Bui, Nhat (2021) Negomancer : Improvise. Adapt. Overcome. Transform.

Bulten, F.F. (2021) 3D Super Resolution using Auto Encoders for Face Recognition.

Böhmer, Kevin (2021) Model predictive control for electric vehicle charging using low power microcontrollers.

Cesar, M. (2021) End-to-end encrypted data in web applications.

Chandra, Melvin Sumon (2021) Why Should Security Train My Staff?

Chandra Mohan, Tejas (2021) Blind Image Quality Assessment of Smartphone-captured Images in the Wild.

Chavannes, J.P. (2021) Information extraction for court cases.

Chinthu Rukmani Kumar, Jayanth (2021) Geometrical Social Networks.

Chirca, Lucian (2021) Marks Fusion: Development Of Facial Marks Detection System And Fusion With Face Recognition System.

Chivulescu, Dragos-Marian (2021) Balanced, as all things should be: PSD2 and cybersecurity risks.

Colmenar Lamas, F.M. (2021) Analysis and comparison of Log Shipment solutions at AWS S3 for Windows 10.

Cornelissen, J. (2021) A study on forecasting SOFR with a recurrent neural network using long short-term memory cells.

Dartel, Bram van (2021) Malware detection in IoT devices using Machine Learning.

Dekker, A.P. (2021) Planning Self-Backhauled mmWave Networks with Multi-Connectivity.

Denga, Adarsh Aaron (2021) Energy Optimisation Through Machine Learning in Wireless Networks.

Deshpande, N.D. (2021) Machine learning techniques for the analysis of affective components of sign language.

Dias, V.M. (2021) Smart KPI-ORIENTED decision support Dashboard for measuring the Digital Transformation success.

Dijk, L.J. van (2021) AI as the assistant of the teacher : an adaptive math application for primary schools.

Dijk, Remco van (2021) Optimizing the BLE Transmission of Sensor Data: An Exploratory Study.

Dijkslag, M. (2021) Passive query-recovery attack against secure conjunctive keyword search schemes.

Donkers, A.D. (2021) The Usage of Models in Model-Driven Software Engineering.

Dorenbos, H.M.R. (2021) Moldel : Predicting the 'Mol' in 'Wie is de Mol?' using machine learning and mathematical modelling.

Dunning, V.A. (2021) Developing a Multi-Party MPC Compiler with Covert Security and Public Verifiability.

Eijking, Bram (2021) Implementation and evaluation of a multi-axis brushless DC motor control using a planar finite element approach.

Enache, Aida (2021) UI/UX Analysis and Design of Running Dashboard for Injury Prevention.

Engbers, S.F. (2021) Smart Sports Exercises: Offensive decision-making in volleyball.

Engers, Vincent P.G. van (2021) Towards understanding and modelling sparse training algorithms at extreme sparsity regime.

English, T. F. (2021) Using Artificial Intelligence for Image Classification of Ships.

Enkhuizen, M.J. van (2021) Innovative Data sharing in logistics, migrating from UN/EDIFACT to the OpenTripModel.

Essen, T.M. van (2021) Investigations on Securing Repositories using Difference Analysis and Patch Applications on Encrypted Files.

Evers, M. (2021) The design of a prototype handheld 3D surface reconstruction setup for monitoring skin diseases.

Fang, Zhuowen (2021) HejVR: a Virtual Reality online cultural learning system.

Farooq, A. (2021) How to Zen our Python.

Ferdelman, Kai (2021) Using computer vision to aid navigation for people with visual impairements.

Fernandes, B.O. (2021) Exploring possibilities in interactive technology to create cross-domain interactive breathing exercise games.

Firdausy, Danniar Reza (2021) A Service-Oriented Business Collaboration Reference Architecture for Rural Business Ecosystem.

Floor, Daniël (2021) the Suitability of Groove as a General Game Playing Language.

Frolov, Platon (2021) A sensitivity analysis of different machine learning methods.

Gaastra, S.L. (2021) Dinner Time! : Using technology for the gamification of mealtimes of children with autism to overcome eating problems.

Ganea, B.M. (2021) Design and implementation of a nonlinear model predictive controller for preliminary aerial physical interaction applications.

García-Mauriño Taboada, Migue (2021) IOCMonitor: Automatic extraction of cyber threat intelligence from open source data using NLP and Machine Learning.

Gavriel, Stylianos (2021) Stock Market Prediction using Long Short-Term Memory.

Geessinck, M.S.M. (2021) An automatic Segmentation method and prediction method for skin prick test results.

Geißler, Dominique (2021) Gender Bias in English and German Children’s Literature: A Computational Analysis Using Word Embeddings.

Girdziunas, K.G. (2021) Supervised feature selection using sparse evolutionary training and neuron strength.

Gnutti, Alessandro (2021) Study on the cyber risk inside a museal entity.

Gort, BSc Ewout (2021) Developing a maturity model based approach supporting the decision to adopt International Data Spaces.

Govers, Ruben (2021) Predicting Heart Rates Of Sport Activities Using Machine Learning.

Govindaraj, Visshnu (2021) Forward collision warning system with visual distraction detection in bikes.

Graciano Martinez, Virginia (2021) A dynamic deployment framework for a Staging site in the Personal Health Train.

Graumans, Lisan (2021) Subpopulation Process Mining in the ICU for Patients Diagnosed with a type of Pneumonia.

Grinwis, Iwan (2021) Identifying the best Methods for Passive and Active Cybersecurity Assessment.

Griët, D.D. (2021) Automatically map an algorithmic description to reconfigurable hardware using the Decoupled Access-Execute architecture.

Groenenberg, Annabel (2021) Three Dimensions to See it All in One Position : the development and clinical usability of a real-time depth-based markerless navigation system for hologram-guided surgery on the Microsoft HoloLens 2™.

Groot Roessink, Jochem (2021) inSQeLto : a Query Language for Probabilistic Databases.

Grotentraast, Jurgen (2021) Decision support for Rocket League player improvement.

Guliker, B. Evert (2021) Spatial determinants of Real Estate Appraisals in the Netherlands: a Machine Learning Approach.

Gupta, C. (2021) HoneyKube : designing a honeypot using microservices-based architecture.

Gupta, Y. (2021) Aspect Based Sentiment Classification of Multilingual Customer Reviews.

Gurusamy Muthuvelrabindran, A.M. (2021) Invertible recurrent inference machines for low-dose computed tomography.

Haar, J. ter (2021) Design Reconstruction for Partial Reconfigurable FPGA Systems.

Haavel, Kristjan (2021) Effectiveness of Social Engineering Intervention: A meta-analysis.

Haemers, MSc David (2021) Exploring Organinzational Network Analysis: A Case Study.

Hallsworth, Sian (2021) Metrics for Efficiency of Spectrum Sharing in Wireless Networks.

Hamelers, L.H. (2021) Detecting and explaining potential financial fraud cases in invoice data with Machine Learning.

Hamza, Muhammad (2021) Blockchain and Artificial Intelligence in Sustainable City : Can These Technologies Create Sustainable Cities and Communities?

Havinga, Thijs (2021) MmWave Beam Control for Geocasting in Vehicular Networks.

Heath, Andrew (2021) Investigating the use of hub neuron identification for pruning sparse neural networks.

Heinsius, L.R. (2021) Real-Time YOLOv4 FPGA Design with Catapult High-Level Synthesis.

Hendriks, Remi (2021) The burden and information gain of path-based topology discovery.

Hessels, R.A. (2021) Activity Recognition in Nature using Sound and AI.

Hillerström, M.A.M. (2021) Towards Implicit Authentication in Smart Logistics: A Random Number Generator for Sensor PUFs in Resource Constrained IoT Devices.

Hoekstra, Æ. S. (2021) Deobfuscating third party libraries in Android applications using library detection tools.

Hogema, T.A.M. (2021) Health information exchange in the Netherlands.

Hollander, J.P. (2021) Verification of a model checking algorithm in VerCors.

Horlings, S.J. (2021) Visual feedback from a virtual coxswain to improve engagement.

Hu, X.L. (2021) Lightweight image-based key point tracking for real-time bridge monitoring with smartphones.

Huisman, D.A.J. (2021) Generating Specifications to Verify the Correctness of Sanitizers.

Hulshof, Mike (2021) Information security certification in context : a strategy selection maturity model.

Huveneers, Maartje (2021) The Development of a Horse Activity Recognition Algorithm.

Imre, Baris (2021) An investigation of generative replay in deep reinforcement learning.

Inoue Nakagawa, P. (2021) Semantic Description of Explainable Machine Learning Workflows.

Ion, Diana-Elena (2021) Decentralized Finance Analysis.

Ivanov, Filip R. (2021) Blike: Developing a cycling gamification app for teaching and motivating people to cycle.

Janssen, D.D. (2021) Data-Driven Analysis of Cellular Network Resilience in the Netherlands.

Jayagopal, Tarun Narain (2021) VICE-GAN: Video Identity-Consistent Emotion Generative Adversarial Network.

Jong, Sieta de (2021) A Study on the Use of Interactive Videos in Addiction Treatment for People with an Intellectual Disability.

Jonker, J.H.C. (2021) Weighted convolutional neural networks rare electrocardiogram detection for real-time heart monitoring.

Jonkergouw, E. (2021) Haptic Wearables for Social Mediated Touch.

Joore, E.R.M. (2021) Modelling the trade-off between service level and waste of perishable goods at food retailers.

Joosten, Wesley (2021) Learning to Learn : Generalization of Evolved Plasticity Rules in Recurrent Neural Networks.

Kara, M.N. (2021) Classification of drinking-related events at the sensory interactive table.

Keekstra, D.L. (2021) Tracking and segmentation, a tool for assessment of human engineered heart tissue.

Keijer, BSc J.S. (2021) Unsupervised Anomaly-Based Network Intrusion Detection Using Auto Encoders for Practical Use.

Kelder, R. (2021) Active Vibration Isolation with an Active Stage.

Kessel, M. van (2021) Improving a data conversion process.

Khan, Atif Mushtaq (2021) Proposing and Deployment of Attractive Azure AD Honeypot With Varying Security Measures To Evaluate Their Performance Against Real Attacks.

Khasuntsev, N.A. (2021) Automatic Detection of Misconfigurations of AWS Identity and Access Management Policies.

Khavrona, Oleh-Yevhen (2021) B-epsilon-tree and cache-oblivious lookahead array: a comparative study of two write-optimised data structures.

Kichler, Neil (2021) Robustness of sparse MLPs for supervised feature selection.

Kippers, Richard Gerrit (2021) Methodology for reconstruction of 3D Building Models using 3D-CityJSON and Floor Plans.

Kivits, Max P.W. (2021) Heterogeneous cooperative target tracking using Nonlinear Model Predictive Control.

Klooster, N.A. van der (2021) Designing a Job Interview Space in Mibo.

Klute, L. R. W. (2021) Space-time Trade-off in Clash: Improving Smart Machines.

Knoben, P.A.H. (2021) Software caching for tree-based algorithms on accelerator cards.

Koehorst, G.S. (2021) Visualizing feature importance dependencies in machine learning.

Kogelman, T.M.H. (2021) What ethical concepts are of key importance to analyze digital ethics awareness within SMEs?

Koldenhof, Dylan (2021) Word Embeddings to Classify Types of Diachronic Semantic Shift.

Koning, W. (2021) The Design of a Machine Status Management Tool.

Konings, S.L. (2021) Lessenserie voor Medium Access Control protocollen.

Kraai, T. (2021) Incident End Time Prediction During the Incident Recovery Process.

Krijnen, T.A. (2021) Automatic generation of Formula 1 feports.

Krishnamurthy, Ramesh (2021) ADA Software Model Checking.

Krol, Zanur (2021) A new approach to visualizing FMEA data.

Laan, J.H. van der (2021) Incremental verification of physical access control systems.

Lammers, F.G. (2021) Flow in the workspace.

Lange, Arthur de (2021) Exploring and enhancing the possibilities and performance of a low-field tabletop MRI scanner.

Ledelay, Joël (2021) Retrofitting Memoization : an exploratory study.

Leemreize, T. (2021) Analyzing fileless malware for the .NET Framework through CLR profiling.

Leenheer, Bart (2021) Smart User Control in Wi-Fi Access Points.

Leinweber, Stephan (2021) Accessible Online Addiction Treatment for Patients with Mild or Borderline Intellectual Disability.

Li, Litian (2021) Simulating Federated Learning for Smartphone based Indoor Localisation.

Li, Ruiyuan (2021) Generative Probabilistic Programming in Games: Creating Character Backgrounds Using a Bayesian Network.

Li, Shikuan (2021) The effect of using virtual reality equipment on people's motivation to exercise.

Libbi, C.A. (2021) When life gives you lemons : designing a game with and for autistic girls.

Lievense, M.M. (2021) Detecting, tracking, and identifying horses across heterogeneous videos.

Liu, Dou (2021) Knowledge Graph Driven Conversational Virtual Museum Guide.

Lohman, Jesse (2021) Reducing Cybersickness in VR on an Omnidirectional Treadmill.

Loof, R. (2021) Improving Vehicle Detection Methods for Magnetometers using Machine Learning.

Loohuis, J.E. (2021) Synthesising Security Camera Images for Face Recognition.

Looijenga, Wouter (2021) Bicycle Accident Prevention using Sensors and Automotive Systems.

Ludjen, A.C.P.P. (2021) Generative replay in deep reinforcement learning.

Lübbermann, Thijs (2021) Design and control of a magnet placement tool.

Maan, G.C. (2021) Analysing Cooperative Awareness Message generation around intersections based on macroscopic traffic parameters.

Manen, B.R. van (2021) Thermal-Inertial Localization and 3D-Mapping to Increase Situational Awareness In Smoke-Filled Environments.

Maneschijn, D.G.J.C. (2021) Finding the Appropriate Level of Abstraction for Process Mining in Logistics.

Mansour, Noor (2021) Developing a Digital Serious Game for Healthcare Logistics: Appointment Scheduling of Elective Surgical Patients in the Operating Room.

Markova, Betina S. (2021) Predicting readmission of neonates to an ICU using data mining.

Martinos, Nikolas (2021) Functional and Non-Functional Requirements for a Performance Dashboard in CS:GO.

Massa, M. (2021) Detection of dysfunctional breathing and uncontrolled asthma in children using respiratory sound recordings.

Materne, L.J. (2021) Is electric vehicle drivers’ cognitive workload increased by eco-driving feedback in the face of range anxiety?

Meer, J. van der (2021) Designing an interactive travel check to increase sustainable travel.

Meerhof, J.J. (2021) Loop-breaking Approaches for Vehicle Route Planningwith Multi-agent Q-routing.

Meijer, A. (2021) Real-time robot software framework on Raspberry PI using Xenomai and ROS2.

Meijer, L. (2021) Test case shrinking for Model Based Testing on Symbolic Transition Systems.

Meijer, S.D. (2021) The implementation of LiDAR-based traffic detection and tracking.

Meijerink, Carlijn (2021) Facial landmark detection under challenging conditions.

Meinderts, S. (2021) Exploring the applicability of a data-driven approach on recommending in-store replenishments for fashion retailers.

Melotti, D. (2021) Reversing and Fuzzing the Google Titan M Chip.

Metz, T. (2021) An exploratory diary study on modelling morning routines.

Midden, J.H. van (2021) Using process mining and event log analysis for better business strategy decision-making.

Mitov, Alexander (2021) Ethical use of artificial intelligence through the Utilitarianism perspective.

Molenaar, R.S.J. (2021) Using curriculum learning to improve the performance of deep learning models used for classification purposes.

Mondol, Manaswi (2021) Analysis and Prediction of Earthquakes using different Machine Learning techniques.

Monteiro, S.C. (2021) An internet-wide analysis of TLS configurations of public LDAP servers.

Morgese, Luca (2021) Stepping out of the MUD : contextual network threat information for IoT devices with manufacturer-provided behavioural profiles.

Motamedi Nia, Sandra (2021) The Capability of Machine Learning for Predicting Disability Probabilities based on Long-term Absenteeism.

Mourik, F.G. van (2021) Finding Personally Identifiable Information Leaked via Publicly Accessible CT Logs.

Mulder, Michael (2021) Creating a Compiler for the Semi-Structured Language of Blazons.

Mulder, R. (2021) Designing a game to gather data on the self-reliance of civilians.

Mundkur, Arnav (2021) Have you tried this? : Designing a smartphone application to support sustainable food purchasing.

Naarding, K.B. (2021) A Sustainability Assessment for Transport Routes in Container Transport.

Naik, Pratik (2021) Generating Sythetic Training Images for Instance Segmentation using Salient Object Detection and Image Compositions.

Narain, S. (2021) A security risk assessment approach using enterprise architecture models to support decision-making at security operation centres.

Nassi, Thijs-Enagnon (2021) Algorithms for Automated Scoring of Respiratory Events in Sleep.

Nayanar, G.D. (2021) Autonomy, AI Perception and Safety : a Safety Evaluation Framework for AI Perception Models Used In Agricultural Autonomous Vehicles.

Neut, Laura van der (2021) Pure Gamification: stimulating energy saving behaviour through personalized gamification.

Ngo, T. (2021) Intelligent Bomberman with reinforcement learning.

Nguyen, Elisa (2021) Temporal Spike Attribution : A Local Feature-Based Explanation for Temporally Coded Spiking Neural Networks.

Nguyen, Thuy (2021) Cross-applicability of ML classification methods intended for (non-)functional requirements.

Niculescu, Remus G. (2021) Analysis on the Evolution of Mobile Network Characteristics from NetBravo Dataset.

Niekolaas, M. (2021) Towards real-time placental surface reconstruction during fetal surgery : deep-learned placental vessel identification and segmentation.

Nijkamp, J.B. (2021) Big data in small companies : a survey in the retail sector in the Netherlands.

Nijkamp, MSc Jelle J.B. (2021) Big data in small companies : a survey in the retail sector in the Netherlands.

Noorlander, M.S. (2021) Predicting traffic flow with machine learning.

Ogunjide, Oluwaremilekun Emmanuella (2021) Toward a healthy lifestyle : Siege Arena and how a gamified framework can be applied to the design of a game for managing and treating chronic conditions such as diabetes and obesity.

Olteanu, A.C. (2021) Tracing Covid-19 domain name clusters on the internet.

Otten, Yoeri (2021) Adapting, analyzing and benchmarking transportation routing algorithms for realistic real-time environments.

Ožiūnas, D.O. (2021) Identifying Severity of COVID-19 In Patients Using Machine Learning Methods.

Palm, A.J. (2021) Using business intelligence to analyse sport associations' financial data.

Pandey, Vaidehi (2021) Self-supervised semantic segmentation based on self-attention.

Pappu, A. (2021) Demand side management using blockchain for distributed networks.

Patil, Samarjeet Singh (2021) Automated Vulnerability Detection in Java Source Code using J-CPG and Graph Neural Network.

Paul, Navneet (2021) TransNeRF - Improving Neural Radiance fields using transfer learning for efficient scene reconstruction.

Pausan, Florin (2021) Designing a customizable product lifecycle management system for an SME to reach data singularity.

Petter, J. (2021) Adopting reinforcement learning in operational spare part management : visualizing the black box of decision-making.

Pingel, M.S. (2021) Leveraging machine learning and process mining to predict anaemia with the help of biomarker data.

Pits, R. (2021) Visualizing electricity consumption at a country scale.

Pool, A.W. (2021) Digital Twins in Rail Freight - The foundations of a future innovation.

Postmes, J.M. (2021) Design of an efficient path planning and target assignment system for robotic swarms in agricultural applications.

Prieskienis, Adrijus (2021) Information value for disruption management in supply chains.

Prodea, A (2021) Identifying critical source code at method level by performing threshold-based and clustering algorithms on software metrics.

Provoost, Jesper C. (2021) Improving Operational Efficiency In EV Ridesharing Fleets By Predictive Exploitation of Idle Times.

Putman, C.G.J. (2021) A Requirements Based Selection Model for Future Proof Non-Intrusive Authentication Technologies in the Office.

Radu, A. (2021) Speeding Up Convergence For Sparse Training Using Feature Extraction Behaviour.

Ranjit Jacob, Sonu (2021) Lameness Detection from Top View : State-of-the-art Analysis of Lameness Detection.

Raureanu, A.S. (2021) Transfer learning for cell image reconstruction.

Ravi Prame, Akash (2021) Hybrid Learning for Leakage Detection in Sealed Detergent Containers using IR-Thermography.

Ravishankaran, Charan (2021) Impact on how AI in automobile industry has affected the type approval process at RDW.

Rebel, Thomas (2021) Influence performance of breathing exercises with game elements.

Reefman, K.H.A. (2021) Determining the rate of small gestures unobtrusively.

Reekers, D.C. (2021) Mecamind XR.

Regt, P.D. de (2021) Modeling an eye gaze task for people with PIMD.

Resing, M. (2021) Should network operators hop on the data plane?

Richter, N.G. (2021) Zero-downtime PostgreSQL database schema migrations in a continuous deployment environment at ING.

Rikkerink, K.B.W. (2021) Enabling Perspective Multiplication for Multi-Perspective Enrollment with University of Twente Finger Vein Scanner.

Ritsema, S. (2021) A feature sensitivity and dependency analysis approach for model explainability.

Rodriguez Ruiz, G. (2021) Deep Learning Classification of Operator and Endoscope Motions during Endoscopy.

Roelofs, B.G.J. (2021) Optimal management of delivery costs.

Rosenbusch, David (2021) Creative Memory Arrangement in Virtual Reality: Building a VR diary.

Rous, E. (2021) Shopfloor Organization and management system : developing a software system for a matrix-production system.

Ruis, F.A. (2021) Independent prototype propagation graph for compositional zero-shot recognition.

Rutgers, M. (2021) Duckbot : a chatbot to assist students in programming tutorials.

Rödel, H.A. (2021) Tailored Cybersecurity Interventions.

Samiksha, Samiksha (2021) Investigating an association between DDoS and Phishing attacks.

Sathiyanarayanan, Prasanna (2021) Data Driven Feedforward Control of a 2-DOF Redundantly Actuated Manipulator with Flexure Joints using Machine Learning Techniques.

Savchenko, G. (2021) Visualizing land use change : the most frequently occurring correlations between land use change and demographic factors.

Schellekens, M.C.C. (2021) A Low-Budget, End-To-End Warning System for Bicycles using Monocular Vision and Vibrating Handlebars.

Scheuter, L.R. (2021) Does it make sense? Analyzing coherence in longer fictional discourse on a syntactic and semantic level.

Schipper, E.W. (2021) Value conflicts between sustainable and alternative behaviour in daily routines.

Scholten, Arnaut (2021) Efficient matching of heterogeneous roadmap data at Rijkswaterstaat.

Scholten, C.P.B. (2021) Automatic detection of zero-day attacks in high-interaction IoT honeypots using static analysis techniques.

Schoot Uiterkamp, L. (2021) Classification of Empathy and Call for Empathy in Child Help Forum Messages.

Schreurs, A. (2021) The heat under our peat : using transfer learning for peat fire prediction in the arctic region of North-East Siberia with Sentinel-2 imagery.

Shenkute, Nathnael Teodros (2021) Introducing Artificial Intelligence in Fast MicroGC Analysis.

Shih, H.B.B. (2021) Designing a text-based AI scheduling assistant chatbot for a business environment : a case study of a mobile-based AI scheduling assistant app.

Singh, A.N. (2021) Smart Control of MR safe Pneumatic Stepper Motor.

Singpurwala, K. (2021) Sentiment analysis trading indicators.

Sinha, Shreya (2021) Completely Automated CNN Architecture Design Based on VGG Blocks for Fingerprinting Localisation.

Slavova, S.I. (2021) Predicting the occupancy rates of truck parking locations : a machine learning approach.

Sleurink, Matthias (2021) Automatic Generation of Test Cases for VerCors Verification Cases Failing with Null Errors.

Smink, Ruben (2021) Using functional dependency thresholding to discover functional dependencies for data cleaning.

Smit, G.W. (2021) Calculating electrical footprint of personal internet use.

Smit, Kevin (2021) A high resolution grip strength measuring system for rehabilitation of hand conditions.

Smith, J.P. (2021) Virtual Reality for Modular Construction in Industrial Heritage.

Smoorenburg, Joost van (2021) Using mixed-reality in biopsy of lesions inside deformable organs.

Soelen, Robin van (2021) Creating an embodied music controller that can be used to control the arrangement of electronic dance music.

Sokolovas, E. (2021) Cell Detection in Whole Slide Images With Out-of-Focus Corruption.

Sosale Pavamana, Prasanna (2021) Improving Process Traceability Using Deep-Learning Based Unsupervised Feature Extraction.

Souilljee, M.L. (2021) Locating Selective Sweeps with Accelerated Convolutional Neural Networks.

Spaargaren, Rochelle (2021) Designing a user-centred feedback system that fosters creativity.

Sparrius, T. (2021) Contest theory models of long-term advertising and short-term competitive behaviour.

Spijker, J. J. (2021) Plate localization on the Sensory Interactive Table.

Spil, Gino van (2021) Device optimization using machine learning with hybrid heat pumps.

Spink, Suzanne J. (2021) Smart Labelling.

Sprang, Angela V. van (2021) Path and Trajectory Planning by Model Predictive Control in Autonomous Racing.

Starink, J.A.L (2021) Analysis and automated detection of host-based code injection techniques in malware.

Steegh, E.G.A.J. (2021) Sentiment as a ground truth stance indicator against fake news.

Steenbergen, Rik van (2021) Exploring pedagogical discourse data through LDA topic modelling, SSNA and thematic analysis.

Stekelenburg, A. V. (2021) Providing Concurrency Guarantees Using An Event-Driven Language.

Stel, E.W. (2021) Process comparison for subpopulations of patients with heart failure.

Sterenborg, Niek (2021) Designing a hardware accelerator for a selective sweep detection algorithm using high-level synthesis.

Stribos, R.H. (2021) The Impact of Data Noise on a Naive Bayes Classifier.

Strijker, H.W. (2021) Ethernet implementation in Clash.

Sugumaran, Shyamprasad (2021) Monitoring the daily change in cow's body weight in relation to cow health and behavior.

Suidgeest, Wouter (2021) Forensic Facial Recognition Utilizing Cartoonization Segmentation.

Sundarapandian Raani, V. (2021) Modeling and analysis of board games.

Sung, Lilian (2021) Emoji Recommendation for Text Messaging.

Svarnovics, Vladislavs (2021) DataMatrix Barcode Read Rate Improvement Using Image Enhancement.

Tafuro, M. (2021) Assessment of the contractile properties of engineered heart tissues by optical flow.

Tagliaro, Carlotta (2021) Item availability restricted.

Tian, Pin (2021) Extracting Measured Properties for Numerical Data with SciBert model and Question Answering.

Tijdeman, M.C. (2021) Adapting occlusion-based latent representation to work with geospatial data.

Tijssen, S.B. (2021) Designing an interface for a Digital Twin to optimize data transfer and visual cues.

Treub, T.P. (2021) Creating a Virtual Reality Application for Transporting Items.

Tuinstra, Annefie (2021) Virtual Reality Rowing.

Tzani, Donika D. (2021) Using Enterprise Architecture for controlling complexity and improving business performance.

Udrea, Mihnea-Adrian (2021) A Comparative Study on Pre-trained Classifiers in the Context of Image Classification.

Ulici, Diana Laura (2021) Choosing a Suitable Query Engine for Providing Observability and Accessibility for Dynamic Reporting of Business Data.

Ungrund, Philipp (2021) Developing a Web-based Tool for Teaching the Effects of Pooling on Queueing Systems.

Vacariu, P. (2021) PIRATE Robot Autonomous Navigation through Complex Pipe Networks using Reinforcement Learning.

Vanwinsen, W. (2021) Evaluating the performance of simulated IMU data for animal activity recognition.

Vashistha, G. (2021) Robot assisted needle positioning system for liver biopsy.

Vasterd, M.F.J. (2021) Generative adversarial models for privacy-preserving release mechanisms.

Veen, R. van der (2021) Agile development of applications as a medical device in a small enterprise.

Veenstra, A. (2021) Accelerating mixed-level coverage array generation.

Velinov, Bozhidar (2021) Insourcing and outsourcing of IT in Small- and Medium-sized Enterprises.

Veneman, R. (2021) Real-time skin cancer detection using neural networks on an embedded device.

Verhoeven, G.A.G. (2021) 'Samen Sterk': The design choices for a tool that represents non-numeric information for patients after an open heart surgery.

Verkuil, B. (2021) Automatic failure analysis for big data-driven industry.

Vine, P.H. (2021) Training Facial Recognition with Synthetic Faces.

Visscher, C. (2021) Towards Cyber Incident Response on Naval Ships: The Cyber Incident Response Decision Model.

Voicu-Spineanu, A.O. (2021) FPGA Acceleration of a hierarchical clustering and data fusion application for disease subtype discovery.

Voorberg, M. (2021) A performance analysis of membership datastructures in Java.

Voorend, R.W.A. (2021) Deep Unsupervised Representation Learning For Animal Activity Recognition.

Voortwis, K.J. W. te (2021) A picture is worth 1000 words : Introducing the visual modality to the query dependent video clip selection process.

Vording, R.M. (2021) Harvesting unstructured data in heterogenous business environments; exploring modern web scraping technologies.

Vries, A.J. de (2021) Developing an Educational Tool for Teaching Software Architecture.

Vries, L.J.W. de (2021) Detection of DoH tunnelling : comparing supervised with unsupervised learning.

Vries, R.H. de (2021) Clash of Clangs : differential testing of srcML and Clang.

Wal, Ewout van der (2021) Rosetta ANTLR: Ultimate Grammar Extractor.

Wal, L.E. van der (2021) Using dtControl to process schedulersproduced by the Modest Toolset.

Wan, Xin (2021) Generating IMU Data for Horse Activity Recognition from Horse Videos.

Wang, Wenhui (2021) Finding and Exploiting Vulnerabilities in Embedded TCP/IP Stacks.

Weener, Jeroen (2021) Libertas: A Backward Private Dynamic Searchable Symmetric Encryption Scheme Supporting Wildcard Search.

Weidmann, Sophie (2021) Learning Analytics for Atelier.

Werf, Daniel van der (2021) Information Technology and Data Use in 1PL - 4PL Logistic Companies.

Wesselink, B.H.T. (2021) Item availability restricted.

Wettum, Y.C. van (2021) State representation learning using a graph neural network in a 2D grid world.

Wicaksana, J. (2021) Comparison of different types of cluster algorithm on Netherland telecommunication provider solutions.

Wieringa, J.K. (2021) Bot for continuing airworthiness : proof of concept for passenger carrying drones.

Wijnands, M.P.J. (2021) Explaining black box decision-making : adopting explainable artificial intelligence in credit risk prediction for P2P lending.

Willemsen, B. (2021) Recognition of crystals in synovial fluids by a neural network.

Willemsen, Bernard J. (2021) Creating Solvable Instances for Unsolved Puzzles.

Wittingen, E. M. (2021) Creating a solver for Kwirk (Puzzle Boy).

Wolf, E.R.B. de (2021) Pervasive technology as scaffolds for mindful living: reframing calm technology.

Wolf, Geronimo (2021) Detecting wine taste using Recommender Systems.

Wolters, S.H.G. (2021) Accelerated Implementation of 3D Visual EKF SLAM For Handheld Perfusion Imaging.

Wotte, Y. P. (2021) Optimal Potential Shaping on SE(3) via Neural Approximators.

Wu, Sheng Chih (2021) Generation of Lung CT Images Using Semantic Layouts.

Yakushkina, Daria (2021) Digital Transformation in conditions of pandemic.

Yang, R. (2021) Didactic visualization for a searchable encryption.

Yeung, T. (2021) Using virtual reality for a controlled evaluation of a haptic navigation wearable for people with a visual impairment.

Zonneveld, T. van (2021) 3D finger vein patterns : acquisition, reconstruction and recognition.

Zwart, Nynke A. (2021) Agents presenting themselves as Strangers duringPrivacy Permission Requests: Effects on Disclosureand Privacy Awareness of Children.

Zwienenberg, Jesse (2021) Neural implicit representations for diffeomorphic medical image registration.

2020

Abbing, J.R. (2020) Semantic segmentation of minimally invasive anti-reflux surgery video using U-NET Machine Learning.

Ahmed, A.B.H. (2020) Balancing security and usability in Web Single Sign-On.

Alberts, L. (2020) Static verification for Snap!

Alblas, H.J. (2020) Predictive maintenance of Dutch civil infrastructure: a structured approach.

Aniraj, Ananthu (2020) Item availability restricted.

Arends, Simon Daniël (2020) Quantity meets quality for mined process models through simulated events.

Arkel, Lars van (2020) Demonstrating runtime assertion checking using Snap!

Arnold, L.H.A. (2020) Security in V2I projects : incorporating security into a framework for communication between connected cars and infrastructure.

Artolozaga, Iñigo (2020) Mental health care in a pandemic : a survey from a design and interaction perspective.

Aslam, Suhaib (2020) Designing a ubiquitous artifact for enhancing the digital wellbeing of smartphone users.

Azani, Maryam (2020) Supply Chain Control Tower Reference Architecture for Exception Monitoring and Real-Time Incident Management.

Bakker, Michiel (2020) Model validation for stochastic hybrid automata.

Bandi, S.S.A. (2020) Inter-subject synchrony and emotional dynamics in magnetoencephalographic signals during music stimulation.

Banu, R. (2020) Internet of nano-things in human cancer detection.

Benen, N.J. (2020) Using Graphviz to create aesthetically pleasing LaTeXdrawings of graphs.

Berendse, S.E. (2020) Exploring semantic segmentation in rowing images.

Berg, J.L. van den (2020) An interactive visualization explaining probabilistic fault tree computations.

Berger, Kenaan (2020) Adoption of agile methods in automotive software development.

Berkhoff, M.H. (2020) VRwonder : the development & implementation of a Virtual Reality application for people with dementia.

Bertolotti, E.M. (2020) Automatic segmentation of pelvic floor ring on 3D ultrasound.

Bhaswara, I.D. (2020) Exploration of autoencoder as feature extractor for face recognition system.

Bie, D.R. de (2020) Image Similarity Ranking Applied to the Forensic Domain.

Bijl, M.H. de (2020) Encoder-Forecaster-Decoder: a Modular Deep Learning Framework for Cloudage Forecasting.

Boer, P.B. den (2020) Inner Join Privacy : incorporating functionality-privacy trade-offs in Mobility-as-a-Service Solution design methods.

Bogaard, C.H.M van den (2020) Thwarting File-Injection Attacks on Searchable Encryption via Client-side Detection.

Bontekoe, T.H. (2020) Balancing privacy and accountability in digital payment methods using zk-SNARKs.

Bontekoe, T.H. (2020) Balancing privacy and accountability in digital payment methods using zk-SNARKs.

Boot, J.J.F. (2020) Defending against Access Pattern Attacks on Secure Range Query Schemes.

Bos, L.C. (2020) Formal analysis and verification of interactions in the O2N middleware framework.

Bosch, K.T.D. (2020) Item availability restricted.

Boschma, R. (2020) Exploring the world of Container Stacking using Approximate Dynamic Programming.

Bosdriesz, Laura (2020) Adding Speech to Dialogues with a Council of Coaches.

Bosma, H.R. (2020) Increasing nutrient awareness with the Smart Kitchen Scale.

Braams, T.L. (2020) Impact of programming environments and practices on energy consumption.

Brandl, L. (2020) FutureType : Word completion for medical reports.

Breggeman, F.T. (2020) Graph Isomorphism with Pathfinding Algorithms.

Brink, K. van den (2020) Finding “The Drop” : Recognizing the climax in electronic music using classification models.

Brinke, S.T. ten (2020) The Effect of Manipulating Perceived Action Boundaries On Catching Performance.

Brouwer, R (2020) Learning Timed Mealy Machines of the Physical Processes of an Industrial Control System for Anomaly-based Attack Detection.

Bruins, L.L.E. (2020) Validation of Legal Documents by comparing digital and printed photographs.

Brunt, B.W. (2020) Decreasing the computation time that's used for saving data in the DEMKit simulator.

Buser, Myrthe (2020) Towards stable feature detection for 3D reconstruction of the placental surface during the FLOVA procedure - Convolutional neural network based feature detection.

Cervone, B. (2020) Designing interactive data visualisations for RTL Nederland’s online news platforms : increasing visibility of the “volg” functionality and user engagement.

Chen, Zhiyuan (2020) Automatic detection of photographing or filming.

Chowdhary, A. (2020) Email-based Intelligent Virtual Assistant for scheduling (EIVA).

Colombo, Riccardo (2020) On the escalation from Cyber Incidents to Cyber Crises.

Constantinescu, E.M. (2020) An in-depth approach to fitting probability distributions using evolutionary algorithms.

Court, M.A. de la (2020) Design of a model-driven platform for IoT event stream processing.

Couwenbergh, W. (2020) Real-time assistance for people endangered by forest fires : Mobile application.

Crichlow, Matthias Caretta (2020) A study on Blue Team’s OPSEC failures.

Cutina, Jennifer (2020) Assessing the use of process mining techniques to monitor the work process of commercial drivers.

Dai, Yinping (2020) Modelling the LIFE project using DEMKit.

Dalen, N.G.A. van (2020) Development and analysis of beat and tone detection for boomwhackers.

De Miguel Aramburu, A. (2020) Vulnerability management in organizations.

Delaere, Y. (2020) Design of a machine vision based faulty bead wire detection system.

Delfgaauw, Camilio (2020) Predicting car movement for autonomous driving through traffic using neural networks.

Diatmiko, G.P.K. (2020) Just-in-time intervention : Increasing young adults' fruit intake in an engaging way.

Dijk, R.J. van (2020) Improving food safety by designing a decentralised traceability architecture in line with stakeholder concerns.

Dijkstra, F.B. (2020) Decoding Individual Contralateral and Ipsilateral Finger Movements from Electrocorticographic Signals Recorded over the Human Sensorimotor Cortex of a Single Hemisphere.

Diphoorn, W. (2020) A Smartphone Application for the Creation of Legal Document Photographs.

Doan, K.Q. and Hazelzet, H. and Slingerland, T.P. and Zoet, S. (2020) Pijndetectie bij volwassenen door middel van afbeeldingbewerking en transfer learning: Een stap in de richting van automatische en continue pijndetectie bij gesedeerde kinderen op de intensive care.

Dokter, J. (2020) Segmentation and classification of skin lesions using neural networks.

Dubowski, A. (2020) Activation function impact on Sparse Neural Networks.

Dulfer, R.M. (2020) The propaganda machine.

Eidhof, M.S. (2020) Optimising the ATQP-process at Company X.

Eijnden, E.K. van den (2020) Optimal Handover in MEC for an Automotive Application.

Elsten, J.M. (2020) System for indoor person localization in a healthcare setting.

Engelenhoven, Adjorn van (2020) Modular Neural Networks using Multiple Gradients.

Ferronato, Giovanni (2020) IoT White Worms : design and application.

Filipovic, Simona (2020) Subpopulation process mining in healthcare.

Flapper, Edwin (2020) ETA Prediction for vessels using Machine Learning.

Flederus, D.R. (2020) Enhancing music genre classification with neural networks by using extracted musical features.

Garcia-Escallon, R.R. (2020) Enterprise architecture patterns : Supporting sustainable development.

Gavenavicius, M. (2020) Evaluating and comparing textual summaries using question answering models and reading comprehension datasets.

Geest, F. van der (2020) Finding a solution against loneliness among the elderly living in a senior housing complex with the help of remote co-design.

Geevers, Kevin (2020) Deep Reinforcement Learning in Inventory Management.

Gerats, B.G.A. (2020) Individual action and group activity recognition in soccer videos.

Gerats, B.G.A. (2020) Individual action and group activity recognition in soccer videos.

Gijsen, Niels (2020) Balancing software maintenance effort as a technical debt management strategy : the design and implementation of a novel algorithm.

Greeuw, P.C.A. de (2020) Robustness of Microgrid Control Mechanisms Against Cyber Attacks.

Greuter, K.O. (2020) Evaluating the quality of the international consumer IoT Cyber Security Standard.

Grimm, Sander (2020) Design of a 3D imaging system for psoriasis assesment.

Groot Roessink, R. (2020) Experimental review of the IKK query recovery attack : Assumptions, recovery rate and improvements.

Grooters, T. (2020) Analysing certificate transparency logs for let’s encrypt customer behaviour.

Gugten, L.A. van der (2020) Load balancing framework comparison.

Haalstra, O.N.R. (2020) Browser Anti-Fingerprinting as a pathway to Impersonation and Fraud.

Haarman, T.R. (2020) Analysing countermeasures against fault injection attacks on FPGA based cryptographic implementations.

Haas, A.N.J.P.M. (2020) Attitudes towards digital transformation at small enterprises : A cross-border analysis.

Hadiwijaya, Aditya Gianto (2020) User-centred design for input interface of a machine learning platform.

Haller, Stefan (2020) Automatic Short Answer Grading using Text-to-Text Transfer Transformer Model.

Ham, Laura (2020) The design of an Interactive Topic Modeling application for media content.

Hari, Atul (2020) A spatial cognitive exploration algorithm for autonomous mapping of unknown indoor environments.

Harmes, J.P.M. (2020) A threat model analysis of audio recording on mobile health care applications.

Harms, J.R. (2020) Research and Design of Collecting and Analysing the Customer Journey in a Collaborative Software Tool.

Hartvelt, S.J. (2020) Assessing the impact of data availability on parking prediction accuracy : a case study using a simulation-based Approach.

Hast, Fritz (2020) The Impact of 5G on Future Data Center’s Carbon Dioxide Emissions.

Heerlien, I.R. (2020) Automatic detection of user errors in spirometry data using machine learning techniques and the analysis of the effect of metaphors on the quality of spirometry measurements.

Heerlien, I.R. (2020) Automatic detection of user errors in spirometry data using machine learning techniques and the analysis of the effect of metaphors on the quality of spirometry measurements.

Heinen, Niek (2020) Using lightweight image classifiers for electrocardiogram classification on embedded devices.

Hendriks, C. (2020) Proactively detecting crafted domains using active DNS measurements.

Hendriks, Koen (2020) The improvement of objective milkfoam quality analysis through image processing and computer vision.

Hengst, Kimberly (2020) Best Practices in Cloud Incident Handling.

Hetterscheid, K.J.T. (2020) Detecting agitated speech : A neural network approach.

Heus, Steven de (2020) Designing and Evaluating an Educational Board Game.

Heuver, Rien / P.R. (2020) Generating facial morphs through PCA and VAE.

Heyns, L. (2020) Converting Modest Models to Efficient Code.

Hobert, E.C. (2020) Integrating Energy Awareness into Sequence Control.

Hoedemakers, Juliette (2020) Development of the voice commerce ultrasound payment solution for FMCG in the innovation labs.

Hoek, J.M. van (2020) Predicting purchasing intent of website visitors with deep feature learning.

Hofman, N. (2020) Enterprise social software acceptance : overhauling the "One Size Fits All" approach to explain social intranet usage.

Honig, J.J. (2020) Incremental symbolic execution.

Hormann, Tina Marie (2020) Web design for different user generations : the impact of aesthetics on emotions and quality perceptions.

Huiskes, M. (2020) Automated robust planning for intensity modulated proton therapy (IMPT) in oropharyngeal cancer patients using machine learning.

Huisman, Sander (2020) ClaSH-based Framework for Hardware Generation of Optimised Real-Time SDRAM Interfaces Using Static Memory Access Patterns.

Huitink, N.J. (2020) Workforce Prediction of Order Picking Personnel.

Ignatius Patrick, Patrick (2020) Assessing LOKI by learning from Mitsuku and dataset themes.

Ikhena, Priscilla Onivie (2020) Designing a system for evaluating the performance of computer vision applications, and managing the events generated by these applications.

Ikink, D.T.R. (2020) Security for an Internet-of-Things Network in the Context of a Dairy Management System.

Imbrea, A. (2020) An empirical comparison of automated machine learning techniques for data streams.

Imhof, T. (2020) Home telemonitoring acceptance for eye care patients.

Iseke, Ann-Cathrin (2020) An Enterprise Architecture Approach Towards Sustainability and Environmental Performance.

Jaarsveld, F. van (2020) Estimating the effects of the Macroscopic Traffic Parameters on the overall Cooperative Awareness Message generations.

Jansen, F.X. (2020) Shining light on software modelling : a creative technology workshop.

Jansen, G.A.A. (2020) Underground Wireless Communication and Wake-Up at 125 kHz.

Jansen, L.W.L. (2020) Comparing cloud security directions between the Academia and the Industry.

Jeulink, Kevin (2020) Smart sports exercises project : the detection of (in)correct motion during resistance training.

Jung, Annkatrin (2020) The Breathing Garment - Exploring Breathing-Based Interactions through Deep Touch Pressure.

Kahraman, G.M. (2020) Characterizing Sender Policy Framework configurations at scale.

Kamies, Bram (2020) Abeona: A generalized framework for state space exploration algorithm composition.

Kampen, C.M. van (2020) Formal Automated Verification of a Work-Stealing Deque.

Kant, M.W.E. (2020) Authorization, privacy and informed consent : who is allowed access to which medical information? : The development of an authorization model for the Datakluis application.

Karsten, Jarik (2020) Crunching Attack Trees : efficient algorithms for computation of metrics.

Karuppannan, Sriganesh (2020) Analysis of various demand side management control mechanisms for a smart solar carpark.

Keijzer, N. (2020) The new generation of ransomware : an in depth study of Ransomware-as-a-Service.

Kemp, Tim (2020) An algorithmic approach to a conjecture of Chvátal on toughness and hamiltonicity of graphs.

Kerimov, Emil (2020) FPGA-based AES variants against side-channel attacks.

Kerkhof, R.G. (2020) Natural Language Processing for scoring open-ended questions : a systematic review.

Kesteloo, T.V. (2020) Autonomous navigation for the pipeline inspection robot "PIRATE".

Klotz, M.S. (2020) Extending the shunting plan generator of the Dutch railways with non-service train traffic.

Knol, R. (2020) Emotional activity detection using behavioural sounds.

Kok, M.R. (2020) Biologically Realistic Artificial Neural Networks.

Koning, S. (2020) Modelling and visualizing emergency egress.

Konings, S. (2020) Source code metrics for combined functional and Object-Oriented Programming in Scala.

Korpershoek, J.J. (2020) Profiling encryption algorithms using ARM-based cache eviction attacks.

Kortekaas, Y.A.M. (2020) Access Pattern Hiding Aggregation over Encrypted Databases.

Kortstra, Wybren (2020) Automatic Registration of Clinical Auditsfor Head and Neck Oncology at MST.

Koster, B. (2020) Passive Mass Reduction in Admittance Control.

Kruistum, G.M. van (2020) Determining the projected frontal area of cyclists using motion capturing data.

Kräwinkel, R.W. (2020) The effect of writing and transmitting SD card data on the consistency of SD card write performance.

Kuiken, J.A. (Jaro) (2020) Modeling associative memory in robots for promoting social behavior.

Kuil, E.D. van der (2020) A Data Integration Design Approach for the Planning Process of a Public Transport Operator.

Kukuk, L. (2020) Analyzing adoption of contact tracing apps using UTAUT.

Kumashev, Yernar (2020) GPGPU Verification: Correctness of Odd-Even Transposition Sort Algorithm.

Lapshyna, V. (2020) Sparse artificial neural networks : Adaptive performance-based connectivity inspired by human-brain processes.

Leemans, T.T.J. (2020) An Anomaly Forecasting Method for Support Processes.

Leendertz, R.R. (2020) Validating the Maneuver Coordination Protocol with UPPAAL.

Leeuwen, P. van (2020) FPGA-on-FPGA emulation using subgraph homeomorphism.

Li, Y. (2020) Interactive visualization of book publication history.

Licu, D.V. (2020) Automatic container code identification using Machine Learning.

Lijcklama à Nijeholt, D.J. (2020) Control for Cooperative Autonomous Driving Inspired by Bird Flocking Behavior.

Lijzenga, O. (2020) Symbolic parity games : Two novel fixpoint iteration algorithms with strategy derivation.

Loos, B. (2020) Designing a smartphone application for supporting the COMET-program in mental health care.

Lu, C. (2020) Deep sleep stage detection.

Lucas, R.H. (2020) Workflow improvement by artifact development.

Lummen, D.L.M. (2020) An analysis of Link and Node Level Resilience on Network Resilience.

Lüpkes, Niklas (2020) Using static weight estimation of general trees to efficiently parallelize the execution of DEMKit Simulation Models.

Ma, R. (2020) Anomaly detection for Linux system log.

Maas, Jelle (2020) Cyber attack detection in smart grids.

Macarie, M. (2020) DNS bitsquatting in the wild.

Manjesh, M. (2020) Deterministic modelling and parameterization of height-dependent interaction between radio waves and human body.

Martikainen, Katariina (2020) Audio-based stylistic characteristics of Podcasts for search and recommendation : a user and computational analysis.

Mathivanan, Rajavarman (2020) Texture Based Autonomous Reconstruction of 3D Point Cloud Models using Fully Actuated UAVs.

Mathur, Nehal (2020) Novel design of MR-compatible pneumatic soft-surgical endoscope with variable stiffness.

Mauritz, R.R. (2020) Improving data quality in a probabilistic database by means of an autoencoder.

Maškanceva, Laura (2020) Developing understandable and actionable sleep data visualizations.

Mehra, A. (2020) Deepfake detection using capsule networks with long short-term memory networks.

Meijer, Gerben (2020) Producing high quality face morphs using GANs.

Meijer, J.J.W. (2020) Morphing detection based on regional analysis of local frequency content.

Meijer, Max Jan (2020) Exploring augmented reality for enhancing ADAS and remote driving through 5G study of applying augmented reality to improve safety in ADAS and remote driving use cases.

Middelkoop, D.E.V. (2020) Sensitivity analysis of predicting wireless c hannels within an indoor factory floor.

Miedema, Lukas (2020) QuickInterp - Improving interpreter performance with superinstructions.

Minnema, Jeroen (2020) Towards component-based, sensor-independent and back-end independent SLAM.

Miu, Ioana (2020) Fundamental characteristics and concept of material passports.

Mol, S. (2020) Movement localization in indoor environments by means of light and air pressure sensors.

Monshouwer, R. (2020) Detection of subclinical ketosis in dairy cows using behaviour sensor data.

Moraru, Alexandru (2020) Iterative computed tomography reconstruction using deep learning.

Myśliwiec, J. (2020) Generating short RPG side-quest stories with transformers.

Nass, Mathieu (2020) Wi-Fi based range-only constraint integration in RTAB-Map.

Natarajan, Sriram (2020) Learned clustering for 3D object segmentation.

Nguyen, M. (2020) Interaction technology in improving learning of sports tactics : A novel way of teaching adult novice players the volleyball side-out rotation with an interactive LED floor.

Ni, Z. (2020) An improved Java-based single sign-on solution.

Nijeboer, F.J. (2020) Detection of HTTPS encrypted DNS traffic.

Nijholt, M.H. (2020) Predicting of project spending for an NGO.

Nijland, R.G. (2020) Using in-game data to give insights in the performance of eSporters.

Nijpels, S.T. (2020) Implementing feedback systems and content creation tools in an educational game.

Nijweide, F.P.J. (2020) Autoencoder-based cleaning of non-categorical data in probabilistic databases.

Noort, N. van (2020) Machine Learning for monitoring attacks in the cloud.

Obbink, R. (2020) Development and optimization of a robot navigation algorithm combining deep reinforcement learning and state representation learning.

Oedzes, J.M. (2020) ASIP design and algorithm implementation for beamforming in an antenna array.

Oldengarm, B.M.J. (2020) Improving human activity recognition using embedded smartphone sensors.

Oorschot, D.H.M.A. van (2020) Let’s sort this out: GPGPU Verification of Radix Sort.

Orlinski, Jakub (2020) MEG-driven emotion classification using convolutional and recurrent Neural Networks.

Oude Roelink, B.M. (2020) On the security of authentication when linking federated identities.

Ouyang, Cijun (2020) Robot Navigation in Dynamic Environment Based on Reinforcement Learning.

Padje, J. van 't (2020) The impact of the Dutch weather on the health of horses.

Padubidri, C.P. (2020) Sea lion Counting from Aerial Images with Deep Learning : A density Map Approach.

Palenio, H.L. (2020) Privacy in the Age of IoT An experimental study investigating the attitude towards smart speakers of non-users through voice activation and data evaluation as intrusive features.

Pebesma, J.L. (2020) Towards transfer learning in e-discovery : finding the optimal classifier and evaluating domain adaptation methods.

Pebesma, J.L. (2020) Towards transfer learning in e-discovery : finding the optimal classifier and evaluating domain adaptation methods.

Perera, Navoda (2020) An API for intelligent deployment of numerical calculations.

Perkowski, Ernest (2020) Impact of ensemble machine learning methods on handling missing data.

Peters, S.T.H. (2020) Distribution of advertisements on YouTube among several content categories.

Plas, W.J. van der (2020) Edge computing : a business model for tele monitoring IoT applications for diabetic remote care.

Plentinger, C.S. (2020) GUI for FIG : visualising simulation results.

Ploeg, E.M. van der (2020) Developing a Platform to Emulate Fault Injection Attacks on Cryptographic Implementations.

Pohjanheimo, R.J. (2020) Mood effects of immersion, control, and interaction in virtual reality eye-movement desensitization and reprocessing therapy.

Poirot, Maarten G. (2020) Split Learning in Health Care: Multi-center Deep Learning without sharing patient data.

Poot, Martijn (2020) Real time posture tracking using Breathline : posture , body position and movement classification using an Arduino, accelerometer and k-Nearest Neighbour classification.

Popa, A. (2020) Feature evaluation for detection of COVID-19 in pulmonary CT scan images.

Praas, J.W. (2020) Predicting influence spread in online social networks using combinations of node centralities.

Prieto Álvarez, Roberto (2020) Design of a Flat-Swipe Finger Vein Recognition Device in the NIR Spectrum.

Prins, J. (2020) Proactive recognition of domain abuse.

Quak, Remi (2020) Process Mining in Healthcare: Gaps between protocol and clinical practice of critical side findings in radiology.

Quattrocchi, J. L. (2020) Reaction-Diffusion patterns modelled by Continuous-State Cellular Automata.

Rai, Shubham (2020) Behavioral Threat Detection : detecting Living of Land Techniques.

Rawat, K. (2020) Human activity recognition based on energy efficient schemes.

Reesink, T.B.J. (2020) Creating 3D faces from 2D images using GANs.

Rengers, J.J. (2020) Investigating association between musical features and emotion through EEG signal analysis.

Riesewijk, M. (2020) High availability orchestration of Linux containers in mission-critical on-premise systems.

Rijn, K.D. van (2020) A binary decision diagram based approach on improving probabilistic databases.

Rijnbergen, K.J. (2020) Improving the effectiveness of phishing detection Using lexical semantics; A machine-learning based approach.

Ritmeester, J.C. (2020) ReFERee : a self-reflection tool For gamers.

Rizwan, Muhammad (2020) SDR based module for Low Power WAN nodes development.

Robert, Julien (2020) Recipe suggestion for meal-sharing online Marketplaces.

Robson, Francis (2020) Using Temperature and Humidity Sensors to Propose a New Form of Flat Roof Leakage Detection.

Roelink, M.J. (2020) Encoding deadlock-free monitors in the VerCors verification tool.

Roest, J.J. van (2020) Presenting automated test results for web development : A dashboard for reports from automated tests.

Romkema, J.F. (2020) Development of a NOx Emission Model using advanced regression techniques.

Rotari, Cristian (2020) Secure and transparent dispute resolution system in supply chains using hyperledger fabric.

Rozo Carreño, Daniel Felipe (2020) An enterprise architecture framework for digital transformation.

Rubbens, R.B. (2020) Improving Support for Java Exceptions and Inheritance in VerCors.

Rump, A. (2020) Automated assessment of learning objectives in programming assignments.

Rus, Adrian-Catalin (2020) Modelling and evaluating Obstructive Sleep Apnea management protocols with UPPAAL.

Sain, R. de (2020) Impact of language on detecting agitation.

Saksena, Saumya (2020) CABiNet : Efficient Context Aggregation Network for Low-Latency Semantic Segmentation.

Sartori, Damiano (2020) Redactable Blockchain : how to change the immutable and the consequences of doing so.

Sawaryn, B. (2020) Modelling fluctuations of blood glucose levels based on food intake and physical activity in patients with Diabetes Mellitus Type 2 : development of a controlled protocol which administer perturbations in daily life situations.

Schell, Alfred (2020) Vision-based guidance for robot assisted endovascular intervention.

Schmit, C. (2020) Smoothed analysis of the ICP algorithm for arbitrary probability distributions.

Scholten, R.H.D. (2020) Secure biometric verification in a malicious attacker model setting.

Schoneveld, J. (2020) Augmented reality photo album for people with dementia.

Schooltink, W.T. (2020) Testing the sensitivity of machine learning classifiers to attribute noise in training data.

Schrama, M.L. (2020) Improving speech emotion recognition by identifying the speaker with Multi-task Learning.

Schrijver, G. (2020) Using process mining to compare different variants of the same reimbursement process : A case study.

Schulte, Rob (2020) Autonomous mapping and navigation of an unknown environment using a reinforcement learning approach.

Sessink, Danique (2020) Creating and Maintaining Organizational Security Awareness in SMEs.

Sessink, Joost (2020) Improving the automatic generation of Dutch soccer reports using the PASS system.

Shabeer Ahmed, D.S. (2020) Sustainable hitlist : targets for internet scans.

Shah, Nimish (2020) 3D Stereovision for Quantification of Skin Diseases.

Siddique, S. (2020) Incorporating clinical notes in an early sepsis prediction model to improve performance.

Sievers, C.T. (2020) Bag-of-words location retrieval : Including position of local features.

Sivasubramanian, Kimsukha Selvi (2020) A comparative analysis of Post-Quantum Hash-based Signature Algorithm.

Slagman, Hermannus (2020) Presenting Automatic Analysis Of Uroflowmetry Curves.

Slebos, Stijn (2020) Modeling empathy in social human-robot interaction.

Sleutjes, A.R. (2020) Identification of Profiles Based on Physical Behaviour Patterns.

Slooten, N. van (2020) A maturity level assessment of process mining bottleneck analysis techniques.

Slotman, BSc D.J. (2020) Item availability restricted.

Smit, Vincent J. (2020) Self-healing approximate multipliers in MAC.

Song, X. (2020) Generative Adversarial Networks of Missing Sensor Data Imputation for 3D Body Tracking.

Sonneveld, J.J. (2020) A gravitational approach for ranking Autonomous Systems in Large Autonomous System Networks.

Spijker, B.C. van 't (2020) Classifying Classical Piano Music Into Time Period Using Machine Learning.

Staal, P.J. (2020) An Analysis of Programming Paradigms in High-Level Synthesis Tools.

Stankovic, Nikola (2020) Enhancing enterprise agility with Bizdevops method for Business-It Alignment.

Stapel, F.T.A. (2020) A Heuristic Approach to Indoor Rock Climbing Route Generation.

Steenbeek, Anne (2020) CNN based dense monocular visual SLAM for indoor mapping and autonomous exploration.

Steenmeijer, L.D. (2020) Increasing the consistency of feedback on programming code by using a tagging system.

Steinebach, Teresa (2020) Web Accessibility : incorporating user requirements into a guide for usable web accessibility.

Stellaard, Julian (2020) Tracking the process of an outbreak to a pandemic via logistical infrastructures : case study.

Sterken, G.T. (2020) Developing an Agile performance management information system.

Stikkelorum, M.J. (2020) Automated discovery of BACnet relations from bus traffic.

Stiphout, A.J. van (2020) Comparison of Scheduling Methods for Different Cases of a Complex Flexible Job Shop Problem.

Stoian, N.A. (2020) Machine Learning for anomaly detection in IoT networks : Malware analysis on the IoT-23 data set.

Stouten, Thomas (2020) Hide and seek : different scan methods to analyse peer-to-peer based blockchain networks.

Stuurman, A. and Jongh, Dr. A. de (2020) Improving frequency estimation of fingerprint minutia configurations using automated pre-selection.

Sánchez Ortiz, Elvira (2020) Zero-Knowledge Proofs applied to finance.

Teunissen, G. (2020) Machine learning for all : a methodology for choosing a federated learning approach.

Theodorus, Abraham (2020) Restoration of damaged face statues using deep generative inpainting model.

Thijssen, P.G.H. (2020) OCL constraints in GROOVE.

Tokarczyk, F. (2020) Predicting overcrowding in the acute care domain using random forest regression.

Tol, K. M. van (2020) Ons Berichten 2.0. : Researching communication in elderly care, disabled care and mental health care for the proposal of a new messaging function within Ons.

Tsigkou, Maria-Elena (2020) Criteria of information value in information retrieval : the context of Housing Corporation Risk Management.

Tuinman, BSc Philippe (2020) Enthusing Young Secondary Schoolers for Informatics Education.

Varris, V. (2020) Using adversarial reinforcement learning to evaluate he IMMUNE risk-assesment.

Veitmaa, Eva Maria (2020) Gallery of Heartbeats : soma design for increasing bodily awareness and social sharing of the heart rate through sensory stimuli.

Velden, J. van der (2020) Blacklist, do you copy? Characterizing information flow in public domain blacklists.

Veldhuis, Anouk (2020) Implementation and design of a postoperative follow-up application.

Velzel, M.M. (2020) Design2Struct : Generating website structures from design images using neural networks.

Ven, F.R. (2020) Forecasting yearly unplanned maintenance on underground waste containers based on maintenance history and demographics.

Ventur, F. (2020) Deficient testing databases : a reliability-driven evaluation of privacy models providing a trade-off between data integrity and re-identification risk.

Vijgh, M. van der (2020) A comparison of open-source real-time online learning frameworks for neural networks.

Vogel, Koen (2020) The feasibility of low-cost Virtual Reality motion tracking for rowing technique analysis.

Volz, N. (2020) Human-centred design for sustainable behaviour change : research, design and evaluation of a mobile application.

Vos, M.C. (2020) Finding lower bounds for the competitive ratio of the cow path problem with a non-optimal seeker.

Vouzavalis, Antonios (2020) Capturing car market dynamics in the transition towards electric mobility in an agent-based simulation model.

Vredeveld, G.W.R. (2020) Invaluable measurement networks and their critical infrastructure : Uptime discrepancy localization and network improvements.

Vredeveld, G.W.R. (2020) Invaluable measurement networks and their critical infrastructure : uptime discrepancy localization and network improvements.

Wackerle Garcia, L.M. (2020) Analysis of heuristics with random shortest path metrics on sparse graphs.

Wackerle Garcia, L.M. (2020) Analysis of heuristics with random shortest path metrics on sparse graphs.

Waterink, Jeroen (2020) Item availability restricted.

Weggemans, J.R. (2020) Solving Correlation Clustering with the Quantum Approximate Optimisation Algorithm.

Westerik, Lars (2020) Increasing performance personnel department Company X.

Westerveld, J.P. van (2020) FPGA partial reconfiguration and automatic variant generation as a side-channel attack countermeasure with functional HDL Clash.

Weustink, T. (2020) Forecasting promotional demand in the FMCG industry.

Wijburg, K.M. (2020) The state of statechains : exploring statechain improvements.

Willems, L.J.T. (2020) Detect people on a device that fits in the palm of your hands.

Winters, A. (2020) Examining the effect of hyperparameters on the training of a residual network for emotion recognition.

With, L.A. de (2020) Using Functional Near-Infrared Spectroscopy to Detect a Fear of Heights Response to a Virtual Reality Environment.

Wittendorp, T.J.J. (2020) Locomotion control interface for a remote robot (Avatar).

Witteveen, C.P.T (2020) Measuring the effectiveness of feedback on code of novice programmers.

Wolbers, J.J.H. (2020) Synchronized co-located interreality collaboration : analysis, design, and usage of a prototype research environment.

Woudstra, M.H. (2020) Exploring Possibilities to Increase Ease of Use of ITPortfolio Management.

Xhymshiti, Meriton (2020) Domain independence of Machine Learning and lexicon based methods in sentiment analysis.

Xia, Lichen (2020) How vehicles’ speeds influence the optimal configuration and performance of the C-V2X.

Yeleshetty, Deepak (2020) Item availability restricted.

Yenidogan, Berk (2020) 30-Days post-operative mortality prediction of elderly hip fracture patients.

Yu, S. (2020) Fingerprint recognition based on spectral minutiae representation and deep learning.

Yuan, Ye (2020) Improving information retrieval by semantic embedding.

Zadelhoff, L.D. van (2020) Assigning inbound flights to baggage retrieval belts: A simulation study on the impact of stochasticity on the performance of different assignment heuristics.

Zandberg, Koen (2020) Dataflow-Based Model-Driven Engineering of Control Systems.

Zandbergen, N. (2020) Illuminated feedback in an online classroom : Will it help or hinder?

Zhang, K. (2020) Applying questionanswering for the Mendeley Search Engine to improve user search experience.

Zhang, S. (2020) Algorithms for planted clique recovery in random geometric graphs.

Zhong, Yuanyang (2020) Studying black and white textures for visualizationon on e-ink displays.

Zissoldt, J.E. (2020) Topic modeling in memories of elderly.

Zwan, J.M. van der (2020) Detection and tracking of events using open source data.

Zwet, Dennis van der (2020) Assessing road quality and driver behavior using movement sensors in wrist worn devices.

Özen, Anıl (2020) Finding notes within Boomwhackers Recordings.

Şakar, Ö.F.O. (2020) Extending support for axiomatic data types in VerCors.

Šatcs, D. (2020) Understanding the lightning network capability to route payments.

2019

Abdul Cader Hasanain, Mohamed Asif Hassan (2019) Item availability restricted.

Abraham, Remco (2019) A Formal Proof of the Termination of Zielonka's Algorithm for Solving Parity Games.

Ahmad, Fajri (2019) Enterprise Architecture Mining.

Ambrosius, J.I. (2019) The design of a validation experiment for the Tissue Active SLAM model.

Arican, Tugce (2019) Optimization of a patch-based finger vein verification with a convolutional neural network.

Aström, F.K. (2019) JOY x UT. : Designing an e-Health web-platform to promote joyful physical activity amongst university employees.

Aulia, A. (2019) Designing a Mobile Digital Payment Application for Gas Stations in Indonesia.

Açikalin, M.A. (2019) Profiling Recursive Resolvers at Authoritative Name Servers.

Badea, Florentina (2019) A method to improve the application portfolio m anagement decision-making process through stakeholder involvement.

Bakker, D.R. (2019) Impact-based optimisation of BGP Flowspec rules for DDoS attack mitigation.

Barbara, Mario Alessandro (2019) Proof of All : Verifiable Computation in a Nutshell.

Berg, R.T. Van den (2019) Designing a small and low-energy wildlife tag for parakeets within an urban environment capable of tracking and online activity recognition.

Bergmans, R.H.J. (2019) Computer-aided diagnosis for CT based clinical triage of ischemic and hemorrhagic stroke patients : a deep learning and quantitative image analysis approach.

Bergsma, D. (2019) Porting tree-based hash table compression to GPGPU model checking.

Berkel, A.R.R. (2019) Integration of clinical decision support systems in Dutch radiology departments.

Beuker, W. (2019) Multi-rate discrete fourier transform characteristics : results of models, simulations, and measurements.

Beunk, L.D.R. (2019) Tangible Tools and Techniques: Co-designing with Locked-In Syndrome.

Blaas, R.M. (2019) Recipe and Meal management mobile application for Willieanne.nl.

Bleeker, D.A. (2019) DoS attack on recursive resolvers with DNSSEC key-tag collisions.

Blok, T. (2019) ZITA : a self learning tutoring assistant.

Blokhorst, S.H.M. (2019) Graphical User Interface for Fault Tree Analysis.

Bode, Max (2019) Evaluation of an augmented reality assisted manufacturing system for assembly guidance.

Boersen, N. (2019) Digital billboard damage detection using computer vision.

Boersma, C.H. (2019) Designing a platform to communicate posture and movement data to medical professionals.

Boersma, Kitty (2019) Using Influencing Factors and Multilayer Perceptrons for Energy Demand Prediction.

Bolding, T.G.J. (2019) Applying Peak-Shaving to Household Devices using an Event-Driven Algorithm.

Bolscher, R.T.J. (2019) Leveraging serverless cloud computing architectures : developing a serverless architecture design framework based on best practices utilizing the potential benefits of serverless computing.

Booijink, K.G. (2019) Evaluating the Scalability of MayBMS, a Probabilistic Data Tool.

Bos, W.F.A. (2019) Software Metrics as Indicators for Effort of Object-Oriented Software Projects.

Brand, Jannis (2019) Development of a Passenger Flow Visualization Tool for Cruise Line Ships.

Breed, I (2019) Hierarchical forecasting of engineering demand at KLM Engineering & Maintenance.

Brink, G.C. van den (2019) Training deep learning models to count based on synthetic data.

Brouwer, R.J. (2019) Analysis of Influence Indicators of YouTube Videos using Metadata.

Brunsveld, R.D. (2019) Determining the Satisfiability of Car Configuration Models in a Repetitive Manner.

Burghardt, C.N. (2019) Item availability restricted.

Burghout, S.M.A. (2019) Essential IoT-value propositions to reinforce SME's business position.

Cai, D. (2019) A Parasite Chain Attack in IOTA.

Casano, F. (2019) Identifying how vendors and clients manage red teaming.

Cesar, M (2019) The dangers and privacy issues of motion-based side-channel attacks.

Chen, Qiurui (2019) EEG hyperscanning study of team neurodynamics analysis during cooperative and competitive interaction.

Claßen, Philipp (2019) Identification of differences in sub-population healthcare processes.

Clerkx, N.P.M (2019) Improving vehicle routing by utilizing realisation data : a case study.

Coenen, M.H. (2019) Increasing availability of the AEpu by improving the update process.

Cojocaru, Andrei (2019) Handling Missing Data: Traditional Techniques Versus Machine Learning.

Coniglio, Luigi (2019) Combining program synthesis and symbolic execution to deobfuscate binary code.

Conrads, J.G. (2019) DDoS Attack fingerprint extraction tool : making a flow-based approach as precise as a packet-based.

Coroiu, Alexandra (2019) The generalization performance of hate speech detection using machine learning.

Dai, L. (2019) Human perception of an adaptive agent's fear simulated based on TDRL Theory of emotions.

Danielecki, Daniel Mariusz (2019) Security first approach in development of Single-Page Application based on Angular.

Das, Amit (2019) Towards a hybrid customer classification and clustering scheme for effective target-group based marketing.

Delft, M. van (2019) Towards feature-based underground void detection with ground penetrating radar from within sewers using image processing.

Derks, C.C. (2019) Trends Tool, a tool for abstract textual data analysis used for additive manufacturing trend.

Dietvorst, Cornelis P. (2019) Programming data visualisations using Microsoft Power BI : building a scrap dashboard for BT2.

Dommerholt, W. (2019) Financial effects of moving patients from an inpatient to an outpatient setting : providing financial insight in the effects of discharging patients the same day as surgery instead of keeping them overnight.

Drechsel, Alexander (2019) Automatic instance-based matching of database schemas of web-harvested product data.

Duits, Ines (2019) The Post-Quantum Signal Protocol : Secure Chat in a Quantum World.

Dzulqarnain, Dzulqarnain (2019) Investigating IoT malware characteristics to improve network security.

Eibich, Natasha J. (2019) Sticky Fingers: The effect of sticky interaction patterns on the design and adoption of a Radiology Information System.

Eijkemans, Joep (2019) Motion sickness in a Virtual Reality cycling simulation.

Emous, Rob J. van (2019) Towards systematic black-box testing for exploitable race conditions in web apps.

Enendu, Somtochukwu (2019) Predicting Semantic Labels of Text Regions in Heterogeneous Document Images.

Essenstam, L. (2019) Analysing various methods for object extraction and the classification of kitchens.

Eversmann, H.Y.N. (2019) Computation offloading of augmented reality in warehouse order picking.

Fasel, R. (2019) Adapting the variational auto encoder for datasets with large amounts of missing values.

Fennis, J. (2019) Machine learning solutions for exception handling.

Fikkert, F.A.J. (2019) Linking indoor 3-dimensional visualizations with physical architectural floor plans.

Flapper, J. (2019) User access control on the blockchain for supply chain visibility.

Florijn, W.J. (2019) Information retrieval by semantically grouping search query data.

Folkertsma, Kevin (2019) RE-Play: An exploration of game induced exercise promotion in clinical use.

Freije, R.J.H (2019) Item availability restricted.

Geijs, D.J. (2019) Tumor segmentation in fluorescent TNBC immunohistochemical multiplex images using deep learning.

Gemmink, M.W.T. (2019) The adoption of reinforcement learning in the logistics industry: A case study at a large international retailer.

Gerth, Jasper (2019) Development of a system for real time localization of a team of athletes using Ultra Wide band : design choices and considerations for mesh network localization.

Geuze, N.J. (2019) Energy management in smart grids using timed automata.

Giessen, David van de (2019) Blockchain and the GDPR's right to erasure.

Go, M.L. (2019) Clustering with Outliers in a Biased Animal Movement Database.

Goossens, Bjorn (2019) Decision-Making in a Microservice Architecture.

Gosen, N. (2019) How Robotic Process Automation (RPA) influences firm financial performance in The Netherlands.

Groot, A.G. de (2019) Confidence driven control for autonomous robotic 3D ultrasound acquisition of the breast.

Guliker, B.E. (2019) Data storytelling: visualising linked open data of the Dutch Kadaster.

Haasjes, R.E.Y. (2019) Metamodel transformations between UML and OWL.

Harmelink, R.L.A. (2019) Computing threat points in two-player ETP-ESP games.

Harten, Anne van (2019) Analyzing Programming Education Quality based on Students' Questions.

Havinga, Thijs (2019) Embedded Infrastructure for Decentralized Energy Management.

Heijden, L.M.A. van der (2019) Classification-based Approach for Question Answering Systems: Design and Application in HR operations.

Heijs, Wouter (2019) The design of an expert profile and the availabilty of employee expertise sources.

Hendriks, M. (2019) Can machine learning automatically choose your best model checking strategy?

Hendrikse, B. (2019) Data-driven IT : tackling IT challenges with data management in a financial institution.

Hogema, T.A.M. (2019) Counting People in Simultaneous Speech using Support Vector Machines.

Hogenkamp, Tom (2019) Framework for Fine-Grained Partial Reconfiguration on FPGAs.

Hove, K.W. van (2019) Automated DDoS Attack Fingerprinting by Mimicking the Actions of a Network Operator.

Hubert, André (2019) AI-Enabled Automation : A Framework for Identifying a Company’s Automatable Core Processes.

Huiden, J.E. (2019) Generating Realistic Ghost Fingerprints by Combining Real Fingerprint Images.

Hultermans, M.A.A. (2019) A Theoretical Ad Hoc Lunar Communication Network With CubeSats as Secondary Payload of Lunar Missions.

Huttinga, S.S.J. (2019) Procesautomatisatie door middel van object detectie, een machine-learning ontwikkelingsmethodologie.

Ibrahim, Arief (2019) Forecasting patient demand and predicting inpatient admission via machine learning techniques in acute care domain.

Indrawijaya, K.R. (2019) Self-management Rehabilitation Capabilities on Older Adults by Persuasive Technology.

Jakel, Tibor (2019) Using Sentiment Data from the Global Database for Events, Language and Tone (GDELT) to Predict Short-Term Stock Price Developments.

Jansen, Bas (2019) Automated Testing of Models of Cyber-Physical Systems.

Jansen, Joost (2019) Communication of Incident Severity between Customers and Analysts in a Security Operations Center.

Jansen, Joost (2019) Detecting Combosquat Domains using Active DNS Measurements : communication of incident severity between customers and analysts in a SOC.

Janssen, Djordi (2019) The Effects of Active Learning on Computer-Aided Diagnosis in Multi-Disease Prediction of Chest X-rays.

Jarosinski, W.W. (2019) Using Co-Design to Develop ‘Autshare’, an Online Solution-Sharing Platform for Autistic Individuals.

Jellema, J.M. (2019) Polynomial Calculation of Quasi-Gray code labelings for Irregular Signal Constellations.

Jong, Koen de (2019) Detecting the online romance scam: Recognising images used in fraudulent dating profiles.

Jong, R.J. de (2019) Range characterization of backscatter Wireless Sensor Networks.

Jurriëns, Stefan (2019) A Decision Support Tool for the Medium Voltage Networks Expansion Problem.

Kaag, K.W. (2019) Encouraging collaboration between primary school children through a learning robot.

Kampen, Coen van (2019) Missing data imputation based on probabilistic data.

Karchev, F. (2019) IOT device profiling for Honeypot generation.

Karia, D. (2019) Combating money laundering on the blockchain.

Karimah, Fania Rahmanawati (2019) Redesign IT Organisational Structure: Case study of Centre for Data and Informatics Infrastructure (CDII), Ministry of Communication and Informatics Republic of Indonesia.

Kazmi, Syeda Nazish (2019) Access Control Process for a SaaS Provider.

Keijer, Julik S. (2019) Automated DDoS mitigation based on known attacks using a Web Application Firewall.

Keurhorst, Maaike (2019) Feedback On Gaze Behaviour In Virtual Reality Bicycle Training For Children with a Developmental Coordination Disorder.

Khan, Muhammad Daiman (2019) An investigation into trust between an SAV and its passengers.

Khasuntsev, N.A. (2019) Accurate and Efficient Classification of Cyber Security Documents.

Kim, John (2019) Building a Platform to Improve Sedentary Behaviour by Centralising Joy in Physical Activity.

Klaassen, W. (2019) Visualizing ocean carrier performance : a framework for evaluating logistic partners.

Klanberg, Indrek (2019) Simulated Silicon Dopant networks : optimizing simulations, searching for boolean gates and visualization.

Klink, K. van (2019) Detection and Identification of Roman Emperors Using Facial Recognition.

Kloppenburg, G.W. (2019) The adoption of intelligence amplification in the slotting process : a case study in the data validation automation of a Dutch Retailer.

Kobes, W.J. (2019) Efficient and accurate classification of cyber security related documents.

Kock, Joeri (2019) A signature-based Approach to DDoS Attack Mitigation using BGP Flowspec Rules.

Kock, Ties de (2019) Visualization recommendation in a natural setting.

Koelewijn, Dirk (2019) Fingerprint-Based Automated Rule Generation for DDoS Mitigation using the Berkeley Packet Filter.

Kok, H.M. (2019) Improving the efficiency and quality of help seeking and help giving for programming tutorials.

Kok, H.M. (2019) Hoe kan een tel tool ingezet worden in informatica onderwijs om de leerresultaten van leerlingen te verbeteren?

Kokkelkoren, R. (2019) Catching Flux-networks in the open.

Kolev, Stiliyan (2019) Automation of software vulnerability monitoring for third party products in large IT companies.

Kolner, Thomas (2019) Applying machine learning on the data of a controltower in a retail distribution landscape.

Kooij, D. (2019) Groovy Parity Games.

Koopman, Michael (2019) A framework for detecting and preventing security vulnerabilities in continuous integration/continuous delivery pipelines.

Koridon, M.S. (2019) Security by decision-making : a decision-making capability model for security countermeasures.

Krapukhin, Alexander (2019) Approximate Least Squares Accelerator.

Kruiper, T.R. (2019) Optimizing FPGA Designs for Maximum Throughput using RapidWright.

Kuiper, D. J. (2019) Fleet Composition in Operational Time Slot Management.

Kuipers, Floor (2019) Feed the movement - a food waste reduction app.

Kulatska, I. (2019) ArgueBot: Enabling debates through a hybrid retrieval-generation-based chatbot.

Kulkarni, Vishwajit Vijay (2019) Embedded wearable device for monitoring diabetic foot ulcer parameters.

Kumar, Shrijan (2019) Development of SLAM algorithm for a Pipe Inspection Serpentine Robot.

Kunneman, Y.J. (2019) Data science for service design : an exploration of the opportunities, challenges and methods for data mining to support the service design process.

Laat, Martin de (2019) Design and validation of Software Requirements Specification evaluation checklist.

Lammers, Mick (2019) A QA-pair generation system for the incident tickets of a public ICT Shared Service Center.

Lebbing, Peter (2019) Modelling and Realizing the Tunnelling Ball Device in UniTi and CλaSH.

Leeuwen, K.G. van (2019) From scan to speech : articulation analysis from real-time vocal tract MRI.

Legoy, V.S.M. (2019) Retrieving ATT&CK tactics and techniques in cyber threat reports.

Lenderink, R.J. (2019) Unsupervised Outlier Detection in Financial Statement Audits.

Ligtenberg, L.E.J. van (2019) Emotion dashboard for teachers in special needs education.

Linardos, Ioannis (2019) Multiscale Convolutions for an Artificial Neural Network.

Lukman, Ivan (2019) Complete Characterization of Publicly Available Domain Blacklists.

Man, R.J.P. de (2019) A formalisation of EMF by expressing Ecore as GROOVE graphs.

Man, T. (2019) Measuring and Analysing Resilience of Enterprise Architectures.

Mandasari, Yani (2019) Follow-up Question Generation.

Marin, Mihai David (2019) Effectiveness of neural language models for word prediction of textual mammography reports.

Masud, Muhammad Ahmed (2019) An Open Source Intelligence (OSINT) framework for online investigations.

Meijerink, M.M.J. (2019) Anomaly-based detection of lateral movement in a Microsoft Windows environment.

Meijerman, T.R.I. (2019) Manipulating a dissociative bond with out-of-body experience avatar in virtual reality.

Mendler, G.T. (2019) Designing a meta report for hotel customer reviews.

Mentink, T.J. (2019) Redesigning after-sales services supply chain.

Merdi, Agathi (2019) ICT Use by Refugees : The Role of Technology in Refugee Mobility.

Merdis, Vasileios (2019) Wireless communication protocols for home automation exploring the security and privacy aspects of smart home IoT devices communicating over the Z-Wave protocol.

Mitev, Zarimir (2019) Estimating User Interaction Complexity.

Mulder, Henk (2019) Performance of program verification with VerCors.

Muller, M. (2019) Creating building energy prediction models with convolutional recurrent neural networks.

Mustafa, Khaled Alaaeldin Abdelfattah (2019) Towards Continuous Control for Mobile Robot Navigation: A Reinforcement Learning and SLAM Based Approach.

Möllering, Helen (2019) Thwarting Semantic Backdoor Attacks in Privacy Preserving Federated Learning.

Naziris, Sotirios (2019) Infrastructure as code : towards dynamic and programmable IT systems.

Nguyen, ir. H.M. (2019) Formal verification of a red-black tree data structure.

Nijhuis, Mirel (2019) Creating a Google Home System Agent to reduce loneliness among older adults.

Nurlatifah, Eva (2019) Information audit triangle for practitioners.

Oliemans, R. (2019) WHOIS versus GDPR.

Overkamp, Niels (2019) Speeding up profile steering algorithms with caching for buffer type devices.

Panambur Venkatraman, V. (2019) A sensor fusion technique for head motion controlled endoscope camera system.

Pantelis, D. (2019) Design of a control strategy for a robotically assisted ultrasound guided biopsy.

Papadopoulos, Antonios (2019) The quest of "dethroning" passwords from (web)authentication schemes.

Papenmeier, A. (2019) Trust in automated decision making : how user's trust and perceived understanding is influenced by the quality of automatically generated explanations.

Peetsma, J.J. (2019) Towards A Serious Game For Assessing Self-Reliance In A Crisis.

Perera, R.A.H. (2019) Finger-Adaptive Illumination Control and Exposure Fusion Imaging for Biometric Finger Vein Recognition.

Pingen, J.J.F. (2019) Engineering Entertainment: Adaptive interventions to enhance player engagement in the Interactive Tag Playground.

Plant, O.H. (2019) DevOps under control : development of a framework for achieving internal control and effectively managing risks in a DevOps environment.

Pohekar, Ashwini (2019) ASIP design on behalf of hybrid beamforming in MIMO communication system.

Postema, J.T. (2019) Explaining system behaviour in radar systems.

Prakoso, Dimas Wibisono (2019) Semantic-aware EWC Code Recommender System for Industrial Symbiosis Marketplace.

Provoost, Jesper C. (2019) Short-term prediction and visualization of parking area states in real-time : a machine learning approach.

Prudnikova, Anna (2019) Standardized security assessment framework for ICS devices and pilot project.

Psalmerosi, Febriya Hotriati (2019) Applying Text Mining and Machine Learning to Build Methods for Automated Grading.

Pu, Leiying (2019) Co-design approach : a collective design method for improving working efficiency and satisfaction in user support design processes : an empirical study based on three comparison groups simulating a real-world quick start guide design process.

Raalte, E. van (2019) Automating system generation in Clash.

Raben, K.T. (2019) Comparing selfh-healing techniques in approximate MAC accelerators.

Radl, P.D. (2019) 3D reconstruction improvement by path planning towards physical interaction with a UAV.

Radstaak, J.M. (2019) Developing a DevOps Maturity Model: A validated model to evaluate the maturity of DevOps in organizations.

Ramesh, Darshan (2019) Item availability restricted.

Rayo Torres Rodriguez, H. (2019) A lightweight hardware architecture for intermittent computing.

Regnerus, B. (2019) Matching article sentiment in abstractive summarization of news articles.

Renssen, Martijn (2019) Classification of types of road damage using machine learning and a smartwatch.

Rhijn, Gijs van (2019) Why your back hurts : Finding an efficient way to measure and evaluate sitting posture using a combination of body sensors placed on the body and machine learning.

Richter, N.G. (2019) Process mining in programming game logs to differentiate between skill levels.

Ridder, R.K. de (2019) Business Models for Smart Mobility IoT Data.

Rietvelt, D.C.J.C. (2019) Influence of neutral word removal on sentiment analysis.

Rijnbeek, E.H. (2019) Item availability restricted.

Riva, Giovanni Maria (2019) Privacy architecting of GDPR-compliant high-tech systems : the PAGHS methodology.

Romeo, Pietro (2019) Discovering aspects of gaming QoE : an explorative study.

Roosmalen, J.J. van (2019) Forecasting bus ridership with trip planner usage data : a machine learning application.

Roppelt, J.C. (2019) Security risks surrounding cryptocurrency usage : a study on the security risks of cryptocurrencies and how security perception affects usage.

Ros, K. M. (2019) Airport restroom cleanliness prediction using real time user feedback data and classification techniques.

Rublein, N. (2019) Design of haptic feedback in pedal based UGV teleoperation to enhance situation awareness.

Ruis, Frank (2019) Spilling the beans: Food recipe popularity prediction using ingredient networks.

Rõžakov, Ilja (2019) A Modest Comparison of Blockchain Consensus Algorithms.

Sadad, Akhyar (2019) Reusable machine learning framework for predicting future system performance : a comparison study of validation strategy on WWTP time series data.

Sadananda Bhat, A. (2019) Hierarchical deep neural networks for MeSH subject prediction.

Salamah, Siti Yaumi (2019) Predicting demand of replacement cars for breakdown cases using machine learning techniques.

Schaik, E.J.G. van (2019) Color-based Recognition Techniques for Manipulation Detection in Advertisement Videos.

Schepers, P. (2019) Application of a process model to define potential operational functional failure conditions.

Schipper, M.A. (2019) Decomposed reachability analysis for discrete linear systems.

Schmidt, R. D. (2019) Creation of a training and teaching application in AR.

Scholten, C.P.B. (2019) Hacking the router: characterizing attacks targeting low-cost routers using a honeypot router.

Schoot Uiterkamp, L. (2019) Improving text representations for NLP from bags to strings of words.

Schroten, Peter (2019) Introducing BGD: a DSL to express board games and gameplay.

Schutte, J.J. (2019) Design of a development platform to monitor and manage Low Power, Wide Area WSNs.

Schyns, J.L. (2019) Improving Scientific Search Engine Interfaces Using Scientific Networks.

Seid, Selehadin (2019) Predicting weight regain after bariatric surgery using decision tree and logistic regression.

Sharman, S.S. (2019) Item availability restricted.

Siers, W.H. (2019) Generating specifications for JSON APIs for formal and semantic use.

Sluiter, N.I. (2019) Influence Maximization in Social Networks by Injecting Memes.

Smits, J.J. (2019) What does a Domain Name Say.

Smits, Paul L. (2019) Seizure onset detection for responsive stimulation in the sensorimotor cortex.

Snijders, T.G.A. (2019) Design and implementation of a supplier portal using an empirical snapshot, with a case example.

Sonderen, T. (2019) A Manual for Attack Trees.

Spijker, K. (2019) Identifying Users’ Skill Level through the Process Mining of Software Logs.

Spijkerboer, E. C. (2019) Blockchain based transaction processing system : a reference architecture for an integrated blockchain based transaction processing system.

Sridhar Bangalore Venugopal, Sridhar Bangalore Venugopal (2019) Automatic Generation of Access Control List on Mellanox Switch For DDoS Attack Mitigation Using DDoS Fingerprints.

Srivastava, Siddhartha (2019) Benchmarking Facebook's Prophet, PELT and Twitter's Anomaly detection and automated deployment to cloud.

Steenbergen, R.M. van (2019) New Product Forecasting with Analogous Products : Applying Random Forest and Quantile Regression Forest to forecasting and inventory management.

Sterrenburg, L.G. (2019) Design of an implementation method for customizable SaaS solutions.

Stortelder, R. (2019) Enabling centralized access to a reactive architecture for hardware control systems.

Stritzl, David (2019) Privacy-Preserving Matching Using Bloom Filters: an Analysis and an Encrypted Variant.

Sulzer, Niels (2019) Hardware-Efficient Real-Time Statistical Analysis on Streaming Data.

Sun, Aiwu (2019) Building a virtual world in ROS based on the robot's perception.

Sustronk, J.J. (2019) Predicting New Web Pages on the World Wide Web Using Topological Features.

Tariverdiyeva, Gunay (2019) Chatbots’ Perceived Usability in Information Retrieval Tasks: An Exploratory Analysis.

Teesselink, T. (2019) Identifying Application Phases in Mobile Encrypted Network Traffic.

Teunissen, T. (2019) Success factors for RPA application in small and medium sized enterprises.

Thomson, B.R. (2019) Automated vascular region segmentation in ultrasound to utilize surgical navigation in liver surgery.

Thoonen, M.A.W. (2019) Hardening FPGA-based AES implementations against side channel attacks based on power analysis.

Tintelen, B. F. M van (2019) Designing a Machine Learning Decision Tree for Information Systems: A study into the implementation of supervised and unsupervised machine learning methods.

Torres Cano, Andrés Felipe (2019) Automatic aviation safety reports classification.

Trienes, Jan (2019) Comparing rule-based, feature-based and deep neural methods for de-identification of Dutch medical records.

Tuininga, Frits Sieds (2019) Accelerating Model Driven Platforms : A study into the predictability of business process models.

Tujner, Zsolt (2019) Quantum-safe TOR, post-quantum cryptography.

Tziampazis, Christodoulos (2019) Exposure Assessment on Medical Devices in the Netherlands.

Valk, D.J. van der (2019) RPi-based passive 5-camera system for 3D face acquisition.

Vallinas Prieto, Ander (2019) Time-domain passivity enforcement for mass reduction in admittance control.

Vasileiadis, Leonidas (2019) Remote runtime detection of tampering and of dynamic analysis attempts for Android apps.

Veenstra, G.W. (2019) Generating high frame rate MR images using surrogate signals.

Vegt, M. E. M. van der (2019) Compressed Set Representations and their Effectiveness in Probabilistic Model Checking.

Vegt, Mick van der (2019) Using data to improve financial behavior : designing the personal finance platform.

Verbraak, F.M. (2019) Universal Basic Income Reforms and Household Composition : A Behavioural Microsimulation Analysis.

Verhoeven, P.L. (2019) Adaptability by Design: Incorporating Adaptability Constructs in the Design of Digital Business Ecosystems.

Verkleij, Martijn (2019) Teaching programming using industry tools.

Vermast, Alissa (2019) Using VR to induce smoke cravings in low literate or intellectually disabled individuals who have a smoking addiction.

Versloot, C.W.A. (2019) Amplifying the Analyst: Machine Learning Approaches for Buried Utility Characterization.

Visschers, S.H.J. (2019) Perception-aware visual odometry.

Visschers, Stephan H.J. (2019) Perception-aware Visual Odometry.

Visserman, H.A. (2019) Group Activity Recognition Using Channel State Information.

Vliet, T.B. van (2019) Development of a smart wearable : to monitor the physical activity of elderly hip fracture patients during their rehabilitation.

Vos, Matthijs (2019) Characterizing infrastructure of DDoS attacks based on DDoSDB fingerprints.

Vries, L. R. de (2019) Barge Collaborations within Container Logistics : A collaboration to increase the efficiency of barges and barge planning.

Vries, L.J.W. de (2019) IOTA Vulnerability: Large Weight Attack Performed in a Network.

Vries, R.H. de (2019) Walker: Automated Assessment of Haskell Code using Syntax Tree Analysis.

Vugt, M.M.P. van (2019) The potential of synthetic training data for training deep learning models.

Walle, R. C. M. van der (2019) Streaming array modelling and generating VHDL with Python.

Weers, F.R.T. (2019) Automatic home video editing on music.

Weijers, D.S. (2019) Forecasting Airport Passenger Flow to Improve Cleanliness Perception in Restrooms.

Wels, S.J. (2019) Guaranteed-TX : The exploration of a guaranteed cross-shard transaction execution protocol for Ethereum 2.0.

Wentzel, S. D. (2019) Evaluating Information Retrieval Systems for Children in an Educational Context.

Werink, Rens (2019) On the control allocation of fully-actuated and over-actuated multirotor UAVs.

Wiedijk, R.R.A. (2019) Code Instrumentation with Mod-BEAM.

Wiefferink, BSc C.A. (2019) Visualizing the Performance of an Anycast Network.

Wieren, H.D. van (2019) Signature-Based DDoS Attack Mitigation: Automated Generating Rules for Extended Berkeley Packet Filter and Express Data Path.

Wijlens, B. (2019) Building a framework in Clash to create deterministic sensor and actuator interfaces for FPGAs.

Willems, W.J.M. (2019) Validation of a Datafication Canvas.

Wiltenburg, Daan H. (2019) Aggression Based Audio Ranking : Annotation and Automatic Ranking.

Witlox, K.H.D. (2019) Face unmorphing.

Xia, Ziyang (2019) Speech technology to support interventional radiologists by assisting the hands-occupied problem.

Yadav, Shubham (2019) An Asynchronous Approach for Designing Robust Low Power Circuits.

Yasmin, Fitri Almira (2019) Enhancement in process mining : guideline for process owner and process analyst.

Yazdani, R. (2019) Detection of Malicious IDN Homoglyph Domains Using Active DNS Measurements.

Yeung, Chin Man (2019) Effects of inserting domain vocabulary and fine-tuning BERT for German legal language.

Zaag, Heleen van der (2019) Transferring soft-skills through a digital medium: A proof of concept for co-creation facilitators.

Zande, M.J. van de (2019) Leveraging zero-knowledge succinct arguments of knowledge for efficient verification of outsourced training of artificial neural networks.

Zeng, Xiangshuai (2019) Reinforcement learning based approach for the navigation of a pipe-inspection robot at sharp pipe corners.

Zulkarnaen, Z. (2019) Separation of Interaction Wrench and Wind Disturbances from Wrench Observer in Fully-Actuated UAVs.

2018

Aalbertsberg, A.P. (2018) Synthesis and development of a big data architecture for the management of radar measurement data.

Aker, W.J. (2018) Towards a reference architecture for privacy aware health care organizations.

Almkerk, Marc van (2018) Influence of mindfulness practices on feelings of place illusion in virtual reality.

Baardewijk, Jan Ubbo van (2018) Automatic annotation of the cooking process.

Bakker, Alexander (2018) OSSUM : a framework for determining the quality of Information Security Assessment Methodologies.

Bako, Adam (2018) Presenting temperature measurements of public spaces in Enschede.

Baksi, Shreyo (2018) Kiosk for 3D image acquisition of suspects.

Balistreri, G. (2018) Spatial Analysis of Out-of-Hospital Cardiac Arrest Incidences.

Bannink, S.N. (2018) Risk Management in Cloud Environments: Towards the Adoption of Continuous Auditing and Assurance With EU-SEC.

Barbero, Marta (2018) Reinforcement learning for robot navigation in constrained environments.

Beets, Fedor (2018) Privacy-preserving automated rental checking.

Benthem, T.S. van (2018) Visualizing business performance : real-time BI-dashboards.

Berg, B. van den (2018) Stimulus related evoked potentials around the nociceptive detection threshold.

Bernard, Tobias (2018) Design and evaluation of spatial interfaces in virtual reality.

Beunder, K.M. (2018) Correlating features of malicious software to increase insight in attribution.

Bie, J.A. de (2018) PTA as an approach to fault tree analysis.

Bitew, Semere Kiros (2018) Logical structure extraction of electronic documents using contextual information.

Bloemen, Sander (2018) Designing an application for focussed surveys.

Bloo, F.W.C. (2018) Towards updatable smart contracts.

Boelders, F.B. (2018) Developing a Ready2Help Application.

Bolhuis, W.T.C. (2018) The application of Scalable Agile in Dutch government.

Boom, Q.O. (2018) Overcoming challenges of Big Data Analytics outsourcing meant to improve Business Intelligence.

Bosdriesz, Y. L. (2018) Towards a Reference Architecture for BIM (Building Information Model) Integration in the Construction Industry.

Bosdriesz, Y. L. (2018) Towards a reference architecture for BIM (Building Information Model) integration in the construction industry.

Bouwmans, Rens (2018) Intra-cavity light distribution model for photodynamic therapy.

Braham, K. (2018) Smart cities : crowd management using WiFi based infrastructure.

Brinkkemper, F.L. (2018) Decentralized credential publication and verification : a method for issuing and verifying academic degrees with smart contracts.

Brouwer, Ruben (2018) A user self-reported emotion feedback system.

Bruxvoort, Xadya van (2018) The impact of #MeToo; a data visualization.

Capra, A. (2018) Gamified musical breathing exercises for children affected by Duchenne Muscular Distrophy.

Cardoso dos Santos Coelho, T. (2018) Using digital technology to encourage cultural change and positive behaviours : case study of project SunCard.

Casteleijn, T.K. (2018) Start-up knowledge brought to large organisations : Innovation management software based on blockchain technology.

Castro, M.N.M. (2018) Breast phantom deformation tracking and local elastography for ultrasound-guided biopsy.

Chandramohan, Aashik (2018) Machine learning for cooperative automated driving.

Chang, B.L. (2018) A deep learning approach to estimating permanents.

Charismadiptya, G.C. (2018) The design and implementation of situation aware smart logistics in perishable food transportation.

Coenraad, T (2018) Analist: A Tool for Improved Static Type Analysis for Ruby.

Court, M.A. de la (2018) Will we let computers determine what music we listen? Exploring user acceptance of music recommenders.

Crest, Côme du (2018) Scalability & Trustlines Network architecture.

Das, B. (2018) Using mobile sensing to detect indicators of alcohol intoxication.

Denman, Quinton (2018) Generating awareness of ubiquitous monitoring within the Netherlands, referencing the Chinese Social Credit Score.

Dijk, P.A.H. van (2018) An efficient simulation of crosslinked RAFT copolymerization.

Dikken, N. (2018) Digital Sports Training Exercises for Volleyball.

Dortmann, M.L. (2018) Developing a user interface for smart rainwater buffer systems.

Dragomiretskiy, Sergey (2018) The influence of DDoS attacks on cryptocurrency exchanges.

Ekambaranathan, A. and Zaag, H. van der (2018) Vernieuwing en plezier in programmeeronderwijs in de bovenbouw.

Ekambaranathan, Anirudh (2018) Using stylometry to track cybercriminals in darknet forums.

El Assal, Karim M. (2018) Predicting user loyalty in an education support web application based on usage data.

Elskamp, F. (2018) CoDuo: a game for teaching Computational Thinking in Primary Education.

Enthoven, M.M.F.C. (2018) Error Analysis of Optical Self-Localization using Mapped and Distinguishable Beacons.

Fatseas, K. (2018) Embedded neural network design on the ZYBO FPGA for vision based object localization.

Felix, P. (2018) Data-driven retail food waste reduction : a comparison of demand forecasting techniques and dynamic pricing strategies.

Felix, P. (2018) Data-driven retail food waste reduction : a comparison of demand forecasting techniques and dynamic pricing strategies.

Fleur, S. la (2018) Static Analysis of Symbolic Transition Systems with Goose.

Frank, Fabian (2018) Consent management on the Ethereum Blockchain.

Gagelas, P. (2018) “Keep Your Eyes on the Road, Kid!” : Exploring the Potential of Virtual Reality Environments to Teach Children to Keep Their Attention While Biking.

Galvan Hernández, J.A. (2018) Motivational strategies to improve self-management for rehabilitation of older adults.

Gankema, Yvon (2018) Improvement of kitten Scanner.

Geerlings, N.M. (2018) Design of a high-level control layer and wheel contact estimation and compensation for the pipe inspection robot PIRATE.

Geerlings, S.A. (2018) Analysis and Design of a Dependability Manager for Self-Aware System-on-Chips.

Georgiadou, S.E. (2018) Item availability restricted.

Geretto, Elia (2018) A QBDI-based Fuzzer Targeting Magic Bytes Comparisons.

Gerritse, A.J.H. (2018) (Spirit of Create): Exploration of illusory feedback.

Geurts, Christel (2018) Item availability restricted.

Giessen, D. van de (2018) Implementing and Scaling HanzeNet.

Groot, R.J.M. de (2018) Detecting deviant behaviour in information systems by using outlier detection on logs.

Haan, L. M. de (2018) The integration of Big Data in purchasing, as designed in a new Big Data Purchasing Maturity model.

Haan, Sophie de (2018) Application design for the quantified pet domain from a user centered design perspective.

Haan, T. de (2018) BLE Localization using switched-beam angle of arrival for pallet localization in warehouses.

Hamelers, L.H. (2018) Investigating generic online animal activity recognition across different animal species.

Haq, Muhammad Yasir Muzayan (2018) Predicting Loan Default in Retail Credits: The Case of Indonesian Market.

Harleman, R.J.S. (2018) Optimizing Online Advertising using Dynamic Pricing.

Harmsen, Emiel (2018) OpenIMPRESS : an open immersive telepresence system.

Hazekamp, C. (2018) Inferring animal social interaction using proximity based on BLE and LoRa.

Heijer, Frank den (2018) Method for legacy software evaluation based on the Balanced Scorecard and AHP.

Heikamp, F. (2018) Gray-box Network Fuzzing using Genetic Algorithms and Code Coverage.

Hoedemakers, Juliette (2018) Effective visualisation of textile for a Digital Showroom.

Hoekstra, G.I.S. (2018) Towards a software architecture model for the automation of the PIRATE robot.

Hofstra, Matthijs (2018) Integrating Formal Methods Tools : A Case Study.

Hofstra, Silke (2018) Automated analysis and simulation of control systems using dataflow.

Hol, M.C. (2018) Using user workflow analysis to create insights in content-intensive applications : Combining Process Mining and Model-Driven Engineering to create a reusable, scalable and user-friendly solution.

Hoogervorst, R.W.P. (2018) A model-driven data-analysis architecture enabling reuse and insight in open data.

Horst, Oliver (2018) Development of a smart healthcare tracking system : for the hip fracture rehabilitation process.

Hristov, I. (2018) A system for improving analysis of complexes in real estate asset management.

Huizen, J.C. van (2018) Development of a prototype-centred co-design process with autistic people to support semi-independent living.

IJsselmuiden, M.J.H. van (2018) 3D-model annotation for Computer Aided Design in augmented reality.

Iadarola, Giacomo (2018) Graph-based classification for detecting instances of bug patterns.

Ingen, D. van (2018) AIRplay : designing a game for children with asthma to support self-management.

Jeltes, Claire (2018) The introduction of foetal therapy for TTTS patients in the Radboudumc : including the development of 3D FLOVA-SLAM.

Jong, R.F. de (2018) SimpleNLG-NL : Natural Language Generation for Dutch.

Jonkheim, M.H.T. (2018) Capaciteitsanalyse bij Twence: Een simulatieonderzoek naar capaciteit en doorlooptijd.

Juursema, J.A.J. (2018) Improving visual role mining using metadata.

Kamerman, Wim (2018) Classification of Event-Related Google Alerts Using Machine Learning.

Kampman, T.E. (2018) Nabaztag lives: the rebirth of a bunny : an exploration of the Nabaztag as a social robot in a domestic environment.

Keijzer, P.B. (2018) AACE - Assessment of Asthma in Children using Electromyography.

Kemp, T. (2018) Translating LTL to the equational µ-calculus using Büchi automata optimisations.

Keppels, J.H. (2018) Qualitative Measurement of BI Maturity in a SME ICT Organisation.

Kerckhoffs, N.N.J.H. (2018) Is the “Netflix model” favorable for the audio streaming industry.

Kers, Richard Jacob (2018) Low Energy Multi-Hop Mesh Network for Nomadic Localisation Sensors: On the Design, Development and Deployment.

Kers, T (2018) Household occupancy detection for burglary purposes : Risk assessment and effectivity analysis of an unobtrusive, easy-to-implement countermeasure against Wi-Fi tracking.

Kessels, Casper (2018) Rethinking the interactions between people and cars.

Kester, J.J. (2018) CheckMerge: A System for Risk Assessment of Code Merges.

Khattab, A. A. M. (2018) Towards an interactive drone : a Bayesian optimization approach.

Kimirilova, Julia (2018) Meetbaarheid van ‘openheid voor verandering’ door middel van de geautomatiseerde methoden : een literatuurreview.

Kivits, M.P.W. (2018) Constructing a Convolutional Neural Network for Semantic Segmentation of Skin Lesions using a Small Dataset.

Klein Brinke, J. (2018) Device-free sensing and deep learning : analyzing human behavior through CSI using neural networks.

Klein Essink, B. (2018) iFat: an Interface for Fault/Attack Trees.

Klein Nijenhuis, T.A.J. (2018) Discovery and Quantification of Open DNS Resolvers on IPv6.

Kleine Deters, Jan (2018) Therapeutic exercise assessment automation, a hidden Markov model approach.

Kluitenberg, H.F. (2018) Evaluating Quality of Open Source Components.

Knuppe, R. (2018) Drift correction using a multi-rate extended Kalman filter.

Kol, J.C.M. (2018) What is the effect of dominance on the human smiling behaviour in a human-agent dyad?

Kriele, M.A. (2018) Noise-based Frequency Offset Modulation Simulation Model Design : For the analysis of Transmit-Reference Medium Access Control in Multiple Access Ad-hoc Wireless Sensor Networks.

Krooneman, J.M. (2018) Designing a fall detection system for elderly.

Kuiper, F.J. (2018) Behavioural profiles of potential students as basis for more effective university recruiting.

Kuppens, D. (2018) Machine Learning for CT-based clinical triage in hemorrhagic and ischemic stroke.

Kyriazi or Qirjazi, S. (2018) Machine learning approach to model internal displacement in Somalia.

Kyrloglou, Alexandros (2018) Fixed layer Convolutional Neural Network.

Lamers, David (2018) Possibilities for blockchain in the energy transition.

Langerak, Thomas (2018) Model predictive contour control for electromagnetic induced haptic feedback.

Lankhorst, T.J.W. (2018) An architectural approach to cyber-physical system design.

Lathouwers, S.A.M. (2018) Reasoning About the Correctness of Sanitizers.

Latzer, Y.M.E. (2018) Air temperature visualization of public spaces in Enschede.

Li, Canxuan (2018) Design framework for integrating Internet of Things and Wearable Augmented Reality.

Li, Rui (2018) Comparing human-robot proxemics between virtual reality and the real world.

Lin, Shing Long (2018) Optimization for approximate softcore unsigned multipliers on ALtera FPGA's.

Loo, Rick van (2018) Increasing Throughput of FPGA-based Streaming Applications : by using Pipelining.

Looijenga, M.S. (2018) The Detection of Fake Messages using Machine Learning.

Luo, Zhipeng (2018) Network research : exploration of centrality measures and network flows using simulation studies.

Löwik, R.C.P. (2018) Tracking of wireless devices: is it possible and solvable?

Manzano Ibarra, Amaya (2018) Evaluating Usability of Communics Authoring Tool: Comparing Synchronous with Asynchronous Remote Evaluation when using Cognitive Walkthrough.

Marcon, Nicola (2018) Designing a sonic interactive open-ended playground installation.

Markova, Betina (2018) Re-play : Interactive Playground Games To Motivate Playing.

Meciani, Giovanni (2018) Implementation of a power-efficient DFT based demodulator for BFSK.

Meij, D.R. de (2018) Predicting blood glucose for type 2 diabetes patients.

Meijer, S.D. (2018) The implementation of collision avoiding haptic feedback in the pedal-based control of a robotic platform.

Meijerink, M.J. (2018) A visual DSL for automating business processes.

Meinsma, D. (2018) Digging up Malware.

Menne, Alexander (2018) Blockchain in the Sharing Economy : Will Blockchain Disrupt Today’s Winning Business Models?

Michorius, J.A.R. (2018) Fair Machine Learning.

Monteban, J. (2018) Measuring Architectural Complexity : Quantifying the objective and subjective complexity in enterprise architecture.

Morsinkhof, P.K. (2018) Assessing E-Procurement maturity as designed in an E-Procurement Maturity Model and Quadrant Model.

Mortazawy, Ali (2018) Can Smart Homes contribute to the New Product Development (NPD) process?

Muller, D.W. (2018) Predicting the performance of business partners, using issue data of the iSense system : mapping a perception to data using machine learning.

Muller, I.J.T. (2018) Improving the service control tower with proactive decision making : a two-staged alert and intervention generating model for proactive lateral transshipments in an after-sales supply chain.

Mundkur, Arnav (2018) Classification of Respiratory Data: Classifying and analyzing respiratory data to present as feedback towards cultivating habitual diaphragmatic breathing.

Nass, M. (2018) Finding intelligence in disordered boron dopant atoms.

Nauta, M. (2018) Temporal causal discovery and structure learning with attention-based convolutional neural networks.

Nazarian, Arthur (2018) Optimizing the deployment of automated external defibrillators by a data-driven algorithmic approach.

Niehoff, Dennis (2018) Evaluation of Motion Control Algorithms for Miniaturized Agents Moving Inside 3D Fluidic Microchannels.

Nyante, K.A. (2018) Secure Identity Management on the Blockchain.

Odding, A.V. (2018) Creating an Interactive Art Installation for the SmartXP.

Ok, Sun (2018) Smart Moments.

Onis, Ramon (2018) Does your model make sense? : Automatic verification of timed systems.

Oonk, N.M.J. (2018) Attribute Extraction from Darknet Markets and the Applicability of Transfer Learning.

Oude Weernink, M.J.P. (2018) Developing a system for the integration of vehicle data.

Overbeek, E.B. (2018) Development of a platform strategy framework.

Oyediran, A.S.M. (2018) Scaling beyond HoriZZon.

Panman de Wit, J.S. (2018) Dynamic detection of mobile malware using real-life data and machine learning.

Pathak, Shreyasi (2018) Automatic structuring of breast cancer radiology reports for quality assurance.

Paulissen, J.W.H. (2018) Using depth sensing and augmented reality to improve ski-learning.

Pazhouhi, E. (2018) Automatic Product Name Recognition from Short Product Descriptions.

Pelikan, H.R.M. (2018) "What's going on there?" Negotiating common ground in robotic vs. open Surgery : a comparison of surgeon-initiated requests for action in open and robotic surgery.

Peters, ir. Rifca M. (2018) Identifying and addressing common programming misconceptions with Variables - Part II.

Planting, J (2018) Developing a data repository for the Climate Adaptive City Enschede.

Pool, A.W. (2018) An information systems model for supporting fake news disclosure.

Pühl, Julia (2018) Developing a life-storybook-application for people with dementia.

Raaijen, Thomas (2018) CRM success through enhancing the project management approach.

Rasing, A (2018) Automation and increased use of carrier data to improve the process of ocean carrier selection.

Reebroek, C. (2018) Understanding engagement behavior in online brand communities : how social identity relates to frequency of interaction and tweet sentiment.

Rejek, J. (2018) Conceptual Blending of Dialog and Image Schema - Design and Pilot Test of an Image-Schematically Metaphoric Collaborative Decision-Making Tool.

Rens, Eduard (2018) Extract offender information from text.

Ridder, L.W. van de (2018) Improvements to a tool-chain for model-driven design of Embedded Control Software.

Roediger, Sarah (2018) The effect of suspicion on emotional influence tactics in virtual human negotiation.

Rouwenhorst, J.H.J. (2018) A picture is worth a thousand words : investigating the value of Instagram posts and Twitter posts in predicting movie box office revenues.

Rozendal, S.P. (2018) Redesign of a finger vein scanner.

Schellekens, M.C.C. (2018) Reducing Meat Consumption Using A Mobile Application.

Schoppers, P.A.C. (2018) The Future of E-Learning in Higher Education : Using the scenario planning method to develop four scenarios on the futures of technology-enhanced higher education.

Schuhmacher, M. (2018) Autonomous anatomical structure recognition using machine learning.

Schutijser, C.J.T.M. (2018) Towards automated DDoS abuse protection using MUD device profiles.

Seippel, H. S. (2018) Customer purchase prediction through machine learning.

Sessink, Danique (2018) Using Machine Learning to Detect ICT in Criminal Court Cases.

Simmons, D. (2018) Social Cohesion and Sport in Overijssel : A Social Network Analysis.

Soelen, R.P van (2018) Designing music lessons for the 21st century : make learning a musical instrument more fun, playful and modern.

Spel, Jip (2018) Monotonicity in Markov chains.

Speldekamp, T.J. (2018) Disability insurance : predicting accurate inflow probabilities in an imbalanced data setting.

Spenkelink, J.S. (2018) Consumer-deployable network intrusion detection in public clouds.

Stege, S. ter (2018) Blockchain in logistics : Is blockchain in logistics hyped, or has it true potential to be a game changer?

Stegeman, Lars (2018) Solitor : runtime verification of smart contracts on the Ethereum network.

Szabó, Réka (2018) Penetration testing of AWS-based environments.

Tahir, A. (2018) Predicting Young Soccer Players Peak Potential with Optimal Age.

Tas, J.G.A. van der (2018) Improving the container planning (process), by means of a planning tool.

Teeffelen, K.J. van (2018) Intuitive Impedance Modulation in Haptic Control using Electromyography.

Timmer, I.R. (2018) Anomaly Detection of malicious TLS traffic.

Tolman, Jim (2018) Evaluation of a multi-user virtual reality system for collaborative layout planning processes.

Turkoglu, Mehmet Ozgur (2018) Compositional Scene Generation using Generative Adversarial Networks.

Verburg, J.G.J. (2018) Supporting the Innovation Process of Industrial SMEs Using Mobina: The first design cycle using mockups and a validation focus group.

Verhoeven, Gijs (2018) The design of a storytelling and learning by teaching activity with a social robot as teachable main character, for primary school language learning.

Verloop, Christiaan (2018) Developing a serious game as a tool for collecting data on food waste behavior.

Vermeij, Jaap (2018) Creating an IT risk maturity model for distributed ledger applications.

Verstoep, Bart (2018) Approximate multipliers for MAC.

Vitanov, Vesselin (2018) The asteroid field of your mind : examine neurofeedback effects in an interactive art installation.

Vries, J.F. de (2018) Redesign & Implementation of a Moment Exchange Unicycle Robot.

Vulpoiu, Ruxandra (2018) Machine Learning Applications in Financial Advisory.

Wal, Djurre van der (2018) Translating AWN networks to the mCRL2 model checker: en route to formal routing protocol development.

Wang, H (2018) Understanding low resolution facial image from image formation model.

Wardhana, Girindra (2018) Automatic Segmentation and 3D Reconstruction of Liver and Tumor.

Wassenaar, J.D. (2018) Linking segments of video using text-based methods and a flexible form of segmentation : How to index, query and re-rank data from the TRECVid (Blip.tv) dataset?

Waterink, J. (2018) Development of a DIY and consumer ready Smart Rainwater Buffer.

Waveren, S. van (2018) Automatic image caption generation for digital cultural emages collections.

Wessels, P.D. (2018) Leveraging behavioural domain models in Model-Driven User Interface Development with GLUI.

Westra, Wybe (2018) Virtual Reality Clothing Design.

Wiefferink, T.W. (2018) Combining usage and profile data for retrospectively analyzing usability of applications with funnels.

Willemsen, M.J. (2018) Improving diagnosis by Grouping Test Cases to Reduce Complexity.

Wooning, I.J. van (2018) Optimood : Transforming Health Data into Practical Advice and Insights.

Yoe, P.C.A (2018) Analysis for a possible implementation of a machine learning algorithm in the packaging process.

Zamani, M.R. (2018) Post-Quantum Secure Authentication Methods Suitable For Quantum Key Distribution.

Zhang, Yi (2018) Situated breakdowns in video mediated communication.

Zijsling, Boris (2018) Dedicated Ambient Displays.

d'Angremont, E. (2018) Towards an automated analysis for the delineation of focal epilepsy : single pulse electrical stimulation and machine learning.

2017

Aakster, Y.M.I (2017) Designing an interactive intervention to unconsciously steer residents of a dementia care facility away from the exit.

Aggelen, J.M. van (2017) Using virtual reality to support substance use disorder treatment in people with an intellectual disability.

Ahmed, Owais (2017) Item availability restricted.

BOON, R.N. (2017) Automatic detection of anomalies in times series data Big data for smart maintenance.

Beke, Chris ter (2017) Interaction development for personal daily support : design of conversational agent for activity tracking.

Bode, M. S. P. (2017) How to Design an Interactive Installation for Concordia.

Boersma, C.H. (2017) Improving the product search process through interface redesign.

Bonnes, Kevin (2017) Predicting mortgage demand using machine learning techniques.

Bos, L.C. (2017) Safe cycling for elderly "see".

Bosch, P.P. van den (2017) Moral Intelligence for IT production.

Brakels, M. (2017) Forward error correction and failure rates on Aurora high-speed links.

Brink, B. van den (2017) Orchestrating Similar Stream Processing Jobs to Merge Equivalent Subjobs.

Brugman, Tristan (2017) A methodology for deriving aggregate social tie strengths from mobility traces.

Brus, T.A. (2017) Applying E-learning and persuasive design : teaching new users of an online accounting tool the basics of online bookkeeping.

Buis, J.T.P. (2017) Applying intelligence amplification to the problem of schema matching.

Buit, L.J. (2017) Developing an easy-to-use Query language for verification of lighting systems.

Burghardt, Carmen (2017) How to design fashion applications.

Buursink, E.H. (2017) Evaluation and development of a decision support system for patients after an open heart surgery : Early online cardiac telerehabilitation programme.

Böckle, Marc-Philipp (2017) SAV2P-shared automated vehicle to pedestrian communication : exploring the impact of an interface for shared automated vehicles on pedestrians' level of comfort.

Cañizares, Jose Carlos (2017) The Information Society: Technological, Socioeconomic and Cultural aspects - Prolegomena for a sustainability-oriented ethics of ICT, with glossary and PhD prop.

Chemaly, Trishia (2017) Multimodality image registration for visualization in robotic assisted breast biopsy.

Chenet, M. (2017) Identify and extract entities from bibliography references in a free text.

Davanian, Ali (2017) Effective granularity in Internet badhood detection: Detection rate, Precision and Implementation performance.

Deenik, W. (2017) Teaching a machine beauty : intelligent interactive evolution of abstract animations.

Delaere, Yvo (2017) Implementation and optimization of facial recognition with the IntelRealsense SR300.

Diallo, A.O. (2017) Traffic filtering based on subsystem component state.

Dijk, J. F. van (2017) Three dimensional capacitive sensing for wearable technology : a development example for creative technology.

Dijkstra, F.B. (2017) UCAVs Against Air Threats : Pre-feasibility Study for a Semi-Direct Control System.

Dillimono, D.D. (2017) Nonverbal empathetic communication in coaching wearables.

Donners, Y. (2017) 3D Interactive visualisation framework for simulated systems in large scale print system design.

Dzulqarnain, A.R. (2017) Distributed Processing for Operational Modal Analysis of Bridge Infrastructures Using Wireless Sensor Networks.

Ede, Thijs S. van (2017) Detecting adaptive data exfiltration in HTTP traffic.

Ede, Thijs S. van (2017) Detecting adaptive data exfiltration in HTTP traffic.

Elfaramawy, Ibrahim (2017) Designing an accessible workflow for Rapid Prototyping on a homemade 3-axis CNC machine.

Ellery, D. (2017) Writing reusable code for robotics.

Engelgeer, Timo (2017) Designing a wireless node-based energy meter to measure both real and reactive power.

Fahmi, Shamel (2017) Respiratory motion estimation of the liver with abdominal motion as a surrogate : a supervised learning approach.

Fasya, Evania Lina (2017) Automatic question generation for virtual humans.

Fouda, Kareem M.I.A. (2017) Payload based signature generation for DDoS attacks.

Fritz, Felix René (2017) Bike Sharing in New York City: How the Citi Bike System serves Points of Interest.

Gerats, B.G.A. (2017) Increasing technician's efficiency in executing proactive maintenance tasks : an augmented reality concept.

Goedicke, D. (2017) On-road virtual reality driving simulator.

Gottimukkala, Anirudh (2017) Implementation of a digital Class - D amplifier controller in CλaSH.

Guo, Mengran (2017) Research Line: a new design for better information sharing and storage between mentors and students in the E-mentoring process.

HE, Y. (2017) Extracting document structure of a text with visual and textual cues.

Harrower, Jeffrey (2017) Social communication and digital privacy concerns of teenagers.

Hidding, S. (2017) iBeacons for Concordia : Exploring the possibilities of iBeacons in a museum context.

Huttinga, N.R.F. (2017) Insights into deep learning methods with application to cancer imaging.

Jager, J (2017) Joint level modelling, characterisation and torque control of the SHERPA robotic arm.

Jansen van Rosendaal, J.B. (2017) A context aware dynamic lighting system for the SmartXp.

Jia, Xin (2017) Understanding social signals from nonverbal behaviors in a mobile setting.

Jong, T. de (2017) Using Requirement Templates to Automate Requirements Formalization.

Jonkman, Remi (2017) Implementation of a reliable 2D approximator using sonar.

Jundt, O. (2017) Fashion product entity matching.

Kas, G.R. (2017) Rapportage about testing of the 3D motion correction.

Kerkers, M. (2017) Assessing the Security of IEC 60870-5-104 Implementations using Automata Learning.

Kessel, L.J. van (2017) A desk light to improve working attitude.

Khotina, A. (2017) An innovative search interface for Gesture Dictionary.

Kip, J.B.W. (2017) Developing a Data Visualization Tool for Minimal Cut Sets.

Klute, L.R.W. (2017) Assisting breast biopsy by visualizing the inside structures of a patient on top of the patient in real time using the HoloLens.

Koopman, M.P. (2017) Improved customer relationship using self-service.

Korthout, N. (2017) Towards an architecture design for a future societal energy supply system.

Krak, R. (2017) Cycle-Accurate Timing Channel Analysis of Binary Code.

Kuil, E.D. van der (2017) Validated requirements for a smart logistics application.

Kuipers, J.H. (2017) Anycast for DDoS.

Lammers, F.G. (2017) ChildFinder : Finding the Child that walked away playing.

Larizgoitia Burgaña, Jon (2017) Design and evaluation of a link-state routing protocol for Internet-Wide Geocasting.

Lechner, Zoe Carlotta (2017) Facing 21st century challenges : an assessment of the EU’s security provisions in the light of increasing cybercrime.

Lenz, Dominik (2017) Finding neural correlates for social relationships using EEG hyperscanning.

Linden, J.J. van der (2017) The relation between online entrepreneurship and offline and Web 2.0 learning technologies.

Looman, J.H.A. (2017) Mobile applications on the work floor : The use of mobile applications in fast moving consumer goods warehouses.

Manterola, Nahuel (2017) Creating 3D images for facial recognition using the RealSense SR300.

Meekes, M L (2017) Serious Game for Stroke Rehabilitation on the HTC Vive.

Mensing, Max (2017) Item availability restricted.

Meteer, O. (2017) Real-Time rasterization on the Starburst MPSoC.

Muinck Keizer, D.M. (2017) Photoacoustic Tomography for Finger Joint Imaging: Tackling Artefacts.

Muller, A. (2017) Socially shared regulation in Scrum teams : A multiple case study into the regulation processes in Scrum team meetings and variations both within and across teams.

Nab, F. (2017) Analyse en optimalisatie van het maaltijdserviceproces.

Niechwiadowicz, Karolina Julia (2017) Virtual Reality and Game Mechanics in Generalized Social Phobia Treatment.

Niesink, S.W.R. (2017) Improving biomedical information retrieval with pseudo and explicit relevance feedback.

Nieuwenburg, E.C.E.M. (2017) Project Buddiez : designing for long-distance-friendships between children.

Noppers, Joke (2017) Understanding computer science : how the discipline of computer science develops new understanding.

Okken, B. (2017) Design and Empirical study of tilting propellers of an over-actuated quadrotor.

Ong-A-Fat, K.K. (2017) Context Aware GPS Error Correction.

Oude Elferink, W.G. (2017) Multi-camera tracking of soccer players through severe occlusions.

Ozaita Araico, Alejandro (2017) Detection of the crowdedness of a place sensing the devices in the area.

Pars, Cas (2017) PHREE of Phish : The Effect of Anti-Phishing Training on the Ability of Users to Identify Phishing Emails.

Penkov, Ivan (2017) Block chain use cases beyond payments.

Pool, T.J. (2017) Drone swarming and combat management : visualizing and managing an autonomously functioning swarm of drones with as mediator Combat Management System(CMS).

QIN, L. (2017) Operator control hierarchy for multiple robot systems.

Rieffe, Dennis (2017) The traceability of medical equipment through hospitals and retirement homes.

Rindt, F.S. (2017) Developing a Smart Rainwater Buffering System for the Citizens of Enschede.

Ruiter, Bryan (2017) Towards a continuous auditing philosophy.

Ruizendaal, Rutger (2017) The potential of deep learning in marketing : insights from predicting conversion with deep learning.

Saeed, Aaqib (2017) Deep physiological arousal detection in a driving simulator.

Samuel, L.N. (2017) Computations in Stochastic Game Theory : large sets of rewards in games with communicating states and frequency-dependent transition probabilities and stage payoffs.

Sarrionandia Uriarte, Nora (2017) Efficiency of broadcasting in vehicular networks by means of 5G device-to-device communications.

Scholten, J. (2017) The determinants of cloud computing adoption in The Netherlands : a TOE-perspective.

Schreuder Goedheijt, Bart (2017) Recalling shared memories in an embodied conversational agent : personalized robot support for children with diabetes in the PAL project.

Schultz, Pim (2017) Using machine-learning models for operational exception handling : a case study at IBM.

Schurink, N.W. (2017) Hyperspectral imaging and tumor classification for intra-operative colorectal cancer resection margin evaluation.

Serban, A.C. (2017) Context based personalized ranking in academic search.

Shyvakov, O. (2017) Developing a security framework for robots.

Siebel, R. (2017) Video distribution in a D2D enabled 5G network supporting Public Safety Services.

Slot, M.C. (2017) The SocioMetricVis : Giving feedback during a brainstorm.

Slutter, M.W.J. (2017) Creating a feedback system with the Myo Armband, for home training for frail older adults.

Smit, Floris (2017) Applying data science to improve municipal youth care.

Snaauw, G. (2017) Camera calibration for oblique viewing laparoscopes.

Sondermann, Matthias (2017) Demand Response Interoperability for the residential European Energy Market - Identifying Standardization Gaps between a Demand Response pilot project and a proposed best practice.

Spil, Gino van (2017) Delay compensation in mobile face tracking.

Steeghs, G.G.T. (2017) Developing a smart rainwater buffering system for the municipality of Enschede.

Stevens, Stefanie Antonia (2017) Job satisfaction and work-life balance: an explorative study on remote workers.

Stuyver, R. W. (2017) Assessing and redesigning processes in the pharmacy to improve pharmaceutical care.

Terpstra, E. (2017) Designing a requirements engineering process for performance monitoring.

Terrivel, M (2017) Computationally Efficient Vision-based Robot Control.

Teunen, Freek (2017) How to create a joint VR experience for Droomvlucht.

Theuns, J.K.H (2017) Visualising Origin-Destination Data with Virtual Reality: Functional prototypes and a framework for continued VR research at the ITC faculty.

Tjeerdsma, R. (2017) Developing a backend solution for ISO15118-driven EV charging with Plug-and-Charge.

Tol, K.M. van (2017) Developing a stimulating environment in a residence facility for dementia patients.

Tolle, T. (2017) Filtering social media data streams.

Torbecke, Janina (2017) Symbolic Model Checking with Partitioned BDDs in Distributed Systems.

Torn, I.A.R. (2017) The future of purchasing and industry 4.0 : how purchasing can progress and benefit the fourth industrial revolution.

Tran, Nguyen Dat (2017) Design of a Conversion Rate Optimization Tool for E-Commerce.

Trouwborst, C. (2017) Towards increased autonomy of a rail-guided robot for the inspection of ballast water tanks.

Verkleij, Jelmer (2017) Behavioural analysis of program intent using data origins, influence and context.

Verlinden, M.G. (2017) StepFarm: An Active Video Game to Support the Self-Management of Chronic Diseases in Children.

Verzijl, Peter (2017) Using serious games to teach cause effect relationships in asphalt quality.

Vetter, Boaz (2017) Designing a smart rainwater buffer.

Vogelzang, K.H. (2017) The tennis trainer : development of a Myo armband application.

Vor dem Berge, Moritz Frederik (2017) Digital privacy : behaviour and anxieties of a young digital generation.

Vries, L R de (2017) Informatica: ontwerp van lesmodule 'Gezichtsuitdrukkingen in sociale robotica'.

Wang, Haitao (2017) Redesign of the E-Cone: A tool for treatment of hand disease.

Wentink, D.J.M. (2017) Signal Recovery using CλaSH.

Westerdijk, W.S.K. (2017) Sound Swarm : experience sound from the inside.

Wettum, Y.C. van (2017) Facial landmark tracking on a mobile device.

Wijnholt, R. (2017) Design of a real-time network channel in LUNA.

Willems, P. (2017) Mood controlled affective ambiences for the elderly.

Winsen, Stijn van (2017) Threat modelling for future vehicles : on identifying and analysing threats for future autonomous and connected vehicles.

Wohlfahrt-Laymann, Jan (2017) CogniDecline : tracking mobile interaction for cognitive assessment.

Wolbers, J.J.H. (2017) Attracting Passersby into a Building using an Interactive Installation.

Wolters, S.H.G. (2017) Smartwatch and Intellectual Disability : Designing an app that improves the lives of people with an intellectual disability and their caretakers.

Xiang, Y. (2017) How is emotion change reflected in manual and automatic annotations of different modalities?

Xie, Chenghong (2017) Design of an m-health application for low-literacy diabetes patients in India.

Yu, J.J. (2017) Is there a case to prefer Ed25519 over ECDSA P-256 for DNSSEC?

Zijden, W. van der (2017) Multi-Tenant Customizable Databases.

2016

Andreev, L. (2016) Sociometric badges in a high-stakes setting : living proof a sociometric feedback visualization.

Appel, R.N. and Folmer, H.H (2016) Analysis, optimization, and design of a SLAM solution for an implementation on reconfigurable hardware (FPGA) using CλaSH.

Baars, D.S. (2016) Towards self-sovereign identity using blockchain technology.

Baas, S.P.R. (2016) A machine learning approach to the automatic classification of female uroflowmetry measurements.

Badin, Y. (2016) Contextual Authentication : Using Mobile Phone Movements to Authenticate Owners Implicitly.

Balk, Roland (2016) SQLento: database programming made easier.

Bankert, J.J.M. (2016) Comparison of Symbolic and Distributed Representation Language Models on the Lexical Substitution and Simplification Tasks.

Barbieri, G. (2016) Control architecture for docking UAVs with a 7-DOF manipulator.

Berg, T.M. van den (2016) Radar sensing for automotive parking distance control applications.

Berkel, A.R.R. (2016) The new Luxon : a research into software expansion in the Lighting-as-a-Service market.

Beukema, W.J.B. (2016) Enhancing Network Intrusion Detection through Host Clustering.

Boer, G. (2016) Vertrouwen in telepresence bij ouderen : het effect van technische storingen op het delen van persoonlijke informatie.

Boerdonk, R.A.C. van (2016) Pensioenbewustzijn: Kan IT hieraan bijdragen?

Bokhove, T. (2016) Improving the model management workflow.

Bol Raap, W (2016) The design of a common data model for generic synchromodal cargo-tracking in logistics using web scraping and big & open data.

Bolscher, W.F. ten and Braak, T.P. ter and Haan, S.J.H. and Poirot, M.G. (2016) Item availability restricted.

Bos, K.E. and Hasper, W. (2016) Enabling measuring of the patient flow in an orthopaedic clinic.

Boti, B.R. (2016) Automatic quantification of Ki-67 proliferation index through co-registration with CAM 5.2 stained tissue to improve colorectal carcinoma diagnostics and therapy.

Braak, J.C. ter (2016) Radiolocalisation at construction sites.

Ciobotea, C. (2016) Improving payment authorization rates : by intelligently routing transactions.

Ding, H. (2016) Integrating value modeling into ArchiMate.

Dokter, J. (2016) 20-sim Template for Raspberry Pi 3.

Dute, J.A. (2016) Predicting the unpredictable : predicting surgical case durations and overtime probabilities to maximise OR-efficiency at Thoraxcentrum Twente.

Elsinga, J.W. (2016) On a framework for domain independent heuristics in graph transformation planning.

Ensink, E.S. (2016) De overstap van Excel naar Exact.

Esquivel-Vargas, Herson (2016) Automatic deployment of specification-based intrusion detection in the BACnet Protocol.

Etheredge, C.E. (2016) GoSlow: Design and Implementation of a Scalable Camera Array for High-Speed Imaging.

Fokkema, J. (2016) Using a challenge to improve face spoofing detection.

Folmer, H.H. and Appel, R.N. (2016) Analysis, optimization, and design of a SLAM solution for an implementation on reconfigurable hardware(FPGA) using CλaSH.

Franck, T. (2016) Towards an Integrated Model of Smart Manufacturing Enterprises.

Ghasemieh, H. (2016) Influence of short cycles on the PageRank distribution in scale-free random graphs.

Gijsen, N. (2016) Prototyping and feedback design in a serious game context.

Grefte, L.J.L. (2016) NI myRIO as target for 20-sim.

Hakkenberg, Chiel (2016) Experimental evaluation of LoRa(WAN) in indoor and outdoor environments.

Heijblom, A.R. (2016) Using features of models to improve state space exploration.

Herwijnen, A.G. van (2016) The influence of inner-state displays on human-human interaction.

Hessels, Stefan (2016) Bridging the gap : from process mining to business process simulation.

Hijum, S. van (2016) Symbolic model checking of timed automata using LTSmin.

Hillerström, F.H.J. (2016) Deep verification learning.

Hindriks, H.N. (2016) Vulnerability analysis of cyber security modelling language models using probabilistic logic.

Hoogesteger, Martijn (2016) Securing mobile VoIP privacy with tunnels.

Huisman, A.B. (2016) Deception detection using keystroke dynamics : on the methods to predict deceptive behavior by looking at the keystroke rhythm.

Huistra, D.J. (2016) Automated generation of attack trees by unfolding graph transformation systems.

Hulsebosch, M.A.C. (2016) Cloud Strife : an analysis of cloud-based shadow IT and a framework for managing its risks and opportunities.

Jagannatha, P. (2016) Detecting Exploit kits using Machine Learning.

Jansen, R. (2016) Waypoint navigation with obstacle avoidance for MAV's.

Janssen, Bas (2016) Determining truth in tweets using feature based supervised statistical classifiers.

Janssen, Stefan C. (2016) Reducing labeled data usage in duplicate detection using deep belief networks.

Jimenez Kwast, D. (2016) GPU-Based Photon Mapping for Approximate Real-Time Indirect Diffuse Illumination.

Kappert, K.D.R. (2016) VIRTUAL SURGERY: Development of a surgical simulation tool for the prediction of functional impairment after partial glossectomy.

Keller, Kristian M.Sc. (2016) A day ahead electricity storage flexibility prediction for peak shaving.

Klein, A.V.E. (2016) Nonverbal Communication of Anthropomorphism and its Effect on the Perception of Online Education Platforms.

Kok, K.J. (2016) TERRA support for architecture modeling.

Koot, Martijn (2016) Overzichtelijke IT Incidenten: Optimalisatie van het IT Incident Management binnen URENCO Nederland B.V. met behulp van Enterprise Architecturen.

Korać, Kristijan (2016) Impact of Data Visualisation on Users in CRM Systems.

Koukoulis, Yannis (2016) Dual laser fault injection.

Krediet, A.C. (2016) Developing and testing an APP model for Air Spiralo.

Kreiser, Simon (2016) Marrying GUI and Git : how authoring tools for E-Learning can benefit from version control.

Laarhuis, N.M. (2016) Making rational decisions about IT projects using Enterprise Architecture : a case study conducted at ASML Netherlands N.V.

Lang, Shanna de (2016) Mobile pain screening with FollowUp : an app to support anaesthesiologist in the pain screening at outpatient clinics.

Langen, S.F. van (2016) An architectural design for LAN-based web applications in a military mission- and safety-critical context.

Langkamp, L.U. (2016) Het Effect van Self- Explanation Questions in een Educatieve Game op de Game en Leerprestatie.

Laverman, G.J. (2016) Java Code Virtualization of Industrial-strength Java Code.

Le, Van Huynh (2016) Analyzing white-box designs for differential computation analysis resistance.

Lijbers, J.M. (2016) Predicting parking lot occupancy using Prediction Instrument Development for Complex Domains.

Liu, Luyao (2016) Applying intelligence amplification in decision making.

Lubberdink, W.H.H. (2016) Op weg naar een praktische en eenduidige standaardisatie van producteenheden.

Maan, H.C. (2016) Item availability restricted.

Maat, GJ ter (2016) Towards a scalable environment for traffic information services.

Man, Shen Yi (2016) Data driven banking : applying Big Data to accurately determine consumer creditworthiness.

Meer, A.J.M. van der (2016) Mapping the underworld.

Meijer, Z. (2016) Definition, ideation and validation of the 'Bucketlist'.

Mentink, Fons (2016) Machine driven predictions of the socio-economic status of Twitter users.

Moscoviter, D. (2016) Improving spatial indexing and searching for location-based DNS queries.

Münch, D. (2016) Translating clinicians’ needs into requirements for a future Computerised Decision Support System in antibiotic therapy : a user-centred design and requirements engineering approach in a German geriatric hospital setting.

Neele, Thomas (2016) GPU implementation of partial-order reduction.

Noort, W (2016) Gathering intelligence from the Bitcoin peer-to-peer network.

Nutma, J. (2016) More comprehensive demand side management by the integration of the powermatcher and triana.

Odyurt, Uraz (2016) Bring your own authenticator/authentication security in physical access control systems.

Orij, J. (2016) Self-adaptation to concept drift in web-based anomaly detection.

Ouden, J.J.A. den (2016) A quest for the best automated tests : Estimating software reliability based on Spec Explorer's on-the-fly test results.

Outersterp, R.M. van (2016) Partitioning of Spatial Data in Publish-Subscribe Messaging Systems.

PINGEN, G.L.J. (2016) Machine Learning for Ground Cover and Hot Target Analysis in RGB and Satellite Imagery.

Pakhira, A. (2016) A Fault Injection Framework for Reliability Evaluation of Networks on Chip Designed for Space Applications.

Peeters, J.J. (2016) Fast and Accurate Likelihood Ratio Based Biometric Verification in the Encrypted Domain.

Pfab, Isabel (2016) A wearable intervention for posture correction.

Pijnenborg, I. (2016) Methodological guideline to find suitable design patterns to implement adaptability.

Prause, L. (2016) Software vendors' service infusion : a generic value network of cloud-based enterprise software.

Prenger, A.H. (2016) Effect of rotating virtual product presentation on purchase intention in online stores.

Pross, L.S. (2016) Trust in the Cloud.

Rauleder, S. (2016) Cloud computing as an entrance for start-ups into ERP solutions.

Rieksen, R.H. (2016) Perfect selfie that can be used in face recognition with a passport photo.

Ritterfeld, Thom (2016) On-demand app development.

SIMSCH, J.J. (2016) Video Quality in VR : Measuring Impact of Bandwidth-Saving Approaches on Quality of Experience and Social Interaction in a HMD-mediated Video Application.

Salomons, T. (2016) Een basis voor continu verbeteren bij AWL.

Santema, S.E (2016) Insight in Scheduling Choices:A Visualisation Tool for SDF Graphs.

Schniering, A.A. (2016) The relationship between human factors and presence experienced in Virtual Environments (VEs).

Schroer, G.H. (2016) Feasibility of End-To-End Encryption using Attribute Based Encryption in Health Care.

Schultewolter, M. (2016) Verification of user information.

Slatman, H. (2016) Unboxing security analytics : towards effective data driven security operations.

Slot, M.J. (2016) Ethics of Algorithms.

Spoor, R.J.F. (2016) Design of an Ultrasound Guided Breast Biopsy End-effector.

Strooisma, Ale (2016) A monitoring solution for multi-language software.

Sybenga, S.D.A (2016) Anomaly detection in defence and surveillance.

Teerenstra, G.H.G. (2016) The start of IT Governance in a Dutch Academic Medical Centre.

Tent Beking, Michiel van (2016) Sparse Array Antenna Signal Reconstruction using Compressive Sensing for Direction of Arrival Estimation.

Teschner, J. (2016) Serious Games in Medical Education : as Learning Tools.

Thirukokaranam Chandrasekar, Krishna Kumar (2016) Tracking and Control of Soft, Self-Folding Miniaturized Agent using Ultrasound Images.

Trillhose, Frank T. (2016) Controlling the production cell using TERRA-LUNA.

Uebbing, Tobias J. (2016) User experience in smart environments : design and prototyping.

Varkevisser, R.A. (2016) Large Scale Online Readability Assessment.

Veer, D. van der (2016) Design of a GMSK Receiver Prototype on a Heterogeneous Real-time Multiprocessor Platform.

Venema, M. (2016) DM3730 Camera interfaces on Gumstix.

Verheij, J.G.J. (2016) Co-simulation between CλaSH and traditional HDLs.

Verkuil, S. (2016) CiteRep - Journal Citation Statistics for Library Collections using Document Reference Extraction Techniques.

Vijver, B. van de (2016) A Human Robot Interaction Toolkit with Heterogeneous Multilevel Multimodal Mixing.

Vinke, D. (2016) Enhancing Video Game Design: Involving Users into the Design of Video Games.

Vlutters, S. (2016) Long short-term memory networks for body movement estimation.

Vonk, Jeroen (2016) Bisimulation Reduction with MapReduce.

Vossen, J.J. van (2016) Offloading Haskell functions onto an FPGA.

Vries, J.J. de (2016) A Tick Based Fixed Priority Scheduler Suitable for Dataflow Analysis of Task Graphs.

Vries, S.H.S. de (2016) Achieving 128-bit Security against Quantum Attacks in OpenVPN.

Wang, Q. (2016) A reference architecture for integration platforms.

Werff, W.M. van der (2016) Connecting ROS to the LUNA embedded real-time framework.

Wicaksana, M.A. (2016) IPv4 vs IPv6 Anycast Catchment: a Root DNS Study.

Wijlens, Bart (2016) Intelligent heating of a room.

Wilde, Lisa de (2016) A Bayesian Network Model for predicting data breaches caused by insiders of a health care organization.

Wolf, E.R.B. de (2016) Designing an interaction method for the holograms of today.

Wolf, T. (2016) Design of an Air Factor Sensor based on Light Emission.

Wolters, N.H. (2016) Analysis of Attack Trees with Timed Automata (transforming formalisms through metamodeling).

Xu, Tingting (2016) The Effect of Cultural Difference on the Perception of Online Ordering Website Design.

ZOMPAS, A. (2016) Development of a three dimensional path planner for aerial robotic workers.

Zakiy, Mochammad Fadhli (2016) HW-SW co-Design of an On-Chip IJTAG Dependability Processor.

Zandberg, K. (2016) Passive fingerprinting on an IPv6-enabled network.

Zeilstra, J. (2016) Reasoning about Active Object Programs.

2015

Adriaansen, A.M.A. (2015) Balancing inventory and equipment contingencies by a flexible semiconductor supply chain simulation model.

Allah Bukhsh, Zaharah (2015) BPMN Plus : a modelling language for unstructured business processes.

Baalen, R.B.C. van (2015) Is serious gaming the holy grail for the wearables industry?

Bakker, M. (2015) Numerical mathematics on FPGAs using CλaSH.

Berg, A.W. van den (2015) Improving customer satisfaction through personalization.

Berg, D.A. van den (2015) The risks and benefits of spreadsheet-based financial reporting as a form of shadow it in complex information systems: an action design research leading to the FRASIT-framework.

Berg, W. van den (2015) A systems approach to the design of a management information system for a growing IT service company.

Berkel, Niels van (2015) Item availability restricted.

Bloemen, V. (2015) On-The-Fly parallel decomposition of strongly connected components.

Blommendaal, Chris (2015) Information Security Risks for Car Manufacturers based on the in-Vehicle Network.

Boensma, Robert (2015) Geovisualization and time based mission planning on a multi-touch tabletop.

Bogaard, J.A. van den (2015) Predicting the performance of ERP in a changing and challenging energy market.

Bolhuis, M. (2015) Estimating Creditworthiness using Uncertain Online Data.

Bouius, B A.G. (2015) Characterising the Ripple Effects of Introducing Energy-Awareness Functionality in Cyber-Physical-Systems Software in Cyber-Physical System software.

Breed, I. (2015) Designing a spend analyses method for Power-Packer.

Brilman, Maarten (2015) A multimodal predictive model of successful debaters or how I learned to sway votes.

Brinkhuis, M.E. (2015) Improving the Medicaid eligibility determination process using big data.

Buuren, R.A. ten (2015) Domain-Specific Language Testing Framework.

Carvajal Gallardo, I. R. (2015) Privacy-preserving social DNA-based recommender.

Cheng, Miss Shu (2015) Translating strategy into implementation via capability-based planning.

Chromik, Justyna Joanna (2015) Booters (black)list.

DAM, M.R. (2015) Auditory processing using CλaSH.

Dekker, Thomas W.G. (2015) Applying parental involvement in secondary vocational education using a technological solution.

Dietz, W.S. (2015) A Reference Model Method to align the development of one software system with multiple Hinterland Container Terminals.

Donselaar, V.L. van (2015) Low latency asynchronous database synchronization and data transformation using the replication log.

Drijfhout, Wanno (2015) The Knowledge Cloud: Evolving the data management paradigm.

Dunn, B.C. (2015) De toepassing van de EWMA-methode op het adverteermodel van Joosten (2015).

FU, Q. (2015) Implementing a real-time control algorithm of Triana on SASensor Open Platform.

Fonville, M.E. (2015) The virtual machine delivery network.

Foustanas, Nestoras (2015) Helping elderly users control a telepresence robot with a touch screen.

Geijs, D.J (2015) Geautomatiseerde beeldanalyse van morfologische kenmerken en de motiliteit van een individuele spermatozoon.

Gerritsen, S.N.J. (2015) Using teamwork to enhance the social presence on a distributed playground.

Gijsen, Stijn (2015) Runtime Permission Checking in Concurrent Java Programs.

Hageman, Kaspar (2015) The Performance of ECC Algorithms in DNSSEC: A Model-based Approach.

Hakim, V.S. El (2015) Implementation and Analysis of Real-time Object Tracking on the Starburst MPSoC.

Harmsen, Ruud (2015) Specifying the WaveCore in CλaSH.

Hensema, M.A. (2015) Applying Agile in Enterprise Architecture.

Heukels, F.R (2015) Simultaneous Localization and Mapping (SLAM) : towards an autonomous search and rescue aiding drone.

Hoegen, Rens (2015) Human Behavior towards Virtual Humans.

Hoener, P.M. (2015) Improving the Processes and Safeguards for Fraud Detection and Prevention in US Medicaid.

Huizenga, G.R. (2015) A Front-end Application for Markov Random Field-based Texture Image Segmentation.

Huls, C. J. (2015) A scenario planning for interbank payments and Decentralized Ledger Platforms.

Jhanjhan, W.S.S. (2015) VICA: The Dutch Windmill - Towards a Contemporary Business Information Management Maturity Model.

Jutten, M.G. (2015) The Fit between Business Processes and Process Mining related Activities: a Process Mining Success Model.

Kalcheva, D.K. (2015) Linked Data adoption and application within financial business processes.

Kamminga, J.W. (2015) Cooperative Localisation on Android Devices by Utilising only Environmental Sound.

Karampatzakis, E. (2015) Item availability restricted.

Kers, R.J. (2015) Head mounted control system for robotic assisted surgery.

Kleverwal, J. (2015) Supervised text classification of medical triage reports.

Koegler, Philipp (2015) IT architectures in e-commerce: The effects of modularity, integration and type of components on e-service quality.

Koelemans, DRPM (2015) Item availability restricted.

Koenen, S.K. (2015) Assessing the level of security of an organization by analyzing the enterprise architecture : a methodology.

Kolkman, M.C. (2015) Cross-domain textual geocoding: the influence of domain-specific training data.

Kolkmeier, Jan (2015) Intimacy is Induced and Regulated Through Proxemic & Gaze Behaviour - A Study in Immersive Virtual Reality.

Krisnawati, Anastasia Maria (2015) Project portfolio valuation with Enterprise Architecture.

Kruk, D.A. van der (2015) A domain-specific language for specifying distributed real-time software system configurations.

Kumar, Atul (2015) Security Analysis of Mobile Payment Systems.

Lange, T.C.B de (2015) IS/IT integration in mergers & acquisitions: a framework for a systematic approach.

Lanting, Peter (2015) Multi-level views in a SUM-based environment.

Leeuwen, M.M. van (2015) Agile Scaling @ Topicus : s caling scrum with help of Agile Scaling frameworks at Topicus Finance.

Leur, C. de (2015) Permission-based separation logic for Scala.

Li, Qin (2015) Examining the accuracy of sentiment analysis by brand monitoring companies.

Ling, Chen (2015) Design and implementation of a control structure for a quadrupe robot.

Lippok, B.M. (2015) Ontwikkeling van een App store voor een iPaaS.

Martakis, A. (2015) Framework for Enterprise Uncertainty-Driven Decision-Making : FEUD.

Meijerink, B.J. (2015) Lossless Multicast Handovers in Proxy Fast Mobile IPv6 Networks.

Middelesch, E.W. (2015) Anonymous and hidden communication channels : a perspective on future developments.

Müller, M. C. (2015) SIDekICk - Detecting Malicious Domain Names in the .nl Zone.

Nazarian, A.A. (2015) Voorraadbeheeroptimalisatie van een retailer.

Oortwijn, W.H.M (2015) Distributed Symbolic Reachability Analysis.

Oost, M. (2015) Analysis of Homecare Nurses’ Attitudes towards, Desires for and Perceived Added Value of Tools on a Tablet.

Overbeek, T.A.G. van (2015) Floater Allocation in Paced Mixed Model Assembly Lines: Design and implementation of a method for operational scheduling of cross-trained workers in Mixed-Model Assembly Lines.

Paauw, Tim (2015) Analysis of unstructured data at GGD : text mining semi-medical notes to predict childhood obesity and abuse.

Parzian, Alessio (2015) Java Card Bytecode Verification. Designing a novel verification system.

Piggott, J.J.H. (2015) Identification of business travelers through clustering algorithms.

Pouw, I.H. (2015) You are what you eat : serious gaming for type 1 diabetic persons.

Raa, I. te (2015) Recursive functional hardware descriptions using CλaSH.

Rodday, Nils Miro (2015) Exploring Security Vulnerabilities of Unmanned Aerial Vehicles.

Roelofs, N.A.J. (2015) Incorporating Seasonality and Volatility Updating in Gas Storage Valuation for the Purpose of Validation.

Roo, M. de (2015) Optimal Event Handling by Multiple UAVs.

Ruth, F.J. van (2015) Improving problem detection and focus for root-cause analysis through case-based reasoning and group decision support systems.

Sandhaus, Hauke Gregor Wilhelm (2015) Development of a 3D navigable interface for a touchless showcase.

Scrinzi, F. (2015) Behavioral Analysis of Obfuscated Code.

Seidel, Carina (2015) Strategic insight in the Capacity & Efficiency with Hospital data.

Senden, J.M.J. (2015) Biasing a ring-oscillator based true random number generator with an electro-magnetic fault injuction using harmonic waves.

Slootweg, M.H.F. (2015) Implementing and Characterising Medical Implantable Wireless Communication Using the Microsemi ZL70102 : And Prototyping a Load Measurement Tool for Unicompartmental Knee Replacement Operations.

Starink, O.A.W. (2015) State-Save Overhead Reduction Techniques for Shared Accelerators in an MPSoC with a Ring NoC.

Sterk, Sjoerd (2015) Realisatie van rijgedrag verbetering d.m.v. een dashboard op basis van gamification.

Stojkovski, Borce (2015) Employing User-Centered Design methods for the development of a Virtual Reality training system for firefighters.

Thunnissen, J. (2015) Communication solution for ICU patients : a case study.

Veen, H. van der (2015) Composing a more complete and relevant Twitter dataset.

Veldhuis, H.D. (2015) Developing an automated solution for ETA definition concerning long distance shipping.

Venis, A.J. van de (2015) Recommendations using DBpedia : how your Facebook profile can be used to find your next greeting card.

Verhaar, Jort (2015) Micrometer scale 3d membrane printing towards locust ear imitation.

Versluijs, Wouter (2015) Understanding Information Technology : information technology as extension and its implications for the flourishing of the individual.

Vettorel, Diego (2015) Design a platform for providing home-based services concerning: care, safety, comfort and fun.

Visser, N.S. (2015) Fully automated web harvesting using a combination of new and existing heuristics.

Vocke, Tom (2015) An evaluation of the Adapteva Epiphany Many-Core Architecture.

Vorstenbosch, S. (2015) On-premise to SaaS Integration Risk Mitigation A framework to gain insight in the risks, and recommend mitigation strategies, specific to on-premise to SaaS integration.

Vos, Peter-Jan (2015) Demonstrator combining ROS/TERRA-LUNA.

Vries, J. de (2015) The Generation of Booter (black)lists.

Wolbers, S. (2015) Participatory design approach to improve the communication between care providers through the electronic health record.

Ye, Xiaohao (2015) GlucOnline Coach: a virtual coach app for diabetes patients.

Zanetti, Nicola (2015) Concept-drift in web-based IDS : evaluating current capabilities & future challenges.

2014

A., E. (2014) Item availability restricted.

Abreha, Gebremedhin Teklemariam (2014) An environmental audio-based context recognition system using smartphones.

Aertsen, M.Y. (2014) Verifying functional requirements in multi-layer networks: a case for formal description of computer networks.

Akbar, Nurul (2014) Analysing Persuasion Principles in Phishing Emails.

Amrin, Nabila (2014) The Impact of Cyber Security on SMEs.

Anagnostopoulos, Nikolaos Athanasios (2014) Optical fault injection attacks in smart card chips and an evaluation of countermeasures against them.

Aregay, Tesfay (2014) Ranking Factors for Web Search : Case Study in the Netherlands.

Badarinath Hampiholi, Brinda (2014) Secure & privacy-preserving eID systems with Attribute-Based Credentials.

Beckers, Mr D.K. (2014) Information waste on the World Wide Web: combating the clutter.

Beestman, Linda (2014) Interactive whiteboard use in elementary education : How to support teachers to improve their education, using the interactive whiteboard.

Berg, Boudewijn van den (2014) Visual tracking of magnetic microrobots in biomedical research applications.

Biesbroek, Rudolf (2014) Last-mile lightpath services : on packet-switched shared infrastructure.

Bokhove, Tom (2014) Public data visualisation in traffic, based on local, real-time monitoring.

Bolhuis, M (2014) Using an NFC-equipped mobile phone as a token in physical access control.

Bolscher, P.S. (2014) Automated external fraud prevention in the public sector.

Bookholt, Erik (2014) The Impact of Enterprise Architecture on Business Performance.

Boom, N. (2014) XRM at a bilateral trade organisation.

Bortolameotti, Riccardo (2014) C&C Botnet Detection over SSL.

Bos, J.C.H. (2014) Synthesizable Specification of a VLIW Processor in the Functional Hardware Description Language CλaSH.

Bos, Mart van den (2014) An integrated hydrodynamic-economic model for setting differentiated insurance premiums.

Bos, S.L. (2014) Improving the well-being of independently living seniors using ICT How can a personal service be used to improve the self-efficacy, social engagement and security awareness of independently living seniors?

Bosch, S.F. van den (2014) Designing Secure Enterprise Architectures A comprehensive approach: framework, method, and modelling language.

Brinke, Hans ten (2014) Hide and sneak - Perceptions in The Virtual Storyteller.

Broekema, C.D. (2014) Modelling loitering character agents in conflict situations: Visualizing and evaluating interpersonal conflict strategies.

Broekhuis, Djurre (2014) Sousveillance on Intelligent Transportation Systems.

Broenink, Ralph (2014) Finding Relations Between Botnet C&Cs for Forensic Purposes.

Bronkhorst, T.A.W. (2014) Hardware design of a cooperative adaptive cruise control system using a functional programming language.

Claase, Marcella (2014) Why do users bond with online services? : a literature review on the conceptualization of online user bonding in the context of online services.

Corradin, M.C. (2014) Then and Now: On The Maturity of Cybercrime Markets : A study on regulation enforcement of forums in the online underground trading economy.

Davelaar, K.I. (2014) Protecting high school students from bullying: Bully Shield.

Demkes, K.H. (2014) Automated tuning of an algorithm for the vehicle routing problem.

Deneka, Agnes (2014) A coach ECA to increase Societal Participation of Low Literates and Non-Native Citizens in the Societal Participation Learning Support System.

Dijk, T.G. van (2014) Tuning the Parameters of a Loading Algorithm.

Drenthen, S. (2014) Towards continuous delivery in system integration projects : introducing a strategy to achieve continuous delivery and test automation with FitNesse.

Duraisingam, Prithivi Ram (2014) Crack detection in semiconductor products : machine vision techniques for detection of cracks in semiconductor products.

Elderen, Sybren van (2014) Beating Logic: Dependent types with time for synchronous circuits.

Erich, Floris Marc Arden (2014) Improving information system development and operations using the DevOps conceptual framework.

Fu, Q. (2014) Validation of Interpersonal Stances Expressed by Virtual Suspect Characters in a Police Interview Setting.

Galen, Rick van (2014) Design and feasibility of mobile peer-to-peer payment systems.

Gielen, M W (2014) Prioritizing Computer Forensics Using Triage Techniques.

Haji Ghasemi, Maryam (2014) Symbolic model checking using Zero-suppressed Decision Diagrams.

Heer, G.W.A. de (2014) Instance Pointcuts.

Hek, J. (2014) Clustering the results from brainstorm sessions.

Heling, Yoran (2014) Biased Random Periodic Switching in Direct Connect.

Hendriks, Luuk (2014) SSH Compromise Detection using NetFlow and IPFIX.

Hessels, Stefan (2014) Adoption of Personal Health Records (PHR) in The Netherlands: A study using the PRIMA-model.

Heuven, D.W. (2014) Opportunistic sensing & Aggregation network Using Smartphones and Sensor nodes.

Hoek, Marissa (2014) Generating Dutch focalized stories about interaction in a serious game.

Hummel, Tim (2014) Exploring Effects of Electromagnetic Fault Injection on a 32-bit High Speed Embedded Device Microprocessor.

Hurne, I. van (2014) Towards a Unifying Framework for Modelling and Executing Model Transformations.

Jochemsen, M.C. (2014) An exploration of content-driven commerce.

Jong, Berend J.M. de (2014) A basis for the next VHDL revision.

Jonker, M. (2014) Flow-based SSH Dictionary Attack Detection: the Effects of Aggregation.

Joustra, Yme (2014) Forecasting of wind power production in the Netherlands.

Kamp, T.R. van de (2014) Combining ABCs with ABE: Privacy-Friendly Key Generation for Smart Card Based Attribute-Based Encryption.

Kamphuis, Gertjan (2014) Adding Quality of Service to Disruption Tolerant Networking using the ORWAR routing protocol for use in military MANETs.

Kandziora, Jorne (2014) Runtime assertion checking of multithreaded Java programs - An extension of the STROBE framework.

Kars, J. (2014) Improved performance by integrated corrugator and converter scheduling.

Karuppiah Ramachandran, Vignesh Raja (2014) Characterization of Communication Mechanisms for Implantable Body Sensor Networks.

Keeris, P.J.C. (2014) Improving the boarding process of external insiders in large organisations.

Kegel, R.H.P. (2014) Development and Validation of a Personal Information Security Assistant Architecture.

Kleef, N.T.M. van (2014) Making people matches using Supervised Machine Learning algorithms.

Knippers, D. (2014) Querying Uncertain Data in XML.

Kooij, W.J. (2014) Playout delay of TV broadcasting.

Krist, J.O. (2014) The effect of residential storage and conrrol on the distribution net compared to central storage and control.

Lenthe, J.M. van (2014) Combining Multiple Malware Detection Approaches for Achieving Higher Accuracy.

Loker, Andre (2014) Evaluating data structures for runtime storage of aspect instances.

Lu, Yuan (2014) Investigation on factors limiting the performance of deep sleep classification.

Maat, Roel ter (2014) A Framework for Modular Implementation of Domain-Specific Event-Based Applications.

Marenco Zúñiga, Andrés (2014) Federated Aggregated Search.

Meijer, J.J.G. (2014) Improving Reachability Analysis in Ltsmin - Guards, Read, Write and Copy Dependencies for mcrl2, Promela and Dve.

Mirchev, Hristofor (2014) Creating a Modular AspectJ Foundation for Simple and Rapid Extension Implementation.

Molder, Jantine te (2014) The redesign of a cashier trainer.

Molen, N.J van der (2014) Item availability restricted.

Nee, F.D. van (2014) To a new hardware design methodology : a case study of the cochlea model.

Nibbelke, Vincent (2014) Vascular pattern recognition for finger veins using biometric graph matching.

Nienhuis, J. (2014) Using Change Management to improve CRM User Acceptance.

Oude Elferink, Wout (2014) Fingerprint acquisition with a smartphone camera.

Pallett, Dennis (2014) Improving Query Performance of Holistic Aggregate Queries for Real-Time Data Exploration.

Paramartha, Mohammad Anggasta (2014) Design and Instantiation of Reference Architecture of Pluggable Service Platform in E-Commerce.

Peters, Rifca Marcella (2014) How Turn-Taking Influences the Perception of a Suspect in Police Interviews.

Pluimers, Peter (2014) Item availability restricted.

Putten, F.M.J. van der (2014) Advies over de mogelijkheid tot het invoeren van slechts één planningsomgeving binnen VDL ETG Almelo.

Reiling, Mark (2014) Implementation of a Monocular Structured Light Vision System for Pipe Inspection Robot PIRATE.

Ringlever, J.J. (2014) Improved timetabling for a public transport company from cost as well as passenger perspective.

Ringlever, J.J. (2014) Improved timetabling for a public transport company from cost as well as passenger perspective.

Roditi, Alexandra (2014) Quantifying the Contribution of Enterprise Architecture to Business Goals.

Roskam, Ronald (2014) Evaluation of Online Public Sexual Health Care in the Netherlands: A Scenario-Based User Evaluation.

Ruiter, Mark de (2014) Performance measurement of Hermite-based multi-carrier communication.

Schipper, Ruurd de (2014) The usefulness of IT innovation classification for business model innovation.

Selman, K.J.R. (2014) Facial expression compensation.

Sinke, Mariska (2014) Knowledge sharing in schools with data teams.

Skute, Igors (2014) Brand Equity and Co-Creation Potential in the Social Media Environment: an Analysis of Brand Engagement with Community Influencers.

Smid, Wietse (2014) Ad-hoc context-driven changes in a business process management system.

Snoyl, K.E.R. (2014) De effecten van het gebruik van het F-LinQ fotolijstje op de verbondenheid tussen ouderen en hun (klein)kinderen.

Spenkelink, H.F. (2014) The Adoption Process of Cryptocurrencies - Identifying factors that influence the adoption of cryptocurrencies from a multiple stakeholder perspective.

Spoor, R.J.F. (2014) Design of a wall latching device.

Spruijt, Robert (2014) Selecting a BI Architecture that fits Organisation's Requirements.

Staicu, Cristian-Alexandru (2014) Evaluation of HIMMO with Long Identifiers, an Extension of the HIMMO Key Establishment Scheme.

Steeg, D.P.M.H. van der (2014) Flow-based DDoS Attack Detection on Cisco IOS.

Stijntjes, Ingo (2014) Assessment of automated crowd behaviour analysis based on optical flow.

Strecke, Jonas (2014) A high torque variable stiffness mechanism for the 'VSDD': conceptual design, realization and experimental validation.

Tax, Niek (2014) Scaling Learning to Rank to Big Data: Using MapReduce to parallelise Learning to Rank.

Utomo, Diana (2014) A framework for cloud adoption from Enterprise Architecture and Business Perspective: Validation case study: The implementation of cloud-based contact distribution in Philips Consumer Lifestyle.

Verbij, Ruud Paul (2014) Dutch e-voting opportunities. Risk assessment framework based on attacker resources.

Vercammen, S.A.A. (2014) Displaying intermediate results for on-going searches.

Vries, W.B. de (2014) How asymmetric is the Internet? A Study to support DDoS Mitigation approaches.

Waalewijn, Dennis (2014) Cyber Security in the Supply Chain of Industrial Embedded Devices.

Waanders, M.J.C (2014) Approximation Algorithms for Connected Graph Factor Problems.

Wagenaar, J.C.N. (2014) Collaborative Cyber Security in the Retail Sector.

Wapperom, Sjoerd (2014) Computational Modelling of Suspect Behaviour in Police Interviews.

Weber, Vincent (2014) UTFM - a Next Generation Language and Tool for Feature Modeling.

Welling, Ruud (2014) Conflict detection and analysis for single-pushout high-level replacement.

Werf, S.J. van der (2014) Measuring Workload at a ProRail Control Post.

Westenberg, R.M. (2014) Managing customer innovation in the financial services industry: A technology acceptance perspective.

Wevers, Gerben (2014) Hardware accelerator sharing within an MPSOC with a connectionless NOC.

Wevers, Gerben G.A. (2014) Hardware Accelerator Sharing within an MPSoC with a connectionless NoC.

Wiegers, R.F.P. (2014) Behavior specification for ontologically grounded conceptual models.

Wielstra, Biense Adrianus (2014) Assessing the Impact of Business Process Redesign Decisions on Internal Control within Banks: A Methodology.

Wierbosch, Mark (2014) It is raining packets.

Windhouwer, Dennis (2014) The Modularity of the Resource Utilization Model in Python.

Witte, N. (2014) Technology Acceptance of Business Meetings in a 3D Virtual Environment Supported by a Content Management System.

Zaga, Cristina (2014) Engaging child-robot interaction in a collaborative task.

2013

Beek, Daan van (2013) Comparing the LTSmin and NuSMV reachability tools via automatic translation of their respective input languages.

Been, Henry (2013) Finding you on the Internet : Entity resolution on Twitter accounts and real world people.

Berg, F.I. van der (2013) Model checking LLVM IR using LTSmin : using relaxed memory model semantics.

Bruijn, Vincent de (2013) Model-based testing with graph grammers.

Bullée, Jan-Willem (2013) Detection of leadership in informal (small) groups based on CCTV information.

Companjen, Ben (2013) Probabilistically matching author names to researchers.

Cornelissen, Richard (2013) Towards a methodology-growing framework.

Davison, David (2013) A framework for creating semantic wikis for biomedical research laboratories.

Dirlik, S. (2013) A comparison of FFT processor designs.

Duerink, Hendrik Lodewijk (2013) Information System Data Flow within Performance Based Logistics.

Fluttert, Ernst (2013) Deciding between mobile implementation platforms - A multi-criteria decision system for implementation platforms for mobile applications.

Franssen, T.K.C. (2013) Gesture recognition in streaming motion data using offline training with a limited training set.

Gennep, Bart van (2013) In the eye of the wizard : effects of (mutual) gaze on an avatar mediated conversation.

Hemert, Teun van (2013) Implementing flexible, extensible composition operators.

Heus, Marije de (2013) Design and evaluation of a recommender system for high school courses in the Netherlands.

Hoekerd, P.G. (2013) Using existing software to build a virtual community for telemedicine.

Hoener, P.M. (2013) Cloud Computing Security Requirements and Solutions: a Systematic Literature Review.

Huijgen, Arris (2013) Effciently protecting virtualized desktop infrastructures against malware : Performance comparison between traditional- and centralized antivirus.

Hullu, Clermond de (2013) Architectural design of modular ESB systems.

Hulsebosch, Marc (2013) Targeting gamification applications to increase user participation.

Höfer, Christina (2013) Privacy-Preserving : Charging for eMobility.

Ionita, Dan (2013) Current established risk assessment methodologies and tools.

Keijl, Edwin (2013) Picalilly: sharing photos through locative social media.

Knoben, L. and Otten, M. and Fransen, R. (2013) De waterzuivering als Petrinet : het voorspellen van overstromingen.

Kolthof, Peter (2013) Vaardigheden van middelbare scholieren voor het selecteren van informatie op het internet.

Kuiper, Guus (2013) Guaranteed-throughput improvement techniques for connectionless ring networks.

Kuipers, Elles (2013) Passend onderwijs via de elektronische leeromgeving promotie digitaal.

Laarakkers, Mark (2013) Generating continuation passing style code for the co-op language.

Misra, Gaurav (2013) Permeance of ICT in crime in India.

Moll, René (2013) A DFT based synchronization scheme for chirped communication.

Nguyen, A.D. (2013) Integration of IEC 61850 mms and lte to support remote control communications in electricity distribution grid.

Olthuis, Ferry (2013) A comparison of state space reduction techniques in SCOOP.

Oude Veldhuis, M. (2013) Multi-target user interface design and generation using model-driven engineering.

Pasveer, Marco (2013) Importance sampling for probabilistic timed automata.

Pham, Giang T. (2013) Integration of IEC 61850 MMS and LTE to support smart metering communications.

Postema, B.F. (2013) Fluid survival tool: a model checker for Hybrid Petri nets.

Riet, M. van 't (2013) Trace-based debugging for advanced-dispatching programming languages.

Roemers, Arnout (2013) An adapter-aware, non-intrusive dependency injection framework for Java.

Saman Yan, Daian Geivid (2013) The effect of Testing and Feedback in Digital Game-based Learning.

Satria, Triadimas Arief (2013) Seamless service continuity in cloud based lte systems.

Schade, Christiaan Leonard (2013) FCScan: A new lightweight and effective approach for detecting malicious content in electronic documents.

Sepulveda Bradford, G.U. (2013) What happens when a robot favors someone?: how a museum-guide robot uses gaze behavior to address multiple persons while storytelling about art.

Smits, Pieter (2013) Rationales for Modern ICT Implementation into Schools: a case of tablet PCs.

Smulders, Edwin (2013) User Space Memory Analysis.

Steeneken, Anna (2013) Tablet Gebruik voor Activerende Leeractiviteiten: Een exploratieve case study binnen het Vlaams beroeps en technisch secundair onderwijs.

Tesfay, Tesfahun Aregawy (2013) Automatic distribution analysis of business processes for cloud-based BPM.

Tijhuis, K. (2013) Methods for modelling unit operations in chemical process simulators.

Ugen, Mattijs (2013) Scalable performance for a forensic database application.

Valtulina, Luca (2013) Seamless distributed mobility management(dmm) solution in cloud based lte systems.

Veen, G.F.P. van (2013) Brain Invaders - Finding the paradox of control in a p300-game through the use of distractions.

Verver, Maks (2013) Practical improvements to parity game solving.

Vonk, J. (2013) Formal specification and verification of OpenCL Kernel optimization.

Wal, Jelmer ter (2013) Specification and verification of selected parts of the Java Collections Framework using JML* and KeY.

Wit, Jeroen de (2013) Continuous forensic readiness.

Zarghami, S. (2013) Middleware for Internet of things.

2012

Alam, Ashiful (2012) Business information management and the cloud.

Alofs, Thijs (2012) The Interactive Storyteller A multi-user tabletop board game interface to support social interaction in AI-based interactive storytelling.

Bamberg, Rob (2012) Non-deterministic generalised stochastic petri nets modelling and analysis.

Beusink, J.W.C. (2012) Secure access contol to personal sensor information in federations of personal networks.

Biggelaar, M.E.C. van den (2012) Social media in het middelbaar beroepsonderwijs? Kansen en belemmeringen van social media voor het taal- en rekenonderwijs in het middelbaar beroepsonderwijs.

Blankendal, Göran (2012) Building an Xtext compiler for Aspect-Oriented Languages based on ALIA4J.

Brandon, Merel (2012) Effect personality matching on robot acceptance : effect of robot-user personality matching on the acceptance of domestic assistant robots for elderly.

Brands, E.H.T.B. (2012) Flow-based monitoring of GTP traffic in cellular networks.

Broek, J.D.A. van den (2012) Design and implementation of an analog-to-time-to-digital convertor.

Broek, Jurgen Gijs van den (2012) Real-world analyses of internet protocols.

Brugman, Ivo (2012) A multimodal interactive system for creative expressions.

Bruintjes, Harold (2012) Bridging GROOVE to the world using a conceptual language model.

Burgman, Ronald (2012) Partial-order reduction based on probe sets.

Chen, Zhen (2012) Workflow management solution for a security management application.

Dijk, Tom van (2012) The parallelization of binary decision diagram operations for model checking.

Donker, J.H. (2012) Handfish - tunable heterogenous multi-core simulators on multi-core hosts.

Donselaar, V.L. van (2012) Information Retrieval models based on electrical circuit analysis using Ohm’s law.

Epskamp, S.G. (2012) On the influence of stereographic 3D on user dependent direct projected augmented reality in the OR.

Gehring, Felix (2012) Software performance prediction in early development phases: A UML- and simulation-based approach.

Gerritsen, Jan-Henk (2012) Detecting synchronization conflicts for horizontally decentralized relational databases.

Groot, R.E.J. (2012) IT-based risks in advergame campaigns : a focus on fairness and privacy.

Heijden, Rens W. van der (2012) SeDyA: secure dynamic aggregation in VANETs.

Heukels, Rolf (2012) Predicting user behavior using transition probability.

Hijmans, Remco (2012) Comparing grid-based features and classification settings, in an off-line supervised human action detection and recognition task.

Hobert, L.H.X. (2012) A study on platoon formations and reliable communication in vehicle platoons.

Hoeve, Thijs ten (2012) Model based testing of a PLC based interlocking system.

Hofste, J. (2012) Scalable identity extraction and ranking in Tracks Inspector.

Huang, Liting (2012) Secure and privacy-preserving broadcast authentication for IVC.

Jansen, M. (2012) Improving inattentive operation of peripheral touch controls.

Jonkman, F. (2012) Nonverbal behaviour of an embodied storyteller.

Kalsbeek, Maarten van (2012) Interface and interaction design patterns for e-commerce checkouts.

Ketelaar, J.G. (2012) Controller design for a bipedal robot with variable stiffness actuators.

Keuper, D. (2012) XNU : a security evaluation.

Kuperus, Jasper (2012) Catching criminals by chance: a probabilistic approach to named entity recognition using targeted feedback.

Liu, Peng (2012) Test bed and sensor platform for building usage profiling.

Loch, Frieder (2012) Hierarchical gestures: ggestural shortcuts for touchscreen devices.

Middag, Jacob (2012) Convergence of an implicit runge-kutta discontinuous Galerkin method using smooth limiters.

Mols, Emiel (2012) Sharding Spotify search.

Noppen, I. (2012) Assessing the benefits of spectrum sharing in wireless access networks.

Oostinga, Ruben (2012) A java bridge for LSTMIN.

Ottow, Christiaan (2012) Hacking the next web: penetration testing over IPv6.

Sburlea, Andreea Ioana (2012) Brighten up your mind! : Effects of light priming and encouraging feedback on the neural and behavioral responses in a general knowledge task.

Scheerens, Daan (2012) Practical indoor localization using bluetooth.

Schot, N. (2012) QoS-aware model-driven SOA using SoaML.

Siaw, Tien Loong (2012) Saturation for LTSmin.

Spijker, Hanno (2012) Improving information dissemination in sparse vehicular networks by adding satellite communication.

Stapersma, Paul (2012) Efficient query evaluation on probabilistic XML data : derived from a glue process with skeleton & flesh.

Stemmer, Joel (2012) detecting outliers in web-based network traffic.

Stoica, Mircea (2012) Detecting the no-control state in self-paced Brain-Computer Interfaces.

Stokkink, Gerjan (2012) Quiescent transition systems.

Teka, Abelneh Y. (2012) Analysis of indirect influence relations in goal-oriented requirements engineering.

Terwellen, Christian (2012) Evaluating the behavior of embedded control software : using a modular software-in-the-loop simulation environment and a domain specific modeling language for plant modeling.

Verberkt, S.L.C. (2012) Claiming security properties in a service oriented architecture.

Vermolen, R.M. (2012) The red queen’s race: from delivery stories to effort estimation: an empirical study.

Wagenaar, P. (2012) Detecting botnets using file system indicators.

Wevers, Lesley (2012) A persistent functional language for concurrent transaction processing.

Wicaksono, Sulistyo Unggul (2012) Enterprise knowledge : reference architecture for visualization and prototype implementation using Wiki.

Wieringa, Wilko (2012) User Handover in a Cross Media Device Environment, A Coaching Service for Physical Activity.

Wu, Xian (2012) Modeling and performance evaluation of wirelesshart.

Zandberg, Martin (2012) Optimization of aspect-instantiation strategies in the JIT-compiler.

Zanderink, Arnold (2012) Drum assistant.

2011

Adolfsen, Martijn (2011) Industrial validation of test coverage quality.

Bergervoet, Erwin Josephus (2011) Let the game do the talking : the influence of explicitness and game behavior on comprehension in an educational computer game.

Boer Rookhuiszen, Roan (2011) Generation of German narrative probability exercises.

Bosems, Steven (2011) A Performance Analysis of Model Transformations and Tools.

Brinke, Steven te (2011) First-order function dispatch in a Java-like programming language.

Bruintjes, Tom M. (2011) Design of a Fused Multiply-Add Floating-Point and Integer Datapath.

Camacho Camacho, José Manuel (2011) Assembler a bgp-compatible multipath inter-domain routing protocol.

Dalen, J.J.M. van (2011) Designing a tool for norm interventions in IT strategy projects.

Dam, Franciscus Jozua van (2011) A stripline antenna for radiated immunity testng.

Dekens, Berend (2011) Mapping of a DAB Radio Decoder to Homogeneous Multi-Core SoC : a case study to evaluate a NLP based mapping flow.

Delden, R.W. van (2011) Design of therapeutic TagTile games for children with unilateral spastic cerebral paresis.

Eerenberg, E. (2011) Towards distributed information retrieval based on economic models.

Ende, Frederik van den (2011) Interference Nulling via a Resistor-Weighted Op-Amp Vector Modulator.

Fritz, Jako (2011) Hybrid Intrusion detection network monitoring with honeypots.

Goos, Sander (2011) A model driven approach to modernizing legacy information systems.

Grisel, I.G.J. (2011) Multimodal user interface for robotized flexible endoscopy.

Hakvoort, Gido (2011) Immersion and affect in a brain-computer interface game.

Ham, Wim van der (2011) An Appraisal Based Model of Affect for a Negotiating Agent.

Harleman, T. (2011) Towards a generic model for audit trails.

Hassani, A.Z. (2011) Touch versus in-air Hand Gestures : Evaluating the acceptance by seniors of Human-Robot Interaction using Microsoft Kinect.

Hegeman, Erik (2011) InfoSupport : On the Quality of Quality Models.

Hu, Danchao (2011) Using actor-network theory to understand inter-organizational network aspects for strategic information systems planning.

Jeeninga, Jesper (2011) Improving communication between computer programmers and domain experts : creating a generic scenario description language to aid the process of describing scenarios for emergency response training simulators.

Jong, Maurits D. de (2011) Network Management in a Distributed System.

Kanis, Zwier (2011) Classification of Semantically Coherent Segments in Web Pages.

Klifman, T.E. (2011) Propagation of Annotations in a Streaming Context.

Kortüm, Michael (2011) Non-invasive imaging with UWB.

Lastdrager, Elmer (2011) Securing Patient Information in Medical Databases.

Meijer, Michael (2011) On a Design Space for Aggregating over Sliding Windows on a Stream.

Nijenhuis, C.F. (2011) Automatic generation of graphical domain ontology editors.

Noltes, Johan (2011) Data location compliance in cloud computing.

Nouta, Christiaan Alexander (2011) Data processing networks made easy : improving development possibilities for people with limited computer science knowledge.

Obbink, Michel (2011) Social interaction in a cooperative brain-computer interface game.

Op 't Land, Sjoerd (2011) Ranging and localisation error mitigation in indoor obstructed direct path conditions.

Ottenhof, Robbert H.J. (2011) Towards automated truancy detection.

Oude Maatman, Ruud (2011) Design and evaluate a deployment process for the ES benefits management method.

Pater, Elwin (2011) Partial Order Reduction for PINS.

Peng, Yuxi (2011) Face Recognition at a Distance: a study of super resolution.

Posthumus, Wytse Jan (2011) The situated cognitive engineering tool.

Rajput, Abdul Ghani (2011) Properties Relevant for Inferring Provenance.

Schot, Vincent (2011) Social norms to motivate IT use.

Schutte, Rik (2011) Maintaining the causal thread of execution in distributed and multilanguage software.

Sluijsmans, Dennis (2011) Performance Evaluation of Data Dissemination Protocols for an Infrastructure-to-Vehicle Cooperative Traffic Light Application.

Veen, Dirk van (2011) Secure searching through encrypted data - Creating an efficient Hidden Vector Encryption construction using Inner Product Encryption.

Visser, Thomas (2011) Toward a model for incremental grounding in dialogue systems.

Wal, Tjalling van der (2011) Streaming workflow transformation.

Wanders, Brend (2011) Exploring signalling pathways as a serious game.

Warmer, Martin (2011) Detection of web based command & control channels.

Wiekens, Adri (2011) Feedback presentation for physical activity coaching: by an embodied conversational agent or by a simple e-mail?

2010

Admiraal, A.J. (2010) Automated ANTLR tree walker generation.

Ahmed, F. (2010) Relations between semidefinite, copositive, semi-infinite and integer programming.

Alemneh, E. (2010) Sharing nonlinear gates in the presence of glitches.

Baardman, Roel (2010) Cumulus Humilis : wireless mesh-networking for gliders.

Bakker, P.J. (2010) Train composition using motion as a common context.

Bijker, Remko (2010) Efficient pointcut projection.

Bouwhuis, Wilco (2010) Modelleren van de Neocortex : analyse en simulatie op grote schaal.

Bragt, Jasper (2010) Towards believable characters in the virtual storyteller.

Brugge, Jonathan (2010) Implementing and simulating the cross-entropy ant system.

Bukhsh, Faiza Allah (2010) Enhanced ICoNos maturity model.

Costa, Alvise (2010) Context - Free - Language Parser for Advanced Network Intrusion Detection.

Diephuis, Maurits (2010) A framework for robust forensic image identification.

Feng, Yuan (2010) Modified potential approach to efficient, linear and symmetric values for TU-games.

Franssens, Anne (2010) Impact of multiple inquires on the bluetooth discovery process : and its application to localization.

Ganzeboom, Mario S. (2010) User-independent recognition of dynamic hand gestures using a dataglove.

Hartholt, Woutske (2010) Beslissingsondersteuning voor het aanpassen van de online OK-planning.

Hartog, M.R. den (2010) Shunt planning : an integral approach of matching, parking and routing.

Hettinga, S. (2010) Performance analysis for embedded software design.

Hoeksma, Ruben (2010) Price of anarchy for machine scheduling games with sum of completion times objective.

Hollander, Emiel (2010) Dynamic access control.

Horst, Arie (2010) Sport coach : online activity using wireless sensor network.

Hove, D. ten (2010) Change management within SysML requirements models.

Jochems, Bart (2010) Detecting emotional intensity peaks in narrative conversational settings.

Kant, Gijs (2010) Distributed state space generation for graphs up to isomorphism.

Khadka, Ravi (2010) Model-driven development of service compositions : transformation from service choreography to service orchestrations.

Kok, Guido (2010) Cloud computing & confidentiality.

Korevaar, Cornelis Willem (2010) A time-frequency localized signal basis for multi-carrier communication.

Kroes, S. (2010) Domain specific embedded languages and model driven engineering.

Lange, R-J. de (2010) Provenance aware sensor networks for real-time data analysis.

Lansink, M. (2010) Hair simulation and rendering.

Lavooij, K. (2010) Near-real time statistics gathered from a continuous and voluminous data mutation stream.

Lin, Y. (2010) Architecture for IP based interconnection of heterogeneous wireless communication systems for mission-critical group oriented communications.

Moel, E.L. de (2010) Expanding the usability of recorded lectures : a new age in teaching and classroom instruction.

Palsma, T. (2010) Discovering groups using short messages from social network profiles : using hierarchically organized concepts to discover relations.

Paul, Ronald (2010) Realization and high level specification of facial expressions for embodied agents.

Peterson, R.S. (2010) Testing real-time requirements for integrated systems.

Pothoven, Tristan (2010) Workflow usage in the healthcare environment.

Punter, C.M. (2010) Multi-source entity resolution.

Qiu, Xian (2010) Bin packing games.

Schwartzenberg, J. (2010) Using machine learning techniques for advanced passive operating system fingerprinting.

Sijtema, Marten (2010) Managing variability in model transformations for model-driven product lines : extending the ATL model transformation language with variability management capabilities.

Sikkens, B. (2010) The storage and retrieval of sensor data and its annotations.

Slomp, G.H. (2010) Reducing UPPAAL models through control flow analysis.

Spijkerman, Wietze (2010) Tool support for change impact analysis in requirement models : exploiting semantics of requirement relations as traceabilitt relations.

Stuurman, Gijs (2010) Action semantics applied to model driven engineering.

Teijgeler, Stefan (2010) Connecting GROOVE to the world using XMI.

Telgen, M.G. (2010) Realistic route choice modeling.

Ugryumova, D. (2010) Control design for a chemical disinfection process using the residence time distribution.

Valk, J.J. van der (2010) The in uence of a target motion model on the exact Bayesian filter recursion; research by particle filtering.

Vlieg, Edwin (2010) Usage patterns for user-centric service composition.

Voorst, B. van (2010) Cluster-based collection selection in uncooperative distributed information retrieval.

Wester, Rinse (2010) A dataflow architecture for beamforming operations.

Yin, Haihan (2010) Developing a generic debugger for advanced-dispatching languages.

Zanden, Guido van der (2010) Quality assessment of medical health records using information extraction.

2009

Akker, H. op den (2009) On adressee prediction for remote hybrid meeting settings or how to use multiple modalities in predicting whether or not you are being addressed in a live hybrid meeting environment.

Asuncion, C.H. (2009) Goal-driven service mediation solution.

Baaij, C. (2009) CλasH : from Haskell to hardware.

Balen, J. van (2009) A virtual billiard assistant.

Barbosa, Rafael Ramos Regis (2009) On Access Network Identification and Characterization.

Blom, Koen (2009) DVB-S signal tracking techniques for mobile hased arrays.

Bockting, S. (2009) Collection selection for distributed web search : using highly discriminative keys, query-driven indexing and ColRank.

Boot, L. (2009) Facial expressions in EEG/EMG recordings.

Bos, W.J. (2009) Interactive signaling network analysis tool.

Braak, Timon D. ter (2009) Run-time spatial resource management in heterogeneous MPSoCs.

Brand, A. (2009) An investigation in qualities of software variability.

Chauhan, P. (2009) Study the impact of smile and tail dependence on the prices of European style bivariate equity and interest rate derivatives using Copulas and UVDD model.

Diepenmaat, J. (2009) Object XML mappings.

Domburg, R.S.A. van (2009) Empirical evaluation of change impact predictions using a requirements management tool with formal relation types : a quasi-experiment.

Everse, Wouter M. (2009) Modelling and Verification of a Shortest Path Tree Protocol for Wireless Sensor Networks : Towards a Platform for Formal Verification Experiments.

Galen, J. van (2009) Modelling, simulation and impelementation of an optical beam forming network control software system.

Garcia Garcia, A. (2009) Optical phase synchronization in coherent optical beamformers for phased array receive antennas.

Graaff, V. de (2009) Towards distributed information access : possibilities and implementation.

Hagen, Gijs (2009) Het schrijven van een nieuw werkboek: hoofdstuk elektriciteit. 2e klas Havo/VWO.

Hagendoorn, B. (2009) Viscous coupling between bio-inspired hair-sensors.

Hong, L. (2009) Implementation and tuning of optical singlesideband modulation in ring resonator-based optical beam forming systems for phased-array receive antennas.

Houtman, J. (2009) Bringing scalability/failover to a complex producer/consumer implementation.

Jeckmans, A.J.P. (2009) Practical Client Puzzle from Repeated Squaring.

Kingma, J. (2009) Combined VCO/Mixer for satellite receiver in CMOS.

Klaassen, R. (2009) COPD home interaction device.

Koelewijn, J.W. (2009) Resource operations model in a dynamic world.

Kok, I. de (2009) The influence of videoconferencing and an emotional feedback support system on polyadic negotiations.

Kooijman, M. (2009) Haskell as a higher order structural hardware description language.

Kroon, E. (2009) Layered configuration management for software product lines.

Kuperus, Johan (2009) Wave monitoring using wireless sensor nodes.

Laar, B. v.d. (2009) Actual and imagined movement in BCI gaming.

Laarman, A. (2009) An Ontology-Based Metalanguage with Explicit Instantiation.

Logtenberg, Jeroen (2009) Multi-user interaction with molecular visualizations on a multi-touch table.

Looman, S.A.M. (2009) Impact Analysis of Changes in Functional Requirements in the Behavioral View of Software Architectures.

Lucassen, T. (2009) Adaptive support of human attention allocation using cognitive models.

Meertens, Lucas O. (2009) EPC to BPEL transformations.

Meij, D.P.L. van der (2009) A metamodeling approach to incremental model changes.

Meijerink, Roland (2009) Begrip in kaart: Hoe kan het gebruik van begrippenkaarten het begrip van leerlingen in 3VWO op het gebied van optica verbeteren?

Muis, Allard (2009) Patterns in data conversion.

Mutter, T. (2009) Partition-based network load balanced routing in large scale multi-sink wireless Sensor Networks.

Nijkamp, Barry (2009) Using functional design patterns to improve exports to management information systems.

Nouwens, I.C.C. (2009) Predicting dialogue state transitions using prosodic markers: Exploring AMI Corpus backchannels.

Ooms, Matthijs (2009) Provenance management in practice.

Oosting, W.M.H. (2009) Design and evaluation of a community of practice to support IT implementation/migration processes : a case study about the design of a CoP within the Suite4Basisgegevens migration.

Oostrum, A. van (2009) A model and specification for development of enterprise application frameworks.

Perk, Anno (2009) Reflection in large IT Projects : a method for project success focussing on soft factors.

Poortema, Anne (2009) Training clients using e-learning : developing an e-learning model for an international software vendor.

Rietema, Richard (2009) Automatic Verification and Analysis of Test Results of Océ Printers.

Rombouts, Wolf (2009) Context-Concept chemie en van Hiele's abstractieniveaus.

Roodenburg, S.B. (2009) Scheduling the sequential hardware-in-the-loop simulator.

Rubio Paniza, E. (2009) Design and evaluation of an MSP-based body area network management architecture using JMX.

Rutgers, Jochem (2009) VHDL voor het voortgezet onderwijs: Een nieuwe lesmodule over hardware voor informatica.

Satink, Laurens (2009) The adaptive presentation assistant using grammar-based recognition to support the process of presenting.

Schippers, Jorrit (2009) A massively scalable architecture for instant messaging & presence.

Schot, Jurgen (2009) The privacy governance framework : effectively dealing with privacy legislation.

Schouten, J.H. (2009) Optimisation of packet scheduling in wireless networks.

Span, Ruben (2009) Towards an enterprise performance management solution : a method to design and implement enterprise performance management.

Stolp, D.G.A. (2009) Using ontology mapping to automate derivation of transformations for data integration.

Sulistyo, Pythia (2009) Inter-Organizational Strategic Information Systems Planning (IOSISP) in Network Perspective: How Network Governance Influences IOSISP Effectiveness Evaluation of Healthcare, Government and logistic/Transport Industry Sectors in the Netherlands.

Tariq, T. (2009) Extending CACI : implementing support functions for the context producer and designing a security Framework.

Tijmes, M. (2009) Simulation of a ring resonator-based optical beamformer system for phased-array receive antennas.

Tjink-Kam-Jet, Kien-Tsoi T.E. (2009) Result merging for efficient distributed information retrieval.

Tommassen, P. (2009) Wacky Pirate Hijinks : causing and resolving conflict between autonomous agents in a virtual storyworld.

Veldhuis, J.W. (2009) Tool support for a metamodeling approach for reasoning about requirements.

Veldman, I. (2009) Matching profiles from social network sites : similarity calculations with social network support.

Vliek, G. (2009) Detecting spam machines, a netflow-data based approach.

Vrielink, Jasper D. (2009) Phased array processing: direction of arrival estimation on reconfigurable hardware.

Vries, E. de (2009) Touchscreen interaction for healthcare applications.

Weele, J.H.D. ter (2009) Onderzoek naar de gebruikersvriendelijkheid van boekingsformulieren.

Westmijze, M. (2009) Memory optimizations on the sequential hardware-in-the-loop simulator.

Wolterink, T.J.L. (2009) Operational Semantics Applied to Model Driven Engineering.

2008

Babakhani, Bayan (2008) Implementation of a 2D master-slave system.

Berg, Ruben van den (2008) Interaction capabilities of Second Life : a framework to determine Second Life's suitability for a 3D virtual world application.

Bezemer, Maarten (2008) Analysing gCSP models using runtime and model analysis algorithms.

Bloem, E.J.W. van (2008) The user oriented knowledge management method : a knowledge management method for a small organization with a distributed environment.

Bloem, R.J.G. van (2008) A data transformation walkthrough.

Blumink, Remco (2008) Implementing and communicating with SHILS.

Boros, H. (2008) Context Discovery Adapter (CDA) Protocol.

Bosch, Stephan (2008) FollowMe! : distributed movement coordination in wireless sensor and actuator networks.

Brink, Tim van den (2008) Ketenarchitectuur : succes- en faalfactoren bij de invoering van het digitaal klantdossier.

Brinkman, E. (2008) Recognition of the emotion in abstract expressionistic paintings using a machine learning approach.

Broekhuizen, V.P. (2008) Security for EPC discovery services.

Daemen, P. (2008) ZMP based control in 3D passive dynamic walking.

Dam, Arjan (2008) Geographic routing in wireless sensor networks for surveillance : introducing a novel routing algorithm: GZOR.

Damman, B. (2008) Representing PCTL counterexamples.

Deddens, M.K. (2008) Toepasbaar risicomanagement in software ontwikkelingsprojecten : ontwerp en toepassing van een risicomanagementmethode voor software ontwikkelingsprojecten binnen Centric IT Solutions.

Driezen, Wouter (2008) Service-oriented and open-source software as potential markets for applications markets : analysis of the possible added value of Capgemini outsourcing's Dutch applications management service center.

Eenennaam, E.M. van (2008) Providing over-the-horizon awareness to driver support systems by means of multi-hop ad hoc vehicle -to-vehicle communication.

Engelsman, W. (2008) Method for requirements management and modeling.

Es, Frank J. van (2008) Type inference for graph transformation systems.

Fournier, Bas (2008) Preprocessing on bilingual data for Statistical Machine Translation.

Franssens, Anne (2008) Analysis of Reed Solomon error correcting codes on reconfigurable hardware.

Gaiser, Vincent Alexander (2008) Improving spatial awareness in an indoor environment with wireless positioning technology.

Gerards, M. (2008) Streaming reduction circuit for sparse matrix vector multiplication in FPGAs.

Gils, F.M.D.M. van (2008) PodVinder : spoken document retrieval for Dutch pod- and vodcasts.

Griffioen, H.T. (2008) Design of clock cleaner : a fast locking PLL.

Haanstra, Sander (2008) Analyzing and improving generalization over time in CSP-based Brain-Computer Interfaces.

Habib, Mena Badieh (2008) An intelligent system for automated arabic text categorization.

Henzen, S.F. (2008) A framework for service-oriented extensions to Ruby on Rails.

Ho, Yoeng Woey (2008) .NET integration TEAHA.

Hogt, N.A. (2008) Aanbevelingen voor een architectuur voor het regionale zorgsysteem.

Houwelingen, Jan Willem van (2008) Relevance and usability of enterprise architectures during post merger IT integrations.

Idserda, K. (2008) Simultaneous binding proxy mobile IPv6.

Jevring, Markus (2008) Automatic management of bluetooth networks for indoor localization.

Jonge, Marc de (2008) The SpinJ model checker : a fast, extensible, object-oriented model checker.

Jongeling, R. (2008) Signature modification for Compose?/.NET : implications of signature modification for generic compilers and behavioral signatures of types.

Jonker, J. (2008) Wizard of Oz for gesture prototyping.

Kaijen, J.A.H. (2008) Management of risk & information security data.

Kessel, Ruud van (2008) Querying Probabilistic XML.

Klein Wolterink, W. (2008) A content-based routing protocol for mobile ad-hoc networks using a distributed connected k-Hop dominating set as a backbone.

Klooster, J-W. van 't (2008) Context, design and implementation of a control system for ring resonator-based optical beam forming networks.

Kruiskamp, Michel (2008) FastSOA : achieving high-performance service oriented architectures.

Linders, Stefan (2008) Opportunities and limitations of using SOA concepts and technologies for building BI applications : a Delphi study.

Lonnee, J. (2008) A scalable repository based on a meta-modelling architecture.

Looise, M.J. (2008) Inter-level consistency checking between requirements and design artefacts.

Lootsma, Marten (2008) Design of the global software structure and controller framework for the 3TU soccer robot.

Lopez, J.M. (2008) Dynamic service composition in an innovative communication environment.

Mahrof, Dlovan Hoshiar (2008) Design of a fully integrated RF transceiver using noise modulation.

Melissen, Arthur (2008) Exploring neglected avenues in the modelling of attribution theory.

Meppelink, Lianne (2008) Towards interoperability between existing VoIP systems.

Munsterman, Thijs Pieter (2008) Exploring software scalability : and a method for evaluating and improving software scalability.

Nijmeijer, Tom (2008) Automatic classification of television commercials.

Nijssen, Bobby J.W. (2008) Cooperative Intelligent Transportation Systems Building a demonstrator for the CVIS-project on the Informatieve Weg.

Oever, Daniel van 't (2008) CoNSoLe: A Domain Specific Language for Network Services.

Oostrum, A.R. (2008) A service register as an information intermediary : towards a structured design approach for service registers.

Oude Alink, M.S. (2008) Increasing the spurious-free dynamic range of an integrated spectrum analyzer.

Oude Bos, Danny (2008) BrainBasher : a multi-modal BCI game for research and demonstration.

Pasch, M. (2008) Bye-bye couch potato : body movement in the gaming experience.

Roolvink, S. (2008) Detecting attacks involving DNS servers : a netflow data based approach.

Schabbink, Johan (2008) Design of a capacitive based closed-loop displacement sensor.

Schilpzand, M.P. (2008) X-Stream in MaDAM : new junction modelling in macroscopic dynamic traffic assignment models.

Scholte, Theodoor (2008) Managing continuous uncertain data by a probabilistic XML database management system.

Sealy, Timothy (2008) Implementation of aggregation based Resource Management in DiffServ (RMD) Quality of Service Model (QOSM).

Steen, H. van der (2008) Design of animation and debug facilities for gCSP.

Tigelaar, Almer S. (2008) Automatic discussion summarization : a study of Internet fora.

Timmer, M. (2008) Evaluating and predicting actual test coverage.

Twelkemeijer, R. (2008) Design of an audio power amplifier with a notch in the output impedance.

Uithol, Michiel (2008) Security in domain-driven design.

Velner, J. (2008) Integrated state-of-charge circuit for rechargeable batteries.

Vos, Geert (2008) Issues of iterative mda-bades software development processes.

Vries, A.J.K. de (2008) Improving reliability of streaming radio.

Werf, R.J. van der (2008) The Embodied Conversational Agent Toolkit : a new modularization approach.

Wijngaarden, Pieter van (2008) Error tolerance analysis of the Telefónica de España optical fibre network.

Wit, Joost de (2008) Evaluating recommender systems : an evaluation framework to predict user satisfaction for recommender systems in an electronic programme guide context.

2007

Ambrosius, Frank (2007) Modelling and distributed controller design of the bodeRC paper-path setup.

Ambrosius, R.B.P. (2007) Elektronische leeromgeving met gebarentaalherkenning : Grafische user interface oplossingen voor ambigu¨ıteitproblemen van een gebarentaalherkenner voor een elektronische leeromgeving voor dove en slechthorende kleuters.

Atketin, Namik (2007) Ontwikkeling van een interactieve model-gedreven E-formulier generator.

Baalman, Philippus (2007) Van mono naar multi: een automatische VJ.

Baesjou, Bertrand (2007) Improving dependability of OSS access to a hierarchical distributed ad-hoc NMS.

Bergen, Marcel van (2007) Design and prototyping of a human-computer interface for a desktop tele-classroom conference application.

Bosman, Yoran Maxim (2007) Incorporating Functional Design Patterns In Software Development.

Bouwmeester, Egbert (2007) Continuous Classes of Power Amplifiers.

Braber, Kommer (2007) A policy based MBU control system using OSGi.

Buurman, H.A. (2007) Virtual Storytelling: Emotions for the narrator.

Derwort, Selmer (2007) IT governance: de doelen en de middelen: In kaart brengen van IT governance in theorie en praktijk.

Dijk, Michel van (2007) Analysis and control of nonlinear oscillators.

Doorn, Gerrit Hendrikus van (2007) Accelerated playback of meeting recordings.

Elling, Erwin (2007) Tools for fun and fruitful meetings. : “Don’t let meetings make you go bananas!”.

Fountain, Stefan J. (2007) Success prediction induction framework : success models for online applications, introducing network effects and trust constructs.

Franken, Michel (2007) Ankle actuation for planar bipedal robots.

Gribnau, Erwin (2007) Analysis, design & implementation of a high-performance main-memory object database for Splice2.

Heddema, R.R. (2007) Strategy for a robot soccer team - Let’s play robot soccer -.

Hegge, Stephan (2007) Predicting end-to-end network characteristics on mobile devices.

Herms, K.G.F. (2007) Body pose tracking in the Watching Window : a system that tracks both hands in a virtual reality environment.

Heuts, R.P. (2007) Mobile interface design for dynamic environments.

Hoogsteder, V.J.M. (2007) Strategic performance measurement for eBuddy.

Huisman, Rolf (2007) Bugspray for composition filters.

Jansen, Lisette (2007) Panze: A Multimodal Preschool Music Education System.

Kalter, Stefan Reijmer (2007) Vertical collaboration in open source business.

Kernkamp, Reinier (2007) Alignment of Requirements & Architectural Design In a Blended Delivery Model.

Klaver, Ruud (2007) Using NSIS (Next Steps in Signaling) for support of QoS aware multimedia services.

Kock, Arien S. (2007) Enhancing Synthetic Speech with Filled Pauses.

Kok, J. (2007) The design of a Delta Impact analysis model for data warehouses.

Kooijman, Ruben (2007) See, hear, listen : head movements and the sensitive artificial listener.

Kooistra, Cornelis (2007) Design and testing of embedded control software for the ViewCorrect Plotter.

Koster, J. (2007) Influencing tabletop interaction speed: directness and device.

Kosters, Dennis (2007) Invloed van slimme meters op de energiebalans: Een analyse van de invloed van het slimme meter systeem op een netbeheerder en zijn ondersteunende IT, binnen het kader van de energiebalans.

Kosters, T. (2007) Van gasbel naar gasstel : een onderzoek naar de inrichting van de shipper op de gasmarkt.

Krijnen, Bram (2007) Heat flow modeling in copiers.

Kuperus, J.H. (2007) Nested quantification in graph transformation rules.

Kuppeveld, Teun van (2007) Model-based redesign of a self-balancing scooter.

Leong, Frank (2007) Design of an oscillator for satellite reception.

Maatjes, N.C. (2007) Automated transformations from ECA rules to Jess.

Molderink, Albert (2007) Feasibility Analysis of MPEG decoding on reconfigurable hardware.

Nguyen, V.Y. (2007) Optimising techniques for model checkers.

Nguyen, Viet Yen (2007) Optimising techniques for model checkers.

Nijdam, N.A. (2007) Facial rendering.

Odijk, M. (2007) Novel sensor structures for enhanced redox cycling.

Oijen, Joost van (2007) A Framework to support the influence of culture on nonverbal behavior generation in Embodied Conversational Agents.

Oldenkamp, H.A. (2007) Probabilistic model checking : a comparison of tools.

Olthof, Mark (2007) Performance & Scalability of a Spatial Database in a GIS-Web Service Environment.

Ooms, Wendy (2007) Providing AAA with the Diameter protocol for multi-domain interacting services.

Oostveen, Laurens van (2007) Conductivity gradient focusing by pervaporationand osmosis-induced fluxes.

Ordelmans, L. (2007) The Creation of a Flexible, Functional Simulation Generator for the Montium Tile Processor.

Os, Roel van (2007) Optimizing XML information retrieval query execution at the physical level.

Papegaaij, E. (2007) The Tree Processing Language: Defining the structure and behaviour of a tree.

Penning, M.P.J. (2007) Boosting LUCK: Improving the language understanding capabilities of Kaitito.

Plass, Martijn J.A. (2007) Rules Decomposition for Distributed Context Processing.

Portengen, Rik (2007) Phased array antenna processing on reconfigurable hardware.

Pot, Wouter (2007) A machine learning approach for generating expressive musical transcriptions.

Poulisse, Gert-Jan (2007) Exploiting inter-conceptual relationships to boost SVM classification.

Prins, Martin (2007) Fast retransmission for multicast IPTV.

Putten, Ing. A.E. van (2007) Behavioural hybrid process calculus translation to modelica.

Reede, Joost (2007) On A-Select and Federated Identity Management Systems.

Reuderink, Boris (2007) Fusion for Audio-Visual Laughter Detection.

Roes, J.B.M. (2007) Identifying and solving overlap between messaging standards with the help of domain models, illustrated with HR-XML’s SIDES and SEP.

Roo, A.J. de (2007) Towards more robust advice : message flow analysis for composition Filters and its Application.

Rozen, Riemer van (2007) A Debugging Framework for NIPS.

Sambeek, M. van (2007) Real-time shadow generation for 3D simulations using modern hardware.

Scholten, F.B. (2007) The concern-oriented software architecture analysis method.

Sierhuis, Pim (2007) Het voorkomen van prestatieverlies bij de koppeling met Web services: ... en de rol van standaardisatie daarbij.

Siles Del Castillo, Hugo (2007) Hybrid Content-Based Collaborative-Filtering Music Recommendations.

Smulders, Bram (2007) SQLbusRT : real time data distribution and storage.

Sombekke, N.B.H. (2007) Graph-Based Semantics of the .NET Intermediate Language.

Spenkelink, Roy David (2007) Porting Compose* to the Java Platform.

Staal, Eric (2007) Simulation with Hamiltonian mechanics : creating a module for 20-sim.

Stellinga, Anne (2007) A low-power second-order sampling receiver for Bluetooth.

Tinselboer, Koen (2007) The use of rare key indexing for distributed web search.

Tuijn, Jasper Aartse (2007) Partial session mobility in context aware IP-based multimedia subsystem.

Tuin, Vincent van der (2007) Computer-Aided Security Surveillance : design of the Quo Vadis Object Tracker.

Veelen, P. van (2007) Clustered acoustic modelling in speech recognition.

Veen, Marcel van der (2007) Sparse matrix vector multiplication on a field programmable gate array.

Verdonkschot, S.F.G. (2007) Design and implementation of a trusted RFID reader.

Versloot, Corne (2007) Cross-document named entity coreference resolution for Dutch as a pre-process for named entity based text mining.

Vervuurt, Mark (2007) Modeling business process variability : a search for innovative solutions to business process variability modeling problems.

Vlasveld, J. (2007) On context in context-aware ICT applications.

Wijgerse, Steven (2007) Generating realistic city boundaries using two-dimensional Perlin noise.

Witteman, M.T. (2007) Efficient proximity detection among mobile clients using the GSM network.

Zwerus, Robert (2007) Storing Personal Information Management data: Akonadi - unifying PIM data for KDE.

2006

Backx, Niels (2006) On the design of a mobile e-health platform ¿ towards deployment flexibility.

Berens, Menno (2006) De tevredenheid over shared service centers in de publieke sector : het succes van shared service centers en de oorzaken daarvan in de inrichting en het functioneren van de klant-leverancierrelatie.

Boorsma, Simon (2006) Ketenintegratie van het intermediaire distributiekanaal in de verzekeringsbranche : huidige ontwikkelingen in de verzekeringsbranche en de mogelijkheden voor Zevenwouden Verzekeringen om ketenintegratie te realiseren¿.

Bos, Pieter (2006) Interacting with a virtual conductor.

Boschman, S.R. (2006) Performing transformations on .NET intermediate language code.

Braam, G.J.M. (2006) Supporting multi-modal and multi-medial user interfaces from an embedded environment.

Broekhuijsen, Jeroen (2006) 2D Upper Body Pose Estimation from Monocular Images.

Brouwer, L.J. (2006) Monitoring van een ASR-systeem : het gebruik van interne confidencewaarden en teletekstondertiteling om de Word-Error-Rate van een herkenning te voorspellen.

Buth, Maarten Dimmen (2006) Ball-handling motion control for soccer playing mini-robots.

Cheng, W. (2006) The design of a new power combining technique for the RF power amplifiers.

Conradi, Olaf (2006) Fine-grained Join Point Model in Compose.

Derks, Theo (2006) Health at home.

Dijk, J.J. van (2006) Entiteitreconciliatie ondanks beperkte overlap door middel van objectgelijkheid : casus "Koppelen van persoonsgegevens zonder een gemeenschappelijke identificatie".

Dimitrova, Desislava C. (2006) Performance evaluation of RMD (Resource Management in DIFFSERV) within NSIS (Next Steps In Signaling).

Doornenbal, Ing. Dirk (2006) Analysis and redesign of the compose*language.

Engelen, L. van (2006) Massively parallel quantization implementation using simulated annealing.

Groen, Ruud (2006) Modelleren en analyseren van een Ethernet switch.

Groot, Paul de (2006) Enhancing the performance and testability of the MI20 robot soccer system.

Hassink, N. and Schopman, M.G. (2006) Gesture recognition in a meeting environment.

Heerde, Harold van (2006) Life-cycle privacy policies for the ambient intelligence.

Hulswit, D.R. (2006) Automatic interpretation of Nijntje-images.

Ingberg, G. (2006) Location aware performance measurements.

Kattenbelt, M.A. (2006) Towards an explicit-state model checking framework.

Kemna, Tim (2006) Bisimulation minimisation and probabilistic model checking.

Koop, O.R. (2006) Continuous and discontinuous Galerkin finite element methods of variational Boussinesq water-wave models.

Kreuk, N.A.W. (2006) The Turkish option market.

Leenslag, Wilco (2006) Werkwijze ter beoordeling van IT governance op basis van geaccepteerde methodes op het terrein van IT governance.

Linnenbank, Tristan (2006) Architectural Principles for Large Scale Web sites: a Case Study.

Linthorst, Henk-Jan (2006) De mogelijkheden van ICT in het effectiever en efficiënter functioneren van de diabetesketen.

Meijer, Gijs (2006) Performance measurement of IT investments.

Nguyen, H.Q. (2006) Analysis of crosscutting concerns in QVT-based model transformations.

Noordhuizen, Paul (2006) Analyzing aspects in production : plans for software product lines.

Nusman, Daan (2006) Real-time full-body motion capture in virtual worlds.

Overbeek, J.F. (2006) Meta Object Facility (MOF): investigation of the state of the art.

Puming, Liu (2006) Service agreements and facilities for M-health vital sign monitoring.

Rorije, R.J. (2006) Input/output in functional languages : using algebraic uniontTypes.

Rovers, Kenneth C. (2006) Front-end research for a low-cost spectrum analyser : receiver system and topology study.

Schrijver, Bert Jan (2006) Classificeren met vertrouwen : contextgevoelige tekstclassificatie met betrouwbaarheidsindicatie.

Sikkes, Bart (2006) A stable matching based adaptive subcarrier assignment method for multimodal fibre access networks.

Sirchia, Riccardo (2006) Realtime softwarematige radarscan conversie : met GPU programmeren.

Slabbers, Nanda (2006) Narration for virtual storytelling.

Smelik, R.M. (2006) Specification and Construction of Control Flow Semantics : a generic approach using graph transformations.

Speelziek, M.D. (2006) Evaluating rapide using the FRODO service discovery protocol.

Spenkelink, Dennis (2006) Incremental Compilation in Compose*.

Steeden, Remco van (2006) Communication-centric debug of systems-on-chip using networks-on-chip.

Steen, J.L.P.J. van der (2006) Investigation of the band gap widening effect in thin silicon double gate MOSFETs.

Steghuis, Claudia (2006) Service granularity in SOA-projects : a trade-off analysis.

Stehouwer, J.H. (2006) Cue phrase selection methods for textual classification problems.

Swartjes, Ivo (2006) The Plot Thickens : bringing structure and meaning into automated story generation.

Tetteroo, Arend-Jan (2006) Bomb-Proof Server : benodigde technieken en producten voor een high availability systeem en hun consequenties voor beschikbaarheid.

Veldhuijsen, Gerald van (2006) DICOM Image Retrieval.

Verbree, A.T. (2006) On the structuring of discussion transcripts based on utterances automatically classified.

Vrielink, S.B. (2006) Situational reinforcement learning : learning and combining local policies by using heuristic state preference values.

Vrijkorte, A.B. (2006) Semantics in service-oriented architectures.

Wasbeek, Edwin van (2006) A repository for the management of artifacts in system engineering.

Winkel, J.D. te (2006) Applying Composition Filters to C.

2005

Boedeltje, Michel Ronald (2005) In response to your inquiry : Automatic E-mail Answer Suggestion in a Dutch Contact Centre.

Borkent, Michiel (2005) De- and recomposition of expression in music performance.

Borssum Waalkes, Bart (2005) Managing Genome Databases.

Burgwal, M.D. (2005) Serving the Montium : design of an energy-efficient processor-network interface.

Fikkert, F.W. (2005) Item availability restricted.

Havinga, W. (2005) Designating join points in Compose* : a predicate-based superimposition selector language for Compose.

Holzenspies, Philip (2005) SILC: SPRITE Input Language with C(++).

Klaij, Bastiaan (2005) Toegepast tokenizen voor natuurlijke taal verwerking : automatische analyse van platte en opgemaakte tekst.

Nijenhuis, Barry (2005) Smart sign for smart surroundings.

Oosterhof, N.N. (2005) Application patterns in functional languages.

Timmer, M. (2005) How to identify the speed limiting factor of a TCP flow.

Weijden, Erik van der (2005) Structuring argumentation in meetings : Visualizing the argument structure.

Withaar, T. (2005) Analyzing joint-measurements using 3D scancs and statistical models.

2004

Ananda, Artha Sejati (2004) Design and simulation of non-zero and zero dispersion optical lattice wavelength filters.

Balkema, Wietse (2004) Realization and characterization of a 2.4 GHz radio system based on frequency offset division multiple access.

Bekkaoui, A. (2004) Link performance of the time offset transmitted reference system.

Bui, Cuong (2004) Write-intensive applications with LDAP.

Evers, Sander (2004) Form follows function : Editor GUIs in a functional style.

Roelofsen, Floris (2004) Contextual Reasoning - Complexity Analysis and Decision Procedures -.

Sözer, Hasan (2004) A peer-to-peer file sharing system for wireless ad-hoc networks.

2003

He, Xiaobo and Mayasari, Elisabeth E. (2003) A Design of Software Architecture for “SHAPE” Workforce Management Game.

2002

Nurdin, H.I. (2002) Mathematical modelling of bias and uncertainty in accident risk assessment.

2001

Agung Julius, A.A. (2001) Evolution of the modal densities of a class of stochastic hybrid systems.

Donckers, L. (2001) Energy Efficient TCP.

2000

Schiphorst, R. (2000) Demonstration of the Software-Radio Concept.

1996

Hiemstra, D. (1996) Using statistical methods to create a bilingual dictionary.

This list was generated on Tue Apr 23 06:03:39 2024 CEST.