University of Twente Student Theses

Login

Domain: 54 computer science

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Year | Item Type
Jump to: Essay
Number of items: 2627.

Essay

A., E. (2014) Item availability restricted.

Aakster, Y.M.I (2017) Designing an interactive intervention to unconsciously steer residents of a dementia care facility away from the exit.

Aalbertsberg, A.P. (2018) Synthesis and development of a big data architecture for the management of radar measurement data.

Aalten, Thijs van (2021) Online optimization of EMG using a hybrid model approach.

Aanstoot, D. (2022) Graph rewriters as components.

Abbema, F. van (2022) Performing Bisimulation Minimisation To Parity Game Strategies To Improve Controller Quality.

Abbing, J.R. (2020) Semantic segmentation of minimally invasive anti-reflux surgery video using U-NET Machine Learning.

Abdul Cader Hasanain, Mohamed Asif Hassan (2019) Item availability restricted.

Abraham, R. (2021) Symbolic LTL Reactive Synthesis.

Abraham, Remco (2019) A Formal Proof of the Termination of Zielonka's Algorithm for Solving Parity Games.

Abreha, Gebremedhin Teklemariam (2014) An environmental audio-based context recognition system using smartphones.

Admiraal, A.J. (2010) Automated ANTLR tree walker generation.

Adolfsen, Martijn (2011) Industrial validation of test coverage quality.

Adriaansen, A.M.A. (2015) Balancing inventory and equipment contingencies by a flexible semiconductor supply chain simulation model.

Adriani, J (2021) Measuring Eating Speed with the Sensory Interactive Table.

Aertsen, M.Y. (2014) Verifying functional requirements in multi-layer networks: a case for formal description of computer networks.

Afia, A. (2022) The impact of graph properties on the complexity of attack tree analysis.

Agen, Wouter van (2021) Concept development for Line isolation cutter.

Aggelen, J.M. van (2017) Using virtual reality to support substance use disorder treatment in people with an intellectual disability.

Agung Julius, A.A. (2001) Evolution of the modal densities of a class of stochastic hybrid systems.

Agustini, Try (2021) Sentiment Analysis on Social Media using Machine Learning-Based Approach.

Ahmad, Fajri (2019) Enterprise Architecture Mining.

Ahmadov, Parviz (2022) Evaluating pose estimation and object detection models for the application in the minisoccerbal project.

Ahmed, A.B.H. (2020) Balancing security and usability in Web Single Sign-On.

Ahmed, F. (2010) Relations between semidefinite, copositive, semi-infinite and integer programming.

Ahmed, Owais (2017) Item availability restricted.

Akbar, Nurul (2014) Analysing Persuasion Principles in Phishing Emails.

Aker, W.J. (2018) Towards a reference architecture for privacy aware health care organizations.

Akker, H. op den (2009) On adressee prediction for remote hybrid meeting settings or how to use multiple modalities in predicting whether or not you are being addressed in a live hybrid meeting environment.

Akkerman, H.J. (2021) Using credibility to stop the spread of fake news.

Alam, Ashiful (2012) Business information management and the cloud.

Albers, Etiënne H.M. (2022) Environmental considerations in supply chain decisions: Proposing a new methodology for locating cross-docking terminals considering CO2e emissions.

Albers, J. (2021) Item availability restricted.

Alberts, K.J. (2021) Comparison of different types of auto-encoders for data cleaning.

Alberts, L. (2020) Static verification for Snap!

Alblas, H.J. (2020) Predictive maintenance of Dutch civil infrastructure: a structured approach.

Alemneh, E. (2010) Sharing nonlinear gates in the presence of glitches.

Aljabary, Mahmoud (2021) Automatic Generic Web Information Extraction at Scale.

Allah Bukhsh, Zaharah (2015) BPMN Plus : a modelling language for unstructured business processes.

Allahverdiyeva, Aydan (2021) Empathetic Textual Speech of Conversational Agents in Client-Centered Therapy.

Almkerk, Marc van (2018) Influence of mindfulness practices on feelings of place illusion in virtual reality.

Alofs, Thijs (2012) The Interactive Storyteller A multi-user tabletop board game interface to support social interaction in AI-based interactive storytelling.

Ambrosius, Frank (2007) Modelling and distributed controller design of the bodeRC paper-path setup.

Ambrosius, J.I. (2019) The design of a validation experiment for the Tissue Active SLAM model.

Ambrosius, R.B.P. (2007) Elektronische leeromgeving met gebarentaalherkenning : Grafische user interface oplossingen voor ambigu¨ıteitproblemen van een gebarentaalherkenner voor een elektronische leeromgeving voor dove en slechthorende kleuters.

Ammerlaan, W.S. (2022) Enabling joint exploration of virtual environments for treatment of substance use disorders using an asymmetric virtual reality approach.

Ampudia, Ricardo (2021) Visible Light Positioning for Unmanned Aerial Vehicles.

Amrin, Nabila (2014) The Impact of Cyber Security on SMEs.

Amur, Sri Harsh (2022) Intelligent Wifi Access Points for Diverse User needs: QoS Slicing in SDN Controlled APs.

Anagnostopoulos, Nikolaos Athanasios (2014) Optical fault injection attacks in smart card chips and an evaluation of countermeasures against them.

Anagnostopoulos, Nikolaos Athanasios (2014) Optical fault injection attacks in smart card chips and an evaluation of countermeasures against them.

Anaigoundanpudur Karthikeyan, Naveenaa (2021) Cryptographic Implementation of Issuer Policy for Self Sovereign Identity Systems.

Ananda, Artha Sejati (2004) Design and simulation of non-zero and zero dispersion optical lattice wavelength filters.

Andreev, L. (2016) Sociometric badges in a high-stakes setting : living proof a sociometric feedback visualization.

Anghel, C. (2022) Effect of image quality in computer vision for semantic segmentation of road images.

Aniraj, Ananthu (2020) Item availability restricted.

Anjanappa, Geethanjali (2022) Deep learning on 3D point clouds for safety-related asset management in buildings.

Annink, E.B. (2022) Preventing soft-errors and hardware trojans in embedded RISC-V cores.

Anwar, Mian Tashfeen Shahid (2022) Techniques to Process point cloud data to perform HAR using Machine learning.

Appel, R.N. and Folmer, H.H (2016) Analysis, optimization, and design of a SLAM solution for an implementation on reconfigurable hardware (FPGA) using CλaSH.

Apriyadi, R.A. (2021) MODEST language syntax for structural model parameters.

Aregay, Tesfay (2014) Ranking Factors for Web Search : Case Study in the Netherlands.

Arends, Simon Daniël (2020) Quantity meets quality for mined process models through simulated events.

Arican, Tugce (2019) Optimization of a patch-based finger vein verification with a convolutional neural network.

Arkel, Lars van (2020) Demonstrating runtime assertion checking using Snap!

Arnold, L.H.A. (2020) Security in V2I projects : incorporating security into a framework for communication between connected cars and infrastructure.

Arora, G.S. (2021) Exploring Possibilities to Improve Distant Dining Experience for Young Expats with their Loved Ones over Time and Space Gap Issues.

Arrieta Larraza, N. (2022) Few-shot deep learning models for acoustic scene classification in low-complexity scenarios.

Artolozaga, I. (2022) From personal to community knowledge : stimulating knowledge sharing among student groups in knowledge management platforms through interaction design.

Artolozaga, Iñigo (2020) Mental health care in a pandemic : a survey from a design and interaction perspective.

Arva, D. (2021) Using artificial intelligence to mitigate file injection attacks in emails.

Aslam, Suhaib (2020) Designing a ubiquitous artifact for enhancing the digital wellbeing of smartphone users.

Assaad, Malek (2022) Link Vulnerability Aware Task Deployment over Edge and Cloud.

Assen, Jorrit van (2021) General Game Playing with imperfect information in GROOVE.

Assies, Daniël (2021) Developing a Smart Telemetry Feedback System for Sim Racing.

Aström, F.K. (2019) JOY x UT. : Designing an e-Health web-platform to promote joyful physical activity amongst university employees.

Asuncion, C.H. (2009) Goal-driven service mediation solution.

Atketin, Namik (2007) Ontwikkeling van een interactieve model-gedreven E-formulier generator.

Aulia, A. (2019) Designing a Mobile Digital Payment Application for Gas Stations in Indonesia.

Averkin, Konstantin (2021) You are the weakest link - identifying single-rack points of failure in the DNS.

Avramov, V.R. (2022) Automated grading of programming exams with JUnit and Semgrep.

Azani, Maryam (2020) Supply Chain Control Tower Reference Architecture for Exception Monitoring and Real-Time Incident Management.

Açikalin, M.A. (2019) Profiling Recursive Resolvers at Authoritative Name Servers.

Aņikevičs, Germans (2021) Relationship Between Vendor Popularity and Prices on Dark Web Marketplaces.

BOLSCHER, W.F. TEN and BRAAK, T.P. TER and HAAN, S.J.H. and POIROT, M.G. (2016) Item availability restricted.

BOON, R.N. (2017) Automatic detection of anomalies in times series data Big data for smart maintenance.

Baaij, C. (2009) CλasH : from Haskell to hardware.

Baalen, R.B.C. van (2015) Is serious gaming the holy grail for the wearables industry?

Baalman, Philippus (2007) Van mono naar multi: een automatische VJ.

Baardewijk, Jan Ubbo van (2018) Automatic annotation of the cooking process.

Baardman, Roel (2010) Cumulus Humilis : wireless mesh-networking for gliders.

Baars, D.S. (2016) Towards self-sovereign identity using blockchain technology.

Baas, S.P.R. (2016) A machine learning approach to the automatic classification of female uroflowmetry measurements.

Baas, T. (2022) Creating standardized process mining applications based on the open trip model.

Babakhani, Bayan (2008) Implementation of a 2D master-slave system.

Backx, Niels (2006) On the design of a mobile e-health platform ¿ towards deployment flexibility.

Badarinath Hampiholi, Brinda (2014) Secure & privacy-preserving eID systems with Attribute-Based Credentials.

Badea, Florentina (2019) A method to improve the application portfolio m anagement decision-making process through stakeholder involvement.

Badin, Y. (2016) Contextual Authentication : Using Mobile Phone Movements to Authenticate Owners Implicitly.

Baesjou, Bertrand (2007) Improving dependability of OSS access to a hierarchical distributed ad-hoc NMS.

Bakker, Alexander (2018) OSSUM : a framework for determining the quality of Information Security Assessment Methodologies.

Bakker, D.R. (2019) Impact-based optimisation of BGP Flowspec rules for DDoS attack mitigation.

Bakker, D.R. (2022) Autonomous emulation of adversary procedures in the (pre-)compromise domain.

Bakker, J. (2021) Calculating the Risk of Valve Failures when Maintaining Water Supply Networks.

Bakker, M. (2015) Numerical mathematics on FPGAs using CλaSH.

Bakker, Michiel (2020) Model validation for stochastic hybrid automata.

Bakker, P.J. (2010) Train composition using motion as a common context.

Bako, Adam (2018) Presenting temperature measurements of public spaces in Enschede.

Baksi, Shreyo (2018) Kiosk for 3D image acquisition of suspects.

Balamurali, S. (2022) An exploratory study to design and evaluate a dialogue system for a robot assisting the elderly in a care environment.

Balciunas, J.K. (2021) Real-Time Interrupt-driven Concurrency (RTIC) for Modern Application Processors.

Balen, J. van (2009) A virtual billiard assistant.

Baligudam, R. (2022) A Systematic Study of Gender and Religion Bias in Stories.

Balistreri, G. (2018) Spatial Analysis of Out-of-Hospital Cardiac Arrest Incidences.

Balk, Roland (2016) SQLento: database programming made easier.

Balkema, Wietse (2004) Realization and characterization of a 2.4 GHz radio system based on frequency offset division multiple access.

Bals, J. (2022) A comparative analysis of the multi-factor authentication protocols presented in the literature.

Bamberg, Rob (2012) Non-deterministic generalised stochastic petri nets modelling and analysis.

Bandi, S.S.A. (2020) Inter-subject synchrony and emotional dynamics in magnetoencephalographic signals during music stimulation.

Bankert, J.J.M. (2016) Comparison of Symbolic and Distributed Representation Language Models on the Lexical Substitution and Simplification Tasks.

Bannink, S.N. (2018) Risk Management in Cloud Environments: Towards the Adoption of Continuous Auditing and Assurance With EU-SEC.

Banu, R. (2020) Internet of nano-things in human cancer detection.

Barbara, Mario Alessandro (2019) Proof of All : Verifiable Computation in a Nutshell.

Barbero, Marta (2018) Reinforcement learning for robot navigation in constrained environments.

Barbieri, G. (2016) Control architecture for docking UAVs with a 7-DOF manipulator.

Barbosa, Rafael Ramos Regis (2009) On Access Network Identification and Characterization.

Basarabă, R.C. (2021) Investigating safety and security interactions using the BDMP formalism : case study of a DDoS attack on Liberia.

Batenburg, B. (2022) Performance of DNS over QUIC.

Bauhuis, Jan-Willem (2022) The future use of radiotherapy in the treatment of NSCLC and SCLC: a prediction.

Bayuaji, Rayhan Aryoseno (2021) Designing Compassionate Technology for Mental Health.

Beckers, Mr D.K. (2014) Information waste on the World Wide Web: combating the clutter.

Beek, Daan van (2013) Comparing the LTSmin and NuSMV reachability tools via automatic translation of their respective input languages.

Beekman, L.J.D. (2021) Procedural location generation with weighted attribute grammars.

Been, Henry (2013) Finding you on the Internet: Entity resolution on Twitter accounts and real world people.

Beernink, G.J. (2022) Taking the quantum leap: Preparing DNSSEC for Post Quantum Cryptography.

Beestman, Linda (2014) Interactive whiteboard use in elementary education : How to support teachers to improve their education, using the interactive whiteboard.

Beets, Fedor (2018) Privacy-preserving automated rental checking.

Beijnum, W. van (2021) The state of DNSSEC provisioning automation.

Beke, Chris ter (2017) Interaction development for personal daily support : design of conversational agent for activity tracking.

Bekkaoui, A. (2004) Link performance of the time offset transmitted reference system.

Belchev, B. (2022) Recommendations on bias : detect, mitigate, repeat.

Beld, J.J. van de (2022) Multimodal post-operative complication prediction for elderly patients with hip fractures.

Belt, S.P. van den (2021) Facial marks : detection and integration into a facial recognition system.

Benen, N.J. (2020) Using Graphviz to create aesthetically pleasing LaTeXdrawings of graphs.

Benjamins, Stan and Duin, Jesse van der and Nie, Heleen van and Plekkenpol, Luca (2021) Hoe wordt EUS de beste keus? : Optimaliseren van endo-ultrasonografische beoordeling ter onderscheiding van T1 en T2+ rectale carcinomen met behulp van deep learning.

Benkhelifa, M.R. (2022) Layout management on an interactive tabletop system.

Benthem, T.S. van (2018) Visualizing business performance : real-time BI-dashboards.

Berends, S.B. (2021) ML Governance Within Banking: A study into the oversight of ML model development and compliance.

Berendse, S.E. (2020) Exploring semantic segmentation in rowing images.

Berens, Menno (2006) De tevredenheid over shared service centers in de publieke sector : het succes van shared service centers en de oorzaken daarvan in de inrichting en het functioneren van de klant-leverancierrelatie.

Berenschot, L. (2022) Vital signs monitoring with an FMCW radar sensor.

Berg, A.W. van den (2015) Improving customer satisfaction through personalization.

Berg, B. van den (2018) Stimulus related evoked potentials around the nociceptive detection threshold.

Berg, Boudewijn van den (2014) Visual tracking of magnetic microrobots in biomedical research applications.

Berg, D.A. van den (2015) The risks and benefits of spreadsheet-based financial reporting as a form of shadow it in complex information systems: an action design research leading to the FRASIT-framework.

Berg, F.I. van der (2013) Model checking LLVM IR using LTSmin : using relaxed memory model semantics.

Berg, J.L. van den (2020) An interactive visualization explaining probabilistic fault tree computations.

Berg, M.A van den (2022) The estimation of rodent population in an area with the use of IR&RGB camera images and USV sounds.

Berg, R.T. Van den (2019) Designing a small and low-energy wildlife tag for parakeets within an urban environment capable of tracking and online activity recognition.

Berg, Ruben van den (2008) Interaction capabilities of Second Life : a framework to determine Second Life's suitability for a 3D virtual world application.

Berg, S.C.B. van den (2021) A simulation-based serious game in appointment scheduling for service facilities in health care.

Berg, T.M. van den (2016) Radar sensing for automotive parking distance control applications.

Berg, W. van den (2015) A systems approach to the design of a management information system for a growing IT service company.

Berge, C. ten (2022) Reverse engineer discontinued KUKA I-do robots and make them applicable for educative use.

Bergen, Marcel van (2007) Design and prototyping of a human-computer interface for a desktop tele-classroom conference application.

Berger, Kenaan (2020) Adoption of agile methods in automotive software development.

Bergervoet, Erwin Josephus (2011) Let the game do the talking : the influence of explicitness and game behavior on comprehension in an educational computer game.

Berghuis, Lars (2021) Using the Wisdom of the Crowd to Digitalize : Designing a workshop-based process selection method for the identification of suitable RPA processes.

Bergmans, R.H.J. (2019) Computer-aided diagnosis for CT based clinical triage of ischemic and hemorrhagic stroke patients : a deep learning and quantitative image analysis approach.

Bergsma, D. (2019) Porting tree-based hash table compression to GPGPU model checking.

Berkel, A.R.R. (2016) The new Luxon : a research into software expansion in the Lighting-as-a-Service market.

Berkel, A.R.R. (2019) Integration of clinical decision support systems in Dutch radiology departments.

Berkel, Niels van (2015) Item availability restricted.

Berkhoff, M.H. (2020) VRwonder : the development & implementation of a Virtual Reality application for people with dementia.

Bernard, Tobias (2018) Design and evaluation of spatial interfaces in virtual reality.

Bertolotti, E.M. (2020) Item availability restricted.

Beukema, W.J.B. (2016) Enhancing Network Intrusion Detection through Host Clustering.

Beuker, W. (2019) Multi-rate discrete fourier transform characteristics : results of models, simulations, and measurements.

Beunder, K.M. (2018) Correlating features of malicious software to increase insight in attribution.

Beune, P.F. (2021) Classifying the Network Capacity of the Dutch IPv4 Address Space.

Beunk, L.D.R. (2019) Tangible Tools and Techniques: Co-designing with Locked-In Syndrome.

Beusink, J.W.C. (2012) Secure access contol to personal sensor information in federations of personal networks.

Bezemer, Maarten (2008) Analysing gCSP models using runtime and model analysis algorithms.

Bhaskar, Rushvanth (2022) A Day in the Life of NTP : Analysis of NTPPool Traffic.

Bhaswara, I.D. (2020) Exploration of autoencoder as feature extractor for face recognition system.

Bhowmick, Anubrata (2021) Markers of Brain Resilience.

Bhutto, Muhammad Ramish (2022) Automating Privacy Policy Extraction And Summarization.

Biabani, Hamza Azhar (2022) A Closer Look at the Email Phishing Landscape.

Bie, D.R. de (2020) Image Similarity Ranking Applied to the Forensic Domain.

Bie, J.A. de (2018) PTA as an approach to fault tree analysis.

Biesbroek, Rudolf (2014) Last-mile lightpath services : on packet-switched shared infrastructure.

Biggelaar, M.E.C. van den (2012) Social media in het middelbaar beroepsonderwijs? Kansen en belemmeringen van social media voor het taal- en rekenonderwijs in het middelbaar beroepsonderwijs.

Bijker, Remko (2010) Efficient pointcut projection.

Bijl, M.H. de (2020) Encoder-Forecaster-Decoder: a Modular Deep Learning Framework for Cloudage Forecasting.

Bink, T.I. (2021) Requirements for disseminating sensing information to caregivers of persons with dementia.

Birton, Laurentiu (2021) Compressed Convolutional Neural Networks for the Classification of Electrocardiogram Signals on Embedded Devices.

Biswas, Biman (2022) Deep Learning-based Multimodal Fusion of Sentinel-1 and Sentinel-2 Data for Mapping Deforested Areas in the Amazon Rainforest.

Bitew, Semere Kiros (2018) Logical structure extraction of electronic documents using contextual information.

Blaas, R.M. (2019) Recipe and Meal management mobile application for Willieanne.nl.

Blankendal, Göran (2012) Building an Xtext compiler for Aspect-Oriented Languages based on ALIA4J.

Blankestijn, Arjan (2022) Millimeter-Wave Connectivity in Real World Vehicle-To-Vehicle Network Scenarios.

Bleeker, D.A. (2019) DoS attack on recursive resolvers with DNSSEC key-tag collisions.

Bleumink, C. (2022) Verifying the Rewrite Rules of VerCors Using Interactive Theorem Provers.

Bloem, E.J.W. van (2008) The user oriented knowledge management method : a knowledge management method for a small organization with a distributed environment.

Bloem, R.J.G. van (2008) A data transformation walkthrough.

Bloemen, S.P.R. (2022) Designing a dashboard development methodology for heterogeneous stakeholders in Dutch nursing homes.

Bloemen, Sander (2018) Designing an application for focussed surveys.

Bloemen, V. (2015) On-The-Fly parallel decomposition of strongly connected components.

Blok, T. (2019) ZITA : a self learning tutoring assistant.

Blokhorst, S.H.M. (2019) Graphical User Interface for Fault Tree Analysis.

Blom, Koen (2009) DVB-S signal tracking techniques for mobile hased arrays.

Blommendaal, Chris (2015) Information Security Risks for Car Manufacturers based on the in-Vehicle Network.

Blondel, Joppe (2021) Distributed Control Algorithm for Cooperative Autonomous Driving Vehicles Inspired by Flocking Behaviour.

Bloo, F.W.C. (2018) Towards updatable smart contracts.

Blumink, Remco (2008) Implementing and communicating with SHILS.

Bockting, S. (2009) Collection selection for distributed web search : using highly discriminative keys, query-driven indexing and ColRank.

Bode, M. S. P. (2017) How to Design an Interactive Installation for Concordia.

Bode, Max (2019) Evaluation of an augmented reality assisted manufacturing system for assembly guidance.

Boe, M. (2022) Realtime and Onboard fault diagnosis of UAV motors using RNN prediction model.

Boedeltje, Michel Ronald (2005) In response to your inquiry : Automatic E-mail Answer Suggestion in a Dutch Contact Centre.

Boekhoudt, N. (2021) Decriminalisation of cannabis : the effects on the drug market via the dark web.

Boelders, F.B. (2018) Developing a Ready2Help Application.

Boensma, Robert (2015) Geovisualization and time based mission planning on a multi-touch tabletop.

Boer, Frans de (2021) Active Learning on Embedded Devices.

Boer, G. (2016) Vertrouwen in telepresence bij ouderen : het effect van technische storingen op het delen van persoonlijke informatie.

Boer, P.B. den (2020) Inner Join Privacy : incorporating functionality-privacy trade-offs in Mobility-as-a-Service Solution design methods.

Boer, S. de (2022) Pre-Processing Whole-Genome Datasets To Improve The Execution Time Of Selective Sweep Detection Tools.

Boer, S.L. (2021) Depth estimation on synthesized stereo image-pairs using a generative adversarial network.

Boer, S.O. de (2021) Digital Identity; A cyber resilience evaluation of the European digital identity e-commerce requirements.

Boer, S.O. de (2021) Digital Identity : A cyber resilience evaluation of the European digital identity e-commerce requirements.

Boer Rookhuiszen, Roan (2011) Generation of German narrative probability exercises.

Boerdonk, R.A.C. van (2016) Pensioenbewustzijn: Kan IT hieraan bijdragen?

Boerrigter, T.H. (2021) Augmenting the process of schema matching with machine learning-based Intelligence Amplification.

Boersen, N. (2019) Digital billboard damage detection using computer vision.

Boersma, C.H. (2017) Improving the product search process through interface redesign.

Boersma, C.H. (2019) Designing a platform to communicate posture and movement data to medical professionals.

Boersma, Kitty (2019) Using Influencing Factors and Multilayer Perceptrons for Energy Demand Prediction.

Boeve, T. (2022) Comparative analysis between fast and basic scalar multiplication used in elliptic curve cryptography.

Bogaard, C.H.M van den (2020) Thwarting File-Injection Attacks on Searchable Encryption via Client-side Detection.

Bogaard, J.A. van den (2015) Predicting the performance of ERP in a changing and challenging energy market.

Bojorge-Alvarez, J. (2022) Re-assessing the effectiveness perimeter security & exploring attack surfaces at the Port of Rotterdam.

Bokhove, T. (2016) Improving the model management workflow.

Bokhove, Tom (2014) Public data visualisation in traffic, based on local, real-time monitoring.

Boksem, Jorn (2022) Finding ways to improve the prediction accuracy of a model that predicts the outcome of a football match using machine learning.

Bol Raap, W (2016) The design of a common data model for generic synchromodal cargo-tracking in logistics using web scraping and big & open data.

Bolding, T.G.J. (2019) Applying Peak-Shaving to Household Devices using an Event-Driven Algorithm.

Bolhuis, M (2014) Using an NFC-equipped mobile phone as a token in physical access control.

Bolhuis, M. (2015) Estimating Creditworthiness using Uncertain Online Data.

Bolhuis, W.T.C. (2018) The application of Scalable Agile in Dutch government.

Bollen, L.M. (2021) Hardware acceleration of sweep detection using Clash : Computer Architecture for Embedded Systems.

Bolscher, P.S. (2014) Automated external fraud prevention in the public sector.

Bolscher, R.T.J. (2019) Leveraging serverless cloud computing architectures : developing a serverless architecture design framework based on best practices utilizing the potential benefits of serverless computing.

Bommel, J. R. van (2021) Active Learning during Federated Learning for Object Detection.

Bonnes, Kevin (2017) Predicting mortgage demand using machine learning techniques.

Bontekoe, T.H. (2020) Balancing privacy and accountability in digital payment methods using zk-SNARKs.

Bontekoe, T.H. (2020) Balancing privacy and accountability in digital payment methods using zk-SNARKs.

Booijink, K.G. (2019) Evaluating the Scalability of MayBMS, a Probabilistic Data Tool.

Bookholt, Erik (2014) The Impact of Enterprise Architecture on Business Performance.

Boom, N. (2014) XRM at a bilateral trade organisation.

Boom, Q.O. (2018) Overcoming challenges of Big Data Analytics outsourcing meant to improve Business Intelligence.

Boorsma, Simon (2006) Ketenintegratie van het intermediaire distributiekanaal in de verzekeringsbranche : huidige ontwikkelingen in de verzekeringsbranche en de mogelijkheden voor Zevenwouden Verzekeringen om ketenintegratie te realiseren¿.

Boot, J.J.F. (2020) Defending against Access Pattern Attacks on Secure Range Query Schemes.

Boot, L. (2009) Facial expressions in EEG/EMG recordings.

Boretskii, I. (2022) Developing a system for suggesting alternative ways of visualizing data.

Borkent, Michiel (2005) De- and recomposition of expression in music performance.

Boros, H. (2008) Context Discovery Adapter (CDA) Protocol.

Borssum Waalkes, Bart (2005) Managing Genome Databases.

Bortolameotti, Riccardo (2014) C&C Botnet Detection over SSL.

Bos, J.C.H. (2014) Synthesizable Specification of a VLIW Processor in the Functional Hardware Description Language CλaSH.

Bos, J.P. (2021) Item availability restricted.

Bos, K.E. and Hasper, W. (2016) Enabling measuring of the patient flow in an orthopaedic clinic.

Bos, L.C. (2017) Safe cycling for elderly "see".

Bos, L.C. (2020) Formal analysis and verification of interactions in the O2N middleware framework.

Bos, Mart van den (2014) An integrated hydrodynamic-economic model for setting differentiated insurance premiums.

Bos, N.D (2021) Improving the Chess Elo System With Process Mining.

Bos, P. (2021) Program verification for quantum algorithms.

Bos, P.M. (2021) Personal learning records : supporting metacognition cycles to improve the learning of programming.

Bos, Pieter (2006) Interacting with a virtual conductor.

Bos, S.L. (2014) Improving the well-being of independently living seniors using ICT How can a personal service be used to improve the self-efficacy, social engagement and security awareness of independently living seniors?

Bos, W.F.A. (2019) Software Metrics as Indicators for Effort of Object-Oriented Software Projects.

Bos, W.J. (2009) Interactive signaling network analysis tool.

Bosch, K.T.D. (2020) Item availability restricted.

Bosch, P.P. van den (2017) Moral Intelligence for IT production.

Bosch, R.R. (2022) Solving the dynamic container relocation problem to minimize transportation costs using approximate dynamic programming.

Bosch, S.F. van den (2014) Designing Secure Enterprise Architectures A comprehensive approach: framework, method, and modelling language.

Bosch, Stephan (2008) FollowMe! : distributed movement coordination in wireless sensor and actuator networks.

Boschma, R. (2020) Exploring the world of Container Stacking using Approximate Dynamic Programming.

Boschman, S.R. (2006) Performing transformations on .NET intermediate language code.

Bosdriesz, Laura (2020) Adding Speech to Dialogues with a Council of Coaches.

Bosdriesz, Y. L. (2018) Towards a Reference Architecture for BIM (Building Information Model) Integration in the Construction Industry.

Bosdriesz, Y. L. (2018) Towards a reference architecture for BIM (Building Information Model) integration in the construction industry.

Bosems, Steven (2011) A Performance Analysis of Model Transformations and Tools.

Bosma, H.R. (2020) Increasing nutrient awareness with the Smart Kitchen Scale.

Bosma, H.R. (2022) Audio-visual Correlation from Cross-modal Attention in Self-supervised Transformers on Videos of Musical Performances.

Bosman, Yoran Maxim (2007) Incorporating Functional Design Patterns In Software Development.

Boti, B.R. (2016) Automatic quantification of Ki-67 proliferation index through co-registration with CAM 5.2 stained tissue to improve colorectal carcinoma diagnostics and therapy.

Bouius, B A.G. (2015) Characterising the Ripple Effects of Introducing Energy-Awareness Functionality in Cyber-Physical-Systems Software in Cyber-Physical System software.

Bouma, G (2021) Web Server Loads under Visitor Surges : A Model-Based Prediction.

Bouman, S.M. (2021) Personal Visualization in a Citizen Science Portal.

Bourbon de Parme, Carlos de (2022) Detecting Stomata with Computer Vision for Plant Breeding.

Bousias, Dimitrios (2021) Towards view-invariant Gait Recognition from monocular video based on Human Pose Estimation.

Bouwhuis, Wilco (2010) Modelleren van de Neocortex : analyse en simulatie op grote schaal.

Bouwmans, Rens (2018) Intra-cavity light distribution model for photodynamic therapy.

Bouwmeester, Egbert (2007) Continuous Classes of Power Amplifiers.

Bovenkamp, Jasper van de (2021) Dinner Time! : How to support children with autism spectrum disorder and their parents in better eating habits?

Bovenkerk, Jasper (2022) Generating IMU data from video using deep neural networks for use in animal activity recognition.

Boysen, Yannic (2022) Evaluating Recurrent Neural Networks as Solution to User Action Prediction.

Bozov, P. (2022) 3D point cloud segmentation and automation for railway catenary arches.

Braak, J.C. ter (2016) Radiolocalisation at construction sites.

Braak, Timon D. ter (2009) Run-time spatial resource management in heterogeneous MPSoCs.

Braakhuis, J.A. (2021) Design of a Reactive DNS Measurement System.

Braam, G.J.M. (2006) Supporting multi-modal and multi-medial user interfaces from an embedded environment.

Braams, T.L. (2020) Impact of programming environments and practices on energy consumption.

Braber, Kommer (2007) A policy based MBU control system using OSGi.

Bragt, Jasper (2010) Towards believable characters in the virtual storyteller.

Braham, K. (2018) Smart cities : crowd management using WiFi based infrastructure.

Brakels, M. (2017) Forward error correction and failure rates on Aurora high-speed links.

Braks, J.G.J. (2021) Determining the way of walking by leveraging CSI.

Brand, A. (2009) An investigation in qualities of software variability.

Brand, Jannis (2019) Development of a Passenger Flow Visualization Tool for Cruise Line Ships.

Brandl, L. (2020) FutureType : Word completion for medical reports.

Brandon, Merel (2012) Effect personality matching on robot acceptance : effect of robot-user personality matching on the acceptance of domestic assistant robots for elderly.

Brands, E.H.T.B. (2012) Flow-based monitoring of GTP traffic in cellular networks.

Brandt, Jacco Hermanus (2022) Effectiveness of Oblivious RAM in cloud storage services.

Brattinga, M. (2022) LSTM-based Indoor Localization with Transfer Learning.

Bravo de Medina Arribas, J. (2022) Decisive Image Characteristics to Perform Image Steganography in DCT.

Braşoveanu, R. (2021) Item availability restricted.

Bree, R.J. van (2021) Data augmentation for regularizing learned world models in reinforcement learning.

Bree, Sjoerd van (2022) Testing Copositivity in Pentadiagonal Matrices.

Breed, I (2019) Hierarchical forecasting of engineering demand at KLM Engineering & Maintenance.

Breed, I. (2015) Designing a spend analyses method for Power-Packer.

Breggeman, F.T. (2020) Graph Isomorphism with Pathfinding Algorithms.

Bremer, B. (2022) Design of a fast control system reacting to non-sinusoidal voltage fluctuations.

Brilman, Maarten (2015) A multimodal predictive model of successful debaters or how I learned to sway votes.

Brink, B. van den (2017) Orchestrating Similar Stream Processing Jobs to Merge Equivalent Subjobs.

Brink, G.C. van den (2019) Training deep learning models to count based on synthetic data.

Brink, K. van den (2020) Finding “The Drop” : Recognizing the climax in electronic music using classification models.

Brink, Tim van den (2008) Ketenarchitectuur : succes- en faalfactoren bij de invoering van het digitaal klantdossier.

Brink, W. van den (2022) Weighed and found legacy : modernity signatures for PHP systems using static analysis.

Brinke, Hans ten (2014) Hide and sneak - Perceptions in The Virtual Storyteller.

Brinke, S.T. ten (2020) The Effect of Manipulating Perceived Action Boundaries On Catching Performance.

Brinke, Steven te (2011) First-order function dispatch in a Java-like programming language.

Brinkhuis, M.E. (2015) Improving the Medicaid eligibility determination process using big data.

Brinkkemper, F.L. (2018) Decentralized credential publication and verification : a method for issuing and verifying academic degrees with smart contracts.

Brinkman, E. (2008) Recognition of the emotion in abstract expressionistic paintings using a machine learning approach.

Broeder, Gies den (2022) Human Activity Recognition using a mmWave Radar.

Broek, J.D.A. van den (2012) Design and implementation of an analog-to-time-to-digital convertor.

Broek, Jurgen Gijs van den (2012) Real-world analyses of internet protocols.

Broekema, C.D. (2014) Modelling loitering character agents in conflict situations: Visualizing and evaluating interpersonal conflict strategies.

Broekhof, Ivo (2022) Replication and Analysis of the Berry-Sethi Parser for Ambiguous Regular Expressions.

Broekhuijsen, Jeroen (2006) 2D Upper Body Pose Estimation from Monocular Images.

Broekhuis, Djurre (2014) Sousveillance on Intelligent Transportation Systems.

Broekhuis, Stijn (2021) The Importance of Coding Styles within Industries.

Broekhuizen, V.P. (2008) Security for EPC discovery services.

Broenink, Ralph (2014) Finding Relations Between Botnet C&Cs for Forensic Purposes.

Bronkhorst, M. (2021) A pen is all you need : online handwriting recognition using transformers.

Bronkhorst, T.A.W. (2014) Hardware design of a cooperative adaptive cruise control system using a functional programming language.

Brouwer, L.J. (2006) Monitoring van een ASR-systeem : het gebruik van interne confidencewaarden en teletekstondertiteling om de Word-Error-Rate van een herkenning te voorspellen.

Brouwer, R (2020) Learning Timed Mealy Machines of the Physical Processes of an Industrial Control System for Anomaly-based Attack Detection.

Brouwer, Ruben (2018) A user self-reported emotion feedback system.

Brugge, Jonathan (2010) Implementing and simulating the cross-entropy ant system.

Bruggink, T. (2022) Data & AI policies united: Picked to pieces.

Brugman, Ivo (2012) A multimodal interactive system for creative expressions.

Brugman, S.R.D. (2022) The development of a real-time monitoring system for fatigue detection on truckers.

Brugman, Tristan (2017) A methodology for deriving aggregate social tie strengths from mobility traces.

Bruijn, Vincent de (2013) Model-based testing with graph grammers.

Bruins, L.L.E. (2020) Validation of Legal Documents by comparing digital and printed photographs.

Bruintjes, Harold (2012) Bridging GROOVE to the world using a conceptual language model.

Bruintjes, Tom M. (2011) Design of a Fused Multiply-Add Floating-Point and Integer Datapath.

Brunsveld, R.D. (2019) Determining the Satisfiability of Car Configuration Models in a Repetitive Manner.

Brunt, B.W. (2020) Decreasing the computation time that's used for saving data in the DEMKit simulator.

Brus, T.A. (2017) Applying E-learning and persuasive design : teaching new users of an online accounting tool the basics of online bookkeeping.

Bruxvoort, Xadya van (2018) The impact of #MeToo; a data visualization.

Bruxvoort, Xadya van (2021) Towards the design of legally privacy-proof and ethically justified data-driven fraud risk assessment algorithms.

Bui, Cuong (2004) Write-intensive applications with LDAP.

Bui, Nhat (2021) Negomancer : Improvise. Adapt. Overcome. Transform.

Buis, J.T.P. (2017) Applying intelligence amplification to the problem of schema matching.

Buit, L.J. (2017) Developing an easy-to-use Query language for verification of lighting systems.

Bujorianu, Alex (2022) Developing a Recommendation Algorithm for Patients Using the Healthentia Platform.

Bukhsh, Faiza Allah (2010) Enhanced ICoNos maturity model.

Bullée, Jan-Willem (2013) Detection of leadership in informal (small) groups based on CCTV information.

Bulten, F.F. (2021) 3D Super Resolution using Auto Encoders for Face Recognition.

Bunda, S.T. (2022) Limited Resource Optimization for Face Recognition Neural Networks: Sub-byte quantization of MobileFaceNet using QKeras.

Burghardt, C.N. (2019) Item availability restricted.

Burghardt, Carmen (2017) How to design fashion applications.

Burghout, S.M.A. (2019) Essential IoT-value propositions to reinforce SME's business position.

Burgman, Ronald (2012) Partial-order reduction based on probe sets.

Burgwal, M.D. (2005) Serving the Montium : design of an energy-efficient processor-network interface.

Buser, Myrthe (2020) Towards stable feature detection for 3D reconstruction of the placental surface during the FLOVA procedure - Convolutional neural network based feature detection.

Buth, Maarten Dimmen (2006) Ball-handling motion control for soccer playing mini-robots.

Buuren, R.A. ten (2015) Domain-Specific Language Testing Framework.

Buurman, H.A. (2007) Virtual Storytelling: Emotions for the narrator.

Buursink, E.H. (2017) Evaluation and development of a decision support system for patients after an open heart surgery : Early online cardiac telerehabilitation programme.

Böckle, Marc-Philipp (2017) SAV2P-shared automated vehicle to pedestrian communication : exploring the impact of an interface for shared automated vehicles on pedestrians' level of comfort.

Böhmer, Kevin (2021) Model predictive control for electric vehicle charging using low power microcontrollers.

Cai, D. (2019) A Parasite Chain Attack in IOTA.

Camacho Camacho, José Manuel (2011) Assembler a bgp-compatible multipath inter-domain routing protocol.

Campomanes V, Florencio (2022) Estimating Consumer Food Accessibility Across Urban-Rural Catchment Areas in Ethiopia.

Capra, A. (2018) Gamified musical breathing exercises for children affected by Duchenne Muscular Distrophy.

Cardoso dos Santos Coelho, T. (2018) Using digital technology to encourage cultural change and positive behaviours : case study of project SunCard.

Carvajal Gallardo, I. R. (2015) Privacy-preserving social DNA-based recommender.

Casano, F. (2019) Identifying how vendors and clients manage red teaming.

Casteleijn, T.K. (2018) Start-up knowledge brought to large organisations : Innovation management software based on blockchain technology.

Castro, M.N.M. (2018) Breast phantom deformation tracking and local elastography for ultrasound-guided biopsy.

Cañizares, Jose Carlos (2017) The Information Society: Technological, Socioeconomic and Cultural aspects - Prolegomena for a sustainability-oriented ethics of ICT, with glossary and PhD prop.

Cervone, B. (2020) Designing interactive data visualisations for RTL Nederland’s online news platforms : increasing visibility of the “volg” functionality and user engagement.

Cesar, M (2019) The dangers and privacy issues of motion-based side-channel attacks.

Cesar, M. (2021) End-to-end encrypted data in web applications.

Chae, Heejin (2022) Prototyping gamification of lifestyle application for prevention of obesity in young adults.

Chandra, Melvin Sumon (2021) Why Should Security Train My Staff?

Chandra Mohan, Tejas (2021) Blind Image Quality Assessment of Smartphone-captured Images in the Wild.

Chandramohan, Aashik (2018) Machine learning for cooperative automated driving.

Chang, B.L. (2018) A deep learning approach to estimating permanents.

Charismadiptya, G.C. (2018) The design and implementation of situation aware smart logistics in perishable food transportation.

Chattopadhyay, A. (2022) Resilience of DNS infrastructure against DDoS attacks.

Chauhan, P. (2009) Study the impact of smile and tail dependence on the prices of European style bivariate equity and interest rate derivatives using Copulas and UVDD model.

Chavannes, J.P. (2021) Information extraction for court cases.

Chemaly, Trishia (2017) Multimodality image registration for visualization in robotic assisted breast biopsy.

Chen, Qiurui (2019) EEG hyperscanning study of team neurodynamics analysis during cooperative and competitive interaction.

Chen, Y. (2022) GameEvolver: A tool to potentially automatically improve board games.

Chen, Yang Sophie (2022) Enhancing the Web Browsing Experience on Mobile Devices with AR Glasses.

Chen, Zhen (2012) Workflow management solution for a security management application.

Chen, Zhiyuan (2020) Automatic detection of photographing or filming.

Chenet, M. (2017) Identify and extract entities from bibliography references in a free text.

Cheng, Miss Shu (2015) Translating strategy into implementation via capability-based planning.

Cheng, W. (2006) The design of a new power combining technique for the RF power amplifiers.

Chinthu Rukmani Kumar, Jayanth (2021) Geometrical Social Networks.

Chirca, Lucian (2021) Marks Fusion: Development Of Facial Marks Detection System And Fusion With Face Recognition System.

Chivulescu, Dragos-Marian (2021) Balanced, as all things should be: PSD2 and cybersecurity risks.

Choi, Sua (2022) The design of ‘League of Legends’ decision support system for inexperienced players.

Choi, Y. (2022) Case studies for the necessity of the blockchain in self-sovereign identity.

Chowdhary, A. (2020) Email-based Intelligent Virtual Assistant for scheduling (EIVA).

Christiano, B.G. (2022) Formalization of tangle and tangle learning algorithm.

Chromik, Justyna Joanna (2015) Booters (black)list.

Chávez Sáenz, L. (2022) Creating interactive custom controller installations to improve a museum exhibition.

Ciobotea, C. (2016) Improving payment authorization rates : by intelligently routing transactions.

Claase, Marcella (2014) Why do users bond with online services? : a literature review on the conceptualization of online user bonding in the context of online services.

Claessen, C.T. (2022) Text Mining to Improve Education : An Evaluation of Text Mining in the Student Feedback Process.

Claßen, P. (2022) A practical approach to assessing critical continuity properties of assets in business & IT continuity management.

Claßen, Philipp (2019) Identification of differences in sub-population healthcare processes.

Clerkx, N.P.M (2019) Improving vehicle routing by utilizing realisation data : a case study.

Coenen, M.H. (2019) Increasing availability of the AEpu by improving the update process.

Coenraad, T (2018) Analist: A Tool for Improved Static Type Analysis for Ruby.

Cojocaru, Andrei (2019) Handling Missing Data: Traditional Techniques Versus Machine Learning.

Colmenar Lamas, F.M. (2021) Analysis and comparison of Log Shipment solutions at AWS S3 for Windows 10.

Colombo, Riccardo (2020) On the escalation from Cyber Incidents to Cyber Crises.

Companjen, Ben (2013) Probabilistically matching author names to researchers.

Coniglio, Luigi (2019) Combining program synthesis and symbolic execution to deobfuscate binary code.

Conradi, Olaf (2006) Fine-grained Join Point Model in Compose.

Conrads, J.G. (2019) DDoS Attack fingerprint extraction tool : making a flow-based approach as precise as a packet-based.

Constantinescu, E.M. (2020) An in-depth approach to fitting probability distributions using evolutionary algorithms.

Copae, D.V. (2022) Using augmented software requirements for automatic classification.

Cornelissen, J. (2021) A study on forecasting SOFR with a recurrent neural network using long short-term memory cells.

Cornelissen, Richard (2013) Towards a methodology-growing framework.

Coroiu, Alexandra (2019) The generalization performance of hate speech detection using machine learning.

Corradin, M.C. (2014) Then and Now: On The Maturity of Cybercrime Markets - A study on regulation enforcement of forums in the online underground trading economy.

Corts, R. (2022) Accelerating selective sweep detection software with the GPU architecture.

Costa, Alvise (2010) Context - Free - Language Parser for Advanced Network Intrusion Detection.

Court, M.A. de la (2018) Will we let computers determine what music we listen? Exploring user acceptance of music recommenders.

Court, M.A. de la (2020) Design of a model-driven platform for IoT event stream processing.

Couwenberg, F. (2022) Extracting Unseen Classes From Capsule Network Feature Space.

Couwenbergh, W. (2020) Real-time assistance for people endangered by forest fires : Mobile application.

Covaci, Andrei - Ion (2022) Wi-Fi MAC address randomization vs Crowd Monitoring.

Crest, Côme du (2018) Scalability & Trustlines Network architecture.

Crichlow, Matthias Caretta (2020) A study on Blue Team’s OPSEC failures.

Cutina, Jennifer (2020) Assessing the use of process mining techniques to monitor the work process of commercial drivers.

DAM, M.R. (2015) Auditory processing using CλaSH.

Daemen, P. (2008) ZMP based control in 3D passive dynamic walking.

Dai, L. (2019) Human perception of an adaptive agent's fear simulated based on TDRL Theory of emotions.

Dai, Yinping (2020) Modelling the LIFE project using DEMKit.

Dalen, J.J.M. van (2011) Designing a tool for norm interventions in IT strategy projects.

Dalen, N.G.A. van (2020) Development and analysis of beat and tone detection for boomwhackers.

Dam, Arjan (2008) Geographic routing in wireless sensor networks for surveillance : introducing a novel routing algorithm: GZOR.

Dam, Franciscus Jozua van (2011) A stripline antenna for radiated immunity testng.

Damman, B. (2008) Representing PCTL counterexamples.

Danielecki, Daniel Mariusz (2019) Security first approach in development of Single-Page Application based on Angular.

Dartel, Bram van (2021) Malware detection in IoT devices using Machine Learning.

Das, Amit (2019) Towards a hybrid customer classification and clustering scheme for effective target-group based marketing.

Das, B. (2018) Using mobile sensing to detect indicators of alcohol intoxication.

Daskalov, V.D. (2022) Bio marker-based COVID severity prediction and data quality exploration.

Davanian, Ali (2017) Effective granularity in Internet badhood detection: Detection rate, Precision and Implementation performance.

Davelaar, K.I. (2014) Protecting high school students from bullying: Bully Shield.

Davids, Aron (2022) Identifying plot holes in narrative stories by simulating events.

Davison, David (2013) A framework for creating semantic wikis for biomedical research laboratories.

De Miguel Aramburu, A. (2020) Vulnerability management in organizations.

Deddens, M.K. (2008) Toepasbaar risicomanagement in software ontwikkelingsprojecten : ontwerp en toepassing van een risicomanagementmethode voor software ontwikkelingsprojecten binnen Centric IT Solutions.

Deenik, W. (2017) Teaching a machine beauty : intelligent interactive evolution of abstract animations.

Dekens, Berend (2011) Mapping of a DAB Radio Decoder to Homogeneous Multi-Core SoC : a case study to evaluate a NLP based mapping flow.

Dekker, A.P. (2021) Planning Self-Backhauled mmWave Networks with Multi-Connectivity.

Dekker, Thomas W.G. (2015) Applying parental involvement in secondary vocational education using a technological solution.

Delaere, Y. (2020) Design of a machine vision based faulty bead wire detection system.

Delaere, Yvo (2017) Implementation and optimization of facial recognition with the IntelRealsense SR300.

Delden, R.W. van (2011) Design of therapeutic TagTile games for children with unilateral spastic cerebral paresis.

Delfgaauw, Camilio (2020) Predicting car movement for autonomous driving through traffic using neural networks.

Delft, M. van (2019) Towards feature-based underground void detection with ground penetrating radar from within sewers using image processing.

Demkes, K.H. (2014) Automated tuning of an algorithm for the vehicle routing problem.

Deneka, Agnes (2014) A coach ECA to increase Societal Participation of Low Literates and Non-Native Citizens in the Societal Participation Learning Support System.

Denga, Adarsh Aaron (2021) Energy Optimisation Through Machine Learning in Wireless Networks.

Denman, Quinton (2018) Generating awareness of ubiquitous monitoring within the Netherlands, referencing the Chinese Social Credit Score.

Derks, C.C. (2019) Trends Tool, a tool for abstract textual data analysis used for additive manufacturing trend.

Derks, Theo (2006) Health at home.

Derwort, Selmer (2007) IT governance: de doelen en de middelen: In kaart brengen van IT governance in theorie en praktijk.

Deshpande, N.D. (2021) Machine learning techniques for the analysis of affective components of sign language.

Di Flumeri, MSc Francesco (2022) Explainable AI for supporting operators in manufacturing machines maintenance: Evaluating different techniques of explainable AI for a machine learning model that can be used in a manufacturing environment.

Diallo, A.O. (2017) Traffic filtering based on subsystem component state.

Dias, V.M. (2021) Smart KPI-ORIENTED decision support Dashboard for measuring the Digital Transformation success.

Diatmiko, G.P.K. (2020) Just-in-time intervention : Increasing young adults' fruit intake in an engaging way.

Dibbets, V.L. (2022) Team-based learning through an interactive online medium.

Dichev, Konstantin (2022) Validating Belbin Roles Based on University Students' Discord Messages.

Diepenmaat, J. (2009) Object XML mappings.

Diephuis, Maurits (2010) A framework for robust forensic image identification.

Dietvorst, Cornelis P. (2019) Programming data visualisations using Microsoft Power BI : building a scrap dashboard for BT2.

Dietz, W.S. (2015) A Reference Model Method to align the development of one software system with multiple Hinterland Container Terminals.

Dijk, J. F. van (2017) Three dimensional capacitive sensing for wearable technology : a development example for creative technology.

Dijk, J.J. van (2006) Entiteitreconciliatie ondanks beperkte overlap door middel van objectgelijkheid : casus ¿Koppelen van persoonsgegevens zonder een gemeenschappelijke identificatie¿.

Dijk, L.J. van (2021) AI as the assistant of the teacher : an adaptive math application for primary schools.

Dijk, Michel van (2007) Analysis and control of nonlinear oscillators.

Dijk, P.A.H. van (2018) An efficient simulation of crosslinked RAFT copolymerization.

Dijk, R.J. van (2020) Improving food safety by designing a decentralised traceability architecture in line with stakeholder concerns.

Dijk, Remco van (2021) Optimizing the BLE Transmission of Sensor Data: An Exploratory Study.

Dijk, T.G. van (2014) Tuning the Parameters of a Loading Algorithm.

Dijk, Tom van (2012) The parallelization of binary decision diagram operations for model checking.

Dijkslag, M. (2021) Passive query-recovery attack against secure conjunctive keyword search schemes.

Dijkstra, F.B. (2017) UCAVs Against Air Threats : Pre-feasibility Study for a Semi-Direct Control System.

Dijkstra, F.B. (2020) Decoding Individual Contralateral and Ipsilateral Finger Movements from Electrocorticographic Signals Recorded over the Human Sensorimotor Cortex of a Single Hemisphere.

Dikken, N. (2018) Digital Sports Training Exercises for Volleyball.

Diks, Vincent (2022) Detecting and interfacing urban litter using computer vision.

Dillimono, D.D. (2017) Nonverbal empathetic communication in coaching wearables.

Dimitrova, Desislava C. (2006) Performance evaluation of RMD (Resource Management in DIFFSERV) within NSIS (Next Steps In Signaling).

Ding, H. (2016) Integrating value modeling into ArchiMate.

Diphoorn, W. (2020) A Smartphone Application for the Creation of Legal Document Photographs.

Dirlik, S. (2013) A comparison of FFT processor designs.

Doan, K.Q. and Hazelzet, H. and Slingerland, T.P. and Zoet, S. (2020) Pijndetectie bij volwassenen door middel van afbeeldingbewerking en transfer learning: Een stap in de richting van automatische en continue pijndetectie bij gesedeerde kinderen op de intensive care.

Dokter, J. (2016) 20-sim Template for Raspberry Pi 3.

Dokter, J. (2020) Segmentation and classification of skin lesions using neural networks.

Domburg, R.S.A. van (2009) Empirical evaluation of change impact predictions using a requirements management tool with formal relation types : a quasi-experiment.

Dommerholt, W. (2019) Financial effects of moving patients from an inpatient to an outpatient setting : providing financial insight in the effects of discharging patients the same day as surgery instead of keeping them overnight.

Donckers, L. (2001) Energy Efficient TCP.

Donker, J.H. (2012) Handfish - tunable heterogenous multi-core simulators on multi-core hosts.

Donkers, A.D. (2021) The Usage of Models in Model-Driven Software Engineering.

Donners, Y. (2017) 3D Interactive visualisation framework for simulated systems in large scale print system design.

Donselaar, V.L. van (2015) Low latency asynchronous database synchronization and data transformation using the replication log.

Donselaar, V.L. van (2012) Information Retrieval models based on electrical circuit analysis using Ohm’s law.

Doorn, Gerrit Hendrikus van (2007) Accelerated playback of meeting recordings.

Doornenbal, Ing. Dirk (2006) Analysis and redesign of the compose*language.

Dorenbos, H.M.R. (2021) Moldel : Predicting the 'Mol' in 'Wie is de Mol?' using machine learning and mathematical modelling.

Dortmann, M.L. (2018) Developing a user interface for smart rainwater buffer systems.

Dragomiretskiy, Sergey (2018) The influence of DDoS attacks on cryptocurrency exchanges.

Drechsel, Alexander (2019) Automatic instance-based matching of database schemas of web-harvested product data.

Drenthen, S. (2014) Towards continuous delivery in system integration projects : introducing a strategy to achieve continuous delivery and test automation with FitNesse.

Driezen, Wouter (2008) Service-oriented and open-source software as potential markets for applications markets : analysis of the possible added value of Capgemini outsourcing's Dutch applications management service center.

Drijfhout, Wanno (2015) The Knowledge Cloud: Evolving the data management paradigm.

Dubowski, A. (2020) Activation function impact on Sparse Neural Networks.

Duerink, Hendrik Lodewijk (2013) Information System Data Flow within Performance Based Logistics.

Duits, Ines (2019) The Post-Quantum Signal Protocol : Secure Chat in a Quantum World.

Dulfer, R.M. (2020) The propaganda machine.

Dullaert, S.A. (2022) Friction and resistance as modalities for physicalizing data.

Dunn, B.C. (2015) De toepassing van de EWMA-methode op het adverteermodel van Joosten (2015).

Dunning, V.A. (2021) Developing a Multi-Party MPC Compiler with Covert Security and Public Verifiability.

Duong, X.L. (2022) Estimate motor unit organization in Nociceptive Flexion Reflex using Convolutive Blindsource Separation and statistical signal analysis.

Duraisingam, Prithivi Ram (2014) Crack detection in semiconductor products : machine vision techniques for detection of cracks in semiconductor products.

Dute, J.A. (2016) Predicting the unpredictable : predicting surgical case durations and overtime probabilities to maximise OR-efficiency at Thoraxcentrum Twente.

Dzulqarnain, A.R. (2017) Distributed Processing for Operational Modal Analysis of Bridge Infrastructures Using Wireless Sensor Networks.

Dzulqarnain, Dzulqarnain (2019) Investigating IoT malware characteristics to improve network security.

Ede, Thijs S. van (2017) Detecting adaptive data exfiltration in HTTP traffic.

Ede, Thijs S. van (2017) Detecting adaptive data exfiltration in HTTP traffic.

Eenennaam, E.M. van (2008) Providing over-the-horizon awareness to driver support systems by means of multi-hop ad hoc vehicle -to-vehicle communication.

Eerenberg, E. (2011) Towards distributed information retrieval based on economic models.

Eibich, Natasha J. (2019) Sticky Fingers: The effect of sticky interaction patterns on the design and adoption of a Radiology Information System.

Eidhof, M.S. (2020) Optimising the ATQP-process at Company X.

Eijkel, D.J. (2022) Anycast in the SCION Internet Architecture.

Eijkemans, Joep (2019) Motion sickness in a Virtual Reality cycling simulation.

Eijking, Bram (2021) Implementation and evaluation of a multi-axis brushless DC motor control using a planar finite element approach.

Eijnden, E.K. van den (2020) Optimal Handover in MEC for an Automotive Application.

Ekambaranathan, A. and Zaag, H. van der (2018) Vernieuwing en plezier in programmeeronderwijs in de bovenbouw.

Ekambaranathan, Anirudh (2018) Using stylometry to track cybercriminals in darknet forums.

El Assal, Karim M. (2018) Predicting user loyalty in an education support web application based on usage data.

Elderen, Sybren van (2014) Beating Logic: Dependent types with time for synchronous circuits.

Elfaramawy, Ibrahim (2017) Designing an accessible workflow for Rapid Prototyping on a homemade 3-axis CNC machine.

Elkady, O. (2022) SLAM for smart bikes.

Ellery, D. (2017) Writing reusable code for robotics.

Elling, Erwin (2007) Tools for fun and fruitful meetings. : “Don’t let meetings make you go bananas!”.

Elsinga, J.W. (2016) On a framework for domain independent heuristics in graph transformation planning.

Elskamp, F. (2018) CoDuo: a game for teaching Computational Thinking in Primary Education.

Elsten, J.M. (2020) System for indoor person localization in a healthcare setting.

Emous, Rob J. van (2019) Towards systematic black-box testing for exploitable race conditions in web apps.

Enache, Aida (2021) UI/UX Analysis and Design of Running Dashboard for Injury Prevention.

Ende, Frederik van den (2011) Interference Nulling via a Resistor-Weighted Op-Amp Vector Modulator.

Enendu, Somtochukwu (2019) Predicting Semantic Labels of Text Regions in Heterogeneous Document Images.

Engbers, S.F. (2021) Smart Sports Exercises: Offensive decision-making in volleyball.

Engelen, L. van (2006) Massively parallel quantization implementation using simulated annealing.

Engelenhoven, Adjorn van (2020) Modular Neural Networks using Multiple Gradients.

Engelgeer, Timo (2017) Designing a wireless node-based energy meter to measure both real and reactive power.

Engelsman, W. (2008) Method for requirements management and modeling.

Engers, Vincent P.G. van (2021) Towards understanding and modelling sparse training algorithms at extreme sparsity regime.

English, T. F. (2021) Using Artificial Intelligence for Image Classification of Ships.

Enkhuizen, M.J. van (2021) Innovative Data sharing in logistics, migrating from UN/EDIFACT to the OpenTripModel.

Ensink, E.S. (2016) De overstap van Excel naar Exact.

Enthoven, M.M.F.C. (2018) Error Analysis of Optical Self-Localization using Mapped and Distinguishable Beacons.

Epskamp, S.G. (2012) On the influence of stereographic 3D on user dependent direct projected augmented reality in the OR.

Erich, Floris Marc Arden (2014) Improving information system development and operations using the DevOps conceptual framework.

Erkko, M.A. (2022) Speeding up parametric model checking using GPGPU computation.

Es, Frank J. van (2008) Type inference for graph transformation systems.

Esquivel-Vargas, Herson (2016) Automatic deployment of specification-based intrusion detection in the BACnet Protocol.

Essen, T.M. van (2021) Investigations on Securing Repositories using Difference Analysis and Patch Applications on Encrypted Files.

Essenstam, L. (2019) Analysing various methods for object extraction and the classification of kitchens.

Etheredge, C.E. (2016) GoSlow: Design and Implementation of a Scalable Camera Array for High-Speed Imaging.

Evers, M. (2021) The design of a prototype handheld 3D surface reconstruction setup for monitoring skin diseases.

Evers, Sander (2004) Form follows function. Editor GUIs in a functional style.

Everse, Wouter M. (2009) Modelling and Verification of a Shortest Path Tree Protocol for Wireless Sensor Networks : Towards a Platform for Formal Verification Experiments.

Eversmann, H.Y.N. (2019) Computation offloading of augmented reality in warehouse order picking.

FU, Q. (2015) Implementing a real-time control algorithm of Triana on SASensor Open Platform.

Fahmi, Shamel (2017) Respiratory motion estimation of the liver with abdominal motion as a surrogate : a supervised learning approach.

Fang, Zhuowen (2021) HejVR: a Virtual Reality online cultural learning system.

Farooq, A. (2021) How to Zen our Python.

Fasel, R. (2019) Adapting the variational auto encoder for datasets with large amounts of missing values.

Fasya, Evania Lina (2017) Automatic question generation for virtual humans.

Fatseas, K. (2018) Embedded neural network design on the ZYBO FPGA for vision based object localization.

Fattahi Mehr, Omid (2022) Data Augmentation using Fourier-Basis Noise.

Felix, P. (2018) Data-driven retail food waste reduction : a comparison of demand forecasting techniques and dynamic pricing strategies.

Felix, P. (2018) Data-driven retail food waste reduction : a comparison of demand forecasting techniques and dynamic pricing strategies.

Feng, Yuan (2010) Modified potential approach to efficient, linear and symmetric values for TU-games.

Fennis, J. (2019) Machine learning solutions for exception handling.

Ferdelman, Kai (2021) Using computer vision to aid navigation for people with visual impairements.

Ferla, R.I. (2022) Exploring the GANformer for Face Generation : investigating the segmentation and smile augmentation potential.

Fernandes, B.O. (2021) Exploring possibilities in interactive technology to create cross-domain interactive breathing exercise games.

Ferronato, Giovanni (2020) IoT White Worms : design and application.

Fikkert, F.A.J. (2019) Linking indoor 3-dimensional visualizations with physical architectural floor plans.

Fikkert, F.W. (2005) Item availability restricted.

Filipovic, Simona (2020) Subpopulation process mining in healthcare.

Firdausy, Danniar Reza (2021) A Service-Oriented Business Collaboration Reference Architecture for Rural Business Ecosystem.

Flapper, Edwin (2020) ETA Prediction for vessels using Machine Learning.

Flapper, J. (2019) User access control on the blockchain for supply chain visibility.

Flederus, D.R. (2020) Enhancing music genre classification with neural networks by using extracted musical features.

Fleur, S. la (2018) Static Analysis of Symbolic Transition Systems with Goose.

Floor, Daniël (2021) the Suitability of Groove as a General Game Playing Language.

Florijn, W.J. (2019) Information retrieval by semantically grouping search query data.

Fluttert, Ernst (2013) Deciding between mobile implementation platforms - A multi-criteria decision system for implementation platforms for mobile applications.

Fokkema, J. (2016) Using a challenge to improve face spoofing detection.

Folkertsma, Kevin (2019) RE-Play: An exploration of game induced exercise promotion in clinical use.

Folmer, H.H. and Appel, R.N. (2016) Analysis, optimization, and design of a SLAM solution for an implementation on reconfigurable hardware(FPGA) using CλaSH.

Fonville, M.E. (2015) The virtual machine delivery network.

Fouda, Kareem M.I.A. (2017) Payload based signature generation for DDoS attacks.

Fountain, Stefan J. (2007) Success prediction induction framework : success models for online applications, introducing network effects and trust constructs.

Fournier, Bas (2008) Preprocessing on bilingual data for Statistical Machine Translation.

Foustanas, Nestoras (2015) Helping elderly users control a telepresence robot with a touch screen.

Franck, T. (2016) Towards an Integrated Model of Smart Manufacturing Enterprises.

Frank, Fabian (2018) Consent management on the Ethereum Blockchain.

Franken, Michel (2007) Ankle actuation for planar bipedal robots.

Franssen, Tim K.C. (2013) Gesture recognition in streaming motion data using offline training with a limited training set.

Franssens, Anne (2008) Analysis of Reed Solomon error correcting codes on reconfigurable hardware.

Franssens, Anne (2010) Impact of multiple inquires on the bluetooth discovery process : and its application to localization.

Freije, R.J.H (2019) Item availability restricted.

Fritz, Felix René (2017) Bike Sharing in New York City: How the Citi Bike System serves Points of Interest.

Fritz, Jako (2011) Hybrid Intrusion detection network monitoring with honeypots.

Frolov, Platon (2021) A sensitivity analysis of different machine learning methods.

Fu, Q. (2014) Validation of Interpersonal Stances Expressed by Virtual Suspect Characters in a Police Interview Setting.

Fujioka, T. (2022) Investigation of TOA/TDOA localization in the presence of receiver sensor position error.

Fürst, J. (2022) Validating XAI techniques in medical image diagnosis: A venture towards algorithm transparency in a socio-technical system.

Gaastra, S.L. (2021) Dinner Time! : Using technology for the gamification of mealtimes of children with autism to overcome eating problems.

Gadelmawla, Omar (2022) Exploiting shadows to infer 3D structures.

Gagelas, P. (2018) “Keep Your Eyes on the Road, Kid!” : Exploring the Potential of Virtual Reality Environments to Teach Children to Keep Their Attention While Biking.

Gaiser, Vincent Alexander (2008) Improving spatial awareness in an indoor environment with wireless positioning technology.

Gaisins, E. (2022) Are We All Back on Campus?

Galen, J. van (2009) Modelling, simulation and impelementation of an optical beam forming network control software system.

Galen, Rick van (2014) Design and feasibility of mobile peer-to-peer payment systems.

Galvan Hernández, J.A. (2018) Motivational strategies to improve self-management for rehabilitation of older adults.

Ganea, B.M. (2021) Design and implementation of a nonlinear model predictive controller for preliminary aerial physical interaction applications.

Gankema, Yvon (2018) Improvement of kitten Scanner.

Ganzeboom, Mario S. (2010) User-independent recognition of dynamic hand gestures using a dataglove.

Garcia Garcia, A. (2009) Optical phase synchronization in coherent optical beamformers for phased array receive antennas.

Garcia-Escallon, R.R. (2020) Enterprise architecture patterns : Supporting sustainable development.

García-Mauriño Taboada, Migue (2021) IOCMonitor: Automatic extraction of cyber threat intelligence from open source data using NLP and Machine Learning.

Gavenavicius, M. (2020) Evaluating and comparing textual summaries using question answering models and reading comprehension datasets.

Gavriel, Stylianos (2021) Stock Market Prediction using Long Short-Term Memory.

Geerlings, N.M. (2018) Design of a high-level control layer and wheel contact estimation and compensation for the pipe inspection robot PIRATE.

Geerlings, S.A. (2018) Analysis and Design of a Dependability Manager for Self-Aware System-on-Chips.

Geessinck, M.S.M. (2021) An automatic Segmentation method and prediction method for skin prick test results.

Geest, F. van der (2020) Finding a solution against loneliness among the elderly living in a senior housing complex with the help of remote co-design.

Geest, J.S.T. van der (2022) Preparing for wildfires avoidance by analyzing land cover maps.

Geevers, Kevin (2020) Deep Reinforcement Learning in Inventory Management.

Gehring, Felix (2012) Software performance prediction in early development phases: A UML- and simulation-based approach.

Geijs, D.J (2015) Geautomatiseerde beeldanalyse van morfologische kenmerken en de motiliteit van een individuele spermatozoon.

Geijs, D.J. (2019) Tumor segmentation in fluorescent TNBC immunohistochemical multiplex images using deep learning.

Geißler, Dominique (2021) Gender Bias in English and German Children’s Literature: A Computational Analysis Using Word Embeddings.

Gemmink, M.W.T. (2019) The adoption of reinforcement learning in the logistics industry: A case study at a large international retailer.

Gemund, A.P. van (2022) Simultaneous Localization and Mapping In Smart Bikes.

Gennep, Bart van (2013) In the eye of the wizard : effects of (mutual) gaze on an avatar mediated conversation.

Georgiadou, S.E. (2018) Item availability restricted.

Georgieva, Gergana N. (2022) Last-Mile Delivery Drone Acceptance: Increased knowledge does not imply increased acceptance.

Gerards, M. (2008) Streaming reduction circuit for sparse matrix vector multiplication in FPGAs.

Gerats, B.G.A. (2017) Increasing technician's efficiency in executing proactive maintenance tasks : an augmented reality concept.

Gerats, B.G.A. (2020) Individual action and group activity recognition in soccer videos.

Gerats, B.G.A. (2020) Individual action and group activity recognition in soccer videos.

Geretto, Elia (2018) A QBDI-based Fuzzer Targeting Magic Bytes Comparisons.

Gerretzen, B.M. (2022) Information leakage via Certificate Transparency.

Gerritse, A.J.H. (2018) (Spirit of Create): Exploration of illusory feedback.

Gerritsen, Jan-Henk (2012) Detecting synchronization conflicts for horizontally decentralized relational databases.

Gerritsen, S.N.J. (2015) Using teamwork to enhance the social presence on a distributed playground.

Gerth, Jasper (2019) Development of a system for real time localization of a team of athletes using Ultra Wide band : design choices and considerations for mesh network localization.

Geurts, Christel (2018) Item availability restricted.

Geuze, N.J. (2019) Energy management in smart grids using timed automata.

Ghasemieh, H. (2016) Influence of short cycles on the PageRank distribution in scale-free random graphs.

Gielen, M W (2014) Prioritizing Computer Forensics Using Triage Techniques.

Giessen, D. van de (2018) Implementing and Scaling HanzeNet.

Giessen, David van de (2019) Blockchain and the GDPR's right to erasure.

Gijsen, N. (2016) Prototyping and feedback design in a serious game context.

Gijsen, Niels (2020) Balancing software maintenance effort as a technical debt management strategy : the design and implementation of a novel algorithm.

Gijsen, Stijn (2015) Runtime Permission Checking in Concurrent Java Programs.

Gils, F.M.D.M. van (2008) PodVinder : spoken document retrieval for Dutch pod- and vodcasts.

Girdziunas, K.G. (2021) Supervised feature selection using sparse evolutionary training and neuron strength.

Gkovopoulos, Georgios (2022) Design of a 3D printed actuation platform for concentric tube robots.

Gnutti, Alessandro (2021) Study on the cyber risk inside a museal entity.

Go, M.L. (2019) Clustering with Outliers in a Biased Animal Movement Database.

Goedicke, D. (2017) On-road virtual reality driving simulator.

González-Novo López, F. (2022) Bike lane quality estimation under variable speed conditions using off-the-shelf motion sensors.

Goos, Sander (2011) A model driven approach to modernizing legacy information systems.

Goossens, Bjorn (2019) Decision-Making in a Microservice Architecture.

Gorgan, Andrei (2022) Enabling faster processing of big-data using GPU decompression.

Gorgan, D. A. (2022) Evaluating the practicality of using Blockchain in different use cases in the supply chain sector.

Gort, BSc Ewout (2021) Developing a maturity model based approach supporting the decision to adopt International Data Spaces.

Gosen, N. (2019) How Robotic Process Automation (RPA) influences firm financial performance in The Netherlands.

Gottimukkala, Anirudh (2017) Implementation of a digital Class - D amplifier controller in CλaSH.

Gougoulis Dimitriadis, E. (2022) Sixthsense : outdoor collision avoidance assistant for the blind and visually impaired.

Govers, Ruben (2021) Predicting Heart Rates Of Sport Activities Using Machine Learning.

Govindaraj, Visshnu (2021) Forward collision warning system with visual distraction detection in bikes.

Graaff, V. de (2009) Towards distributed information access : possibilities and implementation.

Graciano Martinez, Virginia (2021) A dynamic deployment framework for a Staging site in the Personal Health Train.

Graesel, H.S. (2022) Trust in Artificial Intelligence? The role of mental models, openness, and anthropomorphism in human-agent teams.

Graumans, Lisan (2021) Subpopulation Process Mining in the ICU for Patients Diagnosed with a type of Pneumonia.

Greeuw, P.C.A. de (2020) Robustness of Microgrid Control Mechanisms Against Cyber Attacks.

Grefte, L.J.L. (2016) NI myRIO as target for 20-sim.

Greuter, K.O. (2020) Evaluating the quality of the international consumer IoT Cyber Security Standard.

Gribnau, Erwin (2007) Analysis, design & implementation of a high-performance main-memory object database for Splice2.

Grievink, Guus (2022) Model-based Probabilistic Diagnostics of Cyber-Physical Systems.

Griffioen, H.T. (2008) Design of clock cleaner : a fast locking PLL.

Grimm, Sander (2020) Design of a 3D imaging system for psoriasis assesment.

Grinwis, Iwan (2021) Identifying the best Methods for Passive and Active Cybersecurity Assessment.

Grisel, I.G.J. (2011) Multimodal user interface for robotized flexible endoscopy.

Griët, D.D. (2021) Automatically map an algorithmic description to reconfigurable hardware using the Decoupled Access-Execute architecture.

Groen, Ruud (2006) Modelleren en analyseren van een Ethernet switch.

Groenenberg, Annabel (2021) Three Dimensions to See it All in One Position : the development and clinical usability of a real-time depth-based markerless navigation system for hologram-guided surgery on the Microsoft HoloLens 2™.

Groot, A.G. de (2019) Confidence driven control for autonomous robotic 3D ultrasound acquisition of the breast.

Groot, N.E. de (2022) Improving data value by using best of worlds approach from government (authoritative), community and commercial data : a case of topographical data in the Netherlands.

Groot, Paul de (2006) Enhancing the performance and testability of the MI20 robot soccer system.

Groot, R.E.J. (2012) IT-based risks in advergame campaigns : a focus on fairness and privacy.

Groot, R.J.M. de (2018) Detecting deviant behaviour in information systems by using outlier detection on logs.

Groot Roessink, Jochem (2021) inSQeLto : a Query Language for Probabilistic Databases.

Groot Roessink, R. (2020) Experimental review of the IKK query recovery attack : Assumptions, recovery rate and improvements.

Grooters, T. (2020) Analysing certificate transparency logs for let’s encrypt customer behaviour.

Grotentraast, Jurgen (2021) Decision support for Rocket League player improvement.

Guducu, Izzet Berke (2022) Weighted Abstract Syntax Trees for Program Comprehension in Java.

Gugten, L.A. van der (2020) Load balancing framework comparison.

Gulhane, Devesh (2022) What Face Would You Like To Have? : The Effects of an Avatar's Facial Features on Social Presence.

Guliker, B. Evert (2021) Spatial determinants of Real Estate Appraisals in the Netherlands: a Machine Learning Approach.

Guliker, B.E. (2019) Data storytelling: visualising linked open data of the Dutch Kadaster.

Guo, Mengran (2017) Research Line: a new design for better information sharing and storage between mentors and students in the E-mentoring process.

Gupta, C. (2021) HoneyKube : designing a honeypot using microservices-based architecture.

Gupta, Y. (2021) Aspect Based Sentiment Classification of Multilingual Customer Reviews.

Guru Rao, Sathvik (2022) Ontology Matching using Domain-specific knowledge and Semantic Similarity.

Gurusamy Muthuvelrabindran, A.M. (2021) Invertible recurrent inference machines for low-dose computed tomography.

HE, Y. (2017) Extracting document structure of a text with visual and textual cues.

Haalstra, O.N.R. (2020) Browser Anti-Fingerprinting as a pathway to Impersonation and Fraud.

Haan, L. M. de (2018) The integration of Big Data in purchasing, as designed in a new Big Data Purchasing Maturity model.

Haan, Sophie de (2018) Application design for the quantified pet domain from a user centered design perspective.

Haan, T. de (2018) BLE Localization using switched-beam angle of arrival for pallet localization in warehouses.

Haanstra, Sander (2008) Analyzing and improving generalization over time in CSP-based Brain-Computer Interfaces.

Haar, J. ter (2021) Design Reconstruction for Partial Reconfigurable FPGA Systems.

Haarhuis, L.M. (2022) Exploring business opportunities of sentiment analysis : a guideline for businesses, from implementation to business value generation.

Haarman, T.R. (2020) Analysing countermeasures against fault injection attacks on FPGA based cryptographic implementations.

Haas, A.N.J.P.M. (2020) Attitudes towards digital transformation at small enterprises : A cross-border analysis.

Haasjes, R.E.Y. (2019) Metamodel transformations between UML and OWL.

Haavel, Kristjan (2021) Effectiveness of Social Engineering Intervention: A meta-analysis.

Habib, Mena Badieh (2008) An intelligent system for automated arabic text categorization.

Hadiwijaya, Aditya Gianto (2020) User-centred design for input interface of a machine learning platform.

Haemers, MSc David (2021) Exploring Organinzational Network Analysis: A Case Study.

Hageman, Kaspar (2015) The Performance of ECC Algorithms in DNSSEC: A Model-based Approach.

Hagen, Gijs (2009) Het schrijven van een nieuw werkboek: hoofdstuk elektriciteit. 2e klas Havo/VWO.

Hagendoorn, B. (2009) Viscous coupling between bio-inspired hair-sensors.

Hagens, B. (2022) Analysis of Stochastic Behaviour in Sokoban.

Haji Ghasemi, Maryam (2014) Symbolic model checking using Zero-suppressed Decision Diagrams.

Hakim, V.S. El (2015) Implementation and Analysis of Real-time Object Tracking on the Starburst MPSoC.

Hakkenberg, Chiel (2016) Experimental evaluation of LoRa(WAN) in indoor and outdoor environments.

Hakvoort, Gido (2011) Immersion and affect in a brain-computer interface game.

Halim, Ricco (2022) Decentralization, Scalability, and Security Trade-off in Blockchain System: Comparison on Different Approaches.

Haller, Stefan (2020) Automatic Short Answer Grading using Text-to-Text Transfer Transformer Model.

Hallsworth, Sian (2021) Metrics for Efficiency of Spectrum Sharing in Wireless Networks.

Ham, Laura (2020) The design of an Interactive Topic Modeling application for media content.

Ham, Wim van der (2011) An Appraisal Based Model of A�ect for a Negotiating Agent.

Hamelers, L.H. (2018) Investigating generic online animal activity recognition across different animal species.

Hamelers, L.H. (2021) Detecting and explaining potential financial fraud cases in invoice data with Machine Learning.

Hamza, Muhammad (2021) Blockchain and Artificial Intelligence in Sustainable City : Can These Technologies Create Sustainable Cities and Communities?

Haq, Muhammad Yasir Muzayan (2018) Predicting Loan Default in Retail Credits: The Case of Indonesian Market.

Hari, Atul (2020) A spatial cognitive exploration algorithm for autonomous mapping of unknown indoor environments.

Harleman, R.J.S. (2018) Optimizing Online Advertising using Dynamic Pricing.

Harleman, T. (2011) Towards a generic model for audit trails.

Harmelink, R.L.A. (2019) Computing threat points in two-player ETP-ESP games.

Harmes, J.P.M. (2020) A threat model analysis of audio recording on mobile health care applications.

Harms, J.R. (2020) Research and Design of Collecting and Analysing the Customer Journey in a Collaborative Software Tool.

Harmsen, Emiel (2018) OpenIMPRESS : an open immersive telepresence system.

Harmsen, Ruud (2015) Specifying the WaveCore in CλaSH.

Harmsma, W.H. (2022) Automated detection of hidden failures in heating and photovoltaic systems of ‘Nul-op-de-meter’-housing Projects.

Harrower, Jeffrey (2017) Social communication and digital privacy concerns of teenagers.

Harten, Anne van (2019) Analyzing Programming Education Quality based on Students' Questions.

Hartholt, Woutske (2010) Beslissingsondersteuning voor het aanpassen van de online OK-planning.

Hartog, D den (2022) Event record-based evaluation of business scenarios in the logistics domain using process mining.

Hartog, M.R. den (2010) Shunt planning : an integral approach of matching, parking and routing.

Hartvelt, S.J. (2020) Assessing the impact of data availability on parking prediction accuracy : a case study using a simulation-based Approach.

Hassani, A.Z. (2011) Touch versus in-air Hand Gestures: Evaluating the acceptance by seniors of Human-Robot Interaction using Microsoft Kinect.

Hassink, N. and Schopman, M.G. (2006) Gesture recognition in a meeting environment.

Hast, Fritz (2020) The Impact of 5G on Future Data Center’s Carbon Dioxide Emissions.

Hauser, Brand (2022) GridShield on a Multilayered Electric Grid.

Havinga, Thijs (2019) Embedded Infrastructure for Decentralized Energy Management.

Havinga, Thijs (2021) MmWave Beam Control for Geocasting in Vehicular Networks.

Havinga, W. (2005) Designating join points in Compose* : a predicate-based superimposition selector language for Compose.

Hazekamp, C. (2018) Inferring animal social interaction using proximity based on BLE and LoRa.

He, Wenruo (2022) Augmenting and Graph Scaling for Context-Aware Citation Recommendations.

He, Xiaobo and Mayasari, Elisabeth E. (2003) A Design of Software Architecture for “SHAPE” Workforce Management Game.

Heath, Andrew (2021) Investigating the use of hub neuron identification for pruning sparse neural networks.

Heddema, R.R. (2007) Strategy for a robot soccer team - Let’s play robot soccer -.

Heer, G.W.A. de (2014) Instance Pointcuts.

Heerde, Harold van (2006) Life-cycle privacy policies for the ambient intelligence.

Heeringa, T.J. (2022) The Effect of Higher Order Activation Functions on Infinitely wide Neural Networks.

Heerlien, I.R. (2020) Automatic detection of user errors in spirometry data using machine learning techniques and the analysis of the effect of metaphors on the quality of spirometry measurements.

Heerlien, I.R. (2020) Automatic detection of user errors in spirometry data using machine learning techniques and the analysis of the effect of metaphors on the quality of spirometry measurements.

Hegeman, Erik (2011) InfoSupport - On the Quality of Quality Models.

Hegge, Stephan (2007) Predicting end-to-end network characteristics on mobile devices.

Heijblom, A.R. (2016) Using features of models to improve state space exploration.

Heijden, G.A.M. van der (2022) Building a sense inventory for Dutch healthcare abbreviations.

Heijden, L.M.A. van der (2019) Classification-based Approach for Question Answering Systems: Design and Application in HR operations.

Heijden, Rens W. van der (2012) SeDyA: secure dynamic aggregation in VANETs.

Heijer, Frank den (2018) Method for legacy software evaluation based on the Balanced Scorecard and AHP.

Heijnsbergen, I.M. van (2022) Importance of system dynamics in project management : a collection of case studies.

Heijs, Wouter (2019) The design of an expert profile and the availabilty of employee expertise sources.

Heikamp, F. (2018) Gray-box Network Fuzzing using Genetic Algorithms and Code Coverage.

Heinen, Niek (2020) Using lightweight image classifiers for electrocardiogram classification on embedded devices.

Heinsius, L.R. (2021) Real-Time YOLOv4 FPGA Design with Catapult High-Level Synthesis.

Hek, J. (2014) Clustering the results from brainstorm sessions.

Heling, Yoran (2014) Biased Random Periodic Switching in Direct Connect.

Hemert, Teun van (2013) Implementing flexible, extensible composition operators.

Hendriks, C. (2020) Proactively detecting crafted domains using active DNS measurements.

Hendriks, Koen (2020) The improvement of objective milkfoam quality analysis through image processing and computer vision.

Hendriks, Luuk (2014) SSH Compromise Detection using NetFlow and IPFIX.

Hendriks, M. (2019) Can machine learning automatically choose your best model checking strategy?

Hendriks, Remi (2021) The burden and information gain of path-based topology discovery.

Hendrikse, B. (2019) Data-driven IT : tackling IT challenges with data management in a financial institution.

Hengst, Kimberly (2020) Best Practices in Cloud Incident Handling.

Hensema, M.A. (2015) Applying Agile in Enterprise Architecture.

Henzen, S.F. (2008) A framework for service-oriented extensions to Ruby on Rails.

Herbowo, Keanu Nurherbyanto (2022) Comparing Zero-Knowledge Proof Protocols for Practical Open Source Self-Sovereign Identity Systems.

Herms, K.G.F. (2007) Body pose tracking in the Watching Window : a system that tracks both hands in a virtual reality environment.

Herwijnen, A.G. van (2016) The influence of inner-state displays on human-human interaction.

Hessels, R.A. (2021) Activity Recognition in Nature using Sound and AI.

Hessels, Stefan (2014) Adoption of Personal Health Records (PHR) in The Netherlands: A study using the PRIMA-model.

Hessels, Stefan (2016) Bridging the gap : from process mining to business process simulation.

Hetterscheid, K.J.T. (2020) Detecting agitated speech : A neural network approach.

Hettinga, S. (2010) Performance analysis for embedded software design.

Heukels, F.R (2015) Simultaneous Localization and Mapping (SLAM) : towards an autonomous search and rescue aiding drone.

Heukels, Rolf (2012) Predicting user behavior using transition probability.

Heus, Marije de (2013) Design and evaluation of a recommender system for high school courses in the Netherlands.

Heus, Steven de (2020) Designing and Evaluating an Educational Board Game.

Heuts, R.P. (2007) Mobile interface design for dynamic environments.

Heuven, D.W. (2014) Opportunistic sensing & Aggregation network Using Smartphones and Sensor nodes.

Heuver, J. (2022) Markerless stride segmentation for canine pose estimation.

Heuver, Rien / P.R. (2020) Generating facial morphs through PCA and VAE.

Heyns, L. (2020) Converting Modest Models to Efficient Code.

Hidding, S. (2017) iBeacons for Concordia : Exploring the possibilities of iBeacons in a museum context.

Hiemstra, D. (1996) Using statistical methods to create a bilingual dictionary.

Hijlkema, Frank (2022) Direction-of-Arrival Estimation Using A Machine Learning Framework.

Hijmans, Remco (2012) Comparing grid-based features and classification settings, in an off-line supervised human action detection and recognition task.

Hijum, S. van (2016) Symbolic model checking of timed automata using LTSmin.

Hillerström, F.H.J. (2016) Deep verification learning.

Hillerström, M.A.M. (2021) Towards Implicit Authentication in Smart Logistics: A Random Number Generator for Sensor PUFs in Resource Constrained IoT Devices.

Hindriks, H.N. (2016) Vulnerability analysis of cyber security modelling language models using probabilistic logic.

Hlukhau, Ihar (2022) Multiphoton microscopy for in-tissue imaging of micro-robots.

Ho, Yoeng Woey (2008) .NET integration TEAHA.

Hobert, E.C. (2020) Integrating Energy Awareness into Sequence Control.

Hobert, L.H.X. (2012) A study on platoon formations and reliable communication in vehicle platoons.

Hoedemakers, Juliette (2018) Effective visualisation of textile for a Digital Showroom.

Hoedemakers, Juliette (2020) Development of the vocie commerce ultrasound payment solution for FMCG in the innovation labs.

Hoegen, Rens (2015) Human Behavior towards Virtual Humans.

Hoek, J.M. van (2020) Predicting purchasing intent of website visitors with deep feature learning.

Hoek, Marissa (2014) Generating Dutch focalized stories about interaction in a serious game.

Hoekerd, P.G. (2013) Using existing software to build a virtual community for telemedicine.

Hoeksma, Ruben (2010) Price of anarchy for machine scheduling games with sum of completion times objective.

Hoekstra, G.I.S. (2018) Towards a software architecture model for the automation of the PIRATE robot.

Hoekstra, Æ. S. (2021) Deobfuscating third party libraries in Android applications using library detection tools.

Hoener, P.M. (2015) Improving the Processes and Safeguards for Fraud Detection and Prevention in US Medicaid.

Hoener, P.M. (2013) Cloud Computing Security Requirements and Solutions: a Systematic Literature Review.

Hoeve, Thijs ten (2012) Model based testing of a PLC based interlocking system.

Hofman, N. (2020) Enterprise social software acceptance : overhauling the "One Size Fits All" approach to explain social intranet usage.

Hofste, J. (2012) Scalable identity extraction and ranking in Tracks Inspector.

Hofstee, S.B.H.C. (2022) Analysis of pruning methods for compact neural networks on embedded devices.

Hofstra, Matthijs (2018) Integrating Formal Methods Tools : A Case Study.

Hofstra, Silke (2018) Automated analysis and simulation of control systems using dataflow.

Hogema, T.A.M. (2019) Counting People in Simultaneous Speech using Support Vector Machines.

Hogema, T.A.M. (2021) Health information exchange in the Netherlands.

Hogenkamp, Tom (2019) Framework for Fine-Grained Partial Reconfiguration on FPGAs.

Hogt, N.A. (2008) Aanbevelingen voor een architectuur voor het regionale zorgsysteem.

Hoheisel, R.E. (2022) Ransomware as a tool for diversion and coverup. A possible modus operandi for advanced persistent threats? A (practical) Investigation into the Use of Ransomware as Masquerade and Distraction.

Hol, M.C. (2018) Using user workflow analysis to create insights in content-intensive applications : Combining Process Mining and Model-Driven Engineering to create a reusable, scalable and user-friendly solution.

Hol, Valentijn (2022) Bit-packing and Hashing Evaluation in Explicit-state Model Checking.

Hollander, Emiel (2010) Dynamic access control.

Hollander, J.P. (2021) Verification of a model checking algorithm in VerCors.

Holzenspies, Philip (2005) SILC: SPRITE Input Language with C(++).

Hong, L. (2009) Implementation and tuning of optical singlesideband modulation in ring resonator-based optical beam forming systems for phased-array receive antennas.

Honig, J.J. (2020) Incremental symbolic execution.

Hoogervorst, R.W.P. (2018) A model-driven data-analysis architecture enabling reuse and insight in open data.

Hoogesteger, Martijn (2016) Securing mobile VoIP privacy with tunnels.

Hoogsteder, V.J.M. (2007) Strategic performance measurement for eBuddy.

Hop, Ivan J. (2022) On the Performance of Algorithms for Quantitative Verification.

Horlings, S.J. (2021) Visual feedback from a virtual coxswain to improve engagement.

Hormann, Tina Marie (2020) Web design for different user generations : the impact of aesthetics on emotions and quality perceptions.

Horst, Arie (2010) Sport coach : online activity using wireless sensor network.

Horst, Jonas ter (2022) Machine Learning for Exchange Traded Fund Price Predictions.

Horst, Oliver (2018) Development of a smart healthcare tracking system : for the hip fracture rehabilitation process.

Horst, Reinier L.C. van der (2022) Error Estimation for Output Prediction of Photovoltaic Systems.

Houtman, J. (2009) Bringing scalability/failover to a complex producer/consumer implementation.

Houtsma, R. (2022) An Explainable Machine Learning Approach to Risk-Adaptive Access Control.

Houtsma, Ramon (2022) An Explainable Machine Learning Approach to Risk-Adaptive Access Control.

Houwelingen, Jan Willem van (2008) Relevance and usability of enterprise architectures during post merger IT integrations.

Hove, D. ten (2010) Change management within SysML requirements models.

Hove, K.W. van (2019) Automated DDoS Attack Fingerprinting by Mimicking the Actions of a Network Operator.

Hove, K.W. van (2022) Threat analysis of RPKI relying party software.

Hristov, I. (2018) A system for improving analysis of complexes in real estate asset management.

Hristov, P. (2022) Designing an intrusion detection system for a Kubernetes cluster.

Hu, Danchao (2011) Using actor-network theory to understand inter-organizational network aspects for strategic information systems planning.

Hu, X.L. (2021) Lightweight image-based key point tracking for real-time bridge monitoring with smartphones.

Huang, Liting (2012) Secure and privacy-preserving broadcast authentication for IVC.

Hubert, André (2019) AI-Enabled Automation : A Framework for Identifying a Company’s Automatable Core Processes.

Huiden, J.E. (2019) Generating Realistic Ghost Fingerprints by Combining Real Fingerprint Images.

Huijgen, Arris (2013) Effciently protecting virtualized desktop infrastructures against malware - Performance comparison between traditional- and centralized antivirus.

Huijsmans, Maarten (2022) The chatbot usability scale : an evaluation of the Dutch version of the BUS-11.

Huiskes, Merle (2020) Automated robust planning for intensity modulated proton therapy (IMPT) in oropharyngeal cancer patients using machine learning.

Huisma, G. (2022) Recursive island parsing : monadic lake parser combinators.

Huisman, A.B. (2016) Deception detection using keystroke dynamics : on the methods to predict deceptive behavior by looking at the keystroke rhythm.

Huisman, D.A.J. (2021) Generating Specifications to Verify the Correctness of Sanitizers.

Huisman, Rolf (2007) Bugspray for composition filters.

Huisman, Sander (2020) ClaSH-based Framework for Hardware Generation of Optimised Real-Time SDRAM Interfaces Using Static Memory Access Patterns.

Huistra, D.J. (2016) Automated generation of attack trees by unfolding graph transformation systems.

Huitink, N.J. (2020) Workforce Prediction of Order Picking Personnel.

Huizen, J.C. van (2018) Development of a prototype-centred co-design process with autistic people to support semi-independent living.

Huizenga, G.R. (2015) A Front-end Application for Markov Random Field-based Texture Image Segmentation.

Hullu, Clermond de (2013) Architectural design of modular ESB systems.

Huls, C. J. (2015) A scenario planning for interbank payments and Decentralized Ledger Platforms.

Hulsebosch, M.A.C. (2016) Cloud Strife : an analysis of cloud-based shadow IT and a framework for managing its risks and opportunities.

Hulsebosch, Marc (2013) Targeting gamification applications to increase user participation.

Hulshof, Mike (2021) Information security certification in context : a strategy selection maturity model.

Hulswit, D.R. (2006) Automatic interpretation of Nijntje-images.

Hulter, J.G. (2022) Improving the integrated development environment of a legacy software platform.

Hultermans, M.A.A. (2019) A Theoretical Ad Hoc Lunar Communication Network With CubeSats as Secondary Payload of Lunar Missions.

Hummel, Tim (2014) Exploring Effects of Electromagnetic Fault Injection on a 32-bit High Speed Embedded Device Microprocessor.

Hurne, I. van (2014) Towards a Unifying Framework for Modelling and Executing Model Transformations.

Huttinga, N.R.F. (2017) Insights into deep learning methods with application to cancer imaging.

Huttinga, S.S.J. (2019) Procesautomatisatie door middel van object detectie, een machine-learning ontwikkelingsmethodologie.

Huveneers, Maartje (2021) The Development of a Horse Activity Recognition Algorithm.

Huynh, Mr. Quang Long Q.L. (2022) Analysis on relations between graph metrics and average consensus algorithm convergence speed.

Höfer, Christina (2013) Privacy-Preserving : Charging for eMobility.

IJsselmuiden, M.J.H. van (2018) 3D-model annotation for Computer Aided Design in augmented reality.

Iadarola, Giacomo (2018) Graph-based classification for detecting instances of bug patterns.

Ibrahim, Arief (2019) Forecasting patient demand and predicting inpatient admission via machine learning techniques in acute care domain.

Idserda, K. (2008) Simultaneous binding proxy mobile IPv6.

Ignatius Patrick, Patrick (2020) Assessing LOKI by learning from Mitsuku and dataset themes.

Ikhena, Priscilla Onivie (2020) Designing a system for evaluating the performance of computer vision applications, and managing the events generated by these applications.

Ikink, D.T.R. (2020) Security for an Internet-of-Things Network in the Context of a Dairy Management System.

Imbrea, A. (2020) An empirical comparison of automated machine learning techniques for data streams.

Imhof, T. (2020) Home telemonitoring acceptance for eye care patients.

Imre, Baris (2021) An investigation of generative replay in deep reinforcement learning.

Indrawijaya, K.R. (2019) Self-management Rehabilitation Capabilities on Older Adults by Persuasive Technology.

Ingberg, G. (2006) Location aware performance measurements.

Ingen, D. van (2018) AIRplay : designing a game for children with asthma to support self-management.

Inoue Nakagawa, P. (2021) Semantic Description of Explainable Machine Learning Workflows.

Ion, Diana-Elena (2021) Decentralized Finance Analysis.

Ionita, Dan (2013) Current established risk assessment methodologies and tools.

Irfan, Tekinerdogan (2022) Online platform for supporting the development of assistive technology tools for disabled people.

Iseke, Ann-Cathrin (2020) An Enterprise Architecture Approach Towards Sustainability and Environmental Performance.

Iskandar, Kevin (2022) 2FA SMSs: Influence of Cybersecurity Behavior & OTP Message Content on Security2FA SMSs: Influence of Cybersecurity Behavior & OTP Message Content on Security.

Isnaynizahra, N. (2022) Dashboard as a decision support tool to minimize empty miles in shipping network : locating region for improvement.

Ivanov, Filip R. (2021) Blike: Developing a cycling gamification app for teaching and motivating people to cycle.

Jaarsveld, F. van (2020) Estimating the effects of the Macroscopic Traffic Parameters on the overall Cooperative Awareness Message generations.

Jacobs, M.J.F. (2022) A software development project ontology.

Jafarli, Sevinj (2022) Providing DNS Security in Post-Quantum Era with Hash-Based Signatures.

Jagannatha, P. (2016) Detecting Exploit kits using Machine Learning.

Jager, J (2017) Joint level modelling, characterisation and torque control of the SHERPA robotic arm.

Jakel, Tibor (2019) Using Sentiment Data from the Global Database for Events, Language and Tone (GDELT) to Predict Short-Term Stock Price Developments.

Jansen, Bas (2019) Automated Testing of Models of Cyber-Physical Systems.

Jansen, F.X. (2020) Shining light on software modelling : a creative technology workshop.

Jansen, G.A.A. (2020) Underground Wireless Communication and Wake-Up at 125 kHz.

Jansen, Joost (2019) Communication of Incident Severity between Customers and Analysts in a Security Operations Center.

Jansen, Joost (2019) Detecting Combosquat Domains using Active DNS Measurements : communication of incident severity between customers and analysts in a SOC.

Jansen, L.J.A. (2022) Assessing smart home security : a Zigbee case study.

Jansen, L.W.L. (2020) Comparing cloud security directions between the Academia and the Industry.

Jansen, L.W.L. (2022) About the effect of white-box membership inference attacks on federated learning in large networks.

Jansen, Lisette (2007) Panze: A Multimodal Preschool Music Education System.

Jansen, M. (2012) Improving inattentive operation of peripheral touch controls.

Jansen, R. (2016) Waypoint navigation with obstacle avoidance for MAV's.

Jansen van Rosendaal, J.B. (2017) A context aware dynamic lighting system for the SmartXp.

Janssen, Bas (2016) Determining truth in tweets using feature based supervised statistical classifiers.

Janssen, D.D. (2021) Data-Driven Analysis of Cellular Network Resilience in the Netherlands.

Janssen, Djordi (2019) The Effects of Active Learning on Computer-Aided Diagnosis in Multi-Disease Prediction of Chest X-rays.

Janssen, N.E. (2022) The Evolution of Data Storage Architectures : Examining the Value of the Data Lakehouse.

Janssen, Stefan C. (2016) Reducing labeled data usage in duplicate detection using deep belief networks.

Jarosinski, W.W. (2019) Using Co-Design to Develop ‘Autshare’, an Online Solution-Sharing Platform for Autistic Individuals.

Jaworski, M.Z. (2022) Particle swarm optimization of custom bitcoin trading algorithm.

Jayagopal, Tarun Narain (2021) VICE-GAN: Video Identity-Consistent Emotion Generative Adversarial Network.

Jeckmans, A.J.P. (2009) Practical Client Puzzle from Repeated Squaring.

Jeeninga, Jesper (2011) Improving communication between computer programmers and domain experts : creating a generic scenario description language to aid the process of describing scenarios for emergency response training simulators.

Jellema, J.M. (2019) Polynomial Calculation of Quasi-Gray code labelings for Irregular Signal Constellations.

Jeltes, Claire (2018) The introduction of foetal therapy for TTTS patients in the Radboudumc : including the development of 3D FLOVA-SLAM.

Jeulink, Kevin (2020) Smart sports exercises project : the detection of (in)correct motion during resistance training.

Jevring, Markus (2008) Automatic management of bluetooth networks for indoor localization.

Jhanjhan, W.S.S. (2015) VICA: The Dutch Windmill - Towards a Contemporary Business Information Management Maturity Model.

Jia, Xin (2017) Understanding social signals from nonverbal behaviors in a mobile setting.

Jimenez Kwast, D. (2016) GPU-Based Photon Mapping for Approximate Real-Time Indirect Diffuse Illumination.

Jochems, Bart (2010) Detecting emotional intensity peaks in narrative conversational settings.

Jochemsen, M.C. (2014) An exploration of content-driven commerce.

Johannink, M.G. (2022) The impact of IT outsourcing on IT effectiveness.

Johanns, S.I. (2022) Performance comparison of FAME and MPB for simulating wave bands of photonic crystals.

Jong, Berend J.M. de (2014) A basis for the next VHDL revision.

Jong, Koen de (2019) Detecting the online romance scam: Recognising images used in fraudulent dating profiles.

Jong, Maurits D. de (2011) Network Management in a Distributed System.

Jong, R.F. de (2018) SimpleNLG-NL : Natural Language Generation for Dutch.

Jong, R.J. de (2019) Range characterization of backscatter Wireless Sensor Networks.

Jong, Sieta de (2021) A Study on the Use of Interactive Videos in Addiction Treatment for People with an Intellectual Disability.

Jong, T. de (2017) Using Requirement Templates to Automate Requirements Formalization.

Jonge, Marc de (2008) The SpinJ model checker : a fast, extensible, object-oriented model checker.

Jongeling, R. (2008) Signature modification for Compose?/.NET : implications of signature modification for generic compilers and behavioral signatures of types.

Jonker, J. (2008) Wizard of Oz for gesture prototyping.

Jonker, J.H.C. (2021) Weighted convolutional neural networks rare electrocardiogram detection for real-time heart monitoring.

Jonker, M. (2014) Flow-based SSH Dictionary Attack Detection: the Effects of Aggregation.

Jonkergouw, E. (2021) Haptic Wearables for Social Mediated Touch.

Jonkheim, M.H.T. (2018) Capaciteitsanalyse bij Twence: Een simulatieonderzoek naar capaciteit en doorlooptijd.

Jonkman, F. (2012) Nonverbal behaviour of an embodied storyteller.

Jonkman, Remi (2017) Implementation of a reliable 2D approximator using sonar.

Joore, E.R.M. (2021) Modelling the trade-off between service level and waste of perishable goods at food retailers.

Joosten, Wesley (2021) Learning to Learn : Generalization of Evolved Plasticity Rules in Recurrent Neural Networks.

Joustra, Yme (2014) Forecasting of wind power production in the Netherlands.

Jundt, O. (2017) Fashion product entity matching.

Jung, Annkatrin (2020) The Breathing Garment - Exploring Breathing-Based Interactions through Deep Touch Pressure.

Jurriëns, Stefan (2019) A Decision Support Tool for the Medium Voltage Networks Expansion Problem.

Jutte, Annemarie (2022) The smart annotation tool : optimizing semi-automated behavioural annotation using an AutoML framework supported by classification correctness prediction.

Jutte, Annemarie (2022) The smart annotation tool : optimizing semi-automated behavioural annotation using an AutoML framework supported by classification correctness prediction.

Jutten, M.G. (2015) The Fit between Business Processes and Process Mining related Activities: a Process Mining Success Model.

Juursema, J.A.J. (2018) Improving visual role mining using metadata.

KARAMPATZAKIS, E. (2015) Item availability restricted.

Kaag, K.W. (2019) Encouraging collaboration between primary school children through a learning robot.

Kahraman, G.M. (2020) Characterizing Sender Policy Framework configurations at scale.

Kaijen, J.A.H. (2008) Management of risk & information security data.

Kalbiyev, A. (2022) Affective dialogue generation for video games.

Kalcheva, D.K. (2015) Linked Data adoption and application within financial business processes.

Kalsbeek, Maarten van (2012) Interface and interaction design patterns for e-commerce checkouts.

Kalter, Stefan Reijmer (2007) Vertical collaboration in open source business.

Kamerman, Wim (2018) Classification of Event-Related Google Alerts Using Machine Learning.

Kamies, Bram (2020) Abeona: A generalized framework for state space exploration algorithm composition.

Kamminga, J.W. (2015) Cooperative Localisation on Android Devices by Utilising only Environmental Sound.

Kamp, T.R. van de (2014) Combining ABCs with ABE: Privacy-Friendly Key Generation for Smart Card Based Attribute-Based Encryption.

Kampen, C.M. van (2020) Formal Automated Verification of a Work-Stealing Deque.

Kampen, C.M. van (2022) Zero Downtime Schema Migrations in Highly Available Databases.

Kampen, Coen van (2019) Missing data imputation based on probabilistic data.

Kamphuis, Gertjan (2014) Adding Quality of Service to Disruption Tolerant Networking using the ORWAR routing protocol for use in military MANETs.

Kampman, T.E. (2018) Nabaztag lives: the rebirth of a bunny : an exploration of the Nabaztag as a social robot in a domestic environment.

Kandziora, Jorne (2014) Runtime assertion checking of multithreaded Java programs - An extension of the STROBE framework.

Kanis, Zwier (2011) Classification of Semantically Coherent Segments in Web Pages.

Kant, Gijs (2010) Distributed state space generation for graphs up to isomorphism.

Kant, M.W.E. (2020) Authorization, privacy and informed consent : who is allowed access to which medical information? : The development of an authorization model for the Datakluis application.

Kappert, K.D.R. (2016) VIRTUAL SURGERY: Development of a surgical simulation tool for the prediction of functional impairment after partial glossectomy.

Kara, M.N. (2021) Classification of drinking-related events at the sensory interactive table.

Karchev, F. (2019) IOT device profiling for Honeypot generation.

Karia, D. (2019) Combating money laundering on the blockchain.

Karimah, Fania Rahmanawati (2019) Redesign IT Organisational Structure: Case study of Centre for Data and Informatics Infrastructure (CDII), Ministry of Communication and Informatics Republic of Indonesia.

Kars, J. (2014) Improved performance by integrated corrugator and converter scheduling.

Karsten, Jarik (2020) Crunching Attack Trees : efficient algorithms for computation of metrics.

Karsten, Jarik (2022) Improving usability at BetterBe through API analysis.

Karuppannan, Sriganesh (2020) Analysis of various demand side management control mechanisms for a smart solar carpark.

Karuppiah Ramachandran, Vignesh Raja (2014) Characterization of Communication Mechanisms for Implantable Body Sensor Networks.

Kas, G.R. (2017) Rapportage about testing of the 3D motion correction.

Kasteel, M.B.M. (2022) Understanding textual interpretations with and without emoji.

Kattenbelt, M.A. (2006) Towards an explicit-state model checking framework.

Kazmi, Syeda Nazish (2019) Access Control Process for a SaaS Provider.

Keekstra, D.L. (2021) Tracking and segmentation, a tool for assessment of human engineered heart tissue.

Keeris, P.J.C. (2014) Improving the boarding process of external insiders in large organisations.

Kegel, R.H.P. (2014) Development and Validation of a Personal Information Security Assistant Architecture.

Keijer, BSc J.S. (2021) Unsupervised Anomaly-Based Network Intrusion Detection Using Auto Encoders for Practical Use.

Keijer, Julik S. (2019) Automated DDoS mitigation based on known attacks using a Web Application Firewall.

Keijl, Edwin (2013) Picalilly: sharing photos through locative social media.

Keijzer, N. (2020) The new generation of ransomware : an in depth study of Ransomware-as-a-Service.

Keijzer, P.B. (2018) AACE - Assessment of Asthma in Children using Electromyography.

Kelder, R. (2021) Active Vibration Isolation with an Active Stage.

Kellaway, M.C. (2022) Accelerating the SCION IP Gateway using programmable data planes.

Keller, Kristian M.Sc. (2016) A day ahead electricity storage flexibility prediction for peak shaving.

Kemna, Tim (2006) Bisimulation minimisation and probabilistic model checking.

Kemp, T. (2018) Translating LTL to the equational µ-calculus using Büchi automata optimisations.

Kemp, Tim (2020) An algorithmic approach to a conjecture of Chvátal on toughness and hamiltonicity of graphs.

Kempen, Lindsay (2022) ExpressTTS: Augmentation for Speech Recognition with Expressive Speech Synthesis.

Kenzhebay, Meruyert (2022) Planar roof structure extraction from Very High-Resolution aerial images and Digital Surface Models using deep learning.

Keppels, J.H. (2018) Qualitative Measurement of BI Maturity in a SME ICT Organisation.

Kerckhoffs, N.N.J.H. (2018) Is the “Netflix model” favorable for the audio streaming industry.

Kerimov, Emil (2020) FPGA-based AES variants against side-channel attacks.

Kerkers, M. (2017) Assessing the Security of IEC 60870-5-104 Implementations using Automata Learning.

Kerkhof, R.G. (2020) Natural Language Processing for scoring open-ended questions : a systematic review.

Kernkamp, Reinier (2007) Alignment of Requirements & Architectural Design In a Blended Delivery Model.

Kers, R.J. (2015) Head mounted control system for robotic assisted surgery.

Kers, Richard Jacob (2018) Low Energy Multi-Hop Mesh Network for Nomadic Localisation Sensors: On the Design, Development and Deployment.

Kers, T (2018) Household occupancy detection for burglary purposes : Risk assessment and effectivity analysis of an unobtrusive, easy-to-implement countermeasure against Wi-Fi tracking.

Kessel, L.J. van (2017) A desk light to improve working attitude.

Kessel, M. van (2021) Improving a data conversion process.

Kessel, Ruud van (2008) Querying Probabilistic XML.

Kessels, Casper (2018) Rethinking the interactions between people and cars.

Kesteloo, T.V. (2020) Autonomous navigation for the pipeline inspection robot "PIRATE".

Kester, J.J. (2018) CheckMerge: A System for Risk Assessment of Code Merges.

Kester, L. (2022) Providing tailored advice for preparing for the ethics assessment procedure.

Kesteren, L. van (2022) Differentiating between facial landmark shifts due to pose variation and morphing.

Ketelaar, J.G. (2012) Controller design for a bipedal robot with variable stiffness actuators.

Keuper, D. (2012) XNU: a security evaluation.

Keurhorst, Maaike (2019) Feedback On Gaze Behaviour In Virtual Reality Bicycle Training For Children with a Developmental Coordination Disorder.

Khadka, Ravi (2010) Model-driven development of service compositions : transformation from service choreography to service orchestrations.

Khan, Atif Mushtaq (2021) Proposing and Deployment of Attractive Azure AD Honeypot With Varying Security Measures To Evaluate Their Performance Against Real Attacks.

Khan, Etienne (2022) Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers.

Khan, Muhammad Daiman (2019) An investigation into trust between an SAV and its passengers.

Khanal, Binita (2022) Using Machine Learning to Predict the Risk of Human-Elephant Conflict in the Nepal-India Transboundary Region.

Khasuntsev, N.A. (2019) Accurate and Efficient Classification of Cyber Security Documents.

Khasuntsev, N.A. (2021) Automatic Detection of Misconfigurations of AWS Identity and Access Management Policies.

Khattab, A. A. M. (2018) Towards an interactive drone : a Bayesian optimization approach.

Khavrona, Oleh-Yevhen (2021) B-epsilon-tree and cache-oblivious lookahead array: a comparative study of two write-optimised data structures.

Khavrona, Roman (2022) Analysing Internet route changes related to the Russia-Ukraine war using BGP historical data.

Khotina, A. (2017) An innovative search interface for Gesture Dictionary.

Kichler, Neil (2021) Robustness of sparse MLPs for supervised feature selection.

Kim, Hyeon Kyeong (2022) Visual Programming Environment to Generate Arduino Code for Wearable Toolkit.

Kim, John (2019) Building a Platform to Improve Sedentary Behaviour by Centralising Joy in Physical Activity.

Kim, Woong (2022) Design and Control of Efficient and Powerful Robot Joints.

Kimirilova, Julia (2018) Meetbaarheid van ‘openheid voor verandering’ door middel van de geautomatiseerde methoden : een literatuurreview.

Kingma, J. (2009) Combined VCO/Mixer for satellite receiver in CMOS.

Kip, J.B.W. (2017) Developing a Data Visualization Tool for Minimal Cut Sets.

Kippers, Richard Gerrit (2021) Methodology for reconstruction of 3D Building Models using 3D-CityJSON and Floor Plans.

Kivits, M.P.W. (2018) Constructing a Convolutional Neural Network for Semantic Segmentation of Skin Lesions using a Small Dataset.

Kivits, Max P.W. (2021) Heterogeneous cooperative target tracking using Nonlinear Model Predictive Control.

Klaassen, R. (2009) COPD home interaction device.

Klaassen, W. (2019) Visualizing ocean carrier performance : a framework for evaluating logistic partners.

Klaij, Bastiaan (2005) Toegepast tokenizen voor natuurlijke taal verwerking : automatische analyse van platte en opgemaakte tekst.

Klanberg, Indrek (2019) Simulated Silicon Dopant networks : optimizing simulations, searching for boolean gates and visualization.

Klaver, Ruud (2007) Using NSIS (Next Steps in Signaling) for support of QoS aware multimedia services.

Kleef, N.T.M. van (2014) Making people matches using Supervised Machine Learning algorithms.

Klein, A.V.E. (2016) Nonverbal Communication of Anthropomorphism and its Effect on the Perception of Online Education Platforms.

Klein Brinke, J. (2018) Device-free sensing and deep learning : analyzing human behavior through CSI using neural networks.

Klein Essink, B. (2018) iFat: an Interface for Fault/Attack Trees.

Klein Nijenhuis, T.A.J. (2018) Discovery and Quantification of Open DNS Resolvers on IPv6.

Klein Wolterink, W. (2008) A content-based routing protocol for mobile ad-hoc networks using a distributed connected k-Hop dominating set as a backbone.

Kleine Deters, Jan (2018) Therapeutic exercise assessment automation, a hidden Markov model approach.

Kleverwal, J. (2015) Supervised text classification of medical triage reports.

Klifman, T.E. (2011) Propagation of Annotations in a Streaming Context.

Klink, K. van (2019) Detection and Identification of Roman Emperors Using Facial Recognition.

Klink, Karel van (2022) Quantum Key Distribution in a Pan-European Network of National Research and Education Networks, Qualitative and Quantitative Aspects of Implementing a Quantum Key Distribution Network.

Klooster, J-W. van 't (2008) Context, design and implementation of a control system for ring resonator-based optical beam forming networks.

Klooster, N.A. van der (2021) Designing a Job Interview Space in Mibo.

Kloppenburg, G.W. (2019) The adoption of intelligence amplification in the slotting process : a case study in the data validation automation of a Dutch Retailer.

Klotz, M.S. (2020) Extending the shunting plan generator of the Dutch railways with non-service train traffic.

Kluitenberg, H.F. (2018) Evaluating Quality of Open Source Components.

Klute, L. R. W. (2021) Space-time Trade-off in Clash: Improving Smart Machines.

Klute, L.R.W. (2017) Assisting breast biopsy by visualizing the inside structures of a patient on top of the patient in real time using the HoloLens.

Knippers, D. (2014) Querying Uncertain Data in XML.

Knoben, L. and Otten, M. and Fransen, R. (2013) De waterzuivering als Petrinet: het voorspellen van overstromingen.

Knoben, P.A.H. (2021) Software caching for tree-based algorithms on accelerator cards.

Knol, R. (2020) Emotional activity detection using behavioural sounds.

Knuppe, R. (2018) Drift correction using a multi-rate extended Kalman filter.

Kobes, W.J. (2019) Efficient and accurate classification of cyber security related documents.

Koc, M.A. (2022) Raising cybersecurity awareness of University of Twente students.

Kock, Arien S. (2007) Enhancing Synthetic Speech with Filled Pauses.

Kock, Joeri (2019) A signature-based Approach to DDoS Attack Mitigation using BGP Flowspec Rules.

Kock, Ties de (2019) Visualization recommendation in a natural setting.

Koegler, Philipp (2015) IT architectures in e-commerce: The effects of modularity, integration and type of components on e-service quality.

Koehorst, G.S. (2021) Visualizing feature importance dependencies in machine learning.

Koelemans, DRPM (2015) Item availability restricted.

Koelewijn, Dirk (2019) Fingerprint-Based Automated Rule Generation for DDoS Mitigation using the Berkeley Packet Filter.

Koelewijn, J.W. (2009) Resource operations model in a dynamic world.

Koenen, S.K. (2015) Assessing the level of security of an organization by analyzing the enterprise architecture : a methodology.

Kogelman, T.M.H. (2021) What ethical concepts are of key importance to analyze digital ethics awareness within SMEs?

Kok, Guido (2010) Cloud computing & confidentiality.

Kok, H.M. (2019) Improving the efficiency and quality of help seeking and help giving for programming tutorials.

Kok, H.M. (2019) Hoe kan een tel tool ingezet worden in informatica onderwijs om de leerresultaten van leerlingen te verbeteren?

Kok, I. de (2009) The influence of videoconferencing and an emotional feedback support system on polyadic negotiations.

Kok, J. (2007) The design of a Delta Impact analysis model for data warehouses.

Kok, K.J. (2016) TERRA support for architecture modeling.

Kok, M.R. (2020) Biologically Realistic Artificial Neural Networks.

Kokkelkoren, R. (2019) Catching Flux-networks in the open.

Kol, J.C.M. (2018) What is the effect of dominance on the human smiling behaviour in a human-agent dyad?

Koldenhof, Dylan (2021) Word Embeddings to Classify Types of Diachronic Semantic Shift.

Kolev, Stiliyan (2019) Automation of software vulnerability monitoring for third party products in large IT companies.

Kolkman, M.C. (2015) Cross-domain textual geocoding: the influence of domain-specific training data.

Kolkmeier, Jan (2015) Intimacy is Induced and Regulated Through Proxemic & Gaze Behaviour - A Study in Immersive Virtual Reality.

Kolner, Thomas (2019) Applying machine learning on the data of a controltower in a retail distribution landscape.

Kolthof, Peter (2013) Vaardigheden van middelbare scholieren voor het selecteren van informatie op het internet.

Koning, B. de (2022) Extracting Sections From PDF-Formatted CTI Reports.

Koning, S. (2020) Modelling and visualizing emergency egress.

Koning, W. (2021) The Design of a Machine Status Management Tool.

Konings, S. (2020) Source code metrics for combined functional and Object-Oriented Programming in Scala.

Konings, S.L. (2021) Lessenserie voor Medium Access Control protocollen.

Kooij, D. (2019) Groovy Parity Games.

Kooij, D. (2022) A Study on the Evolution of the Dutch Web.

Kooij, W.J. (2014) Playout delay of TV broadcasting.

Kooijman, M. (2009) Haskell as a higher order structural hardware description language.

Kooijman, Ruben (2007) See, hear, listen : head movements and the sensitive artificial listener.

Kooistra, Cornelis (2007) Design and testing of embedded control software for the ViewCorrect Plotter.

Kool, B.B. (2022) Application of a neural network to the shift scheduling problem in supermarkets.

Koop, O.R. (2006) Continuous and discontinuous Galerkin finite element methods of variational Boussinesq water-wave models.

Koopman, M.P. (2017) Improved customer relationship using self-service.

Koopman, Michael (2019) A framework for detecting and preventing security vulnerabilities in continuous integration/continuous delivery pipelines.

Koot, Martijn (2016) Overzichtelijke IT Incidenten: Optimalisatie van het IT Incident Management binnen URENCO Nederland B.V. met behulp van Enterprise Architecturen.

Korać, Kristijan (2016) Impact of Data Visualisation on Users in CRM Systems.

Korevaar, Cornelis Willem (2010) A time-frequency localized signal basis for multi-carrier communication.

Koridon, M.S. (2019) Security by decision-making : a decision-making capability model for security countermeasures.

Korpershoek, J.J. (2020) Profiling encryption algorithms using ARM-based cache eviction attacks.

Kortekaas, Y.A.M. (2020) Access Pattern Hiding Aggregation over Encrypted Databases.

Korthout, N. (2017) Towards an architecture design for a future societal energy supply system.

Kortstra, Wybren (2020) Automatic Registration of Clinical Auditsfor Head and Neck Oncology at MST.

Kortüm, Michael (2011) Non-invasive imaging with UWB.

Koster, B. (2020) Passive Mass Reduction in Admittance Control.

Koster, J. (2007) Influencing tabletop interaction speed: directness and device.

Kosters, Dennis (2007) Invloed van slimme meters op de energiebalans: Een analyse van de invloed van het slimme meter systeem op een netbeheerder en zijn ondersteunende IT, binnen het kader van de energiebalans.

Kosters, T. (2007) Van gasbel naar gasstel : een onderzoek naar de inrichting van de shipper op de gasmarkt.

Koukoulis, Yannis (2016) Dual laser fault injection.

Koval, M. (2022) Blockchain in dairy supply chains : a literature review.

Kraai, T. (2021) Incident End Time Prediction During the Incident Recovery Process.

Krak, R. (2017) Cycle-Accurate Timing Channel Analysis of Binary Code.

Krapukhin, Alexander (2019) Approximate Least Squares Accelerator.

Krediet, A.C. (2016) Developing and testing an APP model for Air Spiralo.

Kreiser, Simon (2016) Marrying GUI and Git : how authoring tools for E-Learning can benefit from version control.

Kreuk, N.A.W. (2006) The Turkish option market.

Kriele, M.A. (2018) Noise-based Frequency Offset Modulation Simulation Model Design : For the analysis of Transmit-Reference Medium Access Control in Multiple Access Ad-hoc Wireless Sensor Networks.

Krijnen, Bram (2007) Heat flow modeling in copiers.

Krijnen, T.A. (2021) Automatic generation of Formula 1 feports.

Krishnamurthy, Ramesh (2021) ADA Software Model Checking.

Krisnawati, Anastasia Maria (2015) Project portfolio valuation with Enterprise Architecture.

Krist, J.O. (2014) The effect of residential storage and conrrol on the distribution net compared to central storage and control.

Kroes, S. (2010) Domain specific embedded languages and model driven engineering.

Krol, Zanur (2021) A new approach to visualizing FMEA data.

Kroon, E. (2009) Layered configuration management for software product lines.

Krooneman, J.M. (2018) Designing a fall detection system for elderly.

Kruif, Cato de (2022) Using d-NFGs to identify and eliminate dead code in C# programs.

Kruiper, T.R. (2019) Optimizing FPGA Designs for Maximum Throughput using RapidWright.

Kruiskamp, Michel (2008) FastSOA : achieving high-performance service oriented architectures.

Kruistum, G.M. van (2020) Determining the projected frontal area of cyclists using motion capturing data.

Kruk, D.A. van der (2015) A domain-specific language for specifying distributed real-time software system configurations.

Kräwinkel, R.W. (2020) The effect of writing and transmitting SD card data on the consistency of SD card write performance.

Kuiken, J.A. (Jaro) (2020) Modeling associative memory in robots for promoting social behavior.

Kuil, E.D. van der (2017) Validated requirements for a smart logistics application.

Kuil, E.D. van der (2020) A Data Integration Design Approach for the Planning Process of a Public Transport Operator.

Kuiper, D. J. (2019) Fleet Composition in Operational Time Slot Management.

Kuiper, F.J. (2018) Behavioural profiles of potential students as basis for more effective university recruiting.

Kuiper, Guus (2013) Guaranteed-throughput improvement techniques for connectionless ring networks.

Kuipers, Elles (2013) Passend onderwijs via de elektronische leeromgeving promotie digitaal.

Kuipers, Floor (2019) Feed the movement - a food waste reduction app.

Kuipers, J.H. (2017) Anycast for DDoS.

Kukuk, L. (2020) Analyzing adoption of contact tracing apps using UTAUT.

Kulatska, I. (2019) ArgueBot: Enabling debates through a hybrid retrieval-generation-based chatbot.

Kulkarni, Vishwajit Vijay (2019) Embedded wearable device for monitoring diabetic foot ulcer parameters.

Kumar, Atul (2015) Security Analysis of Mobile Payment Systems.

Kumar, Shrijan (2019) Development of SLAM algorithm for a Pipe Inspection Serpentine Robot.

Kumashev, Yernar (2020) GPGPU Verification: Correctness of Odd-Even Transposition Sort Algorithm.

Kunneman, Y.J. (2019) Data science for service design : an exploration of the opportunities, challenges and methods for data mining to support the service design process.

Kuperus, J.H. (2007) Nested quantification in graph transformation rules.

Kuperus, Jasper (2012) Catching criminals by chance: a probabilistic approach to named entity recognition using targeted feedback.

Kuperus, Johan (2009) Wave monitoring using wireless sensor nodes.

Kuppens, D. (2018) Machine Learning for CT-based clinical triage in hemorrhagic and ischemic stroke.

Kuppeveld, Teun van (2007) Model-based redesign of a self-balancing scooter.

Kurzhals, H.D. (2022) Challenges and approaches related to AI-driven grading of open exam questions in higher education : human in the loop.

Kwakkel, D.J. (2022) Measuring well-being with a conversational agent.

Kyriazi or Qirjazi, S. (2018) Machine learning approach to model internal displacement in Somalia.

Kyrloglou, Alexandros (2018) Fixed layer Convolutional Neural Network.

LU, Yuan (2014) Essay #64997

Laan, J.H. van der (2021) Incremental verification of physical access control systems.

Laar, B. v.d. (2009) Actual and imagined movement in BCI gaming.

Laarakkers, Mark (2013) Generating continuation passing style code for the co-op language.

Laarhuis, N.M. (2016) Making rational decisions about IT projects using Enterprise Architecture : a case study conducted at ASML Netherlands N.V.

Laarman, A. (2009) An Ontology-Based Metalanguage with Explicit Instantiation.

Laat, Martin de (2019) Design and validation of Software Requirements Specification evaluation checklist.

Lamers, David (2018) Possibilities for blockchain in the energy transition.

Lammers, F.G. (2017) ChildFinder : Finding the Child that walked away playing.

Lammers, F.G. (2021) Flow in the workspace.

Lammers, Mick (2019) A QA-pair generation system for the incident tickets of a public ICT Shared Service Center.

Lang, Shanna de (2016) Mobile pain screening with FollowUp : an app to support anaesthesiologist in the pain screening at outpatient clinics.

Lange, Arthur de (2021) Exploring and enhancing the possibilities and performance of a low-field tabletop MRI scanner.

Lange, R-J. de (2010) Provenance aware sensor networks for real-time data analysis.

Lange, T.C.B de (2015) IS/IT integration in mergers & acquisitions: a framework for a systematic approach.

Lange, Valerian (2022) MapColPal - a color palette generation and testing tool for thematic maps.

Langen, S.F. van (2016) An architectural design for LAN-based web applications in a military mission- and safety-critical context.

Langerak, Thomas (2018) Model predictive contour control for electromagnetic induced haptic feedback.

Langkamp, L.U. (2016) Het Effect van Self- Explanation Questions in een Educatieve Game op de Game en Leerprestatie.

Lankhorst, T.J.W. (2018) An architectural approach to cyber-physical system design.

Lansink, M. (2010) Hair simulation and rendering.

Lanting, Peter (2015) Multi-level views in a SUM-based environment.

Lapshyna, V. (2020) Sparse artificial neural networks : Adaptive performance-based connectivity inspired by human-brain processes.

Larizgoitia Burgaña, Jon (2017) Design and evaluation of a link-state routing protocol for Internet-Wide Geocasting.

Lastdrager, Elmer (2011) Securing Patient Information in Medical Databases.

Lathouwers, S.A.M. (2018) Reasoning About the Correctness of Sanitizers.

Latzer, Y.M.E. (2018) Air temperature visualization of public spaces in Enschede.

Laverman, G.J. (2016) Java Code Virtualization of Industrial-strength Java Code.

Lavooij, K. (2010) Near-real time statistics gathered from a continuous and voluminous data mutation stream.

Le, T.A.D (2022) Enhancing IMU-based smartphone context detection using Transformer.

Le, T.N.H. (2022) Aggregation in probabilistic databases : implemented for DuBio.

Le, Van Huynh (2016) Analyzing white-box designs for differential computation analysis resistance.

Lebbing, Peter (2019) Modelling and Realizing the Tunnelling Ball Device in UniTi and CλaSH.

Lechner, Zoe Carlotta (2017) Facing 21st century challenges : an assessment of the EU’s security provisions in the light of increasing cybercrime.

Ledelay, Joël (2021) Retrofitting Memoization : an exploratory study.

Leemans, T.T.J. (2020) An Anomaly Forecasting Method for Support Processes.

Leemans, T.T.J. (2022) Towards Serverless Enterprises: Developing the Enterprise Serverless Assessment (ESA) to assess and improve an organization’s fit and readiness for Serverless technology.

Leemreize, T. (2021) Analyzing fileless malware for the .NET Framework through CLR profiling.

Leendertz, R.R. (2020) Validating the Maneuver Coordination Protocol with UPPAAL.

Leenheer, Bart (2021) Smart User Control in Wi-Fi Access Points.

Leenslag, Wilco (2006) Werkwijze ter beoordeling van IT governance op basis van geaccepteerde methodes op het terrein van IT governance.

Leeuwen, K.G. van (2019) From scan to speech : articulation analysis from real-time vocal tract MRI.

Leeuwen, M.M. van (2015) Agile Scaling @ Topicus : s caling scrum with help of Agile Scaling frameworks at Topicus Finance.

Leeuwen, P. van (2020) FPGA-on-FPGA emulation using subgraph homeomorphism.

Leeuwen, Tessa van (2022) Project Management Methodology for Robotic Process Automation Implementation.

Legoy, V.S.M. (2019) Retrieving ATT&CK tactics and techniques in cyber threat reports.

Leinweber, Stephan (2021) Accessible Online Addiction Treatment for Patients with Mild or Borderline Intellectual Disability.

Lenderink, R.J. (2019) Unsupervised Outlier Detection in Financial Statement Audits.

Lenders, L.B.L. (2022) Physical Perception of a VR Handshake.

Lenthe, J.M. van (2014) Combining Multiple Malware Detection Approaches for Achieving Higher Accuracy.

Lenz, Dominik (2017) Finding neural correlates for social relationships using EEG hyperscanning.

Leong, Frank (2007) Design of an oscillator for satellite reception.

Leur, C. de (2015) Permission-based separation logic for Scala.

Li, Canxuan (2018) Design framework for integrating Internet of Things and Wearable Augmented Reality.

Li, Litian (2021) Simulating Federated Learning for Smartphone based Indoor Localisation.

Li, Q. (2022) Co-attention-based pairwise learning for author name disambiguation.

Li, Qin (2015) Examining the accuracy of sentiment analysis by brand monitoring companies.

Li, Rui (2018) Comparing human-robot proxemics between virtual reality and the real world.

Li, Ruiyuan (2021) Generative Probabilistic Programming in Games: Creating Character Backgrounds Using a Bayesian Network.

Li, S. (2022) MBench : a benchmark suite designed for database schema migration.

Li, Shikuan (2021) The effect of using virtual reality equipment on people's motivation to exercise.

Li, Y. (2020) Interactive visualization of book publication history.

Liang, Y. (2022) Pose estimation with deep neural network trained on tiny datasets.

Libbi, C.A. (2021) When life gives you lemons : designing a game with and for autistic girls.

Licu, D.V. (2020) Automatic container code identification using Machine Learning.

Lievense, M.M. (2021) Detecting, tracking, and identifying horses across heterogeneous videos.

Ligtenberg, L.E.J. van (2019) Emotion dashboard for teachers in special needs education.

Lijbers, J.M. (2016) Predicting parking lot occupancy using Prediction Instrument Development for Complex Domains.

Lijcklama à Nijeholt, D.J. (2020) Control for Cooperative Autonomous Driving Inspired by Bird Flocking Behavior.

Lijzenga, O. (2020) Symbolic parity games : Two novel fixpoint iteration algorithms with strategy derivation.

Lin, Shing Long (2018) Optimization for approximate softcore unsigned multipliers on ALtera FPGA's.

Lin, T.Z. (2022) Past, present, and future of cybersecurity for ICT-professionals.

Lin, Y. (2010) Architecture for IP based interconnection of heterogeneous wireless communication systems for mission-critical group oriented communications.

Linardos, Ioannis (2019) Multiscale Convolutions for an Artificial Neural Network.

Linden, J.J. van der (2017) The relation between online entrepreneurship and offline and Web 2.0 learning technologies.

Linders, Stefan (2008) Opportunities and limitations of using SOA concepts and technologies for building BI applications : a Delphi study.

Ling, Chen (2015) Design and implementation of a control structure for a quadrupe robot.

Linnenbank, Tristan (2006) Architectural Principles for Large Scale Web sites: a Case Study.

Linthorst, Henk-Jan (2006) De mogelijkheden van ICT in het effectiever en efficiënter functioneren van de diabetesketen.

Lippok, B.M. (2015) Ontwikkeling van een App store voor een iPaaS.

Lippur, Kristo (2022) Effects of edge computing growth on demand of data centre services.

Liu, Dou (2021) Knowledge Graph Driven Conversational Virtual Museum Guide.

Liu, Luyao (2016) Applying intelligence amplification in decision making.

Liu, Peng (2012) Test bed and sensor platform for building usage profiling.

Liu, Yujie (2022) Help Rich Info Get Richer: Enriching a semi-structured dataset using a Semantic Web approach.

Lobeek, Jaap (2022) A 3D deep learning method for the prediction of breast tumor response to neoadjuvant chemotherapy using MR images without the need for a tumor segmentation.

Loch, Frieder (2012) Hierarchical gestures: ggestural shortcuts for touchscreen devices.

Logendran, T. (2022) Automatic Lung Aeration Assessment for Pediatric Lung Ultrasound Imaging.

Logtenberg, Jeroen (2009) Multi-user interaction with molecular visualizations on a multi-touch table.

Lohman, Jesse (2021) Reducing Cybersickness in VR on an Omnidirectional Treadmill.

Loker, Andre (2014) Evaluating data structures for runtime storage of aspect instances.

Lonnee, J. (2008) A scalable repository based on a meta-modelling architecture.

Loo, Rick van (2018) Increasing Throughput of FPGA-based Streaming Applications : by using Pipelining.

Loof, R. (2021) Improving Vehicle Detection Methods for Magnetometers using Machine Learning.

Loohuis, Ingmar (2022) Exploring the Prognostic Value of Deep Learning Image-to-Image Registration for Immunotherapy Patient Monitoring.

Loohuis, J.E. (2021) Synthesising Security Camera Images for Face Recognition.

Looijenga, M.S. (2018) The Detection of Fake Messages using Machine Learning.

Looijenga, Wouter (2021) Bicycle Accident Prevention using Sensors and Automotive Systems.

Looise, M.J. (2008) Inter-level consistency checking between requirements and design artefacts.

Looman, J.H.A. (2017) Mobile applications on the work floor : The use of mobile applications in fast moving consumer goods warehouses.

Looman, S.A.M. (2009) Impact Analysis of Changes in Functional Requirements in the Behavioral View of Software Architectures.

Loos, B. (2020) Designing a smartphone application for supporting the COMET-program in mental health care.

Lootsma, Marten (2008) Design of the global software structure and controller framework for the 3TU soccer robot.

Lopez, J.M. (2008) Dynamic service composition in an innovative communication environment.

Lorini, Giulia (2022) Addressing the Ransomware threat: TTP-based defensive recommendations and a strategy for achieving resilience.

Lu, C. (2020) Deep sleep stage detection.

Lubberdink, W.H.H. (2016) Op weg naar een praktische en eenduidige standaardisatie van producteenheden.

Lucas, R.H. (2020) Workflow improvement by artifact development.

Lucas, R.H. (2022) Supervised contrastive learning to overcome inconsistencies in exhaled breath data.

Lucassen, T. (2009) Adaptive support of human attention allocation using cognitive models.

Luchtmeijer, D. L. (2022) Improving solutions of Service Engineer Planning using Mixed Integer Programming and Slack Induction by String Removal.

Luchtmeijer, Dorian L. (2022) Improving solutions of Service Engineer Planning using Mixed Integer Programming and Slack Induction by String Removal.

Ludjen, A.C.P.P. (2021) Generative replay in deep reinforcement learning.

Lukman, Ivan (2019) Complete Characterization of Publicly Available Domain Blacklists.

Lummen, D.L.M. (2020) An analysis of Link and Node Level Resilience on Network Resilience.

Luo, Zhipeng (2018) Network research : exploration of centrality measures and network flows using simulation studies.

Löwik, R.C.P. (2018) Tracking of wireless devices: is it possible and solvable?

Lübbermann, Thijs (2021) Design and control of a magnet placement tool.

Lüpkes, Niklas (2020) Using static weight estimation of general trees to efficiently parallelize the execution of DEMKit Simulation Models.

Ma, R. (2020) Anomaly detection for Linux system log.

Maan, G.C. (2021) Analysing Cooperative Awareness Message generation around intersections based on macroscopic traffic parameters.

Maan, H.C. (2016) Item availability restricted.

Maas, Jelle (2020) Cyber attack detection in smart grids.

Maat, GJ ter (2016) Towards a scalable environment for traffic information services.

Maat, Roel ter (2014) A Framework for Modular Implementation of Domain-Specific Event-Based Applications.

Maatjes, N.C. (2007) Automated transformations from ECA rules to Jess.

Macarie, M. (2020) DNS bitsquatting in the wild.

Mahrof, Dlovan Hoshiar (2008) Design of a fully integrated RF transceiver using noise modulation.

Malek, Michael (2022) Textual Clustering for Telecommunication Accident Recommendations.

Man, R.J.P. de (2019) A formalisation of EMF by expressing Ecore as GROOVE graphs.

Man, Shen Yi (2016) Data driven banking : applying Big Data to accurately determine consumer creditworthiness.

Man, T. (2019) Measuring and Analysing Resilience of Enterprise Architectures.

Man, T. (2022) Modelling Security Architectures of Collaborative Networks.

Mandasari, Yani (2019) Follow-up Question Generation.

Manen, B.R. van (2021) Thermal-Inertial Localization and 3D-Mapping to Increase Situational Awareness In Smoke-Filled Environments.

Maneschijn, D.G.J.C. (2021) Finding the Appropriate Level of Abstraction for Process Mining in Logistics.

Manjesh, M. (2020) Deterministic modelling and parameterization of height-dependent interaction between radio waves and human body.

Mansour, Noor (2021) Developing a Digital Serious Game for Healthcare Logistics: Appointment Scheduling of Elective Surgical Patients in the Operating Room.

Mansvelder, F.M. (2022) Dutch language specific KPI exploration and recommendation for maintenance scheduling.

Manterola, Nahuel (2017) Creating 3D images for facial recognition using the RealSense SR300.

Manzano Ibarra, Amaya (2018) Evaluating Usability of Communics Authoring Tool: Comparing Synchronous with Asynchronous Remote Evaluation when using Cognitive Walkthrough.

Marcon, Nicola (2018) Designing a sonic interactive open-ended playground installation.

Marenco Zúñiga, Andrés (2014) Federated Aggregated Search.

Marin, Mihai David (2019) Effectiveness of neural language models for word prediction of textual mammography reports.

Markova, Betina (2018) Re-play : Interactive Playground Games To Motivate Playing.

Markova, Betina S. (2021) Predicting readmission of neonates to an ICU using data mining.

Martakis, A. (2015) Framework for Enterprise Uncertainty-Driven Decision-Making : FEUD.

Martikainen, Katariina (2020) Audio-based stylistic characteristics of Podcasts for search and recommendation : a user and computational analysis.

Martinos, Nikolas (2021) Functional and Non-Functional Requirements for a Performance Dashboard in CS:GO.

Marčetić, N. (2022) Community-based design to help older adults to increase their physical activity.

Massa, M. (2021) Detection of dysfunctional breathing and uncontrolled asthma in children using respiratory sound recordings.

Masud, Muhammad Ahmed (2019) An Open Source Intelligence (OSINT) framework for online investigations.

Materne, L.J. (2021) Is electric vehicle drivers’ cognitive workload increased by eco-driving feedback in the face of range anxiety?

Mathivanan, Rajavarman (2020) Texture Based Autonomous Reconstruction of 3D Point Cloud Models using Fully Actuated UAVs.

Mathur, Nehal (2020) Novel design of MR-compatible pneumatic soft-surgical endoscope with variable stiffness.

Mauritz, R.R. (2020) Improving data quality in a probabilistic database by means of an autoencoder.

Mauritz, R.R. (2022) Planning in supply networks using aggregated resource feasibility.

Mazilu, I. (2022) Defocus blur synthesis and deblurring through interpolation in the latent space.

Maškanceva, Laura (2020) Developing understandable and actionable sleep data visualizations.

Meciani, Giovanni (2018) Implementation of a power-efficient DFT based demodulator for BFSK.

Meekes, M L (2017) Serious Game for Stroke Rehabilitation on the HTC Vive.

Meent, Tijmen van de (2022) A comparative study on lightweight authentication protocols in IoT.

Meer, A.J.M. van der (2016) Mapping the underworld.

Meer, J. van der (2021) Designing an interactive travel check to increase sustainable travel.

Meerhof, J.J. (2021) Loop-breaking Approaches for Vehicle Route Planningwith Multi-agent Q-routing.

Meertens, Lucas O. (2009) EPC to BPEL transformations.

Mehra, A. (2020) Deepfake detection using capsule networks with long short-term memory networks.

Meij, D.P.L. van der (2009) A metamodeling approach to incremental model changes.

Meij, D.R. de (2018) Predicting blood glucose for type 2 diabetes patients.

Meijer, A. (2021) Real-time robot software framework on Raspberry PI using Xenomai and ROS2.

Meijer, Gerben (2020) Producing high quality face morphs using GANs.

Meijer, Gijs (2006) Performance measurement of IT investments.

Meijer, J.J.G. (2014) Improving Reachability Analysis in Ltsmin - Guards, Read, Write and Copy Dependencies for mcrl2, Promela and Dve.

Meijer, J.J.W. (2020) Morphing detection based on regional analysis of local frequency content.

Meijer, L. (2021) Test case shrinking for Model Based Testing on Symbolic Transition Systems.

Meijer, M.P. (2022) An Approach at Social Relation Recognition in Egocentric Videos using Pose Estimation.

Meijer, Max Jan (2020) Exploring augmented reality for enhancing ADAS and remote driving through 5G study of applying augmented reality to improve safety in ADAS and remote driving use cases.

Meijer, Michael (2011) On a Design Space for Aggregating over Sliding Windows on a Stream.

Meijer, S.D. (2018) The implementation of collision avoiding haptic feedback in the pedal-based control of a robotic platform.

Meijer, S.D. (2021) The implementation of LiDAR-based traffic detection and tracking.

Meijer, Z. (2016) Definition, ideation and validation of the 'Bucketlist'.

Meijerink, B.J. (2015) Lossless Multicast Handovers in Proxy Fast Mobile IPv6 Networks.

Meijerink, Carlijn (2021) Facial landmark detection under challenging conditions.

Meijerink, M.J. (2018) A visual DSL for automating business processes.

Meijerink, M.M.J. (2019) Anomaly-based detection of lateral movement in a Microsoft Windows environment.

Meijerink, Roland (2009) Begrip in kaart: Hoe kan het gebruik van begrippenkaarten het begrip van leerlingen in 3VWO op het gebied van optica verbeteren?

Meijerman, T.R.I. (2019) Manipulating a dissociative bond with out-of-body experience avatar in virtual reality.

Meinderts, S. (2021) Exploring the applicability of a data-driven approach on recommending in-store replenishments for fashion retailers.

Meinsma, D. (2018) Digging up Malware.

Melissen, Arthur (2008) Exploring neglected avenues in the modelling of attribution theory.

Melotti, D. (2021) Reversing and Fuzzing the Google Titan M Chip.

Mendler, G.T. (2019) Designing a meta report for hotel customer reviews.

Menifer, Savio (2022) Firefly Island: Exploring intimacy in social VR.

Menne, Alexander (2018) Blockchain in the Sharing Economy : Will Blockchain Disrupt Today’s Winning Business Models?

Mensing, Max (2017) Item availability restricted.

Mentink, Fons (2016) Machine driven predictions of the socio-economic status of Twitter users.

Mentink, T.J. (2019) Redesigning after-sales services supply chain.

Meppelink, Lianne (2008) Towards interoperability between existing VoIP systems.

Merchan, M. (2022) Anomaly detection in IoT : federated learning approach on the IoT-23 Dataset.

Merdi, Agathi (2019) ICT Use by Refugees : The Role of Technology in Refugee Mobility.

Merdis, Vasileios (2019) Wireless communication protocols for home automation exploring the security and privacy aspects of smart home IoT devices communicating over the Z-Wave protocol.

Mesie, P. (2022) The Effect Of Context Removal In Sentiment Analysis On News Articles.

Meteer, O. (2017) Real-Time rasterization on the Starburst MPSoC.

Metz, T. (2021) An exploratory diary study on modelling morning routines.

Meulenkamp, T. (2022) Parser Benchmarking for Legacy Languages.

Meyers, B.J. (2022) Analysing the resilience of 5G networks in the Netherlands.

Michorius, J.A.R. (2018) Fair Machine Learning.

Middag, Jacob (2012) Convergence of an implicit runge-kutta discontinuous Galerkin method using smooth limiters.

Middelesch, E.W. (2015) Anonymous and hidden communication channels : a perspective on future developments.

Middelkoop, D.E.V. (2020) Sensitivity analysis of predicting wireless c hannels within an indoor factory floor.

Middelraad, F. (2022) This laptop has great coffee : training a Dutch ABSA model from customer reviews.

Midden, J.H. van (2021) Using process mining and event log analysis for better business strategy decision-making.

Miedema, Lukas (2020) QuickInterp - Improving interpreter performance with superinstructions.

Minnema, Jeroen (2020) Towards component-based, sensor-independent and back-end independent SLAM.

Minnen, Matthijs van (2022) CNN Accelerator Throughput Improvement using High-Level Synthesis for FPGA.

Mirchev, Hristofor (2014) Creating a Modular AspectJ Foundation for Simple and Rapid Extension Implementation.

Misra, Gaurav (2013) Permeance of ICT in crime in India.

Mitev, Zarimir (2019) Estimating User Interaction Complexity.

Mitov, Alexander (2021) Ethical use of artificial intelligence through the Utilitarianism perspective.

Miu, Ioana (2020) Fundamental characteristics and concept of material passports.

Miu, Ioana (2022) A Reference Model for Decarbonising the Passenger Aviation Ecosystem.

Moel, E.L. de (2010) Expanding the usability of recorded lectures : a new age in teaching and classroom instruction.

Moghaddar, A.A. (2022) Enhancement of Formula One Driver Performance by Group Driven Process Learning.

Mokhtar, A.B.A. (2022) Object Detection For Top View Images In Dairy Farming.

Mol, S. (2020) Movement localization in indoor environments by means of light and air pressure sensors.

Molder, Jantine te (2014) The redesign of a cashier trainer.

Molder, S. te (2022) Improving the order picking performance at Scania Production Zwolle.

Molderink, Albert (2007) Feasibility Analysis of MPEG decoding on reconfigurable hardware.

Molen, N.J van der (2014) Item availability restricted.

Molenaar, K. (2022) Real-world performance analysis of signcryption and sign-then-encrypt schemes for resource-constrained IoT devices.

Molenaar, R.S.J. (2021) Using curriculum learning to improve the performance of deep learning models used for classification purposes.

Moll, René (2013) A DFT based synchronization scheme for chirped communication.

Mollah, H. (2022) User stories applied for end-to-end web testing.

Mols, Emiel (2012) Sharding Spotify search.

Mondol, Manaswi (2021) Analysis and Prediction of Earthquakes using different Machine Learning techniques.

Monshouwer, R. (2020) Detection of subclinical ketosis in dairy cows using behaviour sensor data.

Monteban, J. (2018) Measuring Architectural Complexity : Quantifying the objective and subjective complexity in enterprise architecture.

Monteiro, S.C. (2021) An internet-wide analysis of TLS configurations of public LDAP servers.

Moraru, Alexandru (2020) Iterative computed tomography reconstruction using deep learning.

Morgese, Luca (2021) Stepping out of the MUD : contextual network threat information for IoT devices with manufacturer-provided behavioural profiles.

Morsinkhof, P.K. (2018) Assessing E-Procurement maturity as designed in an E-Procurement Maturity Model and Quadrant Model.

Mortazawy, Ali (2018) Can Smart Homes contribute to the New Product Development (NPD) process?

Moscoviter, D. (2016) Improving spatial indexing and searching for location-based DNS queries.

Motamedi Nia, Sandra (2021) The Capability of Machine Learning for Predicting Disability Probabilities based on Long-term Absenteeism.

Mourik, F.G. van (2021) Finding Personally Identifiable Information Leaked via Publicly Accessible CT Logs.

Muinck Keizer, D.M. (2017) Photoacoustic Tomography for Finger Joint Imaging: Tackling Artefacts.

Muis, Allard (2009) Patterns in data conversion.

Mulder, Henk (2019) Performance of program verification with VerCors.

Mulder, Michael (2021) Creating a Compiler for the Semi-Structured Language of Blazons.

Mulder, P.W. (2022) A comparative analysis of the computation cost and energy consumption of relevant curves of ECC presented in literature.

Mulder, R. (2021) Designing a game to gather data on the self-reliance of civilians.

Muller, A. (2017) Socially shared regulation in Scrum teams : A multiple case study into the regulation processes in Scrum team meetings and variations both within and across teams.

Muller, D.W. (2018) Predicting the performance of business partners, using issue data of the iSense system : mapping a perception to data using machine learning.

Muller, I.J.T. (2018) Improving the service control tower with proactive decision making : a two-staged alert and intervention generating model for proactive lateral transshipments in an after-sales supply chain.

Muller, M. (2019) Creating building energy prediction models with convolutional recurrent neural networks.

Mundkur, Arnav (2018) Classification of Respiratory Data: Classifying and analyzing respiratory data to present as feedback towards cultivating habitual diaphragmatic breathing.

Mundkur, Arnav (2021) Have you tried this? : Designing a smartphone application to support sustainable food purchasing.

Munsterman, Thijs Pieter (2008) Exploring software scalability : and a method for evaluating and improving software scalability.

Mustafa, Khaled Alaaeldin Abdelfattah (2019) Towards Continuous Control for Mobile Robot Navigation: A Reinforcement Learning and SLAM Based Approach.

Mutter, T. (2009) Partition-based network load balanced routing in large scale multi-sink wireless Sensor Networks.

Myśliwiec, J. (2020) Generating short RPG side-quest stories with transformers.

Möllering, Helen (2019) Thwarting Semantic Backdoor Attacks in Privacy Preserving Federated Learning.

Müller, M. C. (2015) SIDekICk - Detecting Malicious Domain Names in the .nl Zone.

Münch, D. (2016) Translating clinicians’ needs into requirements for a future Computerised Decision Support System in antibiotic therapy : a user-centred design and requirements engineering approach in a German geriatric hospital setting.

Naarding, K.B. (2021) A Sustainability Assessment for Transport Routes in Container Transport.

Nab, F. (2017) Analyse en optimalisatie van het maaltijdserviceproces.

Nae, Teodora (2022) Predicting COVID severity using machine learning methods : -Comparison between real life and mimic dataset-.

Naguine, P.V. (2022) Subpopulation Process Comparison and Bottleneck Analysis: A Case Study of Frozen Shoulder.

Naik, Pratik (2021) Generating Sythetic Training Images for Instance Segmentation using Salient Object Detection and Image Compositions.

Nair, M.G.N (2022) Item availability restricted.

Narain, S. (2021) A security risk assessment approach using enterprise architecture models to support decision-making at security operation centres.

Nass, M. (2018) Finding intelligence in disordered boron dopant atoms.

Nass, Mathieu (2020) Wi-Fi based range-only constraint integration in RTAB-Map.

Nassi, Thijs-Enagnon (2021) Algorithms for Automated Scoring of Respiratory Events in Sleep.

Nastase, Tudor (2022) Improving safety of e-bikes with automated systems: using an ad-hoc sensor network to prevent car to e-bike accidents.

Natarajan, Sriram (2020) Learned clustering for 3D object segmentation.

Nauta, M. (2018) Temporal causal discovery and structure learning with attention-based convolutional neural networks.

Navarro Di Pasquale, J. (2022) Robust training using a push-pull inhibition layer for adversarial robustness in convolutional neural networks.

Nayanar, G.D. (2021) Autonomy, AI Perception and Safety : a Safety Evaluation Framework for AI Perception Models Used In Agricultural Autonomous Vehicles.

Nazarian, A.A. (2015) Voorraadbeheeroptimalisatie van een retailer.

Nazarian, Arthur (2018) Optimizing the deployment of automated external defibrillators by a data-driven algorithmic approach.

Naziris, Sotirios (2019) Infrastructure as code : towards dynamic and programmable IT systems.

Neacsu, T. (2022) From EDIFACT to OpenTripModel: analysis, migration and guidelines based on data from real-world logistics companies.

Nee, F.D. van (2014) To a new hardware design methodology : a case study of the cochlea model.

Neele, Thomas (2016) GPU implementation of partial-order reduction.

Nelson, D.J. (2022) Privacy-preserving counterfactual explanations to help humans contest AI-based decisions.

Neut, Laura van der (2021) Pure Gamification: stimulating energy saving behaviour through personalized gamification.

Ngo, T. (2021) Intelligent Bomberman with reinforcement learning.

Nguyen, A.D. (2013) Integration of IEC 61850 mms and lte to support remote control communications in electricity distribution grid.

Nguyen, Elisa (2021) Temporal Spike Attribution : A Local Feature-Based Explanation for Temporally Coded Spiking Neural Networks.

Nguyen, ir. H.M. (2019) Formal verification of a red-black tree data structure.

Nguyen, H.Q. (2006) Analysis of crosscutting concerns in QVT-based model transformations.

Nguyen, M. (2020) Interaction technology in improving learning of sports tactics : A novel way of teaching adult novice players the volleyball side-out rotation with an interactive LED floor.

Nguyen, Thuy (2021) Cross-applicability of ML classification methods intended for (non-)functional requirements.

Nguyen, V.Y. (2007) Optimising techniques for model checkers.

Nguyen, Viet Yen (2007) Optimising techniques for model checkers.

Ni, Xuefei (2022) Gamification design for enhancing user experience of rail travellers.

Ni, Z. (2020) An improved Java-based single sign-on solution.

Nibbelke, Vincent (2014) Vascular pattern recognition for finger veins using biometric graph matching.

Niculae, T.F. (2022) Edge server placement on traffic lights for smart city services.

Niculescu, Remus G. (2021) Analysis on the Evolution of Mobile Network Characteristics from NetBravo Dataset.

Niechwiadowicz, Karolina Julia (2017) Virtual Reality and Game Mechanics in Generalized Social Phobia Treatment.

Niehoff, Dennis (2018) Evaluation of Motion Control Algorithms for Miniaturized Agents Moving Inside 3D Fluidic Microchannels.

Niekolaas, M. (2021) Towards real-time placental surface reconstruction during fetal surgery : deep-learned placental vessel identification and segmentation.

Nienhuis, J. (2014) Using Change Management to improve CRM User Acceptance.

Niesink, S.W.R. (2017) Improving biomedical information retrieval with pseudo and explicit relevance feedback.

Nieuwenburg, E.C.E.M. (2017) Project Buddiez : designing for long-distance-friendships between children.

Nieuwenhuis, S. (2022) Exploring the Implementation of Network Architecture Search (NAS) for TinyML Applications.

Nijdam, N.A. (2007) Facial rendering.

Nijeboer, F.J. (2020) Detection of HTTPS encrypted DNS traffic.

Nijenhuis, Barry (2005) Smart sign for smart surroundings.

Nijenhuis, C.F. (2011) Automatic generation of graphical domain ontology editors.

Nijholt, M.H. (2020) Predicting of project spending for an NGO.

Nijhuis, Mirel (2019) Creating a Google Home System Agent to reduce loneliness among older adults.

Nijhuis, S.P.G. (2022) Dark web markets : what can they teach us?

Nijhuis, W.H. (2022) An audio based feature detector for shavers using Artificial Intelligence.

Nijkamp, Barry (2009) Using functional design patterns to improve exports to management information systems.

Nijkamp, Bas (2022) A High Throughput Sorting Accelerator using an Intel PAC FPGA.

Nijkamp, J.B. (2021) Big data in small companies : a survey in the retail sector in the Netherlands.

Nijkamp, MSc Jelle J.B. (2021) Big data in small companies : a survey in the retail sector in the Netherlands.

Nijland, J.G.W. (2022) Gamification of cyber security awareness training for phishing against university students.

Nijland, R.G. (2020) Using in-game data to give insights in the performance of eSporters.

Nijmeijer, Tom (2008) Automatic classification of television commercials.

Nijpels, S.T. (2020) Implementing feedback systems and content creation tools in an educational game.

Nijskens, Lotte (2022) Contrast generalisation in deep learning-based brain MRI-to-CT synthesis.

Nijssen, Bobby J.W. (2008) Cooperative Intelligent Transportation Systems Building a demonstrator for the CVIS-project on the Informatieve Weg.

Nijweide, F.P.J. (2020) Autoencoder-based cleaning of non-categorical data in probabilistic databases.

Nisslmueller, Utz (2022) LOLBin detection through unsupervised learning : An approach based on explicit featurization of the command line and parent-child relationships.

Niu, Z. (2022) Develop and adopt the organizational cybersecurity culture in the Covid-19 teleworking scenario.

Noltes, Johan (2011) Data location compliance in cloud computing.

Noordhuizen, Paul (2006) Analyzing aspects in production : plans for software product lines.

Noorlander, M.S. (2021) Predicting traffic flow with machine learning.

Noort, N. van (2020) Machine Learning for monitoring attacks in the cloud.

Noort, W (2016) Gathering intelligence from the Bitcoin peer-to-peer network.

Noppen, I. (2012) Assessing the benefits of spectrum sharing in wireless access networks.

Noppers, Joke (2017) Understanding computer science : how the discipline of computer science develops new understanding.

Nouta, Christiaan Alexander (2011) Data processing networks made easy : improving development possibilities for people with limited computer science knowledge.

Nouwens, I.C.C. (2009) Predicting dialogue state transitions using prosodic markers: Exploring AMI Corpus backchannels.

Nowee, Stijn (2022) Reliability analysis of Triple Modular Redundancy.

Nurdin, H.I. (2002) Mathematical modelling of bias and uncertainty in accident risk assessment.

Nurlatifah, Eva (2019) Information audit triangle for practitioners.

Nusman, Daan (2006) Real-time full-body motion capture in virtual worlds.

Nutma, J. (2016) More comprehensive demand side management by the integration of the powermatcher and triana.

Nyante, K.A. (2018) Secure Identity Management on the Blockchain.

Obbink, Michel (2011) Social interaction in a cooperative brain-computer interface game.

Obbink, Ruben (2020) Development and Optimization of a Robot Navigation Algorithm combining Deep Reinforcement Learning and State Representation Learning.

Oberhofer, L. (2022) Item availability restricted.

Odding, A.V. (2018) Creating an Interactive Art Installation for the SmartXP.

Odijk, M. (2007) Novel sensor structures for enhanced redox cycling.

Odyurt, Uraz (2016) Bring your own authenticator/authentication security in physical access control systems.

Oedzes, J.M. (2020) ASIP design and algorithm implementation for beamforming in an antenna array.

Oever, Daniel van 't (2008) CoNSoLe: A Domain Specific Language for Network Services.

Ogunjide, Oluwaremilekun Emmanuella (2021) Toward a healthy lifestyle : Siege Arena and how a gamified framework can be applied to the design of a game for managing and treating chronic conditions such as diabetes and obesity.

Oijen, Joost van (2007) A Framework to support the influence of culture on nonverbal behavior generation in Embodied Conversational Agents.

Ok, Sun (2018) Smart Moments.

Okken, B. (2017) Design and Empirical study of tilting propellers of an over-actuated quadrotor.

Oldengarm, B.M.J. (2020) Improving human activity recognition using embedded smartphone sensors.

Oldenkamp, H.A. (2007) Probabilistic model checking : a comparison of tools.

Oliemans, R. (2019) WHOIS versus GDPR.

Olmezoglu, C. (2022) Causal analysis of safety violations in DyNetKAT.

Olteanu, A.C. (2021) Tracing Covid-19 domain name clusters on the internet.

Olthof, Mark (2007) Performance & Scalability of a Spatial Database in a GIS-Web Service Environment.

Olthuis, Ferry (2013) A comparison of state space reduction techniques in SCOOP.

Ong-A-Fat, K.K. (2017) Context Aware GPS Error Correction.

Onis, Ramon (2018) Does your model make sense? : Automatic verification of timed systems.

Ooms, Matthijs (2009) Provenance management in practice.

Ooms, Wendy (2007) Providing AAA with the Diameter protocol for multi-domain interacting services.

Oonk, N.M.J. (2018) Item availability restricted.

Oorschot, D.H.M.A. van (2020) Let’s sort this out: GPGPU Verification of Radix Sort.

Oortwijn, W.H.M (2015) Distributed Symbolic Reachability Analysis.

Oost, M. (2015) Analysis of Homecare Nurses’ Attitudes towards, Desires for and Perceived Added Value of Tools on a Tablet.

Oosterhof, N.N. (2005) Application patterns in functional languages.

Oosting, W.M.H. (2009) Design and evaluation of a community of practice to support IT implementation/migration processes : a case study about the design of a CoP within the Suite4Basisgegevens migration.

Oostinga, Ruben (2012) A java bridge for LSTMIN.

Oostrum, A. van (2009) A model and specification for development of enterprise application frameworks.

Oostrum, A.R. (2008) A service register as an information intermediary : towards a structured design approach for service registers.

Oostveen, Laurens van (2007) Conductivity gradient focusing by pervaporationand osmosis-induced fluxes.

Op 't Land, Sjoerd (2011) Ranging and localisation error mitigation in indoor obstructed direct path conditions.

Ordelmans, L. (2007) The Creation of a Flexible, Functional Simulation Generator for the Montium Tile Processor.

Orij, J. (2016) Self-adaptation to concept drift in web-based anomaly detection.

Orlinski, Jakub (2020) MEG-driven emotion classification using convolutional and recurrent Neural Networks.

Os, Roel van (2007) Optimizing XML information retrieval query execution at the physical level.

Otten, Yoeri (2021) Adapting, analyzing and benchmarking transportation routing algorithms for realistic real-time environments.

Ottenhof, Robbert H.J. (2011) Towards automated truancy detection.

Ottow, Christiaan (2012) Hacking the next web: penetration testing over IPv6.

Oude Alink, M.S. (2008) Increasing the spurious-free dynamic range of an integrated spectrum analyzer.

Oude Bos, Danny (2008) BrainBasher : a multi-modal BCI game for research and demonstration.

Oude Elferink, W.G. (2017) Multi-camera tracking of soccer players through severe occlusions.

Oude Elferink, Wout (2014) Fingerprint acquisition with a smartphone camera.

Oude Maatman, Ruud (2011) Design and evaluate a deployment process for the ES benefits management method.

Oude Roelink, B.M. (2020) On the security of authentication when linking federated identities.

Oude Veldhuis, M. (2013) Multi-target user interface design and generation using model-driven engineering.

Oude Weernink, M.J.P. (2018) Developing a system for the integration of vehicle data.

Ouden, J.J.A. den (2016) A quest for the best automated tests : Estimating software reliability based on Spec Explorer's on-the-fly test results.

Outersterp, R.M. van (2016) Partitioning of Spatial Data in Publish-Subscribe Messaging Systems.

Ouyang, Cijun (2020) Robot Navigation in Dynamic Environment Based on Reinforcement Learning.

Overbeek, E.B. (2018) Development of a platform strategy framework.

Overbeek, J.F. (2006) Meta Object Facility (MOF): investigation of the state of the art.

Overbeek, T.A.G. van (2015) Floater Allocation in Paced Mixed Model Assembly Lines: Design and implementation of a method for operational scheduling of cross-trained workers in Mixed-Model Assembly Lines.

Overkamp, Niels (2019) Speeding up profile steering algorithms with caching for buffer type devices.

Oyediran, A.S.M. (2018) Scaling beyond HoriZZon.

Ozaita Araico, Alejandro (2017) Detection of the crowdedness of a place sensing the devices in the area.

Ožiūnas, D.O. (2021) Identifying Severity of COVID-19 In Patients Using Machine Learning Methods.

PINGEN, G.L.J. (2016) Machine Learning for Ground Cover and Hot Target Analysis in RGB and Satellite Imagery.

Paalvast, Olivier (2022) Representing Ultra Low Dose CT scans as Chest X-Rays : how far can and do we need to go?

Paauw, Tim (2015) Analysis of unstructured data at GGD : text mining semi-medical notes to predict childhood obesity and abuse.

Padje, J. van 't (2020) The impact of the Dutch weather on the health of horses.

Padubidri, C.P. (2020) Sea lion Counting from Aerial Images with Deep Learning : A density Map Approach.

Pakhira, A. (2016) A Fault Injection Framework for Reliability Evaluation of Networks on Chip Designed for Space Applications.

Palande, Shalvi (2022) Breathe with me : Designing and Evaluating Wearable Visual and Vibrotactile Displays for Colocated Breathing Synchronization.

Palenio, H.L. (2020) Privacy in the Age of IoT An experimental study investigating the attitude towards smart speakers of non-users through voice activation and data evaluation as intrusive features.

Pallett, Dennis (2014) Improving Query Performance of Holistic Aggregate Queries for Real-Time Data Exploration.

Palm, A.J. (2021) Using business intelligence to analyse sport associations' financial data.

Palsma, T. (2010) Discovering groups using short messages from social network profiles : using hierarchically organized concepts to discover relations.

Panambur Venkatraman, V. (2019) A sensor fusion technique for head motion controlled endoscope camera system.

Pandey, Shivang (2022) Snow Depth and SWE estimation using Multi-sensor Microwave and Optical Remote Sensing Time series Data for Indian Himalayas.

Pandey, Vaidehi (2021) Self-supervised semantic segmentation based on self-attention.

Panman de Wit, J.S. (2018) Dynamic detection of mobile malware using real-life data and machine learning.

Pantelis, D. (2019) Design of a control strategy for a robotically assisted ultrasound guided biopsy.

Papadopoulos, Antonios (2019) The quest of "dethroning" passwords from (web)authentication schemes.

Papegaaij, E. (2007) The Tree Processing Language: Defining the structure and behaviour of a tree.

Papenmeier, A. (2019) Trust in automated decision making : how user's trust and perceived understanding is influenced by the quality of automatically generated explanations.

Pappu, A. (2021) Demand side management using blockchain for distributed networks.

Paramartha, Mohammad Anggasta (2014) Design and Instantiation of Reference Architecture of Pluggable Service Platform in E-Commerce.

Pars, Cas (2017) PHREE of Phish : The Effect of Anti-Phishing Training on the Ability of Users to Identify Phishing Emails.

Parzian, Alessio (2015) Java Card Bytecode Verification. Designing a novel verification system.

Pasch, M. (2008) Bye-bye couch potato : body movement in the gaming experience.

Pasquarelli, Leonardo (2022) Extending Java Collections for List and Set Data Structures.

Pasveer, Marco (2013) Importance sampling for probabilistic timed automata.

Pater, Elwin (2011) Partial Order Reduction for PINS.

Pathak, Shreyasi (2018) Automatic structuring of breast cancer radiology reports for quality assurance.

Patil, Samarjeet Singh (2021) Automated Vulnerability Detection in Java Source Code using J-CPG and Graph Neural Network.

Paul, Navneet (2021) TransNeRF - Improving Neural Radiance fields using transfer learning for efficient scene reconstruction.

Paul, Ronald (2010) Realization and high level specification of facial expressions for embodied agents.

Paulissen, J.W.H. (2018) Using depth sensing and augmented reality to improve ski-learning.

Pausan, Florin (2021) Designing a customizable product lifecycle management system for an SME to reach data singularity.

Pavlov, Nikolay (2022) Data Visualizations and Modeling of Environmental Risks in Green Areas.

Pavlov, V. (2022) Security aspects of digital twins in IoT platform.

Pazhouhi, E. (2018) Automatic Product Name Recognition from Short Product Descriptions.

Pebesma, J.L. (2020) Towards transfer learning in e-discovery : finding the optimal classifier and evaluating domain adaptation methods.

Pebesma, J.L. (2020) Towards transfer learning in e-discovery : finding the optimal classifier and evaluating domain adaptation methods.

Peeters, D.W.M. (2022) Physicalization of dynamic, physiological data.

Peeters, J.J. (2016) Fast and Accurate Likelihood Ratio Based Biometric Verification in the Encrypted Domain.

Peetsma, J.J. (2019) Towards A Serious Game For Assessing Self-Reliance In A Crisis.

Pelikan, H.R.M. (2018) "What's going on there?" Negotiating common ground in robotic vs. open Surgery : a comparison of surgeon-initiated requests for action in open and robotic surgery.

Peng, Yuxi (2011) Face Recognition at a Distance: a study of super resolution.

Penkov, Ivan (2017) Block chain use cases beyond payments.

Pennestri, Pietro. (2022) An FPGA based sensor fusion algorithm for IMU data processing.

Penning, M.P.J. (2007) Boosting LUCK: Improving the language understanding capabilities of Kaitito.

Perera, Navoda (2020) An API for intelligent deployment of numerical calculations.

Perera, R.A.H. (2019) Finger-Adaptive Illumination Control and Exposure Fusion Imaging for Biometric Finger Vein Recognition.

Perik, L.W. (2022) An analysis of the decentralization and effectiveness of Lightning Network.

Perk, Anno (2009) Reflection in large IT Projects : a method for project success focussing on soft factors.

Perkowski, Ernest (2020) Impact of ensemble machine learning methods on handling missing data.

Peters, M.D.J. (2022) Extending explainability of generative classifiers with prototypical parts.

Peters, ir. Rifca M. (2018) Identifying and addressing common programming misconceptions with Variables - Part II.

Peters, Rifca Marcella (2014) How Turn-Taking Influences the Perception of a Suspect in Police Interviews.

Peters, S.T.H. (2020) Distribution of advertisements on YouTube among several content categories.

Peterson, R.S. (2010) Testing real-time requirements for integrated systems.

Petrasch, Melissa-Kim (2022) The Physicality of AI and its meaning for Sustainable AI : A Discussion of Sustainable AI for Sustainable Fashion and how to Approach it.

Petter, J. (2021) Adopting reinforcement learning in operational spare part management : visualizing the black box of decision-making.

Pfab, Isabel (2016) A wearable intervention for posture correction.

Pham, Giang T. (2013) Integration of IEC 61850 MMS and LTE to support smart metering communications.

Pham, Nguyen Hoang Dung (2022) Dynamically Allocating Network Resources for Teleoperation Applications using Intent-based Inference.

Piggott, J.J.H. (2015) Identification of business travelers through clustering algorithms.

Pijnenborg, I. (2016) Methodological guideline to find suitable design patterns to implement adaptability.

Pingel, M.S. (2021) Leveraging machine learning and process mining to predict anaemia with the help of biomarker data.

Pingen, J.J.F. (2019) Engineering Entertainment: Adaptive interventions to enhance player engagement in the Interactive Tag Playground.

Pits, R. (2021) Visualizing electricity consumption at a country scale.

Plant, O.H. (2019) DevOps under control : development of a framework for achieving internal control and effectively managing risks in a DevOps environment.

Planting, J (2018) Developing a data repository for the Climate Adaptive City Enschede.

Plas, W.J. van der (2020) Edge computing : a business model for tele monitoring IoT applications for diabetic remote care.

Plass, Martijn J.A. (2007) Rules Decomposition for Distributed Context Processing.

Plentinger, C.S. (2020) GUI for FIG : visualising simulation results.

Ploeg, E.M. van der (2020) Developing a Platform to Emulate Fault Injection Attacks on Cryptographic Implementations.

Pluimers, Peter (2014) Item availability restricted.

Pocheva, Venelina (2022) Outsourcing Prioritization for Bottleneck Processes Using Process Mining: A Logistics Case Study.

Pohekar, Ashwini (2019) ASIP design on behalf of hybrid beamforming in MIMO communication system.

Pohjanheimo, R.J. (2020) Mood effects of immersion, control, and interaction in virtual reality eye-movement desensitization and reprocessing therapy.

Poirot, Maarten G. (2020) Split Learning in Health Care: Multi-center Deep Learning without sharing patient data.

Pool, A.W. (2018) An information systems model for supporting fake news disclosure.

Pool, A.W. (2021) Digital Twins in Rail Freight - The foundations of a future innovation.

Pool, T.J. (2017) Drone swarming and combat management : visualizing and managing an autonomously functioning swarm of drones with as mediator Combat Management System(CMS).

Poortema, Anne (2009) Training clients using e-learning : developing an e-learning model for an international software vendor.

Poot, Martijn (2020) Real time posture tracking using Breathline : posture , body position and movement classification using an Arduino, accelerometer and k-Nearest Neighbour classification.

Popa, A. (2020) Feature evaluation for detection of COVID-19 in pulmonary CT scan images.

Popov, Dimitar (2022) How Does Encouragement in Human-Robot Interaction Affect People’s Pro-Social Behavior? An Experimental Study on Human-Robot Interactions.

Popovici, Andrei (2022) Analysing Real-Time Vision-Based Pose Estimation Algorithms for RITH Purposes on Embedded Devices.

Portengen, Rik (2007) Phased array antenna processing on reconfigurable hardware.

Postema, B.F. (2013) Fluid survival tool: a model checker for Hybrid Petri nets.

Postema, J.T. (2019) Explaining system behaviour in radar systems.

Posthumus, Wytse Jan (2011) The situated cognitive engineering tool.

Postmes, J.M. (2021) Design of an efficient path planning and target assignment system for robotic swarms in agricultural applications.

Pot, Wouter (2007) A machine learning approach for generating expressive musical transcriptions.

Pothoven, Tristan (2010) Workflow usage in the healthcare environment.

Poulisse, Gert-Jan (2007) Exploiting inter-conceptual relationships to boost SVM classification.

Pouw, I.H. (2015) You are what you eat : serious gaming for type 1 diabetic persons.

Praas, J.W. (2020) Predicting influence spread in online social networks using combinations of node centralities.

Prakken, E.B. (2022) Design, modeling, and control of a novel multirotor UAV with embedded 3D-printed thrust force sensor.

Prakoso, Dimas Wibisono (2019) Semantic-aware EWC Code Recommender System for Industrial Symbiosis Marketplace.

Prasad, Akshay (2022) Investigating whether typosquatting targets children.

Prasad, Pralad (2022) Automatic Clinical Deterioration Monitoring using Machine Learning Techniques Post Surgery.

Prause, L. (2016) Software vendors' service infusion : a generic value network of cloud-based enterprise software.

Prenger, A.H. (2016) Effect of rotating virtual product presentation on purchase intention in online stores.

Prieskienis, Adrijus (2021) Information value for disruption management in supply chains.

Prieto Álvarez, Roberto (2020) Design of a Flat-Swipe Finger Vein Recognition Device in the NIR Spectrum.

Prins, J. (2020) Proactive recognition of domain abuse.

Prins, Martin (2007) Fast retransmission for multicast IPTV.

Prodea, A (2021) Identifying critical source code at method level by performing threshold-based and clustering algorithms on software metrics.

Pross, L.S. (2016) Trust in the Cloud.

Provoost, Jesper C. (2019) Short-term prediction and visualization of parking area states in real-time : a machine learning approach.

Provoost, Jesper C. (2021) Improving Operational Efficiency In EV Ridesharing Fleets By Predictive Exploitation of Idle Times.

Prudnikova, Anna (2019) Standardized security assessment framework for ICS devices and pilot project.

Przadka, Bartosz (2022) CAD model reconstruction from the LiDAR scan of the catenary arch.

Psalmerosi, Febriya Hotriati (2019) Applying Text Mining and Machine Learning to Build Methods for Automated Grading.

Pu, Leiying (2019) Co-design approach : a collective design method for improving working efficiency and satisfaction in user support design processes : an empirical study based on three comparison groups simulating a real-world quick start guide design process.

Puming, Liu (2006) Service agreements and facilities for M-health vital sign monitoring.

Punter, C.M. (2010) Multi-source entity resolution.

Putman, C.G.J. (2021) A Requirements Based Selection Model for Future Proof Non-Intrusive Authentication Technologies in the Office.

Putten, Ing. A.E. van (2007) Behavioural hybrid process calculus translation to modelica.

Putten, F.M.J. van der (2014) Advies over de mogelijkheid tot het invoeren van slechts één planningsomgeving binnen VDL ETG Almelo.

Pühl, Julia (2018) Developing a life-storybook-application for people with dementia.

QIN, L. (2017) Operator control hierarchy for multiple robot systems.

Qazi, A. (2022) Cars and social media : a greener future.

Qiu, Xian (2010) Bin packing games.

Quak, Remi (2020) Process Mining in Healthcare: Gaps between protocol and clinical practice of critical side findings in radiology.

Quattrocchi, J. L. (2020) Reaction-Diffusion patterns modelled by Continuous-State Cellular Automata.

Raa, I. te (2015) Recursive functional hardware descriptions using CλaSH.

Raaijen, Thomas (2018) CRM success through enhancing the project management approach.

Raalte, E. van (2019) Automating system generation in Clash.

Raben, K.T. (2019) Comparing selfh-healing techniques in approximate MAC accelerators.

Rademaker, F.M. (2022) Subpopulation process comparison for in-hospital treatment processes : a case study for sepsis treatment.

Radl, P.D. (2019) 3D reconstruction improvement by path planning towards physical interaction with a UAV.

Radstaak, J.M. (2019) Developing a DevOps Maturity Model: A validated model to evaluate the maturity of DevOps in organizations.

Radu, A. (2021) Speeding Up Convergence For Sparse Training Using Feature Extraction Behaviour.

Rai, Shubham (2020) Behavioral Threat Detection : detecting Living of Land Techniques.

Rajan, MSc Vaibhav (2022) Generating temporal 3D city models of Shahjahanabad for exploratory ground-level visibility analysis.

Rajput, Abdul Ghani (2011) Properties Relevant for Inferring Provenance.

Ramesh, Darshan (2019) Item availability restricted.

Ramón Gómez, Nerea (2022) An end-to-end approach to a Reinforcement Learning application in the transport logistics.

Ranjan, H. (2022) Item availability restricted.

Ranjit Jacob, Sonu (2021) Lameness Detection from Top View : State-of-the-art Analysis of Lameness Detection.

Rasing, A (2018) Automation and increased use of carrier data to improve the process of ocean carrier selection.

Rauleder, S. (2016) Cloud computing as an entrance for start-ups into ERP solutions.

Raureanu, A.S. (2021) Transfer learning for cell image reconstruction.

Ravi Prame, Akash (2021) Hybrid Learning for Leakage Detection in Sealed Detergent Containers using IR-Thermography.

Ravishankaran, Charan (2021) Impact on how AI in automobile industry has affected the type approval process at RDW.

Rawat, K. (2020) Human activity recognition based on energy efficient schemes.

Rayo Torres Rodriguez, H. (2019) A lightweight hardware architecture for intermittent computing.

Rebel, Thomas (2021) Influence performance of breathing exercises with game elements.

Reebroek, C. (2018) Understanding engagement behavior in online brand communities : how social identity relates to frequency of interaction and tweet sentiment.

Reede, Joost (2007) On A-Select and Federated Identity Management Systems.

Reefman, K.H.A. (2021) Determining the rate of small gestures unobtrusively.

Reekers, D.C. (2021) Mecamind XR.

Reesink, T.B.J. (2020) Creating 3D faces from 2D images using GANs.

Regnerus, B. (2019) Matching article sentiment in abstractive summarization of news articles.

Regt, P.D. de (2021) Modeling an eye gaze task for people with PIMD.

Reiling, Mark (2014) Implementation of a Monocular Structured Light Vision System for Pipe Inspection Robot PIRATE.

Rejek, J. (2018) Conceptual Blending of Dialog and Image Schema - Design and Pilot Test of an Image-Schematically Metaphoric Collaborative Decision-Making Tool.

Rekker, W. (2022) Verification of a SysML railway specification with a translation to UPPAAL.

Rengers, J.J. (2020) Investigating association between musical features and emotion through EEG signal analysis.

Rengers, J.J. (2022) DDS in a Zero Trust Cloud Native Environment in the Naval Domain.

Rens, Eduard (2018) Extract offender information from text.

Renssen, Martijn (2019) Classification of types of road damage using machine learning and a smartwatch.

Resing, M. (2021) Should network operators hop on the data plane?

Reuderink, Boris (2007) Fusion for Audio-Visual Laughter Detection.

Rhijn, Gijs van (2019) Why your back hurts : Finding an efficient way to measure and evaluate sitting posture using a combination of body sensors placed on the body and machine learning.

Richter, N.G. (2019) Process mining in programming game logs to differentiate between skill levels.

Richter, N.G. (2021) Zero-downtime PostgreSQL database schema migrations in a continuous deployment environment at ING.

Ridder, L.W. van de (2018) Improvements to a tool-chain for model-driven design of Embedded Control Software.

Ridder, R.K. de (2019) Business Models for Smart Mobility IoT Data.

Rieffe, Dennis (2017) The traceability of medical equipment through hospitals and retirement homes.

Rieksen, R.H. (2016) Perfect selfie that can be used in face recognition with a passport photo.

Riesewijk, M. (2020) High availability orchestration of Linux containers in mission-critical on-premise systems.

Riet, M. van 't (2013) Trace-based debugging for advanced-dispatching programming languages.

Rietema, Richard (2009) Automatic Verification and Analysis of Test Results of Océ Printers.

Rietvelt, D.C.J.C (2022) Extracting information from funding opportunities using state-of-the-art NLP method BERT with minimized data annotation.

Rietvelt, D.C.J.C. (2019) Influence of neutral word removal on sentiment analysis.

Rijn, K.D. van (2020) A binary decision diagram based approach on improving probabilistic databases.

Rijnbeek, E.H. (2019) Item availability restricted.

Rijnbergen, K.J. (2020) Improving the effectiveness of phishing detection Using lexical semantics; A machine-learning based approach.

Rikken, T.W. (2022) The application of hidden Markov models for economic state prediction and the calculation of economic state transition probabilities.

Rikkerink, K.B.W. (2021) Enabling Perspective Multiplication for Multi-Perspective Enrollment with University of Twente Finger Vein Scanner.

Rikkers, Vasco (2022) The Use of Story-based Gamification in USB-based Attack Prevention.

Rindt, F.S. (2017) Developing a Smart Rainwater Buffering System for the Citizens of Enschede.

Ringlever, J.J. (2014) Improved timetabling for a public transport company from cost as well as passenger perspective.

Ringlever, J.J. (2014) Improved timetabling for a public transport company from cost as well as passenger perspective.

Riphagen, Quinten (2022) The deepfake problem : Developing a novel maturity model for forensic image authentication research.

Ritmeester, J.C. (2020) ReFERee : a self-reflection tool For gamers.

Ritmeester, J.C. (2022) Comparison of common signal pre-processing techniques for long-term sEMG-based knee angle estimation.

Ritsema, S. (2021) A feature sensitivity and dependency analysis approach for model explainability.

Ritterfeld, Thom (2016) On-demand app development.

Riva, Giovanni Maria (2019) Privacy architecting of GDPR-compliant high-tech systems : the PAGHS methodology.

Rizvi, Mohammad Abbas (2022) Automated Electronic Component Selection : a Machine Learning approach.

Rizwan, Muhammad (2020) SDR based module for Low Power WAN nodes development.

Robert, Julien (2020) Recipe suggestion for meal-sharing online Marketplaces.

Robson, Francis (2020) Using Temperature and Humidity Sensors to Propose a New Form of Flat Roof Leakage Detection.

Rodday, Nils Miro (2015) Exploring Security Vulnerabilities of Unmanned Aerial Vehicles.

Roditi, Alexandra (2014) Quantifying the Contribution of Enterprise Architecture to Business Goals.

Rodriguez Ruiz, G. (2021) Deep Learning Classification of Operator and Endoscope Motions during Endoscopy.

Roediger, Sarah (2018) The effect of suspicion on emotional influence tactics in virtual human negotiation.

Roelink, M.J. (2020) Encoding deadlock-free monitors in the VerCors verification tool.

Roelink, M.J. (2022) zk-SCHNAPS : enforcing arbitrary password policies in a zero-knowledge password protocol.

Roelofs, B.G.J. (2021) Optimal management of delivery costs.

Roelofs, N.A.J. (2015) Incorporating Seasonality and Volatility Updating in Gas Storage Valuation for the Purpose of Validation.

Roelofsen, Floris (2004) Contextual Reasoning - Complexity Analysis and Decision Procedures -.

Roemers, Arnout (2013) An adapter-aware, non-intrusive dependency injection framework for Java.

Roes, J.B.M. (2007) Identifying and solving overlap between messaging standards with the help of domain models, illustrated with HR-XML’s SIDES and SEP.

Roest, J.J. van (2020) Presenting automated test results for web development : A dashboard for reports from automated tests.

Rombouts, Wolf (2009) Context-Concept chemie en van Hiele's abstractieniveaus.

Romeo, Pietro (2019) Discovering aspects of gaming QoE : an explorative study.

Romkema, J.F. (2020) Development of a NOx Emission Model using advanced regression techniques.

Roo, A.J. de (2007) Towards more robust advice : message flow analysis for composition Filters and its Application.

Roo, M. de (2015) Optimal Event Handling by Multiple UAVs.

Roode, G. de (2022) User privacy in cryptocurrencies.

Roodenburg, S.B. (2009) Scheduling the sequential hardware-in-the-loop simulator.

Roolvink, S. (2008) Detecting attacks involving DNS servers : a netflow data based approach.

Roosmalen, J.J. van (2019) Forecasting bus ridership with trip planner usage data : a machine learning application.

Roppelt, J.C. (2019) Security risks surrounding cryptocurrency usage : a study on the security risks of cryptocurrencies and how security perception affects usage.

Rorije, R.J. (2006) Input/output in functional languages : using algebraic uniontTypes.

Ros, K. M. (2019) Airport restroom cleanliness prediction using real time user feedback data and classification techniques.

Ros, M.F. (2022) Exploring Fishing Vessel Activity Classifications using Machine Learning.

Rosenbusch, David (2021) Creative Memory Arrangement in Virtual Reality: Building a VR diary.

Roskam, Ronald (2014) Evaluation of Online Public Sexual Health Care in the Netherlands: A Scenario-Based User Evaluation.

Rotari, Cristian (2020) Secure and transparent dispute resolution system in supply chains using hyperledger fabric.

Rous, E. (2021) Shopfloor Organization and management system : developing a software system for a matrix-production system.

Rouwenhorst, J.H.J. (2018) A picture is worth a thousand words : investigating the value of Instagram posts and Twitter posts in predicting movie box office revenues.

Rovers, Kenneth C. (2006) Front-end research for a low-cost spectrum analyser : receiver system and topology study.

Rozen, Riemer van (2007) A Debugging Framework for NIPS.

Rozendal, S.P. (2018) Redesign of a finger vein scanner.

Rozo Carreño, Daniel Felipe (2020) An enterprise architecture framework for digital transformation.

Rubbens, R.B. (2020) Improving Support for Java Exceptions and Inheritance in VerCors.

Rubio Paniza, E. (2009) Design and evaluation of an MSP-based body area network management architecture using JMX.

Rublein, N. (2019) Design of haptic feedback in pedal based UGV teleoperation to enhance situation awareness.

Ruis, F.A. (2021) Independent prototype propagation graph for compositional zero-shot recognition.

Ruis, Frank (2019) Spilling the beans: Food recipe popularity prediction using ingredient networks.

Ruiter, Bryan (2017) Towards a continuous auditing philosophy.

Ruiter, Mark de (2014) Performance measurement of Hermite-based multi-carrier communication.

Ruizendaal, Rutger (2017) The potential of deep learning in marketing : insights from predicting conversion with deep learning.

Rump, A. (2020) Automated assessment of learning objectives in programming assignments.

Rus, Adrian-Catalin (2020) Modelling and evaluating Obstructive Sleep Apnea management protocols with UPPAAL.

Rutgers, Jochem (2009) VHDL voor het voortgezet onderwijs: Een nieuwe lesmodule over hardware voor informatica.

Rutgers, M. (2021) Duckbot : a chatbot to assist students in programming tutorials.

Rutgers, Nils (2022) Point cloud based semantic segmentation for catenary systems using deep learning : Compressibility of a PointNet++ network.

Ruth, F.J. van (2015) Improving problem detection and focus for root-cause analysis through case-based reasoning and group decision support systems.

Rõžakov, Ilja (2019) A Modest Comparison of Blockchain Consensus Algorithms.

Rödel, H.A. (2021) Tailored Cybersecurity Interventions.

Römer, J.G.W.T. (2022) Real-time pitch detection using resource constrained IoT device.

SIMSCH, J.J. (2016) Video Quality in VR : Measuring Impact of Bandwidth-Saving Approaches on Quality of Experience and Social Interaction in a HMD-mediated Video Application.

Sadad, Akhyar (2019) Reusable machine learning framework for predicting future system performance : a comparison study of validation strategy on WWTP time series data.

Sadananda Bhat, A. (2019) Hierarchical deep neural networks for MeSH subject prediction.

Saeed, Aaqib (2017) Deep physiological arousal detection in a driving simulator.

Sain, R. de (2020) Impact of language on detecting agitation.

Saksena, Saumya (2020) CABiNet : Efficient Context Aggregation Network for Low-Latency Semantic Segmentation.

Salamah, Siti Yaumi (2019) Predicting demand of replacement cars for breakdown cases using machine learning techniques.

Salomons, T. (2016) Een basis voor continu verbeteren bij AWL.

Saman Yan, Daian Geivid (2013) The effect of Testing and Feedback in Digital Game-based Learning.

Sambeek, M. van (2007) Real-time shadow generation for 3D simulations using modern hardware.

Samiksha, Samiksha (2021) Investigating an association between DDoS and Phishing attacks.

Samuel, L.N. (2017) Computations in Stochastic Game Theory : large sets of rewards in games with communicating states and frequency-dependent transition probabilities and stage payoffs.

Sanchez, Bryan (2022) Automatic detection and estimation of the area of buildings.

Sandberg, Aaron (2022) Can data from Twitter produce useful feature suggestions in the audio streaming service field? - An example of Spotify.

Sandhaus, Hauke Gregor Wilhelm (2015) Development of a 3D navigable interface for a touchless showcase.

Santema, S.E (2016) Insight in Scheduling Choices:A Visualisation Tool for SDF Graphs.

Santen, A. van (2022) Spot the difference : Using Procrustes analysis on semantic features to enhance the performance of Facial Recognition Systems.

Santiago Garcia, Eric (2022) Country-independent MRTD layout extraction and its applications.

Sarrionandia Uriarte, Nora (2017) Efficiency of broadcasting in vehicular networks by means of 5G device-to-device communications.

Sartori, Damiano (2020) Redactable Blockchain : how to change the immutable and the consequences of doing so.

Sastry, Srikumar (2022) Super Paretos: Bayesian Active Meta Learning for Spatial Transferability of Deep Learning Models.

Sathiyanarayanan, Prasanna (2021) Data Driven Feedforward Control of a 2-DOF Redundantly Actuated Manipulator with Flexure Joints using Machine Learning Techniques.

Satink, Laurens (2009) The adaptive presentation assistant using grammar-based recognition to support the process of presenting.

Satria, Triadimas Arief (2013) Seamless service continuity in cloud based lte systems.

Savchenko, G. (2021) Visualizing land use change : the most frequently occurring correlations between land use change and demographic factors.

Sawaryn, B. (2020) Modelling fluctuations of blood glucose levels based on food intake and physical activity in patients with Diabetes Mellitus Type 2 : development of a controlled protocol which administer perturbations in daily life situations.

Sburlea, Andreea Ioana (2012) Brighten up your mind! Effects of light priming and encouraging feedback on the neural and behavioral responses in a general knowledge task.

Schaaf, Jurre van der (2022) Using reinforcement learning to control hydrofoils.

Schabbink, Johan (2008) Design of a capacitive based closed-loop displacement sensor.

Schade, Christiaan Leonard (2013) FCScan: A new lightweight and effective approach for detecting malicious content in electronic documents.

Schaik, E.J.G. van (2019) Color-based Recognition Techniques for Manipulation Detection in Advertisement Videos.

Scheerens, Daan (2012) Practical indoor localization using bluetooth.

Schell, Alfred (2020) Vision-based guidance for robot assisted endovascular intervention.

Schellekens, M.C.C. (2018) Reducing Meat Consumption Using A Mobile Application.

Schellekens, M.C.C. (2021) A Low-Budget, End-To-End Warning System for Bicycles using Monocular Vision and Vibrating Handlebars.

Schepers, P. (2019) Application of a process model to define potential operational functional failure conditions.

Scheuter, L.R. (2021) Does it make sense? Analyzing coherence in longer fictional discourse on a syntactic and semantic level.

Schilpzand, M.P. (2008) X-Stream in MaDAM : new junction modelling in macroscopic dynamic traffic assignment models.

Schiphorst, R. (2000) Demonstration of the Software-Radio Concept.

Schipper, E.W. (2021) Value conflicts between sustainable and alternative behaviour in daily routines.

Schipper, M.A. (2019) Decomposed reachability analysis for discrete linear systems.

Schipper, Ruurd de (2014) The usefulness of IT innovation classification for business model innovation.

Schippers, Jorrit (2009) A massively scalable architecture for instant messaging & presence.

Schmidt, R. D. (2019) Creation of a training and teaching application in AR.

Schmit, C. (2020) Smoothed analysis of the ICP algorithm for arbitrary probability distributions.

Schmit, C. (2022) Offloading Strategies for the Rendering Process in Edge-enabled Virtual Reality Games.

Schniering, A.A. (2016) The relationship between human factors and presence experienced in Virtual Environments (VEs).

Scholte, Harmen (2022) Regrowing Strategies for Dynamic Sparse Training.

Scholte, Theodoor (2008) Managing continuous uncertain data by a probabilistic XML database management system.

Scholten, Arnaut (2021) Efficient matching of heterogeneous roadmap data at Rijkswaterstaat.

Scholten, C.P.B. (2019) Hacking the router: characterizing attacks targeting low-cost routers using a honeypot router.

Scholten, C.P.B. (2021) Automatic detection of zero-day attacks in high-interaction IoT honeypots using static analysis techniques.

Scholten, F.B. (2007) The concern-oriented software architecture analysis method.

Scholten, J. (2017) The determinants of cloud computing adoption in The Netherlands : a TOE-perspective.

Scholten, Jeroen (2022) Gain insights in the logistic processes at Amsterdam Schiphol Airport and determine solutions to limit capacity bottlenecks.

Scholten, R.H.D. (2020) Secure biometric verification in a malicious attacker model setting.

Schoneveld, J. (2020) Augmented reality photo album for people with dementia.

Schooltink, F. (2022) A simulation of the ecological impact of three smartphone strategies.

Schooltink, W.T. (2020) Testing the sensitivity of machine learning classifiers to attribute noise in training data.

Schoot Uiterkamp, L. (2019) Improving text representations for NLP from bags to strings of words.

Schoot Uiterkamp, L. (2021) Classification of Empathy and Call for Empathy in Child Help Forum Messages.

Schoppers, P.A.C. (2018) The Future of E-Learning in Higher Education : Using the scenario planning method to develop four scenarios on the futures of technology-enhanced higher education.

Schot, Jurgen (2009) The privacy governance framework : effectively dealing with privacy legislation.

Schot, N. (2012) QoS-aware model-driven SOA using SoaML.

Schot, Vincent (2011) Social norms to motivate IT use.

Schouten, J.H. (2009) Optimisation of packet scheduling in wireless networks.

Schrama, M.L. (2020) Improving speech emotion recognition by identifying the speaker with Multi-task Learning.

Schreuder Goedheijt, Bart (2017) Recalling shared memories in an embodied conversational agent : personalized robot support for children with diabetes in the PAL project.

Schreurs, A. (2021) The heat under our peat : using transfer learning for peat fire prediction in the arctic region of North-East Siberia with Sentinel-2 imagery.

Schrijver, Bert Jan (2006) Classificeren met vertrouwen : contextgevoelige tekstclassificatie met betrouwbaarheidsindicatie.

Schrijver, G. (2020) Using process mining to compare different variants of the same reimbursement process : A case study.

Schroer, G.H. (2016) Feasibility of End-To-End Encryption using Attribute Based Encryption in Health Care.

Schroten, Peter (2019) Introducing BGD: a DSL to express board games and gameplay.

Schuhmacher, M. (2018) Autonomous anatomical structure recognition using machine learning.

Schulte, Rob (2020) Autonomous mapping and navigation of an unknown environment using a reinforcement learning approach.

Schultewolter, M. (2016) Verification of user information.

Schultz, Pim (2017) Using machine-learning models for operational exception handling : a case study at IBM.

Schurink, N.W. (2017) Hyperspectral imaging and tumor classification for intra-operative colorectal cancer resection margin evaluation.

Schutijser, C.J.T.M. (2018) Towards automated DDoS abuse protection using MUD device profiles.

Schutte, J.J. (2019) Design of a development platform to monitor and manage Low Power, Wide Area WSNs.

Schutte, Rik (2011) Maintaining the causal thread of execution in distributed and multilanguage software.

Schwartzenberg, J. (2010) Using machine learning techniques for advanced passive operating system fingerprinting.

Schwemin, L. (2022) Artificial Intelligence Conversational Agents : Using Card Sorting to evaluate the Chatbot Usability Scale (BUS-11), and investigate this in relation to Chatbot Experience.

Schyns, J.L. (2019) Improving Scientific Search Engine Interfaces Using Scientific Networks.

Scrinzi, F. (2015) Behavioral Analysis of Obfuscated Code.

Sealy, Timothy (2008) Implementation of aggregation based Resource Management in DiffServ (RMD) Quality of Service Model (QOSM).

Seid, Selehadin (2019) Predicting weight regain after bariatric surgery using decision tree and logistic regression.

Seidel, Carina (2015) Strategic insight in the Capacity & Efficiency with Hospital data.

Seip, H.M.C. (2022) Hospital robots : an experimental study on communicating urgency using non-semantic speech and built-in LED’s.

Seippel, H. S. (2018) Customer purchase prediction through machine learning.

Selman, K.J.R. (2014) Facial expression compensation.

Senden, J.M.J. (2015) Biasing a ring-oscillator based true random number generator with an electro-magnetic fault injuction using harmonic waves.

Sepulveda Bradford, G.U. (2013) What happens when a robot favors someone?: how a museum-guide robot uses gaze behavior to address multiple persons while storytelling about art.

Serban, A.C. (2017) Context based personalized ranking in academic search.

Sessink, Danique (2018) Using Machine Learning to Detect ICT in Criminal Court Cases.

Sessink, Danique (2020) Creating and Maintaining Organizational Security Awareness in SMEs.

Sessink, Joost (2020) Improving the automatic generation of Dutch soccer reports using the PASS system.

Shabeer Ahmed, D.S. (2020) Sustainable hitlist : targets for internet scans.

Shafee, T. (2022) Governance of cloud storage - A secure cloud storage strategy to maximize data sovereignty.

Shah, Nimish (2020) 3D Stereovision for Quantification of Skin Diseases.

Sharman, S.S. (2019) Item availability restricted.

Shenkute, Nathnael Teodros (2021) Introducing Artificial Intelligence in Fast MicroGC Analysis.

Shi, Z. (2022) Mining and Utilizing Patent Related Data in Quantifying the Societal Impact of Security Technologies.

Shumye, A.M. (2022) Planning the last-mile delivery of humanitarian aid using drones and trucks.

Shyvakov, O. (2017) Developing a security framework for robots.

Siaw, Tien Loong (2012) Saturation for LTSmin.

Siddique, S. (2020) Incorporating clinical notes in an early sepsis prediction model to improve performance.

Siderova, Aleksandra (2022) Tree Transduction as a Means for Efficient Sentence Simplification.

Siebel, R. (2017) Video distribution in a D2D enabled 5G network supporting Public Safety Services.

Sierhuis, Pim (2007) Het voorkomen van prestatieverlies bij de koppeling met Web services: ... en de rol van standaardisatie daarbij.

Sierink, T.G. (2022) Active Reconstruction Attacks on 2D Range Databases.

Siers, W.H. (2019) Generating specifications for JSON APIs for formal and semantic use.

Sievers, C.T. (2020) Bag-of-words location retrieval : Including position of local features.

Sijs, R.F.B. van der (2022) Item availability restricted.

Sijtema, Marten (2010) Managing variability in model transformations for model-driven product lines : extending the ATL model transformation language with variability management capabilities.

Sikkens, B. (2010) The storage and retrieval of sensor data and its annotations.

Sikkes, Bart (2006) A stable matching based adaptive subcarrier assignment method for multimodal fibre access networks.

Siles Del Castillo, Hugo (2007) Hybrid Content-Based Collaborative-Filtering Music Recommendations.

Simmons, D. (2018) Social Cohesion and Sport in Overijssel : A Social Network Analysis.

Singh, A.N. (2021) Smart Control of MR safe Pneumatic Stepper Motor.

Singh, Shalini (2022) FIFA 2022 game analysis using machine learning & computer vision.

Singpurwala, K. (2021) Sentiment analysis trading indicators.

Sinha, Shreya (2021) Completely Automated CNN Architecture Design Based on VGG Blocks for Fingerprinting Localisation.

Sinke, Mariska (2014) Knowledge sharing in schools with data teams.

Sirchia, Riccardo (2006) Realtime softwarematige radarscan conversie : met GPU programmeren.

Sivasubramanian, Kimsukha Selvi (2020) A comparative analysis of Post-Quantum Hash-based Signature Algorithm.

Skute, Igors (2014) Brand Equity and Co-Creation Potential in the Social Media Environment: an Analysis of Brand Engagement with Community Influencers.

Slabbers, Nanda (2006) Narration for virtual storytelling.

Slagman, Hermannus (2020) Presenting Automatic Analysis Of Uroflowmetry Curves.

Slatman, H. (2016) Unboxing security analytics : towards effective data driven security operations.

Slavova, S.I. (2021) Predicting the occupancy rates of truck parking locations : a machine learning approach.

Slebos, Stijn (2020) Modeling empathy in social human-robot interaction.

Sleurink, Matthias (2021) Automatic Generation of Test Cases for VerCors Verification Cases Failing with Null Errors.

Sleutjes, A.R. (2020) Identification of Profiles Based on Physical Behaviour Patterns.

Slomp, G.H. (2010) Reducing UPPAAL models through control flow analysis.

Sloot, Emma (2022) Electronic health record from a lab information system.

Slooten, N. van (2020) A maturity level assessment of process mining bottleneck analysis techniques.

Slootweg, M.H.F. (2015) Implementing and Characterising Medical Implantable Wireless Communication Using the Microsemi ZL70102 : And Prototyping a Load Measurement Tool for Unicompartmental Knee Replacement Operations.

Slot, M.C. (2017) The SocioMetricVis : Giving feedback during a brainstorm.

Slot, M.J. (2016) Ethics of Algorithms.

Slotman, BSc D.J. (2020) Item availability restricted.

Sluijsmans, Dennis (2011) Performance Evaluation of Data Dissemination Protocols for an Infrastructure-to-Vehicle Cooperative Traffic Light Application.

Sluiter, N.I. (2019) Influence Maximization in Social Networks by Injecting Memes.

Slutter, M.W.J. (2017) Creating a feedback system with the Myo Armband, for home training for frail older adults.

Smelik, R.M. (2006) Specification and Construction of Control Flow Semantics : a generic approach using graph transformations.

Smid, Wietse (2014) Ad-hoc context-driven changes in a business process management system.

Smink, Ruben (2021) Using functional dependency thresholding to discover functional dependencies for data cleaning.

Smit, Floris (2017) Applying data science to improve municipal youth care.

Smit, G.W. (2021) Calculating electrical footprint of personal internet use.

Smit, Kevin (2021) A high resolution grip strength measuring system for rehabilitation of hand conditions.

Smit, P.J.M. (2022) Visual place recognition under image corruptions.

Smit, Vincent J. (2020) Self-healing approximate multipliers in MAC.

Smith, J.P. (2021) Virtual Reality for Modular Construction in Industrial Heritage.

Smits, J.J. (2019) What does a Domain Name Say.

Smits, J.J. (2022) Improving integration Platforms as a Service through the addition of enterprise data catalog features.

Smits, J.P.G. (2022) Callisto - Selecting Effective Mutation Operators for Mutation Testing.

Smits, Paul L. (2019) Seizure onset detection for responsive stimulation in the sensorimotor cortex.

Smits, Pieter (2013) Rationales for Modern ICT Implementation into Schools: a case of tablet PCs.

Smoorenburg, Joost van (2021) Using mixed-reality in biopsy of lesions inside deformable organs.

Smulders, Bram (2007) SQLbusRT : real time data distribution and storage.

Smulders, Edwin (2013) User Space Memory Analysis.

Snaauw, G. (2017) Camera calibration for oblique viewing laparoscopes.

Snijders, T.G.A. (2019) Design and implementation of a supplier portal using an empirical snapshot, with a case example.

Snoyl, K.E.R. (2014) De effecten van het gebruik van het F-LinQ fotolijstje op de verbondenheid tussen ouderen en hun (klein)kinderen.

Soelen, R.P van (2018) Designing music lessons for the 21st century : make learning a musical instrument more fun, playful and modern.

Soelen, Robin van (2021) Creating an embodied music controller that can be used to control the arrangement of electronic dance music.

Sokolovas, E. (2021) Cell Detection in Whole Slide Images With Out-of-Focus Corruption.

Solovyeva, Olga (2022) Investigation of Quality Measures in Cyclists’ Dataset Using Dimensionality Reduction Techniques.

Sombekke, N.B.H. (2007) Graph-Based Semantics of the .NET Intermediate Language.

Sonderen, T. (2019) A Manual for Attack Trees.

Sondermann, Matthias (2017) Demand Response Interoperability for the residential European Energy Market - Identifying Standardization Gaps between a Demand Response pilot project and a proposed best practice.

Song, X. (2020) Generative Adversarial Networks of Missing Sensor Data Imputation for 3D Body Tracking.

Sonneveld, J.J. (2020) A gravitational approach for ranking Autonomous Systems in Large Autonomous System Networks.

Sosale Pavamana, Prasanna (2021) Improving Process Traceability Using Deep-Learning Based Unsupervised Feature Extraction.

Souilljee, M.L. (2021) Locating Selective Sweeps with Accelerated Convolutional Neural Networks.

Sowa, A.M. (2022) Development of a computer vision-based system for recognising fatigue of truck drivers.

Spaargaren, Rochelle (2021) Designing a user-centred feedback system that fosters creativity.

Span, Ruben (2009) Towards an enterprise performance management solution : a method to design and implement enterprise performance management.

Sparrius, T. (2021) Contest theory models of long-term advertising and short-term competitive behaviour.

Speelziek, M.D. (2006) Evaluating rapide using the FRODO service discovery protocol.

Spel, Jip (2018) Monotonicity in Markov chains.

Speldekamp, T.J. (2018) Disability insurance : predicting accurate inflow probabilities in an imbalanced data setting.

Spenkelink, Dennis (2006) Incremental Compilation in Compose*.

Spenkelink, H.F. (2014) The Adoption Process of Cryptocurrencies - Identifying factors that influence the adoption of cryptocurrencies from a multiple stakeholder perspective.

Spenkelink, J.S. (2018) Consumer-deployable network intrusion detection in public clouds.

Spenkelink, Roy David (2007) Porting Compose* to the Java Platform.

Spijker, B.C. van 't (2020) Classifying Classical Piano Music Into Time Period Using Machine Learning.

Spijker, Hanno (2012) Improving information dissemination in sparse vehicular networks by adding satellite communication.

Spijker, J. J. (2021) Plate localization on the Sensory Interactive Table.

Spijker, K. (2019) Identifying Users’ Skill Level through the Process Mining of Software Logs.

Spijkerboer, E. C. (2019) Blockchain based transaction processing system : a reference architecture for an integrated blockchain based transaction processing system.

Spijkerman, Wietze (2010) Tool support for change impact analysis in requirement models : exploiting semantics of requirement relations as traceabilitt relations.

Spil, Gino van (2017) Delay compensation in mobile face tracking.

Spil, Gino van (2021) Device optimization using machine learning with hybrid heat pumps.

Spink, Suzanne J. (2021) Smart Labelling.

Spoor, R.J.F. (2014) Design of a wall latching device.

Spoor, R.J.F. (2016) Design of an Ultrasound Guided Breast Biopsy End-effector.

Sprang, Angela V. van (2021) Path and Trajectory Planning by Model Predictive Control in Autonomous Racing.

Spruijt, Robert (2014) Selecting a BI Architecture that fits Organisation's Requirements.

Sreenivas, Gokul (2022) Mapping the hotel booking experience of an online travel agency (OTA) to optimize the payment flow and improve localization.

Sridhar Bangalore Venugopal, Sridhar Bangalore Venugopal (2019) Automatic Generation of Access Control List on Mellanox Switch For DDoS Attack Mitigation Using DDoS Fingerprints.

Srivastava, Siddhartha (2019) Benchmarking Facebook's Prophet, PELT and Twitter's Anomaly detection and automated de ployment to cloud.

Staal, Eric (2007) Simulation with Hamiltonian mechanics : creating a module for 20-sim.

Staal, P.J. (2020) An Analysis of Programming Paradigms in High-Level Synthesis Tools.

Staal, P.J. (2022) On Productive, Low-Level Languages for Real-World FPGAs.

Staicu, Cristian-Alexandru (2014) Evaluation of HIMMO with Long Identifiers, an Extension of the HIMMO Key Establishment Scheme.

Stam, R.G.R. (2022) Assessing organizations’ readiness for Agile at Scale adoption.

Stanculeanu, G.O. (2022) Assessing Russia’s isolation from the web following their invasion of Ukraine using the DNS root system.

Stankovic, Nikola (2020) Enhancing enterprise agility with Bizdevops method for Business-It Alignment.

Stapel, F.T.A. (2020) A Heuristic Approach to Indoor Rock Climbing Route Generation.

Stapersma, Paul (2012) Efficient query evaluation on probabilistic XML data : derived from a glue process with skeleton & flesh.

Starink, J.A.L (2021) Analysis and automated detection of host-based code injection techniques in malware.

Starink, O.A.W. (2015) State-Save Overhead Reduction Techniques for Shared Accelerators in an MPSoC with a Ring NoC.

Steeden, Remco van (2006) Communication-centric debug of systems-on-chip using networks-on-chip.

Steeg, D.P.M.H. van der (2014) Essay #65875

Steegh, E.G.A.J. (2021) Sentiment as a ground truth stance indicator against fake news.

Steeghs, G.G.T. (2017) Developing a smart rainwater buffering system for the municipality of Enschede.

Steen, H. van der (2008) Design of animation and debug facilities for gCSP.

Steen, J.L.P.J. van der (2006) Investigation of the band gap widening effect in thin silicon double gate MOSFETs.

Steenbeek, Anne (2020) CNN based dense monocular visual SLAM for indoor mapping and autonomous exploration.

Steenbergen, R.M. van (2019) New Product Forecasting with Analogous Products : Applying Random Forest and Quantile Regression Forest to forecasting and inventory management.

Steenbergen, Rik van (2021) Exploring pedagogical discourse data through LDA topic modelling, SSNA and thematic analysis.

Steeneken, Anna (2013) Tablet Gebruik voor Activerende Leeractiviteiten: Een exploratieve case study binnen het Vlaams beroeps en technisch secundair onderwijs.

Steenmeijer, L.D. (2020) Increasing the consistency of feedback on programming code by using a tagging system.

Steerneman, E.H. (2022) Exploring the effect of merging techniques on the performance of merged sparse neural networks in a highly distributed setting.

Stege, S. ter (2018) Blockchain in logistics : Is blockchain in logistics hyped, or has it true potential to be a game changer?

Stegeman, Lars (2018) Solitor : runtime verification of smart contracts on the Ethereum network.

Steghuis, Claudia (2006) Service granularity in SOA-projects : a trade-off analysis.

Stehouwer, J.H. (2006) Cue phrase selection methods for textual classification problems.

Steinebach, Teresa (2020) Web Accessibility : incorporating user requirements into a guide for usable web accessibility.

Stekelenburg, A. V. (2021) Providing Concurrency Guarantees Using An Event-Driven Language.

Stel, E.W. (2021) Process comparison for subpopulations of patients with heart failure.

Stellaard, Julian (2020) Tracking the process of an outbreak to a pandemic via logistical infrastructures : case study.

Stellinga, Anne (2007) A low-power second-order sampling receiver for Bluetooth.

Stemmer, Joel (2012) detecting outliers in web-based network traffic.

Sterenborg, Niek (2021) Designing a hardware accelerator for a selective sweep detection algorithm using high-level synthesis.

Sterk, Sjoerd (2015) Realisatie van rijgedrag verbetering d.m.v. een dashboard op basis van gamification.

Sterken, G.T. (2020) Developing an Agile performance management information system.

Sterrenburg, L.G. (2019) Design of an implementation method for customizable SaaS solutions.

Stevens, Stefanie Antonia (2017) Job satisfaction and work-life balance: an explorative study on remote workers.

Stijntjes, Ingo (2014) ASSESSMENT OF AUTOMATED CROWD BEHAVIOUR ANALYSIS BASED ON OPTICAL FLOW.

Stikkelorum, M.J. (2020) Automated discovery of BACnet relations from bus traffic.

Stiphout, A.J. van (2020) Comparison of Scheduling Methods for Different Cases of a Complex Flexible Job Shop Problem.

Stoev, Martin (2022) Online Parent Monitoring Tool.

Stoian, N.A. (2020) Machine Learning for anomaly detection in IoT networks : Malware analysis on the IoT-23 data set.

Stoica, E. (2022) A student’s take on challenges of AI-driven grading in higher education.

Stoica, Mircea (2012) Detecting the no-control state in self-paced Brain-Computer Interfaces.

Stojkovski, Borce (2015) Employing User-Centered Design methods for the development of a Virtual Reality training system for firefighters.

Stokkink, Gerjan (2012) Quiescent transition systems.

Stolp, D.G.A. (2009) Using ontology mapping to automate derivation of transformations for data integration.

Stortelder, R. (2019) Enabling centralized access to a reactive architecture for hardware control systems.

Stouten, Thomas (2020) Hide and seek : different scan methods to analyse peer-to-peer based blockchain networks.

Straathof, T. (2022) Prediction of energy consumption of rail freight transports using machine learning.

Strecke, Jonas (2014) A high torque variable stiffness mechanism for the 'VSDD': conceptual design, realization and experimental validation.

Stribos, R.H. (2021) The Impact of Data Noise on a Naive Bayes Classifier.

Strijbosch, D. (2022) Proposing an ontology for human-related crime recognition in videos.

Strijker, H.W. (2021) Ethernet implementation in Clash.

Stritzl, David (2019) Privacy-Preserving Matching Using Bloom Filters: an Analysis and an Encrypted Variant.

Strooisma, Ale (2016) A monitoring solution for multi-language software.

Stuurman, A. and Jongh, Dr. A. de (2020) Improving frequency estimation of fingerprint minutia configurations using automated pre-selection.

Stuurman, Gijs (2010) Action semantics applied to model driven engineering.

Stuyver, R. W. (2017) Assessing and redesigning processes in the pharmacy to improve pharmaceutical care.

Sugumaran, Shyamprasad (2021) Monitoring the daily change in cow's body weight in relation to cow health and behavior.

Suidgeest, Wouter (2021) Forensic Facial Recognition Utilizing Cartoonization Segmentation.

Suijdendorp, B. (2022) Item availability restricted.

Sulistyo, Pythia (2009) Inter-Organizational Strategic Information Systems Planning (IOSISP) in Network Perspective: How Network Governance Influences IOSISP Effectiveness Evaluation of Healthcare, Government and logistic/Transport Industry Sectors in the Netherlands.

Sulzer, Niels (2019) Hardware-Efficient Real-Time Statistical Analysis on Streaming Data.

Sun, Aiwu (2019) Building a virtual world in ROS based on the robot's perception.

Sundarapandian Raani, V. (2021) Modeling and analysis of board games.

Sung, Lilian (2021) Emoji Recommendation for Text Messaging.

Sustronk, J.J. (2019) Predicting New Web Pages on the World Wide Web Using Topological Features.

Sustronk, J.J. (2022) Analysing Cyber Threat Intelligence Data Using Fully Homomorphic Encryption.

Svarnovics, Vladislavs (2021) DataMatrix Barcode Read Rate Improvement Using Image Enhancement.

Swartjes, Ivo (2006) The Plot Thickens : bringing structure and meaning into automated story generation.

Sybenga, S.D.A (2016) Anomaly detection in defence and surveillance.

Szabó, Réka (2018) Penetration testing of AWS-based environments.

Szewczyk, J. (2022) Item availability restricted.

Sánchez Ortiz, Elvira (2020) Zero-Knowledge Proofs applied to finance.

Sözer, Hasan (2004) A peer-to-peer file sharing system for wireless ad-hoc networks.

Tafuro, M. (2021) Assessment of the contractile properties of engineered heart tissues by optical flow.

Tagliaro, Carlotta (2021) Item availability restricted.

Tahir, A. (2018) Predicting Young Soccer Players Peak Potential with Optimal Age.

Tareke, Bedru Wudye (2022) Visible cadastral boundary extraction using VHR remote sensing images: A deep learning approach.

Tariq, T. (2009) Extending CACI : implementing support functions for the context producer and designing a security Framework.

Tariverdiyeva, Gunay (2019) Chatbots’ Perceived Usability in Information Retrieval Tasks: An Exploratory Analysis.

Tas, J.G.A. van der (2018) Improving the container planning (process), by means of a planning tool.

Tax, Niek (2014) Scaling Learning to Rank to Big Data: Using MapReduce to parallelise Learning to Rank.

Tazelaar, Steven (2022) Automatic labeling of road quality using machine learning.

Teeffelen, K.J. van (2018) Intuitive Impedance Modulation in Haptic Control using Electromyography.

Teerenstra, G.H.G. (2016) The start of IT Governance in a Dutch Academic Medical Centre.

Teesselink, T. (2019) Identifying Application Phases in Mobile Encrypted Network Traffic.

Teijgeler, Stefan (2010) Connecting GROOVE to the world using XMI.

Teka, Abelneh Y. (2012) Analysis of indirect influence relations in goal-oriented requirements engineering.

Telgen, M.G. (2010) Realistic route choice modeling.

Tent Beking, Michiel van (2016) Item availability restricted.

Terpstra, E. (2017) Designing a requirements engineering process for performance monitoring.

Terrivel, M (2017) Computationally Efficient Vision-based Robot Control.

Terwellen, Christian (2012) Evaluating the behavior of embedded control software - using a modular software-in-the-loop simulation environment and a domain specific modeling language for plant modeling.

Teschner, J. (2016) Serious Games in Medical Education : as Learning Tools.

Tesfay, Tesfahun Aregawy (2013) Automatic distribution analysis of business processes for cloud-based BPM.

Tetteroo, Arend-Jan (2006) Bomb-Proof Server : benodigde technieken en producten voor een high availability systeem en hun consequenties voor beschikbaarheid.

Teunen, Freek (2017) Item availability restricted.

Teunissen, G. (2020) Machine learning for all : a methodology for choosing a federated learning approach.

Teunissen, T. (2019) Success factors for RPA application in small and medium sized enterprises.

Theodorakopoulos, Daphne (2022) Identifying Covid-19 Shortages with the Help of an Automatically Constructed Knowledge Graph.

Theodorus, Abraham (2020) Restoration of damaged face statues using deep generative inpainting model.

Theuns, J.K.H (2017) Visualising Origin-Destination Data with Virtual Reality: Functional prototypes and a framework for continued VR research at the ITC faculty.

Thijssen, P.G.H. (2020) OCL constraints in GROOVE.

Thirukokaranam Chandrasekar, Krishna Kumar (2016) Tracking and Control of Soft, Self-Folding Miniaturized Agent using Ultrasound Images.

Thomson, B.R. (2019) Automated vascular region segmentation in ultrasound to utilize surgical navigation in liver surgery.

Thoonen, M.A.W. (2019) Hardening FPGA-based AES implementations against side channel attacks based on power analysis.

Thunnissen, J. (2015) Communication solution for ICU patients : a case study.

Tian, Pin (2021) Extracting Measured Properties for Numerical Data with SciBert model and Question Answering.

Tian, X. (2022) Reconstruction-based Anomaly Detection with Machine Learning for High Throughput Scanning Electron Microscope Defect Inspection.

Tigelaar, Almer S. (2008) Automatic discussion summarization : a study of Internet fora.

Tijdeman, M.C. (2021) Adapting occlusion-based latent representation to work with geospatial data.

Tijhuis, K. (2013) Methods for modelling unit operations in chemical process simulators.

Tijmes, M. (2009) Simulation of a ring resonator-based optical beamformer system for phased-array receive antennas.

Tijssen, S.B. (2021) Designing an interface for a Digital Twin to optimize data transfer and visual cues.

Tilburg, A. van (2022) Submodular functions and M-convex sets.

Tilburg, A. van (2022) Submodular functions and M-convex sets.

Timmer, I.R. (2018) Anomaly Detection of malicious TLS traffic.

Timmer, M. (2005) How to identify the speed limiting factor of a TCP flow.

Timmer, M. (2008) Evaluating and predicting actual test coverage.

Timmerman, L.D. (2022) WM/Reuters fixing rate prediction for algorithmic FX trading using machine learning.

Timmerman, Luc (2022) Performance Testing Owl, Parser Generator for Visibly Pushdown Grammars.

Tinselboer, Koen (2007) The use of rare key indexing for distributed web search.

Tintelen, B. F. M van (2019) Designing a Machine Learning Decision Tree for Information Systems: A study into the implementation of supervised and unsupervised machine learning methods.

Tintelen, B.F.M. van (2022) Feature extraction and selection on sparse, complex, sensor-based exhaled-breath data sets.

Tjeerdsma, R. (2017) Developing a backend solution for ISO15118-driven EV charging with Plug-and-Charge.

Tjink-Kam-Jet, Kien-Tsoi T.E. (2009) Result merging for efficient distributed information retrieval.

Todorovic, D.Q. (2022) Bringing Intelligence to Wireless Sensor Nodes: Improving Energy Efficiency and Communication Reliability in Sensor Nodes.

Tokarczyk, F. (2020) Predicting overcrowding in the acute care domain using random forest regression.

Tol, K. M. van (2020) Ons Berichten 2.0. : Researching communication in elderly care, disabled care and mental health care for the proposal of a new messaging function within Ons.

Tol, K.M. van (2017) Developing a stimulating environment in a residence facility for dementia patients.

Tolboom, L.C. (2022) Exploring type 2 asthma phenotypes and taking steps towards measurements of respiratory mechanics during exercise.

Tolle, T. (2017) Filtering social media data streams.

Tolman, Jim (2018) Evaluation of a multi-user virtual reality system for collaborative layout planning processes.

Tommassen, P. (2009) Wacky Pirate Hijinks : causing and resolving conflict between autonomous agents in a virtual storyworld.

Tomov, N. (2022) Converting binary decision diagrams to and-inverter graphs using prime-irredundant covers.

Tonchev, Viktor (2022) Using accelerometer and gyroscope sensors to differentiate between eating movements associated with different foods.

Torbecke, Janina (2017) Symbolic Model Checking with Partitioned BDDs in Distributed Systems.

Torn, I.A.R. (2017) The future of purchasing and industry 4.0 : how purchasing can progress and benefit the fourth industrial revolution.

Torres Cano, Andrés Felipe (2019) Automatic aviation safety reports classification.

Treub, T.P. (2021) Creating a Virtual Reality Application for Transporting Items.

Trienes, Jan (2019) Comparing rule-based, feature-based and deep neural methods for de-identification of Dutch medical records.

Trillhose, Frank T. (2016) Controlling the production cell using TERRA-LUNA.

Trouwborst, C. (2017) Towards increased autonomy of a rail-guided robot for the inspection of ballast water tanks.

Trusin, Cristian (2022) The effect of the Russian-Ukrainian conflict on the Internet from the perspective of Internet eXchanges.

Tsige, Girma Zewdie (2022) Scan-vs-BIM automated registration using columns segmented by deep learning for construction progress monitoring.

Tsigkou, Maria-Elena (2020) Criteria of information value in information retrieval : the context of Housing Corporation Risk Management.

Tsintsov, Y.K. (2022) A Comparison Between the Effectiveness of a Virtually and a Physically Present Robot when Evoking Prosocial Behavior in Humans.

Tuijn, Jasper Aartse (2007) Partial session mobility in context aware IP-based multimedia subsystem.

Tuin, Vincent van der (2007) Computer-Aided Security Surveillance : design of the Quo Vadis Object Tracker.

Tuininga, Frits Sieds (2019) Accelerating Model Driven Platforms: A study into the predictability of business process models.

Tuinman, BSc Philippe (2020) Enthusing Young Secondary Schoolers for Informatics Education.

Tuinstra, Annefie (2021) Virtual Reality Rowing.

Tujner, Zsolt (2019) Quantum-safe TOR, post-quantum cryptography.

Turkoglu, Mehmet Ozgur (2018) Essay #75933

Twelkemeijer, R. (2008) Design of an audio power amplifier with a notch in the output impedance.

Tzani, Donika D. (2021) Using Enterprise Architecture for controlling complexity and improving business performance.

Tziampazis, Christodoulos (2019) Exposure Assessment on Medical Devices in the Netherlands.

Udrea, Mihnea-Adrian (2021) A Comparative Study on Pre-trained Classifiers in the Context of Image Classification.

Uebbing, Tobias J. (2016) User experience in smart environments : design and prototyping.

Ugen, Mattijs (2013) Scalable performance for a forensic database application.

Ugryumova, D. (2010) Control design for a chemical disinfection process using the residence time distribution.

Uithol, Michiel (2008) Security in domain-driven design.

Ulici, Diana Laura (2021) Choosing a Suitable Query Engine for Providing Observability and Accessibility for Dynamic Reporting of Business Data.

Ungrund, Philipp (2021) Developing a Web-based Tool for Teaching the Effects of Pooling on Queueing Systems.

Urban, Wojciech (2022) Studying human behaviour to prevent successful spear-phishing attempts.

Utomo, Diana (2014) A framework for cloud adoption from Enterprise Architecture and Business Perspective. Validation case study: The implementation of cloud-based contact distribution in Philips Consumer Lifestyle.

Vacariu, P. (2021) PIRATE Robot Autonomous Navigation through Complex Pipe Networks using Reinforcement Learning.

Vada, H. (2022) Comparative analysis of multi-factor authentication schemes for Internet of Things.

Vaish, P. (2022) On multi-stage job processing with asymmetric transition costs between operations.

Valk, D.J. van der (2019) RPi-based passive 5-camera system for 3D face acquisition.

Valk, J.J. van der (2010) The in uence of a target motion model on the exact Bayesian filter recursion; research by particle filtering.

Vallinas Prieto, Ander (2019) Time-domain passivity enforcement for mass reduction in admittance control.

Valtulina, Luca (2013) Seamless distributed mobility management(dmm) solution in cloud based lte systems.

Vanwinsen, W. (2021) Evaluating the performance of simulated IMU data for animal activity recognition.

Varenhorst, I.A.M. (2022) GridShield : Robust Control Algorithms to Prevent Power Outages.

Varkevisser, R.A. (2016) Large Scale Online Readability Assessment.

Varris, V. (2020) Using adversarial reinforcement learning to evaluate he IMMUNE risk-assesment.

Vashistha, G. (2021) Robot assisted needle positioning system for liver biopsy.

Vasileiadis, Leonidas (2019) Remote runtime detection of tampering and of dynamic analysis attempts for Android apps.

Vasterd, M.F.J. (2021) Generative adversarial models for privacy-preserving release mechanisms.

Veelen, P. van (2007) Clustered acoustic modelling in speech recognition.

Veen, Dirk van (2011) Secure searching through encrypted data - Creating an efficient Hidden Vector Encryption construction using Inner Product Encryption.

Veen, G.F.P. van (2013) Brain Invaders - Finding the paradox of control in a p300-game through the use of distractions.

Veen, H. van der (2015) Composing a more complete and relevant Twitter dataset.

Veen, Marcel van der (2007) Sparse matrix vector multiplication on a field programmable gate array.

Veen, R. van der (2021) Agile development of applications as a medical device in a small enterprise.

Veenstra, A. (2021) Accelerating mixed-level coverage array generation.

Veenstra, G.W. (2019) Generating high frame rate MR images using surrogate signals.

Veer, D. van der (2016) Design of a GMSK Receiver Prototype on a Heterogeneous Real-time Multiprocessor Platform.

Vegt, M. E. M. van der (2019) Compressed Set Representations and their Effectiveness in Probabilistic Model Checking.

Vegt, Mick van der (2019) Using data to improve financial behavior : designing the personal finance platform.

Veitmaa, Eva Maria (2020) Gallery of Heartbeats : soma design for increasing bodily awareness and social sharing of the heart rate through sensory stimuli.

Velden, J. van der (2020) Blacklist, do you copy? Characterizing information flow in public domain blacklists.

Veldhuijsen, Gerald van (2006) DICOM Image Retrieval.

Veldhuis, Anouk (2020) Implementation and design of a postoperative follow-up application.

Veldhuis, H.D. (2015) Developing an automated solution for ETA definition concerning long distance shipping.

Veldhuis, J.W. (2009) Tool support for a metamodeling approach for reasoning about requirements.

Veldman, I. (2009) Matching profiles from social network sites : similarity calculations with social network support.

Veldman, T.C. (2022) A Machine Learning Approach to the Detection of Malfunctions in HVAC Units.

Velinov, Bozhidar (2021) Insourcing and outsourcing of IT in Small- and Medium-sized Enterprises.

Velner, J. (2008) Integrated state-of-charge circuit for rechargeable batteries.

Velzel, M.M. (2020) Design2Struct : Generating website structures from design images using neural networks.

Ven, F.R. (2020) Forecasting yearly unplanned maintenance on underground waste containers based on maintenance history and demographics.

Venema, M. (2016) DM3730 Camera interfaces on Gumstix.

Veneman, R. (2021) Real-time skin cancer detection using neural networks on an embedded device.

Venis, A.J. van de (2015) Recommendations using DBpedia : how your Facebook profile can be used to find your next greeting card.

Ventur, F. (2020) Deficient testing databases : a reliability-driven evaluation of privacy models providing a trade-off between data integrity and re-identification risk.

Verberkt, S.L.C. (2012) Claiming security properties in a service oriented architecture.

Verbij, Ruud Paul (2014) Dutch e-voting opportunities. Risk assessment framework based on attacker resources.

Verbraak, F.M. (2019) Universal Basic Income Reforms and Household Composition : A Behavioural Microsimulation Analysis.

Verbree, A.T. (2006) On the structuring of discussion transcripts based on utterances automatically classified.

Verburg, F.M. (2022) Exploring explainability and robustness of point cloud segmentation deep learning model by visualization.

Verburg, J.G.J. (2018) Supporting the Innovation Process of Industrial SMEs Using Mobina: The first design cycle using mockups and a validation focus group.

Vercammen, S.A.A. (2014) Displaying intermediate results for on-going searches.

Verdonkschot, S.F.G. (2007) Design and implementation of a trusted RFID reader.

Verhaar, Jort (2015) Micrometer scale 3d membrane printing towards locust ear imitation.

Verheij, J.G.J. (2016) Co-simulation between CλaSH and traditional HDLs.

Verheijen, D. (2022) Teaching Array Verification Using Snap!

Verhoeven, G.A.G. (2021) 'Samen Sterk': The design choices for a tool that represents non-numeric information for patients after an open heart surgery.

Verhoeven, Gijs (2018) The design of a storytelling and learning by teaching activity with a social robot as teachable main character, for primary school language learning.

Verhoeven, P.L. (2019) Adaptability by Design: Incorporating Adaptability Constructs in the Design of Digital Business Ecosystems.

Verio, I. (2022) Low Cost Connectivity for Household Appliances using Low Power Wide Area Network (LPWAN).

Verkerk, Lotte (2022) Improving the planning process by developing a forecasting model : predicting future demand based on historical information.

Verkleij, Jelmer (2017) Behavioural analysis of program intent using data origins, influence and context.

Verkleij, Martijn (2019) Teaching programming using industry tools.

Verkuil, B. (2021) Automatic failure analysis for big data-driven industry.

Verkuil, S. (2016) CiteRep - Journal Citation Statistics for Library Collections using Document Reference Extraction Techniques.

Verlinden, M.G. (2017) StepFarm: An Active Video Game to Support the Self-Management of Chronic Diseases in Children.

Verloop, Christiaan (2018) Developing a serious game as a tool for collecting data on food waste behavior.

Vermast, Alissa (2019) Using VR to induce smoke cravings in low literate or intellectually disabled individuals who have a smoking addiction.

Vermeij, Jaap (2018) Creating an IT risk maturity model for distributed ledger applications.

Vermolen, R.M. (2012) The red queen’s race: from delivery stories to effort estimation: an empirical study.

Versloot, C.W.A. (2019) Amplifying the Analyst: Machine Learning Approaches for Buried Utility Characterization.

Versloot, Corne (2007) Cross-document named entity coreference resolution for Dutch as a pre-process for named entity based text mining.

Versluijs, Wouter (2015) Understanding Information Technology : information technology as extension and its implications for the flourishing of the individual.

Verstoep, Bart (2018) Approximate multipliers for MAC.

Verver, Maks (2013) Practical improvements to parity game solving.

Vervuurt, Mark (2007) Modeling business process variability : a search for innovative solutions to business process variability modeling problems.

Verzijl, Peter (2017) Using serious games to teach cause effect relationships in asphalt quality.

Vetter, Boaz (2017) Designing a smart rainwater buffer.

Vettorel, Diego (2015) Design a platform for providing home-based services concerning: care, safety, comfort and fun.

Vieth, Z.J. (2022) Point cloud classification and segmentation of catenary systems.

Vijgh, M. van der (2020) A comparison of open-source real-time online learning frameworks for neural networks.

Vijver, B. van de (2016) A Human Robot Interaction Toolkit with Heterogeneous Multilevel Multimodal Mixing.

Vine, P.H. (2021) Training Facial Recognition with Synthetic Faces.

Vinke, D. (2016) Enhancing Video Game Design: Involving Users into the Design of Video Games.

Vinne, Sietze van der (2022) Impact of user density increase on 802.11ax based Network Optimization.

Visscher, C. (2021) Towards Cyber Incident Response on Naval Ships: The Cyber Incident Response Decision Model.

Visschers, S.H.J. (2019) Perception-aware visual odometry.

Visschers, Stephan H.J. (2019) Perception-aware Visual Odometry.

Visser, Jesse Wiebe (2022) Automated Detection of Provisioning Events and Prey in Nestbox Video Footage.

Visser, N.S. (2015) Fully automated web harvesting using a combination of new and existing heuristics.

Visser, Thomas (2011) Toward a model for incremental grounding in dialogue systems.

Visserman, H.A. (2019) Group Activity Recognition Using Channel State Information.

Vitanov, Vesselin (2018) The asteroid field of your mind : examine neurofeedback effects in an interactive art installation.

Vlasveld, J. (2007) On context in context-aware ICT applications.

Vlieg, Edwin (2010) Usage patterns for user-centric service composition.

Vliek, G. (2009) Detecting spam machines, a netflow-data based approach.

Vliet, T.B. van (2019) Development of a smart wearable : to monitor the physical activity of elderly hip fracture patients during their rehabilitation.

Vlutters, S. (2016) Long short-term memory networks for body movement estimation.

Vocke, Tom (2015) An evaluation of the Adapteva Epiphany Many-Core Architecture.

Vogel, Koen (2020) The feasibility of low-cost Virtual Reality motion tracking for rowing technique analysis.

Vogelzang, K.H. (2017) The tennis trainer : development of a Myo armband application.

Voicu-Spineanu, A.O. (2021) FPGA Acceleration of a hierarchical clustering and data fusion application for disease subtype discovery.

Volz, N. (2020) Human-centred design for sustainable behaviour change : research, design and evaluation of a mobile application.

Vonk, J. (2013) Formal specification and verification of OpenCL Kernel optimization.

Vonk, Jeroen (2016) Bisimulation Reduction with MapReduce.

Voorberg, M. (2021) A performance analysis of membership datastructures in Java.

Voorend, R.W.A. (2021) Deep Unsupervised Representation Learning For Animal Activity Recognition.

Voorst, B. van (2010) Cluster-based collection selection in uncooperative distributed information retrieval.

Voortman, N.E.F. (2022) Modelling OSA Diagnosis and Treatment using UPPAAL.

Voortwis, K.J. W. te (2021) A picture is worth 1000 words : Introducing the visual modality to the query dependent video clip selection process.

Vor dem Berge, Moritz Frederik (2017) Digital privacy : behaviour and anxieties of a young digital generation.

Vording, R.M. (2021) Harvesting unstructured data in heterogenous business environments; exploring modern web scraping technologies.

Vorstenbosch, S. (2015) On-premise to SaaS Integration Risk Mitigation A framework to gain insight in the risks, and recommend mitigation strategies, specific to on-premise to SaaS integration.

Vos, Geert (2008) Issues of iterative mda-bades software development processes.

Vos, M.C. (2020) Finding lower bounds for the competitive ratio of the cow path problem with a non-optimal seeker.

Vos, Matthijs (2019) Characterizing infrastructure of DDoS attacks based on DDoSDB fingerprints.

Vos, Matthijs (2022) Capability Maturity Measurement of a Security Operations Center through Analysis Detection.

Vos, Peter-Jan (2015) Demonstrator combining ROS/TERRA-LUNA.

Vossebeld, F.R. (2022) Towards understanding social interactions through audio signals.

Vossen, J.J. van (2016) Offloading Haskell functions onto an FPGA.

Vouzavalis, Antonios (2020) Capturing car market dynamics in the transition towards electric mobility in an agent-based simulation model.

Vredeveld, G.W.R. (2020) Invaluable measurement networks and their critical infrastructure : Uptime discrepancy localization and network improvements.

Vredeveld, G.W.R. (2020) Invaluable measurement networks and their critical infrastructure : uptime discrepancy localization and network improvements.

Vrielink, Jasper D. (2009) Phased array processing: direction of arrival estimation on reconfigurable hardware.

Vrielink, S.B. (2006) Situational reinforcement learning : learning and combining local policies by using heuristic state preference values.

Vries, A.J. de (2021) Developing an Educational Tool for Teaching Software Architecture.

Vries, A.J.K. de (2008) Improving reliability of streaming radio.

Vries, E. de (2009) Touchscreen interaction for healthcare applications.

Vries, Ernst de (2022) Improving the creation process of digital platforms : a design pattern reference model.

Vries, J. de (2015) The Generation of Booter (black)lists.

Vries, J.F. de (2018) Redesign & Implementation of a Moment Exchange Unicycle Robot.

Vries, J.J. de (2016) A Tick Based Fixed Priority Scheduler Suitable for Dataflow Analysis of Task Graphs.

Vries, L R de (2017) Informatica: ontwerp van lesmodule 'Gezichtsuitdrukkingen in sociale robotica'.

Vries, L. R. de (2019) Barge Collaborations within Container Logistics : A collaboration to increase the efficiency of barges and barge planning.

Vries, L.J.W. de (2019) IOTA Vulnerability: Large Weight Attack Performed in a Network.

Vries, L.J.W. de (2021) Detection of DoH tunnelling : comparing supervised with unsupervised learning.

Vries, M.P. de (2022) Private Information Retrieval applied to Biometric Verification.

Vries, R.H. de (2019) Walker: Automated Assessment of Haskell Code using Syntax Tree Analysis.

Vries, R.H. de (2021) Clash of Clangs : differential testing of srcML and Clang.

Vries, S.H.S. de (2016) Achieving 128-bit Security against Quantum Attacks in OpenVPN.

Vries, W.B. de (2014) How asymmetric is the Internet? A Study to support DDoS Mitigation approaches.

Vrijkorte, A.B. (2006) Semantics in service-oriented architectures.

Vugt, M.M.P. van (2019) The potential of synthetic training data for training deep learning models.

Vuijk, J.G.J. (2022) Device-free monitoring of vital signs to support emotion-aware music systems for people with dementia.

Vulpoiu, Ruxandra (2018) Machine Learning Applications in Financial Advisory.

Waalewijn, Dennis (2014) Cyber Security in the Supply Chain of Industrial Embedded Devices.

Waanders, M.J.C (2014) Approximation Algorithms for Connected Graph Factor Problems.

Waard, D. de (2022) User preference in conditional and unconditional grounding in turn-based spoken dialogue systems.

Wackerle Garcia, L.M. (2020) Analysis of heuristics with random shortest path metrics on sparse graphs.

Wackerle Garcia, L.M. (2020) Analysis of heuristics with random shortest path metrics on sparse graphs.

Wagenaar, J.C.N. (2014) Collaborative Cyber Security in the Retail Sector.

Wagenaar, P. (2012) Detecting botnets using file system indicators.

Wal, Djurre van der (2018) Translating AWN networks to the mCRL2 model checker: en route to formal routing protocol development.

Wal, Ewout van der (2021) Rosetta ANTLR: Ultimate Grammar Extractor.

Wal, Jelmer ter (2013) Specification and verification of selected parts of the Java Collections Framework using JML* and KeY.

Wal, L.E. van der (2021) Using dtControl to process schedulersproduced by the Modest Toolset.

Wal, Tjalling van der (2011) Streaming workflow transformation.

Walle, R. C. M. van der (2019) Streaming array modelling and generating VHDL with Python.

Walsh, Ricky (2022) Finding Balance: A Study of Class Imbalance in Deep Learning Classification of Breast Cancer.

Wan, Xin (2021) Generating IMU Data for Horse Activity Recognition from Horse Videos.

Wanders, Brend (2011) Exploring signalling pathways as a serious game.

Wang, H (2018) Understanding low resolution facial image from image formation model.

Wang, Haitao (2017) Redesign of the E-Cone: A tool for treatment of hand disease.

Wang, Q. (2016) A reference architecture for integration platforms.

Wang, Wenhui (2021) Finding and Exploiting Vulnerabilities in Embedded TCP/IP Stacks.

Wapperom, Sjoerd (2014) Computational Modelling of Suspect Behaviour in Police Interviews.

Wardhana, Girindra (2018) Automatic Segmentation and 3D Reconstruction of Liver and Tumor.

Warmer, Martin (2011) Detection of web based command & control channels.

Wasbeek, Edwin van (2006) A repository for the management of artifacts in system engineering.

Wassenaar, J.D. (2018) Linking segments of video using text-based methods and a flexible form of segmentation : How to index, query and re-rank data from the TRECVid (Blip.tv) dataset?

Wasserfuhr, Veit (2022) A Literature Review of Methods, Approaches and Tools to Automate the Process of Systematic Literature Reviews.

Waterink, J. (2018) Development of a DIY and consumer ready Smart Rainwater Buffer.

Waterink, Jeroen (2020) Item availability restricted.

Waterval, R. (2022) How information sharing on online social networks may allow for personalized cyberattacks.

Waveren, S. van (2018) Automatic image caption generation for digital cultural emages collections.

Weber, Vincent (2014) UTFM - a Next Generation Language and Tool for Feature Modeling.

Weele, J.H.D. ter (2009) Onderzoek naar de gebruikersvriendelijkheid van boekingsformulieren.

Weener, Jeroen (2021) Libertas: A Backward Private Dynamic Searchable Symmetric Encryption Scheme Supporting Wildcard Search.

Weers, F.R.T. (2019) Automatic home video editing on music.

Weers, F.R.T. (2022) MaskCLIP : masking improves transfer for visual models trained with natural language supervision.

Weggemans, J.R. (2020) Solving Correlation Clustering with the Quantum Approximate Optimisation Algorithm.

Wei, Kaiyu (2022) Dynamic Parameter Tuning Method With Presets For Metaheuristics.

Weidmann, Sophie (2021) Learning Analytics for Atelier.

Weijden, Erik van der (2005) Structuring argumentation in meetings : Visualizing the argument structure.

Weijers, D.S. (2019) Forecasting Airport Passenger Flow to Improve Cleanliness Perception in Restrooms.

Welling, Ruud (2014) Conflict detection and analysis for single-pushout high-level replacement.

Wels, S.J. (2019) Guaranteed-TX : The exploration of a guaranteed cross-shard transaction execution protocol for Ethereum 2.0.

Wentink, D.J.M. (2017) Signal Recovery using CλaSH.

Wentzel, S. D. (2019) Evaluating Information Retrieval Systems for Children in an Educational Context.

Werf, Dagmar van der (2022) Assisting Self-study at the University of Twente Through Student Tutors and Digital Solutions.

Werf, Daniel van der (2021) Information Technology and Data Use in 1PL - 4PL Logistic Companies.

Werf, R.J. van der (2008) The Embodied Conversational Agent Toolkit : a new modularization approach.

Werf, S.J. van der (2014) Measuring Workload at a ProRail Control Post.

Werff, W.M. van der (2016) Connecting ROS to the LUNA embedded real-time framework.

Werink, Rens (2019) On the control allocation of fully-actuated and over-actuated multirotor UAVs.

Wesselink, B.H.T. (2021) Item availability restricted.

Wessels, P.D. (2018) Leveraging behavioural domain models in Model-Driven User Interface Development with GLUI.

Westenberg, R.M. (2014) Managing customer innovation in the financial services industry: A technology acceptance perspective.

Wester, Rinse (2010) A dataflow architecture for beamforming operations.

Westerdijk, W.S.K. (2017) Sound Swarm : experience sound from the inside.

Westerik, Lars (2020) Increasing performance personnel department Company X.

Westerveld, J.P. van (2020) FPGA partial reconfiguration and automatic variant generation as a side-channel attack countermeasure with functional HDL Clash.

Westmijze, M. (2009) Memory optimizations on the sequential hardware-in-the-loop simulator.

Westra, Wybe (2018) Virtual Reality Clothing Design.

Wettum, Y.C. van (2017) Facial landmark tracking on a mobile device.

Wettum, Y.C. van (2021) Item availability restricted.

Weustink, T. (2020) Forecasting promotional demand in the FMCG industry.

Wevers, Gerben (2014) Hardware accelerator sharing within an MPSOC with a connectionless NOC.

Wevers, Gerben G.A. (2014) Hardware Accelerator Sharing within an MPSoC with a connectionless NoC.

Wevers, K.J.M. (2022) Is a hot dog a sandwich? Generating conversation starters that categorize a word in an unusual way.

Wevers, Lesley (2012) A persistent functional language for concurrent transaction processing.

Wicaksana, J. (2021) Comparison of different types of cluster algorithm on Netherland telecommunication provider solutions.

Wicaksana, M.A. (2016) IPv4 vs IPv6 Anycast Catchment: a Root DNS Study.

Wicaksono, Sulistyo Unggul (2012) Enterprise knowledge : reference architecture for visualization and prototype implementation using Wiki.

Wiedijk, R.R.A. (2019) Code Instrumentation with Mod-BEAM.

Wiefferink, C.A. (2022) APEx: Zero-shot Cross-Knowledge Graph Named Entity Extraction leveraging Wikification.

Wiefferink, BSc C.A. (2019) Visualizing the Performance of an Anycast Network.

Wiefferink, T.W. (2018) Combining usage and profile data for retrospectively analyzing usability of applications with funnels.

Wiegers, R.F.P. (2014) Behavior specification for ontologically grounded conceptual models.

Wiekens, Adri (2011) Feedback presentation for physical activity coaching: by an embodied conversational agent or by a simple e-mail?

Wielstra, Biense Adrianus (2014) Assessing the Impact of Business Process Redesign Decisions on Internal Control within Banks: A Methodology.

Wierbosch, Mark (2014) It is raining packets.

Wieren, H.D. van (2019) Signature-Based DDoS Attack Mitigation: Automated Generating Rules for Extended Berkeley Packet Filter and Express Data Path.

Wierik, H.R. te (2022) Developing a gamification program to motivate users in pre-existing e-learning courses.

Wieringa, J.K. (2021) Bot for continuing airworthiness : proof of concept for passenger carrying drones.

Wieringa, Wilko (2012) User Handover in a Cross Media Device Environment, A Coaching Service for Physical Activity.

Wijburg, K.M. (2020) The state of statechains : exploring statechain improvements.

Wijgerse, Steven (2007) Generating realistic city boundaries using two-dimensional Perlin noise.

Wijk, M.G.W. van (2022) The Quest for the Best Thread-Safe Java List.

Wijlens, B. (2019) Building a framework in Clash to create deterministic sensor and actuator interfaces for FPGAs.

Wijlens, Bart (2016) Intelligent heating of a room.

Wijnands, M.P.J. (2021) Explaining black box decision-making : adopting explainable artificial intelligence in credit risk prediction for P2P lending.

Wijngaard, Jelle van den (2022) Placement of Electric Vehicle Charging Stations in Congestion Games.

Wijngaarden, Pieter van (2008) Error tolerance analysis of the Telefónica de España optical fibre network.

Wijnholt, R. (2017) Design of a real-time network channel in LUNA.

Wilde, Lisa de (2016) A Bayesian Network Model for predicting data breaches caused by insiders of a health care organization.

Willems, L.J.T. (2020) Detect people on a device that fits in the palm of your hands.

Willems, P. (2017) Mood controlled affective ambiences for the elderly.

Willems, W.J.M. (2019) Validation of a Datafication Canvas.

Willemsen, B. (2021) Recognition of crystals in synovial fluids by a neural network.

Willemsen, Bernard J. (2021) Creating Solvable Instances for Unsolved Puzzles.

Willemsen, M.J. (2018) Improving diagnosis by Grouping Test Cases to Reduce Complexity.

Wilmes, Daniel (2022) A general optimization framework for soft robotic actuators with analytical gradients.

Wiltenburg, Daan H. (2019) Aggression Based Audio Ranking : Annotation and Automatic Ranking.

Windhouwer, Dennis (2014) The Modularity of the Resource Utilization Model in Python.

Winkel, J.D. te (2006) Applying Composition Filters to C.

Winsen, Stijn van (2017) Threat modelling for future vehicles : on identifying and analysing threats for future autonomous and connected vehicles.

Winters, A. (2020) Examining the effect of hyperparameters on the training of a residual network for emotion recognition.

Wismadi, M.T. (2022) The relation between street pattern and traffic congestion, an investigation through machine learning approach.

Wit, Jeroen de (2013) Continuous forensic readiness.

Wit, Joost de (2008) Evaluating recommender systems : an evaluation framework to predict user satisfaction for recommender systems in an electronic programme guide context.

With, L.A. de (2020) Using Functional Near-Infrared Spectroscopy to Detect a Fear of Heights Response to a Virtual Reality Environment.

Withaar, T. (2005) Analyzing joint-measurements using 3D scancs and statistical models.

Witlox, K.H.D. (2019) Face unmorphing.

Witte, N. (2014) Technology Acceptance of Business Meetings in a 3D Virtual Environment Supported by a Content Management System.

Witte, S.W. de (2022) Designing a camera-based automated food tracking app.

Witteman, M.T. (2007) Efficient proximity detection among mobile clients using the GSM network.

Wittendorp, T.J.J. (2020) Locomotion control interface for a remote robot (Avatar).

Wittendorp, T.J.J. (2022) Pig localization using computer vision.

Witteveen, C.P.T (2020) Measuring the effectiveness of feedback on code of novice programmers.

Wittingen, E. M. (2021) Creating a solver for Kwirk (Puzzle Boy).

Wohlfahrt-Laymann, Jan (2017) CogniDecline : tracking mobile interaction for cognitive assessment.

Wolbers, J.J.H. (2017) Attracting Passersby into a Building using an Interactive Installation.

Wolbers, J.J.H. (2020) Synchronized co-located interreality collaboration : analysis, design, and usage of a prototype research environment.

Wolbers, P.W. (2022) Posture as stress indicator in eSports.

Wolbers, S. (2015) Participatory design approach to improve the communication between care providers through the electronic health record.

Wolf, E.R.B. de (2016) Designing an interaction method for the holograms of today.

Wolf, E.R.B. de (2021) Pervasive technology as scaffolds for mindful living: reframing calm technology.

Wolf, Geronimo (2021) Detecting wine taste using Recommender Systems.

Wolf, T. (2016) Design of an Air Factor Sensor based on Light Emission.

Wolterink, T.J.L. (2009) Operational Semantics Applied to Model Driven Engineering.

Wolters, N.H. (2016) Analysis of Attack Trees with Timed Automata (transforming formalisms through metamodeling).

Wolters, S.H.G. (2017) Smartwatch and Intellectual Disability : Designing an app that improves the lives of people with an intellectual disability and their caretakers.

Wolters, S.H.G. (2021) Accelerated Implementation of 3D Visual EKF SLAM For Handheld Perfusion Imaging.

Wooning, I.J. van (2018) Optimood : Transforming Health Data into Practical Advice and Insights.

Wotte, Y. P. (2021) Optimal Potential Shaping on SE(3) via Neural Approximators.

Woudstra, M.H. (2020) Exploring Possibilities to Increase Ease of Use of ITPortfolio Management.

Woudstra, Martijn (2022) Designing a container management solution to improve flexibility and portability, and reducing cost for iPaaS solutions.

Wu, Sheng Chih (2021) Generation of Lung CT Images Using Semantic Layouts.

Wu, Xian (2012) Modeling and performance evaluation of wirelesshart.

Xhymshiti, Meriton (2020) Domain independence of Machine Learning and lexicon based methods in sentiment analysis.

Xia, Lichen (2020) How vehicles’ speeds influence the optimal configuration and performance of the C-V2X.

Xia, Ziyang (2019) Speech technology to support interventional radiologists by assisting the hands-occupied problem.

Xiang, Y. (2017) How is emotion change reflected in manual and automatic annotations of different modalities?

Xie, Chenghong (2017) Design of an m-health application for low-literacy diabetes patients in India.

Xu, Tingting (2016) The Effect of Cultural Difference on the Perception of Online Ordering Website Design.

Xu, Zihao (2022) Overground vs. treadmill: where is my horse running? Context detection based on IMU data.

Yadav, Shubham (2019) An Asynchronous Approach for Designing Robust Low Power Circuits.

Yakushkina, Daria (2021) Digital Transformation in conditions of pandemic.

Yang, R. (2021) Didactic visualization for a searchable encryption.

Yasmin, Fitri Almira (2019) Enhancement in process mining : guideline for process owner and process analyst.

Yazdani, R. (2019) Detection of Malicious IDN Homoglyph Domains Using Active DNS Measurements.

Ye, Xiaohao (2015) GlucOnline Coach: a virtual coach app for diabetes patients.

Yeleshetty, Deepak (2020) Item availability restricted.

Yenidogan, Berk (2020) 30-Days post-operative mortality prediction of elderly hip fracture patients.

Yeung, Chin Man (2019) Effects of inserting domain vocabulary and fine-tuning BERT for German legal language.

Yeung, T. (2021) Using virtual reality for a controlled evaluation of a haptic navigation wearable for people with a visual impairment.

Yin, Haihan (2010) Developing a generic debugger for advanced-dispatching languages.

Yin, L. (2022) Characterizing types of convolution in CNN for step detection using IMU data.

Yoe, P.C.A (2018) Analysis for a possible implementation of a machine learning algorithm in the packaging process.

Yousefimashhoor, S. (2022) Deep learning on MLS point clouds : feasibility of improving semantic segmentation result using part segmentation.

Yu, J.J. (2017) Essay #75354

Yu, S. (2020) Fingerprint recognition based on spectral minutiae representation and deep learning.

Yuan, Ye (2020) Improving information retrieval by semantic embedding.

ZOMPAS, A. (2016) Development of a three dimensional path planner for aerial robotic workers.

Zaag, Heleen van der (2019) Transferring soft-skills through a digital medium: A proof of concept for co-creation facilitators.

Zadelhoff, L.D. van (2020) Assigning inbound flights to baggage retrieval belts: A simulation study on the impact of stochasticity on the performance of different assignment heuristics.

Zaga, Cristina (2014) Engaging child-robot interaction in a collaborative task.

Zakiy, Mochammad Fadhli (2016) HW-SW co-Design of an On-Chip IJTAG Dependability Processor.

Zamani, M.R. (2018) Post-Quantum Secure Authentication Methods Suitable For Quantum Key Distribution.

Zandberg, K. (2016) Passive fingerprinting on an IPv6-enabled network.

Zandberg, Koen (2020) Dataflow-Based Model-Driven Engineering of Control Systems.

Zandberg, Martin (2012) Optimization of aspect-instantiation strategies in the JIT-compiler.

Zandbergen, N. (2020) Illuminated feedback in an online classroom : Will it help or hinder?

Zande, M.J. van de (2019) Leveraging zero-knowledge succinct arguments of knowledge for efficient verification of outsourced training of artificial neural networks.

Zanden, Guido van der (2010) Quality assessment of medical health records using information extraction.

Zanderink, Arnold (2012) Drum assistant.

Zanetti, Nicola (2015) Concept-drift in web-based IDS : evaluating current capabilities & future challenges.

Zarghami, S. (2013) Middleware for Internet of things.

Zeilstra, J. (2016) Reasoning about Active Object Programs.

Zeng, Xiangshuai (2019) Reinforcement learning based approach for the navigation of a pipe-inspection robot at sharp pipe corners.

Zhang, F. (2022) Dashboard design for MiniSoccerBal 3.0.

Zhang, K. (2020) Applying questionanswering for the Mendeley Search Engine to improve user search experience.

Zhang, S. (2020) Algorithms for planted clique recovery in random geometric graphs.

Zhang, Yi (2018) Situated breakdowns in video mediated communication.

Zhao, Wenjie (2022) How different virtual reality environments influence job interview anxiety.

Zhong, Yuanyang (2020) Studying black and white textures for visualizationon on e-ink displays.

Zhu, Tingting (2022) The Media Bias of COVID-19 in Different Countries.

Zhu, Zhiyong (2022) Improving the Personal Health Train approach with Electronic Data Capture Systems.

Zieverink, Niek (2022) Frog Counting Tool.

Zijden, W. van der (2017) Multi-Tenant Customizable Databases.

Zijsling, Boris (2018) Dedicated Ambient Displays.

Zissoldt, J.E. (2020) Topic modeling in memories of elderly.

Zonneveld, T. van (2021) 3D finger vein patterns : acquisition, reconstruction and recognition.

Zulkarnaen, Z. (2019) Separation of Interaction Wrench and Wind Disturbances from Wrench Observer in Fully-Actuated UAVs.

Zwan, J.M. van der (2020) Detection and tracking of events using open source data.

Zwart, Nynke A. (2021) Agents presenting themselves as Strangers duringPrivacy Permission Requests: Effects on Disclosureand Privacy Awareness of Children.

Zwerus, Robert (2007) Storing Personal Information Management data: Akonadi - unifying PIM data for KDE.

Zwet, Dennis van der (2020) Assessing road quality and driver behavior using movement sensors in wrist worn devices.

Zwienenberg, Jesse (2021) Neural implicit representations for diffeomorphic medical image registration.

d'Angremont, E. (2018) Towards an automated analysis for the delineation of focal epilepsy : single pulse electrical stimulation and machine learning.

Özen, Anıl (2020) Finding notes within Boomwhackers Recordings.

Şakar, Ö.F.O. (2020) Extending support for axiomatic data types in VerCors.

Šatcs, D. (2020) Understanding the lightning network capability to route payments.

This list was generated on Sat Nov 26 06:03:05 2022 CET.