University of Twente Student Theses

Login

Domain: 54 computer science

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Year | Item Type
Jump to: Essay
Number of items: 3175.

Essay

A., E. (2014) Item availability restricted.

Aakster, Y.M.I (2017) Designing an interactive intervention to unconsciously steer residents of a dementia care facility away from the exit.

Aalbertsberg, A.P. (2018) Synthesis and development of a big data architecture for the management of radar measurement data.

Aalten, Thijs van (2021) Online optimization of EMG using a hybrid model approach.

Aanen, Mattijs (2023) GNSS-Based Time Synchronisation for Distributed Radio Localisation on Software-Defined Radio.

Aanstoot, D. (2022) Graph rewriters as components.

Abbema, F. van (2022) Performing Bisimulation Minimisation To Parity Game Strategies To Improve Controller Quality.

Abbing, J.R. (2020) Semantic segmentation of minimally invasive anti-reflux surgery video using U-NET Machine Learning.

Abdela, Nesredin (2023) Deep learning-based Digital Surface Model (DSM) generation using SAR image and building footprint data.

Abdul Cader Hasanain, Mohamed Asif Hassan (2019) Item availability restricted.

Abeywardana, Hasini (2023) Near real-time analysis of tactics techniques and procedures of attacker groups on their relevancy to an Organisation.

Abraham, R. (2021) Symbolic LTL Reactive Synthesis.

Abraham, Remco (2019) A Formal Proof of the Termination of Zielonka's Algorithm for Solving Parity Games.

Abreha, Gebremedhin Teklemariam (2014) An environmental audio-based context recognition system using smartphones.

Adamse, J.C.W. (2023) UAV deployment for flood-resilient mobile networks: a data-driven analysis for the Netherlands.

Admiraal, A.J. (2010) Automated ANTLR tree walker generation.

Admiraal, C.P. (2023) Calculating the modernity of popular python projects.

Adolfsen, Martijn (2011) Industrial validation of test coverage quality.

Adriaansen, A.M.A. (2015) Balancing inventory and equipment contingencies by a flexible semiconductor supply chain simulation model.

Adriani, J (2021) Measuring Eating Speed with the Sensory Interactive Table.

Aertsen, M.Y. (2014) Verifying functional requirements in multi-layer networks: a case for formal description of computer networks.

Afia, A. (2022) The impact of graph properties on the complexity of attack tree analysis.

Agen, Wouter van (2021) Concept development for Line isolation cutter.

Aggelen, J.M. van (2017) Using virtual reality to support substance use disorder treatment in people with an intellectual disability.

Agung Julius, A.A. (2001) Evolution of the modal densities of a class of stochastic hybrid systems.

Agustini, Try (2021) Sentiment Analysis on Social Media using Machine Learning-Based Approach.

Ahmad, Fajri (2019) Enterprise Architecture Mining.

Ahmad, Sadat (2023) Designing a detailed telemetry dashboard for sim-racers.

Ahmadov, Parviz (2022) Evaluating pose estimation and object detection models for the application in the minisoccerbal project.

Ahmed, A.B.H. (2020) Balancing security and usability in Web Single Sign-On.

Ahmed, F. (2010) Relations between semidefinite, copositive, semi-infinite and integer programming.

Ahmed, Owais (2017) Item availability restricted.

Akbar, Nurul (2014) Analysing Persuasion Principles in Phishing Emails.

Aker, W.J. (2018) Towards a reference architecture for privacy aware health care organizations.

Akker, H. op den (2009) On adressee prediction for remote hybrid meeting settings or how to use multiple modalities in predicting whether or not you are being addressed in a live hybrid meeting environment.

Akkerman, H.J. (2021) Using credibility to stop the spread of fake news.

Alam, Ashiful (2012) Business information management and the cloud.

Albers, Etiënne H.M. (2022) Environmental considerations in supply chain decisions: Proposing a new methodology for locating cross-docking terminals considering CO2e emissions.

Albers, J. (2021) Item availability restricted.

Alberts, K.J. (2021) Comparison of different types of auto-encoders for data cleaning.

Alberts, L. (2020) Static verification for Snap!

Albertsson, Vincent Gustav (2023) Analyzing descriptive captions for crime recognition in surveillance footage.

Alblas, H.J. (2020) Predictive maintenance of Dutch civil infrastructure: a structured approach.

Alemneh, E. (2010) Sharing nonlinear gates in the presence of glitches.

Alikhujaev, A. (2023) Microservices In IoT-based Remote Patient Monitoring Systems: Redesign of a Monolith.

Aljabary, Mahmoud (2021) Automatic Generic Web Information Extraction at Scale.

Allah Bukhsh, Zaharah (2015) BPMN Plus : a modelling language for unstructured business processes.

Allahverdiyeva, Aydan (2021) Empathetic Textual Speech of Conversational Agents in Client-Centered Therapy.

Almkerk, Marc van (2018) Influence of mindfulness practices on feelings of place illusion in virtual reality.

Alofs, Thijs (2012) The Interactive Storyteller A multi-user tabletop board game interface to support social interaction in AI-based interactive storytelling.

Alvear Cárdenas, Juan Diego de (2023) Digital Transformation Management for CDOs.

Amato, Alessandra (2023) Applications of Early Warning Systems for Customer Segmentation of Wholesale Banking Clients.

Ambrosius, Frank (2007) Modelling and distributed controller design of the bodeRC paper-path setup.

Ambrosius, J.I. (2019) The design of a validation experiment for the Tissue Active SLAM model.

Ambrosius, R.B.P. (2007) Elektronische leeromgeving met gebarentaalherkenning : Grafische user interface oplossingen voor ambigu¨ıteitproblemen van een gebarentaalherkenner voor een elektronische leeromgeving voor dove en slechthorende kleuters.

Amerongen, J. van (2023) A qualitative comparison of specification techniques for microservice architectures.

Ammerlaan, W.S. (2022) Enabling joint exploration of virtual environments for treatment of substance use disorders using an asymmetric virtual reality approach.

Amouei, Morteza (2023) Classification of urban morphology and its relationship with air pollution using deep learning.

Amptmeijer, R.S. (2023) An Interactive Installation for the MuseumFabriek in Enschede.

Ampudia, Ricardo (2021) Visible Light Positioning for Unmanned Aerial Vehicles.

Amrin, Nabila (2014) The Impact of Cyber Security on SMEs.

Amur, Sri Harsh (2022) Intelligent Wifi Access Points for Diverse User needs: QoS Slicing in SDN Controlled APs.

Anagnostopoulos, Nikolaos Athanasios (2014) Optical fault injection attacks in smart card chips and an evaluation of countermeasures against them.

Anaigoundanpudur Karthikeyan, Naveenaa (2021) Cryptographic Implementation of Issuer Policy for Self Sovereign Identity Systems.

Ananda, Artha Sejati (2004) Design and simulation of non-zero and zero dispersion optical lattice wavelength filters.

Andreev, L. (2016) Sociometric badges in a high-stakes setting : living proof a sociometric feedback visualization.

Andrei, Vlad-Cristian (2023) The security impact of DNS and TLS on the websites reconnaissance process.

Andringa, André (2023) Irregular Polygon Strip Packing for the Production Process Transition of the Fashion Industry.

Anghel, C. (2022) Effect of image quality in computer vision for semantic segmentation of road images.

Aniraj, Ananthu (2020) Item availability restricted.

Anjanappa, Geethanjali (2022) Deep learning on 3D point clouds for safety-related asset management in buildings.

Annink, E.B. (2022) Preventing soft-errors and hardware trojans in embedded RISC-V cores.

Anoniem, A. (2023) Item availability restricted.

Antonowycz, A.J. (2024) Computing Electro-Optical and Radar coverage in near real-time.

Anwar, Mian Tashfeen Shahid (2022) Techniques to Process point cloud data to perform HAR using Machine learning.

Appel, R.N. and Folmer, H.H (2016) Analysis, optimization, and design of a SLAM solution for an implementation on reconfigurable hardware (FPGA) using CλaSH.

Apriyadi, R.A. (2021) MODEST language syntax for structural model parameters.

Apriyandi, Dimas (2024) A Smart Tourism Platform Reference Architecture for Developing Countries.

Aregay, Tesfay (2014) Ranking Factors for Web Search : Case Study in the Netherlands.

Arend, M.Q.T.P. van der (2023) The LAMP Framework - A language-agnostic code quality assurance framework for multi-paradigm languages.

Arends, Simon Daniël (2020) Quantity meets quality for mined process models through simulated events.

Arican, Tugce (2019) Optimization of a patch-based finger vein verification with a convolutional neural network.

Ariëns, D.L.R. (2023) Self-assembled Magnetic Carpets for Cargo-Transport of Millimetric Planar Objects.

Arkel, Lars van (2020) Demonstrating runtime assertion checking using Snap!

Arnold, L.H.A. (2020) Security in V2I projects : incorporating security into a framework for communication between connected cars and infrastructure.

Arora, G.S. (2021) Exploring Possibilities to Improve Distant Dining Experience for Young Expats with their Loved Ones over Time and Space Gap Issues.

Arrieta Larraza, N. (2022) Few-shot deep learning models for acoustic scene classification in low-complexity scenarios.

Artolozaga, I. (2022) From personal to community knowledge : stimulating knowledge sharing among student groups in knowledge management platforms through interaction design.

Artolozaga, Iñigo (2020) Mental health care in a pandemic : a survey from a design and interaction perspective.

Arum, S.R. van (2024) TumbleTooth, an ADL-based home rehabilitation aid for hand-stroke patients.

Arva, D. (2021) Using artificial intelligence to mitigate file injection attacks in emails.

Arva, Denis (2023) Secure Integration of Third-Party Code in SaaS.

Aslam, Suhaib (2020) Designing a ubiquitous artifact for enhancing the digital wellbeing of smartphone users.

Assaad, Malek (2022) Link Vulnerability Aware Task Deployment over Edge and Cloud.

Assen, Jorrit van (2021) General Game Playing with imperfect information in GROOVE.

Assen, M.H. van (2023) Integrating the Five Steps of Plotting: A Plotting Tool Design.

Assies, Daniël (2021) Developing a Smart Telemetry Feedback System for Sim Racing.

Aström, F.K. (2019) JOY x UT. : Designing an e-Health web-platform to promote joyful physical activity amongst university employees.

Asuncion, C.H. (2009) Goal-driven service mediation solution.

Atketin, Namik (2007) Ontwikkeling van een interactieve model-gedreven E-formulier generator.

Aulia, A. (2019) Designing a Mobile Digital Payment Application for Gas Stations in Indonesia.

Averchenko, Illya (2023) Computer Vision for Crime Recognition Based on Skeleton Trajectories.

Averkin, Konstantin (2021) You are the weakest link - identifying single-rack points of failure in the DNS.

Avramov, V.R. (2022) Automated grading of programming exams with JUnit and Semgrep.

Azani, Maryam (2020) Supply Chain Control Tower Reference Architecture for Exception Monitoring and Real-Time Incident Management.

Açikalin, M.A. (2019) Profiling Recursive Resolvers at Authoritative Name Servers.

Aņikevičs, Germans (2021) Relationship Between Vendor Popularity and Prices on Dark Web Marketplaces.

BOON, R.N. (2017) Automatic detection of anomalies in times series data Big data for smart maintenance.

Baaij, C. (2009) CλasH : from Haskell to hardware.

Baalen, R.B.C. van (2015) Is serious gaming the holy grail for the wearables industry?

Baalman, Philippus (2007) Van mono naar multi: een automatische VJ.

Baardewijk, Jan Ubbo van (2018) Automatic annotation of the cooking process.

Baardman, Roel (2010) Cumulus Humilis : wireless mesh-networking for gliders.

Baars, D.S. (2016) Towards self-sovereign identity using blockchain technology.

Baas, S.P.R. (2016) A machine learning approach to the automatic classification of female uroflowmetry measurements.

Baas, T. (2022) Creating standardized process mining applications based on the open trip model.

Babakhani, Bayan (2008) Implementation of a 2D master-slave system.

Bachir Kaddis Beshay, Amir (2023) Cold-start Active Learning for Text Classification of Business Documents.

Backx, Niels (2006) On the design of a mobile e-health platform ¿ towards deployment flexibility.

Badarinath Hampiholi, Brinda (2014) Secure & privacy-preserving eID systems with Attribute-Based Credentials.

Badea, Florentina (2019) A method to improve the application portfolio m anagement decision-making process through stakeholder involvement.

Badin, Y. (2016) Contextual Authentication : Using Mobile Phone Movements to Authenticate Owners Implicitly.

Badrajan, Alen (2023) Technical and Security challenges of Cloud-based Storage Management for IoT Devices.

Baesjou, Bertrand (2007) Improving dependability of OSS access to a hierarchical distributed ad-hoc NMS.

Bakker, Alexander (2018) OSSUM : a framework for determining the quality of Information Security Assessment Methodologies.

Bakker, D.R. (2019) Impact-based optimisation of BGP Flowspec rules for DDoS attack mitigation.

Bakker, D.R. (2022) Autonomous emulation of adversary procedures in the (pre-)compromise domain.

Bakker, J. (2021) Calculating the Risk of Valve Failures when Maintaining Water Supply Networks.

Bakker, Jeffrey (2023) Short-Term Passenger Flow Forecasting in Public Transportation Networks Under Event Conditions.

Bakker, M. (2015) Numerical mathematics on FPGAs using CλaSH.

Bakker, Michiel (2020) Model validation for stochastic hybrid automata.

Bakker, P.J. (2010) Train composition using motion as a common context.

Bako, Adam (2018) Presenting temperature measurements of public spaces in Enschede.

Baksi, Shreyo (2018) Kiosk for 3D image acquisition of suspects.

Balamurali, S. (2022) An exploratory study to design and evaluate a dialogue system for a robot assisting the elderly in a care environment.

Balciunas, J.K. (2021) Real-Time Interrupt-driven Concurrency (RTIC) for Modern Application Processors.

Balen, J. van (2009) A virtual billiard assistant.

Baligudam, R. (2022) A Systematic Study of Gender and Religion Bias in Stories.

Balistreri, G. (2018) Spatial Analysis of Out-of-Hospital Cardiac Arrest Incidences.

Balk, Roland (2016) SQLento: database programming made easier.

Balkema, Wietse (2004) Realization and characterization of a 2.4 GHz radio system based on frequency offset division multiple access.

Bals, J. (2022) A comparative analysis of the multi-factor authentication protocols presented in the literature.

Bamberg, Rob (2012) Non-deterministic generalised stochastic petri nets modelling and analysis.

Bandi, S.S.A. (2020) Inter-subject synchrony and emotional dynamics in magnetoencephalographic signals during music stimulation.

Bankert, J.J.M. (2016) Comparison of Symbolic and Distributed Representation Language Models on the Lexical Substitution and Simplification Tasks.

Bannink, S.N. (2018) Risk Management in Cloud Environments: Towards the Adoption of Continuous Auditing and Assurance With EU-SEC.

Banu, R. (2020) Internet of nano-things in human cancer detection.

Barathidhasan, Shanmathi (2023) Deep Learning Framework for Urban Impervious Surface Mapping Using Open Multisource Geospatial Data.

Barbara, Mario Alessandro (2019) Proof of All : Verifiable Computation in a Nutshell.

Barbero, Marta (2018) Reinforcement learning for robot navigation in constrained environments.

Barbieri, G. (2016) Control architecture for docking UAVs with a 7-DOF manipulator.

Barbosa, Rafael Ramos Regis (2009) On Access Network Identification and Characterization.

Basarabă, R.C. (2021) Investigating safety and security interactions using the BDMP formalism : case study of a DDoS attack on Liberia.

Batenburg, B. (2022) Performance of DNS over QUIC.

Bauhuis, Jan-Willem (2022) The future use of radiotherapy in the treatment of NSCLC and SCLC: a prediction.

Bayuaji, Rayhan Aryoseno (2021) Designing Compassionate Technology for Mental Health.

Beckers, Mr D.K. (2014) Information waste on the World Wide Web: combating the clutter.

Beek, Daan van (2013) Comparing the LTSmin and NuSMV reachability tools via automatic translation of their respective input languages.

Beekman, L.J.D. (2021) Procedural location generation with weighted attribute grammars.

Been, Henry (2013) Finding you on the Internet : Entity resolution on Twitter accounts and real world people.

Beernink, G.J. (2022) Taking the quantum leap: Preparing DNSSEC for Post Quantum Cryptography.

Beestman, Linda (2014) Interactive whiteboard use in elementary education : How to support teachers to improve their education, using the interactive whiteboard.

Beets, Fedor (2018) Privacy-preserving automated rental checking.

Beijnum, A.C.W. van (2021) The state of DNSSEC provisioning automation.

Beijnum, A.C.W. van (2023) Haly : Automated evaluation of hardening techniques in Android and iOS apps.

Beke, Chris ter (2017) Interaction development for personal daily support : design of conversational agent for activity tracking.

Bekkaoui, A. (2004) Link performance of the time offset transmitted reference system.

Bel Makhfi, Abdel Aziz (2023) Reliable low-latency networking: many radios, many paths.

Belchev, B. (2022) Recommendations on bias : detect, mitigate, repeat.

Beld, J.J. van de (2022) Multimodal post-operative complication prediction for elderly patients with hip fractures.

Belois, T.M.L. van (2024) Parents, You Are Not the Only Ones Struggling With Childrens’ Questions : Exploring Childrens’ Preference for Clarification Methods Used by Voice Assistants.

Belt, S.P. van den (2021) Facial marks : detection and integration into a facial recognition system.

Benen, N.J. (2020) Using Graphviz to create aesthetically pleasing LaTeXdrawings of graphs.

Benitah, R.J. (2023) Cyclist weight inference from bicycle-mounted sensor data.

Benjamins, Stan and Duin, Jesse van der and Nie, Heleen van and Plekkenpol, Luca (2021) Hoe wordt EUS de beste keus? : Optimaliseren van endo-ultrasonografische beoordeling ter onderscheiding van T1 en T2+ rectale carcinomen met behulp van deep learning.

Benkhelifa, M.R. (2022) Layout management on an interactive tabletop system.

Benthem, T.S. van (2018) Visualizing business performance : real-time BI-dashboards.

Berends, S.B. (2021) ML Governance Within Banking: A study into the oversight of ML model development and compliance.

Berendse, S.E. (2020) Exploring semantic segmentation in rowing images.

Berendse, S.E. (2023) Towards explainable machine learning for prediction of disease progression.

Berens, Menno (2006) De tevredenheid over shared service centers in de publieke sector : het succes van shared service centers en de oorzaken daarvan in de inrichting en het functioneren van de klant-leverancierrelatie.

Berenschot, L. (2022) Vital signs monitoring with an FMCW radar sensor.

Berg, A.W. van den (2015) Improving customer satisfaction through personalization.

Berg, B. van den (2018) Stimulus related evoked potentials around the nociceptive detection threshold.

Berg, Boudewijn van den (2014) Visual tracking of magnetic microrobots in biomedical research applications.

Berg, C. van den (2023) Design of a No Reference Random Bin Picking System For Metal Plate Parts.

Berg, D.A. van den (2015) The risks and benefits of spreadsheet-based financial reporting as a form of shadow it in complex information systems: an action design research leading to the FRASIT-framework.

Berg, F.I. van der (2013) Model checking LLVM IR using LTSmin : using relaxed memory model semantics.

Berg, J.L. van den (2020) An interactive visualization explaining probabilistic fault tree computations.

Berg, M.A van den (2022) The estimation of rodent population in an area with the use of IR&RGB camera images and USV sounds.

Berg, R.T. Van den (2019) Designing a small and low-energy wildlife tag for parakeets within an urban environment capable of tracking and online activity recognition.

Berg, Ruben van den (2008) Interaction capabilities of Second Life : a framework to determine Second Life's suitability for a 3D virtual world application.

Berg, S.C.B. van den (2021) A simulation-based serious game in appointment scheduling for service facilities in health care.

Berg, T.M. van den (2016) Radar sensing for automotive parking distance control applications.

Berg, Thomas van den (2023) The effect of IP prefixes on BGP visibility.

Berg, W. van den (2015) A systems approach to the design of a management information system for a growing IT service company.

Berge, C. ten (2022) Reverse engineer discontinued KUKA I-do robots and make them applicable for educative use.

Bergen, Marcel van (2007) Design and prototyping of a human-computer interface for a desktop tele-classroom conference application.

Berger, Kenaan (2020) Adoption of agile methods in automotive software development.

Bergervoet, Erwin Josephus (2011) Let the game do the talking : the influence of explicitness and game behavior on comprehension in an educational computer game.

Berghuis, Lars (2021) Using the Wisdom of the Crowd to Digitalize : Designing a workshop-based process selection method for the identification of suitable RPA processes.

Bergmans, R.H.J. (2019) Computer-aided diagnosis for CT based clinical triage of ischemic and hemorrhagic stroke patients : a deep learning and quantitative image analysis approach.

Bergsma, D. (2019) Porting tree-based hash table compression to GPGPU model checking.

Berkel, A.R.R. (2016) The new Luxon : a research into software expansion in the Lighting-as-a-Service market.

Berkel, A.R.R. (2019) Integration of clinical decision support systems in Dutch radiology departments.

Berkel, Niels van (2015) Item availability restricted.

Berkhoff, M.H. (2020) VRwonder : the development & implementation of a Virtual Reality application for people with dementia.

Bernard, Tobias (2018) Design and evaluation of spatial interfaces in virtual reality.

Bertolotti, E.M. (2020) Automatic segmentation of pelvic floor ring on 3D ultrasound.

Bessi, Maouheb (2023) Trajectory Prediction on an ego-bike with IMU and camera using a Multi-State Constraint Kalman Filter​.

Beukema, W.J.B. (2016) Enhancing Network Intrusion Detection through Host Clustering.

Beuker, W. (2019) Multi-rate discrete fourier transform characteristics : results of models, simulations, and measurements.

Beunder, K.M. (2018) Correlating features of malicious software to increase insight in attribution.

Beune, P.F. (2021) Classifying the Network Capacity of the Dutch IPv4 Address Space.

Beune, P.F. (2023) Lightweight Public Key Infrastructure for IoT.

Beunk, L.D.R. (2019) Tangible Tools and Techniques: Co-designing with Locked-In Syndrome.

Beusink, J.W.C. (2012) Secure access contol to personal sensor information in federations of personal networks.

Bezemer, Maarten (2008) Analysing gCSP models using runtime and model analysis algorithms.

Bhaskar, Rushvanth (2022) A Day in the Life of NTP : Analysis of NTPPool Traffic.

Bhaswara, I.D. (2020) Exploration of autoencoder as feature extractor for face recognition system.

Bhowmick, Anubrata (2021) Markers of Brain Resilience.

Bhutto, Muhammad Ramish (2022) Automating Privacy Policy Extraction And Summarization.

Biabani, Hamza Azhar (2022) A Closer Look at the Email Phishing Landscape.

Bie, D.R. de (2020) Image Similarity Ranking Applied to the Forensic Domain.

Bie, J.A. de (2018) PTA as an approach to fault tree analysis.

Biesbroek, Rudolf (2014) Last-mile lightpath services : on packet-switched shared infrastructure.

Biggelaar, M.E.C. van den (2012) Social media in het middelbaar beroepsonderwijs? Kansen en belemmeringen van social media voor het taal- en rekenonderwijs in het middelbaar beroepsonderwijs.

Bijker, K. (2023) Can you feel my sign? Sending shapes to a haptic display.

Bijker, Remko (2010) Efficient pointcut projection.

Bijl, M.H. de (2020) Encoder-Forecaster-Decoder: a Modular Deep Learning Framework for Cloudage Forecasting.

Bilgin, Mustafa Hayri (2023) Enhancing Fault Diagnosis in Cyber-Physical Systems : A Model-Based Approach with Bayesian Networks.

Bink, T.I. (2021) Requirements for disseminating sensing information to caregivers of persons with dementia.

Birton, Laurentiu (2021) Compressed Convolutional Neural Networks for the Classification of Electrocardiogram Signals on Embedded Devices.

Biswas, Biman (2022) Deep Learning-based Multimodal Fusion of Sentinel-1 and Sentinel-2 Data for Mapping Deforested Areas in the Amazon Rainforest.

Bitew, Semere Kiros (2018) Logical structure extraction of electronic documents using contextual information.

Blaas, R.M. (2019) Recipe and Meal management mobile application for Willieanne.nl.

Blankendal, Göran (2012) Building an Xtext compiler for Aspect-Oriented Languages based on ALIA4J.

Blankestijn, Arjan (2022) Millimeter-Wave Connectivity in Real World Vehicle-To-Vehicle Network Scenarios.

Bleeker, Chris (2024) Measuring Code Modernity in Rust.

Bleeker, D.A. (2019) DoS attack on recursive resolvers with DNSSEC key-tag collisions.

Bleumink, C. (2022) Verifying the Rewrite Rules of VerCors Using Interactive Theorem Provers.

Bloem, E.J.W. van (2008) The user oriented knowledge management method : a knowledge management method for a small organization with a distributed environment.

Bloem, R.J.G. van (2008) A data transformation walkthrough.

Bloemen, S.P.R. (2022) Designing a dashboard development methodology for heterogeneous stakeholders in Dutch nursing homes.

Bloemen, Sander (2018) Designing an application for focussed surveys.

Bloemen, V. (2015) On-The-Fly parallel decomposition of strongly connected components.

Blok, J.E. (2024) Digital Product Passports : Increasing Transparency in the Fashion Industry.

Blok, T. (2019) ZITA : a self learning tutoring assistant.

Blokhorst, S.H.M. (2019) Graphical User Interface for Fault Tree Analysis.

Blom, Koen (2009) DVB-S signal tracking techniques for mobile hased arrays.

Blommendaal, Chris (2015) Information Security Risks for Car Manufacturers based on the in-Vehicle Network.

Blondel, Joppe (2021) Distributed Control Algorithm for Cooperative Autonomous Driving Vehicles Inspired by Flocking Behaviour.

Bloo, F.W.C. (2018) Towards updatable smart contracts.

Blum, Paul (2023) Lexical Alignment in Collaborative Interactions with a Conversational Agent.

Blumink, Remco (2008) Implementing and communicating with SHILS.

Bockting, S. (2009) Collection selection for distributed web search : using highly discriminative keys, query-driven indexing and ColRank.

Bode, M. S. P. (2017) How to Design an Interactive Installation for Concordia.

Bode, Max (2019) Evaluation of an augmented reality assisted manufacturing system for assembly guidance.

Boe, M. (2022) Realtime and Onboard fault diagnosis of UAV motors using RNN prediction model.

Boedeltje, Michel Ronald (2005) In response to your inquiry : Automatic E-mail Answer Suggestion in a Dutch Contact Centre.

Boekhoudt, N. (2021) Decriminalisation of cannabis : the effects on the drug market via the dark web.

Boelders, F.B. (2018) Developing a Ready2Help Application.

Boensma, Robert (2015) Geovisualization and time based mission planning on a multi-touch tabletop.

Boer, Frans de (2021) Active Learning on Embedded Devices.

Boer, G. (2016) Vertrouwen in telepresence bij ouderen : het effect van technische storingen op het delen van persoonlijke informatie.

Boer, P.B. den (2020) Inner Join Privacy : incorporating functionality-privacy trade-offs in Mobility-as-a-Service Solution design methods.

Boer, S. de (2022) Pre-Processing Whole-Genome Datasets To Improve The Execution Time Of Selective Sweep Detection Tools.

Boer, S.L. (2021) Depth estimation on synthesized stereo image-pairs using a generative adversarial network.

Boer, S.O. de (2021) Digital Identity; A cyber resilience evaluation of the European digital identity e-commerce requirements.

Boer, S.O. de (2021) Digital Identity : A cyber resilience evaluation of the European digital identity e-commerce requirements.

Boer Rookhuiszen, Roan (2011) Generation of German narrative probability exercises.

Boerdonk, R.A.C. van (2016) Pensioenbewustzijn: Kan IT hieraan bijdragen?

Boerman, J.G.J. (2023) Formal verification of a sequential SCC algorithm.

Boerrigter, T.H. (2021) Augmenting the process of schema matching with machine learning-based Intelligence Amplification.

Boersen, N. (2019) Digital billboard damage detection using computer vision.

Boersma, C.H. (2017) Improving the product search process through interface redesign.

Boersma, C.H. (2019) Designing a platform to communicate posture and movement data to medical professionals.

Boersma, Kitty (2019) Using Influencing Factors and Multilayer Perceptrons for Energy Demand Prediction.

Boersma, Kitty (2023) So long and thanks for all the (big) fish : exploring cybercrime in Dutch Telegram groups.

Boeve, T. (2022) Comparative analysis between fast and basic scalar multiplication used in elliptic curve cryptography.

Bogaard, C.H.M van den (2020) Thwarting File-Injection Attacks on Searchable Encryption via Client-side Detection.

Bogaard, J.A. van den (2015) Predicting the performance of ERP in a changing and challenging energy market.

Bohlmeijer, M.W. (2024) Systematic Literature Review on Interaction Design used for Museum Learning.

Bojorge-Alvarez, J. (2022) Re-assessing the effectiveness perimeter security & exploring attack surfaces at the Port of Rotterdam.

Bokhove, T. (2016) Improving the model management workflow.

Bokhove, Tom (2014) Public data visualisation in traffic, based on local, real-time monitoring.

Boksem, Jorn (2022) Finding ways to improve the prediction accuracy of a model that predicts the outcome of a football match using machine learning.

Bol Raap, W (2016) The design of a common data model for generic synchromodal cargo-tracking in logistics using web scraping and big & open data.

Bolding, T.G.J. (2019) Applying Peak-Shaving to Household Devices using an Event-Driven Algorithm.

Bolhuis, M (2014) Using an NFC-equipped mobile phone as a token in physical access control.

Bolhuis, M. (2015) Estimating Creditworthiness using Uncertain Online Data.

Bolhuis, W.T.C. (2018) The application of Scalable Agile in Dutch government.

Bollen, L.M. (2021) Hardware acceleration of sweep detection using Clash : Computer Architecture for Embedded Systems.

Bolscher, P.S. (2014) Automated external fraud prevention in the public sector.

Bolscher, R.T.J. (2019) Leveraging serverless cloud computing architectures : developing a serverless architecture design framework based on best practices utilizing the potential benefits of serverless computing.

Bolscher, W.F. ten and Braak, T.P. ter and Haan, S.J.H. and Poirot, M.G. (2016) Item availability restricted.

Bolten, Marjolein (2024) Monitoring training load and identifying fatigue in young elite speed skaters using machine learning methods.

Bommel, J. R. van (2021) Active Learning during Federated Learning for Object Detection.

Bonenkamp, Jetske (2024) From Pit Stops to Paragraphs : Automatic Generation of Formula One Live Blogs based on Structured Race Data.

Bonnes, Kevin (2017) Predicting mortgage demand using machine learning techniques.

Bontekoe, T.H. (2020) Balancing privacy and accountability in digital payment methods using zk-SNARKs.

Bontekoe, T.H. (2020) Balancing privacy and accountability in digital payment methods using zk-SNARKs.

Booijink, K.G. (2019) Evaluating the Scalability of MayBMS, a Probabilistic Data Tool.

Bookholt, Erik (2014) The Impact of Enterprise Architecture on Business Performance.

Boom, Mark (2023) Data Structures and Heuristics for State Elimination in Markov Models.

Boom, N. (2014) XRM at a bilateral trade organisation.

Boom, Q.O. (2018) Overcoming challenges of Big Data Analytics outsourcing meant to improve Business Intelligence.

Boorsma, Simon (2006) Ketenintegratie van het intermediaire distributiekanaal in de verzekeringsbranche : huidige ontwikkelingen in de verzekeringsbranche en de mogelijkheden voor Zevenwouden Verzekeringen om ketenintegratie te realiseren¿.

Boot, J.J.F. (2020) Defending against Access Pattern Attacks on Secure Range Query Schemes.

Boot, L. (2009) Facial expressions in EEG/EMG recordings.

Boretskii, I. (2022) Developing a system for suggesting alternative ways of visualizing data.

Borkar, S.D. (2023) Enhancing Robot Camera Localization through Image Retrieval via Generalized Contrastive Loss and Re-Ranking.

Borkent, Michiel (2005) De- and recomposition of expression in music performance.

Born, H. van den (2024) Creating an educational escape room piece about individual climate positive changes in day-to-day life.

Boros, H. (2008) Context Discovery Adapter (CDA) Protocol.

Borssum Waalkes, Bart (2005) Managing Genome Databases.

Bortolameotti, Riccardo (2014) C&C Botnet Detection over SSL.

Bos, J.C.H. (2014) Synthesizable Specification of a VLIW Processor in the Functional Hardware Description Language CλaSH.

Bos, J.P. (2021) Forecasting the controllability of electricity consumersusing sparse multi-granularity time series data.

Bos, Jochem (2023) Item availability restricted.

Bos, K.E. and Hasper, W. (2016) Enabling measuring of the patient flow in an orthopaedic clinic.

Bos, L.C. (2017) Safe cycling for elderly "see".

Bos, L.C. (2020) Formal analysis and verification of interactions in the O2N middleware framework.

Bos, Mart van den (2014) An integrated hydrodynamic-economic model for setting differentiated insurance premiums.

Bos, N.D (2021) Improving the Chess Elo System With Process Mining.

Bos, P. (2021) Program verification for quantum algorithms.

Bos, P.M. (2021) Personal learning records : supporting metacognition cycles to improve the learning of programming.

Bos, Pieter (2006) Interacting with a virtual conductor.

Bos, S.E. ten (2023) Investigating the Effectiveness of Machine Learning Algorithms in Predicting Bitcoin Prices and Improving Trading Strategies.

Bos, S.L. (2014) Improving the well-being of independently living seniors using ICT How can a personal service be used to improve the self-efficacy, social engagement and security awareness of independently living seniors?

Bos, W.F.A. (2019) Software Metrics as Indicators for Effort of Object-Oriented Software Projects.

Bos, W.J. (2009) Interactive signaling network analysis tool.

Bos, Wouter F.A. (2024) Generating Piping & Instrumentation Diagrams from Static Fault Trees.

Bosch, K.T.D. (2020) Item availability restricted.

Bosch, P.P. van den (2017) Moral Intelligence for IT production.

Bosch, R.R. (2022) Solving the dynamic container relocation problem to minimize transportation costs using approximate dynamic programming.

Bosch, S.F. van den (2014) Designing Secure Enterprise Architectures A comprehensive approach: framework, method, and modelling language.

Bosch, Stephan (2008) FollowMe! : distributed movement coordination in wireless sensor and actuator networks.

Boschma, R. (2020) Exploring the world of Container Stacking using Approximate Dynamic Programming.

Boschman, S.R. (2006) Performing transformations on .NET intermediate language code.

Bosdriesz, Laura (2020) Adding Speech to Dialogues with a Council of Coaches.

Bosdriesz, Y. L. (2018) Towards a Reference Architecture for BIM (Building Information Model) Integration in the Construction Industry.

Bosdriesz, Y. L. (2018) Towards a reference architecture for BIM (Building Information Model) integration in the construction industry.

Bosems, Steven (2011) A Performance Analysis of Model Transformations and Tools.

Bosma, H.R. (2020) Increasing nutrient awareness with the Smart Kitchen Scale.

Bosma, H.R. (2022) Audio-visual Correlation from Cross-modal Attention in Self-supervised Transformers on Videos of Musical Performances.

Bosman, Joris (2023) Fine-tuning GPT-3 for data visualization code generation.

Bosman, Yoran Maxim (2007) Incorporating Functional Design Patterns In Software Development.

Bostelaar, Thomas (2024) Test-Time Adaptation for Skin Lesion Classification.

Boti, B.R. (2016) Automatic quantification of Ki-67 proliferation index through co-registration with CAM 5.2 stained tissue to improve colorectal carcinoma diagnostics and therapy.

Botnarenco, Daniel (2023) Automating Scientific Paper Screening with ChatGPT: An Evaluation of Efficiency and Accuracy.

Bottinelli, Sara (2023) A Study of Organization Level E-mail Phishing Awareness.

Bouius, B A.G. (2015) Characterising the Ripple Effects of Introducing Energy-Awareness Functionality in Cyber-Physical-Systems Software in Cyber-Physical System software.

Bouma, G (2021) Web Server Loads under Visitor Surges : A Model-Based Prediction.

Bouman, S.M. (2021) Personal Visualization in a Citizen Science Portal.

Bourbon de Parme, Carlos de (2022) Detecting Stomata with Computer Vision for Plant Breeding.

Bousias, Dimitrios (2021) Towards view-invariant Gait Recognition from monocular video based on Human Pose Estimation.

Bouwhuis, Wilco (2010) Modelleren van de Neocortex : analyse en simulatie op grote schaal.

Bouwmans, Rens (2018) Intra-cavity light distribution model for photodynamic therapy.

Bouwmeester, Egbert (2007) Continuous Classes of Power Amplifiers.

Bovenkamp, Jasper van de (2021) Dinner Time! : How to support children with autism spectrum disorder and their parents in better eating habits?

Bovenkerk, Jasper (2022) Generating IMU data from video using deep neural networks for use in animal activity recognition.

Boysen, Yannic (2022) Evaluating Recurrent Neural Networks as Solution to User Action Prediction.

Bozea, Diana-Alexandra (2023) Secure Steganography Based on GAN Image Morphing: Implementation and Analysis.

Bozhilov, Yancho (2023) Differences between conversational and query-response approaches in multimodal interplay with a robot.

Bozov, P. (2022) 3D point cloud segmentation and automation for railway catenary arches.

Braak, Bjorn van (2023) Experiments with different methods for class imbalance and bias in customers' credit risk assessment with little or no credit history.

Braak, J.C. ter (2016) Radiolocalisation at construction sites.

Braak, Timon D. ter (2009) Run-time spatial resource management in heterogeneous MPSoCs.

Braakhuis, J.A. (2021) Design of a Reactive DNS Measurement System.

Braam, G.J.M. (2006) Supporting multi-modal and multi-medial user interfaces from an embedded environment.

Braam, H.L.H. (2023) Understanding the Impacts of Google’s CT Policy Update on the WebPKI.

Braams, T.L. (2020) Impact of programming environments and practices on energy consumption.

Braber, Kommer (2007) A policy based MBU control system using OSGi.

Bragt, Jasper (2010) Towards believable characters in the virtual storyteller.

Braham, K. (2018) Smart cities : crowd management using WiFi based infrastructure.

Brakels, M. (2017) Forward error correction and failure rates on Aurora high-speed links.

Braks, J.G.J. (2021) Determining the way of walking by leveraging CSI.

Brand, A. (2009) An investigation in qualities of software variability.

Brand, Jannis (2019) Development of a Passenger Flow Visualization Tool for Cruise Line Ships.

Brandl, L. (2020) FutureType : Word completion for medical reports.

Brandon, Merel (2012) Effect personality matching on robot acceptance : effect of robot-user personality matching on the acceptance of domestic assistant robots for elderly.

Brands, E.H.T.B. (2012) Flow-based monitoring of GTP traffic in cellular networks.

Brandt, Jacco Hermanus (2022) Effectiveness of Oblivious RAM in cloud storage services.

Brattinga, M. (2022) LSTM-based Indoor Localization with Transfer Learning.

Brattinga, M. (2023) Protecting against internal attackers with hardware-aided proxy re-encryption.

Bravo de Medina Arribas, J. (2022) Decisive Image Characteristics to Perform Image Steganography in DCT.

Braşoveanu, R. (2021) Item availability restricted.

Bree, R.J. van (2021) Data augmentation for regularizing learned world models in reinforcement learning.

Bree, Sjoerd van (2022) Testing Copositivity in Pentadiagonal Matrices.

Breed, I (2019) Hierarchical forecasting of engineering demand at KLM Engineering & Maintenance.

Breed, I. (2015) Designing a spend analyses method for Power-Packer.

Breggeman, F.T. (2020) Graph Isomorphism with Pathfinding Algorithms.

Breggeman, Floris Tenzin (2023) An Authentication Service for Domestic Self-Hosting.

Bremer, B. (2022) Design of a fast control system reacting to non-sinusoidal voltage fluctuations.

Brilman, Maarten (2015) A multimodal predictive model of successful debaters or how I learned to sway votes.

Brink, B. van den (2017) Orchestrating Similar Stream Processing Jobs to Merge Equivalent Subjobs.

Brink, G.C. van den (2019) Training deep learning models to count based on synthetic data.

Brink, K. van den (2020) Finding “The Drop” : Recognizing the climax in electronic music using classification models.

Brink, K. van den (2022) FLEX : Force Linear to Exponential. Improving time series forecasting models for hydrological level using a scalable ensemble machine learning approach.

Brink, Tim van den (2008) Ketenarchitectuur : succes- en faalfactoren bij de invoering van het digitaal klantdossier.

Brink, W. van den (2022) Weighed and found legacy : modernity signatures for PHP systems using static analysis.

Brinke, Hans ten (2014) Hide and sneak - Perceptions in The Virtual Storyteller.

Brinke, S.T. ten (2020) The Effect of Manipulating Perceived Action Boundaries On Catching Performance.

Brinke, Steven te (2011) First-order function dispatch in a Java-like programming language.

Brinkhuis, M.E. (2015) Improving the Medicaid eligibility determination process using big data.

Brinkkemper, F.L. (2018) Decentralized credential publication and verification : a method for issuing and verifying academic degrees with smart contracts.

Brinkman, E. (2008) Recognition of the emotion in abstract expressionistic paintings using a machine learning approach.

Broeder, Gies den (2022) Human Activity Recognition using a mmWave Radar.

Broek, Desmond van den (2023) Creating a general process to measure API performance : generating a KPI-driven dashboard at Air France KLM.

Broek, J.D.A. van den (2012) Design and implementation of an analog-to-time-to-digital convertor.

Broek, Jurgen Gijs van den (2012) Real-world analyses of internet protocols.

Broekema, C.D. (2014) Modelling loitering character agents in conflict situations: Visualizing and evaluating interpersonal conflict strategies.

Broekhof, Ivo (2022) Replication and Analysis of the Berry-Sethi Parser for Ambiguous Regular Expressions.

Broekhuijsen, Jeroen (2006) 2D Upper Body Pose Estimation from Monocular Images.

Broekhuis, Djurre (2014) Sousveillance on Intelligent Transportation Systems.

Broekhuis, S. B. (2023) Incorporating User Inputs for Improved JSON Schema Inference.

Broekhuis, Stijn (2021) The Importance of Coding Styles within Industries.

Broekhuizen, V.P. (2008) Security for EPC discovery services.

Broenink, Ralph (2014) Finding Relations Between Botnet C&Cs for Forensic Purposes.

Broers, Noah (2023) How Organizations Institutionalize Corporate Digital Responsibility in their Culture and the Influence on Employees’ Digital Responsible Behavior.

Brok, F.J. den (2024) Abstract vs. Literal Sound Design for VR.

Bronkhorst, M. (2021) A pen is all you need : online handwriting recognition using transformers.

Bronkhorst, T.A.W. (2014) Hardware design of a cooperative adaptive cruise control system using a functional programming language.

Brouwer, E.E.B. (2023) Development of a Location-Based Game to help new students discover the UT Campus and Enschede.

Brouwer, L.J. (2006) Monitoring van een ASR-systeem : het gebruik van interne confidencewaarden en teletekstondertiteling om de Word-Error-Rate van een herkenning te voorspellen.

Brouwer, R (2020) Learning Timed Mealy Machines of the Physical Processes of an Industrial Control System for Anomaly-based Attack Detection.

Brouwer, R.J. (2019) Analysis of Influence Indicators of YouTube Videos using Metadata.

Brouwer, R.J. (2023) Differentiating user groups within an educational dashboard using log data.

Brouwer, Ruben (2018) A user self-reported emotion feedback system.

Bruderer, M.A (2023) Satellite to Radar: Sequence to Sequence Learning for precipitation nowcasting.

Brugge, Jonathan (2010) Implementing and simulating the cross-entropy ant system.

Bruggink, T. (2022) Data & AI policies united: Picked to pieces.

Brugman, Ivo (2012) A multimodal interactive system for creative expressions.

Brugman, S.R.D. (2022) The development of a real-time monitoring system for fatigue detection on truckers.

Brugman, Tristan (2017) A methodology for deriving aggregate social tie strengths from mobility traces.

Bruijn, Vincent de (2013) Model-based testing with graph grammers.

Bruins, L.L.E. (2020) Validation of Legal Documents by comparing digital and printed photographs.

Bruintjes, Harold (2012) Bridging GROOVE to the world using a conceptual language model.

Bruintjes, Tom M. (2011) Design of a Fused Multiply-Add Floating-Point and Integer Datapath.

Brunsveld, R.D. (2019) Determining the Satisfiability of Car Configuration Models in a Repetitive Manner.

Brunt, B.W. (2020) Decreasing the computation time that's used for saving data in the DEMKit simulator.

Brus, T.A. (2017) Applying E-learning and persuasive design : teaching new users of an online accounting tool the basics of online bookkeeping.

Bruxvoort, Xadya van (2018) The impact of #MeToo; a data visualization.

Bruxvoort, Xadya van (2021) Towards the design of legally privacy-proof and ethically justified data-driven fraud risk assessment algorithms.

Bucur, Matei (2023) Exploring Large Language Models and Retrieval Augmented Generation for Automated Form Filling.

Budin, Batu (2023) ERP Systems and Process Mining.

Budnyk, Yevhenii (2023) LyrAIX - tweaking the style.

Bui, Cuong (2004) Write-intensive applications with LDAP.

Bui, M. (2023) Optimal care for geriatric hip fracture patients : an interdisciplinary perspective on preoperative decision-making and postoperative rehabilitation.

Bui, M. (2023) Optimal care for geriatric hip fracture patients : an interdisciplinary perspective on preoperative decision-making and postoperative rehabilitation.

Bui, Nhat (2021) Negomancer : Improvise. Adapt. Overcome. Transform.

Buijsse, R.W.A. (2024) Enable triple-loop learning: integrating soft information and human-machine interaction in data-driven decision-making.

Buis, Geert (2023) Applying game-theory to evaluate incentives for cooperative behaviour between households within the distribution grid.

Buis, J.T.P. (2017) Applying intelligence amplification to the problem of schema matching.

Buit, L.J. (2017) Developing an easy-to-use Query language for verification of lighting systems.

Bujorianu, Alex (2022) Developing a Recommendation Algorithm for Patients Using the Healthentia Platform.

Bukhsh, Faiza Allah (2010) Enhanced ICoNos maturity model.

Bullée, Jan-Willem (2013) Detection of leadership in informal (small) groups based on CCTV information.

Bulten, F.F. (2021) 3D Super Resolution using Auto Encoders for Face Recognition.

Bunda, S.T. (2022) Limited Resource Optimization for Face Recognition Neural Networks: Sub-byte quantization of MobileFaceNet using QKeras.

Burghardt, C.N. (2019) Item availability restricted.

Burghardt, Carmen (2017) How to design fashion applications.

Burghout, S.M.A. (2019) Essential IoT-value propositions to reinforce SME's business position.

Burgman, Ronald (2012) Partial-order reduction based on probe sets.

Burgt, A.P. van der (2023) AI in the Wild : Robust evaluation and optimized fine-tuning of machine learning algorithms deployed on the edge.

Burgwal, M.D. (2005) Serving the Montium : design of an energy-efficient processor-network interface.

Buser, Myrthe (2020) Towards stable feature detection for 3D reconstruction of the placental surface during the FLOVA procedure - Convolutional neural network based feature detection.

Buth, Maarten Dimmen (2006) Ball-handling motion control for soccer playing mini-robots.

Buuren, R.A. ten (2015) Domain-Specific Language Testing Framework.

Buurman, H.A. (2007) Virtual Storytelling: Emotions for the narrator.

Buursink, E.H. (2017) Evaluation and development of a decision support system for patients after an open heart surgery : Early online cardiac telerehabilitation programme.

Böckle, Marc-Philipp (2017) SAV2P-shared automated vehicle to pedestrian communication : exploring the impact of an interface for shared automated vehicles on pedestrians' level of comfort.

Böhmer, Kevin (2021) Model predictive control for electric vehicle charging using low power microcontrollers.

Böhmer, Kevin (2023) Radiation resilience evaluation of a Flash-based FPGA with a soft RISC-V Core.

Cai, D. (2019) A Parasite Chain Attack in IOTA.

Camacho Camacho, José Manuel (2011) Assembler a bgp-compatible multipath inter-domain routing protocol.

Campomanes V, Florencio (2022) Estimating Consumer Food Accessibility Across Urban-Rural Catchment Areas in Ethiopia.

Capra, A. (2018) Gamified musical breathing exercises for children affected by Duchenne Muscular Distrophy.

Cardoso dos Santos Coelho, T. (2018) Using digital technology to encourage cultural change and positive behaviours : case study of project SunCard.

Carvajal Gallardo, I. R. (2015) Privacy-preserving social DNA-based recommender.

Casano, F. (2019) Identifying how vendors and clients manage red teaming.

Casteleijn, T.K. (2018) Start-up knowledge brought to large organisations : Innovation management software based on blockchain technology.

Castro, M.N.M. (2018) Breast phantom deformation tracking and local elastography for ultrasound-guided biopsy.

Cañizares, Jose Carlos (2017) The Information Society: Technological, Socioeconomic and Cultural aspects - Prolegomena for a sustainability-oriented ethics of ICT, with glossary and PhD prop.

Cervone, B. (2020) Designing interactive data visualisations for RTL Nederland’s online news platforms : increasing visibility of the “volg” functionality and user engagement.

Cesar, M (2019) The dangers and privacy issues of motion-based side-channel attacks.

Cesar, M. (2021) End-to-end encrypted data in web applications.

Chae, Heejin (2022) Prototyping gamification of lifestyle application for prevention of obesity in young adults.

Chandra, Melvin Sumon (2021) Why Should Security Train My Staff?

Chandra Mohan, Tejas (2021) Blind Image Quality Assessment of Smartphone-captured Images in the Wild.

Chandramohan, Aashik (2018) Machine learning for cooperative automated driving.

Chang, B.L. (2018) A deep learning approach to estimating permanents.

Charismadiptya, G.C. (2018) The design and implementation of situation aware smart logistics in perishable food transportation.

Chattopadhyay, A. (2022) Resilience of DNS infrastructure against DDoS attacks.

Chatzimichail, Kyriakos (2023) Synchronization improvement in automotive Ethernet networks.

Chauhan, P. (2009) Study the impact of smile and tail dependence on the prices of European style bivariate equity and interest rate derivatives using Copulas and UVDD model.

Chavannes, J.P. (2021) Information extraction for court cases.

Chemaly, Trishia (2017) Multimodality image registration for visualization in robotic assisted breast biopsy.

Chen, Qiurui (2019) EEG hyperscanning study of team neurodynamics analysis during cooperative and competitive interaction.

Chen, Y. (2022) GameEvolver: A tool to potentially automatically improve board games.

Chen, Yang Sophie (2022) Enhancing the Web Browsing Experience on Mobile Devices with AR Glasses.

Chen, Zhen (2012) Workflow management solution for a security management application.

Chen, Zhiyuan (2020) Automatic detection of photographing or filming.

Chenet, M. (2017) Identify and extract entities from bibliography references in a free text.

Cheng, Miss Shu (2015) Translating strategy into implementation via capability-based planning.

Cheng, W. (2006) The design of a new power combining technique for the RF power amplifiers.

Chinthu Rukmani Kumar, Jayanth (2021) Geometrical Social Networks.

Chirca, Lucian (2021) Marks Fusion: Development Of Facial Marks Detection System And Fusion With Face Recognition System.

Chivulescu, Dragos-Marian (2021) Balanced, as all things should be: PSD2 and cybersecurity risks.

Choi, Jeong Young (2023) Machine Learning Approaches in Extending the Capabilities of a Thermal Anemometer for Horticultural Applications.

Choi, Sua (2022) The design of ‘League of Legends’ decision support system for inexperienced players.

Choi, Y. (2022) Case studies for the necessity of the blockchain in self-sovereign identity.

Chowdhary, A. (2020) Email-based Intelligent Virtual Assistant for scheduling (EIVA).

Christiano, B.G. (2022) Formalization of tangle and tangle learning algorithm.

Christou, G. (2023) On Services Exposed by DNS Infrastructure: A KINDNS Investigation.

Chromik, Justyna Joanna (2015) Booters (black)list.

Chávez Sáenz, L. (2022) Creating interactive custom controller installations to improve a museum exhibition.

Ciobotea, C. (2016) Improving payment authorization rates : by intelligently routing transactions.

Ciresica, V. (2023) Authentication method for Windows OS based on location classification using WiFi signals.

Claase, Marcella (2014) Why do users bond with online services? : a literature review on the conceptualization of online user bonding in the context of online services.

Claessen, C.T. (2022) Text Mining to Improve Education : An Evaluation of Text Mining in the Student Feedback Process.

Claßen, P. (2022) A practical approach to assessing critical continuity properties of assets in business & IT continuity management.

Claßen, Philipp (2019) Identification of differences in sub-population healthcare processes.

Clemente, Jean Louis (2023) Segmentation of Railway tracks, Contact cables and Catenary cables from a LiDAR Point Cloud.

Clerkx, N.P.M (2019) Improving vehicle routing by utilizing realisation data : a case study.

Coenen, M.H. (2019) Increasing availability of the AEpu by improving the update process.

Coenraad, T (2018) Analist: A Tool for Improved Static Type Analysis for Ruby.

Cojocaru, Andrei (2019) Handling Missing Data: Traditional Techniques Versus Machine Learning.

Colmenar Lamas, F.M. (2021) Analysis and comparison of Log Shipment solutions at AWS S3 for Windows 10.

Colombo, Riccardo (2020) On the escalation from Cyber Incidents to Cyber Crises.

Companjen, Ben (2013) Probabilistically matching author names to researchers.

Coniglio, Luigi (2019) Combining program synthesis and symbolic execution to deobfuscate binary code.

Conradi, Olaf (2006) Fine-grained Join Point Model in Compose.

Conrads, J.G. (2019) DDoS Attack fingerprint extraction tool : making a flow-based approach as precise as a packet-based.

Constantinescu, E.M. (2020) An in-depth approach to fitting probability distributions using evolutionary algorithms.

Contecha Montes, J.A. (2023) An Enterprise Architecture based Big Data Analytics Capability Deployment Reference Architecture to improve Business Value.

Copae, D.V. (2022) Using augmented software requirements for automatic classification.

Cornelissen, J. (2021) A study on forecasting SOFR with a recurrent neural network using long short-term memory cells.

Cornelissen, Richard (2013) Towards a methodology-growing framework.

Coroiu, Alexandra (2019) The generalization performance of hate speech detection using machine learning.

Corradin, M.C. (2014) Then and Now: On The Maturity of Cybercrime Markets : A study on regulation enforcement of forums in the online underground trading economy.

Corts, R. (2022) Accelerating selective sweep detection software with the GPU architecture.

Costa, Alvise (2010) Context - Free - Language Parser for Advanced Network Intrusion Detection.

Coste, S.F. (2023) Crowd analysis on edge devices : a comparative study of neural networks on blurred images.

Court, M.A. de la (2018) Will we let computers determine what music we listen? Exploring user acceptance of music recommenders.

Court, M.A. de la (2020) Design of a model-driven platform for IoT event stream processing.

Couwenberg, F. (2022) Extracting Unseen Classes From Capsule Network Feature Space.

Couwenbergh, W. (2020) Real-time assistance for people endangered by forest fires : Mobile application.

Couwenbergh, W. (2022) Detection of areas of interest in bending strain data for pipelines through 1D object detection.

Covaci, Andrei - Ion (2022) Wi-Fi MAC address randomization vs Crowd Monitoring.

Crest, Côme du (2018) Scalability & Trustlines Network architecture.

Crichlow, Matthias Caretta (2020) A study on Blue Team’s OPSEC failures.

Croonen, Elke (2023) Artificial intelligence for tool and action detection in laparoscopic fundoplication surgery videos.

Cutina, Jennifer (2020) Assessing the use of process mining techniques to monitor the work process of commercial drivers.

DAM, M.R. (2015) Auditory processing using CλaSH.

Dadhich, S. (2022) Increasing the accuracy of rodent detection and estimation of the population with sensor fusion.

Daemen, P. (2008) ZMP based control in 3D passive dynamic walking.

Dai, L. (2019) Human perception of an adaptive agent's fear simulated based on TDRL Theory of emotions.

Dai, Yinping (2020) Modelling the LIFE project using DEMKit.

Dalen, J.J.M. van (2011) Designing a tool for norm interventions in IT strategy projects.

Dalen, N.G.A. van (2020) Development and analysis of beat and tone detection for boomwhackers.

Dam, Arjan (2008) Geographic routing in wireless sensor networks for surveillance : introducing a novel routing algorithm: GZOR.

Dam, Franciscus Jozua van (2011) A stripline antenna for radiated immunity testng.

Damman, B. (2008) Representing PCTL counterexamples.

Danielecki, Daniel Mariusz (2019) Security first approach in development of Single-Page Application based on Angular.

Darici, F.E. (2023) Analyzing Video Quality Assessment Methods on Computer Graphics Animation Videos.

Dartel, Bram van (2021) Malware detection in IoT devices using Machine Learning.

Das, Amit (2019) Towards a hybrid customer classification and clustering scheme for effective target-group based marketing.

Das, B. (2018) Using mobile sensing to detect indicators of alcohol intoxication.

Daskalov, V.D. (2022) Bio marker-based COVID severity prediction and data quality exploration.

Davanian, Ali (2017) Effective granularity in Internet badhood detection: Detection rate, Precision and Implementation performance.

Davelaar, K.I. (2014) Protecting high school students from bullying: Bully Shield.

Davids, Aron (2022) Identifying plot holes in narrative stories by simulating events.

Davison, David (2013) A framework for creating semantic wikis for biomedical research laboratories.

De Miguel Aramburu, A. (2020) Vulnerability management in organizations.

Deddens, M.K. (2008) Toepasbaar risicomanagement in software ontwikkelingsprojecten : ontwerp en toepassing van een risicomanagementmethode voor software ontwikkelingsprojecten binnen Centric IT Solutions.

Deenik, W. (2017) Teaching a machine beauty : intelligent interactive evolution of abstract animations.

Dekens, Berend (2011) Mapping of a DAB Radio Decoder to Homogeneous Multi-Core SoC : a case study to evaluate a NLP based mapping flow.

Dekker, A.P. (2021) Planning Self-Backhauled mmWave Networks with Multi-Connectivity.

Dekker, Bram (2023) Semi-supervised point cloud segmentation on railway data.

Dekker, Thomas W.G. (2015) Applying parental involvement in secondary vocational education using a technological solution.

Delaere, Y. (2020) Design of a machine vision based faulty bead wire detection system.

Delaere, Yvo (2017) Implementation and optimization of facial recognition with the IntelRealsense SR300.

Delden, R.W. van (2011) Design of therapeutic TagTile games for children with unilateral spastic cerebral paresis.

Delfgaauw, Camilio (2020) Predicting car movement for autonomous driving through traffic using neural networks.

Delft, M. van (2019) Towards feature-based underground void detection with ground penetrating radar from within sewers using image processing.

Demkes, K.H. (2014) Automated tuning of an algorithm for the vehicle routing problem.

Demosthenous, Avgerinos (2023) Machine operation prediction using CSI for Industrial IoT networks.

Deneka, Agnes (2014) A coach ECA to increase Societal Participation of Low Literates and Non-Native Citizens in the Societal Participation Learning Support System.

Denga, Adarsh Aaron (2021) Energy Optimisation Through Machine Learning in Wireless Networks.

Denman, Quinton (2018) Generating awareness of ubiquitous monitoring within the Netherlands, referencing the Chinese Social Credit Score.

Derks, C.C. (2019) Trends Tool, a tool for abstract textual data analysis used for additive manufacturing trend.

Derks, Theo (2006) Health at home.

Derwort, Selmer (2007) IT governance: de doelen en de middelen: In kaart brengen van IT governance in theorie en praktijk.

Deshpande, N.D. (2021) Machine learning techniques for the analysis of affective components of sign language.

Dhawan, Sonakashi (2023) Hybrid Machine Learning (ML) Models in Banking : An Approach for the B2B Sector.

Di Flumeri, MSc Francesco (2022) Explainable AI for supporting operators in manufacturing machines maintenance: Evaluating different techniques of explainable AI for a machine learning model that can be used in a manufacturing environment.

Diallo, A.O. (2017) Traffic filtering based on subsystem component state.

Dias, V.M. (2021) Smart KPI-ORIENTED decision support Dashboard for measuring the Digital Transformation success.

Diatmiko, G.P.K. (2020) Just-in-time intervention : Increasing young adults' fruit intake in an engaging way.

Dibbets, V.L. (2022) Team-based learning through an interactive online medium.

Dichev, Konstantin (2022) Validating Belbin Roles Based on University Students' Discord Messages.

Diepenmaat, J. (2009) Object XML mappings.

Dieperink, D. (2023) Investigating the use of acoustic features to understand human social interaction from speech.

Diephuis, Maurits (2010) A framework for robust forensic image identification.

Dieten, J. J. van (2024) Attention Mechanisms in Natural Language Processing.

Dietvorst, Cornelis P. (2019) Programming data visualisations using Microsoft Power BI : building a scrap dashboard for BT2.

Dietz, W.S. (2015) A Reference Model Method to align the development of one software system with multiple Hinterland Container Terminals.

Dijk, J. F. van (2017) Three dimensional capacitive sensing for wearable technology : a development example for creative technology.

Dijk, J.J. van (2006) Entiteitreconciliatie ondanks beperkte overlap door middel van objectgelijkheid : casus "Koppelen van persoonsgegevens zonder een gemeenschappelijke identificatie".

Dijk, L.J. van (2021) AI as the assistant of the teacher : an adaptive math application for primary schools.

Dijk, Michel van (2007) Analysis and control of nonlinear oscillators.

Dijk, P.A.H. van (2018) An efficient simulation of crosslinked RAFT copolymerization.

Dijk, R.J. van (2020) Improving food safety by designing a decentralised traceability architecture in line with stakeholder concerns.

Dijk, Remco van (2021) Optimizing the BLE Transmission of Sensor Data: An Exploratory Study.

Dijk, T.G. van (2014) Tuning the Parameters of a Loading Algorithm.

Dijk, Tom van (2012) The parallelization of binary decision diagram operations for model checking.

Dijkslag, M. (2021) Passive query-recovery attack against secure conjunctive keyword search schemes.

Dijkstra, F.B. (2017) UCAVs Against Air Threats : Pre-feasibility Study for a Semi-Direct Control System.

Dijkstra, F.B. (2020) Decoding Individual Contralateral and Ipsilateral Finger Movements from Electrocorticographic Signals Recorded over the Human Sensorimotor Cortex of a Single Hemisphere.

Dijkstra, R.M. (2023) European Commission Digitalisation: Strategy Meets Policy.

Dijkstra, Stijn (2024) Finding Smaller Parity Game Solutions by Identifying and Solving Subgames using Oink.

Dikken, N. (2018) Digital Sports Training Exercises for Volleyball.

Diks, Vincent (2022) Detecting and interfacing urban litter using computer vision.

Dillimono, D.D. (2017) Nonverbal empathetic communication in coaching wearables.

Dimitrova, Desislava C. (2006) Performance evaluation of RMD (Resource Management in DIFFSERV) within NSIS (Next Steps In Signaling).

Ding, H. (2016) Integrating value modeling into ArchiMate.

Diphoorn, W. (2020) A Smartphone Application for the Creation of Legal Document Photographs.

Dirlik, S. (2013) A comparison of FFT processor designs.

Doan, K.Q. and Hazelzet, H. and Slingerland, T.P. and Zoet, S. (2020) Pijndetectie bij volwassenen door middel van afbeeldingbewerking en transfer learning: Een stap in de richting van automatische en continue pijndetectie bij gesedeerde kinderen op de intensive care.

Dodeja, Ujjwal (2024) BaatCheet : Android chat application coupling End-to-End encryption and LSB substitution.

Dokter, J. (2016) 20-sim Template for Raspberry Pi 3.

Dokter, J. (2020) Segmentation and classification of skin lesions using neural networks.

Domburg, R.S.A. van (2009) Empirical evaluation of change impact predictions using a requirements management tool with formal relation types : a quasi-experiment.

Dommerholt, W. (2019) Financial effects of moving patients from an inpatient to an outpatient setting : providing financial insight in the effects of discharging patients the same day as surgery instead of keeping them overnight.

Donckers, L. (2001) Energy Efficient TCP.

Dong, Zheyu (2023) Design of User Interface for Sewer Management Web Application.

Dongen, Fabian van (2023) Kubernetes, IoT and the Automation of Penetration Testing.

Donker, J.H. (2012) Handfish - tunable heterogenous multi-core simulators on multi-core hosts.

Donkers, A.D. (2021) The Usage of Models in Model-Driven Software Engineering.

Donners, Y. (2017) 3D Interactive visualisation framework for simulated systems in large scale print system design.

Donselaar, V.L. van (2015) Low latency asynchronous database synchronization and data transformation using the replication log.

Donselaar, V.L. van (2012) Information Retrieval models based on electrical circuit analysis using Ohm’s law.

Doorn, Gerrit Hendrikus van (2007) Accelerated playback of meeting recordings.

Doornenbal, Ing. Dirk (2006) Analysis and redesign of the compose*language.

Dop, L.T.J. (2023) Classifying ransomware victims’ nationalities based on leak page entries.

Dorenbos, H.M.R. (2021) Moldel : Predicting the 'Mol' in 'Wie is de Mol?' using machine learning and mathematical modelling.

Dortmann, M.L. (2018) Developing a user interface for smart rainwater buffer systems.

Doychev, K. (2023) Need for convergence speed : how do graph metrics influence the convergence speed of Markov chains?

Dragomiretskiy, Sergey (2018) The influence of DDoS attacks on cryptocurrency exchanges.

Drechsel, Alexander (2019) Automatic instance-based matching of database schemas of web-harvested product data.

Drenthen, S. (2014) Towards continuous delivery in system integration projects : introducing a strategy to achieve continuous delivery and test automation with FitNesse.

Driessen, Famke (2023) A quantitative assessment method for microservices granularity to improve maintainability.

Driezen, Wouter (2008) Service-oriented and open-source software as potential markets for applications markets : analysis of the possible added value of Capgemini outsourcing's Dutch applications management service center.

Drijfhout, Wanno (2015) The Knowledge Cloud: Evolving the data management paradigm.

Dringa, Brianna (2023) Performance and Security Analysis of Privacy-Preserved IoT Applications.

Dubowski, A. (2020) Activation function impact on Sparse Neural Networks.

Duerink, Hendrik Lodewijk (2013) Information System Data Flow within Performance Based Logistics.

Duits, Ines (2019) The Post-Quantum Signal Protocol : Secure Chat in a Quantum World.

Dulfer, R.M. (2020) The propaganda machine.

Dullaert, S.A. (2022) Friction and resistance as modalities for physicalizing data.

Dunn, B.C. (2015) De toepassing van de EWMA-methode op het adverteermodel van Joosten (2015).

Dunning, V.A. (2021) Developing a Multi-Party MPC Compiler with Covert Security and Public Verifiability.

Duong, X.L. (2022) Estimate motor unit organization in Nociceptive Flexion Reflex using Convolutive Blindsource Separation and statistical signal analysis.

Duraisingam, Prithivi Ram (2014) Crack detection in semiconductor products : machine vision techniques for detection of cracks in semiconductor products.

Dute, J.A. (2016) Predicting the unpredictable : predicting surgical case durations and overtime probabilities to maximise OR-efficiency at Thoraxcentrum Twente.

Dzulqarnain, A.R. (2017) Distributed Processing for Operational Modal Analysis of Bridge Infrastructures Using Wireless Sensor Networks.

Dzulqarnain, Dzulqarnain (2019) Investigating IoT malware characteristics to improve network security.

Ede, Thijs S. van (2017) Detecting adaptive data exfiltration in HTTP traffic.

Ede, Thijs S. van (2017) Detecting adaptive data exfiltration in HTTP traffic.

Eenennaam, E.M. van (2008) Providing over-the-horizon awareness to driver support systems by means of multi-hop ad hoc vehicle -to-vehicle communication.

Eerenberg, E. (2011) Towards distributed information retrieval based on economic models.

Eibich, Natasha J. (2019) Sticky Fingers: The effect of sticky interaction patterns on the design and adoption of a Radiology Information System.

Eidhof, M.S. (2020) Optimising the ATQP-process at Company X.

Eijkel, D.J. (2022) Anycast in the SCION Internet Architecture.

Eijkemans, J.W. (2023) Sneakily Purposeful Games : A new design strategy for motor-based serious games.

Eijkemans, Joep (2019) Motion sickness in a Virtual Reality cycling simulation.

Eijken, Margriet (2023) Energy efficient scheduling in data centers.

Eijking, Bram (2021) Implementation and evaluation of a multi-axis brushless DC motor control using a planar finite element approach.

Eijnden, E.K. van den (2020) Optimal Handover in MEC for an Automotive Application.

Ekambaranathan, A. and Zaag, H. van der (2018) Vernieuwing en plezier in programmeeronderwijs in de bovenbouw.

Ekambaranathan, Anirudh (2018) Using stylometry to track cybercriminals in darknet forums.

El Assal, Karim M. (2018) Predicting user loyalty in an education support web application based on usage data.

El Habashy, Mohamed (2023) Biomarker Based COVID Severity Prediction and Data Quality Exploration.

Elburg, R.S. van (2023) Designing a gamification for promotion and recruitment.

Elderen, Sybren van (2014) Beating Logic: Dependent types with time for synchronous circuits.

Elfaramawy, Ibrahim (2017) Designing an accessible workflow for Rapid Prototyping on a homemade 3-axis CNC machine.

Elkady, O. (2022) SLAM for smart bikes.

Ellery, D. (2017) Writing reusable code for robotics.

Elling, Erwin (2007) Tools for fun and fruitful meetings. : “Don’t let meetings make you go bananas!”.

Elsinga, J.W. (2016) On a framework for domain independent heuristics in graph transformation planning.

Elskamp, David (2022) Visual Classification on HR-Crime dataset.

Elskamp, F. (2018) CoDuo: a game for teaching Computational Thinking in Primary Education.

Elsten, J.M. (2020) System for indoor person localization in a healthcare setting.

Elsten, Julian M. (2023) Exploring the potential use of FaaS within an iPaaS infrastructure.

Emous, Rob J. van (2019) Towards systematic black-box testing for exploitable race conditions in web apps.

Enache, Aida (2021) UI/UX Analysis and Design of Running Dashboard for Injury Prevention.

Ende, Frederik van den (2011) Interference Nulling via a Resistor-Weighted Op-Amp Vector Modulator.

Enendu, Somtochukwu (2019) Predicting Semantic Labels of Text Regions in Heterogeneous Document Images.

Engbers, S.F. (2021) Smart Sports Exercises: Offensive decision-making in volleyball.

Engelen, L. van (2006) Massively parallel quantization implementation using simulated annealing.

Engelenhoven, A. van (2023) CAST : Clustering Attention using Surrogate Tokens for Efficient Transformers.

Engelenhoven, Adjorn van (2020) Modular Neural Networks using Multiple Gradients.

Engelgeer, Timo (2017) Designing a wireless node-based energy meter to measure both real and reactive power.

Engelsman, W. (2008) Method for requirements management and modeling.

Engers, V.P.G. van (2023) Efficient Deep Learning for Automotive Radar Perception.

Engers, Vincent P.G. van (2021) Towards understanding and modelling sparse training algorithms at extreme sparsity regime.

English, T. F. (2021) Using Artificial Intelligence for Image Classification of Ships.

Enkhuizen, M.J. van (2021) Innovative Data sharing in logistics, migrating from UN/EDIFACT to the OpenTripModel.

Ensink, E.S. (2016) De overstap van Excel naar Exact.

Enthoven, M.M.F.C. (2018) Error Analysis of Optical Self-Localization using Mapped and Distinguishable Beacons.

Epskamp, S.G. (2012) On the influence of stereographic 3D on user dependent direct projected augmented reality in the OR.

Erich, Floris Marc Arden (2014) Improving information system development and operations using the DevOps conceptual framework.

Erkko, M.A. (2022) Speeding up parametric model checking using GPGPU computation.

Es, Frank J. van (2008) Type inference for graph transformation systems.

Eshy, A. (2022) Human activity recognition using two millimeter-wave radars.

Esquivel-Vargas, Herson (2016) Automatic deployment of specification-based intrusion detection in the BACnet Protocol.

Essen, T.M. van (2021) Investigations on Securing Repositories using Difference Analysis and Patch Applications on Encrypted Files.

Essenstam, L. (2019) Analysing various methods for object extraction and the classification of kitchens.

Essers, Tom (2023) Technology Assessment for Quantum Computing in the Energy Sector.

Etheredge, C.E. (2016) GoSlow: Design and Implementation of a Scalable Camera Array for High-Speed Imaging.

Eugelink, J.P. (2023) Applying machine learning methods to the Menzis district nursing benchmark.

Evers, M. (2021) The design of a prototype handheld 3D surface reconstruction setup for monitoring skin diseases.

Evers, Sander (2004) Form follows function : Editor GUIs in a functional style.

Everse, Wouter M. (2009) Modelling and Verification of a Shortest Path Tree Protocol for Wireless Sensor Networks : Towards a Platform for Formal Verification Experiments.

Eversmann, H.Y.N. (2019) Computation offloading of augmented reality in warehouse order picking.

Eyk, Jan-Niclas van (2023) Fighting Phishing at the Website Host.

FU, Q. (2015) Implementing a real-time control algorithm of Triana on SASensor Open Platform.

Fahmi, Shamel (2017) Respiratory motion estimation of the liver with abdominal motion as a surrogate : a supervised learning approach.

Fang, Zhuowen (2021) HejVR: a Virtual Reality online cultural learning system.

Farooq, A. (2021) How to Zen our Python.

Fasel, R. (2019) Adapting the variational auto encoder for datasets with large amounts of missing values.

Fasya, Evania Lina (2017) Automatic question generation for virtual humans.

Fatseas, K. (2018) Embedded neural network design on the ZYBO FPGA for vision based object localization.

Fattahi Mehr, Omid (2022) Data Augmentation using Fourier-Basis Noise.

Felix, P. (2018) Data-driven retail food waste reduction : a comparison of demand forecasting techniques and dynamic pricing strategies.

Felix, P. (2018) Data-driven retail food waste reduction : a comparison of demand forecasting techniques and dynamic pricing strategies.

Feng, Yuan (2010) Modified potential approach to efficient, linear and symmetric values for TU-games.

Fennis, J. (2019) Machine learning solutions for exception handling.

Ferdelman, Kai (2021) Using computer vision to aid navigation for people with visual impairements.

Ferla, R.I. (2022) Exploring the GANformer for Face Generation : investigating the segmentation and smile augmentation potential.

Fernandes, B.O. (2021) Exploring possibilities in interactive technology to create cross-domain interactive breathing exercise games.

Fernhout, M.M. (2023) A Deep Learning Approach for Assessing Micrographs of Fibre Reinforced Composite Laminates.

Ferronato, Giovanni (2020) IoT White Worms : design and application.

Fikkert, F.A.J. (2019) Linking indoor 3-dimensional visualizations with physical architectural floor plans.

Fikkert, F.W. (2005) Item availability restricted.

Filipovic, Simona (2020) Subpopulation process mining in healthcare.

Firdausy, Danniar Reza (2021) A Service-Oriented Business Collaboration Reference Architecture for Rural Business Ecosystem.

Fishchuk, Vitalii (2023) Adversarial attacks on neural text detectors.

Fitria, Silvi (2023) A Comparison of Deep Neural Networks for Sales Forecasting.

Flake, Beitske (2023) Network Inference-Based Prediction of Epidemics: A Case Study on Mexican State COVID-19 Infection Counts.

Flapper, Edwin (2020) ETA Prediction for vessels using Machine Learning.

Flapper, J. (2019) User access control on the blockchain for supply chain visibility.

Flederus, D.R. (2020) Enhancing music genre classification with neural networks by using extracted musical features.

Fleur, S. la (2018) Static Analysis of Symbolic Transition Systems with Goose.

Floor, D. (2024) Code comprehension in the multi-paradigm environment Kotlin.

Floor, Daniël (2021) the Suitability of Groove as a General Game Playing Language.

Florijn, W.J. (2019) Information retrieval by semantically grouping search query data.

Fluttert, Ernst (2013) Deciding between mobile implementation platforms - A multi-criteria decision system for implementation platforms for mobile applications.

Fobbe, Franziska (2023) Look at this, not that! – Improving the alignment of PIP-Net with domain knowledge.

Fokkema, J. (2016) Using a challenge to improve face spoofing detection.

Folkertsma, Kevin (2019) RE-Play: An exploration of game induced exercise promotion in clinical use.

Folmer, H.H. and Appel, R.N. (2016) Analysis, optimization, and design of a SLAM solution for an implementation on reconfigurable hardware(FPGA) using CλaSH.

Fontein, R.L.H. (2023) Investigating DNS Information Flow In Corporate Networks.

Fonville, M.E. (2015) The virtual machine delivery network.

Fouda, Kareem M.I.A. (2017) Payload based signature generation for DDoS attacks.

Fountain, Stefan J. (2007) Success prediction induction framework : success models for online applications, introducing network effects and trust constructs.

Fournier, Bas (2008) Preprocessing on bilingual data for Statistical Machine Translation.

Foustanas, Nestoras (2015) Helping elderly users control a telepresence robot with a touch screen.

Franck, T. (2016) Towards an Integrated Model of Smart Manufacturing Enterprises.

Frank, Fabian (2018) Consent management on the Ethereum Blockchain.

Franken, Michel (2007) Ankle actuation for planar bipedal robots.

Franssen, T.K.C. (2013) Gesture recognition in streaming motion data using offline training with a limited training set.

Franssens, Anne (2008) Analysis of Reed Solomon error correcting codes on reconfigurable hardware.

Franssens, Anne (2010) Impact of multiple inquires on the bluetooth discovery process : and its application to localization.

Freije, R.J.H (2019) Item availability restricted.

Fritz, Felix René (2017) Bike Sharing in New York City: How the Citi Bike System serves Points of Interest.

Fritz, Jako (2011) Hybrid Intrusion detection network monitoring with honeypots.

Frolov, Platon (2021) A sensitivity analysis of different machine learning methods.

Fu, Q. (2014) Validation of Interpersonal Stances Expressed by Virtual Suspect Characters in a Police Interview Setting.

Fujioka, T. (2022) Investigation of TOA/TDOA localization in the presence of receiver sensor position error.

Fürst, J. (2022) Validating XAI techniques in medical image diagnosis: A venture towards algorithm transparency in a socio-technical system.

Gaastra, S.L. (2021) Dinner Time! : Using technology for the gamification of mealtimes of children with autism to overcome eating problems.

Gadelmawla, Omar (2022) Exploiting shadows to infer 3D structures.

Gagelas, P. (2018) “Keep Your Eyes on the Road, Kid!” : Exploring the Potential of Virtual Reality Environments to Teach Children to Keep Their Attention While Biking.

Gaiser, Vincent Alexander (2008) Improving spatial awareness in an indoor environment with wireless positioning technology.

Gaisins, E. (2022) Are We All Back on Campus?

Galati, David (2023) Exposing the Brain of a Robot.

Galen, J. van (2009) Modelling, simulation and impelementation of an optical beam forming network control software system.

Galen, Rick van (2014) Design and feasibility of mobile peer-to-peer payment systems.

Galvan Hernández, J.A. (2018) Motivational strategies to improve self-management for rehabilitation of older adults.

Ganea, B.M. (2021) Design and implementation of a nonlinear model predictive controller for preliminary aerial physical interaction applications.

Gangireddy, Rajesh (2023) Knowing the Unknown : Open-World Recognition for Biodiversity Datasets.

Gankema, Yvon (2018) Improvement of kitten Scanner.

Gansel, Antoine (2023) Sub-quadratic Privacy Preserving Cohort Selection.

Ganzeboom, Mario S. (2010) User-independent recognition of dynamic hand gestures using a dataglove.

Garalov, Toghrul (2023) Raspberry-Pi based IDS for IoT.

Garcia Garcia, A. (2009) Optical phase synchronization in coherent optical beamformers for phased array receive antennas.

Garcia-Escallon, R.R. (2020) Enterprise architecture patterns : Supporting sustainable development.

García-Mauriño Taboada, Migue (2021) IOCMonitor: Automatic extraction of cyber threat intelligence from open source data using NLP and Machine Learning.

Gavenavicius, M. (2020) Evaluating and comparing textual summaries using question answering models and reading comprehension datasets.

Gavilanes, Jose Oswaldo (2023) Improving Performance with OpenPose: Analyzing Post-Run Feedback through a Prescriptive Dashboard.

Gavriel, Stylianos (2021) Stock Market Prediction using Long Short-Term Memory.

Gebremariam, T.H. (2023) Digital Twin and Securing IoT Applications in Industry 4.0.

Geerlings, N.M. (2018) Design of a high-level control layer and wheel contact estimation and compensation for the pipe inspection robot PIRATE.

Geerlings, S.A. (2018) Analysis and Design of a Dependability Manager for Self-Aware System-on-Chips.

Geessinck, M.S.M. (2021) An automatic Segmentation method and prediction method for skin prick test results.

Geest, F. van der (2020) Finding a solution against loneliness among the elderly living in a senior housing complex with the help of remote co-design.

Geest, J.S.T. van der (2022) Preparing for wildfires avoidance by analyzing land cover maps.

Geevers, Kevin (2020) Deep Reinforcement Learning in Inventory Management.

Gehring, Felix (2012) Software performance prediction in early development phases: A UML- and simulation-based approach.

Geijs, D.J (2015) Geautomatiseerde beeldanalyse van morfologische kenmerken en de motiliteit van een individuele spermatozoon.

Geijs, D.J. (2019) Tumor segmentation in fluorescent TNBC immunohistochemical multiplex images using deep learning.

Geißler, Dominique (2021) Gender Bias in English and German Children’s Literature: A Computational Analysis Using Word Embeddings.

Gemmink, M.W.T. (2019) The adoption of reinforcement learning in the logistics industry: A case study at a large international retailer.

Gemund, A.P. van (2022) Simultaneous Localization and Mapping In Smart Bikes.

Gennep, Bart van (2013) In the eye of the wizard : effects of (mutual) gaze on an avatar mediated conversation.

Georgiadou, S.E. (2018) Item availability restricted.

Georgieva, Gergana N. (2022) Last-Mile Delivery Drone Acceptance: Increased knowledge does not imply increased acceptance.

Gerards, M. (2008) Streaming reduction circuit for sparse matrix vector multiplication in FPGAs.

Gerats, B.G.A. (2017) Increasing technician's efficiency in executing proactive maintenance tasks : an augmented reality concept.

Gerats, B.G.A. (2020) Individual action and group activity recognition in soccer videos.

Gerats, B.G.A. (2020) Individual action and group activity recognition in soccer videos.

Gerdes, Thorben (2023) Enhancing soil health measurements for food forest projects.

Geretto, Elia (2018) A QBDI-based Fuzzer Targeting Magic Bytes Comparisons.

Gerretzen, B.M. (2022) Information leakage via Certificate Transparency.

Gerritse, A.J.H. (2018) (Spirit of Create): Exploration of illusory feedback.

Gerritsen, Jan-Henk (2012) Detecting synchronization conflicts for horizontally decentralized relational databases.

Gerritsen, S.N.J. (2015) Using teamwork to enhance the social presence on a distributed playground.

Gerth, Jasper (2019) Development of a system for real time localization of a team of athletes using Ultra Wide band : design choices and considerations for mesh network localization.

Geurts, Christel (2018) Item availability restricted.

Geuze, N.J. (2019) Energy management in smart grids using timed automata.

Ghadiri, Radmehr (2023) Security and Performance Analysis of Edge Computing in IoT.

Ghasemieh, H. (2016) Influence of short cycles on the PageRank distribution in scale-free random graphs.

Gielen, M W (2014) Prioritizing Computer Forensics Using Triage Techniques.

Giessen, D. van de (2018) Implementing and Scaling HanzeNet.

Giessen, David van de (2019) Blockchain and the GDPR's right to erasure.

Gijsen, N. (2016) Prototyping and feedback design in a serious game context.

Gijsen, Niels (2020) Balancing software maintenance effort as a technical debt management strategy : the design and implementation of a novel algorithm.

Gijsen, Stijn (2015) Runtime Permission Checking in Concurrent Java Programs.

Gilbers, Jander (2022) Automatic Inference of Fault Trees using Reinforcement Learning.

Gils, F.M.D.M. van (2008) PodVinder : spoken document retrieval for Dutch pod- and vodcasts.

Girdziunas, K.G. (2021) Supervised feature selection using sparse evolutionary training and neuron strength.

Gkovopoulos, Georgios (2022) Design of a 3D printed actuation platform for concentric tube robots.

Gnutti, Alessandro (2021) Study on the cyber risk inside a museal entity.

Go, M.L. (2019) Clustering with Outliers in a Biased Animal Movement Database.

Goedicke, D. (2017) On-road virtual reality driving simulator.

González-Novo López, F. (2022) Bike lane quality estimation under variable speed conditions using off-the-shelf motion sensors.

Goor, J.G.L. (2023) Log Parsing in Software-Defined Networking to generate DyNetKAT models.

Goos, Sander (2011) A model driven approach to modernizing legacy information systems.

Goossens, Bjorn (2019) Decision-Making in a Microservice Architecture.

Gorgan, Andrei (2022) Enabling faster processing of big-data using GPU decompression.

Gorgan, D. A. (2022) Evaluating the practicality of using Blockchain in different use cases in the supply chain sector.

Gort, BSc Ewout (2021) Developing a maturity model based approach supporting the decision to adopt International Data Spaces.

Gosen, N. (2019) How Robotic Process Automation (RPA) influences firm financial performance in The Netherlands.

Goswami, H. (2023) A framework for detecting and preventing DoS attacks in automotive ethernet switches.

Gottimukkala, Anirudh (2017) Implementation of a digital Class - D amplifier controller in CλaSH.

Goud, Hanneke (2024) Using graphic design to attract female high school students to the field of creative coding.

Goudswaard, A.T. (2023) Value Assessment of Digital Twins.

Gougoulis Dimitriadis, E. (2022) Sixthsense : outdoor collision avoidance assistant for the blind and visually impaired.

Govers, Ruben (2021) Predicting Heart Rates Of Sport Activities Using Machine Learning.

Govindaraj, Visshnu (2021) Forward collision warning system with visual distraction detection in bikes.

Graaf, Silas de (2023) Investigating Availability Computation with Exponential Failure Rates and Fixed-Time Repair Delays.

Graaff, V. de (2009) Towards distributed information access : possibilities and implementation.

Graciano Martinez, Virginia (2021) A dynamic deployment framework for a Staging site in the Personal Health Train.

Graesel, H.S. (2022) Trust in Artificial Intelligence? The role of mental models, openness, and anthropomorphism in human-agent teams.

Graumans, Lisan (2021) Subpopulation Process Mining in the ICU for Patients Diagnosed with a type of Pneumonia.

Gravier, Emil (2024) Leveraging Machine Learning and Geo-Analytics in Automatic Valuation Models to advance Real Estate Valuation.

Greeuw, P.C.A. de (2020) Robustness of Microgrid Control Mechanisms Against Cyber Attacks.

Grefte, L.J.L. (2016) NI myRIO as target for 20-sim.

Greuter, K.O. (2020) Evaluating the quality of the international consumer IoT Cyber Security Standard.

Greuter, K.O. (2024) A Repository for Testing Compliance to the Internet of Things (IoT) Security Standards.

Greveling, Mark (2023) Ultrasound: a reliable method to measure muscle forces around the foot?

Gribnau, Erwin (2007) Analysis, design & implementation of a high-performance main-memory object database for Splice2.

Grievink, Guus (2022) Model-based Probabilistic Diagnostics of Cyber-Physical Systems.

Griffioen, H.T. (2008) Design of clock cleaner : a fast locking PLL.

Grimm, Sander (2020) Design of a 3D imaging system for psoriasis assesment.

Grinwis, Iwan (2021) Identifying the best Methods for Passive and Active Cybersecurity Assessment.

Grisel, I.G.J. (2011) Multimodal user interface for robotized flexible endoscopy.

Griët, D.D. (2021) Automatically map an algorithmic description to reconfigurable hardware using the Decoupled Access-Execute architecture.

Groen, J.J. (2023) Suitability of gamification methods in a lifestyle application against obesity and diabetes.

Groen, Ruud (2006) Modelleren en analyseren van een Ethernet switch.

Groenenberg, Annabel (2021) Three Dimensions to See it All in One Position : the development and clinical usability of a real-time depth-based markerless navigation system for hologram-guided surgery on the Microsoft HoloLens 2™.

Groffen, M.M.L. (2022) Exploring identity matching for low quality images with the help of a pipeline for synthetic face generation.

Groot, A.G. de (2019) Confidence driven control for autonomous robotic 3D ultrasound acquisition of the breast.

Groot, Justin de (2022) Comparing alternative methods for a priori optimization of the slow-mode closure for the Lorenz 96 system.

Groot, N.E. de (2022) Improving data value by using best of worlds approach from government (authoritative), community and commercial data : a case of topographical data in the Netherlands.

Groot, Paul de (2006) Enhancing the performance and testability of the MI20 robot soccer system.

Groot, R.E.J. (2012) IT-based risks in advergame campaigns : a focus on fairness and privacy.

Groot, R.J.M. de (2018) Detecting deviant behaviour in information systems by using outlier detection on logs.

Groot Roessink, J. (2023) Influence of Biological Cues on Monocular Depth Estimation.

Groot Roessink, Jochem (2021) inSQeLto : a Query Language for Probabilistic Databases.

Groot Roessink, R. (2020) Experimental review of the IKK query recovery attack : Assumptions, recovery rate and improvements.

Groote Veldman, W.J. (2023) Optimizing BLE Gateway Positioning in Aviation Industry: An Algorithm Based on Link Budget and Log-Distance Path Loss.

Grooters, T. (2020) Analysing certificate transparency logs for let’s encrypt customer behaviour.

Grooters, T. (2023) Analysis of automated Virtual Machine generation and automation around system testing at TKH Airport Solutions.

Grotentraast, Jurgen (2021) Decision support for Rocket League player improvement.

Guducu, Izzet Berke (2022) Weighted Abstract Syntax Trees for Program Comprehension in Java.

Gugten, L.A. van der (2020) Load balancing framework comparison.

Gulhane, Devesh (2022) What Face Would You Like To Have? : The Effects of an Avatar's Facial Features on Social Presence.

Guliker, B. Evert (2021) Spatial determinants of Real Estate Appraisals in the Netherlands: a Machine Learning Approach.

Guliker, B.E. (2019) Data storytelling: visualising linked open data of the Dutch Kadaster.

Guo, Haoyu (2024) Construction of Predictive Model to Provide Personalized Advice on Reducing CRF on the POLARIS Dataset.

Guo, Mengran (2017) Research Line: a new design for better information sharing and storage between mentors and students in the E-mentoring process.

Guo, Zinan (2023) Vital Sign Detection Using a Thermal Camera.

Gupta, C. (2021) HoneyKube : designing a honeypot using microservices-based architecture.

Gupta, Pratyush (2024) A Comprehensive Study on Feature Detection Algorithms and Fine-Tuning Methods for Efficient Metadata Extraction in Construction Drawings.

Gupta, Y. (2021) Aspect Based Sentiment Classification of Multilingual Customer Reviews.

Guru Rao, Sathvik (2022) Ontology Matching using Domain-specific knowledge and Semantic Similarity.

Gurusamy Muthuvelrabindran, A.M. (2021) Invertible recurrent inference machines for low-dose computed tomography.

Gülbey, Baran (2023) Semantic model of the Computing Capacity matching within the FAIR Data Train.

Gülsüm, Kağan (2023) Formalizing a generalized diagonalization argument in Isabelle/HOL.

HE, Y. (2017) Extracting document structure of a text with visual and textual cues.

Haalstra, O.N.R. (2020) Browser Anti-Fingerprinting as a pathway to Impersonation and Fraud.

Haan, L. M. de (2018) The integration of Big Data in purchasing, as designed in a new Big Data Purchasing Maturity model.

Haan, Sophie de (2018) Application design for the quantified pet domain from a user centered design perspective.

Haan, T. de (2018) BLE Localization using switched-beam angle of arrival for pallet localization in warehouses.

Haanstra, Sander (2008) Analyzing and improving generalization over time in CSP-based Brain-Computer Interfaces.

Haar, J. ter (2021) Design Reconstruction for Partial Reconfigurable FPGA Systems.

Haarhuis, L.M. (2022) Exploring business opportunities of sentiment analysis : a guideline for businesses, from implementation to business value generation.

Haarman, M.H.J. (2023) The Impact of Instagram Use on Mental Health : A Study of the Moderating Effect of Social Anxiety.

Haarman, T.R. (2020) Analysing countermeasures against fault injection attacks on FPGA based cryptographic implementations.

Haas, A.N.J.P.M. (2020) Attitudes towards digital transformation at small enterprises : A cross-border analysis.

Haasjes, R.E.Y. (2019) Metamodel transformations between UML and OWL.

Haavel, Kristjan (2021) Effectiveness of Social Engineering Intervention: A meta-analysis.

Habib, Mena Badieh (2008) An intelligent system for automated arabic text categorization.

Hadiwijaya, Aditya Gianto (2020) User-centred design for input interface of a machine learning platform.

Haemers, MSc David (2021) Exploring Organinzational Network Analysis: A Case Study.

Hageman, Kaspar (2015) The Performance of ECC Algorithms in DNSSEC: A Model-based Approach.

Hagen, Gijs (2009) Het schrijven van een nieuw werkboek: hoofdstuk elektriciteit. 2e klas Havo/VWO.

Hagendoorn, B. (2009) Viscous coupling between bio-inspired hair-sensors.

Hagens, B. (2022) Analysis of Stochastic Behaviour in Sokoban.

Hagens, Florian (2023) Efficient Task Dispatching for Real-Time Systems: A Case Study in FreeRTOS.

Haji Ghasemi, Maryam (2014) Symbolic model checking using Zero-suppressed Decision Diagrams.

Hakim, V.S. El (2015) Implementation and Analysis of Real-time Object Tracking on the Starburst MPSoC.

Hakkenberg, Chiel (2016) Experimental evaluation of LoRa(WAN) in indoor and outdoor environments.

Hakvoort, Gido (2011) Immersion and affect in a brain-computer interface game.

Halchenko, V. (2023) Using transformer architecture and natural language processing for detecting offensive content and cyberbullying.

Halim, Ricco (2022) Decentralization, Scalability, and Security Trade-off in Blockchain System: Comparison on Different Approaches.

Haller, Stefan (2020) Automatic Short Answer Grading using Text-to-Text Transfer Transformer Model.

Hallsworth, Sian (2021) Metrics for Efficiency of Spectrum Sharing in Wireless Networks.

Ham, Laura (2020) The design of an Interactive Topic Modeling application for media content.

Ham, Wim van der (2011) An Appraisal Based Model of Affect for a Negotiating Agent.

Hamelers, L.H. (2018) Investigating generic online animal activity recognition across different animal species.

Hamelers, L.H. (2021) Detecting and explaining potential financial fraud cases in invoice data with Machine Learning.

Hamza, Muhammad (2021) Blockchain and Artificial Intelligence in Sustainable City : Can These Technologies Create Sustainable Cities and Communities?

Haq, Muhammad Yasir Muzayan (2018) Predicting Loan Default in Retail Credits: The Case of Indonesian Market.

Harbers, Thom (2023) To what extent do uncertainty, sentiment, and authors influence the amount of anthropomorphic behavior on social media?

Hari, Atul (2020) A spatial cognitive exploration algorithm for autonomous mapping of unknown indoor environments.

Harleman, R.J.S. (2018) Optimizing Online Advertising using Dynamic Pricing.

Harleman, T. (2011) Towards a generic model for audit trails.

Harmelink, R.L.A. (2019) Computing threat points in two-player ETP-ESP games.

Harmes, J.P.M. (2020) A threat model analysis of audio recording on mobile health care applications.

Harms, J.R. (2020) Research and Design of Collecting and Analysing the Customer Journey in a Collaborative Software Tool.

Harmsen, Emiel (2018) OpenIMPRESS : an open immersive telepresence system.

Harmsen, Ruud (2015) Specifying the WaveCore in CλaSH.

Harmsma, W.H. (2022) Automated detection of hidden failures in heating and photovoltaic systems of ‘Nul-op-de-meter’-housing Projects.

Harrower, Jeffrey (2017) Social communication and digital privacy concerns of teenagers.

Harten, A. van (2023) The role of WebSDR usage in open source intelligence gathering during geopolitical events.

Harten, Anne van (2019) Analyzing Programming Education Quality based on Students' Questions.

Harten, R.H. van (2023) AI Enabled Slice Resource Management for Improved QoS in WiFi-based IoT Networks.

Hartholt, Woutske (2010) Beslissingsondersteuning voor het aanpassen van de online OK-planning.

Hartmans, L.A. (2023) Predicting Soil Moisture for Improved Environmental Sustainability: A Multivariate Time-Series Forecasting Approach using Machine Learning.

Hartog, D den (2022) Event record-based evaluation of business scenarios in the logistics domain using process mining.

Hartog, M.R. den (2010) Shunt planning : an integral approach of matching, parking and routing.

Hartvelt, S.J. (2020) Assessing the impact of data availability on parking prediction accuracy : a case study using a simulation-based Approach.

Hassani, A.Z. (2011) Touch versus in-air Hand Gestures : Evaluating the acceptance by seniors of Human-Robot Interaction using Microsoft Kinect.

Hassink, N. and Schopman, M.G. (2006) Gesture recognition in a meeting environment.

Hast, Fritz (2020) The Impact of 5G on Future Data Center’s Carbon Dioxide Emissions.

Haterd, Rik van de (2024) Enhancing Privacy and Security in IoT Environments through Secure Multiparty Computation.

Hauser, Brand (2022) GridShield on a Multilayered Electric Grid.

Have, C.J. ten (2024) Change point detection of fatigue using the martingale statistic.

Haverkamp, Indy (2023) Analyzing Advantages and Limitations of Combining Cryptography and Steganography Across Applications: A Systematic Review.

Havinga, Thijs (2019) Embedded Infrastructure for Decentralized Energy Management.

Havinga, Thijs (2021) MmWave Beam Control for Geocasting in Vehicular Networks.

Havinga, W. (2005) Designating join points in Compose* : a predicate-based superimposition selector language for Compose.

Hazekamp, C. (2018) Inferring animal social interaction using proximity based on BLE and LoRa.

He, Wenruo (2022) Augmenting and Graph Scaling for Context-Aware Citation Recommendations.

He, Xiaobo and Mayasari, Elisabeth E. (2003) A Design of Software Architecture for “SHAPE” Workforce Management Game.

Heath, Andrew (2021) Investigating the use of hub neuron identification for pruning sparse neural networks.

Heddema, R.R. (2007) Strategy for a robot soccer team - Let’s play robot soccer -.

Heegde, B.E.R. ter (2024) Building a Generalized DNS Resilience Tool using the Internet Yellow Pages.

Heer, G.W.A. de (2014) Instance Pointcuts.

Heerde, Harold van (2006) Life-cycle privacy policies for the ambient intelligence.

Heeringa, T.J. (2022) The Effect of Higher Order Activation Functions on Infinitely wide Neural Networks.

Heerlien, I.R. (2020) Automatic detection of user errors in spirometry data using machine learning techniques and the analysis of the effect of metaphors on the quality of spirometry measurements.

Heerlien, I.R. (2020) Automatic detection of user errors in spirometry data using machine learning techniques and the analysis of the effect of metaphors on the quality of spirometry measurements.

Hegeman, Erik (2011) InfoSupport : On the Quality of Quality Models.

Hegge, Stephan (2007) Predicting end-to-end network characteristics on mobile devices.

Heij, A.C. (2023) Solving the 5x5x5 Rubik’s cube: heuristic approach.

Heijblom, A.R. (2016) Using features of models to improve state space exploration.

Heijden, G.A.M. van der (2022) Building a sense inventory for Dutch healthcare abbreviations.

Heijden, L.M.A. van der (2019) Classification-based Approach for Question Answering Systems: Design and Application in HR operations.

Heijden, Rens W. van der (2012) SeDyA: secure dynamic aggregation in VANETs.

Heijer, Frank den (2018) Method for legacy software evaluation based on the Balanced Scorecard and AHP.

Heijningen, Pieter van (2023) Exploring The State of Rate Limiting in IPv6.

Heijnsbergen, I.M. van (2022) Importance of system dynamics in project management : a collection of case studies.

Heijs, Wouter (2019) The design of an expert profile and the availabilty of employee expertise sources.

Heikamp, F. (2018) Gray-box Network Fuzzing using Genetic Algorithms and Code Coverage.

Heinen, Floris (2024) Improving the creation of AIGs from reactive synthesis.

Heinen, Niek (2020) Using lightweight image classifiers for electrocardiogram classification on embedded devices.

Heinrich, Carl Vico (2023) Hand luggage overflow prediction at KLM.

Heinsius, L.R. (2021) Real-Time YOLOv4 FPGA Design with Catapult High-Level Synthesis.

Hek, J. (2014) Clustering the results from brainstorm sessions.

Heling, Yoran (2014) Biased Random Periodic Switching in Direct Connect.

Helvoort, L.F.A. van (2023) DumpingMapper : illegal dumping detection from high spatial resolution satellite imagery.

Hemert, Teun van (2013) Implementing flexible, extensible composition operators.

Hendriks, C. (2020) Proactively detecting crafted domains using active DNS measurements.

Hendriks, J.J. (2023) Interactive Segmentation in Space-time Memory Networks.

Hendriks, K.W. (2023) Data Governance Structures in Data Mesh Architectures.

Hendriks, Koen (2020) The improvement of objective milkfoam quality analysis through image processing and computer vision.

Hendriks, Luuk (2014) SSH Compromise Detection using NetFlow and IPFIX.

Hendriks, M. (2019) Can machine learning automatically choose your best model checking strategy?

Hendriks, Max (2023) Consider it Parsed!

Hendriks, Remi (2021) The burden and information gain of path-based topology discovery.

Hendriks, Remi (2023) Improving anycast census at scale.

Hendrikse, B. (2019) Data-driven IT : tackling IT challenges with data management in a financial institution.

Hendriksen, S.J.F. (2022) Viability of anomaly detection aid for vessel traffic service operators.

Hengst, Kimberly (2020) Best Practices in Cloud Incident Handling.

Hensema, M.A. (2015) Applying Agile in Enterprise Architecture.

Hentschel, J. (2023) Point cloud segmentation via active learning in the context of railway infrastructure.

Henzen, S.F. (2008) A framework for service-oriented extensions to Ruby on Rails.

Herbowo, Keanu Nurherbyanto (2022) Comparing Zero-Knowledge Proof Protocols for Practical Open Source Self-Sovereign Identity Systems.

Herms, K.G.F. (2007) Body pose tracking in the Watching Window : a system that tracks both hands in a virtual reality environment.

Herwijnen, A.G. van (2016) The influence of inner-state displays on human-human interaction.

Hessels, R.A. (2021) Activity Recognition in Nature using Sound and AI.

Hessels, Ruben (2023) A Data Quality Assessment of the Suspicious Transactions.

Hessels, Stefan (2014) Adoption of Personal Health Records (PHR) in The Netherlands: A study using the PRIMA-model.

Hessels, Stefan (2016) Bridging the gap : from process mining to business process simulation.

Hesson, Alexandru (2023) Detecting GAN-generated face morphs using human iris characteristics.

Hetterscheid, K.J.T. (2020) Detecting agitated speech : A neural network approach.

Hettinga, S. (2010) Performance analysis for embedded software design.

Heukels, F.R (2015) Simultaneous Localization and Mapping (SLAM) : towards an autonomous search and rescue aiding drone.

Heukels, Rolf (2012) Predicting user behavior using transition probability.

Heus, Marije de (2013) Design and evaluation of a recommender system for high school courses in the Netherlands.

Heus, Steven de (2020) Designing and Evaluating an Educational Board Game.

Heuts, R.P. (2007) Mobile interface design for dynamic environments.

Heuvel, L.P.W. van den (2023) Diffuse more objects with fewer labels.

Heuven, D.W. (2014) Opportunistic sensing & Aggregation network Using Smartphones and Sensor nodes.

Heuver, J. (2022) Markerless stride segmentation for canine pose estimation.

Heuver, Rien / P.R. (2020) Generating facial morphs through PCA and VAE.

Heyns, L. (2020) Converting Modest Models to Efficient Code.

Hidding, S. (2017) iBeacons for Concordia : Exploring the possibilities of iBeacons in a museum context.

Hiemstra, D. (1996) Using statistical methods to create a bilingual dictionary.

Hijlkema, Frank (2022) Direction-of-Arrival Estimation Using A Machine Learning Framework.

Hijmans, Remco (2012) Comparing grid-based features and classification settings, in an off-line supervised human action detection and recognition task.

Hijum, S. van (2016) Symbolic model checking of timed automata using LTSmin.

Hilbrants, ir. MSc K.Y. (2024) Development of a Machine Learning Model to Detect Freezing of Gait in Parkinson Patients.

Hillerström, F.H.J. (2016) Deep verification learning.

Hillerström, M.A.M. (2021) Towards Implicit Authentication in Smart Logistics: A Random Number Generator for Sensor PUFs in Resource Constrained IoT Devices.

Hindriks, H.N. (2016) Vulnerability analysis of cyber security modelling language models using probabilistic logic.

Hinojosa, Luis G. (2023) Analysis of node performance in lightweight key management protocols in IoT networks.

Hlukhau, Ihar (2022) Multiphoton microscopy for in-tissue imaging of micro-robots.

Ho, H.P. (2023) Unplugged Versus Plugged Gamification : A Comparative Study in Higher Education on Engagement, Motivation and Teachers’ Perception.

Ho, Yoeng Woey (2008) .NET integration TEAHA.

Hobert, E.C. (2020) Integrating Energy Awareness into Sequence Control.

Hobert, L.H.X. (2012) A study on platoon formations and reliable communication in vehicle platoons.

Hoedemakers, Juliette (2018) Effective visualisation of textile for a Digital Showroom.

Hoedemakers, Juliette (2020) Development of the voice commerce ultrasound payment solution for FMCG in the innovation labs.

Hoegen, Rens (2015) Human Behavior towards Virtual Humans.

Hoek, J.M. van (2020) Predicting purchasing intent of website visitors with deep feature learning.

Hoek, Marissa (2014) Generating Dutch focalized stories about interaction in a serious game.

Hoekerd, P.G. (2013) Using existing software to build a virtual community for telemedicine.

Hoeksma, Ruben (2010) Price of anarchy for machine scheduling games with sum of completion times objective.

Hoekstra, G.I.S. (2018) Towards a software architecture model for the automation of the PIRATE robot.

Hoekstra, Æ. S. (2021) Deobfuscating third party libraries in Android applications using library detection tools.

Hoener, P.M. (2015) Improving the Processes and Safeguards for Fraud Detection and Prevention in US Medicaid.

Hoener, P.M. (2013) Cloud Computing Security Requirements and Solutions: a Systematic Literature Review.

Hoeve, Thijs ten (2012) Model based testing of a PLC based interlocking system.

Hoevers, S.J. (2022) Discourse on Discord : An analysis of relations between users.

Hoff, A.W. (2023) Evaluation of Multiple Machine Learning Algorithms and Glycemic Variability Indices for Predictions of Glucose Levels in Type 2 Diabetes Mellitus Based on Continous Glucose Monitoring and Activity Data.

Hofman, M. (2023) Novel Deep Learning Methods for Modeling and Prediction of Abdominal Aortic Aneurysm Growth.

Hofman, N. (2020) Enterprise social software acceptance : overhauling the "One Size Fits All" approach to explain social intranet usage.

Hofste, J. (2012) Scalable identity extraction and ranking in Tracks Inspector.

Hofstee, S.B.H.C. (2022) Analysis of pruning methods for compact neural networks on embedded devices.

Hofstra, Matthijs (2018) Integrating Formal Methods Tools : A Case Study.

Hofstra, Silke (2018) Automated analysis and simulation of control systems using dataflow.

Hofsté, G. te (2023) Evaluation of On-line Reconfiguration Techniques for a Distributed Avionic Middleware.

Hoftijzer, D.M. (2023) Language-Based Augmentation to Address Shortcut Learning in Object-Goal Navigation.

Hogema, T.A.M. (2019) Counting People in Simultaneous Speech using Support Vector Machines.

Hogema, T.A.M. (2021) Health information exchange in the Netherlands.

Hogenkamp, Tom (2019) Framework for Fine-Grained Partial Reconfiguration on FPGAs.

Hogt, N.A. (2008) Aanbevelingen voor een architectuur voor het regionale zorgsysteem.

Hoheisel, R.E. (2022) Ransomware as a tool for diversion and coverup. A possible modus operandi for advanced persistent threats? A (practical) Investigation into the Use of Ransomware as Masquerade and Distraction.

Hol, M.C. (2018) Using user workflow analysis to create insights in content-intensive applications : Combining Process Mining and Model-Driven Engineering to create a reusable, scalable and user-friendly solution.

Hol, Valentijn (2022) Bit-packing and Hashing Evaluation in Explicit-state Model Checking.

Hollander, Emiel (2010) Dynamic access control.

Hollander, J.P. (2021) Verification of a model checking algorithm in VerCors.

Holzenspies, Philip (2005) SILC: SPRITE Input Language with C(++).

Hong, L. (2009) Implementation and tuning of optical singlesideband modulation in ring resonator-based optical beam forming systems for phased-array receive antennas.

Honig, J.J. (2020) Incremental symbolic execution.

Hoogendoorn, T.A.D. (2023) Survey of explainability within process mining.

Hoogervorst, R.W.P. (2018) A model-driven data-analysis architecture enabling reuse and insight in open data.

Hoogesteger, Martijn (2016) Securing mobile VoIP privacy with tunnels.

Hoogsteder, V.J.M. (2007) Strategic performance measurement for eBuddy.

Hoogteijling, S. (2022) The electrophysiological signature of epilepsy studied by artificial intelligence and explainable artificial intelligence.

Hop, Ivan J. (2022) On the Performance of Algorithms for Quantitative Verification.

Horlings, S.J. (2021) Visual feedback from a virtual coxswain to improve engagement.

Hormann, Tina Marie (2020) Web design for different user generations : the impact of aesthetics on emotions and quality perceptions.

Horn, D.M.J. van (2022) Process improvement using machine learning.

Horneț, Victor (2023) Introducing Typeling: an Imperative Programming Language with Algebraic Data Types.

Horst, Arie (2010) Sport coach : online activity using wireless sensor network.

Horst, Jonas ter (2022) Machine Learning for Exchange Traded Fund Price Predictions.

Horst, L. van der (2023) Saving energy in cellular networks through resource sharing.

Horst, Oliver (2018) Development of a smart healthcare tracking system : for the hip fracture rehabilitation process.

Horst, Reinier L.C. van der (2022) Error Estimation for Output Prediction of Photovoltaic Systems.

Houtman, J. (2009) Bringing scalability/failover to a complex producer/consumer implementation.

Houtsma, R. (2022) An Explainable Machine Learning Approach to Risk-Adaptive Access Control.

Houtsma, Ramon (2022) An Explainable Machine Learning Approach to Risk-Adaptive Access Control.

Houwelingen, Jan Willem van (2008) Relevance and usability of enterprise architectures during post merger IT integrations.

Hove, D. ten (2010) Change management within SysML requirements models.

Hove, K.W. van (2019) Automated DDoS Attack Fingerprinting by Mimicking the Actions of a Network Operator.

Hove, K.W. van (2022) Threat analysis of RPKI relying party software.

Hristov, I. (2018) A system for improving analysis of complexes in real estate asset management.

Hristov, P. (2022) Designing an intrusion detection system for a Kubernetes cluster.

Hu, Danchao (2011) Using actor-network theory to understand inter-organizational network aspects for strategic information systems planning.

Hu, X.L. (2021) Lightweight image-based key point tracking for real-time bridge monitoring with smartphones.

Huang, Liting (2012) Secure and privacy-preserving broadcast authentication for IVC.

Hubert, André (2019) AI-Enabled Automation : A Framework for Identifying a Company’s Automatable Core Processes.

Huh, Jeongyeon (2023) Bayesian-Network updating using novel clinical data.

Huiden, J.E. (2019) Generating Realistic Ghost Fingerprints by Combining Real Fingerprint Images.

Huijgen, Arris (2013) Effciently protecting virtualized desktop infrastructures against malware : Performance comparison between traditional- and centralized antivirus.

Huijsmans, Maarten (2022) The chatbot usability scale : an evaluation of the Dutch version of the BUS-11.

Huijstee, Michiel van (2024) Enhancing Learning Management Systems : A Novel Approach to Improve Usability through Learning Analytics.

Huiskes, M. (2020) Automated robust planning for intensity modulated proton therapy (IMPT) in oropharyngeal cancer patients using machine learning.

Huisma, G. (2022) Recursive island parsing : monadic lake parser combinators.

Huisman, A.B. (2016) Deception detection using keystroke dynamics : on the methods to predict deceptive behavior by looking at the keystroke rhythm.

Huisman, D.A.J. (2021) Generating Specifications to Verify the Correctness of Sanitizers.

Huisman, Rolf (2007) Bugspray for composition filters.

Huisman, Sander (2020) ClaSH-based Framework for Hardware Generation of Optimised Real-Time SDRAM Interfaces Using Static Memory Access Patterns.

Huistra, D.J. (2016) Automated generation of attack trees by unfolding graph transformation systems.

Huitink, N.J. (2020) Workforce Prediction of Order Picking Personnel.

Huizen, J.C. van (2018) Development of a prototype-centred co-design process with autistic people to support semi-independent living.

Huizenga, G.R. (2015) A Front-end Application for Markov Random Field-based Texture Image Segmentation.

Hullu, Clermond de (2013) Architectural design of modular ESB systems.

Huls, C. J. (2015) A scenario planning for interbank payments and Decentralized Ledger Platforms.

Hulsebosch, M.A.C. (2016) Cloud Strife : an analysis of cloud-based shadow IT and a framework for managing its risks and opportunities.

Hulsebosch, Marc (2013) Targeting gamification applications to increase user participation.

Hulshof, Mike (2021) Information security certification in context : a strategy selection maturity model.

Hulswit, D.R. (2006) Automatic interpretation of Nijntje-images.

Hulter, J.G. (2022) Improving the integrated development environment of a legacy software platform.

Hultermans, M.A.A. (2019) A Theoretical Ad Hoc Lunar Communication Network With CubeSats as Secondary Payload of Lunar Missions.

Hummel, Tim (2014) Exploring Effects of Electromagnetic Fault Injection on a 32-bit High Speed Embedded Device Microprocessor.

Hurne, I. van (2014) Towards a Unifying Framework for Modelling and Executing Model Transformations.

Huttinga, N.R.F. (2017) Insights into deep learning methods with application to cancer imaging.

Huttinga, S.S.J. (2019) Procesautomatisatie door middel van object detectie, een machine-learning ontwikkelingsmethodologie.

Huveneers, Maartje (2021) The Development of a Horse Activity Recognition Algorithm.

Huveneers, Maartje (2024) The Effective Use of Limited Feedback to Personalize a Mixed Model for Human Activity Recognition.

Huynh, Mr. Quang Long Q.L. (2022) Analysis on relations between graph metrics and average consensus algorithm convergence speed.

Höfer, Christina (2013) Privacy-Preserving : Charging for eMobility.

IJsselmuiden, M.J.H. van (2018) 3D-model annotation for Computer Aided Design in augmented reality.

Iadarola, Giacomo (2018) Graph-based classification for detecting instances of bug patterns.

Ibrahim, Arief (2019) Forecasting patient demand and predicting inpatient admission via machine learning techniques in acute care domain.

Idserda, K. (2008) Simultaneous binding proxy mobile IPv6.

Ignat, R. (2023) Inclusion vs exclusion oriented clarifying questions for conversational product search.

Ignatius Patrick, Patrick (2020) Assessing LOKI by learning from Mitsuku and dataset themes.

Ikhena, Priscilla Onivie (2020) Designing a system for evaluating the performance of computer vision applications, and managing the events generated by these applications.

Ikink, D.T.R. (2020) Security for an Internet-of-Things Network in the Context of a Dairy Management System.

Imbrea, A. (2020) An empirical comparison of automated machine learning techniques for data streams.

Imhof, T. (2020) Home telemonitoring acceptance for eye care patients.

Imre, Baris (2021) An investigation of generative replay in deep reinforcement learning.

Imre, Baris (2023) Using a Multi-Scale Patching With Vision Transformers for 3D Image Segmentation.

Indrawijaya, K.R. (2019) Self-management Rehabilitation Capabilities on Older Adults by Persuasive Technology.

Ingberg, G. (2006) Location aware performance measurements.

Ingen, D. van (2018) AIRplay : designing a game for children with asthma to support self-management.

Inoue Nakagawa, P. (2021) Semantic Description of Explainable Machine Learning Workflows.

Ion, Diana-Elena (2021) Decentralized Finance Analysis.

Ionita, Dan (2013) Current established risk assessment methodologies and tools.

Iperen, M.M.A.P. van (2024) Unveiling the hidden threats : An approach to solve the cost metric of an Attack Tree.

Iperen, M.M.A.P. van (2024) Unveiling the hidden threats : An approach to solve the cost metric of an Attack Tree.

Irfan, Tekinerdogan (2022) Online platform for supporting the development of assistive technology tools for disabled people.

Irokosu, Anthony (2023) Performance Comparison of CNN-based Semantic Segmentation on Indoor and Outdoor Scenes.

Iseke, Ann-Cathrin (2020) An Enterprise Architecture Approach Towards Sustainability and Environmental Performance.

Iskandar, Kevin (2022) 2FA SMSs: Influence of Cybersecurity Behavior & OTP Message Content on Security2FA SMSs: Influence of Cybersecurity Behavior & OTP Message Content on Security.

Isnaynizahra, N. (2022) Dashboard as a decision support tool to minimize empty miles in shipping network : locating region for improvement.

Ivanov, Filip R. (2021) Blike: Developing a cycling gamification app for teaching and motivating people to cycle.

Jaarsveld, F. van (2020) Estimating the effects of the Macroscopic Traffic Parameters on the overall Cooperative Awareness Message generations.

Jacobs, M.J.F. (2022) A software development project ontology.

Jafarli, Sevinj (2022) Providing DNS Security in Post-Quantum Era with Hash-Based Signatures.

Jagannatha, P. (2016) Detecting Exploit kits using Machine Learning.

Jager, J (2017) Joint level modelling, characterisation and torque control of the SHERPA robotic arm.

Jakel, Tibor (2019) Using Sentiment Data from the Global Database for Events, Language and Tone (GDELT) to Predict Short-Term Stock Price Developments.

Jangamguravepalli Bramhanadareddy, Deepika (2022) Modern customer expectations and their effects on Digital Transformation in SMEs.

Jansen, Bas (2019) Automated Testing of Models of Cyber-Physical Systems.

Jansen, Benjamin (2023) Enabling Predictive Maintenance through Efficient Data Warehousing – A Case Study.

Jansen, F.X. (2020) Shining light on software modelling : a creative technology workshop.

Jansen, G.A.A. (2020) Underground Wireless Communication and Wake-Up at 125 kHz.

Jansen, Joost (2019) Communication of Incident Severity between Customers and Analysts in a Security Operations Center.

Jansen, Joost (2019) Detecting Combosquat Domains using Active DNS Measurements : communication of incident severity between customers and analysts in a SOC.

Jansen, L.J.A. (2022) Assessing smart home security : a Zigbee case study.

Jansen, L.W.L. (2020) Comparing cloud security directions between the Academia and the Industry.

Jansen, L.W.L. (2022) About the effect of white-box membership inference attacks on federated learning in large networks.

Jansen, Lisette (2007) Panze: A Multimodal Preschool Music Education System.

Jansen, M. (2012) Improving inattentive operation of peripheral touch controls.

Jansen, R. (2016) Waypoint navigation with obstacle avoidance for MAV's.

Jansen van Rosendaal, J.B. (2017) A context aware dynamic lighting system for the SmartXp.

Janssen, Bas (2016) Determining truth in tweets using feature based supervised statistical classifiers.

Janssen, D.D. (2021) Data-Driven Analysis of Cellular Network Resilience in the Netherlands.

Janssen, Djordi (2019) The Effects of Active Learning on Computer-Aided Diagnosis in Multi-Disease Prediction of Chest X-rays.

Janssen, M. (2023) A parser generator for visibly pushdown languages : translating between VPLs.

Janssen, N.E. (2022) The Evolution of Data Storage Architectures : Examining the Value of the Data Lakehouse.

Janssen, Stefan C. (2016) Reducing labeled data usage in duplicate detection using deep belief networks.

Japink, Patrick (2023) Redis, Apache Kafka, RabbitMQ: Effect of choosing Event-streaming middleware upon architectural constraints defined by Non-functional requirements in Event-driven microservice architectures.

Jarosinski, W.W. (2019) Using Co-Design to Develop ‘Autshare’, an Online Solution-Sharing Platform for Autistic Individuals.

Jaspar, S.L.J.O. (2023) Generalization capabilities of a learning from demonstration framework capturing a human controller.

Jaspar, S.L.J.O. (2023) Generalization capabilities of a learning from demonstration frameworkcapturing a human controller.

Jaworski, M.Z. (2022) Particle swarm optimization of custom bitcoin trading algorithm.

Jayagopal, Tarun Narain (2021) VICE-GAN: Video Identity-Consistent Emotion Generative Adversarial Network.

Jeckmans, A.J.P. (2009) Practical Client Puzzle from Repeated Squaring.

Jeeninga, Jesper (2011) Improving communication between computer programmers and domain experts : creating a generic scenario description language to aid the process of describing scenarios for emergency response training simulators.

Jeeva, Joshua Anith Singh (2023) Risk Assessment of Humanoid Robot EVE-r3.

Jellema, Hylke Jesse (2023) Privacy-Friendly Room Occupancy Measurement System.

Jellema, J.M. (2019) Polynomial Calculation of Quasi-Gray code labelings for Irregular Signal Constellations.

Jeltes, Claire (2018) The introduction of foetal therapy for TTTS patients in the Radboudumc : including the development of 3D FLOVA-SLAM.

Jeltes, M. (2024) Analyzing the use of renewable energy in Dutch web hosting through DNS measurement data.

Jerkovic, Christian (2023) GAN Generated Morphing Attack Detection by Analyzing the Geometry of Pupils.

Jeulink, Kevin (2020) Smart sports exercises project : the detection of (in)correct motion during resistance training.

Jevring, Markus (2008) Automatic management of bluetooth networks for indoor localization.

Jhanjhan, W.S.S. (2015) VICA: The Dutch Windmill - Towards a Contemporary Business Information Management Maturity Model.

Jia, Xin (2017) Understanding social signals from nonverbal behaviors in a mobile setting.

Jiang, Yuling (2023) Patch-Based Morphing Attack Detection.

Jimenez Kwast, D. (2016) GPU-Based Photon Mapping for Approximate Real-Time Indirect Diffuse Illumination.

Jochems, Bart (2010) Detecting emotional intensity peaks in narrative conversational settings.

Jochemsen, M.C. (2014) An exploration of content-driven commerce.

Johannink, M.G. (2022) The impact of IT outsourcing on IT effectiveness.

Johanns, S.I. (2022) Performance comparison of FAME and MPB for simulating wave bands of photonic crystals.

Jong, Berend J.M. de (2014) A basis for the next VHDL revision.

Jong, Koen de (2019) Detecting the online romance scam: Recognising images used in fraudulent dating profiles.

Jong, Koen de (2024) Transformation from OntoUML models to the OpenAPI Specification.

Jong, Maurits D. de (2011) Network Management in a Distributed System.

Jong, R.F. de (2018) SimpleNLG-NL : Natural Language Generation for Dutch.

Jong, R.J. de (2019) Range characterization of backscatter Wireless Sensor Networks.

Jong, Sieta de (2021) A Study on the Use of Interactive Videos in Addiction Treatment for People with an Intellectual Disability.

Jong, T. de (2017) Using Requirement Templates to Automate Requirements Formalization.

Jonge, Marc de (2008) The SpinJ model checker : a fast, extensible, object-oriented model checker.

Jongeling, R. (2008) Signature modification for Compose?/.NET : implications of signature modification for generic compilers and behavioral signatures of types.

Jonker, J. (2008) Wizard of Oz for gesture prototyping.

Jonker, J.H.C. (2021) Weighted convolutional neural networks rare electrocardiogram detection for real-time heart monitoring.

Jonker, M. (2014) Flow-based SSH Dictionary Attack Detection: the Effects of Aggregation.

Jonker, Scott (2023) Continuous representation of kernels used in convolutional neural networks.

Jonkergouw, E. (2021) Haptic Wearables for Social Mediated Touch.

Jonkers, J.W. (2023) Scrutinizing Sounds: A Study on Reconstruction Based Anomaly Detection in Vinyl Records’ Audio Data.

Jonkheim, M.H.T. (2018) Capaciteitsanalyse bij Twence: Een simulatieonderzoek naar capaciteit en doorlooptijd.

Jonkman, F. (2012) Nonverbal behaviour of an embodied storyteller.

Jonkman, Remi (2017) Implementation of a reliable 2D approximator using sonar.

Joore, E.R.M. (2021) Modelling the trade-off between service level and waste of perishable goods at food retailers.

Joosten, Wesley (2021) Learning to Learn : Generalization of Evolved Plasticity Rules in Recurrent Neural Networks.

Joseph, A.M. (2023) Investigating vision transformers for human activity recognition from skeletal data.

Joustra, Yme (2014) Forecasting of wind power production in the Netherlands.

Jundt, O. (2017) Fashion product entity matching.

Jung, Annkatrin (2020) The Breathing Garment - Exploring Breathing-Based Interactions through Deep Touch Pressure.

Jurriëns, Stefan (2019) A Decision Support Tool for the Medium Voltage Networks Expansion Problem.

Jutte, Annemarie (2022) The smart annotation tool : optimizing semi-automated behavioural annotation using an AutoML framework supported by classification correctness prediction.

Jutte, Annemarie (2022) The smart annotation tool : optimizing semi-automated behavioural annotation using an AutoML framework supported by classification correctness prediction.

Jutten, M.G. (2015) The Fit between Business Processes and Process Mining related Activities: a Process Mining Success Model.

Juursema, J.A.J. (2018) Improving visual role mining using metadata.

Jánosi, József-Hunor (2023) Two-Stage Overfitting of Neural Network-Based Video Coding In-Loop Filter.

Kaag, K.W. (2019) Encouraging collaboration between primary school children through a learning robot.

Kaewborisut, D.B.Q. (2023) Self-generated 3D point cloud with raw data from FMCW radar.

Kahnt, Laura (2023) Proxies and Balancing for Shared Flow in Older Adult Cyclists.

Kahraman, G.M. (2020) Characterizing Sender Policy Framework configurations at scale.

Kaijen, J.A.H. (2008) Management of risk & information security data.

Kalbiyev, A. (2022) Affective dialogue generation for video games.

Kalcheva, D.K. (2015) Linked Data adoption and application within financial business processes.

Kalidindi, Kaush (2023) Ontogenetic Epistemology of AI: An Investigation into the Role of Machine Learning in Knowledge Production Through its Genesis and Genealogy.

Kalsbeek, Maarten van (2012) Interface and interaction design patterns for e-commerce checkouts.

Kalter, Stefan Reijmer (2007) Vertical collaboration in open source business.

Kamerman, Wim (2018) Classification of Event-Related Google Alerts Using Machine Learning.

Kamies, Bram (2020) Abeona: A generalized framework for state space exploration algorithm composition.

Kamminga, J.W. (2015) Cooperative Localisation on Android Devices by Utilising only Environmental Sound.

Kamp, T.R. van de (2014) Combining ABCs with ABE: Privacy-Friendly Key Generation for Smart Card Based Attribute-Based Encryption.

Kampen, C.M. van (2020) Formal Automated Verification of a Work-Stealing Deque.

Kampen, C.M. van (2022) Zero Downtime Schema Migrations in Highly Available Databases.

Kampen, Coen van (2019) Missing data imputation based on probabilistic data.

Kamphuis, Gertjan (2014) Adding Quality of Service to Disruption Tolerant Networking using the ORWAR routing protocol for use in military MANETs.

Kampman, T.E. (2018) Nabaztag lives: the rebirth of a bunny : an exploration of the Nabaztag as a social robot in a domestic environment.

Kanagasabapathi, Dhanasekaran (2023) Spatiotemporal analysis for fire forecasting using deep learning techniques in google earth engine : a case study for the Indian state of Uttarakhand.

Kandziora, Jorne (2014) Runtime assertion checking of multithreaded Java programs - An extension of the STROBE framework.

Kang, J. (2023) User-Driven Knowledge Graph Expansion via Ontology Matching and Question Answering.

Kanis, Zwier (2011) Classification of Semantically Coherent Segments in Web Pages.

Kant, Gijs (2010) Distributed state space generation for graphs up to isomorphism.

Kant, M.W.E. (2020) Authorization, privacy and informed consent : who is allowed access to which medical information? : The development of an authorization model for the Datakluis application.

Kantharajappa, Kushal (2023) Point localization on 3D hand meshes and point clouds.

Kappert, K.D.R. (2016) VIRTUAL SURGERY: Development of a surgical simulation tool for the prediction of functional impairment after partial glossectomy.

Kara, M.N. (2021) Classification of drinking-related events at the sensory interactive table.

Karampatzakis, E. (2015) Item availability restricted.

Karchev, F. (2019) IOT device profiling for Honeypot generation.

Karia, D. (2019) Combating money laundering on the blockchain.

Karimah, Fania Rahmanawati (2019) Redesign IT Organisational Structure: Case study of Centre for Data and Informatics Infrastructure (CDII), Ministry of Communication and Informatics Republic of Indonesia.

Karlsson, August (2023) Enabling Cyber Threat Intelligence Sharing for Resource Constrained IoT.

Kars, J. (2014) Improved performance by integrated corrugator and converter scheduling.

Karsten, Jarik (2020) Crunching Attack Trees : efficient algorithms for computation of metrics.

Karsten, Jarik (2022) Improving usability at BetterBe through API analysis.

Karuppannan, Sriganesh (2020) Analysis of various demand side management control mechanisms for a smart solar carpark.

Karuppiah Ramachandran, Vignesh Raja (2014) Characterization of Communication Mechanisms for Implantable Body Sensor Networks.

Karytsas, Konstantinos (2023) Model-Free Reinforcement Learning Control of a Pneumatic-Driven Soft Continuum Robot.

Kas, G.R. (2017) Rapportage about testing of the 3D motion correction.

Kasteel, M.B.M. (2022) Understanding textual interpretations with and without emoji.

Kasteren, L.N. van (2024) Chimney fire prediction in IJsselland.

Kat, V.B. (2024) Bridging the Semantic Gap : Semantic Interoperability for IoT Integrations on iPaaS Architectures.

Kattenbelt, M.A. (2006) Towards an explicit-state model checking framework.

Kazi, Raef (2023) Navigating Semantic Shifts : A Visual Tool for Exploring Word Meaning Change.

Kazmi, Syeda Nazish (2019) Access Control Process for a SaaS Provider.

Keekstra, D.L. (2021) Tracking and segmentation, a tool for assessment of human engineered heart tissue.

Keeris, P.J.C. (2014) Improving the boarding process of external insiders in large organisations.

Kegel, R.H.P. (2014) Development and Validation of a Personal Information Security Assistant Architecture.

Keijer, BSc J.S. (2021) Unsupervised Anomaly-Based Network Intrusion Detection Using Auto Encoders for Practical Use.

Keijer, Julik S. (2019) Automated DDoS mitigation based on known attacks using a Web Application Firewall.

Keijl, Edwin (2013) Picalilly: sharing photos through locative social media.

Keijzer, N. (2020) The new generation of ransomware : an in depth study of Ransomware-as-a-Service.

Keijzer, P.B. (2018) AACE - Assessment of Asthma in Children using Electromyography.

Kelder, R. (2021) Active Vibration Isolation with an Active Stage.

Kellaway, M.C. (2022) Accelerating the SCION IP Gateway using programmable data planes.

Keller, Kristian M.Sc. (2016) A day ahead electricity storage flexibility prediction for peak shaving.

Kemna, Tim (2006) Bisimulation minimisation and probabilistic model checking.

Kemp, T. (2018) Translating LTL to the equational µ-calculus using Büchi automata optimisations.

Kemp, Tim (2020) An algorithmic approach to a conjecture of Chvátal on toughness and hamiltonicity of graphs.

Kempen, Lindsay (2022) ExpressTTS: Augmentation for Speech Recognition with Expressive Speech Synthesis.

Kenzhebay, Meruyert (2022) Planar roof structure extraction from Very High-Resolution aerial images and Digital Surface Models using deep learning.

Keppels, J.H. (2018) Qualitative Measurement of BI Maturity in a SME ICT Organisation.

Kerckhoffs, N.N.J.H. (2018) Is the “Netflix model” favorable for the audio streaming industry.

Kerimov, Emil (2020) FPGA-based AES variants against side-channel attacks.

Kerkers, M. (2017) Assessing the Security of IEC 60870-5-104 Implementations using Automata Learning.

Kerkhof, R.G. (2020) Natural Language Processing for scoring open-ended questions : a systematic review.

Kerkhof, R.G. (2022) Benchmarking Car Dealership Efficiency using DEA NSBM.

Kerkhoven, Tim (2023) Monitoring Service-level Agreements for Logistics Service Providers.

Kernkamp, Reinier (2007) Alignment of Requirements & Architectural Design In a Blended Delivery Model.

Kers, R.J. (2015) Head mounted control system for robotic assisted surgery.

Kers, Richard Jacob (2018) Low Energy Multi-Hop Mesh Network for Nomadic Localisation Sensors: On the Design, Development and Deployment.

Kers, T (2018) Household occupancy detection for burglary purposes : Risk assessment and effectivity analysis of an unobtrusive, easy-to-implement countermeasure against Wi-Fi tracking.

Kerssens, M. (2023) The FAIR-iT framework : Towards the adoption of the FAIR principles in an enterprise context.

Kessel, L.J. van (2017) A desk light to improve working attitude.

Kessel, M. van (2021) Improving a data conversion process.

Kessel, Ruud van (2008) Querying Probabilistic XML.

Kessels, Casper (2018) Rethinking the interactions between people and cars.

Kessels, J.C. (2024) Deep reinforcement learning to support dynamic decision-making in a transport network amid travel- and handling time uncertainty.

Kesteloo, T.V. (2020) Autonomous navigation for the pipeline inspection robot "PIRATE".

Kester, J.J. (2018) CheckMerge: A System for Risk Assessment of Code Merges.

Kester, L. (2022) Providing tailored advice for preparing for the ethics assessment procedure.

Kesteren, L. van (2022) Differentiating between facial landmark shifts due to pose variation and morphing.

Ketelaar, J.G. (2012) Controller design for a bipedal robot with variable stiffness actuators.

Ketkale, N. (2023) Alleviating negative emotions associated with goal failure with the use of musical data representation.

Keuper, D. (2012) XNU : a security evaluation.

Keurhorst, Maaike (2019) Feedback On Gaze Behaviour In Virtual Reality Bicycle Training For Children with a Developmental Coordination Disorder.

Khadka, Ravi (2010) Model-driven development of service compositions : transformation from service choreography to service orchestrations.

Khalil, Saad (2024) Differentially Private Synthetic Data Generation using Large Language Models.

Khan, Atif Mushtaq (2021) Proposing and Deployment of Attractive Azure AD Honeypot With Varying Security Measures To Evaluate Their Performance Against Real Attacks.

Khan, Etienne (2022) Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers.

Khan, Muhammad Daiman (2019) An investigation into trust between an SAV and its passengers.

Khanal, Binita (2022) Using Machine Learning to Predict the Risk of Human-Elephant Conflict in the Nepal-India Transboundary Region.

Khasuntsev, N.A. (2019) Accurate and Efficient Classification of Cyber Security Documents.

Khasuntsev, N.A. (2021) Automatic Detection of Misconfigurations of AWS Identity and Access Management Policies.

Khattab, A. A. M. (2018) Towards an interactive drone : a Bayesian optimization approach.

Khavrona, Oleh-Yevhen (2021) B-epsilon-tree and cache-oblivious lookahead array: a comparative study of two write-optimised data structures.

Khavrona, Roman (2022) Analysing Internet route changes related to the Russia-Ukraine war using BGP historical data.

Khoirunnisa, Elvin (2024) A Reference Model of Operation and Maintenance (O&M) Strategies for Community-based Photovoltaic (PV) Microgrids on Small Islands.

Khotina, A. (2017) An innovative search interface for Gesture Dictionary.

Kichler, Neil (2021) Robustness of sparse MLPs for supervised feature selection.

Kim, Hyeon Kyeong (2022) Visual Programming Environment to Generate Arduino Code for Wearable Toolkit.

Kim, John (2019) Building a Platform to Improve Sedentary Behaviour by Centralising Joy in Physical Activity.

Kim, Woong (2022) Design and Control of Efficient and Powerful Robot Joints.

Kimirilova, Julia (2018) Meetbaarheid van ‘openheid voor verandering’ door middel van de geautomatiseerde methoden : een literatuurreview.

Kingma, J. (2009) Combined VCO/Mixer for satellite receiver in CMOS.

Kip, J.B.W. (2017) Developing a Data Visualization Tool for Minimal Cut Sets.

Kippers, Richard Gerrit (2021) Methodology for reconstruction of 3D Building Models using 3D-CityJSON and Floor Plans.

Kiviniemi, O.L.N. (2023) Fraction farm : tangible learning experiences for learning fractions.

Kivits, Enno (2023) Input Variable Selection for a Classification Algorithm to Predict Personalised Health Advice in Secondary Prevention : A Pilot Study.

Kivits, M.P.W. (2018) Constructing a Convolutional Neural Network for Semantic Segmentation of Skin Lesions using a Small Dataset.

Kivits, Max P.W. (2021) Heterogeneous cooperative target tracking using Nonlinear Model Predictive Control.

Klaassen, R. (2009) COPD home interaction device.

Klaassen, W. (2019) Visualizing ocean carrier performance : a framework for evaluating logistic partners.

Klaij, Bastiaan (2005) Toegepast tokenizen voor natuurlijke taal verwerking : automatische analyse van platte en opgemaakte tekst.

Klampe, T. (2023) Creating and evaluating Grammatical Error Correction models with arbitrary error correction profiles.

Klanberg, Indrek (2019) Simulated Silicon Dopant networks : optimizing simulations, searching for boolean gates and visualization.

Klaver, Ruud (2007) Using NSIS (Next Steps in Signaling) for support of QoS aware multimedia services.

Kleef, N.T.M. van (2014) Making people matches using Supervised Machine Learning algorithms.

Klein, A.V.E. (2016) Nonverbal Communication of Anthropomorphism and its Effect on the Perception of Online Education Platforms.

Klein Brinke, J. (2018) Device-free sensing and deep learning : analyzing human behavior through CSI using neural networks.

Klein Essink, B. (2018) iFat: an Interface for Fault/Attack Trees.

Klein Nijenhuis, T.A.J. (2018) Discovery and Quantification of Open DNS Resolvers on IPv6.

Klein Wolterink, W. (2008) A content-based routing protocol for mobile ad-hoc networks using a distributed connected k-Hop dominating set as a backbone.

Kleine Deters, Jan (2018) Therapeutic exercise assessment automation, a hidden Markov model approach.

Kleverwal, J. (2015) Supervised text classification of medical triage reports.

Klifman, T.E. (2011) Propagation of Annotations in a Streaming Context.

Klink, K. van (2019) Detection and Identification of Roman Emperors Using Facial Recognition.

Klink, Karel van (2022) Quantum Key Distribution in a Pan-European Network of National Research and Education Networks, Qualitative and Quantitative Aspects of Implementing a Quantum Key Distribution Network.

Klinkert, Julia L. (2023) Optical See-Through vs. Video See-Through Mixed Reality for Rehabilitation : Exploring the effects of mixed reality on the experience of motor rehabilitation of ABI patients through the eyes of the patient and therapist.

Klooster, J-W. van 't (2008) Context, design and implementation of a control system for ring resonator-based optical beam forming networks.

Klooster, L. (2022) VR CyberEducation : improving the human factor in cybersecurity through an educational virtual reality program.

Klooster, N.A. van der (2021) Designing a Job Interview Space in Mibo.

Kloosterman, C. (2023) Ontwikkeling van Artificial Intelligence in de Zorg en de Rol en Betrokkenheid van Stakeholders.

Kloppenburg, G.W. (2019) The adoption of intelligence amplification in the slotting process : a case study in the data validation automation of a Dutch Retailer.

Klotz, M.S. (2020) Extending the shunting plan generator of the Dutch railways with non-service train traffic.

Kluitenberg, H.F. (2018) Evaluating Quality of Open Source Components.

Klute, L. R. W. (2021) Space-time Trade-off in Clash: Improving Smart Machines.

Klute, L.R.W. (2017) Assisting breast biopsy by visualizing the inside structures of a patient on top of the patient in real time using the HoloLens.

Knippers, D. (2014) Querying Uncertain Data in XML.

Knoben, L. and Otten, M. and Fransen, R. (2013) De waterzuivering als Petrinet : het voorspellen van overstromingen.

Knoben, P.A.H. (2021) Software caching for tree-based algorithms on accelerator cards.

Knol, R. (2020) Emotional activity detection using behavioural sounds.

Knuppe, R. (2018) Drift correction using a multi-rate extended Kalman filter.

Kobes, W.J. (2019) Efficient and accurate classification of cyber security related documents.

Kobes, W.J. (2023) Governmental domain name management : policy versus practice.

Kobes, W.J. (2023) Governmental domain name management : policy versus practice.

Kobzev, Vladimir (2023) Dia : a Domain Specific Language for Scripted Dialogues and Cutscenes.

Koc, M.A. (2022) Raising cybersecurity awareness of University of Twente students.

Koch, Maximilian Alexander (2023) Turning Chaos into Meaning : A Chat GPT-Assisted Exploration of COVID-19 Narratives.

Kock, Arien S. (2007) Enhancing Synthetic Speech with Filled Pauses.

Kock, Joeri (2019) A signature-based Approach to DDoS Attack Mitigation using BGP Flowspec Rules.

Kock, Ties de (2019) Visualization recommendation in a natural setting.

Koegler, Philipp (2015) IT architectures in e-commerce: The effects of modularity, integration and type of components on e-service quality.

Koehorst, G.S. (2021) Visualizing feature importance dependencies in machine learning.

Koehorst, G.S. (2023) Generating natural language triage advice at Dutch out-of-hours primary care centers.

Koelemans, DRPM (2015) Item availability restricted.

Koelewijn, Dirk (2019) Fingerprint-Based Automated Rule Generation for DDoS Mitigation using the Berkeley Packet Filter.

Koelewijn, Dirk (2022) Transformers on a Diet: Semi-Supervised Generative Adversarial Networks for Reducing Transformers' Hunger for Data in Aspect-Based Sentiment Analysis.

Koelewijn, J.W. (2009) Resource operations model in a dynamic world.

Koenen, S.K. (2015) Assessing the level of security of an organization by analyzing the enterprise architecture : a methodology.

Kogelman, T.M.H. (2021) What ethical concepts are of key importance to analyze digital ethics awareness within SMEs?

Kok, Guido (2010) Cloud computing & confidentiality.

Kok, H.M. (2019) Improving the efficiency and quality of help seeking and help giving for programming tutorials.

Kok, H.M. (2019) Hoe kan een tel tool ingezet worden in informatica onderwijs om de leerresultaten van leerlingen te verbeteren?

Kok, I. de (2009) The influence of videoconferencing and an emotional feedback support system on polyadic negotiations.

Kok, J. (2007) The design of a Delta Impact analysis model for data warehouses.

Kok, K.J. (2016) TERRA support for architecture modeling.

Kok, M. (2023) Prominence detection in spoken Dutch using prosodic features and machine learning.

Kok, M.R. (2020) Biologically Realistic Artificial Neural Networks.

Kok, M.R. (2023) Household electricity load forecasting for demand side management applications.

Kokkeler, C.J. (2023) PROMISE : Process Mining for SMEs: a Methodology.

Kokkelkoren, R. (2019) Catching Flux-networks in the open.

Kol, J.C.M. (2018) What is the effect of dominance on the human smiling behaviour in a human-agent dyad?

Koldenhof, Dylan (2021) Word Embeddings to Classify Types of Diachronic Semantic Shift.

Koldenhof, Dylan (2023) Neural Network Backdoor Removal by Reconstructing Triggers and Pruning Channels.

Kolev, Stiliyan (2019) Automation of software vulnerability monitoring for third party products in large IT companies.

Kolkman, M.C. (2015) Cross-domain textual geocoding: the influence of domain-specific training data.

Kolkmeier, Jan (2015) Intimacy is Induced and Regulated Through Proxemic & Gaze Behaviour - A Study in Immersive Virtual Reality.

Kolner, Thomas (2019) Applying machine learning on the data of a controltower in a retail distribution landscape.

Kolthof, Peter (2013) Vaardigheden van middelbare scholieren voor het selecteren van informatie op het internet.

Koning, B. de (2022) Extracting Sections From PDF-Formatted CTI Reports.

Koning, Ruben de (2024) A Comparative Study of Event Detection Algorithms for Energy Disaggregation.

Koning, S. (2020) Modelling and visualizing emergency egress.

Koning, W. (2021) The Design of a Machine Status Management Tool.

Konings, S. (2020) Source code metrics for combined functional and Object-Oriented Programming in Scala.

Konings, S.L. (2021) Lessenserie voor Medium Access Control protocollen.

Kooij, D. (2019) Groovy Parity Games.

Kooij, D. (2022) A Study on the Evolution of the Dutch Web.

Kooij, W.J. (2014) Playout delay of TV broadcasting.

Kooijman, M. (2009) Haskell as a higher order structural hardware description language.

Kooijman, Ruben (2007) See, hear, listen : head movements and the sensitive artificial listener.

Kooistra, Cornelis (2007) Design and testing of embedded control software for the ViewCorrect Plotter.

Kool, B.B. (2022) Application of a neural network to the shift scheduling problem in supermarkets.

Koomen, S.B. (2023) Text generation for quests in multiplayer role-playing video games.

Koop, O.R. (2006) Continuous and discontinuous Galerkin finite element methods of variational Boussinesq water-wave models.

Koopman, M.P. (2017) Improved customer relationship using self-service.

Koopman, Michael (2019) A framework for detecting and preventing security vulnerabilities in continuous integration/continuous delivery pipelines.

Koornstra, J.S.D. (2023) Predicting Ego-Bicycle Trajectory : An LSTM-based Approach Using Camera and IMU.

Koot, Martijn (2016) Overzichtelijke IT Incidenten: Optimalisatie van het IT Incident Management binnen URENCO Nederland B.V. met behulp van Enterprise Architecturen.

Korać, Kristijan (2016) Impact of Data Visualisation on Users in CRM Systems.

Korevaar, Cornelis Willem (2010) A time-frequency localized signal basis for multi-carrier communication.

Koridon, M.S. (2019) Security by decision-making : a decision-making capability model for security countermeasures.

Korpershoek, J.J. (2020) Profiling encryption algorithms using ARM-based cache eviction attacks.

Kortekaas, Y.A.M. (2020) Access Pattern Hiding Aggregation over Encrypted Databases.

Korthout, N. (2017) Towards an architecture design for a future societal energy supply system.

Kortstra, Wybren (2020) Automatic Registration of Clinical Auditsfor Head and Neck Oncology at MST.

Kortüm, Michael (2011) Non-invasive imaging with UWB.

Koryugin, D. (2023) Analysing and alerting on application logs within Kubernetes infrastructure.

Koster, B. (2020) Passive Mass Reduction in Admittance Control.

Koster, J. (2007) Influencing tabletop interaction speed: directness and device.

Kosters, Dennis (2007) Invloed van slimme meters op de energiebalans: Een analyse van de invloed van het slimme meter systeem op een netbeheerder en zijn ondersteunende IT, binnen het kader van de energiebalans.

Kosters, T. (2007) Van gasbel naar gasstel : een onderzoek naar de inrichting van de shipper op de gasmarkt.

Koukoulis, Yannis (2016) Dual laser fault injection.

Koval, M. (2022) Blockchain in dairy supply chains : a literature review.

Kraai, T. (2021) Incident End Time Prediction During the Incident Recovery Process.

Krabbenborg, J. (2024) A Novel Approach Using Smoothing to Detect Errors in OpenPose Estimated Running Data.

Krak, R. (2017) Cycle-Accurate Timing Channel Analysis of Binary Code.

Krapukhin, Alexander (2019) Approximate Least Squares Accelerator.

Krediet, A.C. (2016) Developing and testing an APP model for Air Spiralo.

Kreiser, Simon (2016) Marrying GUI and Git : how authoring tools for E-Learning can benefit from version control.

Kreuger, Robin (2023) Review of social media traffic at the DNS resolvers and their security implementation.

Kreuk, N.A.W. (2006) The Turkish option market.

Kriele, M.A. (2018) Noise-based Frequency Offset Modulation Simulation Model Design : For the analysis of Transmit-Reference Medium Access Control in Multiple Access Ad-hoc Wireless Sensor Networks.

Krijnen, Bram (2007) Heat flow modeling in copiers.

Krijnen, T.A. (2021) Automatic generation of Formula 1 feports.

Krishnamurthy, Ramesh (2021) ADA Software Model Checking.

Krisnawati, Anastasia Maria (2015) Project portfolio valuation with Enterprise Architecture.

Krist, J.O. (2014) The effect of residential storage and conrrol on the distribution net compared to central storage and control.

Kroes, S. (2010) Domain specific embedded languages and model driven engineering.

Krol, Zanur (2021) A new approach to visualizing FMEA data.

Kroon, E. (2009) Layered configuration management for software product lines.

Krooneman, J.M. (2018) Designing a fall detection system for elderly.

Kruif, Cato de (2022) Using d-NFGs to identify and eliminate dead code in C# programs.

Kruiper, T.R. (2019) Optimizing FPGA Designs for Maximum Throughput using RapidWright.

Kruiper, T.R. (2023) Area-Optimized RISC-V-Based Control System for 22nm FDSOI Analog and Mixed-Signal Test Chips.

Kruiskamp, Michel (2008) FastSOA : achieving high-performance service oriented architectures.

Kruistum, G.M. van (2020) Determining the projected frontal area of cyclists using motion capturing data.

Kruk, D.A. van der (2015) A domain-specific language for specifying distributed real-time software system configurations.

Kruk, Niels (2023) Design of an Efficient Map-Based Programming Language.

Kräwinkel, R.W. (2020) The effect of writing and transmitting SD card data on the consistency of SD card write performance.

Kugis, R. (2023) Pace yourself! The effects of optic flow on biomechanics of movement and perceived effort.

Kuiken, J.A. (Jaro) (2020) Modeling associative memory in robots for promoting social behavior.

Kuil, E.D. van der (2017) Validated requirements for a smart logistics application.

Kuil, E.D. van der (2020) A Data Integration Design Approach for the Planning Process of a Public Transport Operator.

Kuiper, D. J. (2019) Fleet Composition in Operational Time Slot Management.

Kuiper, F.J. (2018) Behavioural profiles of potential students as basis for more effective university recruiting.

Kuiper, Guus (2013) Guaranteed-throughput improvement techniques for connectionless ring networks.

Kuiper, Stef (2022) 3D Printing of Continuous Glass Fibre Reinforced Polypropylene Composites.

Kuipers, Elles (2013) Passend onderwijs via de elektronische leeromgeving promotie digitaal.

Kuipers, Floor (2019) Feed the movement - a food waste reduction app.

Kuipers, J.H. (2017) Anycast for DDoS.

Kukuk, L. (2020) Analyzing adoption of contact tracing apps using UTAUT.

Kulatska, I. (2019) ArgueBot: Enabling debates through a hybrid retrieval-generation-based chatbot.

Kulikowski, Dawid (2023) Cross-layer design approach for dynamic control over Wi-Fi network slices: bringing QoS Diversity to Wi-Fi based IoT networks.

Kulkarni, Vishwajit Vijay (2019) Embedded wearable device for monitoring diabetic foot ulcer parameters.

Kulyk, D. (2023) Combining object detection and eye tracking to identify points of interest for VR art exhibition visitors.

Kumar, Atul (2015) Security Analysis of Mobile Payment Systems.

Kumar, Shrijan (2019) Development of SLAM algorithm for a Pipe Inspection Serpentine Robot.

Kumashev, Yernar (2020) GPGPU Verification: Correctness of Odd-Even Transposition Sort Algorithm.

Kunneman, Y.J. (2019) Data science for service design : an exploration of the opportunities, challenges and methods for data mining to support the service design process.

Kuperus, J.H. (2007) Nested quantification in graph transformation rules.

Kuperus, Jasper (2012) Catching criminals by chance: a probabilistic approach to named entity recognition using targeted feedback.

Kuperus, Johan (2009) Wave monitoring using wireless sensor nodes.

Kuppens, D. (2018) Machine Learning for CT-based clinical triage in hemorrhagic and ischemic stroke.

Kuppeveld, Teun van (2007) Model-based redesign of a self-balancing scooter.

Kurnia, Aldi Doanta (2023) Interoperability Simulator for Data Spaces.

Kurzhals, H.D. (2022) Challenges and approaches related to AI-driven grading of open exam questions in higher education : human in the loop.

Kwakkel, D.J. (2022) Measuring well-being with a conversational agent.

Kyriazi or Qirjazi, S. (2018) Machine learning approach to model internal displacement in Somalia.

Kyrloglou, Alexandros (2018) Fixed layer Convolutional Neural Network.

Kyryk, Oleksii (2024) Enhancing Spatial Relationships Detection in text : Analyzing methodologies and managing ambiguity.

Laan, J.H. van der (2021) Incremental verification of physical access control systems.

Laar, B. v.d. (2009) Actual and imagined movement in BCI gaming.

Laarakkers, Mark (2013) Generating continuation passing style code for the co-op language.

Laarhuis, N.M. (2016) Making rational decisions about IT projects using Enterprise Architecture : a case study conducted at ASML Netherlands N.V.

Laarman, A. (2009) An Ontology-Based Metalanguage with Explicit Instantiation.

Laat, Martin de (2019) Design and validation of Software Requirements Specification evaluation checklist.

Lagerburg, R.A. (2023) Overcoming Challenges in Software Development Projects: An Integrated Approach for Small and Medium Enterprises (SMEs).

Lamers, David (2018) Possibilities for blockchain in the energy transition.

Lammers, F.G. (2017) ChildFinder : Finding the Child that walked away playing.

Lammers, F.G. (2021) Flow in the workspace.

Lammers, Mick (2019) A QA-pair generation system for the incident tickets of a public ICT Shared Service Center.

Lang, Shanna de (2016) Mobile pain screening with FollowUp : an app to support anaesthesiologist in the pain screening at outpatient clinics.

Lange, MSc. Amy de (2022) Trial-and-Mirror: Enabling climbing movement exploration with interactive puppetry design to enhance out-of-action perceptual motor skill acquisition.

Lange, Arthur de (2021) Exploring and enhancing the possibilities and performance of a low-field tabletop MRI scanner.

Lange, R-J. de (2010) Provenance aware sensor networks for real-time data analysis.

Lange, T.C.B de (2015) IS/IT integration in mergers & acquisitions: a framework for a systematic approach.

Lange, Valerian (2022) MapColPal - a color palette generation and testing tool for thematic maps.

Lange, W.J de (2023) Exploring the Use of Sentiment Data in machine learning stock Market Predictions.

Langen, S.F. van (2016) An architectural design for LAN-based web applications in a military mission- and safety-critical context.

Langerak, Thomas (2018) Model predictive contour control for electromagnetic induced haptic feedback.

Langkamp, L.U. (2016) Het Effect van Self- Explanation Questions in een Educatieve Game op de Game en Leerprestatie.

Lankhorst, T.J.W. (2018) An architectural approach to cyber-physical system design.

Lansink, M. (2010) Hair simulation and rendering.

Lanting, Peter (2015) Multi-level views in a SUM-based environment.

Lapshyna, V. (2020) Sparse artificial neural networks : Adaptive performance-based connectivity inspired by human-brain processes.

Larizgoitia Burgaña, Jon (2017) Design and evaluation of a link-state routing protocol for Internet-Wide Geocasting.

Laso, P. (2023) Quantifying white matter hyperintensity and brain volumes in heterogeneous clinical and low-field portable mri.

Laso Mielgo, Pablo (2023) Quantifying white matter hyperintensity and brain volumes in heterogeneous clinical and low-field portable MRI.

Lastdrager, Elmer (2011) Securing Patient Information in Medical Databases.

Lathouwers, S.A.M. (2018) Reasoning About the Correctness of Sanitizers.

Latzer, Y.M.E. (2018) Air temperature visualization of public spaces in Enschede.

Laverman, G.J. (2016) Java Code Virtualization of Industrial-strength Java Code.

Lavooij, K. (2010) Near-real time statistics gathered from a continuous and voluminous data mutation stream.

Lazorenko, D. (2023) Satellite nowcasting of cloud coverage via machine learning.

Le, T.A.D (2022) Enhancing IMU-based smartphone context detection using Transformer.

Le, T.N.H. (2022) Aggregation in probabilistic databases : implemented for DuBio.

Le, Van Huynh (2016) Analyzing white-box designs for differential computation analysis resistance.

Lebbing, Peter (2019) Modelling and Realizing the Tunnelling Ball Device in UniTi and CλaSH.

Lechner, Zoe Carlotta (2017) Facing 21st century challenges : an assessment of the EU’s security provisions in the light of increasing cybercrime.

Ledelay, Joël (2021) Retrofitting Memoization : an exploratory study.

Ledelay, Joël (2023) Verification of distributed locks : a case study.

Lee, Ari (2023) Enhancing the Self-Regulated Learning Process Using a Brain-Computer Interface with Auditory Neurofeedback.

Leefer van Leeuwen, Maxmilian (2023) Color Emotions without Blue Light : Effect of a Blue Light Filter on the Emotional Perception of Colors.

Leemans, T.T.J. (2020) An Anomaly Forecasting Method for Support Processes.

Leemans, T.T.J. (2022) Towards Serverless Enterprises: Developing the Enterprise Serverless Assessment (ESA) to assess and improve an organization’s fit and readiness for Serverless technology.

Leemreize, T. (2021) Analyzing fileless malware for the .NET Framework through CLR profiling.

Leenders, R.C. (2023) Exploring the Role of Generated Backchannels in Human-CA Collaboration : Implications for Task Duration and User Perception.

Leendertz, R.R. (2020) Validating the Maneuver Coordination Protocol with UPPAAL.

Leenheer, Bart (2021) Smart User Control in Wi-Fi Access Points.

Leenslag, Wilco (2006) Werkwijze ter beoordeling van IT governance op basis van geaccepteerde methodes op het terrein van IT governance.

Leeuwen, K.G. van (2019) From scan to speech : articulation analysis from real-time vocal tract MRI.

Leeuwen, M.M. van (2015) Agile Scaling @ Topicus : s caling scrum with help of Agile Scaling frameworks at Topicus Finance.

Leeuwen, P. van (2020) FPGA-on-FPGA emulation using subgraph homeomorphism.

Leeuwen, R. van (2023) The Perceived Time Theft of TikTok : The Influence of Self-Assessed Social Media Addiction on the Accuracy of Estimating Time Spent on Social Media: A Study among TikTok Users.

Leeuwen, Tessa van (2022) Project Management Methodology for Robotic Process Automation Implementation.

Legoy, V.S.M. (2019) Retrieving ATT&CK tactics and techniques in cyber threat reports.

Leijzer, Anne (2023) Social support embedded in a mobile phone application to reduce unwanted smartphone usage among students.

Leinweber, Stephan (2021) Accessible Online Addiction Treatment for Patients with Mild or Borderline Intellectual Disability.

Lenderink, R.J. (2019) Unsupervised Outlier Detection in Financial Statement Audits.

Lenders, L.B.L. (2022) Physical Perception of a VR Handshake.

Lenthe, J.M. van (2014) Combining Multiple Malware Detection Approaches for Achieving Higher Accuracy.

Lenz, Dominik (2017) Finding neural correlates for social relationships using EEG hyperscanning.

Leong, Frank (2007) Design of an oscillator for satellite reception.

Leur, C. de (2015) Permission-based separation logic for Scala.

Li, C. (2023) Catheter modelling and force estimation in endovascular application.

Li, Canxuan (2018) Design framework for integrating Internet of Things and Wearable Augmented Reality.

Li, Litian (2021) Simulating Federated Learning for Smartphone based Indoor Localisation.

Li, Q. (2022) Co-attention-based pairwise learning for author name disambiguation.

Li, Qin (2015) Examining the accuracy of sentiment analysis by brand monitoring companies.

Li, Rui (2018) Comparing human-robot proxemics between virtual reality and the real world.

Li, Ruiyuan (2021) Generative Probabilistic Programming in Games: Creating Character Backgrounds Using a Bayesian Network.

Li, S. (2022) MBench : a benchmark suite designed for database schema migration.

Li, Shikuan (2021) The effect of using virtual reality equipment on people's motivation to exercise.

Li, Y. (2020) Interactive visualization of book publication history.

Liang, Y. (2022) Pose estimation with deep neural network trained on tiny datasets.

Libbi, C.A. (2021) When life gives you lemons : designing a game with and for autistic girls.

Liberato, M. (2022) SecBERT : Analyzing reports using BERT-like models.

Licu, D.V. (2020) Automatic container code identification using Machine Learning.

Lievense, M.M. (2021) Detecting, tracking, and identifying horses across heterogeneous videos.

Ligtenberg, L.E.J. van (2019) Emotion dashboard for teachers in special needs education.

Lijbers, J.M. (2016) Predicting parking lot occupancy using Prediction Instrument Development for Complex Domains.

Lijcklama à Nijeholt, D.J. (2020) Control for Cooperative Autonomous Driving Inspired by Bird Flocking Behavior.

Lijzenga, O. (2020) Symbolic parity games : Two novel fixpoint iteration algorithms with strategy derivation.

Limbeek, T.F. (2023) Design and implementation of destination tracking and velocity control as an addition to a boids-inspired traffic simulation.

Lin, Shing Long (2018) Optimization for approximate softcore unsigned multipliers on ALtera FPGA's.

Lin, T.Z. (2022) Past, present, and future of cybersecurity for ICT-professionals.

Lin, Y. (2010) Architecture for IP based interconnection of heterogeneous wireless communication systems for mission-critical group oriented communications.

Linardos, Ioannis (2019) Multiscale Convolutions for an Artificial Neural Network.

Linden, J.J. van der (2017) The relation between online entrepreneurship and offline and Web 2.0 learning technologies.

Linden, M.M. van der (2023) Federated Learning for Indoor Human Activity Recognition: Adapting to Changing Realistic Environments.

Linders, Stefan (2008) Opportunities and limitations of using SOA concepts and technologies for building BI applications : a Delphi study.

Ling, Chen (2015) Design and implementation of a control structure for a quadrupe robot.

Linnenbank, Tristan (2006) Architectural Principles for Large Scale Web sites: a Case Study.

Linthorst, Henk-Jan (2006) De mogelijkheden van ICT in het effectiever en efficiënter functioneren van de diabetesketen.

Lippok, B.M. (2015) Ontwikkeling van een App store voor een iPaaS.

Lippur, Kristo (2022) Effects of edge computing growth on demand of data centre services.

Liu, Dou (2021) Knowledge Graph Driven Conversational Virtual Museum Guide.

Liu, Luyao (2016) Applying intelligence amplification in decision making.

Liu, Peng (2012) Test bed and sensor platform for building usage profiling.

Liu, Siyuan (2023) A Cloud-based platform Reference Model for Remote Control and Monitoring for Laboratories of Inspection and Certification Companies.

Liu, Yujie (2022) Help Rich Info Get Richer: Enriching a semi-structured dataset using a Semantic Web approach.

Liu, Yujie (2023) Testing and Mutation Testing for GPU Kernels.

Lizarazo Fuentes, Louis Daniël (2024) Forecasting Microbiology Laboratory Test Volumes using Time Series Models.

Lobeek, Jaap (2022) A 3D deep learning method for the prediction of breast tumor response to neoadjuvant chemotherapy using MR images without the need for a tumor segmentation.

Loch, Frieder (2012) Hierarchical gestures: ggestural shortcuts for touchscreen devices.

Loevezijn, J.P. van (2023) Aligning Information Systems Management and Risk Management to achieve Enterprise Resilience.

Logendran, T. (2022) Automatic Lung Aeration Assessment for Pediatric Lung Ultrasound Imaging.

Logtenberg, Jeroen (2009) Multi-user interaction with molecular visualizations on a multi-touch table.

Lohman, Jesse (2021) Reducing Cybersickness in VR on an Omnidirectional Treadmill.

Loker, Andre (2014) Evaluating data structures for runtime storage of aspect instances.

Lonnee, J. (2008) A scalable repository based on a meta-modelling architecture.

Loo, Rick van (2018) Increasing Throughput of FPGA-based Streaming Applications : by using Pipelining.

Loof, R. (2021) Improving Vehicle Detection Methods for Magnetometers using Machine Learning.

Loohuis, Ingmar (2022) Exploring the Prognostic Value of Deep Learning Image-to-Image Registration for Immunotherapy Patient Monitoring.

Loohuis, J.E. (2021) Synthesising Security Camera Images for Face Recognition.

Looijenga, M.S. (2018) The Detection of Fake Messages using Machine Learning.

Looijenga, M.S. (2023) Hele taak eerst in databaseonderwijs.

Looijenga, Wouter (2021) Bicycle Accident Prevention using Sensors and Automotive Systems.

Looise, M.J. (2008) Inter-level consistency checking between requirements and design artefacts.

Looman, J.H.A. (2017) Mobile applications on the work floor : The use of mobile applications in fast moving consumer goods warehouses.

Looman, S.A.M. (2009) Impact Analysis of Changes in Functional Requirements in the Behavioral View of Software Architectures.

Loos, B. (2020) Designing a smartphone application for supporting the COMET-program in mental health care.

Lootsma, Marten (2008) Design of the global software structure and controller framework for the 3TU soccer robot.

Lopez, J.M. (2008) Dynamic service composition in an innovative communication environment.

Lorini, Giulia (2022) Addressing the Ransomware threat: TTP-based defensive recommendations and a strategy for achieving resilience.

Loukaidou, M. (2022) Towards a gamified recommender system to facilitate cognitive function in children with dementia.

Lu, C. (2020) Deep sleep stage detection.

Lu, Yuan (2014) Investigation on factors limiting the performance of deep sleep classification.

Lubberdink, W.H.H. (2016) Op weg naar een praktische en eenduidige standaardisatie van producteenheden.

Lucas, R.H. (2020) Workflow improvement by artifact development.

Lucas, R.H. (2022) Supervised contrastive learning to overcome inconsistencies in exhaled breath data.

Lucassen, T. (2009) Adaptive support of human attention allocation using cognitive models.

Luchtmeijer, D. L. (2022) Improving solutions of Service Engineer Planning using Mixed Integer Programming and Slack Induction by String Removal.

Luchtmeijer, Dorian L. (2022) Improving solutions of Service Engineer Planning using Mixed Integer Programming and Slack Induction by String Removal.

Ludjen, A.C.P.P. (2021) Generative replay in deep reinforcement learning.

Lukman, Ivan (2019) Complete Characterization of Publicly Available Domain Blacklists.

Lummen, D.L.M. (2020) An analysis of Link and Node Level Resilience on Network Resilience.

Lummen, D.L.M. (2023) Is Telegram the new Darknet? A comparison of traditional and emerging digital criminal marketplaces.

Luo, Zhipeng (2018) Network research : exploration of centrality measures and network flows using simulation studies.

Löwik, R.C.P. (2018) Tracking of wireless devices: is it possible and solvable?

Lübbermann, Thijs (2021) Design and control of a magnet placement tool.

Lüdeke, Tjard (2023) RehaBuddy : Development and evaluation of a mobile technology to support a patient-centered goal-setting process in physiotherapy.

Lüpkes, Niklas (2020) Using static weight estimation of general trees to efficiently parallelize the execution of DEMKit Simulation Models.

M Sri Rangan, W. (2023) Creating accurate valuation models for real estate properties.

Ma, R. (2020) Anomaly detection for Linux system log.

Maan, G.C. (2021) Analysing Cooperative Awareness Message generation around intersections based on macroscopic traffic parameters.

Maan, H.C. (2016) Item availability restricted.

Maas, Jelle (2020) Cyber attack detection in smart grids.

Maas, R.F. (2023) A ranking metric for event impact in safety-security co-analysis.

Maat, GJ ter (2016) Towards a scalable environment for traffic information services.

Maat, Roel ter (2014) A Framework for Modular Implementation of Domain-Specific Event-Based Applications.

Maatjes, N.C. (2007) Automated transformations from ECA rules to Jess.

Macarie, M. (2020) DNS bitsquatting in the wild.

Macarie, Mihai (2023) Fuzzing Android Automotive's CAN interface.

Magzoub, Z. (2023) Toxic comment classification in discord.

Mahrof, Dlovan Hoshiar (2008) Design of a fully integrated RF transceiver using noise modulation.

Majkut, Kristóf (2023) k-Anonymization Module Prepared for Change : a flexible architecture for the easy replaceability of algorithms and data sources with proof-of-concept implementation.

Malek, Michael (2022) Textual Clustering for Telecommunication Accident Recommendations.

Man, R.J.P. de (2019) A formalisation of EMF by expressing Ecore as GROOVE graphs.

Man, Shen Yi (2016) Data driven banking : applying Big Data to accurately determine consumer creditworthiness.

Man, T. (2019) Measuring and Analysing Resilience of Enterprise Architectures.

Man, T. (2022) Modelling Security Architectures of Collaborative Networks.

Mandasari, Yani (2019) Follow-up Question Generation.

Manen, B.R. van (2021) Thermal-Inertial Localization and 3D-Mapping to Increase Situational Awareness In Smoke-Filled Environments.

Maneschijn, D.G.J.C. (2021) Finding the Appropriate Level of Abstraction for Process Mining in Logistics.

Manjesh, M. (2020) Deterministic modelling and parameterization of height-dependent interaction between radio waves and human body.

Mansour, Noor (2021) Developing a Digital Serious Game for Healthcare Logistics: Appointment Scheduling of Elective Surgical Patients in the Operating Room.

Mansvelder, F.M. (2022) Dutch language specific KPI exploration and recommendation for maintenance scheduling.

Manterola, Nahuel (2017) Creating 3D images for facial recognition using the RealSense SR300.

Manzano Ibarra, Amaya (2018) Evaluating Usability of Communics Authoring Tool: Comparing Synchronous with Asynchronous Remote Evaluation when using Cognitive Walkthrough.

Maranatha, Yesaya Galatia (2023) Auditable Data Sharing in Logistic Data Space: Design and Implementation of IDS Clearing House for Logistic Data Space.

Marcon, Nicola (2018) Designing a sonic interactive open-ended playground installation.

Marenco Zúñiga, Andrés (2014) Federated Aggregated Search.

Marin, Mihai David (2019) Effectiveness of neural language models for word prediction of textual mammography reports.

Markova, Betina (2018) Re-play : Interactive Playground Games To Motivate Playing.

Markova, Betina S. (2021) Predicting readmission of neonates to an ICU using data mining.

Martakis, A. (2015) Framework for Enterprise Uncertainty-Driven Decision-Making : FEUD.

Martikainen, Katariina (2020) Audio-based stylistic characteristics of Podcasts for search and recommendation : a user and computational analysis.

Martinos, Nikolas (2021) Functional and Non-Functional Requirements for a Performance Dashboard in CS:GO.

Marčetić, N. (2022) Community-based design to help older adults to increase their physical activity.

Massa, M. (2021) Detection of dysfunctional breathing and uncontrolled asthma in children using respiratory sound recordings.

Masud, Muhammad Ahmed (2019) An Open Source Intelligence (OSINT) framework for online investigations.

Matcov, Alexandru (2024) Explainable AI in Credit Risk Assessment for External Customers.

Materne, L.J. (2021) Is electric vehicle drivers’ cognitive workload increased by eco-driving feedback in the face of range anxiety?

Mathivanan, Rajavarman (2020) Texture Based Autonomous Reconstruction of 3D Point Cloud Models using Fully Actuated UAVs.

Mathur, Nehal (2020) Novel design of MR-compatible pneumatic soft-surgical endoscope with variable stiffness.

Mauritz, R.R. (2020) Improving data quality in a probabilistic database by means of an autoencoder.

Mauritz, R.R. (2022) Planning in supply networks using aggregated resource feasibility.

Mazilu, I. (2022) Defocus blur synthesis and deblurring through interpolation in the latent space.

Maškanceva, Laura (2020) Developing understandable and actionable sleep data visualizations.

Meciani, Giovanni (2018) Implementation of a power-efficient DFT based demodulator for BFSK.

Meekes, M L (2017) Serious Game for Stroke Rehabilitation on the HTC Vive.

Meenhuis, J.E. and Barodi, R.N.W. and Sijtsma, T. (2023) Ontwerpen van een machine learning algoritme om hemodynamische verslechtering te voorspellen bij volwassen IC-patiënten.

Meent, Tijmen van de (2022) A comparative study on lightweight authentication protocols in IoT.

Meer, A.J.M. van der (2016) Mapping the underworld.

Meer, J. van der (2021) Designing an interactive travel check to increase sustainable travel.

Meerhof, J.J. (2021) Loop-breaking Approaches for Vehicle Route Planningwith Multi-agent Q-routing.

Meerhof, J.J. (2023) Membership Inference Attacks on Federated Horizontal Gradient Boosted Decision Trees.

Meertens, Lucas O. (2009) EPC to BPEL transformations.

Mehra, A. (2020) Deepfake detection using capsule networks with long short-term memory networks.

Meij, D.P.L. van der (2009) A metamodeling approach to incremental model changes.

Meij, D.R. de (2018) Predicting blood glucose for type 2 diabetes patients.

Meijer, A. (2021) Real-time robot software framework on Raspberry PI using Xenomai and ROS2.

Meijer, Gerben (2020) Producing high quality face morphs using GANs.

Meijer, Gijs (2006) Performance measurement of IT investments.

Meijer, J.J.G. (2014) Improving Reachability Analysis in Ltsmin - Guards, Read, Write and Copy Dependencies for mcrl2, Promela and Dve.

Meijer, J.J.W. (2020) Morphing detection based on regional analysis of local frequency content.

Meijer, J.J.W. (2023) Towards Future Proof Cryptographic Implementations: Side-Channel Analysis On Post-Quantum Key Encapsulation Mechanism CRYSTALS - Kyber.

Meijer, L. (2021) Test case shrinking for Model Based Testing on Symbolic Transition Systems.

Meijer, M.P. (2022) An Approach at Social Relation Recognition in Egocentric Videos using Pose Estimation.

Meijer, Max Jan (2020) Exploring augmented reality for enhancing ADAS and remote driving through 5G study of applying augmented reality to improve safety in ADAS and remote driving use cases.

Meijer, Michael (2011) On a Design Space for Aggregating over Sliding Windows on a Stream.

Meijer, S.D. (2018) The implementation of collision avoiding haptic feedback in the pedal-based control of a robotic platform.

Meijer, S.D. (2021) The implementation of LiDAR-based traffic detection and tracking.

Meijer, Z. (2016) Definition, ideation and validation of the 'Bucketlist'.

Meijerink, B.J. (2015) Lossless Multicast Handovers in Proxy Fast Mobile IPv6 Networks.

Meijerink, Carlijn (2021) Facial landmark detection under challenging conditions.

Meijerink, M.J. (2018) A visual DSL for automating business processes.

Meijerink, M.M.J. (2019) Anomaly-based detection of lateral movement in a Microsoft Windows environment.

Meijerink, Roland (2009) Begrip in kaart: Hoe kan het gebruik van begrippenkaarten het begrip van leerlingen in 3VWO op het gebied van optica verbeteren?

Meijerman, T.R.I. (2019) Manipulating a dissociative bond with out-of-body experience avatar in virtual reality.

Meijerman, T.R.I. (2023) Blocking Techniques on Privacy-Preserving Record Linkage.

Meinderts, S. (2021) Exploring the applicability of a data-driven approach on recommending in-store replenishments for fashion retailers.

Meinsma, D. (2018) Digging up Malware.

Melero Martinez, D. (2023) IOTA-MSS : a pay-per-play music streaming system based on IOTA.

Melinceanu, Victor (2023) Finding maximal cliques in uniform hypergraphs using Baum-Eagon inequality.

Melissen, Arthur (2008) Exploring neglected avenues in the modelling of attribution theory.

Melotti, D. (2021) Reversing and Fuzzing the Google Titan M Chip.

Mendler, G.T. (2019) Designing a meta report for hotel customer reviews.

Mendler, Gereon (2023) Gossip Layer Optimization for the IOTA Network.

Menifer, Savio (2022) Firefly Island: Exploring intimacy in social VR.

Menne, Alexander (2018) Blockchain in the Sharing Economy : Will Blockchain Disrupt Today’s Winning Business Models?

Mensing, Max (2017) Item availability restricted.

Mentink, Fons (2016) Machine driven predictions of the socio-economic status of Twitter users.

Mentink, T.J. (2019) Redesigning after-sales services supply chain.

Meppelink, Lianne (2008) Towards interoperability between existing VoIP systems.

Merchan, M. (2022) Anomaly detection in IoT : federated learning approach on the IoT-23 Dataset.

Merdi, Agathi (2019) ICT Use by Refugees : The Role of Technology in Refugee Mobility.

Merdis, Vasileios (2019) Wireless communication protocols for home automation exploring the security and privacy aspects of smart home IoT devices communicating over the Z-Wave protocol.

Mesie, P. (2022) The Effect Of Context Removal In Sentiment Analysis On News Articles.

Meteer, O. (2017) Real-Time rasterization on the Starburst MPSoC.

Metz, T. (2021) An exploratory diary study on modelling morning routines.

Meulenkamp, T. (2022) Parser Benchmarking for Legacy Languages.

Meyers, B.J. (2022) Analysing the resilience of 5G networks in the Netherlands.

Michael, Michael (2023) Moisture Optimization and Heating Process Automation of Freeze-Dried Coffee Production: A Case Study at Jacobs Douwe Egberts Peet's.

Michaylov, K.D. (2023) Exploring the Use of Steganography and Steganalysis in Forensic Investigations for Analysing Digital Evidence.

Michorius, J.A.R. (2018) Fair Machine Learning.

Middag, Jacob (2012) Convergence of an implicit runge-kutta discontinuous Galerkin method using smooth limiters.

Middelesch, E.W. (2015) Anonymous and hidden communication channels : a perspective on future developments.

Middelkoop, D.E.V. (2020) Sensitivity analysis of predicting wireless c hannels within an indoor factory floor.

Middelkoop, Daan (2023) Mapping Hardware Descriptions to Bittide Synchronized Multiprocessors for Instruction Level Parallelism.

Middelraad, F. (2022) This laptop has great coffee : training a Dutch ABSA model from customer reviews.

Midden, J.H. van (2021) Using process mining and event log analysis for better business strategy decision-making.

Miedema, Lukas (2020) QuickInterp - Improving interpreter performance with superinstructions.

Mihai, Ilie-Sebastian (2023) A Systematic Evaluation of Microservice Architectures Resulting from Domain-Driven and Dataflow-Driven Decomposition.

Mihalache, Nicolae (2023) Scaling Out with Microservices: A Database-Centric Approach to Monolithic Application Decomposition.

Miksik, M. (2023) Fine-tuning transformer models for commit message generation and autocompletion.

Minnema, Jeroen (2020) Towards component-based, sensor-independent and back-end independent SLAM.

Minnen, Matthijs van (2022) CNN Accelerator Throughput Improvement using High-Level Synthesis for FPGA.

Mintuș, Sandu-Victor (2023) Support New Programming Language in RefDetect.

Mirchev, Hristofor (2014) Creating a Modular AspectJ Foundation for Simple and Rapid Extension Implementation.

Mishra, M.K. (2023) Generating Video Game Quests From Stories.

Misra, Gaurav (2013) Permeance of ICT in crime in India.

Mitev, Zarimir (2019) Estimating User Interaction Complexity.

Mitov, Alexander (2021) Ethical use of artificial intelligence through the Utilitarianism perspective.

Miu, Ioana (2020) Fundamental characteristics and concept of material passports.

Miu, Ioana (2022) A Reference Model for Decarbonising the Passenger Aviation Ecosystem.

Mo, Alexander (2023) Transformer Offline Reinforcement Learning for Downlink Link Adaptation.

Mocanu, D. (2023) Modeling and Analyzing Board Games through Markov Decision Processes.

Moel, E.L. de (2010) Expanding the usability of recorded lectures : a new age in teaching and classroom instruction.

Moghaddar, A.A. (2022) Enhancement of Formula One Driver Performance by Group Driven Process Learning.

Mokhtar, A.B.A. (2022) Object Detection For Top View Images In Dairy Farming.

Mol, G. (2023) Developing a platform for the KUKA iDo social robot.

Mol, S. (2020) Movement localization in indoor environments by means of light and air pressure sensors.

Molder, Jantine te (2014) The redesign of a cashier trainer.

Molder, S. te (2022) Improving the order picking performance at Scania Production Zwolle.

Molderink, Albert (2007) Feasibility Analysis of MPEG decoding on reconfigurable hardware.

Molen, N.J van der (2014) Item availability restricted.

Molenaar, K. (2022) Real-world performance analysis of signcryption and sign-then-encrypt schemes for resource-constrained IoT devices.

Molenaar, R.S.J. (2021) Using curriculum learning to improve the performance of deep learning models used for classification purposes.

Moll, René (2013) A DFT based synchronization scheme for chirped communication.

Mollah, H. (2022) User stories applied for end-to-end web testing.

Mols, Emiel (2012) Sharding Spotify search.

Mondol, Manaswi (2021) Analysis and Prediction of Earthquakes using different Machine Learning techniques.

Monshouwer, R. (2020) Detection of subclinical ketosis in dairy cows using behaviour sensor data.

Monteban, J. (2018) Measuring Architectural Complexity : Quantifying the objective and subjective complexity in enterprise architecture.

Monteiro, S.C. (2021) An internet-wide analysis of TLS configurations of public LDAP servers.

Morad, Peshmerge (2023) Towards a Standard Fine-Grained Part-of-Speech Tagging for Northern Kurdish.

Morales Ortega, Luis Rodrigoandrés (2023) A Digital Twin for Ground Water Table Monitoring.

Moraru, Alexandru (2020) Iterative computed tomography reconstruction using deep learning.

Morgese, Luca (2021) Stepping out of the MUD : contextual network threat information for IoT devices with manufacturer-provided behavioural profiles.

Morsinkhof, P.K. (2018) Assessing E-Procurement maturity as designed in an E-Procurement Maturity Model and Quadrant Model.

Mortazawy, Ali (2018) Can Smart Homes contribute to the New Product Development (NPD) process?

Moscoviter, D. (2016) Improving spatial indexing and searching for location-based DNS queries.

Motamedi Nia, Sandra (2021) The Capability of Machine Learning for Predicting Disability Probabilities based on Long-term Absenteeism.

Mourik, F.G. van (2021) Finding Personally Identifiable Information Leaked via Publicly Accessible CT Logs.

Mourik, F.G. van (2023) IterSHAP: an XAI feature selection method for small high-dimensional datasets.

Muinck Keizer, D.M. (2017) Photoacoustic Tomography for Finger Joint Imaging: Tackling Artefacts.

Muis, Allard (2009) Patterns in data conversion.

Mulder, Henk (2019) Performance of program verification with VerCors.

Mulder, Michael (2021) Creating a Compiler for the Semi-Structured Language of Blazons.

Mulder, P.W. (2022) A comparative analysis of the computation cost and energy consumption of relevant curves of ECC presented in literature.

Mulder, R. (2021) Designing a game to gather data on the self-reliance of civilians.

Mulder, Tim (2023) A personalized dashboard for sim racing.

Muller, A. (2017) Socially shared regulation in Scrum teams : A multiple case study into the regulation processes in Scrum team meetings and variations both within and across teams.

Muller, D.W. (2018) Predicting the performance of business partners, using issue data of the iSense system : mapping a perception to data using machine learning.

Muller, I.J.T. (2018) Improving the service control tower with proactive decision making : a two-staged alert and intervention generating model for proactive lateral transshipments in an after-sales supply chain.

Muller, M. (2019) Creating building energy prediction models with convolutional recurrent neural networks.

Muller, M.W. (2023) SPaS: Sparse Parameterized Shortcut Connections for Dynamic Sparse-to-Sparse Training.

Mundkur, Arnav (2018) Classification of Respiratory Data: Classifying and analyzing respiratory data to present as feedback towards cultivating habitual diaphragmatic breathing.

Mundkur, Arnav (2021) Have you tried this? : Designing a smartphone application to support sustainable food purchasing.

Munsterman, Thijs Pieter (2008) Exploring software scalability : and a method for evaluating and improving software scalability.

Mustaf, Mergim (2023) A Framework for Integrated Prescriptive Maintenance and Production Planning and Control Simulation Models.

Mustafa, Khaled Alaaeldin Abdelfattah (2019) Towards Continuous Control for Mobile Robot Navigation: A Reinforcement Learning and SLAM Based Approach.

Mutruc, Vlad (2023) User Centric Quality of Service Improvement in IoT Networks: A closed Loop Approach.

Mutter, T. (2009) Partition-based network load balanced routing in large scale multi-sink wireless Sensor Networks.

Mysliwiec, D. (2023) AI-Composed Music for User Preference Using Reinforcement Learning.

Myśliwiec, J. (2020) Generating short RPG side-quest stories with transformers.

Möllering, Helen (2019) Thwarting Semantic Backdoor Attacks in Privacy Preserving Federated Learning.

Müller, M. C. (2015) SIDekICk - Detecting Malicious Domain Names in the .nl Zone.

Münch, D. (2016) Translating clinicians’ needs into requirements for a future Computerised Decision Support System in antibiotic therapy : a user-centred design and requirements engineering approach in a German geriatric hospital setting.

Naarding, K.B. (2021) A Sustainability Assessment for Transport Routes in Container Transport.

Nab, F. (2017) Analyse en optimalisatie van het maaltijdserviceproces.

Nadar, Aditya (2024) Perspective Interactions : Detecting Multimodal Social interactions from an Egocentric View.

Nae, Teodora (2022) Predicting COVID severity using machine learning methods : -Comparison between real life and mimic dataset-.

Naguine, P.V. (2022) Subpopulation Process Comparison and Bottleneck Analysis: A Case Study of Frozen Shoulder.

Naik, Nilay Prashant (2023) Application Portfolio Management Maturity : A Grounded Theory investigation on the processes and expected benefits.

Naik, Pratik (2021) Generating Sythetic Training Images for Instance Segmentation using Salient Object Detection and Image Compositions.

Nair, M.G.N (2022) Item availability restricted.

Nambinayakanahalli Hanumantha, Dharanish (2023) Improving the autonomous navigation of a care robot by following social norms in a care environment.

Narain, S. (2021) A security risk assessment approach using enterprise architecture models to support decision-making at security operation centres.

Nardi Dei da Filicaia Dotti, F. (2023) Use of camera sensors to deduce relative velocity of bicycles to prevent accidents.

Narkar, Manya (2024) Optimal Passwordless Continuous Authentication Measures for Remote Employees.

Nass, M. (2018) Finding intelligence in disordered boron dopant atoms.

Nass, Mathieu (2020) Wi-Fi based range-only constraint integration in RTAB-Map.

Nassi, Thijs-Enagnon (2021) Algorithms for Automated Scoring of Respiratory Events in Sleep.

Nastase, Tudor (2022) Improving safety of e-bikes with automated systems: using an ad-hoc sensor network to prevent car to e-bike accidents.

Natarajan, Sriram (2020) Learned clustering for 3D object segmentation.

Nauta, M. (2018) Temporal causal discovery and structure learning with attention-based convolutional neural networks.

Navarro Di Pasquale, J. (2022) Robust training using a push-pull inhibition layer for adversarial robustness in convolutional neural networks.

Nayanar, G.D. (2021) Autonomy, AI Perception and Safety : a Safety Evaluation Framework for AI Perception Models Used In Agricultural Autonomous Vehicles.

Nazarian, A.A. (2015) Voorraadbeheeroptimalisatie van een retailer.

Nazarian, Arthur (2018) Optimizing the deployment of automated external defibrillators by a data-driven algorithmic approach.

Naziris, Sotirios (2019) Infrastructure as code : towards dynamic and programmable IT systems.

Neacsu, T. (2022) From EDIFACT to OpenTripModel: analysis, migration and guidelines based on data from real-world logistics companies.

Nechiti, Alexandru-Tudor (2023) Anomaly Detection in Blockchain Networks.

Nedelchev, Kristian (2022) Performance evaluation of Map implementations in Java, Python and C#.

Nee, F.D. van (2014) To a new hardware design methodology : a case study of the cochlea model.

Neele, Thomas (2016) GPU implementation of partial-order reduction.

Neinders, L.J. (2023) Improving Trackmania Reinforcement Learning Performance : A Comparison of Sophy and Trackmania AI.

Nelson, D.J. (2022) Privacy-preserving counterfactual explanations to help humans contest AI-based decisions.

Neta, Liran (2023) Adjusting Clarifying Questions to User’s Profile.

Neupane, Nischal (2023) Explaining Hiccup Predictor using Layerwise Relevance Propagation.

Neut, Laura van der (2021) Pure Gamification: stimulating energy saving behaviour through personalized gamification.

Ngo, T. (2021) Intelligent Bomberman with reinforcement learning.

Nguyen, A.D. (2013) Integration of IEC 61850 mms and lte to support remote control communications in electricity distribution grid.

Nguyen, Elisa (2021) Temporal Spike Attribution : A Local Feature-Based Explanation for Temporally Coded Spiking Neural Networks.

Nguyen, ir. H.M. (2019) Formal verification of a red-black tree data structure.

Nguyen, H.Q. (2006) Analysis of crosscutting concerns in QVT-based model transformations.

Nguyen, M. (2020) Interaction technology in improving learning of sports tactics : A novel way of teaching adult novice players the volleyball side-out rotation with an interactive LED floor.

Nguyen, Thuy (2021) Cross-applicability of ML classification methods intended for (non-)functional requirements.

Nguyen, V.Y. (2007) Optimising techniques for model checkers.

Nguyen, Viet Yen (2007) Optimising techniques for model checkers.

Ni, Xuefei (2022) Gamification design for enhancing user experience of rail travellers.

Ni, Z. (2020) An improved Java-based single sign-on solution.

Nibbelke, Vincent (2014) Vascular pattern recognition for finger veins using biometric graph matching.

Niculae, T.F. (2022) Edge server placement on traffic lights for smart city services.

Niculescu, Remus G. (2021) Analysis on the Evolution of Mobile Network Characteristics from NetBravo Dataset.

Niechwiadowicz, Karolina Julia (2017) Virtual Reality and Game Mechanics in Generalized Social Phobia Treatment.

Niehoff, Dennis (2018) Evaluation of Motion Control Algorithms for Miniaturized Agents Moving Inside 3D Fluidic Microchannels.

Niekolaas, M. (2021) Towards real-time placental surface reconstruction during fetal surgery : deep-learned placental vessel identification and segmentation.

Nielen, J.J. van (2023) Dynamic Detection and Classification of Persistence Techniques in Windows Malware.

Nienhuis, J. (2014) Using Change Management to improve CRM User Acceptance.

Niesink, S.W.R. (2017) Improving biomedical information retrieval with pseudo and explicit relevance feedback.

Nieuwenburg, E.C.E.M. (2017) Project Buddiez : designing for long-distance-friendships between children.

Nieuwenhuis, S. (2022) Exploring the Implementation of Network Architecture Search (NAS) for TinyML Applications.

Nijboer, T.M. (2024) Kickstarting the Next Step in Urban Mobility. Design of an Interactive Design Tool & a New Urban Electric Vehicle.

Nijdam, N.A. (2007) Facial rendering.

Nijeboer, F.J. (2020) Detection of HTTPS encrypted DNS traffic.

Nijenhuis, Barry (2005) Smart sign for smart surroundings.

Nijenhuis, C.F. (2011) Automatic generation of graphical domain ontology editors.

Nijholt, M.H. (2020) Predicting of project spending for an NGO.

Nijhuis, Mirel (2019) Creating a Google Home System Agent to reduce loneliness among older adults.

Nijhuis, S.P.G. (2022) Dark web markets : what can they teach us?

Nijhuis, W.H. (2022) An audio based feature detector for shavers using Artificial Intelligence.

Nijkamp, Barry (2009) Using functional design patterns to improve exports to management information systems.

Nijkamp, Bas (2022) A High Throughput Sorting Accelerator using an Intel PAC FPGA.

Nijkamp, J.B. (2021) Big data in small companies : a survey in the retail sector in the Netherlands.

Nijkamp, MSc Jelle J.B. (2021) Big data in small companies : a survey in the retail sector in the Netherlands.

Nijland, J.G.W. (2022) Gamification of cyber security awareness training for phishing against university students.

Nijland, R.G. (2020) Using in-game data to give insights in the performance of eSporters.

Nijmeijer, Tom (2008) Automatic classification of television commercials.

Nijpels, S.T. (2020) Implementing feedback systems and content creation tools in an educational game.

Nijskens, Lotte (2022) Contrast generalisation in deep learning-based brain MRI-to-CT synthesis.

Nijssen, Bobby J.W. (2008) Cooperative Intelligent Transportation Systems Building a demonstrator for the CVIS-project on the Informatieve Weg.

Nijweide, F.P.J. (2020) Autoencoder-based cleaning of non-categorical data in probabilistic databases.

Nisslmueller, Utz (2022) LOLBin detection through unsupervised learning : An approach based on explicit featurization of the command line and parent-child relationships.

Niu, Z. (2022) Develop and adopt the organizational cybersecurity culture in the Covid-19 teleworking scenario.

Nizamudeen, M.F. (2023) Investigating the Impact of AI Tools on Programming Education.

Nofulla, Jorges (2023) Deep Learning-based Change Detection and Classification for Airborne Laser Scanning Data.

Noltes, Johan (2011) Data location compliance in cloud computing.

Noordhuizen, Paul (2006) Analyzing aspects in production : plans for software product lines.

Noorlander, M.S. (2021) Predicting traffic flow with machine learning.

Noort, Luc van (2024) Sensor Framework For Pediatric Cerebral Palsy Ankle Foot Orthosis : Development and Technical Validation.

Noort, N. van (2020) Machine Learning for monitoring attacks in the cloud.

Noort, W (2016) Gathering intelligence from the Bitcoin peer-to-peer network.

Noppen, I. (2012) Assessing the benefits of spectrum sharing in wireless access networks.

Noppers, Joke (2017) Understanding computer science : how the discipline of computer science develops new understanding.

Nouta, Christiaan Alexander (2011) Data processing networks made easy : improving development possibilities for people with limited computer science knowledge.

Nouwens, I.C.C. (2009) Predicting dialogue state transitions using prosodic markers: Exploring AMI Corpus backchannels.

Nowee, Stijn (2022) Reliability analysis of Triple Modular Redundancy.

Nurdin, H.I. (2002) Mathematical modelling of bias and uncertainty in accident risk assessment.

Nurlatifah, Eva (2019) Information audit triangle for practitioners.

Nusman, Daan (2006) Real-time full-body motion capture in virtual worlds.

Nutma, J. (2016) More comprehensive demand side management by the integration of the powermatcher and triana.

Nyante, K.A. (2018) Secure Identity Management on the Blockchain.

Obbink, Michel (2011) Social interaction in a cooperative brain-computer interface game.

Obbink, R. (2020) Development and optimization of a robot navigation algorithm combining deep reinforcement learning and state representation learning.

Oberhofer, L. (2022) Item availability restricted.

Odding, A.V. (2018) Creating an Interactive Art Installation for the SmartXP.

Odijk, M. (2007) Novel sensor structures for enhanced redox cycling.

Odyurt, Uraz (2016) Bring your own authenticator/authentication security in physical access control systems.

Oedzes, J.M. (2020) ASIP design and algorithm implementation for beamforming in an antenna array.

Oever, Daniel van 't (2008) CoNSoLe: A Domain Specific Language for Network Services.

Ogunjide, Oluwaremilekun Emmanuella (2021) Toward a healthy lifestyle : Siege Arena and how a gamified framework can be applied to the design of a game for managing and treating chronic conditions such as diabetes and obesity.

Oijen, Joost van (2007) A Framework to support the influence of culture on nonverbal behavior generation in Embodied Conversational Agents.

Ok, Sun (2018) Smart Moments.

Okken, B. (2017) Design and Empirical study of tilting propellers of an over-actuated quadrotor.

Oldengarm, B.M.J. (2020) Improving human activity recognition using embedded smartphone sensors.

Oldenkamp, H.A. (2007) Probabilistic model checking : a comparison of tools.

Oliemans, R. (2019) WHOIS versus GDPR.

Olmezoglu, C. (2022) Causal analysis of safety violations in DyNetKAT.

Olteanu, A.C. (2021) Tracing Covid-19 domain name clusters on the internet.

Olthof, Mark (2007) Performance & Scalability of a Spatial Database in a GIS-Web Service Environment.

Olthuis, Ferry (2013) A comparison of state space reduction techniques in SCOOP.

Ong-A-Fat, K.K. (2017) Context Aware GPS Error Correction.

Onis, Ramon (2018) Does your model make sense? : Automatic verification of timed systems.

Onofrei, Andrea (2023) Impact of Advertial Data Augmentation on Robust Indoor Scene Recognition: An Evaluation Study.

Ooijevaar, I.H.J. (2022) Design of a user-friendly controller for the Sunram 7 with safety features to assist radiologists in MRI-guided breast biopsy.

Ooms, Matthijs (2009) Provenance management in practice.

Ooms, Wendy (2007) Providing AAA with the Diameter protocol for multi-domain interacting services.

Oonk, N.M.J. (2018) Attribute Extraction from Darknet Markets and the Applicability of Transfer Learning.

Oorschot, D.H.M.A. van (2020) Let’s sort this out: GPGPU Verification of Radix Sort.

Oorschot, D.H.M.A. van (2023) VCLLVM: A Transformation Tool for LLVM IR programs to aid Deductive Verification.

Oortwijn, W.H.M (2015) Distributed Symbolic Reachability Analysis.

Oost, M. (2015) Analysis of Homecare Nurses’ Attitudes towards, Desires for and Perceived Added Value of Tools on a Tablet.

Oosterhof, N.N. (2005) Application patterns in functional languages.

Oosterhout, Janneke van (2023) Formal Verification of Lightweight Decentralized Attribute-based Encryption.

Oosterhout, S.H. (2023) AI as a Creative Catalyst : AIs role in design, and measuring AI-based idea generation.

Oosting, E. (2024) A fast instruction language for functional programs.

Oosting, W.M.H. (2009) Design and evaluation of a community of practice to support IT implementation/migration processes : a case study about the design of a CoP within the Suite4Basisgegevens migration.

Oostinga, Ruben (2012) A java bridge for LSTMIN.

Oostrum, A. van (2009) A model and specification for development of enterprise application frameworks.

Oostrum, A.R. (2008) A service register as an information intermediary : towards a structured design approach for service registers.

Oostveen, Laurens van (2007) Conductivity gradient focusing by pervaporationand osmosis-induced fluxes.

Op 't Land, Sjoerd (2011) Ranging and localisation error mitigation in indoor obstructed direct path conditions.

Oral, Lara (2023) Move4Music : An Adaptive Sound System To Prompt Connection During Neurodiverse Dyadic Interactions.

Ordelmans, L. (2007) The Creation of a Flexible, Functional Simulation Generator for the Montium Tile Processor.

Orij, J. (2016) Self-adaptation to concept drift in web-based anomaly detection.

Orlinski, Jakub (2020) MEG-driven emotion classification using convolutional and recurrent Neural Networks.

Os, Roel van (2007) Optimizing XML information retrieval query execution at the physical level.

Othmer, Benjamin (2023) An Empirical Study of Directory Service Dependencies.

Otten, Yoeri (2021) Adapting, analyzing and benchmarking transportation routing algorithms for realistic real-time environments.

Ottenhof, Robbert H.J. (2011) Towards automated truancy detection.

Ottow, Christiaan (2012) Hacking the next web: penetration testing over IPv6.

Oude Alink, M.S. (2008) Increasing the spurious-free dynamic range of an integrated spectrum analyzer.

Oude Bos, Danny (2008) BrainBasher : a multi-modal BCI game for research and demonstration.

Oude Elferink, W.G. (2017) Multi-camera tracking of soccer players through severe occlusions.

Oude Elferink, Wout (2014) Fingerprint acquisition with a smartphone camera.

Oude Maatman, Ruud (2011) Design and evaluate a deployment process for the ES benefits management method.

Oude Roelink, B.M. (2020) On the security of authentication when linking federated identities.

Oude Veldhuis, M. (2013) Multi-target user interface design and generation using model-driven engineering.

Oude Weernink, M.J.P. (2018) Developing a system for the integration of vehicle data.

Ouden, J.J.A. den (2016) A quest for the best automated tests : Estimating software reliability based on Spec Explorer's on-the-fly test results.

Outersterp, R.M. van (2016) Partitioning of Spatial Data in Publish-Subscribe Messaging Systems.

Ouyang, Cijun (2020) Robot Navigation in Dynamic Environment Based on Reinforcement Learning.

Overbeek, E.B. (2018) Development of a platform strategy framework.

Overbeek, J.F. (2006) Meta Object Facility (MOF): investigation of the state of the art.

Overbeek, T.A.G. van (2015) Floater Allocation in Paced Mixed Model Assembly Lines: Design and implementation of a method for operational scheduling of cross-trained workers in Mixed-Model Assembly Lines.

Overkamp, N.M. (2024) ReScan : High performance mass scan responder.

Overkamp, Niels (2019) Speeding up profile steering algorithms with caching for buffer type devices.

Overvelde, R.M. (2024) Towards a method for improving the coherence between the reference architectures within the Dutch public sector.

Oyediran, A.S.M. (2018) Scaling beyond HoriZZon.

Ozaita Araico, Alejandro (2017) Detection of the crowdedness of a place sensing the devices in the area.

Ožiūnas, D.O. (2021) Identifying Severity of COVID-19 In Patients Using Machine Learning Methods.

PINGEN, G.L.J. (2016) Machine Learning for Ground Cover and Hot Target Analysis in RGB and Satellite Imagery.

Paalvast, Olivier (2022) Representing Ultra Low Dose CT scans as Chest X-Rays : how far can and do we need to go?

Paauw, Tim (2015) Analysis of unstructured data at GGD : text mining semi-medical notes to predict childhood obesity and abuse.

Padje, J. van 't (2020) The impact of the Dutch weather on the health of horses.

Padubidri, C.P. (2020) Sea lion Counting from Aerial Images with Deep Learning : A density Map Approach.

Pakhira, A. (2016) A Fault Injection Framework for Reliability Evaluation of Networks on Chip Designed for Space Applications.

Palande, Shalvi (2022) Breathe with me : Designing and Evaluating Wearable Visual and Vibrotactile Displays for Colocated Breathing Synchronization.

Palanikumar, C. (2023) A process mining framework for continual service improvements.

Palenio, H.L. (2020) Privacy in the Age of IoT An experimental study investigating the attitude towards smart speakers of non-users through voice activation and data evaluation as intrusive features.

Pallett, Dennis (2014) Improving Query Performance of Holistic Aggregate Queries for Real-Time Data Exploration.

Palm, A.J. (2021) Using business intelligence to analyse sport associations' financial data.

Palsma, T. (2010) Discovering groups using short messages from social network profiles : using hierarchically organized concepts to discover relations.

Pan, An (2023) Party on? Inferring campus parties from WiFi logging.

Panambur Venkatraman, V. (2019) A sensor fusion technique for head motion controlled endoscope camera system.

Pandey, S.S. (2023) A Comparative study of BERT-CNN and GCN for Hate Speech Detection.

Pandey, Shivang (2022) Snow Depth and SWE estimation using Multi-sensor Microwave and Optical Remote Sensing Time series Data for Indian Himalayas.

Pandey, Vaidehi (2021) Self-supervised semantic segmentation based on self-attention.

Panman de Wit, J.S. (2018) Dynamic detection of mobile malware using real-life data and machine learning.

Pantelis, D. (2019) Design of a control strategy for a robotically assisted ultrasound guided biopsy.

Papadopoulos, Antonios (2019) The quest of "dethroning" passwords from (web)authentication schemes.

Papegaaij, E. (2007) The Tree Processing Language: Defining the structure and behaviour of a tree.

Papenmeier, A. (2019) Trust in automated decision making : how user's trust and perceived understanding is influenced by the quality of automatically generated explanations.

Pappu, A. (2021) Demand side management using blockchain for distributed networks.

Paramartha, Mohammad Anggasta (2014) Design and Instantiation of Reference Architecture of Pluggable Service Platform in E-Commerce.

Park, Sanghyeop (2023) Personal Artificial Intelligence Coach For ‘League Of Legends’.

Pars, Cas (2017) PHREE of Phish : The Effect of Anti-Phishing Training on the Ability of Users to Identify Phishing Emails.

Parzian, Alessio (2015) Java Card Bytecode Verification. Designing a novel verification system.

Pasch, M. (2008) Bye-bye couch potato : body movement in the gaming experience.

Pasquarelli, Leonardo (2022) Extending Java Collections for List and Set Data Structures.

Pasveer, Marco (2013) Importance sampling for probabilistic timed automata.

Patel, Nishit (2023) Downscaling Land Surface Temperature using SAR images : A Machine Learning framework.

Pater, Elwin (2011) Partial Order Reduction for PINS.

Pathak, Shreyasi (2018) Automatic structuring of breast cancer radiology reports for quality assurance.

Patil, Samarjeet Singh (2021) Automated Vulnerability Detection in Java Source Code using J-CPG and Graph Neural Network.

Paul, Navneet (2021) TransNeRF - Improving Neural Radiance fields using transfer learning for efficient scene reconstruction.

Paul, Ronald (2010) Realization and high level specification of facial expressions for embodied agents.

Paulissen, J.W.H. (2018) Using depth sensing and augmented reality to improve ski-learning.

Paulissen, J.W.H. (2023) KamerMaker : A Novel Approach to the Reconstruction of Personal Indoor Spaces in Virtual Environments.

Paulussen, Z.M. (2023) Facilitating the co-creation of AI-enhanced HRM systems: A systematic literature review.

Pausan, Florin (2021) Designing a customizable product lifecycle management system for an SME to reach data singularity.

Pavlov, Nikolay (2022) Data Visualizations and Modeling of Environmental Risks in Green Areas.

Pavlov, V. (2022) Security aspects of digital twins in IoT platform.

Pawirotaroeno, Rezfan (2022) Space Internet Congestion Control : optimising loss-based congestion control algorithms for increased throughput over satellite-terrestrial communication networks.

Pazhouhi, E. (2018) Automatic Product Name Recognition from Short Product Descriptions.

Pebesma, J.L. (2020) Towards transfer learning in e-discovery : finding the optimal classifier and evaluating domain adaptation methods.

Pebesma, J.L. (2020) Towards transfer learning in e-discovery : finding the optimal classifier and evaluating domain adaptation methods.

Peeters, BSc Bart (2022) Exploring human relationship recognition in egocentric videos using deep learning techniques.

Peeters, D.W.M. (2022) Physicalization of dynamic, physiological data.

Peeters, J.J. (2016) Fast and Accurate Likelihood Ratio Based Biometric Verification in the Encrypted Domain.

Peetsma, J.J. (2019) Towards A Serious Game For Assessing Self-Reliance In A Crisis.

Peetsma, Jasper (2023) The Development of a Novel Method for Measuring Biomechanical Features of Agility Using Markerless Motion Capture.

Pelikan, H.R.M. (2018) "What's going on there?" Negotiating common ground in robotic vs. open Surgery : a comparison of surgeon-initiated requests for action in open and robotic surgery.

Peng, Yuxi (2011) Face Recognition at a Distance: a study of super resolution.

Penkov, Ivan (2017) Block chain use cases beyond payments.

Pennestri, Pietro. (2022) An FPGA based sensor fusion algorithm for IMU data processing.

Penning, M.P.J. (2007) Boosting LUCK: Improving the language understanding capabilities of Kaitito.

Pennings, H.E. (2023) On the use of pre-trained image classifiers for fingerprint-based indoor localization.

Perera, Navoda (2020) An API for intelligent deployment of numerical calculations.

Perera, R.A.H. (2019) Finger-Adaptive Illumination Control and Exposure Fusion Imaging for Biometric Finger Vein Recognition.

Perik, L.W. (2022) An analysis of the decentralization and effectiveness of Lightning Network.

Perk, Anno (2009) Reflection in large IT Projects : a method for project success focussing on soft factors.

Perkowski, Ernest (2020) Impact of ensemble machine learning methods on handling missing data.

Peters, D.J.T. (2023) Integrating operational and tactical decision-making in spare part inventory management.

Peters, M.D.J. (2022) Extending explainability of generative classifiers with prototypical parts.

Peters, ir. Rifca M. (2018) Identifying and addressing common programming misconceptions with Variables - Part II.

Peters, Rifca Marcella (2014) How Turn-Taking Influences the Perception of a Suspect in Police Interviews.

Peters, S.T.H. (2020) Distribution of advertisements on YouTube among several content categories.

Peters, Siem (2024) Option pricing using Generative Adversarial Networks.

Peterson, R.S. (2010) Testing real-time requirements for integrated systems.

Petrasch, Melissa-Kim (2022) The Physicality of AI and its meaning for Sustainable AI : A Discussion of Sustainable AI for Sustainable Fashion and how to Approach it.

Petrov, A.P. (2023) Experimentally finding graphs that minimize Wiener-entropy.

Petrov, Aleksandar (2023) Applying Heat Maps on a Traffic Sign Detection Case Study.

Petter, J. (2021) Adopting reinforcement learning in operational spare part management : visualizing the black box of decision-making.

Peut, A.M. van de (2023) Breathless Battles : The Optimization of an eHealth Application for Support in Self-Management for COPD patients with Complex Chronic Conditions through Human-Centered Design.

Pfab, Isabel (2016) A wearable intervention for posture correction.

Pham, Giang T. (2013) Integration of IEC 61850 MMS and LTE to support smart metering communications.

Pham, Nguyen Hoang Dung (2022) Dynamically Allocating Network Resources for Teleoperation Applications using Intent-based Inference.

Phan, T.H.G. (2023) An Implementation Methodology for Augmented Reality Applications.

Pieterse, Wybe (2023) The difference in UX between open and closed questions for novice users in conversational search.

Piggott, J.J.H. (2015) Identification of business travelers through clustering algorithms.

Pijnenborg, I. (2016) Methodological guideline to find suitable design patterns to implement adaptability.

Pingel, M.S. (2021) Leveraging machine learning and process mining to predict anaemia with the help of biomarker data.

Pingen, J.J.F. (2019) Engineering Entertainment: Adaptive interventions to enhance player engagement in the Interactive Tag Playground.

Pintilie, Alexandra (2023) Data collection and user engagement in eHealth applications focused on canine health.

Pirinski, Vasil (2023) Effectiveness of Modular analysis on Attack Trees using Binary Decision Diagrams.

Pits, R. (2021) Visualizing electricity consumption at a country scale.

Pištek, Andrej (2023) Dynamic variable reordering for Binary Decision Diagrams.

Plant, O.H. (2019) DevOps under control : development of a framework for achieving internal control and effectively managing risks in a DevOps environment.

Planting, J (2018) Developing a data repository for the Climate Adaptive City Enschede.

Plas, W.J. van der (2020) Edge computing : a business model for tele monitoring IoT applications for diabetic remote care.

Plass, Martijn J.A. (2007) Rules Decomposition for Distributed Context Processing.

Plentinger, C.S. (2020) GUI for FIG : visualising simulation results.

Ploeg, E.M. van der (2020) Developing a Platform to Emulate Fault Injection Attacks on Cryptographic Implementations.

Pluimers, Peter (2014) Item availability restricted.

Pocheva, Venelina (2022) Outsourcing Prioritization for Bottleneck Processes Using Process Mining: A Logistics Case Study.

Pohekar, Ashwini (2019) ASIP design on behalf of hybrid beamforming in MIMO communication system.

Pohjanheimo, R.J. (2020) Mood effects of immersion, control, and interaction in virtual reality eye-movement desensitization and reprocessing therapy.

Poirot, Maarten G. (2020) Split Learning in Health Care: Multi-center Deep Learning without sharing patient data.

Pompe, Babiche L. (2023) Empathic chatbot for complaint handling in customer service.

Pool, A.W. (2018) An information systems model for supporting fake news disclosure.

Pool, A.W. (2021) Digital Twins in Rail Freight - The foundations of a future innovation.

Pool, T.J. (2017) Drone swarming and combat management : visualizing and managing an autonomously functioning swarm of drones with as mediator Combat Management System(CMS).

Poortema, Anne (2009) Training clients using e-learning : developing an e-learning model for an international software vendor.

Poot, Martijn (2020) Real time posture tracking using Breathline : posture , body position and movement classification using an Arduino, accelerometer and k-Nearest Neighbour classification.

Poozhiyil, Aditya (2023) Exploring Multimodal Data for Crime Recognition.

Popa, A. (2020) Feature evaluation for detection of COVID-19 in pulmonary CT scan images.

Popa, Andrei (2023) Gotta adjust them all! : Dynamic Difficulty Adjustment of Role-Playing Games Through Procedural Generation of Non-Player Characters.

Popov, Dimitar (2022) How Does Encouragement in Human-Robot Interaction Affect People’s Pro-Social Behavior? An Experimental Study on Human-Robot Interactions.

Popovici, Andrei (2022) Analysing Real-Time Vision-Based Pose Estimation Algorithms for RITH Purposes on Embedded Devices.

Popovs, V. (2023) Item availability restricted.

Portengen, Rik (2007) Phased array antenna processing on reconfigurable hardware.

Postema, B.F. (2013) Fluid survival tool: a model checker for Hybrid Petri nets.

Postema, J.T. (2019) Explaining system behaviour in radar systems.

Posthumus, Wytse Jan (2011) The situated cognitive engineering tool.

Postma, Mart (2023) Best Practices for Big Data Management in the Sports Industry.

Postmes, J.M. (2021) Design of an efficient path planning and target assignment system for robotic swarms in agricultural applications.

Pot, Wouter (2007) A machine learning approach for generating expressive musical transcriptions.

Pothoven, Tristan (2010) Workflow usage in the healthcare environment.

Poulisse, Gert-Jan (2007) Exploiting inter-conceptual relationships to boost SVM classification.

Pouw, I.H. (2015) You are what you eat : serious gaming for type 1 diabetic persons.

Praas, J.W. (2020) Predicting influence spread in online social networks using combinations of node centralities.

Prakken, E.B. (2022) Design, modeling, and control of a novel multirotor UAV with embedded 3D-printed thrust force sensor.

Prakoso, Dimas Wibisono (2019) Semantic-aware EWC Code Recommender System for Industrial Symbiosis Marketplace.

Prasad, Akshay (2022) Investigating whether typosquatting targets children.

Prasad, Pralad (2022) Automatic Clinical Deterioration Monitoring using Machine Learning Techniques Post Surgery.

Prause, L. (2016) Software vendors' service infusion : a generic value network of cloud-based enterprise software.

Prenger, A.H. (2016) Effect of rotating virtual product presentation on purchase intention in online stores.

Preuß, Oliver Ludger (2023) Multi-Objective Algorithm Configuration on Multi-Modal Multi-Objective Optimization Problems.

Prieskienis, Adrijus (2021) Information value for disruption management in supply chains.

Prieto Álvarez, Roberto (2020) Design of a Flat-Swipe Finger Vein Recognition Device in the NIR Spectrum.

Prins, J. (2020) Proactive recognition of domain abuse.

Prins, Martin (2007) Fast retransmission for multicast IPTV.

Prodea, A (2021) Identifying critical source code at method level by performing threshold-based and clustering algorithms on software metrics.

Pross, L.S. (2016) Trust in the Cloud.

Provoost, Jesper C. (2019) Short-term prediction and visualization of parking area states in real-time : a machine learning approach.

Provoost, Jesper C. (2021) Improving Operational Efficiency In EV Ridesharing Fleets By Predictive Exploitation of Idle Times.

Prudnikova, Anna (2019) Standardized security assessment framework for ICS devices and pilot project.

Przadka, Bartosz (2022) CAD model reconstruction from the LiDAR scan of the catenary arch.

Psalmerosi, Febriya Hotriati (2019) Applying Text Mining and Machine Learning to Build Methods for Automated Grading.

Pu, Leiying (2019) Co-design approach : a collective design method for improving working efficiency and satisfaction in user support design processes : an empirical study based on three comparison groups simulating a real-world quick start guide design process.

Puming, Liu (2006) Service agreements and facilities for M-health vital sign monitoring.

Punter, C.M. (2010) Multi-source entity resolution.

Putman, C.G.J. (2021) A Requirements Based Selection Model for Future Proof Non-Intrusive Authentication Technologies in the Office.

Putten, Ing. A.E. van (2007) Behavioural hybrid process calculus translation to modelica.

Putten, F.M.J. van der (2014) Advies over de mogelijkheid tot het invoeren van slechts één planningsomgeving binnen VDL ETG Almelo.

Pühl, Julia (2018) Developing a life-storybook-application for people with dementia.

QIN, L. (2017) Operator control hierarchy for multiple robot systems.

Qazi, A. (2022) Cars and social media : a greener future.

Qiu, Xian (2010) Bin packing games.

Quak, Remi (2020) Process Mining in Healthcare: Gaps between protocol and clinical practice of critical side findings in radiology.

Quattrocchi, J. L. (2020) Reaction-Diffusion patterns modelled by Continuous-State Cellular Automata.

Qureshi, Faizan Mazhar (2024) Image Tampering Detection in Social Media.

Raa, I. te (2015) Recursive functional hardware descriptions using CλaSH.

Raaijen, Thomas (2018) CRM success through enhancing the project management approach.

Raalte, E. van (2019) Automating system generation in Clash.

Raben, K.T. (2019) Comparing selfh-healing techniques in approximate MAC accelerators.

Raczkiewicz, Michal (2023) Better Approach To Mobile Ad-hoc Networking in MaritimeManet.

Rademaker, F.M. (2022) Subpopulation process comparison for in-hospital treatment processes : a case study for sepsis treatment.

Radl, P.D. (2019) 3D reconstruction improvement by path planning towards physical interaction with a UAV.

Radstaak, J.M. (2019) Developing a DevOps Maturity Model: A validated model to evaluate the maturity of DevOps in organizations.

Radu, A. (2021) Speeding Up Convergence For Sparse Training Using Feature Extraction Behaviour.

Rai, Shubham (2020) Behavioral Threat Detection : detecting Living of Land Techniques.

Raicevicius, K. (2023) Digital finance and its effects on businesses, governments and society.

Rajan, MSc Vaibhav (2022) Generating temporal 3D city models of Shahjahanabad for exploratory ground-level visibility analysis.

Rajput, Abdul Ghani (2011) Properties Relevant for Inferring Provenance.

Ramchand, Tasneem (2024) Website Navigation Structures: Eliciting Mental Models Using Card Sorting.

Ramesh, Darshan (2019) Item availability restricted.

Ramón Gómez, Nerea (2022) An end-to-end approach to a Reinforcement Learning application in the transport logistics.

Ranjan, H. (2022) Item availability restricted.

Ranjit Jacob, Sonu (2021) Lameness Detection from Top View : State-of-the-art Analysis of Lameness Detection.

Rarenco, Andrei (2023) Investigating the Performance of Deep Learning Algorithms for Muscle Activation On/Off-Set Detection in Horse Surface Electromyography (sEMG) Data.

Rasing, A (2018) Automation and increased use of carrier data to improve the process of ocean carrier selection.

Rauleder, S. (2016) Cloud computing as an entrance for start-ups into ERP solutions.

Raureanu, A.S. (2021) Transfer learning for cell image reconstruction.

Raven Garcia, J. (2023) A geometric port-Hamiltonian modelling and simulation framework for morphing-wing UAVs.

Ravi Prame, Akash (2021) Hybrid Learning for Leakage Detection in Sealed Detergent Containers using IR-Thermography.

Ravichandran, R. (2023) Improving accuracy of vehicle tracking by fusing IMU and GPS.

Ravishankaran, Charan (2021) Impact on how AI in automobile industry has affected the type approval process at RDW.

Rawat, K. (2020) Human activity recognition based on energy efficient schemes.

Rayo Torres Rodriguez, H. (2019) A lightweight hardware architecture for intermittent computing.

Rebel, Thomas (2021) Influence performance of breathing exercises with game elements.

Redelijkheid, M.N.F. de (2023) Monitoring network traffic and responding to malicious traffic for IoT devices in 5G network slices.

Reebroek, C. (2018) Understanding engagement behavior in online brand communities : how social identity relates to frequency of interaction and tweet sentiment.

Reede, Joost (2007) On A-Select and Federated Identity Management Systems.

Reefman, K.H.A. (2021) Determining the rate of small gestures unobtrusively.

Reekers, D.C. (2021) Mecamind XR.

Reesink, T.B.J. (2020) Creating 3D faces from 2D images using GANs.

Regnerus, B. (2019) Matching article sentiment in abstractive summarization of news articles.

Regt, P.D. de (2021) Modeling an eye gaze task for people with PIMD.

Reiling, Mark (2014) Implementation of a Monocular Structured Light Vision System for Pipe Inspection Robot PIRATE.

Reitsma, B. (2022) Improving the Planning Process of a Complex Pickup & Delivery Problem by Applying a Constructive Heuristic and an Adaptive Large Neighbourhood Search.

Rejek, J. (2018) Conceptual Blending of Dialog and Image Schema - Design and Pilot Test of an Image-Schematically Metaphoric Collaborative Decision-Making Tool.

Rekker, W. (2022) Verification of a SysML railway specification with a translation to UPPAAL.

Rengers, J.J. (2020) Investigating association between musical features and emotion through EEG signal analysis.

Rengers, J.J. (2022) DDS in a Zero Trust Cloud Native Environment in the Naval Domain.

Rens, Eduard (2018) Extract offender information from text.

Renssen, Martijn (2019) Classification of types of road damage using machine learning and a smartwatch.

Resing, M. (2021) Should network operators hop on the data plane?

Resing, Marvin (2023) Industrial Cobot Sound Design Study : Audio Design Principles for Industrial Human-Robot Interaction.

Reuderink, Boris (2007) Fusion for Audio-Visual Laughter Detection.

Reus, M.B.C. (2023) Graph generation for synthetic stock data.

Reuvers, E. (2023) Extracting information from audio data gathered in a virtual reality museum tour to determine personal preferences.

Reve, S.J. van het (2024) Detecting Rare Diseases : Autoencoders for Detecting Anomalies in Medical Imaging.

Reyers, P.M. (2023) A comparative analysis of audio steganography methods and tools.

Rhijn, Gijs van (2019) Why your back hurts : Finding an efficient way to measure and evaluate sitting posture using a combination of body sensors placed on the body and machine learning.

Riahi, T. (2024) Contactless Heartbeat Estimation with FMCW Radar.

Richter, N.G. (2019) Process mining in programming game logs to differentiate between skill levels.

Richter, N.G. (2021) Zero-downtime PostgreSQL database schema migrations in a continuous deployment environment at ING.

Ridder, Frank (2023) Adaptive Random Forest on FPGA.

Ridder, L.W. van de (2018) Improvements to a tool-chain for model-driven design of Embedded Control Software.

Ridder, R.K. de (2019) Business Models for Smart Mobility IoT Data.

Rieffe, Dennis (2017) The traceability of medical equipment through hospitals and retirement homes.

Rieksen, R.H. (2016) Perfect selfie that can be used in face recognition with a passport photo.

Rienstra, K.D. (2023) Assessing the Potential of FHIR as a Standard.

Riesewijk, M. (2020) High availability orchestration of Linux containers in mission-critical on-premise systems.

Riet, M. van 't (2013) Trace-based debugging for advanced-dispatching programming languages.

Rietberg, Max (2023) Quantified Photoacoustics for Carotid Artery Imaging.

Rietberg, Max (2023) Quantified Photoacoustics for Carotid Artery Imaging.

Rietema, Richard (2009) Automatic Verification and Analysis of Test Results of Océ Printers.

Rietvelt, D.C.J.C (2022) Extracting information from funding opportunities using state-of-the-art NLP method BERT with minimized data annotation.

Rietvelt, D.C.J.C. (2019) Influence of neutral word removal on sentiment analysis.

Rijn, K.D. van (2020) A binary decision diagram based approach on improving probabilistic databases.

Rijnbeek, E.H. (2019) Item availability restricted.

Rijnbergen, K.J. (2020) Improving the effectiveness of phishing detection Using lexical semantics; A machine-learning based approach.

Rijnbergen, K.J. (2023) Pattern Analysis of Time Series Data.

Rikken, T.W. (2022) The application of hidden Markov models for economic state prediction and the calculation of economic state transition probabilities.

Rikkerink, K.B.W. (2021) Enabling Perspective Multiplication for Multi-Perspective Enrollment with University of Twente Finger Vein Scanner.

Rikkers, Vasco (2022) The Use of Story-based Gamification in USB-based Attack Prevention.

Rindt, F.S. (2017) Developing a Smart Rainwater Buffering System for the Citizens of Enschede.

Ringlever, J.J. (2014) Improved timetabling for a public transport company from cost as well as passenger perspective.

Ringlever, J.J. (2014) Improved timetabling for a public transport company from cost as well as passenger perspective.

Riphagen, Quinten (2022) The deepfake problem : Developing a novel maturity model for forensic image authentication research.

Ritmeester, J.C. (2020) ReFERee : a self-reflection tool For gamers.

Ritmeester, J.C. (2022) Comparison of common signal pre-processing techniques for long-term sEMG-based knee angle estimation.

Ritsema, S. (2021) A feature sensitivity and dependency analysis approach for model explainability.

Ritsema, Stan (2023) A Disentangled Representation Learning Approach for Deblurring Microscopy Images.

Ritterfeld, Thom (2016) On-demand app development.

Riva, Giovanni Maria (2019) Privacy architecting of GDPR-compliant high-tech systems : the PAGHS methodology.

Rizvi, Mohammad Abbas (2022) Automated Electronic Component Selection : a Machine Learning approach.

Rizwan, Muhammad (2020) SDR based module for Low Power WAN nodes development.

Robert, Julien (2020) Recipe suggestion for meal-sharing online Marketplaces.

Robson, Francis (2020) Using Temperature and Humidity Sensors to Propose a New Form of Flat Roof Leakage Detection.

Rodday, Nils Miro (2015) Exploring Security Vulnerabilities of Unmanned Aerial Vehicles.

Roditi, Alexandra (2014) Quantifying the Contribution of Enterprise Architecture to Business Goals.

Rodriguez Ruiz, G. (2021) Deep Learning Classification of Operator and Endoscope Motions during Endoscopy.

Roediger, Sarah (2018) The effect of suspicion on emotional influence tactics in virtual human negotiation.

Roelink, D.J. (2024) Optimization of return freight selection.

Roelink, M.J. (2020) Encoding deadlock-free monitors in the VerCors verification tool.

Roelink, M.J. (2022) zk-SCHNAPS : enforcing arbitrary password policies in a zero-knowledge password protocol.

Roelofs, B.G.J. (2021) Optimal management of delivery costs.

Roelofs, N.A.J. (2015) Incorporating Seasonality and Volatility Updating in Gas Storage Valuation for the Purpose of Validation.

Roelofsen, Floris (2004) Contextual Reasoning - Complexity Analysis and Decision Procedures -.

Roemers, Arnout (2013) An adapter-aware, non-intrusive dependency injection framework for Java.

Roerink, Jasper (2023) Ordering policy optimisation for forecast driven orders within HTM-Aerotec.

Roes, J.B.M. (2007) Identifying and solving overlap between messaging standards with the help of domain models, illustrated with HR-XML’s SIDES and SEP.

Roest, J.J. van (2020) Presenting automated test results for web development : A dashboard for reports from automated tests.

Rombouts, Wolf (2009) Context-Concept chemie en van Hiele's abstractieniveaus.

Romeo, Pietro (2019) Discovering aspects of gaming QoE : an explorative study.

Romkema, J.F. (2020) Development of a NOx Emission Model using advanced regression techniques.

Roo, A.J. de (2007) Towards more robust advice : message flow analysis for composition Filters and its Application.

Roo, M. de (2015) Optimal Event Handling by Multiple UAVs.

Roode, G. de (2022) User privacy in cryptocurrencies.

Roodenburg, S.B. (2009) Scheduling the sequential hardware-in-the-loop simulator.

Roolvink, S. (2008) Detecting attacks involving DNS servers : a netflow data based approach.

Room, J.T. (2023) Transducer selection & protocol compliance detection algorithm design as a basis for automated point-of-care lung ultrasound screening of tuberculosis.

Roosmalen, J.J. van (2019) Forecasting bus ridership with trip planner usage data : a machine learning application.

Roppelt, J.C. (2019) Security risks surrounding cryptocurrency usage : a study on the security risks of cryptocurrencies and how security perception affects usage.

Rorije, R.J. (2006) Input/output in functional languages : using algebraic uniontTypes.

Ros, K. M. (2019) Airport restroom cleanliness prediction using real time user feedback data and classification techniques.

Ros, M.F. (2022) Exploring Fishing Vessel Activity Classifications using Machine Learning.

Rosenbusch, David (2021) Creative Memory Arrangement in Virtual Reality: Building a VR diary.

Roskam, Ronald (2014) Evaluation of Online Public Sexual Health Care in the Netherlands: A Scenario-Based User Evaluation.

Rotari, Cristian (2020) Secure and transparent dispute resolution system in supply chains using hyperledger fabric.

Rous, E. (2021) Shopfloor Organization and management system : developing a software system for a matrix-production system.

Rouwenhorst, J.H.J. (2018) A picture is worth a thousand words : investigating the value of Instagram posts and Twitter posts in predicting movie box office revenues.

Rovers, Kenneth C. (2006) Front-end research for a low-cost spectrum analyser : receiver system and topology study.

Rozen, Riemer van (2007) A Debugging Framework for NIPS.

Rozendal, S.P. (2018) Redesign of a finger vein scanner.

Rozo Carreño, Daniel Felipe (2020) An enterprise architecture framework for digital transformation.

Rubbens, R.B. (2020) Improving Support for Java Exceptions and Inheritance in VerCors.

Rubio Paniza, E. (2009) Design and evaluation of an MSP-based body area network management architecture using JMX.

Rublein, N. (2019) Design of haptic feedback in pedal based UGV teleoperation to enhance situation awareness.

Ruis, F.A. (2021) Independent prototype propagation graph for compositional zero-shot recognition.

Ruis, Frank (2019) Spilling the beans: Food recipe popularity prediction using ingredient networks.

Ruiter, Bryan (2017) Towards a continuous auditing philosophy.

Ruiter, J. de (2024) Developing Effective Autonomous Driving for Sim Racing through Reinforcement Learning in Assetto Corsa.

Ruiter, Justin (2023) Understanding money flow in ransomware.

Ruiter, Mark de (2014) Performance measurement of Hermite-based multi-carrier communication.

Ruizendaal, Rutger (2017) The potential of deep learning in marketing : insights from predicting conversion with deep learning.

Rump, A. (2020) Automated assessment of learning objectives in programming assignments.

Rump, Arthur (2023) Apollo++: Automated Assessment of Learning Outcomes in Programming Projects.

Runhaar, T.P. (2024) Secure AI-Enhanced Student Engagement Analysis.

Rus, A.C. (2023) NAISS : Network Authentication of Images to Stop e-Skimmers.

Rus, Adrian-Catalin (2020) Modelling and evaluating Obstructive Sleep Apnea management protocols with UPPAAL.

Rusnac, Nicolae (2023) Improving the Performance of Multi-Objective Evolutionary Algorithms for Fault Tree Inference.

Rutgers, Jochem (2009) VHDL voor het voortgezet onderwijs: Een nieuwe lesmodule over hardware voor informatica.

Rutgers, M. (2021) Duckbot : a chatbot to assist students in programming tutorials.

Rutgers, Nils (2022) Point cloud based semantic segmentation for catenary systems using deep learning : Compressibility of a PointNet++ network.

Ruth, F.J. van (2015) Improving problem detection and focus for root-cause analysis through case-based reasoning and group decision support systems.

Rõžakov, Ilja (2019) A Modest Comparison of Blockchain Consensus Algorithms.

Rödel, H.A. (2021) Tailored Cybersecurity Interventions.

Römer, J.G.W.T. (2022) Real-time pitch detection using resource constrained IoT device.

SIMSCH, J.J. (2016) Video Quality in VR : Measuring Impact of Bandwidth-Saving Approaches on Quality of Experience and Social Interaction in a HMD-mediated Video Application.

Saaltink, Caz (2023) Solving BFL Queries: From BDDs to Quantified SAT.

Sadad, Akhyar (2019) Reusable machine learning framework for predicting future system performance : a comparison study of validation strategy on WWTP time series data.

Sadananda Bhat, A. (2019) Hierarchical deep neural networks for MeSH subject prediction.

Saeed, Aaqib (2017) Deep physiological arousal detection in a driving simulator.

Safavi-Zadeh, Daniel (2024) Unravelling the Information Asymmetry in Threat Intelligence.

Sain, R. de (2020) Impact of language on detecting agitation.

Sakhi, Tarek (2023) Effectiveness of natural language processing techniques in categorizing scientific articles by research methodology.

Saksena, Saumya (2020) CABiNet : Efficient Context Aggregation Network for Low-Latency Semantic Segmentation.

Salamah, Siti Yaumi (2019) Predicting demand of replacement cars for breakdown cases using machine learning techniques.

Salce, Miss Yasmin (2023) Applying a Machine Learning Model to Estimate the Current State of Charge of Energy Storage Devices.

Sallander, J.G.D. (2023) DumpingMapper : Illegal dumping detection from high spatial resolution satellite imagery.

Salomons, T. (2016) Een basis voor continu verbeteren bij AWL.

Saman Yan, Daian Geivid (2013) The effect of Testing and Feedback in Digital Game-based Learning.

Sambeek, M. van (2007) Real-time shadow generation for 3D simulations using modern hardware.

Samiksha, Samiksha (2021) Investigating an association between DDoS and Phishing attacks.

Samuel, L.N. (2017) Computations in Stochastic Game Theory : large sets of rewards in games with communicating states and frequency-dependent transition probabilities and stage payoffs.

Samy, Omar (2023) Tracing Data Utility for Noise Adding Plugins in Process Mining.

Sanchez, Bryan (2022) Automatic detection and estimation of the area of buildings.

Sandberg, Aaron (2022) Can data from Twitter produce useful feature suggestions in the audio streaming service field? - An example of Spotify.

Sandhaus, Hauke Gregor Wilhelm (2015) Development of a 3D navigable interface for a touchless showcase.

Santema, S.E (2016) Insight in Scheduling Choices:A Visualisation Tool for SDF Graphs.

Santen, A. van (2022) Spot the difference : Using Procrustes analysis on semantic features to enhance the performance of Facial Recognition Systems.

Santen, Julian van (2024) Using LLM Chatbots to Improve the Learning Experience in Functional Programming Courses.

Santiago Garcia, Eric (2022) Country-independent MRTD layout extraction and its applications.

Sarrionandia Uriarte, Nora (2017) Efficiency of broadcasting in vehicular networks by means of 5G device-to-device communications.

Sartori, Damiano (2020) Redactable Blockchain : how to change the immutable and the consequences of doing so.

Sastry, Srikumar (2022) Super Paretos: Bayesian Active Meta Learning for Spatial Transferability of Deep Learning Models.

Sathiyanarayanan, Prasanna (2021) Data Driven Feedforward Control of a 2-DOF Redundantly Actuated Manipulator with Flexure Joints using Machine Learning Techniques.

Satici, Arda (2023) Leveraging Machine Learning and Process Mining to Treat Anaemia with the Help of Prescription Records.

Satink, Laurens (2009) The adaptive presentation assistant using grammar-based recognition to support the process of presenting.

Satria, Triadimas Arief (2013) Seamless service continuity in cloud based lte systems.

Savchenko, G. (2021) Visualizing land use change : the most frequently occurring correlations between land use change and demographic factors.

Savin, Nicu (2023) Exploring Indoor Localization with Transformer-Based Models : A CNN-Transformer Hybrid Approach for WiFi Fingerprinting.

Sawaryn, B. (2020) Modelling fluctuations of blood glucose levels based on food intake and physical activity in patients with Diabetes Mellitus Type 2 : development of a controlled protocol which administer perturbations in daily life situations.

Sburlea, Andreea Ioana (2012) Brighten up your mind! : Effects of light priming and encouraging feedback on the neural and behavioral responses in a general knowledge task.

Schaaf, Jurre van der (2022) Using reinforcement learning to control hydrofoils.

Schabbink, Johan (2008) Design of a capacitive based closed-loop displacement sensor.

Schade, Christiaan Leonard (2013) FCScan: A new lightweight and effective approach for detecting malicious content in electronic documents.

Schaik, E.J.G. van (2019) Color-based Recognition Techniques for Manipulation Detection in Advertisement Videos.

Schaik, Eric van (2022) Improving the Informativeness of Abstractive Opinion Summarization.

Scheerens, Daan (2012) Practical indoor localization using bluetooth.

Schell, Alfred (2020) Vision-based guidance for robot assisted endovascular intervention.

Schellekens, M.C.C. (2018) Reducing Meat Consumption Using A Mobile Application.

Schellekens, M.C.C. (2021) A Low-Budget, End-To-End Warning System for Bicycles using Monocular Vision and Vibrating Handlebars.

Schepers, P. (2019) Application of a process model to define potential operational functional failure conditions.

Scheuter, L.R. (2021) Does it make sense? Analyzing coherence in longer fictional discourse on a syntactic and semantic level.

Schilpzand, M.P. (2008) X-Stream in MaDAM : new junction modelling in macroscopic dynamic traffic assignment models.

Schilt, Elise (2024) Accelerating MRI with optimized sampling patterns in Pulseq.

Schiphorst, R. (2000) Demonstration of the Software-Radio Concept.

Schipper, E.W. (2021) Value conflicts between sustainable and alternative behaviour in daily routines.

Schipper, M.A. (2019) Decomposed reachability analysis for discrete linear systems.

Schipper, Ruurd de (2014) The usefulness of IT innovation classification for business model innovation.

Schippers, Jorrit (2009) A massively scalable architecture for instant messaging & presence.

Schmidt, R. D. (2019) Creation of a training and teaching application in AR.

Schmit, C. (2020) Smoothed analysis of the ICP algorithm for arbitrary probability distributions.

Schmit, C. (2022) Offloading Strategies for the Rendering Process in Edge-enabled Virtual Reality Games.

Schniering, A.A. (2016) The relationship between human factors and presence experienced in Virtual Environments (VEs).

Scholte, Harmen (2022) Regrowing Strategies for Dynamic Sparse Training.

Scholte, Theodoor (2008) Managing continuous uncertain data by a probabilistic XML database management system.

Scholten, Arnaut (2021) Efficient matching of heterogeneous roadmap data at Rijkswaterstaat.

Scholten, C.P.B. (2019) Hacking the router: characterizing attacks targeting low-cost routers using a honeypot router.

Scholten, C.P.B. (2021) Automatic detection of zero-day attacks in high-interaction IoT honeypots using static analysis techniques.

Scholten, F.B. (2007) The concern-oriented software architecture analysis method.

Scholten, J. (2017) The determinants of cloud computing adoption in The Netherlands : a TOE-perspective.

Scholten, Jeroen (2022) Gain insights in the logistic processes at Amsterdam Schiphol Airport and determine solutions to limit capacity bottlenecks.

Scholten, R.H.D. (2020) Secure biometric verification in a malicious attacker model setting.

Scholz, C. (2023) Interactive Music Installation: Raising awareness about the lack of diversity at music festivals.

Schoneveld, J. (2020) Augmented reality photo album for people with dementia.

Schooltink, F. (2022) A simulation of the ecological impact of three smartphone strategies.

Schooltink, W.T. (2020) Testing the sensitivity of machine learning classifiers to attribute noise in training data.

Schoot Uiterkamp, L. (2019) Improving text representations for NLP from bags to strings of words.

Schoot Uiterkamp, L. (2021) Classification of Empathy and Call for Empathy in Child Help Forum Messages.

Schoppers, P.A.C. (2018) The Future of E-Learning in Higher Education : Using the scenario planning method to develop four scenarios on the futures of technology-enhanced higher education.

Schot, Jurgen (2009) The privacy governance framework : effectively dealing with privacy legislation.

Schot, N. (2012) QoS-aware model-driven SOA using SoaML.

Schot, Vincent (2011) Social norms to motivate IT use.

Schoute, M. (2024) Rowing Reimagined Extended.

Schouten, J.H. (2009) Optimisation of packet scheduling in wireless networks.

Schrama, M.L. (2020) Improving speech emotion recognition by identifying the speaker with Multi-task Learning.

Schreuder Goedheijt, Bart (2017) Recalling shared memories in an embodied conversational agent : personalized robot support for children with diabetes in the PAL project.

Schreurs, A. (2021) The heat under our peat : using transfer learning for peat fire prediction in the arctic region of North-East Siberia with Sentinel-2 imagery.

Schrijver, Bert Jan (2006) Classificeren met vertrouwen : contextgevoelige tekstclassificatie met betrouwbaarheidsindicatie.

Schrijver, G. (2020) Using process mining to compare different variants of the same reimbursement process : A case study.

Schrijver, G. (2024) Evaluating Generalisability, Limitations, and Adaptations in Social Network Analytics-Based Insurance Fraud Detection.

Schroer, G.H. (2016) Feasibility of End-To-End Encryption using Attribute Based Encryption in Health Care.

Schroten, Peter (2019) Introducing BGD: a DSL to express board games and gameplay.

Schuhmacher, M. (2018) Autonomous anatomical structure recognition using machine learning.

Schulte, Rob (2020) Autonomous mapping and navigation of an unknown environment using a reinforcement learning approach.

Schultewolter, M. (2016) Verification of user information.

Schultz, Pim (2017) Using machine-learning models for operational exception handling : a case study at IBM.

Schulz, C. (2023) Design and Evaluation of a Prototype for a Platform for AI algorithms in Medical Imaging : A Human-Centered Approach.

Schurink, N.W. (2017) Hyperspectral imaging and tumor classification for intra-operative colorectal cancer resection margin evaluation.

Schutijser, C.J.T.M. (2018) Towards automated DDoS abuse protection using MUD device profiles.

Schutte, J.J. (2019) Design of a development platform to monitor and manage Low Power, Wide Area WSNs.

Schutte, Rik (2011) Maintaining the causal thread of execution in distributed and multilanguage software.

Schuttert, W.J. (2022) Design and Optimisation of Roller Coaster Elements using Reinforcement Learning.

Schuurman, S.J. (2023) Assessing Interoperability Assessment.

Schwartzenberg, J. (2010) Using machine learning techniques for advanced passive operating system fingerprinting.

Schwemin, L. (2022) Artificial Intelligence Conversational Agents : Using Card Sorting to evaluate the Chatbot Usability Scale (BUS-11), and investigate this in relation to Chatbot Experience.

Schyns, J.L. (2019) Improving Scientific Search Engine Interfaces Using Scientific Networks.

Scrinzi, F. (2015) Behavioral Analysis of Obfuscated Code.

Sealy, Timothy (2008) Implementation of aggregation based Resource Management in DiffServ (RMD) Quality of Service Model (QOSM).

Seid, Selehadin (2019) Predicting weight regain after bariatric surgery using decision tree and logistic regression.

Seidel, Carina (2015) Strategic insight in the Capacity & Efficiency with Hospital data.

Seinhorst, J. (2023) Order optimization : a comparative analysis of heuristics and machine learning.

Seinstra, Valerie (2023) Information security awareness training to combat social engineering attacks : A Meta-Analysis.

Seip, H.M.C. (2022) Hospital robots : an experimental study on communicating urgency using non-semantic speech and built-in LED’s.

Seippel, H. S. (2018) Customer purchase prediction through machine learning.

Selman, K.J.R. (2014) Facial expression compensation.

Senden, J.M.J. (2015) Biasing a ring-oscillator based true random number generator with an electro-magnetic fault injuction using harmonic waves.

Sepulveda Bradford, G.U. (2013) What happens when a robot favors someone?: how a museum-guide robot uses gaze behavior to address multiple persons while storytelling about art.

Serban, A.C. (2017) Context based personalized ranking in academic search.

Sessink, Danique (2018) Using Machine Learning to Detect ICT in Criminal Court Cases.

Sessink, Danique (2020) Creating and Maintaining Organizational Security Awareness in SMEs.

Sessink, Joost (2020) Improving the automatic generation of Dutch soccer reports using the PASS system.

Sessink, Joost (2023) Parallelising a probabilistic model checker.

Shabeer Ahmed, D.S. (2020) Sustainable hitlist : targets for internet scans.

Shafee, T. (2022) Governance of cloud storage - A secure cloud storage strategy to maximize data sovereignty.

Shah, Nimish (2020) 3D Stereovision for Quantification of Skin Diseases.

Shametaj, E. (2023) Sim racing : a performance-enhancing dashboard.

Shanmuganathan, M.P. (2024) A Strategic Decision Analysis Framework for Software-as-a-Service Selection : A Systematic Data-Driven Approach.

Sharma, A.K. (2023) Securing the Digital Frontier : Identifying and Closing Security Gaps with MITRE ATT&CK and Open-Source Detection Controls.

Sharman, S.S. (2019) Item availability restricted.

Shenkute, Nathnael Teodros (2021) Introducing Artificial Intelligence in Fast MicroGC Analysis.

Shi, Z. (2022) Mining and Utilizing Patent Related Data in Quantifying the Societal Impact of Security Technologies.

Shih, H.B.B. (2021) Designing a text-based AI scheduling assistant chatbot for a business environment : a case study of a mobile-based AI scheduling assistant app.

Shumye, A.M. (2022) Planning the last-mile delivery of humanitarian aid using drones and trucks.

Shynkar, Albina (2023) Investigating the influence of code generating technologies on learning process of novice programmers in higher education computer science course.

Shyvakov, O. (2017) Developing a security framework for robots.

Siani, Costanza (2023) Unleashing the Potential : Experimental Study on the Effectiveness of Nudging Strategies in Webpage Design for Emerging Fintech Startups.

Siaw, Tien Loong (2012) Saturation for LTSmin.

Siddique, S. (2020) Incorporating clinical notes in an early sepsis prediction model to improve performance.

Siderius, J.C. (2023) Teaching (Tiny)ML using a tangible educational kit.

Siderova, Aleksandra (2022) Tree Transduction as a Means for Efficient Sentence Simplification.

Siebel, R. (2017) Video distribution in a D2D enabled 5G network supporting Public Safety Services.

Sierhuis, Pim (2007) Het voorkomen van prestatieverlies bij de koppeling met Web services: ... en de rol van standaardisatie daarbij.

Sierink, T.G. (2022) Active Reconstruction Attacks on 2D Range Databases.

Siers, W.H. (2019) Generating specifications for JSON APIs for formal and semantic use.

Sievers, C.T. (2020) Bag-of-words location retrieval : Including position of local features.

Sijs, R.F.B. van der (2022) Item availability restricted.

Sijtema, Marten (2010) Managing variability in model transformations for model-driven product lines : extending the ATL model transformation language with variability management capabilities.

Sikkens, B. (2010) The storage and retrieval of sensor data and its annotations.

Sikkes, Bart (2006) A stable matching based adaptive subcarrier assignment method for multimodal fibre access networks.

Siles Del Castillo, Hugo (2007) Hybrid Content-Based Collaborative-Filtering Music Recommendations.

Simmons, D. (2018) Social Cohesion and Sport in Overijssel : A Social Network Analysis.

Singh, A.N. (2021) Smart Control of MR safe Pneumatic Stepper Motor.

Singh, Daksh (2023) Modelling habitat suitability for the leopard in southern India through Ensemble Species Distribution Modelling.

Singh, Shalini (2022) FIFA 2022 game analysis using machine learning & computer vision.

Singpurwala, K. (2021) Sentiment analysis trading indicators.

Sinha, Shreya (2021) Completely Automated CNN Architecture Design Based on VGG Blocks for Fingerprinting Localisation.

Sinke, Mariska (2014) Knowledge sharing in schools with data teams.

Sirchia, Riccardo (2006) Realtime softwarematige radarscan conversie : met GPU programmeren.

Sivasubramanian, Kimsukha Selvi (2020) A comparative analysis of Post-Quantum Hash-based Signature Algorithm.

Skute, Igors (2014) Brand Equity and Co-Creation Potential in the Social Media Environment: an Analysis of Brand Engagement with Community Influencers.

Slabbers, Nanda (2006) Narration for virtual storytelling.

Slagman, Hermannus (2020) Presenting Automatic Analysis Of Uroflowmetry Curves.

Slatman, H. (2016) Unboxing security analytics : towards effective data driven security operations.

Slavova, S.I. (2021) Predicting the occupancy rates of truck parking locations : a machine learning approach.

Slebos, Stijn (2020) Modeling empathy in social human-robot interaction.

Sleurink, Matthias (2021) Automatic Generation of Test Cases for VerCors Verification Cases Failing with Null Errors.

Sleutjes, A.R. (2020) Identification of Profiles Based on Physical Behaviour Patterns.

Slomp, G.H. (2010) Reducing UPPAAL models through control flow analysis.

Sloot, Emma (2022) Electronic health record from a lab information system.

Slooten, N. van (2020) A maturity level assessment of process mining bottleneck analysis techniques.

Slootweg, M.H.F. (2015) Implementing and Characterising Medical Implantable Wireless Communication Using the Microsemi ZL70102 : And Prototyping a Load Measurement Tool for Unicompartmental Knee Replacement Operations.

Slot, M.C. (2017) The SocioMetricVis : Giving feedback during a brainstorm.

Slot, M.J. (2016) Ethics of Algorithms.

Slotman, BSc D.J. (2020) Item availability restricted.

Sluijsmans, Dennis (2011) Performance Evaluation of Data Dissemination Protocols for an Infrastructure-to-Vehicle Cooperative Traffic Light Application.

Sluiter, N.I. (2019) Influence Maximization in Social Networks by Injecting Memes.

Slutter, M.W.J. (2017) Creating a feedback system with the Myo Armband, for home training for frail older adults.

Smale, R. (2023) Platform-independent runtime quality metrics for integrations.

Smeets, Tom (2023) µScope: A Reusable Interface For Debugging STM32 Microcontrollers.

Smelik, R.M. (2006) Specification and Construction of Control Flow Semantics : a generic approach using graph transformations.

Smid, Wietse (2014) Ad-hoc context-driven changes in a business process management system.

Smienk, Jeroen (2023) Natural language search for personal information retrieval : Benefits and limitations to the user’s experience in bookkeeping software.

Smink, Ruben (2021) Using functional dependency thresholding to discover functional dependencies for data cleaning.

Smit, Floris (2017) Applying data science to improve municipal youth care.

Smit, G.W. (2021) Calculating electrical footprint of personal internet use.

Smit, Gijs de (2023) Cycling Maneuver Prediction Using Bicycle-mounted Motion Sensors.

Smit, Kevin (2021) A high resolution grip strength measuring system for rehabilitation of hand conditions.

Smit, P.J.M. (2022) Visual place recognition under image corruptions.

Smit, T.T. (2024) Investigating RISC-V hardware for autonomy in space, exact emulation-based fault injection on a hardware accelerator.

Smit, Vincent J. (2020) Self-healing approximate multipliers in MAC.

Smith, J.P. (2021) Virtual Reality for Modular Construction in Industrial Heritage.

Smits, J.J. (2019) What does a Domain Name Say.

Smits, J.J. (2022) Improving integration Platforms as a Service through the addition of enterprise data catalog features.

Smits, J.P.G. (2022) Callisto - Selecting Effective Mutation Operators for Mutation Testing.

Smits, Paul L. (2019) Seizure onset detection for responsive stimulation in the sensorimotor cortex.

Smits, Pieter (2013) Rationales for Modern ICT Implementation into Schools: a case of tablet PCs.

Smoorenburg, Joost van (2021) Using mixed-reality in biopsy of lesions inside deformable organs.

Smulders, Bram (2007) SQLbusRT : real time data distribution and storage.

Smulders, Edwin (2013) User Space Memory Analysis.

Snaauw, G. (2017) Camera calibration for oblique viewing laparoscopes.

Snijders, T.G.A. (2019) Design and implementation of a supplier portal using an empirical snapshot, with a case example.

Snoijer, Jesse (2022) Are classical features still relevant in the era of deep learning?

Snoyl, K.E.R. (2014) De effecten van het gebruik van het F-LinQ fotolijstje op de verbondenheid tussen ouderen en hun (klein)kinderen.

Socha, Konrad (2023) Fuzzy Markov chains.

Soelen, R.P van (2018) Designing music lessons for the 21st century : make learning a musical instrument more fun, playful and modern.

Soelen, Robin van (2021) Creating an embodied music controller that can be used to control the arrangement of electronic dance music.

Sokolovas, E. (2021) Cell Detection in Whole Slide Images With Out-of-Focus Corruption.

Sokolovas, Erikas (2023) Multimodal Neural Networks and Data Preprocessing for Ship Trajectory Prediction Using AIS, Radar, ENC and Weather Data.

Solovyeva, Olga (2022) Investigation of Quality Measures in Cyclists’ Dataset Using Dimensionality Reduction Techniques.

Sombekke, N.B.H. (2007) Graph-Based Semantics of the .NET Intermediate Language.

Sombroek, E.S. (2023) Establishing a TCP connection between a Graphical User Interface and the controller of a robot.

Sonderen, T. (2019) A Manual for Attack Trees.

Sondermann, Matthias (2017) Demand Response Interoperability for the residential European Energy Market - Identifying Standardization Gaps between a Demand Response pilot project and a proposed best practice.

Song, X. (2020) Generative Adversarial Networks of Missing Sensor Data Imputation for 3D Body Tracking.

Sonneveld, J.J. (2020) A gravitational approach for ranking Autonomous Systems in Large Autonomous System Networks.

Sonneveld, J.J. (2023) Profiling Users by Access Behaviour Using Data Available to a Security Operations Center.

Sosale Pavamana, Prasanna (2021) Improving Process Traceability Using Deep-Learning Based Unsupervised Feature Extraction.

Souilljee, M.L. (2021) Locating Selective Sweeps with Accelerated Convolutional Neural Networks.

Souvannasouck, M.K. (2023) Modeling and Analyzing Treatment Protocols for Pediatric Asthma Management Using the UPPAAL Timed Automata Framework.

Sowa, A.M. (2022) Development of a computer vision-based system for recognising fatigue of truck drivers.

Spaargaren, Rochelle (2021) Designing a user-centred feedback system that fosters creativity.

Span, Ruben (2009) Towards an enterprise performance management solution : a method to design and implement enterprise performance management.

Sparrius, T. (2021) Contest theory models of long-term advertising and short-term competitive behaviour.

Speelziek, M.D. (2006) Evaluating rapide using the FRODO service discovery protocol.

Spel, Jip (2018) Monotonicity in Markov chains.

Speldekamp, T.J. (2018) Disability insurance : predicting accurate inflow probabilities in an imbalanced data setting.

Spenkelink, Dennis (2006) Incremental Compilation in Compose*.

Spenkelink, H.F. (2014) The Adoption Process of Cryptocurrencies - Identifying factors that influence the adoption of cryptocurrencies from a multiple stakeholder perspective.

Spenkelink, J.S. (2018) Consumer-deployable network intrusion detection in public clouds.

Spenkelink, Roy David (2007) Porting Compose* to the Java Platform.

Spijker, B.C. van 't (2020) Classifying Classical Piano Music Into Time Period Using Machine Learning.

Spijker, Hanno (2012) Improving information dissemination in sparse vehicular networks by adding satellite communication.

Spijker, J. J. (2021) Plate localization on the Sensory Interactive Table.

Spijker, K. (2019) Identifying Users’ Skill Level through the Process Mining of Software Logs.

Spijkerboer, E. C. (2019) Blockchain based transaction processing system : a reference architecture for an integrated blockchain based transaction processing system.

Spijkerman, Wietze (2010) Tool support for change impact analysis in requirement models : exploiting semantics of requirement relations as traceabilitt relations.

Spil, Gino van (2017) Delay compensation in mobile face tracking.

Spil, Gino van (2021) Device optimization using machine learning with hybrid heat pumps.

Spink, Suzanne J. (2021) Smart Labelling.

Spoor, R.J.F. (2014) Design of a wall latching device.

Spoor, R.J.F. (2016) Design of an Ultrasound Guided Breast Biopsy End-effector.

Sprang, Angela V. van (2021) Path and Trajectory Planning by Model Predictive Control in Autonomous Racing.

Spruijt, Robert (2014) Selecting a BI Architecture that fits Organisation's Requirements.

Sreenivas, Gokul (2022) Mapping the hotel booking experience of an online travel agency (OTA) to optimize the payment flow and improve localization.

Sridhar Bangalore Venugopal, Sridhar Bangalore Venugopal (2019) Automatic Generation of Access Control List on Mellanox Switch For DDoS Attack Mitigation Using DDoS Fingerprints.

Srivastava, Siddhartha (2019) Benchmarking Facebook's Prophet, PELT and Twitter's Anomaly detection and automated deployment to cloud.

Staal, Eric (2007) Simulation with Hamiltonian mechanics : creating a module for 20-sim.

Staal, P.J. (2020) An Analysis of Programming Paradigms in High-Level Synthesis Tools.

Staal, P.J. (2022) On Productive, Low-Level Languages for Real-World FPGAs.

Staicu, Cristian-Alexandru (2014) Evaluation of HIMMO with Long Identifiers, an Extension of the HIMMO Key Establishment Scheme.

Stal, D. ter and Bongers, M.T.M. and Postma, S.F. and Vrenegoor, S.I. (2024) Artificiele Intelligentie bij het bepalen van technische uitdagingen bij rectumchirurgie.

Stam, R.G.R. (2022) Assessing organizations’ readiness for Agile at Scale adoption.

Stanculeanu, G.O. (2022) Assessing Russia’s isolation from the web following their invasion of Ukraine using the DNS root system.

Stankovic, Nikola (2020) Enhancing enterprise agility with Bizdevops method for Business-It Alignment.

Stapel, F.T.A. (2020) A Heuristic Approach to Indoor Rock Climbing Route Generation.

Stapel, F.T.A. (2023) Automated Grade Classification and Route Generation with Affordances on Climbing Training Boards.

Stapersma, Paul (2012) Efficient query evaluation on probabilistic XML data : derived from a glue process with skeleton & flesh.

Starink, J.A.L (2021) Analysis and automated detection of host-based code injection techniques in malware.

Starink, O.A.W. (2015) State-Save Overhead Reduction Techniques for Shared Accelerators in an MPSoC with a Ring NoC.

Stavropoulos, T. (2023) A comparative analysis of network data distribution in active DNS measurements. ZDNS vs OpenINTEL.

Steeden, Remco van (2006) Communication-centric debug of systems-on-chip using networks-on-chip.

Steeg, D.P.M.H. van der (2014) Flow-based DDoS Attack Detection on Cisco IOS.

Steegh, E.G.A.J. (2021) Sentiment as a ground truth stance indicator against fake news.

Steeghs, G.G.T. (2017) Developing a smart rainwater buffering system for the municipality of Enschede.

Steen, H. van der (2008) Design of animation and debug facilities for gCSP.

Steen, J.L.P.J. van der (2006) Investigation of the band gap widening effect in thin silicon double gate MOSFETs.

Steenbeek, Anne (2020) CNN based dense monocular visual SLAM for indoor mapping and autonomous exploration.

Steenbergen, R.M. van (2019) New Product Forecasting with Analogous Products : Applying Random Forest and Quantile Regression Forest to forecasting and inventory management.

Steenbergen, Rik van (2021) Exploring pedagogical discourse data through LDA topic modelling, SSNA and thematic analysis.

Steeneken, Anna (2013) Tablet Gebruik voor Activerende Leeractiviteiten: Een exploratieve case study binnen het Vlaams beroeps en technisch secundair onderwijs.

Steenmeijer, L.D. (2020) Increasing the consistency of feedback on programming code by using a tagging system.

Steerneman, E.H. (2022) Exploring the effect of merging techniques on the performance of merged sparse neural networks in a highly distributed setting.

Stege, S. ter (2018) Blockchain in logistics : Is blockchain in logistics hyped, or has it true potential to be a game changer?

Stegeman, Lars (2018) Solitor : runtime verification of smart contracts on the Ethereum network.

Steghuis, Claudia (2006) Service granularity in SOA-projects : a trade-off analysis.

Stehouwer, J.H. (2006) Cue phrase selection methods for textual classification problems.

Steinebach, Teresa (2020) Web Accessibility : incorporating user requirements into a guide for usable web accessibility.

Stekelenburg, A. V. (2021) Providing Concurrency Guarantees Using An Event-Driven Language.

Stekelenburg, A.V. (2024) Solving Parity Games: Combining Progress Measures and Tangle Learning.

Stel, E.W. (2021) Process comparison for subpopulations of patients with heart failure.

Stellaard, Julian (2020) Tracking the process of an outbreak to a pandemic via logistical infrastructures : case study.

Stellinga, Anne (2007) A low-power second-order sampling receiver for Bluetooth.

Stelzer, Lilly (2023) Influencing modern art experience through atmosphere in a virtual reality museum.

Stemmer, Joel (2012) detecting outliers in web-based network traffic.

Sterenborg, Niek (2021) Designing a hardware accelerator for a selective sweep detection algorithm using high-level synthesis.

Sterk, Sjoerd (2015) Realisatie van rijgedrag verbetering d.m.v. een dashboard op basis van gamification.

Sterken, G.T. (2020) Developing an Agile performance management information system.

Sterrenburg, L.G. (2019) Design of an implementation method for customizable SaaS solutions.

Stevens, Stefanie Antonia (2017) Job satisfaction and work-life balance: an explorative study on remote workers.

Stijntjes, Ingo (2014) Assessment of automated crowd behaviour analysis based on optical flow.

Stikkelorum, M.J. (2020) Automated discovery of BACnet relations from bus traffic.

Stiphout, A.J. van (2020) Comparison of Scheduling Methods for Different Cases of a Complex Flexible Job Shop Problem.

Stoev, Martin (2022) Online Parent Monitoring Tool.

Stoian, N.A. (2020) Machine Learning for anomaly detection in IoT networks : Malware analysis on the IoT-23 data set.

Stoian, N.A. (2022) Towards deep learning frameworks for the analysis of magnetic flux leakage captures.

Stoica, E. (2022) A student’s take on challenges of AI-driven grading in higher education.

Stoica, Mircea (2012) Detecting the no-control state in self-paced Brain-Computer Interfaces.

Stojkovski, Borce (2015) Employing User-Centered Design methods for the development of a Virtual Reality training system for firefighters.

Stokkink, Gerjan (2012) Quiescent transition systems.

Stolp, D.G.A. (2009) Using ontology mapping to automate derivation of transformations for data integration.

Stortelder, R. (2019) Enabling centralized access to a reactive architecture for hardware control systems.

Stouten, Thomas (2020) Hide and seek : different scan methods to analyse peer-to-peer based blockchain networks.

Stouten, Thomas (2024) Modeling the effectiveness of treatment for Rheumatoid Arthritis with UPPAAL.

Straathof, T. (2022) Prediction of energy consumption of rail freight transports using machine learning.

Straková, S. (2023) User-based Tailoring with Reinforcement Learning for an mHealth, COPD-focused Intervention for Increasing Physical Activity.

Streapco, Lia (2023) Morphing Attack Detection (MAD) based on the location of the corneal specular highlights.

Strecke, Jonas (2014) A high torque variable stiffness mechanism for the 'VSDD': conceptual design, realization and experimental validation.

Stribos, R. (2023) A comparison of anomaly detection algorithms with applications on recoater streaking in an additive manufacturing process.

Stribos, R.H. (2021) The Impact of Data Noise on a Naive Bayes Classifier.

Strijbosch, D. (2022) Proposing an ontology for human-related crime recognition in videos.

Strijker, H.W. (2021) Ethernet implementation in Clash.

Stritzl, David (2019) Privacy-Preserving Matching Using Bloom Filters: an Analysis and an Encrypted Variant.

Strooisma, Ale (2016) A monitoring solution for multi-language software.

Stuurman, A. and Jongh, Dr. A. de (2020) Improving frequency estimation of fingerprint minutia configurations using automated pre-selection.

Stuurman, Gijs (2010) Action semantics applied to model driven engineering.

Stuyver, R. W. (2017) Assessing and redesigning processes in the pharmacy to improve pharmaceutical care.

Sueters, M.L. (2023) Reducing the total travelling distance of order picking in a warehouse by introducing class-based storage.

Sugumaran, Shyamprasad (2021) Monitoring the daily change in cow's body weight in relation to cow health and behavior.

Suidgeest, Wouter (2021) Forensic Facial Recognition Utilizing Cartoonization Segmentation.

Suijdendorp, B. (2022) Item availability restricted.

Sulistyo, Pythia (2009) Inter-Organizational Strategic Information Systems Planning (IOSISP) in Network Perspective: How Network Governance Influences IOSISP Effectiveness Evaluation of Healthcare, Government and logistic/Transport Industry Sectors in the Netherlands.

Sulzer, Niels (2019) Hardware-Efficient Real-Time Statistical Analysis on Streaming Data.

Sun, Aiwu (2019) Building a virtual world in ROS based on the robot's perception.

Sun, Mengjie (2023) Ad Quality Analysis : Data Scientist Internship Report.

Sun, Yifan (2023) Effectiveness of Fourier-basis noise on improving adversarial robustness.

Sun, Yiyou (2023) Confidential.

Sun, Zhirou (2023) Impact of auditory modality on user experience during augmented outdoor tourism navigation and exploration tasks.

Sundarapandian Raani, V. (2021) Modeling and analysis of board games.

Sung, Lilian (2021) Emoji Recommendation for Text Messaging.

Surojaya, Ali (2023) Development of Deep Learning Model for Building Opening Detection as the Application of Unmanned Aerial Vehicle (UAV) in Urban Search and Rescue Mission.

Surya, Siddharth (2023) Detection of Japanese Knotweed Beside the Road using Deep Learning.

Sustronk, J.J. (2019) Predicting New Web Pages on the World Wide Web Using Topological Features.

Sustronk, J.J. (2022) Analysing Cyber Threat Intelligence Data Using Fully Homomorphic Encryption.

Svarnovics, Vladislavs (2021) DataMatrix Barcode Read Rate Improvement Using Image Enhancement.

Swartjes, Ivo (2006) The Plot Thickens : bringing structure and meaning into automated story generation.

Sybenga, S.D.A (2016) Anomaly detection in defence and surveillance.

Szabó, Krisztián (2022) Morphing robust face recognition.

Szabó, Réka (2018) Penetration testing of AWS-based environments.

Szewczyk, J. (2022) Item availability restricted.

Sánchez Ortiz, Elvira (2020) Zero-Knowledge Proofs applied to finance.

Sözer, Hasan (2004) A peer-to-peer file sharing system for wireless ad-hoc networks.

Tafuro, M. (2021) Assessment of the contractile properties of engineered heart tissues by optical flow.

Tagliaro, Carlotta (2021) Item availability restricted.

Tahir, A. (2018) Predicting Young Soccer Players Peak Potential with Optimal Age.

Tan, J. (2023) Hollow-pass : hide your pattern password from shoulder surfers.

Tareke, Bedru Wudye (2022) Visible cadastral boundary extraction using VHR remote sensing images: A deep learning approach.

Tariq, T. (2009) Extending CACI : implementing support functions for the context producer and designing a security Framework.

Tariverdiyeva, Gunay (2019) Chatbots’ Perceived Usability in Information Retrieval Tasks: An Exploratory Analysis.

Tas, J.G.A. van der (2018) Improving the container planning (process), by means of a planning tool.

Tax, Niek (2014) Scaling Learning to Rank to Big Data: Using MapReduce to parallelise Learning to Rank.

Tazelaar, Steven (2022) Automatic labeling of road quality using machine learning.

Teeffelen, K.J. van (2018) Intuitive Impedance Modulation in Haptic Control using Electromyography.

Teerenstra, G.H.G. (2016) The start of IT Governance in a Dutch Academic Medical Centre.

Teesselink, T. (2019) Identifying Application Phases in Mobile Encrypted Network Traffic.

Teijgeler, Stefan (2010) Connecting GROOVE to the world using XMI.

Teka, Abelneh Y. (2012) Analysis of indirect influence relations in goal-oriented requirements engineering.

Telgen, M.G. (2010) Realistic route choice modeling.

Tent Beking, Michiel van (2016) Sparse Array Antenna Signal Reconstruction using Compressive Sensing for Direction of Arrival Estimation.

Terpstra, E. (2017) Designing a requirements engineering process for performance monitoring.

Terrivel, M (2017) Computationally Efficient Vision-based Robot Control.

Terwellen, Christian (2012) Evaluating the behavior of embedded control software : using a modular software-in-the-loop simulation environment and a domain specific modeling language for plant modeling.

Teschner, J. (2016) Serious Games in Medical Education : as Learning Tools.

Tesfay, Tesfahun Aregawy (2013) Automatic distribution analysis of business processes for cloud-based BPM.

Tetteroo, Arend-Jan (2006) Bomb-Proof Server : benodigde technieken en producten voor een high availability systeem en hun consequenties voor beschikbaarheid.

Teunen, Freek (2017) How to create a joint VR experience for Droomvlucht.

Teunissen, G. (2020) Machine learning for all : a methodology for choosing a federated learning approach.

Teunissen, T. (2019) Success factors for RPA application in small and medium sized enterprises.

Teymurlu, Ibrahim (2023) Understanding the Dynamic Sparse Training Models.

Theodorakopoulos, Daphne (2022) Identifying Covid-19 Shortages with the Help of an Automatically Constructed Knowledge Graph.

Theodorus, Abraham (2020) Restoration of damaged face statues using deep generative inpainting model.

Theuns, J.K.H (2017) Visualising Origin-Destination Data with Virtual Reality: Functional prototypes and a framework for continued VR research at the ITC faculty.

Thijssen, P.G.H. (2020) OCL constraints in GROOVE.

Thirukokaranam Chandrasekar, Krishna Kumar (2016) Tracking and Control of Soft, Self-Folding Miniaturized Agent using Ultrasound Images.

Thomson, B.R. (2019) Automated vascular region segmentation in ultrasound to utilize surgical navigation in liver surgery.

Thoonen, M.A.W. (2019) Hardening FPGA-based AES implementations against side channel attacks based on power analysis.

Thunnissen, J. (2015) Communication solution for ICU patients : a case study.

Tian, Pin (2021) Extracting Measured Properties for Numerical Data with SciBert model and Question Answering.

Tian, X. (2022) Reconstruction-based Anomaly Detection with Machine Learning for High Throughput Scanning Electron Microscope Defect Inspection.

Tigelaar, Almer S. (2008) Automatic discussion summarization : a study of Internet fora.

Tijdeman, M.C. (2021) Adapting occlusion-based latent representation to work with geospatial data.

Tijhuis, K. (2013) Methods for modelling unit operations in chemical process simulators.

Tijink, M.L. (2022) Fusing Forensic Features and a Face RecognitionSystem on Lookalike Faces.

Tijmes, M. (2009) Simulation of a ring resonator-based optical beamformer system for phased-array receive antennas.

Tijssen, S.B. (2021) Designing an interface for a Digital Twin to optimize data transfer and visual cues.

Tilburg, A. van (2022) Submodular functions and M-convex sets.

Tilburg, A. van (2022) Submodular functions and M-convex sets.

Timmer, I.R. (2018) Anomaly Detection of malicious TLS traffic.

Timmer, M. (2005) How to identify the speed limiting factor of a TCP flow.

Timmer, M. (2008) Evaluating and predicting actual test coverage.

Timmerman, L.D. (2022) WM/Reuters fixing rate prediction for algorithmic FX trading using machine learning.

Timmerman, Luc (2022) Performance Testing Owl, Parser Generator for Visibly Pushdown Grammars.

Tinselboer, Koen (2007) The use of rare key indexing for distributed web search.

Tintelen, B. F. M van (2019) Designing a Machine Learning Decision Tree for Information Systems: A study into the implementation of supervised and unsupervised machine learning methods.

Tintelen, B.F.M. van (2022) Feature extraction and selection on sparse, complex, sensor-based exhaled-breath data sets.

Tjeerdsma, R. (2017) Developing a backend solution for ISO15118-driven EV charging with Plug-and-Charge.

Tjink-Kam-Jet, Kien-Tsoi T.E. (2009) Result merging for efficient distributed information retrieval.

Tobé, Mathijs (2023) Measuring pleasantness of bicyclists through heart rate variability over self-reports.

Todorovic, D.Q. (2022) Bringing Intelligence to Wireless Sensor Nodes: Improving Energy Efficiency and Communication Reliability in Sensor Nodes.

Tokarczyk, F. (2020) Predicting overcrowding in the acute care domain using random forest regression.

Tol, K. M. van (2020) Ons Berichten 2.0. : Researching communication in elderly care, disabled care and mental health care for the proposal of a new messaging function within Ons.

Tol, K.M. van (2017) Developing a stimulating environment in a residence facility for dementia patients.

Tolboom, L.C. (2022) Exploring type 2 asthma phenotypes and taking steps towards measurements of respiratory mechanics during exercise.

Tolle, T. (2017) Filtering social media data streams.

Tolman, Jim (2018) Evaluation of a multi-user virtual reality system for collaborative layout planning processes.

Tommassen, P. (2009) Wacky Pirate Hijinks : causing and resolving conflict between autonomous agents in a virtual storyworld.

Tomov, N. (2022) Converting binary decision diagrams to and-inverter graphs using prime-irredundant covers.

Tonchev, Viktor (2022) Using accelerometer and gyroscope sensors to differentiate between eating movements associated with different foods.

Torbecke, Janina (2017) Symbolic Model Checking with Partitioned BDDs in Distributed Systems.

Torn, I.A.R. (2017) The future of purchasing and industry 4.0 : how purchasing can progress and benefit the fourth industrial revolution.

Torres Cano, Andrés Felipe (2019) Automatic aviation safety reports classification.

Tran, Duc Duc (2023) Applying compress techniques to lower latency on real time object detection application in Android device.

Tran, Nguyen Dat (2017) Design of a Conversion Rate Optimization Tool for E-Commerce.

Tran, T.H.A (2023) Explainable Artificial Intelligence in Job Recommendation Systems.

Treub, T.P. (2021) Creating a Virtual Reality Application for Transporting Items.

Treub, Tjebbe (2023) Enhancing the Shopping Experience in Flooring Specialty Stores with Phygital Design.

Trienes, Jan (2019) Comparing rule-based, feature-based and deep neural methods for de-identification of Dutch medical records.

Trillhose, Frank T. (2016) Controlling the production cell using TERRA-LUNA.

Trouwborst, C. (2017) Towards increased autonomy of a rail-guided robot for the inspection of ballast water tanks.

Trusin, Cristian (2022) The effect of the Russian-Ukrainian conflict on the Internet from the perspective of Internet eXchanges.

Tsankov, Anton S. (2024) Leveraging Information Visualization, Pattern Identification, and Anomaly Detection in Support of Tactical Analysis of Healthcare Contracts.

Tsige, Girma Zewdie (2022) Scan-vs-BIM automated registration using columns segmented by deep learning for construction progress monitoring.

Tsigkou, Maria-Elena (2020) Criteria of information value in information retrieval : the context of Housing Corporation Risk Management.

Tsintsov, Y.K. (2022) A Comparison Between the Effectiveness of a Virtually and a Physically Present Robot when Evoking Prosocial Behavior in Humans.

Tufto, Darrell (2024) Predicting Quality Issues in Manufactured Goods by means of Process Mining in Enterprise Resource Planning Systems.

Tuijn, Jasper Aartse (2007) Partial session mobility in context aware IP-based multimedia subsystem.

Tuin, Vincent van der (2007) Computer-Aided Security Surveillance : design of the Quo Vadis Object Tracker.

Tuininga, Frits Sieds (2019) Accelerating Model Driven Platforms : A study into the predictability of business process models.

Tuinman, BSc Philippe (2020) Enthusing Young Secondary Schoolers for Informatics Education.

Tuinstra, Annefie (2021) Virtual Reality Rowing.

Tujner, Zsolt (2019) Quantum-safe TOR, post-quantum cryptography.

Turenhout, Lieke (2024) Cognitive Enhancement through Play: Crafting an Engaging Game-Based Intervention for Alzheimer's Disease.

Turkoglu, Mehmet Ozgur (2018) Compositional Scene Generation using Generative Adversarial Networks.

Twelkemeijer, R. (2008) Design of an audio power amplifier with a notch in the output impedance.

Tzani, Donika D. (2021) Using Enterprise Architecture for controlling complexity and improving business performance.

Tziampazis, Christodoulos (2019) Exposure Assessment on Medical Devices in the Netherlands.

Uchoa Bezerra, H. (2023) Applying nucleotide sequence alignment techniques to side channel analysis.

Udrea, Mihnea-Adrian (2021) A Comparative Study on Pre-trained Classifiers in the Context of Image Classification.

Uebbing, Tobias J. (2016) User experience in smart environments : design and prototyping.

Ugen, Mattijs (2013) Scalable performance for a forensic database application.

Ugryumova, D. (2010) Control design for a chemical disinfection process using the residence time distribution.

Uilkema, Tim H. (2023) Selecting the Optimal Machine Learning Framework for LiDAR-Based Railroad Inspection and Maintenance at Strukton Rail: A Comprehensive Evaluatio.

Uithol, Michiel (2008) Security in domain-driven design.

Ulici, Diana Laura (2021) Choosing a Suitable Query Engine for Providing Observability and Accessibility for Dynamic Reporting of Business Data.

Umamahesh Ritty, Nikitha (2023) Predicting product characteristics using neural networks.

Ungrund, Philipp (2021) Developing a Web-based Tool for Teaching the Effects of Pooling on Queueing Systems.

Urban, Wojciech (2022) Studying human behaviour to prevent successful spear-phishing attempts.

Utomo, Diana (2014) A framework for cloud adoption from Enterprise Architecture and Business Perspective: Validation case study: The implementation of cloud-based contact distribution in Philips Consumer Lifestyle.

Vacariu, P. (2021) PIRATE Robot Autonomous Navigation through Complex Pipe Networks using Reinforcement Learning.

Vada, H. (2022) Comparative analysis of multi-factor authentication schemes for Internet of Things.

Vaish, P. (2022) On multi-stage job processing with asymmetric transition costs between operations.

Vaish, Puru (2024) Fourier Insights in Machine Learning : Bridging the Augmentation Gap through Frequency-basis Functions.

Valk, D.J. van der (2019) RPi-based passive 5-camera system for 3D face acquisition.

Valk, J.J. van der (2010) The in uence of a target motion model on the exact Bayesian filter recursion; research by particle filtering.

Vallinas Prieto, Ander (2019) Time-domain passivity enforcement for mass reduction in admittance control.

Valtas, Georgios (2023) Does Prior Knowledge Affect CNN and LSTM Models on Classifying Improper Sitting Postures?

Valtulina, Luca (2013) Seamless distributed mobility management(dmm) solution in cloud based lte systems.

Vanoušek, Mikuláš (2024) Controllability of Laplacian Leader Follower Dynamics : Algorithmic Approach.

Vanoušek, Mikuláš (2024) Controllability of Laplacian Leader Follower Dynamics : Algorithmic Approach.

Vanwinsen, W. (2021) Evaluating the performance of simulated IMU data for animal activity recognition.

Varenhorst, I.A.M. (2022) GridShield : Robust Control Algorithms to Prevent Power Outages.

Varkevisser, R.A. (2016) Large Scale Online Readability Assessment.

Varris, V. (2020) Using adversarial reinforcement learning to evaluate he IMMUNE risk-assesment.

Vashistha, G. (2021) Robot assisted needle positioning system for liver biopsy.

Vasileiadis, Leonidas (2019) Remote runtime detection of tampering and of dynamic analysis attempts for Android apps.

Vasterd, M.F.J. (2021) Generative adversarial models for privacy-preserving release mechanisms.

Veelen, P. van (2007) Clustered acoustic modelling in speech recognition.

Veen, Dirk van (2011) Secure searching through encrypted data - Creating an efficient Hidden Vector Encryption construction using Inner Product Encryption.

Veen, G.F.P. van (2013) Brain Invaders - Finding the paradox of control in a p300-game through the use of distractions.

Veen, H. van der (2015) Composing a more complete and relevant Twitter dataset.

Veen, Marcel van der (2007) Sparse matrix vector multiplication on a field programmable gate array.

Veen, R. van der (2021) Agile development of applications as a medical device in a small enterprise.

Veen, S.E. van der (2024) A Formal Proof for the Correctness of Tangle Learning.

Veenstra, A. (2021) Accelerating mixed-level coverage array generation.

Veenstra, G.W. (2019) Generating high frame rate MR images using surrogate signals.

Veer, D. van der (2016) Design of a GMSK Receiver Prototype on a Heterogeneous Real-time Multiprocessor Platform.

Veerman, M.L. (2023) Asset Localization using the Bluetooth Fingerprinting technique.

Vegt, M. E. M. van der (2019) Compressed Set Representations and their Effectiveness in Probabilistic Model Checking.

Vegt, Mick van der (2019) Using data to improve financial behavior : designing the personal finance platform.

Veitmaa, Eva Maria (2020) Gallery of Heartbeats : soma design for increasing bodily awareness and social sharing of the heart rate through sensory stimuli.

Veld, N.E.D. in het (2023) Control of the Production Cell on Raspberry Pi using a real-time robot-software framework.

Velden, J. van der (2020) Blacklist, do you copy? Characterizing information flow in public domain blacklists.

Veldhuijsen, Gerald van (2006) DICOM Image Retrieval.

Veldhuis, Anouk (2020) Implementation and design of a postoperative follow-up application.

Veldhuis, H.D. (2015) Developing an automated solution for ETA definition concerning long distance shipping.

Veldhuis, J.W. (2009) Tool support for a metamodeling approach for reasoning about requirements.

Veldmaat, J.P. (2023) Designing a Testbed for Human Activity Recognition Using Multiple ESP32 Microcontrollers with Wi-Fi and Serial Data Transfer.

Veldman, I. (2009) Matching profiles from social network sites : similarity calculations with social network support.

Veldman, T.C. (2022) A Machine Learning Approach to the Detection of Malfunctions in HVAC Units.

Velikov, Kristiyan (2023) Enhancing Semantic Segmentation for Indoor Environments: Integrating Depth Information into Neural Networks.

Velinov, Bozhidar (2021) Insourcing and outsourcing of IT in Small- and Medium-sized Enterprises.

Velmurugan, Pranesh (2023) Species Distribution Modelling : A Multimodal Learning Approach.

Velner, J. (2008) Integrated state-of-charge circuit for rechargeable batteries.

Velthuis, Wout (2024) Analysing bottlenecks in production processes with the help of process mining.

Veltman, Mike (2023) Comparative Study of Fault Detection and Diagnosis for Low-Speed Ball Bearings.

Velzel, M.M. (2020) Design2Struct : Generating website structures from design images using neural networks.

Ven, F.R. (2020) Forecasting yearly unplanned maintenance on underground waste containers based on maintenance history and demographics.

Venema, M. (2016) DM3730 Camera interfaces on Gumstix.

Veneman, R. (2021) Real-time skin cancer detection using neural networks on an embedded device.

Venis, A.J. van de (2015) Recommendations using DBpedia : how your Facebook profile can be used to find your next greeting card.

Ventur, F. (2020) Deficient testing databases : a reliability-driven evaluation of privacy models providing a trade-off between data integrity and re-identification risk.

Venugopal, Arun (2023) A regression-based Convolutional Neural Network for yield estimation of soybean.

Verberkt, S.L.C. (2012) Claiming security properties in a service oriented architecture.

Verbij, Ruud Paul (2014) Dutch e-voting opportunities. Risk assessment framework based on attacker resources.

Verbraak, F.M. (2019) Universal Basic Income Reforms and Household Composition : A Behavioural Microsimulation Analysis.

Verbree, A.T. (2006) On the structuring of discussion transcripts based on utterances automatically classified.

Verburg, F.M. (2022) Exploring explainability and robustness of point cloud segmentation deep learning model by visualization.

Verburg, J.G.J. (2018) Supporting the Innovation Process of Industrial SMEs Using Mobina: The first design cycle using mockups and a validation focus group.

Vercammen, S.A.A. (2014) Displaying intermediate results for on-going searches.

Verdonkschot, S.F.G. (2007) Design and implementation of a trusted RFID reader.

Verhaar, Jort (2015) Micrometer scale 3d membrane printing towards locust ear imitation.

Verheij, J.G.J. (2016) Co-simulation between CλaSH and traditional HDLs.

Verheijen, D. (2022) Teaching Array Verification Using Snap!

Verhoeven, G.A.G. (2021) 'Samen Sterk': The design choices for a tool that represents non-numeric information for patients after an open heart surgery.

Verhoeven, Gijs (2018) The design of a storytelling and learning by teaching activity with a social robot as teachable main character, for primary school language learning.

Verhoeven, P.L. (2019) Adaptability by Design: Incorporating Adaptability Constructs in the Design of Digital Business Ecosystems.

Verio, I. (2022) Low Cost Connectivity for Household Appliances using Low Power Wide Area Network (LPWAN).

Verkerk, Lotte (2022) Improving the planning process by developing a forecasting model : predicting future demand based on historical information.

Verkleij, Jelmer (2017) Behavioural analysis of program intent using data origins, influence and context.

Verkleij, Martijn (2019) Teaching programming using industry tools.

Verkuil, B. (2021) Automatic failure analysis for big data-driven industry.

Verkuil, S. (2016) CiteRep - Journal Citation Statistics for Library Collections using Document Reference Extraction Techniques.

Verlinden, M.G. (2017) StepFarm: An Active Video Game to Support the Self-Management of Chronic Diseases in Children.

Verloop, Christiaan (2018) Developing a serious game as a tool for collecting data on food waste behavior.

Vermast, Alissa (2019) Using VR to induce smoke cravings in low literate or intellectually disabled individuals who have a smoking addiction.

Vermeij, Jaap (2018) Creating an IT risk maturity model for distributed ledger applications.

Vermolen, R.M. (2012) The red queen’s race: from delivery stories to effort estimation: an empirical study.

Verschuren, S.P. (2023) On the effects of smoothing on machine learning performance in fatigue detection using sensor data.

Versloot, C.W.A. (2019) Amplifying the Analyst: Machine Learning Approaches for Buried Utility Characterization.

Versloot, Corne (2007) Cross-document named entity coreference resolution for Dutch as a pre-process for named entity based text mining.

Versluijs, Wouter (2015) Understanding Information Technology : information technology as extension and its implications for the flourishing of the individual.

Verstoep, Bart (2018) Approximate multipliers for MAC.

Verver, Maks (2013) Practical improvements to parity game solving.

Vervuurt, Mark (2007) Modeling business process variability : a search for innovative solutions to business process variability modeling problems.

Verzijl, Peter (2017) Using serious games to teach cause effect relationships in asphalt quality.

Vetter, Boaz (2017) Designing a smart rainwater buffer.

Vettorel, Diego (2015) Design a platform for providing home-based services concerning: care, safety, comfort and fun.

Veverita, Valeria (2023) LSTM Modelling for Energy Prediction in the Current Global Context.

Vianen, S. van (2023) Design and development of a sports data warehouse for FC Twente.

Vieth, Z.J. (2022) Point cloud classification and segmentation of catenary systems.

Vijgh, M. van der (2020) A comparison of open-source real-time online learning frameworks for neural networks.

Vijver, B. van de (2016) A Human Robot Interaction Toolkit with Heterogeneous Multilevel Multimodal Mixing.

Vine, P.H. (2021) Training Facial Recognition with Synthetic Faces.

Vinke, D. (2016) Enhancing Video Game Design: Involving Users into the Design of Video Games.

Vinne, Sietze van der (2022) Impact of user density increase on 802.11ax based Network Optimization.

Visscher, C. (2021) Towards Cyber Incident Response on Naval Ships: The Cyber Incident Response Decision Model.

Visschers, S.H.J. (2019) Perception-aware visual odometry.

Visschers, Stephan H.J. (2019) Perception-aware Visual Odometry.

Visser, Jesse Wiebe (2022) Automated Detection of Provisioning Events and Prey in Nestbox Video Footage.

Visser, N.S. (2015) Fully automated web harvesting using a combination of new and existing heuristics.

Visser, P. (2023) xBib : the language design and implementation of a transformation language.

Visser, Thomas (2011) Toward a model for incremental grounding in dialogue systems.

Visserman, H.A. (2019) Group Activity Recognition Using Channel State Information.

Vissers, W.K. (2023) Detecting stomata with computer vision for plant breeding.

Viste, N. (2023) Implementation of a visual editor for SHACL-based metadata schemas.

Vitanov, Vesselin (2018) The asteroid field of your mind : examine neurofeedback effects in an interactive art installation.

Vlastuin, A. van (2023) Using Machine Learning to Improve the Cost Estimation Process at a Versatile Manufacturing Company.

Vlasveld, J. (2007) On context in context-aware ICT applications.

Vlieg, Edwin (2010) Usage patterns for user-centric service composition.

Vliek, G. (2009) Detecting spam machines, a netflow-data based approach.

Vliet, T.B. van (2019) Development of a smart wearable : to monitor the physical activity of elderly hip fracture patients during their rehabilitation.

Vlutters, S. (2016) Long short-term memory networks for body movement estimation.

Vo, N.M. (2023) Touch-screen application’s design guidelines for older adults with dementia.

Vocke, Tom (2015) An evaluation of the Adapteva Epiphany Many-Core Architecture.

Vogel, Koen (2020) The feasibility of low-cost Virtual Reality motion tracking for rowing technique analysis.

Vogelzang, K.H. (2017) The tennis trainer : development of a Myo armband application.

Voicu-Spineanu, A.O. (2021) FPGA Acceleration of a hierarchical clustering and data fusion application for disease subtype discovery.

Volz, N. (2020) Human-centred design for sustainable behaviour change : research, design and evaluation of a mobile application.

Vonk, J. (2013) Formal specification and verification of OpenCL Kernel optimization.

Vonk, Jeroen (2016) Bisimulation Reduction with MapReduce.

Voorberg, M. (2021) A performance analysis of membership datastructures in Java.

Voorend, R.W.A. (2021) Deep Unsupervised Representation Learning For Animal Activity Recognition.

Voorend, Rosalie (2024) Deep Learning Applications for Finding Geometric Constraints of Chronic Subdural Hematomas.

Voorst, B. van (2010) Cluster-based collection selection in uncooperative distributed information retrieval.

Voortman, N.E.F. (2022) Modelling OSA Diagnosis and Treatment using UPPAAL.

Voortwis, K.J. W. te (2021) A picture is worth 1000 words : Introducing the visual modality to the query dependent video clip selection process.

Vor dem Berge, Moritz Frederik (2017) Digital privacy : behaviour and anxieties of a young digital generation.

Vorage, J.V.W. (2023) Heuristics of the graph covering problem.

Vording, R.M. (2021) Harvesting unstructured data in heterogenous business environments; exploring modern web scraping technologies.

Vorstenbosch, S. (2015) On-premise to SaaS Integration Risk Mitigation A framework to gain insight in the risks, and recommend mitigation strategies, specific to on-premise to SaaS integration.

Vos, D. (2023) Losslessly compressing radio spectrum related data for archival.

Vos, Geert (2008) Issues of iterative mda-bades software development processes.

Vos, Gerton de (2023) Smart devices bij Defensie, van reactief naar proactief?

Vos, M.C. (2020) Finding lower bounds for the competitive ratio of the cow path problem with a non-optimal seeker.

Vos, Matthijs (2019) Characterizing infrastructure of DDoS attacks based on DDoSDB fingerprints.

Vos, Matthijs (2022) Capability Maturity Measurement of a Security Operations Center through Analysis Detection.

Vos, Peter-Jan (2015) Demonstrator combining ROS/TERRA-LUNA.

Vos, R.H.A. (2023) Creating a defense against face de-identification.

Voskamp, L.G. (2023) Visualising holistic patient profiles for breast cancer patients with cancer-related fatigue.

Voskeuil, A.F. (2023) The influence of an embodied coxswain on the social presence within Virtual Reality rowing.

Vossebeld, F.R. (2022) Towards understanding social interactions through audio signals.

Vossen, J.J. van (2016) Offloading Haskell functions onto an FPGA.

Vouzavalis, Antonios (2020) Capturing car market dynamics in the transition towards electric mobility in an agent-based simulation model.

Vredeveld, G.W.R. (2020) Invaluable measurement networks and their critical infrastructure : Uptime discrepancy localization and network improvements.

Vredeveld, G.W.R. (2020) Invaluable measurement networks and their critical infrastructure : uptime discrepancy localization and network improvements.

Vree, E.A. de (2024) Forging a differential tester for Haskell compilers using Xsmith.

Vreeman, H.S. (2023) A new approach to reducing the negative effects of social media on the well-being : profile badges.

Vrielink, Jasper D. (2009) Phased array processing: direction of arrival estimation on reconfigurable hardware.

Vrielink, S.B. (2006) Situational reinforcement learning : learning and combining local policies by using heuristic state preference values.

Vries, A.J. de (2021) Developing an Educational Tool for Teaching Software Architecture.

Vries, A.J.K. de (2008) Improving reliability of streaming radio.

Vries, E. de (2009) Touchscreen interaction for healthcare applications.

Vries, Ernst de (2022) Improving the creation process of digital platforms : a design pattern reference model.

Vries, J. de (2015) The Generation of Booter (black)lists.

Vries, J.F. de (2018) Redesign & Implementation of a Moment Exchange Unicycle Robot.

Vries, J.J. de (2016) A Tick Based Fixed Priority Scheduler Suitable for Dataflow Analysis of Task Graphs.

Vries, L R de (2017) Informatica: ontwerp van lesmodule 'Gezichtsuitdrukkingen in sociale robotica'.

Vries, L. R. de (2019) Barge Collaborations within Container Logistics : A collaboration to increase the efficiency of barges and barge planning.

Vries, L.J.W. de (2019) IOTA Vulnerability: Large Weight Attack Performed in a Network.

Vries, L.J.W. de (2021) Detection of DoH tunnelling : comparing supervised with unsupervised learning.

Vries, M.P. de (2022) Private Information Retrieval applied to Biometric Verification.

Vries, R.H. de (2019) Walker: Automated Assessment of Haskell Code using Syntax Tree Analysis.

Vries, R.H. de (2021) Clash of Clangs : differential testing of srcML and Clang.

Vries, S.H.S. de (2016) Achieving 128-bit Security against Quantum Attacks in OpenVPN.

Vries, W.B. de (2014) How asymmetric is the Internet? A Study to support DDoS Mitigation approaches.

Vrijkorte, A.B. (2006) Semantics in service-oriented architectures.

Vugt, M.M.P. van (2019) The potential of synthetic training data for training deep learning models.

Vuijk, J.G.J. (2022) Device-free monitoring of vital signs to support emotion-aware music systems for people with dementia.

Vulpoiu, Ruxandra (2018) Machine Learning Applications in Financial Advisory.

Vuolo, M.R. (2024) Towards applications’ fingerprinting through the usage of NetFlow/IPFIX technology.

Waal, Monique de (2023) Designing a graphical user interface for gait analysis in dogs.

Waalewijn, Dennis (2014) Cyber Security in the Supply Chain of Industrial Embedded Devices.

Waanders, M.J.C (2014) Approximation Algorithms for Connected Graph Factor Problems.

Waard, D. de (2022) User preference in conditional and unconditional grounding in turn-based spoken dialogue systems.

Wackerle Garcia, L.M. (2020) Analysis of heuristics with random shortest path metrics on sparse graphs.

Wackerle Garcia, L.M. (2020) Analysis of heuristics with random shortest path metrics on sparse graphs.

Wagenaar, J.C.N. (2014) Collaborative Cyber Security in the Retail Sector.

Wagenaar, P. (2012) Detecting botnets using file system indicators.

Wal, Djurre van der (2018) Translating AWN networks to the mCRL2 model checker: en route to formal routing protocol development.

Wal, Ewout van der (2021) Rosetta ANTLR: Ultimate Grammar Extractor.

Wal, Jelmer ter (2013) Specification and verification of selected parts of the Java Collections Framework using JML* and KeY.

Wal, L.E. van der (2021) Using dtControl to process schedulersproduced by the Modest Toolset.

Wal, P.R.D. van der (2023) Diversifying Multilayer Perceptron Ensembles in a Truly Sparse Context.

Wal, Tjalling van der (2011) Streaming workflow transformation.

Walle, R. C. M. van der (2019) Streaming array modelling and generating VHDL with Python.

Walsh, Ricky (2022) Finding Balance: A Study of Class Imbalance in Deep Learning Classification of Breast Cancer.

Wan, Xin (2021) Generating IMU Data for Horse Activity Recognition from Horse Videos.

Wanders, Brend (2011) Exploring signalling pathways as a serious game.

Wang, Boxuan (2023) Examining Lexical Alignment in Human-Agent Conversations with GPT-3.5 and GPT-4 Models.

Wang, H (2018) Understanding low resolution facial image from image formation model.

Wang, Haitao (2017) Redesign of the E-Cone: A tool for treatment of hand disease.

Wang, JInze (2023) The development of an interactive mountain bike simulator to help injured mountain riders reduce the fear of re-injury while cornering.

Wang, Q. (2016) A reference architecture for integration platforms.

Wang, Wenhui (2021) Finding and Exploiting Vulnerabilities in Embedded TCP/IP Stacks.

Wapperom, Sjoerd (2014) Computational Modelling of Suspect Behaviour in Police Interviews.

Wardhana, Girindra (2018) Automatic Segmentation and 3D Reconstruction of Liver and Tumor.

Warmer, Martin (2011) Detection of web based command & control channels.

Wasbeek, Edwin van (2006) A repository for the management of artifacts in system engineering.

Wassenaar, J.D. (2018) Linking segments of video using text-based methods and a flexible form of segmentation : How to index, query and re-rank data from the TRECVid (Blip.tv) dataset?

Wasserfuhr, Veit (2022) A Literature Review of Methods, Approaches and Tools to Automate the Process of Systematic Literature Reviews.

Waterink, J. (2018) Development of a DIY and consumer ready Smart Rainwater Buffer.

Waterink, Jeroen (2020) Item availability restricted.

Waterval, R. (2022) How information sharing on online social networks may allow for personalized cyberattacks.

Waveren, S. van (2018) Automatic image caption generation for digital cultural emages collections.

Weber, Vincent (2014) UTFM - a Next Generation Language and Tool for Feature Modeling.

Weele, J.H.D. ter (2009) Onderzoek naar de gebruikersvriendelijkheid van boekingsformulieren.

Weener, Jeroen (2021) Libertas: A Backward Private Dynamic Searchable Symmetric Encryption Scheme Supporting Wildcard Search.

Weening, J. (2024) Classifying Companies Based on Textual Webpage Data: A Comparative Analysis.

Weers, F.R.T. (2019) Automatic home video editing on music.

Weers, F.R.T. (2022) MaskCLIP : masking improves transfer for visual models trained with natural language supervision.

Weger, K.J. de (2023) A Fault Tree Dedicated Web Interface Design: Portfolio Website Displaying Fault Tree Explanation and Visualisation Projects.

Weggemans, J.R. (2020) Solving Correlation Clustering with the Quantum Approximate Optimisation Algorithm.

Wehning, T. (2023) Improving Performance of Multiple Sequence Alignment through Maximal Exact Match Identification.

Wei, Kaiyu (2022) Dynamic Parameter Tuning Method With Presets For Metaheuristics.

Weidmann, Sophie (2021) Learning Analytics for Atelier.

Weijden, Erik van der (2005) Structuring argumentation in meetings : Visualizing the argument structure.

Weijers, D.S. (2019) Forecasting Airport Passenger Flow to Improve Cleanliness Perception in Restrooms.

Weiss, Jonathan (2023) Cyber Supply Chain Risk Management in the Netherlands: Investigating Structural Elements and Drivers in the Context of EU-Cybersecurity Regulation.

Welling, Ruud (2014) Conflict detection and analysis for single-pushout high-level replacement.

Wels, S.J. (2019) Guaranteed-TX : The exploration of a guaranteed cross-shard transaction execution protocol for Ethereum 2.0.

Wentink, D.J.M. (2017) Signal Recovery using CλaSH.

Wentink, J.S. (2023) Envisioning future applications of Augmented Reality: An agriculture 4.0 case study.

Wentink, M. (2023) Creating and evaluating a lyrics generator specialized in rap lyrics with a high rhyme density.

Wentzel, S. D. (2019) Evaluating Information Retrieval Systems for Children in an Educational Context.

Wentzel, S.D. (2023) Exploring the relationship between linguistic alignment and sentiment - in online discussions.

Werf, Dagmar van der (2022) Assisting Self-study at the University of Twente Through Student Tutors and Digital Solutions.

Werf, Daniel van der (2021) Information Technology and Data Use in 1PL - 4PL Logistic Companies.

Werf, Jasper van der (2023) Learning Behaviour of Sparse Point-Voxel Convolution: Semantic Segmentation of Railway LiDAR scans.

Werf, R.J. van der (2008) The Embodied Conversational Agent Toolkit : a new modularization approach.

Werf, S.J. van der (2014) Measuring Workload at a ProRail Control Post.

Werff, W.M. van der (2016) Connecting ROS to the LUNA embedded real-time framework.

Werink, Rens (2019) On the control allocation of fully-actuated and over-actuated multirotor UAVs.

Wesselink, B.H.T. (2021) Item availability restricted.

Wesselink, Bram (2023) Reducing resource utilization when simulating hardware in CLaSH.

Wessels, P.D. (2018) Leveraging behavioural domain models in Model-Driven User Interface Development with GLUI.

Westenberg, R.M. (2014) Managing customer innovation in the financial services industry: A technology acceptance perspective.

Wester, Rinse (2010) A dataflow architecture for beamforming operations.

Westerdijk, W.S.K. (2017) Sound Swarm : experience sound from the inside.

Westerik, Lars (2020) Increasing performance personnel department Company X.

Westerveld, J.P. van (2020) FPGA partial reconfiguration and automatic variant generation as a side-channel attack countermeasure with functional HDL Clash.

Westmijze, M. (2009) Memory optimizations on the sequential hardware-in-the-loop simulator.

Westra, Wybe (2018) Virtual Reality Clothing Design.

Wetering, T. van de (2024) Exploring Layer-specific Quantization in CNN-based Selective Sweep Detection.

Wettum, Y.C. van (2017) Facial landmark tracking on a mobile device.

Wettum, Y.C. van (2021) State representation learning using a graph neural network in a 2D grid world.

Weustink, T. (2020) Forecasting promotional demand in the FMCG industry.

Wevers, Gerben (2014) Hardware accelerator sharing within an MPSOC with a connectionless NOC.

Wevers, Gerben G.A. (2014) Hardware Accelerator Sharing within an MPSoC with a connectionless NoC.

Wevers, K.J.M. (2022) Is a hot dog a sandwich? Generating conversation starters that categorize a word in an unusual way.

Wevers, Lesley (2012) A persistent functional language for concurrent transaction processing.

Wicaksana, J. (2021) Comparison of different types of cluster algorithm on Netherland telecommunication provider solutions.

Wicaksana, M.A. (2016) IPv4 vs IPv6 Anycast Catchment: a Root DNS Study.

Wicaksono, Sulistyo Unggul (2012) Enterprise knowledge : reference architecture for visualization and prototype implementation using Wiki.

Wiedijk, R.R.A. (2019) Code Instrumentation with Mod-BEAM.

Wiefferink, C.A. (2022) APEx: Zero-shot Cross-Knowledge Graph Named Entity Extraction leveraging Wikification.

Wiefferink, BSc C.A. (2019) Visualizing the Performance of an Anycast Network.

Wiefferink, T.W. (2018) Combining usage and profile data for retrospectively analyzing usability of applications with funnels.

Wiegers, R.F.P. (2014) Behavior specification for ontologically grounded conceptual models.

Wiekens, Adri (2011) Feedback presentation for physical activity coaching: by an embodied conversational agent or by a simple e-mail?

Wielstra, Biense Adrianus (2014) Assessing the Impact of Business Process Redesign Decisions on Internal Control within Banks: A Methodology.

Wierbosch, Mark (2014) It is raining packets.

Wieren, H.D. van (2019) Signature-Based DDoS Attack Mitigation: Automated Generating Rules for Extended Berkeley Packet Filter and Express Data Path.

Wierik, H.R. te (2022) Developing a gamification program to motivate users in pre-existing e-learning courses.

Wieringa, J.K. (2021) Bot for continuing airworthiness : proof of concept for passenger carrying drones.

Wieringa, Wilko (2012) User Handover in a Cross Media Device Environment, A Coaching Service for Physical Activity.

Wiesniakowski, K. (2023) Predicting time series of water levels using advanced AI models.

Wijburg, K.M. (2020) The state of statechains : exploring statechain improvements.

Wijgerse, Steven (2007) Generating realistic city boundaries using two-dimensional Perlin noise.

Wijhe, Victor van (2024) Signal Processing with AMD Adaptive Compute Acceleration Platform (ACAP) for Applications in Radio Astronomy.

Wijk, M.G.W. van (2022) The Quest for the Best Thread-Safe Java List.

Wijlens, B. (2019) Building a framework in Clash to create deterministic sensor and actuator interfaces for FPGAs.

Wijlens, Bart (2016) Intelligent heating of a room.

Wijnands, M.P.J. (2021) Explaining black box decision-making : adopting explainable artificial intelligence in credit risk prediction for P2P lending.

Wijngaard, Jelle van den (2022) Placement of Electric Vehicle Charging Stations in Congestion Games.

Wijngaarden, Pieter van (2008) Error tolerance analysis of the Telefónica de España optical fibre network.

Wijnholt, R. (2017) Design of a real-time network channel in LUNA.

Wilde, Lisa de (2016) A Bayesian Network Model for predicting data breaches caused by insiders of a health care organization.

Willegers, Jonathan (2023) The Face of the Farm on Social Media: Human, Animal, Plant, or Robot?

Willems, L.J.T. (2020) Detect people on a device that fits in the palm of your hands.

Willems, P. (2017) Mood controlled affective ambiences for the elderly.

Willems, W.J.M. (2019) Validation of a Datafication Canvas.

Willemsen, B. (2021) Recognition of crystals in synovial fluids by a neural network.

Willemsen, Bernard J. (2021) Creating Solvable Instances for Unsolved Puzzles.

Willemsen, L.G. (2023) A Simple Homomorphic Obfuscation Scheme over Automorphisms.

Willemsen, M.J. (2018) Improving diagnosis by Grouping Test Cases to Reduce Complexity.

Wilmes, Daniel (2022) A general optimization framework for soft robotic actuators with analytical gradients.

Wiltenburg, Daan H. (2019) Aggression Based Audio Ranking : Annotation and Automatic Ranking.

Windhouwer, Dennis (2014) The Modularity of the Resource Utilization Model in Python.

Winkel, J.D. te (2006) Applying Composition Filters to C.

Winsen, Stijn van (2017) Threat modelling for future vehicles : on identifying and analysing threats for future autonomous and connected vehicles.

Winters, A. (2020) Examining the effect of hyperparameters on the training of a residual network for emotion recognition.

Winters, A. (2023) Automated control prioritization based on generating sector-based threat profiles.

Wismadi, M.T. (2022) The relation between street pattern and traffic congestion, an investigation through machine learning approach.

Wit, Jeroen de (2013) Continuous forensic readiness.

Wit, Joost de (2008) Evaluating recommender systems : an evaluation framework to predict user satisfaction for recommender systems in an electronic programme guide context.

Wit, R.A. (2023) Interactive feedback in museums.

With, A.J.V. de (2022) SpiroPlay: a study to evaluate gamified spirometry in asthmatic children.

With, L.A. de (2020) Using Functional Near-Infrared Spectroscopy to Detect a Fear of Heights Response to a Virtual Reality Environment.

Withaar, T. (2005) Analyzing joint-measurements using 3D scancs and statistical models.

Witlox, K.H.D. (2019) Face unmorphing.

Witlox, K.H.D. (2022) Secure Blocking for Record Linkage.

Witmans, R.C.H. (2023) Improving nothingness : refactorings on whitespace.

Witt, S.J. (2023) An Internet-wide investigation of publicly accessible databases.

Witte, N. (2014) Technology Acceptance of Business Meetings in a 3D Virtual Environment Supported by a Content Management System.

Witte, S.W. de (2022) Designing a camera-based automated food tracking app.

Witteman, M.T. (2007) Efficient proximity detection among mobile clients using the GSM network.

Wittendorp, T.J.J. (2020) Locomotion control interface for a remote robot (Avatar).

Wittendorp, T.J.J. (2022) Pig localization using computer vision.

Witteveen, C.P.T (2020) Measuring the effectiveness of feedback on code of novice programmers.

Wittingen, E. M. (2021) Creating a solver for Kwirk (Puzzle Boy).

Wittingen, E.M. (2024) Deductive verification for SYCL.

Wohlfahrt-Laymann, Jan (2017) CogniDecline : tracking mobile interaction for cognitive assessment.

Wolbers, J.J.H. (2017) Attracting Passersby into a Building using an Interactive Installation.

Wolbers, J.J.H. (2020) Synchronized co-located interreality collaboration : analysis, design, and usage of a prototype research environment.

Wolbers, P.W. (2022) Posture as stress indicator in eSports.

Wolbers, S. (2015) Participatory design approach to improve the communication between care providers through the electronic health record.

Wolf, E.R.B. de (2016) Designing an interaction method for the holograms of today.

Wolf, E.R.B. de (2021) Pervasive technology as scaffolds for mindful living: reframing calm technology.

Wolf, Geronimo (2021) Detecting wine taste using Recommender Systems.

Wolf, T. (2016) Design of an Air Factor Sensor based on Light Emission.

Wolterink, T.J.L. (2009) Operational Semantics Applied to Model Driven Engineering.

Wolters, Antoon (2023) Anomaly detection in IoT network traffic.

Wolters, N.H. (2016) Analysis of Attack Trees with Timed Automata (transforming formalisms through metamodeling).

Wolters, S.H.G. (2017) Smartwatch and Intellectual Disability : Designing an app that improves the lives of people with an intellectual disability and their caretakers.

Wolters, S.H.G. (2021) Accelerated Implementation of 3D Visual EKF SLAM For Handheld Perfusion Imaging.

Wooning, I.J. van (2018) Optimood : Transforming Health Data into Practical Advice and Insights.

Wotte, Y. P. (2021) Optimal Potential Shaping on SE(3) via Neural Approximators.

Woudstra, M.H. (2020) Exploring Possibilities to Increase Ease of Use of ITPortfolio Management.

Woudstra, Martijn (2022) Designing a container management solution to improve flexibility and portability, and reducing cost for iPaaS solutions.

Wu, Sheng Chih (2021) Generation of Lung CT Images Using Semantic Layouts.

Wu, X. (2023) LoRa-where? Analysing signal pick-up from LoRaWAN sensors in the wild.

Wu, Xian (2012) Modeling and performance evaluation of wirelesshart.

Xhymshiti, Meriton (2020) Domain independence of Machine Learning and lexicon based methods in sentiment analysis.

Xia, Lichen (2020) How vehicles’ speeds influence the optimal configuration and performance of the C-V2X.

Xia, Ziyang (2019) Speech technology to support interventional radiologists by assisting the hands-occupied problem.

Xiang, Y. (2017) How is emotion change reflected in manual and automatic annotations of different modalities?

Xie, Chenghong (2017) Design of an m-health application for low-literacy diabetes patients in India.

Xu, Tingting (2016) The Effect of Cultural Difference on the Perception of Online Ordering Website Design.

Xu, Zihao (2022) Overground vs. treadmill: where is my horse running? Context detection based on IMU data.

Yadav, Shubham (2019) An Asynchronous Approach for Designing Robust Low Power Circuits.

Yakushkina, Daria (2021) Digital Transformation in conditions of pandemic.

Yang, J. (2023) Item availability restricted.

Yang, R. (2021) Didactic visualization for a searchable encryption.

Yasmin, Fitri Almira (2019) Enhancement in process mining : guideline for process owner and process analyst.

Yazdani, R. (2019) Detection of Malicious IDN Homoglyph Domains Using Active DNS Measurements.

Ye, Xiaohao (2015) GlucOnline Coach: a virtual coach app for diabetes patients.

Yeleshetty, Deepak (2020) Item availability restricted.

Yenidogan, Berk (2020) 30-Days post-operative mortality prediction of elderly hip fracture patients.

Yeung, Chin Man (2019) Effects of inserting domain vocabulary and fine-tuning BERT for German legal language.

Yeung, T. (2021) Using virtual reality for a controlled evaluation of a haptic navigation wearable for people with a visual impairment.

Yildiz, Bugra Veysel (2023) The State of HTTPS Configuration of Public Websites Around the World.

Yin, Haihan (2010) Developing a generic debugger for advanced-dispatching languages.

Yin, L. (2022) Characterizing types of convolution in CNN for step detection using IMU data.

Yoe, P.C.A (2018) Analysis for a possible implementation of a machine learning algorithm in the packaging process.

Youn, Myungwon (2023) ALERT: Smart Lecture Room : Monitoring students’ concentration levels and providing feedback and stimulation, to improve learning quality.

Yousefimashhoor, S. (2022) Deep learning on MLS point clouds : feasibility of improving semantic segmentation result using part segmentation.

Yu, J.J. (2017) Is there a case to prefer Ed25519 over ECDSA P-256 for DNSSEC?

Yu, S. (2020) Fingerprint recognition based on spectral minutiae representation and deep learning.

Yuan, Ye (2020) Improving information retrieval by semantic embedding.

Yuceturk, Salih Eren (2023) Enhancing Early Disease Diagnosis: Analysis of a Cassava Plant Dataset.

ZOMPAS, A. (2016) Development of a three dimensional path planner for aerial robotic workers.

Zaag, Heleen van der (2019) Transferring soft-skills through a digital medium: A proof of concept for co-creation facilitators.

Zadelhoff, L.D. van (2020) Assigning inbound flights to baggage retrieval belts: A simulation study on the impact of stochasticity on the performance of different assignment heuristics.

Zaga, Cristina (2014) Engaging child-robot interaction in a collaborative task.

Zagema, S.G.C. (2024) FedNIP : A Statistical Heterogeneity Aware Dynamic Ranking Algorithm for Federated Learning.

Zakiy, Mochammad Fadhli (2016) HW-SW co-Design of an On-Chip IJTAG Dependability Processor.

Zamani, M.R. (2018) Post-Quantum Secure Authentication Methods Suitable For Quantum Key Distribution.

Zandberg, K. (2016) Passive fingerprinting on an IPv6-enabled network.

Zandberg, Koen (2020) Dataflow-Based Model-Driven Engineering of Control Systems.

Zandberg, Martin (2012) Optimization of aspect-instantiation strategies in the JIT-compiler.

Zandbergen, N. (2020) Illuminated feedback in an online classroom : Will it help or hinder?

Zandbergen, Nikki (2023) QuestionMark : designing a benchmark for probabilistic databases.

Zande, M.J. van de (2019) Leveraging zero-knowledge succinct arguments of knowledge for efficient verification of outsourced training of artificial neural networks.

Zanden, Guido van der (2010) Quality assessment of medical health records using information extraction.

Zanderink, Arnold (2012) Drum assistant.

Zanetti, Nicola (2015) Concept-drift in web-based IDS : evaluating current capabilities & future challenges.

Zarghami, S. (2013) Middleware for Internet of things.

Zeilstra, J. (2016) Reasoning about Active Object Programs.

Zeilstra, Pieter (2023) Explainable Diagnoses Prediction For General Practitioners.

Zenden, R. van (2023) The identity mangement solution that improves data sharing in logistics.

Zeng, Xiangshuai (2019) Reinforcement learning based approach for the navigation of a pipe-inspection robot at sharp pipe corners.

Zeng, Y. (2023) Learning data augmentation policies for computer vision using additive Fourier-basis noise.

Zentveld, B.N. (2024) Improving BearingPoint Netherlands’ consultant-to-project KPIs by introducing a consultant-to-project assignment model.

Zhang, F. (2022) Dashboard design for MiniSoccerBal 3.0.

Zhang, K. (2020) Applying questionanswering for the Mendeley Search Engine to improve user search experience.

Zhang, S. (2020) Algorithms for planted clique recovery in random geometric graphs.

Zhang, Yi (2018) Situated breakdowns in video mediated communication.

Zhang, xuhao (2023) Design and Impact of Activation Functions for Sparse Neural Networks.

Zhao, Wenjie (2022) How different virtual reality environments influence job interview anxiety.

Zhao, Zhenqi (2024) Exploring Lexical Alignment Influences in Price Bargain Chatbot.

Zhong, Yuanyang (2020) Studying black and white textures for visualizationon on e-ink displays.

Zhu, Tingting (2022) The Media Bias of COVID-19 in Different Countries.

Zhu, Zhiyong (2022) Improving the Personal Health Train approach with Electronic Data Capture Systems.

Zieverink, Niek (2022) Frog Counting Tool.

Zijden, W. van der (2017) Multi-Tenant Customizable Databases.

Zijsling, Boris (2018) Dedicated Ambient Displays.

Zissoldt, J.E. (2020) Topic modeling in memories of elderly.

Zonneveld, T. van (2021) 3D finger vein patterns : acquisition, reconstruction and recognition.

Zu, Xinrui (2023) Fast and Precise Lung CT Image Generation via Diffusion Models.

Zubavičius, R. (2023) Fluid properties estimation and pressure drop sensing based on Coriolis flow sensor using machine learning.

Zubcu, Cristian (2023) Effect of Normalization Techniques on Modernity Signatures in Source Code Analysis.

Zulkarnaen, Z. (2019) Separation of Interaction Wrench and Wind Disturbances from Wrench Observer in Fully-Actuated UAVs.

Zwan, J.M. van der (2020) Detection and tracking of events using open source data.

Zwart, Nynke A. (2021) Agents presenting themselves as Strangers duringPrivacy Permission Requests: Effects on Disclosureand Privacy Awareness of Children.

Zwerus, Robert (2007) Storing Personal Information Management data: Akonadi - unifying PIM data for KDE.

Zwet, Dennis van der (2020) Assessing road quality and driver behavior using movement sensors in wrist worn devices.

Zwienenberg, Jesse (2021) Neural implicit representations for diffeomorphic medical image registration.

Zwiers, Jeroen (2023) BLE-based Relative Positioning in the Context of Targeted Bike-to-Vehicle (B2V) Communication.

Zwol, Jan van (2024) Splitting the watermark up, a steganographic watermarking algorithm for H.264 with reduced image distortion.

d'Angremont, E. (2018) Towards an automated analysis for the delineation of focal epilepsy : single pulse electrical stimulation and machine learning.

Özen, Anıl (2020) Finding notes within Boomwhackers Recordings.

Şakar, Ö.F.O. (2020) Extending support for axiomatic data types in VerCors.

Šatcs, D. (2020) Understanding the lightning network capability to route payments.

Šerkšnas, Jurgis (2023) Implementing & Integrating Live Mission Recording with Starter Drones.

This list was generated on Thu Apr 25 06:03:40 2024 CEST.