University of Twente Student Theses

Login

Programme: Computer Science BSc (56964)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Year | Item Type
Jump to: 2022 | 2021 | 2020 | 2019 | 2018 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2007 | 2004
Number of items: 392.

2022

Abbema, F. van (2022) Performing Bisimulation Minimisation To Parity Game Strategies To Improve Controller Quality.

Afia, A. (2022) The impact of graph properties on the complexity of attack tree analysis.

Ahmadov, Parviz (2022) Evaluating pose estimation and object detection models for the application in the minisoccerbal project.

Amur, Sri Harsh (2022) Intelligent Wifi Access Points for Diverse User needs: QoS Slicing in SDN Controlled APs.

Anghel, C. (2022) Effect of image quality in computer vision for semantic segmentation of road images.

Anwar, Mian Tashfeen Shahid (2022) Techniques to Process point cloud data to perform HAR using Machine learning.

Assaad, Malek (2022) Link Vulnerability Aware Task Deployment over Edge and Cloud.

Avramov, V.R. (2022) Automated grading of programming exams with JUnit and Semgrep.

Bals, J. (2022) A comparative analysis of the multi-factor authentication protocols presented in the literature.

Batenburg, B. (2022) Performance of DNS over QUIC.

Belchev, B. (2022) Recommendations on bias : detect, mitigate, repeat.

Berenschot, L. (2022) Vital signs monitoring with an FMCW radar sensor.

Bhutto, Muhammad Ramish (2022) Automating Privacy Policy Extraction And Summarization.

Blankestijn, Arjan (2022) Millimeter-Wave Connectivity in Real World Vehicle-To-Vehicle Network Scenarios.

Bleumink, C. (2022) Verifying the Rewrite Rules of VerCors Using Interactive Theorem Provers.

Boeve, T. (2022) Comparative analysis between fast and basic scalar multiplication used in elliptic curve cryptography.

Bovenkerk, Jasper (2022) Generating IMU data from video using deep neural networks for use in animal activity recognition.

Bozov, P. (2022) 3D point cloud segmentation and automation for railway catenary arches.

Brattinga, M. (2022) LSTM-based Indoor Localization with Transfer Learning.

Bravo de Medina Arribas, J. (2022) Decisive Image Characteristics to Perform Image Steganography in DCT.

Bree, Sjoerd van (2022) Testing Copositivity in Pentadiagonal Matrices.

Brink, W. van den (2022) Weighed and found legacy : modernity signatures for PHP systems using static analysis.

Broeder, Gies den (2022) Human Activity Recognition using a mmWave Radar.

Broekhof, Ivo (2022) Replication and Analysis of the Berry-Sethi Parser for Ambiguous Regular Expressions.

Chae, Heejin (2022) Prototyping gamification of lifestyle application for prevention of obesity in young adults.

Chobdar, Pranav (2022) Comparing popular topics related to Covid-19 in Latin America and Europe.

Choi, Sua (2022) The design of ‘League of Legends’ decision support system for inexperienced players.

Choi, Y. (2022) Case studies for the necessity of the blockchain in self-sovereign identity.

Christiano, B.G. (2022) Formalization of tangle and tangle learning algorithm.

Copae, D.V. (2022) Using augmented software requirements for automatic classification.

Covaci, Andrei - Ion (2022) Wi-Fi MAC address randomization vs Crowd Monitoring.

Davids, Aron (2022) Identifying plot holes in narrative stories by simulating events.

Dichev, Konstantin (2022) Validating Belbin Roles Based on University Students' Discord Messages.

Elkady, O. (2022) SLAM for smart bikes.

Erkko, M.A. (2022) Speeding up parametric model checking using GPGPU computation.

Fattahi Mehr, Omid (2022) Data Augmentation using Fourier-Basis Noise.

Fürst, J. (2022) Validating XAI techniques in medical image diagnosis: A venture towards algorithm transparency in a socio-technical system.

Gadelmawla, Omar (2022) Exploiting shadows to infer 3D structures.

Gaisins, E. (2022) Are We All Back on Campus?

Gerretzen, B.M. (2022) Information leakage via Certificate Transparency.

Ghiauru, Cosmin Gabriel (2022) Exploring the efficacy of Fresnel Zones in the context of fully unobtrusive wireless stress signal detection.

González-Novo López, F. (2022) Bike lane quality estimation under variable speed conditions using off-the-shelf motion sensors.

Gorgan, Andrei (2022) Enabling faster processing of big-data using GPU decompression.

Guducu, Izzet Berke (2022) Weighted Abstract Syntax Trees for Program Comprehension in Java.

Hagens, B. (2022) Analysis of Stochastic Behaviour in Sokoban.

Halim, Ricco (2022) Decentralization, Scalability, and Security Trade-off in Blockchain System: Comparison on Different Approaches.

Hartog, D den (2022) Event record-based evaluation of business scenarios in the logistics domain using process mining.

Hauser, Brand (2022) GridShield on a Multilayered Electric Grid.

Heuver, J. (2022) Markerless stride segmentation for canine pose estimation.

Hofstee, S.B.H.C. (2022) Analysis of pruning methods for compact neural networks on embedded devices.

Hol, Valentijn (2022) Bit-packing and Hashing Evaluation in Explicit-state Model Checking.

Horck, R. (2022) Price formation of illicit drugs on dark web marketplaces.

Horst, Reinier L.C. van der (2022) Error Estimation for Output Prediction of Photovoltaic Systems.

Hristov, P. (2022) Designing an intrusion detection system for a Kubernetes cluster.

Huisma, G. (2022) Recursive island parsing : monadic lake parser combinators.

Hulter, J.G. (2022) Improving the integrated development environment of a legacy software platform.

Huynh, Mr. Quang Long Q.L. (2022) Analysis on relations between graph metrics and average consensus algorithm convergence speed.

Iosif, A. (2022) An empirical evaluation of approximation algorithms to find maximal cliques in hypergraphs.

Jaworski, M.Z. (2022) Particle swarm optimization of custom bitcoin trading algorithm.

Kasteel, M.B.M. (2022) Understanding textual interpretations with and without emoji.

Katona, A.M. (2022) Defining information systems integration : a literature review about ISI.

Kesteren, L. van (2022) Differentiating between facial landmark shifts due to pose variation and morphing.

Khavrona, Roman (2022) Analysing Internet route changes related to the Russia-Ukraine war using BGP historical data.

Kim, Hyeon Kyeong (2022) Visual Programming Environment to Generate Arduino Code for Wearable Toolkit.

Koc, M.A. (2022) Raising cybersecurity awareness of University of Twente students.

Kool, B.B. (2022) Application of a neural network to the shift scheduling problem in supermarkets.

Koval, M. (2022) Blockchain in dairy supply chains : a literature review.

Kruif, Cato de (2022) Using d-NFGs to identify and eliminate dead code in C# programs.

Le, T.A.D (2022) Enhancing IMU-based smartphone context detection using Transformer.

Lin, T.Z. (2022) Past, present, and future of cybersecurity for ICT-professionals.

Liu, Yujie (2022) Help Rich Info Get Richer: Enriching a semi-structured dataset using a Semantic Web approach.

Luchtmeijer, D. L. (2022) Improving solutions of Service Engineer Planning using Mixed Integer Programming and Slack Induction by String Removal.

Mazilu, I. (2022) Defocus blur synthesis and deblurring through interpolation in the latent space.

Meent, Tijmen van de (2022) A comparative study on lightweight authentication protocols in IoT.

Meijer, M.P. (2022) An Approach at Social Relation Recognition in Egocentric Videos using Pose Estimation.

Merchan, M. (2022) Anomaly detection in IoT : federated learning approach on the IoT-23 Dataset.

Mesie, P. (2022) The Effect Of Context Removal In Sentiment Analysis On News Articles.

Meulenkamp, T. (2022) Parser Benchmarking for Legacy Languages.

Meyers, B.J. (2022) Analysing the resilience of 5G networks in the Netherlands.

Middelraad, F. (2022) This laptop has great coffee : training a Dutch ABSA model from customer reviews.

Mollah, H. (2022) User stories applied for end-to-end web testing.

Mulder, P.W. (2022) A comparative analysis of the computation cost and energy consumption of relevant curves of ECC presented in literature.

Nae, Teodora (2022) Predicting COVID severity using machine learning methods : -Comparison between real life and mimic dataset-.

Naguine, P.V. (2022) Subpopulation Process Comparison and Bottleneck Analysis: A Case Study of Frozen Shoulder.

Nastase, Tudor (2022) Improving safety of e-bikes with automated systems: using an ad-hoc sensor network to prevent car to e-bike accidents.

Navarro Di Pasquale, J. (2022) Robust training using a push-pull inhibition layer for adversarial robustness in convolutional neural networks.

Niculae, T.F. (2022) Edge server placement on traffic lights for smart city services.

Nijland, J.G.W. (2022) Gamification of cyber security awareness training for phishing against university students.

Olmezoglu, C. (2022) Causal analysis of safety violations in DyNetKAT.

Pasquarelli, Leonardo (2022) Extending Java Collections for List and Set Data Structures.

Pocheva, Venelina (2022) Outsourcing Prioritization for Bottleneck Processes Using Process Mining: A Logistics Case Study.

Popov, Dimitar (2022) How Does Encouragement in Human-Robot Interaction Affect People’s Pro-Social Behavior? An Experimental Study on Human-Robot Interactions.

Popovici, Andrei (2022) Analysing Real-Time Vision-Based Pose Estimation Algorithms for RITH Purposes on Embedded Devices.

Przadka, Bartosz (2022) CAD model reconstruction from the LiDAR scan of the catenary arch.

Qazi, A. (2022) Cars and social media : a greener future.

Rikkers, Vasco (2022) The Use of Story-based Gamification in USB-based Attack Prevention.

Römer, J.G.W.T. (2022) Real-time pitch detection using resource constrained IoT device.

Sanchez, Bryan (2022) Automatic detection and estimation of the area of buildings.

Schaaf, Jurre van der (2022) Using reinforcement learning to control hydrofoils.

Schooltink, F. (2022) A simulation of the ecological impact of three smartphone strategies.

Shi, Z. (2022) Mining and Utilizing Patent Related Data in Quantifying the Societal Impact of Security Technologies.

Siderova, Aleksandra (2022) Tree Transduction as a Means for Efficient Sentence Simplification.

Smit, P.J.M. (2022) Visual place recognition under image corruptions.

Solak, - O.E. - (2022) Comparison of digital twins in different application domains.

Solovyeva, Olga (2022) Investigation of Quality Measures in Cyclists’ Dataset Using Dimensionality Reduction Techniques.

Stanculeanu, G.O. (2022) Assessing Russia’s isolation from the web following their invasion of Ukraine using the DNS root system.

Stoev, Martin (2022) Online Parent Monitoring Tool.

Tazelaar, Steven (2022) Automatic labeling of road quality using machine learning.

Tilburg, A. van (2022) Submodular functions and M-convex sets.

Timmerman, Luc (2022) Performance Testing Owl, Parser Generator for Visibly Pushdown Grammars.

Tomov, N. (2022) Converting binary decision diagrams to and-inverter graphs using prime-irredundant covers.

Tonchev, Viktor (2022) Using accelerometer and gyroscope sensors to differentiate between eating movements associated with different foods.

Trendafilov, I. (2022) Impact of quantum computing on sectors in society based on its application to real-world use case problems.

Trusin, Cristian (2022) The effect of the Russian-Ukrainian conflict on the Internet from the perspective of Internet eXchanges.

Tsintsov, Y.K. (2022) A Comparison Between the Effectiveness of a Virtually and a Physically Present Robot when Evoking Prosocial Behavior in Humans.

Vada, H. (2022) Comparative analysis of multi-factor authentication schemes for Internet of Things.

Verburg, F.M. (2022) Exploring explainability and robustness of point cloud segmentation deep learning model by visualization.

Verheijen, D. (2022) Teaching Array Verification Using Snap!

Verio, I. (2022) Low Cost Connectivity for Household Appliances using Low Power Wide Area Network (LPWAN).

Vinne, Sietze van der (2022) Impact of user density increase on 802.11ax based Network Optimization.

Waal, J. van der (2022) You spin me right round : using a smartphone camera to determine the angle of a turn when cycling.

Waterval, R. (2022) How information sharing on online social networks may allow for personalized cyberattacks.

Wevers, K.J.M. (2022) Is a hot dog a sandwich? Generating conversation starters that categorize a word in an unusual way.

Wijk, M.G.W. van (2022) The Quest for the Best Thread-Safe Java List.

Wijngaard, Jelle van den (2022) Placement of Electric Vehicle Charging Stations in Congestion Games.

Witte, S.W. de (2022) Designing a camera-based automated food tracking app.

Xu, Zihao (2022) Overground vs. treadmill: where is my horse running? Context detection based on IMU data.

Zhang, F. (2022) Dashboard design for MiniSoccerBal 3.0.

Zhao, Wenjie (2022) How different virtual reality environments influence job interview anxiety.

Zhu, Zhiyong (2022) Improving the Personal Health Train approach with Electronic Data Capture Systems.

2021

Adriani, J (2021) Measuring Eating Speed with the Sensory Interactive Table.

Alberts, K.J. (2021) Comparison of different types of auto-encoders for data cleaning.

Allahverdiyeva, Aydan (2021) Empathetic Textual Speech of Conversational Agents in Client-Centered Therapy.

Apriyadi, R.A. (2021) MODEST language syntax for structural model parameters.

Arva, D. (2021) Using artificial intelligence to mitigate file injection attacks in emails.

Assen, Jorrit van (2021) General Game Playing with imperfect information in GROOVE.

Assies, Daniël (2021) Developing a Smart Telemetry Feedback System for Sim Racing.

Averkin, Konstantin (2021) You are the weakest link - identifying single-rack points of failure in the DNS.

Bakker, J. (2021) Calculating the Risk of Valve Failures when Maintaining Water Supply Networks.

Basarabă, R.C. (2021) Investigating safety and security interactions using the BDMP formalism : case study of a DDoS attack on Liberia.

Beekman, L.J.D. (2021) Procedural location generation with weighted attribute grammars.

Beijnum, W. van (2021) The state of DNSSEC provisioning automation.

Bercea, I.A. (2021) In virtuo exposure therapy for children diagnosed with social anxiety disorder.

Beune, P.F. (2021) Classifying the Network Capacity of the Dutch IPv4 Address Space.

Birton, Laurentiu (2021) Compressed Convolutional Neural Networks for the Classification of Electrocardiogram Signals on Embedded Devices.

Boekhoudt, N. (2021) Decriminalisation of cannabis : the effects on the drug market via the dark web.

Boer, Frans de (2021) Active Learning on Embedded Devices.

Bommel, J. R. van (2021) Active Learning during Federated Learning for Object Detection.

Broekhuis, Stijn (2021) The Importance of Coding Styles within Industries.

Bronkhorst, M. (2021) A pen is all you need : online handwriting recognition using transformers.

Böhmer, Kevin (2021) Model predictive control for electric vehicle charging using low power microcontrollers.

Chandra, Melvin Sumon (2021) Why Should Security Train My Staff?

Chen, Ziwei (2021) Future feasibility analysis on modular smartphones.

Chirca, Lucian (2021) Marks Fusion: Development Of Facial Marks Detection System And Fusion With Face Recognition System.

Dartel, Bram van (2021) Malware detection in IoT devices using Machine Learning.

Denga, Adarsh Aaron (2021) Energy Optimisation Through Machine Learning in Wireless Networks.

Dijk, Remco van (2021) Optimizing the BLE Transmission of Sensor Data: An Exploratory Study.

Donkers, A.D. (2021) The Usage of Models in Model-Driven Software Engineering.

Enache, Aida (2021) UI/UX Analysis and Design of Running Dashboard for Injury Prevention.

Farooq, A. (2021) How to Zen our Python.

Floor, Daniël (2021) the Suitability of Groove as a General Game Playing Language.

Frolov, Platon (2021) A sensitivity analysis of different machine learning methods.

Govers, Ruben (2021) Predicting Heart Rates Of Sport Activities Using Machine Learning.

Groeneveld, F. (2021) Benchmarking and Optimisation of Engage!-based XML Parsers.

Groot Roessink, Jochem (2021) inSQeLto : a Query Language for Probabilistic Databases.

Grotentraast, Jurgen (2021) Decision support for Rocket League player improvement.

Heath, Andrew (2021) Investigating the use of hub neuron identification for pruning sparse neural networks.

Hendriks, Remi (2021) The burden and information gain of path-based topology discovery.

Hessels, R.A. (2021) Activity Recognition in Nature using Sound and AI.

Hu, X.L. (2021) Lightweight image-based key point tracking for real-time bridge monitoring with smartphones.

Huisman, D.A.J. (2021) Generating Specifications to Verify the Correctness of Sanitizers.

Imre, Baris (2021) An investigation of generative replay in deep reinforcement learning.

Janssen, D.D. (2021) Data-Driven Analysis of Cellular Network Resilience in the Netherlands.

Jong, Sieta de (2021) A Study on the Use of Interactive Videos in Addiction Treatment for People with an Intellectual Disability.

Joosten, Wesley (2021) Learning to Learn : Generalization of Evolved Plasticity Rules in Recurrent Neural Networks.

Kara, M.N. (2021) Classification of drinking-related events at the sensory interactive table.

Khavrona, Oleh-Yevhen (2021) B-epsilon-tree and cache-oblivious lookahead array: a comparative study of two write-optimised data structures.

Kichler, Neil (2021) Robustness of sparse MLPs for supervised feature selection.

Kleine, S.L.A. (2021) Collaborative learning in action at UT.

Koldenhof, Dylan (2021) Word Embeddings to Classify Types of Diachronic Semantic Shift.

Krijnen, T.A. (2021) Automatic generation of Formula 1 feports.

Ledelay, Joël (2021) Retrofitting Memoization : an exploratory study.

Leenheer, Bart (2021) Smart User Control in Wi-Fi Access Points.

Leinweber, Stephan (2021) Accessible Online Addiction Treatment for Patients with Mild or Borderline Intellectual Disability.

Li, Litian (2021) Simulating Federated Learning for Smartphone based Indoor Localisation.

Li, Ruiyuan (2021) Generative Probabilistic Programming in Games: Creating Character Backgrounds Using a Bayesian Network.

Li, Shikuan (2021) The effect of using virtual reality equipment on people's motivation to exercise.

Loohuis, J.E. (2021) Synthesising Security Camera Images for Face Recognition.

Looijenga, Wouter (2021) Bicycle Accident Prevention using Sensors and Automotive Systems.

Ludjen, A.C.P.P. (2021) Generative replay in deep reinforcement learning.

Martinos, Nikolas (2021) Functional and Non-Functional Requirements for a Performance Dashboard in CS:GO.

Meerhof, J.J. (2021) Loop-breaking Approaches for Vehicle Route Planningwith Multi-agent Q-routing.

Meijerink, Carlijn (2021) Facial landmark detection under challenging conditions.

Mo, T. (2021) Generalization capabilities and performance analysis of CNNs for pavement crack detection.

Monteiro, S.C. (2021) An internet-wide analysis of TLS configurations of public LDAP servers.

Mourik, F.G. van (2021) Finding Personally Identifiable Information Leaked via Publicly Accessible CT Logs.

Mulder, Michael (2021) Creating a Compiler for the Semi-Structured Language of Blazons.

Ngo, T. (2021) Intelligent Bomberman with reinforcement learning.

Niculescu, Remus G. (2021) Analysis on the Evolution of Mobile Network Characteristics from NetBravo Dataset.

Noorlander, M.S. (2021) Predicting traffic flow with machine learning.

Olteanu, A.C. (2021) Tracing Covid-19 domain name clusters on the internet.

Otten, Yoeri (2021) Adapting, analyzing and benchmarking transportation routing algorithms for realistic real-time environments.

Peters, J.M. (2021) Opting Out During COVID-19: The Dynamics Between Social Media Distance and Work-Family Balance.

Prieskienis, Adrijus (2021) Information value for disruption management in supply chains.

Raureanu, A.S. (2021) Transfer learning for cell image reconstruction.

Reefman, K.H.A. (2021) Determining the rate of small gestures unobtrusively.

Resing, M. (2021) Should network operators hop on the data plane?

Ritsema, S. (2021) A feature sensitivity and dependency analysis approach for model explainability.

Roos, M.C. de (2021) Bitcoin energy index : a transparent and dynamic model.

Singpurwala, K. (2021) Sentiment analysis trading indicators.

Sleurink, Matthias (2021) Automatic Generation of Test Cases for VerCors Verification Cases Failing with Null Errors.

Smink, Ruben (2021) Using functional dependency thresholding to discover functional dependencies for data cleaning.

Sokolovas, E. (2021) Cell Detection in Whole Slide Images With Out-of-Focus Corruption.

Spijker, J. J. (2021) Plate localization on the Sensory Interactive Table.

Stekelenburg, A. V. (2021) Providing Concurrency Guarantees Using An Event-Driven Language.

Stel, E.W. (2021) Process comparison for subpopulations of patients with heart failure.

Stribos, R.H. (2021) The Impact of Data Noise on a Naive Bayes Classifier.

Suidgeest, Wouter (2021) Forensic Facial Recognition Utilizing Cartoonization Segmentation.

Sundarapandian Raani, V. (2021) Modeling and analysis of board games.

Thomas, Fabian (2021) Can the method for calculating the International Roughness Index used by the company Infrafocus be certified according to Dutch regulations?

Udrea, Mihnea-Adrian (2021) A Comparative Study on Pre-trained Classifiers in the Context of Image Classification.

Velinov, Bozhidar (2021) Insourcing and outsourcing of IT in Small- and Medium-sized Enterprises.

Visser, W.A. (2021) Horse recognition using inertial measurement units.

Voorberg, M. (2021) A performance analysis of membership datastructures in Java.

Wal, Ewout van der (2021) Rosetta ANTLR: Ultimate Grammar Extractor.

Wal, L.E. van der (2021) Using dtControl to process schedulersproduced by the Modest Toolset.

Wan, Xin (2021) Generating IMU Data for Horse Activity Recognition from Horse Videos.

Wang, Z. (2021) A diagnostic of information security features of EDC systems in the personal health train context.

Weidmann, Sophie (2021) Learning Analytics for Atelier.

Wicaksana, J. (2021) Comparison of different types of cluster algorithm on Netherland telecommunication provider solutions.

Willemsen, Bernard J. (2021) Creating Solvable Instances for Unsolved Puzzles.

Wittingen, E. M. (2021) Creating a solver for Kwirk (Puzzle Boy).

Wolf, Geronimo (2021) Detecting wine taste using Recommender Systems.

Yang, R. (2021) Didactic visualization for a searchable encryption.

Zhang, L. (2021) Testing the Variation of the Pupil Diameter Dilation as Measure of the Sense of Embodiment.

2020

Arkel, Lars van (2020) Demonstrating runtime assertion checking using Snap!

Artolozaga, Iñigo (2020) Mental health care in a pandemic : a survey from a design and interaction perspective.

Bandi, S.S.A. (2020) Inter-subject synchrony and emotional dynamics in magnetoencephalographic signals during music stimulation.

Banu, R. (2020) Internet of nano-things in human cancer detection.

Benen, N.J. (2020) Using Graphviz to create aesthetically pleasing LaTeXdrawings of graphs.

Breggeman, F.T. (2020) Graph Isomorphism with Pathfinding Algorithms.

Brink, K. van den (2020) Finding “The Drop” : Recognizing the climax in electronic music using classification models.

Brinke, S.T. ten (2020) The Effect of Manipulating Perceived Action Boundaries On Catching Performance.

Brunt, B.W. (2020) Decreasing the computation time that's used for saving data in the DEMKit simulator.

Constantinescu, E.M. (2020) An in-depth approach to fitting probability distributions using evolutionary algorithms.

Dulfer, R.M. (2020) The propaganda machine.

Engelenhoven, Adjorn van (2020) Modular Neural Networks using Multiple Gradients.

Filipovic, Simona (2020) Subpopulation process mining in healthcare.

Flapper, Edwin (2020) ETA Prediction for vessels using Machine Learning.

Flederus, D.R. (2020) Enhancing music genre classification with neural networks by using extracted musical features.

Gavenavicius, M. (2020) Evaluating and comparing textual summaries using question answering models and reading comprehension datasets.

Greeuw, P.C.A. de (2020) Robustness of Microgrid Control Mechanisms Against Cyber Attacks.

Grooters, T. (2020) Analysing certificate transparency logs for let’s encrypt customer behaviour.

Gugten, L.A. van der (2020) Load balancing framework comparison.

Haas, A.N.J.P.M. (2020) Attitudes towards digital transformation at small enterprises : A cross-border analysis.

Hast, Fritz (2020) The Impact of 5G on Future Data Center’s Carbon Dioxide Emissions.

Heinen, Niek (2020) Using lightweight image classifiers for electrocardiogram classification on embedded devices.

Hetterscheid, K.J.T. (2020) Detecting agitated speech : A neural network approach.

Heyns, L. (2020) Converting Modest Models to Efficient Code.

Ignatius Patrick, Patrick (2020) Assessing LOKI by learning from Mitsuku and dataset themes.

Imbrea, A. (2020) An empirical comparison of automated machine learning techniques for data streams.

Jaarsveld, F. van (2020) Estimating the effects of the Macroscopic Traffic Parameters on the overall Cooperative Awareness Message generations.

Jansen, G.A.A. (2020) Underground Wireless Communication and Wake-Up at 125 kHz.

Jansen, L.W.L. (2020) Comparing cloud security directions between the Academia and the Industry.

Kampen, C.M. van (2020) Formal Automated Verification of a Work-Stealing Deque.

Karsten, Jarik (2020) Crunching Attack Trees : efficient algorithms for computation of metrics.

Knol, R. (2020) Emotional activity detection using behavioural sounds.

Leendertz, R.R. (2020) Validating the Maneuver Coordination Protocol with UPPAAL.

Li, Y. (2020) Interactive visualization of book publication history.

Lijcklama à Nijeholt, D.J. (2020) Control for Cooperative Autonomous Driving Inspired by Bird Flocking Behavior.

Lijzenga, O. (2020) Symbolic parity games : Two novel fixpoint iteration algorithms with strategy derivation.

Lummen, D.L.M. (2020) An analysis of Link and Node Level Resilience on Network Resilience.

Lüpkes, Niklas (2020) Using static weight estimation of general trees to efficiently parallelize the execution of DEMKit Simulation Models.

Maas, Jelle (2020) Cyber attack detection in smart grids.

Meijer, J.J.W. (2020) Morphing detection based on regional analysis of local frequency content.

Middelkoop, D.E.V. (2020) Sensitivity analysis of predicting wireless c hannels within an indoor factory floor.

Myśliwiec, J. (2020) Generating short RPG side-quest stories with transformers.

Nijeboer, F.J. (2020) Detection of HTTPS encrypted DNS traffic.

Nijweide, F.P.J. (2020) Autoencoder-based cleaning of non-categorical data in probabilistic databases.

Noort, N. van (2020) Machine Learning for monitoring attacks in the cloud.

Oldengarm, B.M.J. (2020) Improving human activity recognition using embedded smartphone sensors.

Oorschot, D.H.M.A. van (2020) Let’s sort this out: GPGPU Verification of Radix Sort.

Orlinski, Jakub (2020) MEG-driven emotion classification using convolutional and recurrent Neural Networks.

Oude Roelink, B.M. (2020) On the security of authentication when linking federated identities.

Peters, S.T.H. (2020) Distribution of advertisements on YouTube among several content categories.

Pinke, T. E. (2020) Investigating Certification Authority Authorization Records' Effect on Existing Certificates.

Plentinger, C.S. (2020) GUI for FIG : visualising simulation results.

Popa, A. (2020) Feature evaluation for detection of COVID-19 in pulmonary CT scan images.

Praas, J.W. (2020) Predicting influence spread in online social networks using combinations of node centralities.

Rengers, J.J. (2020) Investigating association between musical features and emotion through EEG signal analysis.

Rijn, K.D. van (2020) A binary decision diagram based approach on improving probabilistic databases.

Roelink, M.J. (2020) Encoding deadlock-free monitors in the VerCors verification tool.

Rump, A. (2020) Automated assessment of learning objectives in programming assignments.

Rus, Adrian-Catalin (2020) Modelling and evaluating Obstructive Sleep Apnea management protocols with UPPAAL.

Sain, R. de (2020) Impact of language on detecting agitation.

Schooltink, W.T. (2020) Testing the sensitivity of machine learning classifiers to attribute noise in training data.

Schrama, M.L. (2020) Improving speech emotion recognition by identifying the speaker with Multi-task Learning.

Seteanu, R.A. (2020) Voice feature extraction from agitated speech.

Sievers, C.T. (2020) Bag-of-words location retrieval : Including position of local features.

Sleutjes, A.R. (2020) Identification of Profiles Based on Physical Behaviour Patterns.

Sonneveld, J.J. (2020) A gravitational approach for ranking Autonomous Systems in Large Autonomous System Networks.

Staal, P.J. (2020) An Analysis of Programming Paradigms in High-Level Synthesis Tools.

Stapel, F.T.A. (2020) A Heuristic Approach to Indoor Rock Climbing Route Generation.

Steenmeijer, L.D. (2020) Increasing the consistency of feedback on programming code by using a tagging system.

Stein, T.J. (2020) Uniform random samples for second-order restricted k-compositions.

Stellaard, Julian (2020) Tracking the process of an outbreak to a pandemic via logistical infrastructures : case study.

Velden, J. van der (2020) Blacklist, do you copy? Characterizing information flow in public domain blacklists.

Velzel, M.M. (2020) Design2Struct : Generating website structures from design images using neural networks.

Vijgh, M. van der (2020) A comparison of open-source real-time online learning frameworks for neural networks.

Vliet, G.J.B van (2020) Student study-behavior and knowledge retention.

Vredeveld, G.W.R. (2020) Invaluable measurement networks and their critical infrastructure : uptime discrepancy localization and network improvements.

Wackerle Garcia, L.M. (2020) Analysis of heuristics with random shortest path metrics on sparse graphs.

Willems, L.J.T. (2020) Detect people on a device that fits in the palm of your hands.

Winters, A. (2020) Examining the effect of hyperparameters on the training of a residual network for emotion recognition.

Witteveen, C.P.T (2020) Measuring the effectiveness of feedback on code of novice programmers.

Woudstra, M.H. (2020) Exploring Possibilities to Increase Ease of Use of ITPortfolio Management.

Xhymshiti, Meriton (2020) Domain independence of Machine Learning and lexicon based methods in sentiment analysis.

Xia, Lichen (2020) How vehicles’ speeds influence the optimal configuration and performance of the C-V2X.

Yuan, Ye (2020) Improving information retrieval by semantic embedding.

Šatcs, D. (2020) Understanding the lightning network capability to route payments.

2019

Abraham, Remco (2019) A Formal Proof of the Termination of Zielonka's Algorithm for Solving Parity Games.

Bakker, D.R. (2019) Impact-based optimisation of BGP Flowspec rules for DDoS attack mitigation.

Bleeker, D.A. (2019) DoS attack on recursive resolvers with DNSSEC key-tag collisions.

Boersma, Kitty (2019) Using Influencing Factors and Multilayer Perceptrons for Energy Demand Prediction.

Bolding, T.G.J. (2019) Applying Peak-Shaving to Household Devices using an Event-Driven Algorithm.

Booijink, K.G. (2019) Evaluating the Scalability of MayBMS, a Probabilistic Data Tool.

Bos, W.F.A. (2019) Software Metrics as Indicators for Effort of Object-Oriented Software Projects.

Cai, D. (2019) A Parasite Chain Attack in IOTA.

Cesar, M (2019) The dangers and privacy issues of motion-based side-channel attacks.

Cojocaru, Andrei (2019) Handling Missing Data: Traditional Techniques Versus Machine Learning.

Coroiu, Alexandra (2019) The generalization performance of hate speech detection using machine learning.

Dorp, M. van (2019) The Art of Corporate Storytelling : Exploring the effects of jargon and dramatic storytelling on reputation, trust and customer-company identification in the light of corporate stories.

Harten, Anne van (2019) Analyzing Programming Education Quality based on Students' Questions.

Hendriks, M. (2019) Can machine learning automatically choose your best model checking strategy?

Hove, K.W. van (2019) Automated DDoS Attack Fingerprinting by Mimicking the Actions of a Network Operator.

Hultermans, M.A.A. (2019) A Theoretical Ad Hoc Lunar Communication Network With CubeSats as Secondary Payload of Lunar Missions.

Jellema, J.M. (2019) Polynomial Calculation of Quasi-Gray code labelings for Irregular Signal Constellations.

Kampen, Coen van (2019) Missing data imputation based on probabilistic data.

Keijer, Julik S. (2019) Automated DDoS mitigation based on known attacks using a Web Application Firewall.

Klink, K. van (2019) Detection and Identification of Roman Emperors Using Facial Recognition.

Kobes, W.J. (2019) Efficient and accurate classification of cyber security related documents.

Koelewijn, Dirk (2019) Fingerprint-Based Automated Rule Generation for DDoS Mitigation using the Berkeley Packet Filter.

Kooij, D. (2019) Groovy Parity Games.

Krieter, Maren (2019) "Don't bother me with your information" : The Effect of Information Framing on Purchase Behavior in the Context of Plastic-free Grocery Shopping.

Marin, Mihai David (2019) Effectiveness of neural language models for word prediction of textual mammography reports.

Meijerman, T.R.I. (2019) Manipulating a dissociative bond with out-of-body experience avatar in virtual reality.

Mendler, G.T. (2019) Designing a meta report for hotel customer reviews.

Mitev, Zarimir (2019) Estimating User Interaction Complexity.

Muller, M. (2019) Creating building energy prediction models with convolutional recurrent neural networks.

Oliemans, R. (2019) WHOIS versus GDPR.

Overkamp, Niels (2019) Speeding up profile steering algorithms with caching for buffer type devices.

Perera, R.A.H. (2019) Finger-Adaptive Illumination Control and Exposure Fusion Imaging for Biometric Finger Vein Recognition.

Renssen, Martijn (2019) Classification of types of road damage using machine learning and a smartwatch.

Ruis, Frank (2019) Spilling the beans: Food recipe popularity prediction using ingredient networks.

Rõžakov, Ilja (2019) A Modest Comparison of Blockchain Consensus Algorithms.

Schaik, E.J.G. van (2019) Color-based Recognition Techniques for Manipulation Detection in Advertisement Videos.

Scholten, C.P.B. (2019) Hacking the router: characterizing attacks targeting low-cost routers using a honeypot router.

Schroten, Peter (2019) Introducing BGD: a DSL to express board games and gameplay.

Schudzich, Tim (2019) Music Consumers’ Adoption of Smart Speakers in the Field of Music : How do music consumers adopt towards (musical) smart speakers with reference to music marketing?

Sluiter, N.I. (2019) Influence Maximization in Social Networks by Injecting Memes.

Spijker, K. (2019) Identifying Users’ Skill Level through the Process Mining of Software Logs.

Tziampazis, Christodoulos (2019) Exposure Assessment on Medical Devices in the Netherlands.

Vegt, M. E. M. van der (2019) Compressed Set Representations and their Effectiveness in Probabilistic Model Checking.

Verkleij, Martijn (2019) Teaching programming using industry tools.

Vermast, Alissa (2019) Using VR to induce smoke cravings in low literate or intellectually disabled individuals who have a smoking addiction.

Visserman, H.A. (2019) Group Activity Recognition Using Channel State Information.

Vos, Matthijs (2019) Characterizing infrastructure of DDoS attacks based on DDoSDB fingerprints.

Vries, L.J.W. de (2019) IOTA Vulnerability: Large Weight Attack Performed in a Network.

Vries, R.H. de (2019) Walker: Automated Assessment of Haskell Code using Syntax Tree Analysis.

Weers, F.R.T. (2019) Automatic home video editing on music.

Wensing, Kasper (2019) Nuclear energy: A nuclear topic.

Wentzel, S. D. (2019) Evaluating Information Retrieval Systems for Children in an Educational Context.

Witlox, K.H.D. (2019) Face unmorphing.

2018

Bie, J.A. de (2018) PTA as an approach to fault tree analysis.

2015

Thunnissen, J. (2015) Communication solution for ICU patients : a case study.

Verhaar, Jort (2015) Micrometer scale 3d membrane printing towards locust ear imitation.

2014

Bokhove, Tom (2014) Public data visualisation in traffic, based on local, real-time monitoring.

Spoor, R.J.F. (2014) Design of a wall latching device.

Strecke, Jonas (2014) A high torque variable stiffness mechanism for the 'VSDD': conceptual design, realization and experimental validation.

2013

Knoben, L. and Otten, M. and Fransen, R. (2013) De waterzuivering als Petrinet: het voorspellen van overstromingen.

Tijhuis, K. (2013) Methods for modelling unit operations in chemical process simulators.

Vonk, J. (2013) Formal specification and verification of OpenCL Kernel optimization.

2012

Jansen, M. (2012) Improving inattentive operation of peripheral touch controls.

2011

Eerenberg, E. (2011) Towards distributed information retrieval based on economic models.

2010

Bijker, Remko (2010) Efficient pointcut projection.

Diephuis, Maurits (2010) A framework for robust forensic image identification.

Teijgeler, Stefan (2010) Connecting GROOVE to the world using XMI.

Vlieg, Edwin (2010) Usage patterns for user-centric service composition.

2007

Peeters, H.A.M. (2007) Aanbestedings Barometer : een onderzoek naar misstanden & knelpunten in de huidige aanbestedingspraktijk.

Scholten, F.B. (2007) The concern-oriented software architecture analysis method.

Sierhuis, Pim (2007) Het voorkomen van prestatieverlies bij de koppeling met Web services: ... en de rol van standaardisatie daarbij.

2004

Bui, Cuong (2004) Write-intensive applications with LDAP.

This list was generated on Wed Sep 28 06:04:59 2022 CEST.