University of Twente Student Theses

Login

Programme: Computer Science MSc (60300)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Year | Item Type
Jump to: 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1996
Number of items: 886.

2024

Bolten, Marjolein (2024) Monitoring training load and identifying fatigue in young elite speed skaters using machine learning methods.

Bos, Wouter F.A. (2024) Generating Piping & Instrumentation Diagrams from Static Fault Trees.

Chen, Peizhou (2024) Vulnerability Testing for WebAuthn.

Floor, D. (2024) Code comprehension in the multi-paradigm environment Kotlin.

Schrijver, G. (2024) Evaluating Generalisability, Limitations, and Adaptations in Social Network Analytics-Based Insurance Fraud Detection.

Stekelenburg, A.V. (2024) Solving Parity Games: Combining Progress Measures and Tangle Learning.

Stouten, Thomas (2024) Modeling the effectiveness of treatment for Rheumatoid Arthritis with UPPAAL.

Weening, J. (2024) Classifying Companies Based on Textual Webpage Data: A Comparative Analysis.

Wittingen, E.M. (2024) Deductive verification for SYCL.

2023

Abeywardana, Hasini (2023) Near real-time analysis of tactics techniques and procedures of attacker groups on their relevancy to an Organisation.

Andrei, Vlad-Cristian (2023) The security impact of DNS and TLS on the websites reconnaissance process.

Arconada Sousa, Luis (2023) Using Decision Tree Classifiers to Support Healthcare Diagnosis.

Arend, M.Q.T.P. van der (2023) The LAMP Framework - A language-agnostic code quality assurance framework for multi-paradigm languages.

Arva, Denis (2023) Secure Integration of Third-Party Code in SaaS.

Assen, M.H. van (2023) Integrating the Five Steps of Plotting: A Plotting Tool Design.

Bakker, Jeffrey (2023) Short-Term Passenger Flow Forecasting in Public Transportation Networks Under Event Conditions.

Beijnum, A.C.W. van (2023) Haly : Automated evaluation of hardening techniques in Android and iOS apps.

Beune, P.F. (2023) Lightweight Public Key Infrastructure for IoT.

Boerman, J.G.J. (2023) Formal verification of a sequential SCC algorithm.

Boersma, Kitty (2023) So long and thanks for all the (big) fish : exploring cybercrime in Dutch Telegram groups.

Bottinelli, Sara (2023) A Study of Organization Level E-mail Phishing Awareness.

Brattinga, M. (2023) Protecting against internal attackers with hardware-aided proxy re-encryption.

Breggeman, Floris Tenzin (2023) An Authentication Service for Domestic Self-Hosting.

Broekhuis, S. B. (2023) Incorporating User Inputs for Improved JSON Schema Inference.

Christou, G. (2023) On Services Exposed by DNS Infrastructure: A KINDNS Investigation.

Ciresica, V. (2023) Authentication method for Windows OS based on location classification using WiFi signals.

Dekker, Bram (2023) Semi-supervised point cloud segmentation on railway data.

Driessen, Famke (2023) A quantitative assessment method for microservices granularity to improve maintainability.

Engelenhoven, A. van (2023) CAST : Clustering Attention using Surrogate Tokens for Efficient Transformers.

Engers, V.P.G. van (2023) Efficient Deep Learning for Automotive Radar Perception.

Eyk, Jan-Niclas van (2023) Fighting Phishing at the Website Host.

Fobbe, Franziska (2023) Look at this, not that! – Improving the alignment of PIP-Net with domain knowledge.

Fontein, R.L.H. (2023) Investigating DNS Information Flow In Corporate Networks.

Gansel, Antoine (2023) Sub-quadratic Privacy Preserving Cohort Selection.

Gebremariam, T.H. (2023) Digital Twin and Securing IoT Applications in Industry 4.0.

Groot Roessink, J. (2023) Influence of Biological Cues on Monocular Depth Estimation.

Grooters, T. (2023) Analysis of automated Virtual Machine generation and automation around system testing at TKH Airport Solutions.

Harten, A. van (2023) The role of WebSDR usage in open source intelligence gathering during geopolitical events.

Hendriks, Max (2023) Consider it Parsed!

Hendriks, Remi (2023) Improving anycast census at scale.

Hessels, Ruben (2023) A Data Quality Assessment of the Suspicious Transactions.

Huber, Maximilian (2023) Internship report.

Imre, Baris (2023) Using a Multi-Scale Patching With Vision Transformers for 3D Image Segmentation.

Jeeva, Joshua Anith Singh (2023) Risk Assessment of Humanoid Robot EVE-r3.

Jiang, Yuling (2023) Patch-Based Morphing Attack Detection.

Joseph, A.M. (2023) Investigating vision transformers for human activity recognition from skeletal data.

Jánosi, József-Hunor (2023) Two-Stage Overfitting of Neural Network-Based Video Coding In-Loop Filter.

Kantharajappa, Kushal (2023) Point localization on 3D hand meshes and point clouds.

Karlsson, August (2023) Enabling Cyber Threat Intelligence Sharing for Resource Constrained IoT.

Kerkhoven, Tim (2023) Monitoring Service-level Agreements for Logistics Service Providers.

Kobes, W.J. (2023) Governmental domain name management : policy versus practice.

Koehorst, G.S. (2023) Generating natural language triage advice at Dutch out-of-hours primary care centers.

Kok, M.R. (2023) Household electricity load forecasting for demand side management applications.

Koldenhof, Dylan (2023) Neural Network Backdoor Removal by Reconstructing Triggers and Pruning Channels.

Kurnia, Aldi Doanta (2023) Interoperability Simulator for Data Spaces.

Laso, P. (2023) Quantifying white matter hyperintensity and brain volumes in heterogeneous clinical and low-field portable mri.

Laso Mielgo, Pablo (2023) Quantifying white matter hyperintensity and brain volumes in heterogeneous clinical and low-field portable MRI.

Ledelay, Joël (2023) Verification of distributed locks : a case study.

Leefer van Leeuwen, Maxmilian (2023) Color Emotions without Blue Light : Effect of a Blue Light Filter on the Emotional Perception of Colors.

Liu, Yujie (2023) Testing and Mutation Testing for GPU Kernels.

Lummen, D.L.M. (2023) Is Telegram the new Darknet? A comparison of traditional and emerging digital criminal marketplaces.

Macarie, Mihai (2023) Fuzzing Android Automotive's CAN interface.

Majkut, Kristóf (2023) k-Anonymization Module Prepared for Change : a flexible architecture for the easy replaceability of algorithms and data sources with proof-of-concept implementation.

Maranatha, Yesaya Galatia (2023) Auditable Data Sharing in Logistic Data Space: Design and Implementation of IDS Clearing House for Logistic Data Space.

Meerhof, J.J. (2023) Membership Inference Attacks on Federated Horizontal Gradient Boosted Decision Trees.

Meijerman, T.R.I. (2023) Blocking Techniques on Privacy-Preserving Record Linkage.

Mendler, Gereon (2023) Gossip Layer Optimization for the IOTA Network.

Mishra, M.K. (2023) Generating Video Game Quests From Stories.

Mo, Alexander (2023) Transformer Offline Reinforcement Learning for Downlink Link Adaptation.

Morad, Peshmerge (2023) Towards a Standard Fine-Grained Part-of-Speech Tagging for Northern Kurdish.

Mourik, F.G. van (2023) IterSHAP: an XAI feature selection method for small high-dimensional datasets.

Muller, M.W. (2023) SPaS: Sparse Parameterized Shortcut Connections for Dynamic Sparse-to-Sparse Training.

Neupane, Nischal (2023) Explaining Hiccup Predictor using Layerwise Relevance Propagation.

Nielen, J.J. van (2023) Dynamic Detection and Classification of Persistence Techniques in Windows Malware.

Oorschot, D.H.M.A. van (2023) VCLLVM: A Transformation Tool for LLVM IR programs to aid Deductive Verification.

Oosterhout, Janneke van (2023) Formal Verification of Lightweight Decentralized Attribute-based Encryption.

Pištek, Andrej (2023) Dynamic variable reordering for Binary Decision Diagrams.

Poozhiyil, Aditya (2023) Exploring Multimodal Data for Crime Recognition.

Popa, Andrei (2023) Gotta adjust them all! : Dynamic Difficulty Adjustment of Role-Playing Games Through Procedural Generation of Non-Player Characters.

Redelijkheid, M.N.F. de (2023) Monitoring network traffic and responding to malicious traffic for IoT devices in 5G network slices.

Rietberg, Max (2023) Quantified Photoacoustics for Carotid Artery Imaging.

Ritsema, Stan (2023) A Disentangled Representation Learning Approach for Deblurring Microscopy Images.

Rump, Arthur (2023) Apollo++: Automated Assessment of Learning Outcomes in Programming Projects.

Rus, A.C. (2023) NAISS : Network Authentication of Images to Stop e-Skimmers.

Sessink, Joost (2023) Parallelising a probabilistic model checker.

Sharma, A.K. (2023) Securing the Digital Frontier : Identifying and Closing Security Gaps with MITRE ATT&CK and Open-Source Detection Controls.

Socha, Konrad (2023) Fuzzy Markov chains.

Sokolovas, Erikas (2023) Multimodal Neural Networks and Data Preprocessing for Ship Trajectory Prediction Using AIS, Radar, ENC and Weather Data.

Sonneveld, J.J. (2023) Profiling Users by Access Behaviour Using Data Available to a Security Operations Center.

Stapel, F.T.A. (2023) Automated Grade Classification and Route Generation with Affordances on Climbing Training Boards.

Stribos, R. (2023) A comparison of anomaly detection algorithms with applications on recoater streaking in an additive manufacturing process.

Sun, Mengjie (2023) Ad Quality Analysis : Data Scientist Internship Report.

Wal, P.R.D. van der (2023) Diversifying Multilayer Perceptron Ensembles in a Truly Sparse Context.

Winters, A. (2023) Automated control prioritization based on generating sector-based threat profiles.

Witt, S.J. (2023) An Internet-wide investigation of publicly accessible databases.

Zandbergen, Nikki (2023) QuestionMark : designing a benchmark for probabilistic databases.

Zeilstra, Pieter (2023) Explainable Diagnoses Prediction For General Practitioners.

Zeng, Y. (2023) Learning data augmentation policies for computer vision using additive Fourier-basis noise.

Zhang, xuhao (2023) Design and Impact of Activation Functions for Sparse Neural Networks.

Zubavičius, R. (2023) Fluid properties estimation and pressure drop sensing based on Coriolis flow sensor using machine learning.

2022

Aanstoot, D. (2022) Graph rewriters as components.

Arrieta Larraza, N. (2022) Few-shot deep learning models for acoustic scene classification in low-complexity scenarios.

Bakker, D.R. (2022) Autonomous emulation of adversary procedures in the (pre-)compromise domain.

Baligudam, R. (2022) A Systematic Study of Gender and Religion Bias in Stories.

Beernink, G.J. (2022) Taking the quantum leap: Preparing DNSSEC for Post Quantum Cryptography.

Beld, J.J. van de (2022) Multimodal post-operative complication prediction for elderly patients with hip fractures.

Bhaskar, Rushvanth (2022) A Day in the Life of NTP : Analysis of NTPPool Traffic.

Bosma, H.R. (2022) Audio-visual Correlation from Cross-modal Attention in Self-supervised Transformers on Videos of Musical Performances.

Brandt, Jacco Hermanus (2022) Effectiveness of Oblivious RAM in cloud storage services.

Brink, K. van den (2022) FLEX : Force Linear to Exponential. Improving time series forecasting models for hydrological level using a scalable ensemble machine learning approach.

Chattopadhyay, A. (2022) Resilience of DNS infrastructure against DDoS attacks.

Couwenbergh, W. (2022) Detection of areas of interest in bending strain data for pipelines through 1D object detection.

Dijkstra, R.S. (2022) How can the eradication phase of incident response for ransomware incidents be improved based on previous ransomware incidents?

Gilbers, Jander (2022) Automatic Inference of Fault Trees using Reinforcement Learning.

Gougoulis Dimitriadis, E. (2022) Sixthsense : outdoor collision avoidance assistant for the blind and visually impaired.

Guru Rao, Sathvik (2022) Ontology Matching using Domain-specific knowledge and Semantic Similarity.

He, Wenruo (2022) Augmenting and Graph Scaling for Context-Aware Citation Recommendations.

Heeringa, T.J. (2022) The Effect of Higher Order Activation Functions on Infinitely wide Neural Networks.

Heijden, G.A.M. van der (2022) Building a sense inventory for Dutch healthcare abbreviations.

Herbowo, Keanu Nurherbyanto (2022) Comparing Zero-Knowledge Proof Protocols for Practical Open Source Self-Sovereign Identity Systems.

Hoheisel, R.E. (2022) Ransomware as a tool for diversion and coverup. A possible modus operandi for advanced persistent threats? A (practical) Investigation into the Use of Ransomware as Masquerade and Distraction.

Hop, Ivan J. (2022) On the Performance of Algorithms for Quantitative Verification.

Houtsma, R. (2022) An Explainable Machine Learning Approach to Risk-Adaptive Access Control.

Houtsma, Ramon (2022) An Explainable Machine Learning Approach to Risk-Adaptive Access Control.

Hove, K.W. van (2022) Threat analysis of RPKI relying party software.

Itäpelto, T.M. (2022) Item availability restricted.

Jafarli, Sevinj (2022) Providing DNS Security in Post-Quantum Era with Hash-Based Signatures.

Jansen, L.J.A. (2022) Assessing smart home security : a Zigbee case study.

Jansen, L.W.L. (2022) About the effect of white-box membership inference attacks on federated learning in large networks.

Jutte, Annemarie (2022) The smart annotation tool : optimizing semi-automated behavioural annotation using an AutoML framework supported by classification correctness prediction.

Kalbiyev, A. (2022) Affective dialogue generation for video games.

Kampen, C.M. van (2022) Zero Downtime Schema Migrations in Highly Available Databases.

Karsten, Jarik (2022) Improving usability at BetterBe through API analysis.

Kempen, Lindsay (2022) ExpressTTS: Augmentation for Speech Recognition with Expressive Speech Synthesis.

Khan, Etienne (2022) Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers.

Koelewijn, Dirk (2022) Transformers on a Diet: Semi-Supervised Generative Adversarial Networks for Reducing Transformers' Hunger for Data in Aspect-Based Sentiment Analysis.

Konijn, Jan-Paul (2022) Multi-domain Cyber-attack Detection in Industrial Control Systems.

Kooij, D. (2022) A Study on the Evolution of the Dutch Web.

Le, T.N.H. (2022) Aggregation in probabilistic databases : implemented for DuBio.

Li, Q. (2022) Co-attention-based pairwise learning for author name disambiguation.

Li, R. (2022) Automatic IMU-to-segment labelling using deep learning approaches.

Li, S. (2022) MBench : a benchmark suite designed for database schema migration.

Liberato, M. (2022) SecBERT : Analyzing reports using BERT-like models.

Lorini, Giulia (2022) Addressing the Ransomware threat: TTP-based defensive recommendations and a strategy for achieving resilience.

Lucas, R.H. (2022) Supervised contrastive learning to overcome inconsistencies in exhaled breath data.

Mansvelder, F.M. (2022) Dutch language specific KPI exploration and recommendation for maintenance scheduling.

Nelson, D.J. (2022) Privacy-preserving counterfactual explanations to help humans contest AI-based decisions.

Ngaffo Gouanfo, C.N.P (2022) Overcoming Selection Bias in Bayesian Network Construction.

Nisslmueller, Utz (2022) LOLBin detection through unsupervised learning : An approach based on explicit featurization of the command line and parent-child relationships.

Niu, Z. (2022) Develop and adopt the organizational cybersecurity culture in the Covid-19 teleworking scenario.

Paalvast, Olivier (2022) Representing Ultra Low Dose CT scans as Chest X-Rays : how far can and do we need to go?

Pavlov, V. (2022) Security aspects of digital twins in IoT platform.

Peeters, BSc Bart (2022) Exploring human relationship recognition in egocentric videos using deep learning techniques.

Perenzoni, Stefano (2022) Understanding athletes preferences of sport activities through ranking based news feed recommendation.

Peters, M.D.J. (2022) Extending explainability of generative classifiers with prototypical parts.

Pham, Nguyen Hoang Dung (2022) Dynamically Allocating Network Resources for Teleoperation Applications using Intent-based Inference.

Prasad, Akshay (2022) Investigating whether typosquatting targets children.

Ramón Gómez, Nerea (2022) An end-to-end approach to a Reinforcement Learning application in the transport logistics.

Rekker, W. (2022) Verification of a SysML railway specification with a translation to UPPAAL.

Rengers, J.J. (2022) DDS in a Zero Trust Cloud Native Environment in the Naval Domain.

Roelink, M.J. (2022) zk-SCHNAPS : enforcing arbitrary password policies in a zero-knowledge password protocol.

Roode, G. de (2022) User privacy in cryptocurrencies.

Santiago Garcia, Eric (2022) Country-independent MRTD layout extraction and its applications.

Schaik, Eric van (2022) Improving the Informativeness of Abstractive Opinion Summarization.

Schmit, C. (2022) Offloading Strategies for the Rendering Process in Edge-enabled Virtual Reality Games.

Scholten, Jeroen (2022) Gain insights in the logistic processes at Amsterdam Schiphol Airport and determine solutions to limit capacity bottlenecks.

Shafee, T. (2022) Governance of cloud storage - A secure cloud storage strategy to maximize data sovereignty.

Sierink, T.G. (2022) Active Reconstruction Attacks on 2D Range Databases.

Singhal, A.A. (2022) Improving extreme multi-label text classification with sentence level prediction.

Smits, J.P.G. (2022) Callisto - Selecting Effective Mutation Operators for Mutation Testing.

Steerneman, E.H. (2022) Exploring the effect of merging techniques on the performance of merged sparse neural networks in a highly distributed setting.

Stoian, N.A. (2022) Towards deep learning frameworks for the analysis of magnetic flux leakage captures.

Sustronk, J.J. (2022) Analysing Cyber Threat Intelligence Data Using Fully Homomorphic Encryption.

Tabudlo, M.J. (2022) An Exploration of Cow Positioning Data Related Insights.

Tintelen, B.F.M. van (2022) Feature extraction and selection on sparse, complex, sensor-based exhaled-breath data sets.

Voortman, N.E.F. (2022) Modelling OSA Diagnosis and Treatment using UPPAAL.

Vos, Matthijs (2022) Capability Maturity Measurement of a Security Operations Center through Analysis Detection.

Vries, M.P. de (2022) Private Information Retrieval applied to Biometric Verification.

Walsh, Ricky (2022) Finding Balance: A Study of Class Imbalance in Deep Learning Classification of Breast Cancer.

Weers, F.R.T. (2022) MaskCLIP : masking improves transfer for visual models trained with natural language supervision.

Wiefferink, C.A. (2022) APEx: Zero-shot Cross-Knowledge Graph Named Entity Extraction leveraging Wikification.

Witlox, K.H.D. (2022) Secure Blocking for Record Linkage.

Zhu, Tingting (2022) The Media Bias of COVID-19 in Different Countries.

2021

Abraham, R. (2021) Symbolic LTL Reactive Synthesis.

Akujobi, Joshua Chukwukamneleanya (2021) A Model For Measuring Improvement Of Security In Continuous Integration pipelines : Metrics and Four-Axis Maturity Driven DevSecOps (MFAM).

Aljabary, Mahmoud (2021) Automatic Generic Web Information Extraction at Scale.

Anaigoundanpudur Karthikeyan, Naveenaa (2021) Cryptographic Implementation of Issuer Policy for Self Sovereign Identity Systems.

Bhowmick, Anubrata (2021) Markers of Brain Resilience.

Boer, S.O. de (2021) Digital Identity : A cyber resilience evaluation of the European digital identity e-commerce requirements.

Bos, J.P. (2021) Forecasting the controllability of electricity consumersusing sparse multi-granularity time series data.

Bos, P. (2021) Program verification for quantum algorithms.

Bouma, G (2021) Web Server Loads under Visitor Surges : A Model-Based Prediction.

Braşoveanu, R. (2021) Item availability restricted.

Bree, R.J. van (2021) Data augmentation for regularizing learned world models in reinforcement learning.

Bui, Nhat (2021) Negomancer : Improvise. Adapt. Overcome. Transform.

Cesar, M. (2021) End-to-end encrypted data in web applications.

Chavannes, J.P. (2021) Information extraction for court cases.

Chinthu Rukmani Kumar, Jayanth (2021) Geometrical Social Networks.

Chivulescu, Dragos-Marian (2021) Balanced, as all things should be: PSD2 and cybersecurity risks.

Colmenar Lamas, F.M. (2021) Analysis and comparison of Log Shipment solutions at AWS S3 for Windows 10.

Dekker, A.P. (2021) Planning Self-Backhauled mmWave Networks with Multi-Connectivity.

Dijk, L.J. van (2021) AI as the assistant of the teacher : an adaptive math application for primary schools.

Dijkslag, M. (2021) Passive query-recovery attack against secure conjunctive keyword search schemes.

Dorenbos, H.M.R. (2021) Moldel : Predicting the 'Mol' in 'Wie is de Mol?' using machine learning and mathematical modelling.

Dunning, V.A. (2021) Developing a Multi-Party MPC Compiler with Covert Security and Public Verifiability.

Essen, T.M. van (2021) Investigations on Securing Repositories using Difference Analysis and Patch Applications on Encrypted Files.

García-Mauriño Taboada, Migue (2021) IOCMonitor: Automatic extraction of cyber threat intelligence from open source data using NLP and Machine Learning.

Gnutti, Alessandro (2021) Study on the cyber risk inside a museal entity.

Gupta, C. (2021) HoneyKube : designing a honeypot using microservices-based architecture.

Gupta, Y. (2021) Aspect Based Sentiment Classification of Multilingual Customer Reviews.

Hoekstra, Æ. S. (2021) Deobfuscating third party libraries in Android applications using library detection tools.

Hollander, J.P. (2021) Verification of a model checking algorithm in VerCors.

Inoue Nakagawa, P. (2021) Semantic Description of Explainable Machine Learning Workflows.

Ion, Diana-Elena (2021) Decentralized Finance Analysis.

Jayagopal, Tarun Narain (2021) VICE-GAN: Video Identity-Consistent Emotion Generative Adversarial Network.

Keijer, BSc J.S. (2021) Unsupervised Anomaly-Based Network Intrusion Detection Using Auto Encoders for Practical Use.

Khasuntsev, N.A. (2021) Automatic Detection of Misconfigurations of AWS Identity and Access Management Policies.

Kippers, Richard Gerrit (2021) Methodology for reconstruction of 3D Building Models using 3D-CityJSON and Floor Plans.

Laan, J.H. van der (2021) Incremental verification of physical access control systems.

Leemreize, T. (2021) Analyzing fileless malware for the .NET Framework through CLR profiling.

Liu, Dou (2021) Knowledge Graph Driven Conversational Virtual Museum Guide.

Meijer, L. (2021) Test case shrinking for Model Based Testing on Symbolic Transition Systems.

Meinderts, S. (2021) Exploring the applicability of a data-driven approach on recommending in-store replenishments for fashion retailers.

Melotti, D. (2021) Reversing and Fuzzing the Google Titan M Chip.

Morgese, Luca (2021) Stepping out of the MUD : contextual network threat information for IoT devices with manufacturer-provided behavioural profiles.

Nguyen, Thuy (2021) Cross-applicability of ML classification methods intended for (non-)functional requirements.

Palm, A.J. (2021) Using business intelligence to analyse sport associations' financial data.

Pandey, Vaidehi (2021) Self-supervised semantic segmentation based on self-attention.

Patil, Samarjeet Singh (2021) Automated Vulnerability Detection in Java Source Code using J-CPG and Graph Neural Network.

Prodea, A (2021) Identifying critical source code at method level by performing threshold-based and clustering algorithms on software metrics.

Provoost, Jesper C. (2021) Improving Operational Efficiency In EV Ridesharing Fleets By Predictive Exploitation of Idle Times.

Raghuraman, C. (2021) Detecting anomalies in programmable logic controllers through parameter modeling.

Ravishankaran, Charan (2021) Impact on how AI in automobile industry has affected the type approval process at RDW.

Ruis, F.A. (2021) Independent prototype propagation graph for compositional zero-shot recognition.

Samiksha, Samiksha (2021) Investigating an association between DDoS and Phishing attacks.

Scholten, Arnaut (2021) Efficient matching of heterogeneous roadmap data at Rijkswaterstaat.

Scholten, C.P.B. (2021) Automatic detection of zero-day attacks in high-interaction IoT honeypots using static analysis techniques.

Starink, J.A.L (2021) Analysis and automated detection of host-based code injection techniques in malware.

Sugumaran, Shyamprasad (2021) Monitoring the daily change in cow's body weight in relation to cow health and behavior.

Tagliaro, Carlotta (2021) Item availability restricted.

Vasterd, M.F.J. (2021) Generative adversarial models for privacy-preserving release mechanisms.

Veenstra, A. (2021) Accelerating mixed-level coverage array generation.

Verkuil, B. (2021) Automatic failure analysis for big data-driven industry.

Vries, L.J.W. de (2021) Detection of DoH tunnelling : comparing supervised with unsupervised learning.

Vries, R.H. de (2021) Clash of Clangs : differential testing of srcML and Clang.

Wang, R. (2021) The potential role of using humor-framed crisis response on post-crisis corporate reputation and purchase intention.

Wang, Wenhui (2021) Finding and Exploiting Vulnerabilities in Embedded TCP/IP Stacks.

Weener, Jeroen (2021) Libertas: A Backward Private Dynamic Searchable Symmetric Encryption Scheme Supporting Wildcard Search.

2020

Ahmed, A.B.H. (2020) Balancing security and usability in Web Single Sign-On.

Bakker, Michiel (2020) Model validation for stochastic hybrid automata.

Bie, D.R. de (2020) Image Similarity Ranking Applied to the Forensic Domain.

Bijl, M.H. de (2020) Encoder-Forecaster-Decoder: a Modular Deep Learning Framework for Cloudage Forecasting.

Bogaard, C.H.M van den (2020) Thwarting File-Injection Attacks on Searchable Encryption via Client-side Detection.

Bontekoe, T.H. (2020) Balancing privacy and accountability in digital payment methods using zk-SNARKs.

Boot, J.J.F. (2020) Defending against Access Pattern Attacks on Secure Range Query Schemes.

Boschma, R. (2020) Exploring the world of Container Stacking using Approximate Dynamic Programming.

Braams, T.L. (2020) Impact of programming environments and practices on energy consumption.

Brouwer, R (2020) Learning Timed Mealy Machines of the Physical Processes of an Industrial Control System for Anomaly-based Attack Detection.

Colombo, Riccardo (2020) On the escalation from Cyber Incidents to Cyber Crises.

Court, M.A. de la (2020) Design of a model-driven platform for IoT event stream processing.

Crichlow, Matthias Caretta (2020) A study on Blue Team’s OPSEC failures.

De Miguel Aramburu, A. (2020) Vulnerability management in organizations.

Ferronato, Giovanni (2020) IoT White Worms : design and application.

Gerats, B.G.A. (2020) Individual action and group activity recognition in soccer videos.

Groot Roessink, R. (2020) Experimental review of the IKK query recovery attack : Assumptions, recovery rate and improvements.

Haalstra, O.N.R. (2020) Browser Anti-Fingerprinting as a pathway to Impersonation and Fraud.

Harmes, J.P.M. (2020) A threat model analysis of audio recording on mobile health care applications.

Heerlien, I.R. (2020) Automatic detection of user errors in spirometry data using machine learning techniques and the analysis of the effect of metaphors on the quality of spirometry measurements.

Hendriks, C. (2020) Proactively detecting crafted domains using active DNS measurements.

Hengst, Kimberly (2020) Best Practices in Cloud Incident Handling.

Heus, Steven de (2020) Designing and Evaluating an Educational Board Game.

Heuver, Rien / P.R. (2020) Generating facial morphs through PCA and VAE.

Honig, J.J. (2020) Incremental symbolic execution.

Ikink, D.T.R. (2020) Security for an Internet-of-Things Network in the Context of a Dairy Management System.

Kahraman, G.M. (2020) Characterizing Sender Policy Framework configurations at scale.

Kamies, Bram (2020) Abeona: A generalized framework for state space exploration algorithm composition.

Keijzer, N. (2020) The new generation of ransomware : an in depth study of Ransomware-as-a-Service.

Kemp, Tim (2020) An algorithmic approach to a conjecture of Chvátal on toughness and hamiltonicity of graphs.

Konings, S. (2020) Source code metrics for combined functional and Object-Oriented Programming in Scala.

Korpershoek, J.J. (2020) Profiling encryption algorithms using ARM-based cache eviction attacks.

Kortekaas, Y.A.M. (2020) Access Pattern Hiding Aggregation over Encrypted Databases.

Kortstra, Wybren (2020) Automatic Registration of Clinical Auditsfor Head and Neck Oncology at MST.

Leeuwen, P. van (2020) FPGA-on-FPGA emulation using subgraph homeomorphism.

Lu, C. (2020) Deep sleep stage detection.

Mehra, A. (2020) Deepfake detection using capsule networks with long short-term memory networks.

Meijer, Gerben (2020) Producing high quality face morphs using GANs.

Miedema, Lukas (2020) QuickInterp - Improving interpreter performance with superinstructions.

Monshouwer, R. (2020) Detection of subclinical ketosis in dairy cows using behaviour sensor data.

Nass, Mathieu (2020) Wi-Fi based range-only constraint integration in RTAB-Map.

Ni, Z. (2020) An improved Java-based single sign-on solution.

Padje, J. van 't (2020) The impact of the Dutch weather on the health of horses.

Pebesma, J.L. (2020) Towards transfer learning in e-discovery : finding the optimal classifier and evaluating domain adaptation methods.

Prins, J. (2020) Proactive recognition of domain abuse.

Rai, Shubham (2020) Behavioral Threat Detection : detecting Living of Land Techniques.

Reesink, T.B.J. (2020) Creating 3D faces from 2D images using GANs.

Romkema, J.F. (2020) Development of a NOx Emission Model using advanced regression techniques.

Rooijen, J. van (2020) Sustainability of cancer drug prices using UPPAAL.

Rotari, Cristian (2020) Secure and transparent dispute resolution system in supply chains using hyperledger fabric.

Rubbens, R.B. (2020) Improving Support for Java Exceptions and Inheritance in VerCors.

Sartori, Damiano (2020) Redactable Blockchain : how to change the immutable and the consequences of doing so.

Scholten, R.H.D. (2020) Secure biometric verification in a malicious attacker model setting.

Sessink, Danique (2020) Creating and Maintaining Organizational Security Awareness in SMEs.

Sivasubramanian, Kimsukha Selvi (2020) A comparative analysis of Post-Quantum Hash-based Signature Algorithm.

Song, X. (2020) Generative Adversarial Networks of Missing Sensor Data Imputation for 3D Body Tracking.

Stikkelorum, M.J. (2020) Automated discovery of BACnet relations from bus traffic.

Sánchez Ortiz, Elvira (2020) Zero-Knowledge Proofs applied to finance.

Theodorus, Abraham (2020) Restoration of damaged face statues using deep generative inpainting model.

Thijssen, P.G.H. (2020) OCL constraints in GROOVE.

Varris, V. (2020) Using adversarial reinforcement learning to evaluate he IMMUNE risk-assesment.

Ven, F.R. (2020) Forecasting yearly unplanned maintenance on underground waste containers based on maintenance history and demographics.

Wieren, J.J. van (2020) Rolling contact fatigue defects on the Dutch railway: a data-driven analysis.

Wijburg, K.M. (2020) The state of statechains : exploring statechain improvements.

Yenidogan, Berk (2020) 30-Days post-operative mortality prediction of elderly hip fracture patients.

Zwan, J.M. van der (2020) Detection and tracking of events using open source data.

Zwet, Dennis van der (2020) Assessing road quality and driver behavior using movement sensors in wrist worn devices.

Şakar, Ö.F.O. (2020) Extending support for axiomatic data types in VerCors.

2019

Arican, Tugce (2019) Optimization of a patch-based finger vein verification with a convolutional neural network.

Açikalin, M.A. (2019) Profiling Recursive Resolvers at Authoritative Name Servers.

Barbara, Mario Alessandro (2019) Proof of All : Verifiable Computation in a Nutshell.

Bergsma, D. (2019) Porting tree-based hash table compression to GPGPU model checking.

Blok, T. (2019) ZITA : a self learning tutoring assistant.

Brunsveld, R.D. (2019) Determining the Satisfiability of Car Configuration Models in a Repetitive Manner.

Casano, F. (2019) Identifying how vendors and clients manage red teaming.

Chen, Qiurui (2019) EEG hyperscanning study of team neurodynamics analysis during cooperative and competitive interaction.

Coniglio, Luigi (2019) Combining program synthesis and symbolic execution to deobfuscate binary code.

Dai, L. (2019) Human perception of an adaptive agent's fear simulated based on TDRL Theory of emotions.

Danielecki, Daniel Mariusz (2019) Security first approach in development of Single-Page Application based on Angular.

Drechsel, Alexander (2019) Automatic instance-based matching of database schemas of web-harvested product data.

Duits, Ines (2019) The Post-Quantum Signal Protocol : Secure Chat in a Quantum World.

Emous, Rob J. van (2019) Towards systematic black-box testing for exploitable race conditions in web apps.

Enendu, Somtochukwu (2019) Predicting Semantic Labels of Text Regions in Heterogeneous Document Images.

Florijn, W.J. (2019) Information retrieval by semantically grouping search query data.

Haasjes, R.E.Y. (2019) Metamodel transformations between UML and OWL.

Jansen, Joost (2019) Detecting Combosquat Domains using Active DNS Measurements : communication of incident severity between customers and analysts in a SOC.

Jong, Koen de (2019) Detecting the online romance scam: Recognising images used in fraudulent dating profiles.

Karchev, F. (2019) IOT device profiling for Honeypot generation.

Kazmi, Syeda Nazish (2019) Access Control Process for a SaaS Provider.

Klanberg, Indrek (2019) Simulated Silicon Dopant networks : optimizing simulations, searching for boolean gates and visualization.

Kock, Joeri (2019) A signature-based Approach to DDoS Attack Mitigation using BGP Flowspec Rules.

Kock, Ties de (2019) Visualization recommendation in a natural setting.

Kokkelkoren, R. (2019) Catching Flux-networks in the open.

Kolev, Stiliyan (2019) Automation of software vulnerability monitoring for third party products in large IT companies.

Koopman, Michael (2019) A framework for detecting and preventing security vulnerabilities in continuous integration/continuous delivery pipelines.

Laat, Martin de (2019) Design and validation of Software Requirements Specification evaluation checklist.

Legoy, V.S.M. (2019) Retrieving ATT&CK tactics and techniques in cyber threat reports.

Lukman, Ivan (2019) Complete Characterization of Publicly Available Domain Blacklists.

Man, R.J.P. de (2019) A formalisation of EMF by expressing Ecore as GROOVE graphs.

Masud, Muhammad Ahmed (2019) An Open Source Intelligence (OSINT) framework for online investigations.

Meijerink, M.M.J. (2019) Anomaly-based detection of lateral movement in a Microsoft Windows environment.

Merdis, Vasileios (2019) Wireless communication protocols for home automation exploring the security and privacy aspects of smart home IoT devices communicating over the Z-Wave protocol.

Mulder, Henk (2019) Performance of program verification with VerCors.

Möllering, Helen (2019) Thwarting Semantic Backdoor Attacks in Privacy Preserving Federated Learning.

Nguyen, ir. H.M. (2019) Formal verification of a red-black tree data structure.

Papadopoulos, Antonios (2019) The quest of "dethroning" passwords from (web)authentication schemes.

Postema, J.T. (2019) Explaining system behaviour in radar systems.

Prudnikova, Anna (2019) Standardized security assessment framework for ICS devices and pilot project.

Riva, Giovanni Maria (2019) Privacy architecting of GDPR-compliant high-tech systems : the PAGHS methodology.

Roppelt, J.C. (2019) Security risks surrounding cryptocurrency usage : a study on the security risks of cryptocurrencies and how security perception affects usage.

Ros, K. M. (2019) Airport restroom cleanliness prediction using real time user feedback data and classification techniques.

Sadad, Akhyar (2019) Reusable machine learning framework for predicting future system performance : a comparison study of validation strategy on WWTP time series data.

Schutte, J.J. (2019) Design of a development platform to monitor and manage Low Power, Wide Area WSNs.

Siers, W.H. (2019) Generating specifications for JSON APIs for formal and semantic use.

Sonderen, T. (2019) A Manual for Attack Trees.

Sridhar Bangalore Venugopal, Sridhar Bangalore Venugopal (2019) Automatic Generation of Access Control List on Mellanox Switch For DDoS Attack Mitigation Using DDoS Fingerprints.

Srivastava, Siddhartha (2019) Benchmarking Facebook's Prophet, PELT and Twitter's Anomaly detection and automated deployment to cloud.

Stortelder, R. (2019) Enabling centralized access to a reactive architecture for hardware control systems.

Stritzl, David (2019) Privacy-Preserving Matching Using Bloom Filters: an Analysis and an Encrypted Variant.

Teesselink, T. (2019) Identifying Application Phases in Mobile Encrypted Network Traffic.

Torres Cano, Andrés Felipe (2019) Automatic aviation safety reports classification.

Trienes, Jan (2019) Comparing rule-based, feature-based and deep neural methods for de-identification of Dutch medical records.

Tujner, Zsolt (2019) Quantum-safe TOR, post-quantum cryptography.

Vasileiadis, Leonidas (2019) Remote runtime detection of tampering and of dynamic analysis attempts for Android apps.

Wels, S.J. (2019) Guaranteed-TX : The exploration of a guaranteed cross-shard transaction execution protocol for Ethereum 2.0.

Wiedijk, R.R.A. (2019) Code Instrumentation with Mod-BEAM.

Wieren, H.D. van (2019) Signature-Based DDoS Attack Mitigation: Automated Generating Rules for Extended Berkeley Packet Filter and Express Data Path.

Zande, M.J. van de (2019) Leveraging zero-knowledge succinct arguments of knowledge for efficient verification of outsourced training of artificial neural networks.

2018

Aalbertsberg, A.P. (2018) Synthesis and development of a big data architecture for the management of radar measurement data.

Beets, Fedor (2018) Privacy-preserving automated rental checking.

Beunder, K.M. (2018) Correlating features of malicious software to increase insight in attribution.

Bitew, Semere Kiros (2018) Logical structure extraction of electronic documents using contextual information.

Braham, K. (2018) Smart cities : crowd management using WiFi based infrastructure.

Coenraad, T (2018) Analist: A Tool for Improved Static Type Analysis for Ruby.

Crest, Côme du (2018) Scalability & Trustlines Network architecture.

Dijk, P.A.H. van (2018) An efficient simulation of crosslinked RAFT copolymerization.

Ekambaranathan, Anirudh (2018) Using stylometry to track cybercriminals in darknet forums.

El Assal, Karim M. (2018) Predicting user loyalty in an education support web application based on usage data.

Felix, P. (2018) Data-driven retail food waste reduction : a comparison of demand forecasting techniques and dynamic pricing strategies.

Fleur, S. la (2018) Static Analysis of Symbolic Transition Systems with Goose.

Geretto, Elia (2018) A QBDI-based Fuzzer Targeting Magic Bytes Comparisons.

Giessen, D. van de (2018) Implementing and Scaling HanzeNet.

Haan, T. de (2018) BLE Localization using switched-beam angle of arrival for pallet localization in warehouses.

Hazekamp, C. (2018) Inferring animal social interaction using proximity based on BLE and LoRa.

Heikamp, F. (2018) Gray-box Network Fuzzing using Genetic Algorithms and Code Coverage.

Hofstra, Matthijs (2018) Integrating Formal Methods Tools : A Case Study.

Hol, M.C. (2018) Using user workflow analysis to create insights in content-intensive applications : Combining Process Mining and Model-Driven Engineering to create a reusable, scalable and user-friendly solution.

Hoogervorst, R.W.P. (2018) A model-driven data-analysis architecture enabling reuse and insight in open data.

Hristov, I. (2018) A system for improving analysis of complexes in real estate asset management.

Iadarola, Giacomo (2018) Graph-based classification for detecting instances of bug patterns.

Juursema, J.A.J. (2018) Improving visual role mining using metadata.

Kester, J.J. (2018) CheckMerge: A System for Risk Assessment of Code Merges.

Klein Brinke, J. (2018) Device-free sensing and deep learning : analyzing human behavior through CSI using neural networks.

Klein Essink, B. (2018) iFat: an Interface for Fault/Attack Trees.

Lathouwers, S.A.M. (2018) Reasoning About the Correctness of Sanitizers.

Löwik, R.C.P. (2018) Tracking of wireless devices: is it possible and solvable?

Meijerink, M.J. (2018) A visual DSL for automating business processes.

Meinsma, D. (2018) Digging up Malware.

Michorius, J.A.R. (2018) Fair Machine Learning.

Nauta, M. (2018) Temporal causal discovery and structure learning with attention-based convolutional neural networks.

Nyante, K.A. (2018) Secure Identity Management on the Blockchain.

Onis, Ramon (2018) Does your model make sense? : Automatic verification of timed systems.

Oonk, N.M.J. (2018) Attribute Extraction from Darknet Markets and the Applicability of Transfer Learning.

Oude Weernink, M.J.P. (2018) Developing a system for the integration of vehicle data.

Pathak, Shreyasi (2018) Automatic structuring of breast cancer radiology reports for quality assurance.

Spel, Jip (2018) Monotonicity in Markov chains.

Spenkelink, J.S. (2018) Consumer-deployable network intrusion detection in public clouds.

Stegeman, Lars (2018) Solitor : runtime verification of smart contracts on the Ethereum network.

Szabó, Réka (2018) Penetration testing of AWS-based environments.

Tahir, A. (2018) Predicting Young Soccer Players Peak Potential with Optimal Age.

Timmer, I.R. (2018) Anomaly Detection of malicious TLS traffic.

Vulpoiu, Ruxandra (2018) Machine Learning Applications in Financial Advisory.

Wal, Djurre van der (2018) Translating AWN networks to the mCRL2 model checker: en route to formal routing protocol development.

Wessels, P.D. (2018) Leveraging behavioural domain models in Model-Driven User Interface Development with GLUI.

Wiefferink, T.W. (2018) Combining usage and profile data for retrospectively analyzing usability of applications with funnels.

Willemsen, M.J. (2018) Improving diagnosis by Grouping Test Cases to Reduce Complexity.

Zamani, M.R. (2018) Post-Quantum Secure Authentication Methods Suitable For Quantum Key Distribution.

2017

Ahmed, Owais (2017) Item availability restricted.

BOON, R.N. (2017) Automatic detection of anomalies in times series data Big data for smart maintenance.

Brink, B. van den (2017) Orchestrating Similar Stream Processing Jobs to Merge Equivalent Subjobs.

Brugman, Tristan (2017) A methodology for deriving aggregate social tie strengths from mobility traces.

Buit, L.J. (2017) Developing an easy-to-use Query language for verification of lighting systems.

Davanian, Ali (2017) Effective granularity in Internet badhood detection: Detection rate, Precision and Implementation performance.

Diallo, A.O. (2017) Traffic filtering based on subsystem component state.

Ede, Thijs S. van (2017) Detecting adaptive data exfiltration in HTTP traffic.

Ede, Thijs S. van (2017) Detecting adaptive data exfiltration in HTTP traffic.

Gupta, Amit Kumar (2017) Security risk analysis of automotive ethernet networks.

Jong, T. de (2017) Using Requirement Templates to Automate Requirements Formalization.

Jundt, O. (2017) Fashion product entity matching.

Kerkers, M. (2017) Assessing the Security of IEC 60870-5-104 Implementations using Automata Learning.

Korthout, N. (2017) Towards an architecture design for a future societal energy supply system.

Krak, R. (2017) Cycle-Accurate Timing Channel Analysis of Binary Code.

Kuipers, J.H. (2017) Anycast for DDoS.

Niesink, S.W.R. (2017) Improving biomedical information retrieval with pseudo and explicit relevance feedback.

Ong-A-Fat, K.K. (2017) Context Aware GPS Error Correction.

Pool, T.J. (2017) Drone swarming and combat management : visualizing and managing an autonomously functioning swarm of drones with as mediator Combat Management System(CMS).

Saeed, Aaqib (2017) Deep physiological arousal detection in a driving simulator.

Serban, A.C. (2017) Context based personalized ranking in academic search.

Shyvakov, O. (2017) Developing a security framework for robots.

Stevens, Stefanie Antonia (2017) Job satisfaction and work-life balance: an explorative study on remote workers.

Terpstra, E. (2017) Designing a requirements engineering process for performance monitoring.

Tjeerdsma, R. (2017) Developing a backend solution for ISO15118-driven EV charging with Plug-and-Charge.

Torbecke, Janina (2017) Symbolic Model Checking with Partitioned BDDs in Distributed Systems.

Winsen, Stijn van (2017) Threat modelling for future vehicles : on identifying and analysing threats for future autonomous and connected vehicles.

Zijden, W. van der (2017) Multi-Tenant Customizable Databases.

2016

Badin, Y. (2016) Contextual Authentication : Using Mobile Phone Movements to Authenticate Owners Implicitly.

Balk, Roland (2016) SQLento: database programming made easier.

Berg, T.M. van den (2016) Radar sensing for automotive parking distance control applications.

Beukema, W.J.B. (2016) Enhancing Network Intrusion Detection through Host Clustering.

Ciobotea, C. (2016) Improving payment authorization rates : by intelligently routing transactions.

Elsinga, J.W. (2016) On a framework for domain independent heuristics in graph transformation planning.

Esquivel-Vargas, Herson (2016) Automatic deployment of specification-based intrusion detection in the BACnet Protocol.

Evers, Florine (2016) The Content and Tone of the Media Coverage with regard to the Refugee Crisis in Dutch Popular and Quality Newspapers.

Fokkema, J. (2016) Using a challenge to improve face spoofing detection.

Heijblom, A.R. (2016) Using features of models to improve state space exploration.

Hijum, S. van (2016) Symbolic model checking of timed automata using LTSmin.

Hindriks, H.N. (2016) Vulnerability analysis of cyber security modelling language models using probabilistic logic.

Hoogesteger, Martijn (2016) Securing mobile VoIP privacy with tunnels.

Huistra, D.J. (2016) Automated generation of attack trees by unfolding graph transformation systems.

Jagannatha, P. (2016) Detecting Exploit kits using Machine Learning.

Janssen, Bas (2016) Determining truth in tweets using feature based supervised statistical classifiers.

Keller, Kristian M.Sc. (2016) A day ahead electricity storage flexibility prediction for peak shaving.

Koukoulis, Yannis (2016) Dual laser fault injection.

Laverman, G.J. (2016) Java Code Virtualization of Industrial-strength Java Code.

Le, Van Huynh (2016) Analyzing white-box designs for differential computation analysis resistance.

Maan, H.C. (2016) Item availability restricted.

Maat, GJ ter (2016) Towards a scalable environment for traffic information services.

Neele, Thomas (2016) GPU implementation of partial-order reduction.

Noort, W (2016) Gathering intelligence from the Bitcoin peer-to-peer network.

Odyurt, Uraz (2016) Bring your own authenticator/authentication security in physical access control systems.

Orij, J. (2016) Self-adaptation to concept drift in web-based anomaly detection.

Ouden, J.J.A. den (2016) A quest for the best automated tests : Estimating software reliability based on Spec Explorer's on-the-fly test results.

Outersterp, R.M. van (2016) Partitioning of Spatial Data in Publish-Subscribe Messaging Systems.

Peeters, J.J. (2016) Fast and Accurate Likelihood Ratio Based Biometric Verification in the Encrypted Domain.

Pijnenborg, I. (2016) Methodological guideline to find suitable design patterns to implement adaptability.

Ritterfeld, Thom (2016) On-demand app development.

Schroer, G.H. (2016) Feasibility of End-To-End Encryption using Attribute Based Encryption in Health Care.

Schultewolter, M. (2016) Verification of user information.

Slatman, H. (2016) Unboxing security analytics : towards effective data driven security operations.

Strooisma, Ale (2016) A monitoring solution for multi-language software.

Ullah, I. (2016) Detecting Lateral Movement Attacks through SMB using BRO.

Verkuil, S. (2016) CiteRep - Journal Citation Statistics for Library Collections using Document Reference Extraction Techniques.

Vonk, Jeroen (2016) Bisimulation Reduction with MapReduce.

Vries, S.H.S. de (2016) Achieving 128-bit Security against Quantum Attacks in OpenVPN.

Wang, Q. (2016) A reference architecture for integration platforms.

Wilde, Lisa de (2016) A Bayesian Network Model for predicting data breaches caused by insiders of a health care organization.

Wolters, N.H. (2016) Analysis of Attack Trees with Timed Automata (transforming formalisms through metamodeling).

Zeilstra, J. (2016) Reasoning about Active Object Programs.

2015

Allah Bukhsh, Zaharah (2015) BPMN Plus : a modelling language for unstructured business processes.

Bloemen, V. (2015) On-The-Fly parallel decomposition of strongly connected components.

Bolhuis, M. (2015) Estimating Creditworthiness using Uncertain Online Data.

Bouius, B A.G. (2015) Characterising the Ripple Effects of Introducing Energy-Awareness Functionality in Cyber-Physical-Systems Software in Cyber-Physical System software.

Buuren, R.A. ten (2015) Domain-Specific Language Testing Framework.

Carvajal Gallardo, I. R. (2015) Privacy-preserving social DNA-based recommender.

Donselaar, V.L. van (2015) Low latency asynchronous database synchronization and data transformation using the replication log.

Drijfhout, Wanno (2015) The Knowledge Cloud: Evolving the data management paradigm.

Fonville, M.E. (2015) The virtual machine delivery network.

Gijsen, Stijn (2015) Runtime Permission Checking in Concurrent Java Programs.

Karampatzakis, E. (2015) Item availability restricted.

Kleverwal, J. (2015) Supervised text classification of medical triage reports.

Kruk, D.A. van der (2015) A domain-specific language for specifying distributed real-time software system configurations.

Kumar, Atul (2015) Security Analysis of Mobile Payment Systems.

Lanting, Peter (2015) Multi-level views in a SUM-based environment.

Leur, C. de (2015) Permission-based separation logic for Scala.

Martakis, A. (2015) Framework for Enterprise Uncertainty-Driven Decision-Making : FEUD.

Middelesch, E.W. (2015) Anonymous and hidden communication channels : a perspective on future developments.

Müller, M. C. (2015) SIDekICk - Detecting Malicious Domain Names in the .nl Zone.

Oortwijn, W.H.M (2015) Distributed Symbolic Reachability Analysis.

Parzian, Alessio (2015) Java Card Bytecode Verification. Designing a novel verification system.

Rodday, Nils Miro (2015) Exploring Security Vulnerabilities of Unmanned Aerial Vehicles.

Scrinzi, F. (2015) Behavioral Analysis of Obfuscated Code.

Senden, J.M.J. (2015) Biasing a ring-oscillator based true random number generator with an electro-magnetic fault injuction using harmonic waves.

Stottelaar, Bas G.B. (2015) Practical cyber-attacks on autonomous vehicles.

Veen, H. van der (2015) Composing a more complete and relevant Twitter dataset.

Venis, A.J. van de (2015) Recommendations using DBpedia : how your Facebook profile can be used to find your next greeting card.

Visser, N.S. (2015) Fully automated web harvesting using a combination of new and existing heuristics.

Vries, J. de (2015) The Generation of Booter (black)lists.

Zanetti, Nicola (2015) Concept-drift in web-based IDS : evaluating current capabilities & future challenges.

Zhang, Shu (2015) How do technical companies use microblogging?

2014

A., E. (2014) Item availability restricted.

Akbar, Nurul (2014) Analysing Persuasion Principles in Phishing Emails.

Amrin, Nabila (2014) The Impact of Cyber Security on SMEs.

Anagnostopoulos, Nikolaos Athanasios (2014) Optical fault injection attacks in smart card chips and an evaluation of countermeasures against them.

Aregay, Tesfay (2014) Ranking Factors for Web Search : Case Study in the Netherlands.

Badarinath Hampiholi, Brinda (2014) Secure & privacy-preserving eID systems with Attribute-Based Credentials.

Bortolameotti, Riccardo (2014) C&C Botnet Detection over SSL.

Broekhuis, Djurre (2014) Sousveillance on Intelligent Transportation Systems.

Broenink, Ralph (2014) Finding Relations Between Botnet C&Cs for Forensic Purposes.

Corradin, M.C. (2014) Then and Now: On The Maturity of Cybercrime Markets : A study on regulation enforcement of forums in the online underground trading economy.

Davelaar, K.I. (2014) Protecting high school students from bullying: Bully Shield.

Drenthen, S. (2014) Towards continuous delivery in system integration projects : introducing a strategy to achieve continuous delivery and test automation with FitNesse.

Erich, Floris Marc Arden (2014) Improving information system development and operations using the DevOps conceptual framework.

Galen, Rick van (2014) Design and feasibility of mobile peer-to-peer payment systems.

Gielen, M W (2014) Prioritizing Computer Forensics Using Triage Techniques.

Haji Ghasemi, Maryam (2014) Symbolic model checking using Zero-suppressed Decision Diagrams.

Heer, G.W.A. de (2014) Instance Pointcuts.

Heuven, D.W. (2014) Opportunistic sensing & Aggregation network Using Smartphones and Sensor nodes.

Hummel, Tim (2014) Exploring Effects of Electromagnetic Fault Injection on a 32-bit High Speed Embedded Device Microprocessor.

Hurne, I. van (2014) Towards a Unifying Framework for Modelling and Executing Model Transformations.

Jonker, M. (2014) Flow-based SSH Dictionary Attack Detection: the Effects of Aggregation.

Joustra, Yme (2014) Forecasting of wind power production in the Netherlands.

Kamp, T.R. van de (2014) Combining ABCs with ABE: Privacy-Friendly Key Generation for Smart Card Based Attribute-Based Encryption.

Kandziora, Jorne (2014) Runtime assertion checking of multithreaded Java programs - An extension of the STROBE framework.

Kegel, R.H.P. (2014) Development and Validation of a Personal Information Security Assistant Architecture.

Knippers, D. (2014) Querying Uncertain Data in XML.

Lenthe, J.M. van (2014) Combining Multiple Malware Detection Approaches for Achieving Higher Accuracy.

Loker, Andre (2014) Evaluating data structures for runtime storage of aspect instances.

Maat, Roel ter (2014) A Framework for Modular Implementation of Domain-Specific Event-Based Applications.

Marenco Zúñiga, Andrés (2014) Federated Aggregated Search.

Meijer, J.J.G. (2014) Improving Reachability Analysis in Ltsmin - Guards, Read, Write and Copy Dependencies for mcrl2, Promela and Dve.

Mirchev, Hristofor (2014) Creating a Modular AspectJ Foundation for Simple and Rapid Extension Implementation.

Pallett, Dennis (2014) Improving Query Performance of Holistic Aggregate Queries for Real-Time Data Exploration.

Smid, Wietse (2014) Ad-hoc context-driven changes in a business process management system.

Staicu, Cristian-Alexandru (2014) Evaluation of HIMMO with Long Identifiers, an Extension of the HIMMO Key Establishment Scheme.

Tax, Niek (2014) Scaling Learning to Rank to Big Data: Using MapReduce to parallelise Learning to Rank.

Verbij, Ruud Paul (2014) Dutch e-voting opportunities. Risk assessment framework based on attacker resources.

Vercammen, S.A.A. (2014) Displaying intermediate results for on-going searches.

Vries, W.B. de (2014) How asymmetric is the Internet? A Study to support DDoS Mitigation approaches.

Weber, Vincent (2014) UTFM - a Next Generation Language and Tool for Feature Modeling.

Welling, Ruud (2014) Conflict detection and analysis for single-pushout high-level replacement.

Wevers, Gerben (2014) Hardware accelerator sharing within an MPSOC with a connectionless NOC.

Wiegers, R.F.P. (2014) Behavior specification for ontologically grounded conceptual models.

Windhouwer, Dennis (2014) The Modularity of the Resource Utilization Model in Python.

2013

Beek, Daan van (2013) Comparing the LTSmin and NuSMV reachability tools via automatic translation of their respective input languages.

Been, Henry (2013) Finding you on the Internet : Entity resolution on Twitter accounts and real world people.

Berg, F.I. van der (2013) Model checking LLVM IR using LTSmin : using relaxed memory model semantics.

Bruijn, Vincent de (2013) Model-based testing with graph grammers.

Bullée, Jan-Willem (2013) Detection of leadership in informal (small) groups based on CCTV information.

Companjen, Ben (2013) Probabilistically matching author names to researchers.

Cornelissen, Richard (2013) Towards a methodology-growing framework.

Dirlik, S. (2013) A comparison of FFT processor designs.

Duerink, Hendrik Lodewijk (2013) Information System Data Flow within Performance Based Logistics.

Fluttert, Ernst (2013) Deciding between mobile implementation platforms - A multi-criteria decision system for implementation platforms for mobile applications.

Hemert, Teun van (2013) Implementing flexible, extensible composition operators.

Heus, Marije de (2013) Design and evaluation of a recommender system for high school courses in the Netherlands.

Huijgen, Arris (2013) Effciently protecting virtualized desktop infrastructures against malware : Performance comparison between traditional- and centralized antivirus.

Hullu, Clermond de (2013) Architectural design of modular ESB systems.

Höfer, Christina (2013) Privacy-Preserving : Charging for eMobility.

Ionita, Dan (2013) Current established risk assessment methodologies and tools.

Kuiper, Guus (2013) Guaranteed-throughput improvement techniques for connectionless ring networks.

Laarakkers, Mark (2013) Generating continuation passing style code for the co-op language.

Misra, Gaurav (2013) Permeance of ICT in crime in India.

Moll, René (2013) A DFT based synchronization scheme for chirped communication.

Nguyen, A.D. (2013) Integration of IEC 61850 mms and lte to support remote control communications in electricity distribution grid.

Olthuis, Ferry (2013) A comparison of state space reduction techniques in SCOOP.

Pasveer, Marco (2013) Importance sampling for probabilistic timed automata.

Pham, Giang T. (2013) Integration of IEC 61850 MMS and LTE to support smart metering communications.

Postema, B.F. (2013) Fluid survival tool: a model checker for Hybrid Petri nets.

Riet, M. van 't (2013) Trace-based debugging for advanced-dispatching programming languages.

Roemers, Arnout (2013) An adapter-aware, non-intrusive dependency injection framework for Java.

Schade, Christiaan Leonard (2013) FCScan: A new lightweight and effective approach for detecting malicious content in electronic documents.

Sepulveda Bradford, G.U. (2013) What happens when a robot favors someone?: how a museum-guide robot uses gaze behavior to address multiple persons while storytelling about art.

Smulders, Edwin (2013) User Space Memory Analysis.

Tesfay, Tesfahun Aregawy (2013) Automatic distribution analysis of business processes for cloud-based BPM.

Ugen, Mattijs (2013) Scalable performance for a forensic database application.

Valtulina, Luca (2013) Seamless distributed mobility management(dmm) solution in cloud based lte systems.

Veen, G.F.P. van (2013) Brain Invaders - Finding the paradox of control in a p300-game through the use of distractions.

Verver, Maks (2013) Practical improvements to parity game solving.

Wal, Jelmer ter (2013) Specification and verification of selected parts of the Java Collections Framework using JML* and KeY.

Wit, Jeroen de (2013) Continuous forensic readiness.

Zarghami, S. (2013) Middleware for Internet of things.

2012

Bamberg, Rob (2012) Non-deterministic generalised stochastic petri nets modelling and analysis.

Beusink, J.W.C. (2012) Secure access contol to personal sensor information in federations of personal networks.

Blankendal, Göran (2012) Building an Xtext compiler for Aspect-Oriented Languages based on ALIA4J.

Brands, E.H.T.B. (2012) Flow-based monitoring of GTP traffic in cellular networks.

Broek, J.D.A. van den (2012) Design and implementation of an analog-to-time-to-digital convertor.

Broek, Jurgen Gijs van den (2012) Real-world analyses of internet protocols.

Bruintjes, Harold (2012) Bridging GROOVE to the world using a conceptual language model.

Burgman, Ronald (2012) Partial-order reduction based on probe sets.

Dijk, Tom van (2012) The parallelization of binary decision diagram operations for model checking.

Donker, J.H. (2012) Handfish - tunable heterogenous multi-core simulators on multi-core hosts.

Gehring, Felix (2012) Software performance prediction in early development phases: A UML- and simulation-based approach.

Gerritsen, Jan-Henk (2012) Detecting synchronization conflicts for horizontally decentralized relational databases.

Heijden, Rens W. van der (2012) SeDyA: secure dynamic aggregation in VANETs.

Heukels, Rolf (2012) Predicting user behavior using transition probability.

Hobert, L.H.X. (2012) A study on platoon formations and reliable communication in vehicle platoons.

Hoeve, Thijs ten (2012) Model based testing of a PLC based interlocking system.

Hofste, J. (2012) Scalable identity extraction and ranking in Tracks Inspector.

Ketelaar, J.G. (2012) Controller design for a bipedal robot with variable stiffness actuators.

Keuper, D. (2012) XNU : a security evaluation.

Kuperus, Jasper (2012) Catching criminals by chance: a probabilistic approach to named entity recognition using targeted feedback.

Middag, Jacob (2012) Convergence of an implicit runge-kutta discontinuous Galerkin method using smooth limiters.

Mols, Emiel (2012) Sharding Spotify search.

Noppen, I. (2012) Assessing the benefits of spectrum sharing in wireless access networks.

Oostinga, Ruben (2012) A java bridge for LSTMIN.

Ottow, Christiaan (2012) Hacking the next web: penetration testing over IPv6.

Scheerens, Daan (2012) Practical indoor localization using bluetooth.

Schot, N. (2012) QoS-aware model-driven SOA using SoaML.

Siaw, Tien Loong (2012) Saturation for LTSmin.

Spijker, Hanno (2012) Improving information dissemination in sparse vehicular networks by adding satellite communication.

Stapersma, Paul (2012) Efficient query evaluation on probabilistic XML data : derived from a glue process with skeleton & flesh.

Stemmer, Joel (2012) detecting outliers in web-based network traffic.

Stokkink, Gerjan (2012) Quiescent transition systems.

Teka, Abelneh Y. (2012) Analysis of indirect influence relations in goal-oriented requirements engineering.

Terwellen, Christian (2012) Evaluating the behavior of embedded control software : using a modular software-in-the-loop simulation environment and a domain specific modeling language for plant modeling.

Verberkt, S.L.C. (2012) Claiming security properties in a service oriented architecture.

Vermolen, R.M. (2012) The red queen’s race: from delivery stories to effort estimation: an empirical study.

Wagenaar, P. (2012) Detecting botnets using file system indicators.

Wevers, Lesley (2012) A persistent functional language for concurrent transaction processing.

Zandberg, Martin (2012) Optimization of aspect-instantiation strategies in the JIT-compiler.

2011

Adolfsen, Martijn (2011) Industrial validation of test coverage quality.

Bosems, Steven (2011) A Performance Analysis of Model Transformations and Tools.

Brinke, Steven te (2011) First-order function dispatch in a Java-like programming language.

Bruintjes, Tom M. (2011) Design of a Fused Multiply-Add Floating-Point and Integer Datapath.

Dekens, Berend (2011) Mapping of a DAB Radio Decoder to Homogeneous Multi-Core SoC : a case study to evaluate a NLP based mapping flow.

Ende, Frederik van den (2011) Interference Nulling via a Resistor-Weighted Op-Amp Vector Modulator.

Fritz, Jako (2011) Hybrid Intrusion detection network monitoring with honeypots.

Goos, Sander (2011) A model driven approach to modernizing legacy information systems.

Harleman, T. (2011) Towards a generic model for audit trails.

Hassani, A.Z. (2011) Touch versus in-air Hand Gestures : Evaluating the acceptance by seniors of Human-Robot Interaction using Microsoft Kinect.

Hegeman, Erik (2011) InfoSupport : On the Quality of Quality Models.

Jeeninga, Jesper (2011) Improving communication between computer programmers and domain experts : creating a generic scenario description language to aid the process of describing scenarios for emergency response training simulators.

Klifman, T.E. (2011) Propagation of Annotations in a Streaming Context.

Lastdrager, Elmer (2011) Securing Patient Information in Medical Databases.

Meijer, Michael (2011) On a Design Space for Aggregating over Sliding Windows on a Stream.

Nijenhuis, C.F. (2011) Automatic generation of graphical domain ontology editors.

Noltes, Johan (2011) Data location compliance in cloud computing.

Nouta, Christiaan Alexander (2011) Data processing networks made easy : improving development possibilities for people with limited computer science knowledge.

Obbink, Michel (2011) Social interaction in a cooperative brain-computer interface game.

Op 't Land, Sjoerd (2011) Ranging and localisation error mitigation in indoor obstructed direct path conditions.

Pater, Elwin (2011) Partial Order Reduction for PINS.

Peng, Yuxi (2011) Face Recognition at a Distance: a study of super resolution.

Rajput, Abdul Ghani (2011) Properties Relevant for Inferring Provenance.

Schutte, Rik (2011) Maintaining the causal thread of execution in distributed and multilanguage software.

Veen, Dirk van (2011) Secure searching through encrypted data - Creating an efficient Hidden Vector Encryption construction using Inner Product Encryption.

Wal, Tjalling van der (2011) Streaming workflow transformation.

2010

Admiraal, A.J. (2010) Automated ANTLR tree walker generation.

Alemneh, E. (2010) Sharing nonlinear gates in the presence of glitches.

Baardman, Roel (2010) Cumulus Humilis : wireless mesh-networking for gliders.

Bakker, P.J. (2010) Train composition using motion as a common context.

Bukhsh, Faiza Allah (2010) Enhanced ICoNos maturity model.

Costa, Alvise (2010) Context - Free - Language Parser for Advanced Network Intrusion Detection.

Hollander, Emiel (2010) Dynamic access control.

Horst, Arie (2010) Sport coach : online activity using wireless sensor network.

Hove, D. ten (2010) Change management within SysML requirements models.

Kant, Gijs (2010) Distributed state space generation for graphs up to isomorphism.

Khadka, Ravi (2010) Model-driven development of service compositions : transformation from service choreography to service orchestrations.

Kok, Guido (2010) Cloud computing & confidentiality.

Korevaar, Cornelis Willem (2010) A time-frequency localized signal basis for multi-carrier communication.

Kroes, S. (2010) Domain specific embedded languages and model driven engineering.

Lange, R-J. de (2010) Provenance aware sensor networks for real-time data analysis.

Lavooij, K. (2010) Near-real time statistics gathered from a continuous and voluminous data mutation stream.

Lin, Y. (2010) Architecture for IP based interconnection of heterogeneous wireless communication systems for mission-critical group oriented communications.

Moel, E.L. de (2010) Expanding the usability of recorded lectures : a new age in teaching and classroom instruction.

Palsma, T. (2010) Discovering groups using short messages from social network profiles : using hierarchically organized concepts to discover relations.

Peterson, R.S. (2010) Testing real-time requirements for integrated systems.

Punter, C.M. (2010) Multi-source entity resolution.

Schwartzenberg, J. (2010) Using machine learning techniques for advanced passive operating system fingerprinting.

Sijtema, Marten (2010) Managing variability in model transformations for model-driven product lines : extending the ATL model transformation language with variability management capabilities.

Sikkens, B. (2010) The storage and retrieval of sensor data and its annotations.

Slomp, G.H. (2010) Reducing UPPAAL models through control flow analysis.

Spijkerman, Wietze (2010) Tool support for change impact analysis in requirement models : exploiting semantics of requirement relations as traceabilitt relations.

Stuurman, Gijs (2010) Action semantics applied to model driven engineering.

Voorst, B. van (2010) Cluster-based collection selection in uncooperative distributed information retrieval.

Wester, Rinse (2010) A dataflow architecture for beamforming operations.

Yin, Haihan (2010) Developing a generic debugger for advanced-dispatching languages.

Zanden, Guido van der (2010) Quality assessment of medical health records using information extraction.

2009

Baaij, C. (2009) CλasH : from Haskell to hardware.

Barbosa, Rafael Ramos Regis (2009) On Access Network Identification and Characterization.

Blom, Koen (2009) DVB-S signal tracking techniques for mobile hased arrays.

Bockting, S. (2009) Collection selection for distributed web search : using highly discriminative keys, query-driven indexing and ColRank.

Braak, Timon D. ter (2009) Run-time spatial resource management in heterogeneous MPSoCs.

Brand, A. (2009) An investigation in qualities of software variability.

Diepenmaat, J. (2009) Object XML mappings.

Everse, Wouter M. (2009) Modelling and Verification of a Shortest Path Tree Protocol for Wireless Sensor Networks : Towards a Platform for Formal Verification Experiments.

Graaff, V. de (2009) Towards distributed information access : possibilities and implementation.

Hagendoorn, B. (2009) Viscous coupling between bio-inspired hair-sensors.

Kingma, J. (2009) Combined VCO/Mixer for satellite receiver in CMOS.

Koelewijn, J.W. (2009) Resource operations model in a dynamic world.

Kroon, E. (2009) Layered configuration management for software product lines.

Laarman, A. (2009) An Ontology-Based Metalanguage with Explicit Instantiation.

Looman, S.A.M. (2009) Impact Analysis of Changes in Functional Requirements in the Behavioral View of Software Architectures.

Meij, D.P.L. van der (2009) A metamodeling approach to incremental model changes.

Muis, Allard (2009) Patterns in data conversion.

Mutter, T. (2009) Partition-based network load balanced routing in large scale multi-sink wireless Sensor Networks.

Nijkamp, Barry (2009) Using functional design patterns to improve exports to management information systems.

Oostrum, A. van (2009) A model and specification for development of enterprise application frameworks.

Rietema, Richard (2009) Automatic Verification and Analysis of Test Results of Océ Printers.

Roodenburg, S.B. (2009) Scheduling the sequential hardware-in-the-loop simulator.

Sulistyo, Pythia (2009) Inter-Organizational Strategic Information Systems Planning (IOSISP) in Network Perspective: How Network Governance Influences IOSISP Effectiveness Evaluation of Healthcare, Government and logistic/Transport Industry Sectors in the Netherlands.

Tjink-Kam-Jet, Kien-Tsoi T.E. (2009) Result merging for efficient distributed information retrieval.

Veldhuis, J.W. (2009) Tool support for a metamodeling approach for reasoning about requirements.

Veldman, I. (2009) Matching profiles from social network sites : similarity calculations with social network support.

Vliek, G. (2009) Detecting spam machines, a netflow-data based approach.

Vrielink, Jasper D. (2009) Phased array processing: direction of arrival estimation on reconfigurable hardware.

Vries, E. de (2009) Touchscreen interaction for healthcare applications.

Westmijze, M. (2009) Memory optimizations on the sequential hardware-in-the-loop simulator.

Wolterink, T.J.L. (2009) Operational Semantics Applied to Model Driven Engineering.

2008

Babakhani, Bayan (2008) Implementation of a 2D master-slave system.

Bezemer, Maarten (2008) Analysing gCSP models using runtime and model analysis algorithms.

Bloem, E.J.W. van (2008) The user oriented knowledge management method : a knowledge management method for a small organization with a distributed environment.

Bloem, R.J.G. van (2008) A data transformation walkthrough.

Blumink, Remco (2008) Implementing and communicating with SHILS.

Boros, H. (2008) Context Discovery Adapter (CDA) Protocol.

Bosch, Stephan (2008) FollowMe! : distributed movement coordination in wireless sensor and actuator networks.

Daemen, P. (2008) ZMP based control in 3D passive dynamic walking.

Dam, Arjan (2008) Geographic routing in wireless sensor networks for surveillance : introducing a novel routing algorithm: GZOR.

Damman, B. (2008) Representing PCTL counterexamples.

Driezen, Wouter (2008) Service-oriented and open-source software as potential markets for applications markets : analysis of the possible added value of Capgemini outsourcing's Dutch applications management service center.

Eenennaam, E.M. van (2008) Providing over-the-horizon awareness to driver support systems by means of multi-hop ad hoc vehicle -to-vehicle communication.

Fournier, Bas (2008) Preprocessing on bilingual data for Statistical Machine Translation.

Franssens, Anne (2008) Analysis of Reed Solomon error correcting codes on reconfigurable hardware.

Gaiser, Vincent Alexander (2008) Improving spatial awareness in an indoor environment with wireless positioning technology.

Gerards, M. (2008) Streaming reduction circuit for sparse matrix vector multiplication in FPGAs.

Griffioen, H.T. (2008) Design of clock cleaner : a fast locking PLL.

Haanstra, Sander (2008) Analyzing and improving generalization over time in CSP-based Brain-Computer Interfaces.

Habib, Mena Badieh (2008) An intelligent system for automated arabic text categorization.

Henzen, S.F. (2008) A framework for service-oriented extensions to Ruby on Rails.

Ho, Yoeng Woey (2008) .NET integration TEAHA.

Jevring, Markus (2008) Automatic management of bluetooth networks for indoor localization.

Jonge, Marc de (2008) The SpinJ model checker : a fast, extensible, object-oriented model checker.

Jongeling, R. (2008) Signature modification for Compose?/.NET : implications of signature modification for generic compilers and behavioral signatures of types.

Kessel, Ruud van (2008) Querying Probabilistic XML.

Klooster, J-W. van 't (2008) Context, design and implementation of a control system for ring resonator-based optical beam forming networks.

Kruiskamp, Michel (2008) FastSOA : achieving high-performance service oriented architectures.

Lonnee, J. (2008) A scalable repository based on a meta-modelling architecture.

Looise, M.J. (2008) Inter-level consistency checking between requirements and design artefacts.

Lootsma, Marten (2008) Design of the global software structure and controller framework for the 3TU soccer robot.

Mahrof, Dlovan Hoshiar (2008) Design of a fully integrated RF transceiver using noise modulation.

Meppelink, Lianne (2008) Towards interoperability between existing VoIP systems.

Munsterman, Thijs Pieter (2008) Exploring software scalability : and a method for evaluating and improving software scalability.

Nijssen, Bobby J.W. (2008) Cooperative Intelligent Transportation Systems Building a demonstrator for the CVIS-project on the Informatieve Weg.

Oever, Daniel van 't (2008) CoNSoLe: A Domain Specific Language for Network Services.

Roolvink, S. (2008) Detecting attacks involving DNS servers : a netflow data based approach.

Schabbink, Johan (2008) Design of a capacitive based closed-loop displacement sensor.

Schilpzand, M.P. (2008) X-Stream in MaDAM : new junction modelling in macroscopic dynamic traffic assignment models.

Scholte, Theodoor (2008) Managing continuous uncertain data by a probabilistic XML database management system.

Sealy, Timothy (2008) Implementation of aggregation based Resource Management in DiffServ (RMD) Quality of Service Model (QOSM).

Steen, H. van der (2008) Design of animation and debug facilities for gCSP.

Timmer, M. (2008) Evaluating and predicting actual test coverage.

Twelkemeijer, R. (2008) Design of an audio power amplifier with a notch in the output impedance.

Uithol, Michiel (2008) Security in domain-driven design.

Velner, J. (2008) Integrated state-of-charge circuit for rechargeable batteries.

Vos, Geert (2008) Issues of iterative mda-bades software development processes.

Wit, Joost de (2008) Evaluating recommender systems : an evaluation framework to predict user satisfaction for recommender systems in an electronic programme guide context.

2007

Ambrosius, Frank (2007) Modelling and distributed controller design of the bodeRC paper-path setup.

Atketin, Namik (2007) Ontwikkeling van een interactieve model-gedreven E-formulier generator.

Baesjou, Bertrand (2007) Improving dependability of OSS access to a hierarchical distributed ad-hoc NMS.

Bergen, Marcel van (2007) Design and prototyping of a human-computer interface for a desktop tele-classroom conference application.

Bouwmeester, Egbert (2007) Continuous Classes of Power Amplifiers.

Braber, Kommer (2007) A policy based MBU control system using OSGi.

Dijk, Michel van (2007) Analysis and control of nonlinear oscillators.

Franken, Michel (2007) Ankle actuation for planar bipedal robots.

Gribnau, Erwin (2007) Analysis, design & implementation of a high-performance main-memory object database for Splice2.

Heddema, R.R. (2007) Strategy for a robot soccer team - Let’s play robot soccer -.

Hegge, Stephan (2007) Predicting end-to-end network characteristics on mobile devices.

Hoogsteder, V.J.M. (2007) Strategic performance measurement for eBuddy.

Huisman, Rolf (2007) Bugspray for composition filters.

Klaver, Ruud (2007) Using NSIS (Next Steps in Signaling) for support of QoS aware multimedia services.

Kooijman, Ruben (2007) See, hear, listen : head movements and the sensitive artificial listener.

Krijnen, Bram (2007) Heat flow modeling in copiers.

Kuperus, J.H. (2007) Nested quantification in graph transformation rules.

Kuppeveld, Teun van (2007) Model-based redesign of a self-balancing scooter.

Leong, Frank (2007) Design of an oscillator for satellite reception.

Maatjes, N.C. (2007) Automated transformations from ECA rules to Jess.

Molderink, Albert (2007) Feasibility Analysis of MPEG decoding on reconfigurable hardware.

Nguyen, V.Y. (2007) Optimising techniques for model checkers.

Nguyen, Viet Yen (2007) Optimising techniques for model checkers.

Oldenkamp, H.A. (2007) Probabilistic model checking : a comparison of tools.

Olthof, Mark (2007) Performance & Scalability of a Spatial Database in a GIS-Web Service Environment.

Oostveen, Laurens van (2007) Conductivity gradient focusing by pervaporationand osmosis-induced fluxes.

Ordelmans, L. (2007) The Creation of a Flexible, Functional Simulation Generator for the Montium Tile Processor.

Os, Roel van (2007) Optimizing XML information retrieval query execution at the physical level.

Papegaaij, E. (2007) The Tree Processing Language: Defining the structure and behaviour of a tree.

Plass, Martijn J.A. (2007) Rules Decomposition for Distributed Context Processing.

Portengen, Rik (2007) Phased array antenna processing on reconfigurable hardware.

Poulisse, Gert-Jan (2007) Exploiting inter-conceptual relationships to boost SVM classification.

Prins, Martin (2007) Fast retransmission for multicast IPTV.

Putten, Ing. A.E. van (2007) Behavioural hybrid process calculus translation to modelica.

Reede, Joost (2007) On A-Select and Federated Identity Management Systems.

Roes, J.B.M. (2007) Identifying and solving overlap between messaging standards with the help of domain models, illustrated with HR-XML’s SIDES and SEP.

Roo, A.J. de (2007) Towards more robust advice : message flow analysis for composition Filters and its Application.

Rozen, Riemer van (2007) A Debugging Framework for NIPS.

Sambeek, M. van (2007) Real-time shadow generation for 3D simulations using modern hardware.

Siles Del Castillo, Hugo (2007) Hybrid Content-Based Collaborative-Filtering Music Recommendations.

Smulders, Bram (2007) SQLbusRT : real time data distribution and storage.

Sombekke, N.B.H. (2007) Graph-Based Semantics of the .NET Intermediate Language.

Spenkelink, Roy David (2007) Porting Compose* to the Java Platform.

Staal, Eric (2007) Simulation with Hamiltonian mechanics : creating a module for 20-sim.

Stellinga, Anne (2007) A low-power second-order sampling receiver for Bluetooth.

Tinselboer, Koen (2007) The use of rare key indexing for distributed web search.

Veelen, P. van (2007) Clustered acoustic modelling in speech recognition.

Veen, Marcel van der (2007) Sparse matrix vector multiplication on a field programmable gate array.

Verdonkschot, S.F.G. (2007) Design and implementation of a trusted RFID reader.

Vervuurt, Mark (2007) Modeling business process variability : a search for innovative solutions to business process variability modeling problems.

Zwerus, Robert (2007) Storing Personal Information Management data: Akonadi - unifying PIM data for KDE.

2006

Backx, Niels (2006) On the design of a mobile e-health platform ¿ towards deployment flexibility.

Bos, Pieter (2006) Interacting with a virtual conductor.

Boschman, S.R. (2006) Performing transformations on .NET intermediate language code.

Broekhuijsen, Jeroen (2006) 2D Upper Body Pose Estimation from Monocular Images.

Buth, Maarten Dimmen (2006) Ball-handling motion control for soccer playing mini-robots.

Conradi, Olaf (2006) Fine-grained Join Point Model in Compose.

Derks, Theo (2006) Health at home.

Dijk, J.J. van (2006) Entiteitreconciliatie ondanks beperkte overlap door middel van objectgelijkheid : casus "Koppelen van persoonsgegevens zonder een gemeenschappelijke identificatie".

Dimitrova, Desislava C. (2006) Performance evaluation of RMD (Resource Management in DIFFSERV) within NSIS (Next Steps In Signaling).

Doornenbal, Ing. Dirk (2006) Analysis and redesign of the compose*language.

Engelen, L. van (2006) Massively parallel quantization implementation using simulated annealing.

Groen, Ruud (2006) Modelleren en analyseren van een Ethernet switch.

Heerde, Harold van (2006) Life-cycle privacy policies for the ambient intelligence.

Kattenbelt, M.A. (2006) Towards an explicit-state model checking framework.

Kemna, Tim (2006) Bisimulation minimisation and probabilistic model checking.

Koop, O.R. (2006) Continuous and discontinuous Galerkin finite element methods of variational Boussinesq water-wave models.

Leenslag, Wilco (2006) Werkwijze ter beoordeling van IT governance op basis van geaccepteerde methodes op het terrein van IT governance.

Linnenbank, Tristan (2006) Architectural Principles for Large Scale Web sites: a Case Study.

Nguyen, H.Q. (2006) Analysis of crosscutting concerns in QVT-based model transformations.

Noordhuizen, Paul (2006) Analyzing aspects in production : plans for software product lines.

Overbeek, J.F. (2006) Meta Object Facility (MOF): investigation of the state of the art.

Rorije, R.J. (2006) Input/output in functional languages : using algebraic uniontTypes.

Rovers, Kenneth C. (2006) Front-end research for a low-cost spectrum analyser : receiver system and topology study.

Sikkes, Bart (2006) A stable matching based adaptive subcarrier assignment method for multimodal fibre access networks.

Sirchia, Riccardo (2006) Realtime softwarematige radarscan conversie : met GPU programmeren.

Smelik, R.M. (2006) Specification and Construction of Control Flow Semantics : a generic approach using graph transformations.

Speelziek, M.D. (2006) Evaluating rapide using the FRODO service discovery protocol.

Spenkelink, Dennis (2006) Incremental Compilation in Compose*.

Steeden, Remco van (2006) Communication-centric debug of systems-on-chip using networks-on-chip.

Steen, J.L.P.J. van der (2006) Investigation of the band gap widening effect in thin silicon double gate MOSFETs.

Tetteroo, Arend-Jan (2006) Bomb-Proof Server : benodigde technieken en producten voor een high availability systeem en hun consequenties voor beschikbaarheid.

Veldhuijsen, Gerald van (2006) DICOM Image Retrieval.

Winkel, J.D. te (2006) Applying Composition Filters to C.

2005

Borkent, Michiel (2005) De- and recomposition of expression in music performance.

Havinga, W. (2005) Designating join points in Compose* : a predicate-based superimposition selector language for Compose.

Holzenspies, Philip (2005) SILC: SPRITE Input Language with C(++).

Nijenhuis, Barry (2005) Smart sign for smart surroundings.

Oosterhof, N.N. (2005) Application patterns in functional languages.

Withaar, T. (2005) Analyzing joint-measurements using 3D scancs and statistical models.

2004

Dikkers, E.J.W. (2004) Natural answer presentation through revision of syntactic patterns.

Evers, Sander (2004) Form follows function : Editor GUIs in a functional style.

Hobo, Emile Michel (2004) The General Theory of Consciousness : The Abstract Definition of the Processes Required for the Emergence of Consciousness.

Meijs, K.J. (2004) Generating natural narrative speech for the Virtual Storyteller.

Sloten, Jeroen van (2004) From SNMP to Web services-based network management.

Sözer, Hasan (2004) A peer-to-peer file sharing system for wireless ad-hoc networks.

Winkel, K.J. (2004) Upgrading Reactive Agents with Narrative Inspired Technology : What is the story?

2003

He, Xiaobo and Mayasari, Elisabeth E. (2003) A Design of Software Architecture for “SHAPE” Workforce Management Game.

2002

Nurdin, H.I. (2002) Mathematical modelling of bias and uncertainty in accident risk assessment.

2001

Agung Julius, A.A. (2001) Evolution of the modal densities of a class of stochastic hybrid systems.

Donckers, L. (2001) Energy Efficient TCP.

2000

Schiphorst, R. (2000) Demonstration of the Software-Radio Concept.

1996

Hiemstra, D. (1996) Using statistical methods to create a bilingual dictionary.

This list was generated on Thu Mar 28 06:05:26 2024 CET.