University of Twente Student Theses


Domain: 54 computer science

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Year | Item Type
Jump to: 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1996
Number of items: 1758.


Abbing, J.R. (2020) Semantic segmentation of minimally invasive anti-reflux surgery video using U-NET Machine Learning.

Ahmed, A.B.H. (2020) Balancing security and usability in Web Single Sign-On.

Alberts, L. (2020) Static verification for Snap!

Alblas, H.J. (2020) Predictive maintenance of Dutch civil infrastructure: a structured approach.

Arends, Simon Daniël (2020) Quantity meets quality for mined process models through simulated events.

Arkel, Lars van (2020) Demonstrating runtime assertion checking using Snap!

Artolozaga, Iñigo (2020) Mental health care in a pandemic : a survey from a design and interaction perspective.

Aslam, Suhaib (2020) Designing a ubiquitous artifact for enhancing the digital wellbeing of smartphone users.

Bandi, S.S.A. (2020) Inter-subject synchrony and emotional dynamics in magnetoencephalographic signals during music stimulation.

Banu, R. (2020) Internet of nano-things in human cancer detection.

Benen, N.J. (2020) Using Graphviz to create aesthetically pleasing LaTeXdrawings of graphs.

Berendse, S.E. (2020) Exploring semantic segmentation in rowing images.

Berg, J.L. van den (2020) An interactive visualization explaining probabilistic fault tree computations.

Berger, Kenaan (2020) Adoption of agile methods in automotive software development.

Berkhoff, M.H. (2020) VRwonder : the development & implementation of a Virtual Reality application for people with dementia.

Bertolotti, E.M. (2020) Item availability restricted.

Bosch, K.T.D. (2020) Item availability restricted.

Bosma, H.R. (2020) Increasing nutrient awareness with the Smart Kitchen Scale.

Brandl, L. (2020) FutureType : Word completion for medical reports.

Breggeman, F.T. (2020) Graph Isomorphism with Pathfinding Algorithms.

Brink, K. van den (2020) Finding “The Drop” : Recognizing the climax in electronic music using classification models.

Brinke, S.T. ten (2020) The Effect of Manipulating Perceived Action Boundaries On Catching Performance.

Brouwer, R (2020) Learning Timed Mealy Machines of the Physical Processes of an Industrial Control System for Anomaly-based Attack Detection.

Bruins, L.L.E. (2020) Validation of Legal Documents by comparing digital and printed photographs.

Brunt, B.W. (2020) Decreasing the computation time that's used for saving data in the DEMKit simulator.

Buser, Myrthe (2020) Towards stable feature detection for 3D reconstruction of the placental surface during the FLOVA procedure - Convolutional neural network based feature detection.

Cervone, B. (2020) Designing interactive data visualisations for RTL Nederland’s online news platforms : increasing visibility of the “volg” functionality and user engagement.

Chen, Zhiyuan (2020) Automatic detection of photographing or filming.

Chowdhary, A. (2020) Email-based Intelligent Virtual Assistant for scheduling (EIVA).

Constantinescu, E.M. (2020) An in-depth approach to fitting probability distributions using evolutionary algorithms.

Couwenbergh, W. (2020) Real-time assistance for people endangered by forest fires : Mobile application.

Cutina, Jennifer (2020) Assessing the use of process mining techniques to monitor the work process of commercial drivers.

Dai, Yinping (2020) Modelling the LIFE project using DEMKit.

Delfgaauw, Camilio (2020) Predicting car movement for autonomous driving through traffic using neural networks.

Diatmiko, G.P.K. (2020) Just-in-time intervention : Increasing young adults' fruit intake in an engaging way.

Dijkstra, F.B. (2020) Decoding Individual Contralateral and Ipsilateral Finger Movements from Electrocorticographic Signals Recorded over the Human Sensorimotor Cortex of a Single Hemisphere.

Diphoorn, W. (2020) A Smartphone Application for the Creation of Legal Document Photographs.

Doan, K.Q. and Hazelzet, H. and Slingerland, T.P. and Zoet, S. (2020) Pijndetectie bij volwassenen door middel van afbeeldingbewerking en transfer learning: Een stap in de richting van automatische en continue pijndetectie bij gesedeerde kinderen op de intensive care.

Dubowski, A. (2020) Activation function impact on Sparse Neural Networks.

Dulfer, R.M. (2020) The propaganda machine.

Engelenhoven, Adjorn van (2020) Modular Neural Networks using Multiple Gradients.

Filipovic, Simona (2020) Subpopulation process mining in healthcare.

Flapper, Edwin (2020) ETA Prediction for vessels using Machine Learning.

Flederus, D.R. (2020) Enhancing music genre classification with neural networks by using extracted musical features.

Garcia-Escallon, R.R. (2020) Enterprise architecture patterns : Supporting sustainable development.

Gavenavicius, M. (2020) Evaluating and comparing textual summaries using question answering models and reading comprehension datasets.

Geest, F. van der (2020) Finding a solution against loneliness among the elderly living in a senior housing complex with the help of remote co-design.

Greuter, K.O. (2020) Evaluating the quality of the international consumer IoT Cyber Security Standard.

Groot Roessink, R. (2020) Experimental review of the IKK query recovery attack : Assumptions, recovery rate and improvements.

Grooters, T. (2020) Analysing certificate transparency logs for let’s encrypt customer behaviour.

Gugten, L.A. van der (2020) Load balancing framework comparison.

Haarman, T.R. (2020) Analysing countermeasures against fault injection attacks on FPGA based cryptographic implementations.

Haas, A.N.J.P.M. (2020) Attitudes towards digital transformation at small enterprises : A cross-border analysis.

Ham, Laura (2020) The design of an Interactive Topic Modeling application for media content.

Hari, Atul (2020) A spatial cognitive exploration algorithm for autonomous mapping of unknown indoor environments.

Harmes, J.P.M. (2020) A threat model analysis of audio recording on mobile health care applications.

Harms, J.R. (2020) Research and Design of Collecting and Analysing the Customer Journey in a Collaborative Software Tool.

Hartvelt, S.J. (2020) Assessing the impact of data availability on parking prediction accuracy : a case study using a simulation-based Approach.

Hast, Fritz (2020) The Impact of 5G on Future Data Center’s Carbon Dioxide Emissions.

Heerlien, I.R. (2020) Automatic detection of user errors in spirometry data using machine learning techniques and the analysis of the effect of metaphors on the quality of spirometry measurements.

Heerlien, I.R. (2020) Automatic detection of user errors in spirometry data using machine learning techniques and the analysis of the effect of metaphors on the quality of spirometry measurements.

Heinen, Niek (2020) Using lightweight image classifiers for electrocardiogram classification on embedded devices.

Hendriks, C. (2020) Proactively detecting crafted domains using active DNS measurements.

Hengst, Kimberly (2020) Best Practices in Cloud Incident Handling.

Hetterscheid, K.J.T. (2020) Detecting agitated speech : A neural network approach.

Heus, Steven de (2020) Designing and Evaluating an Educational Board Game.

Heuver, Rien / P.R. (2020) Generating facial morphs through PCA and VAE.

Heyns, L. (2020) Converting Modest Models to Efficient Code.

Hoek, J.M. van (2020) Predicting purchasing intent of website visitors with deep feature learning.

Hofman, N. (2020) Enterprise social software acceptance : overhauling the "One Size Fits All" approach to explain social intranet usage.

Honig, J.J. (2020) Incremental symbolic execution.

Hormann, Tina Marie (2020) Web design for different user generations : the impact of aesthetics on emotions and quality perceptions.

Huiskes, Merle (2020) Automated robust planning for intensity modulated proton therapy (IMPT) in oropharyngeal cancer patients using machine learning.

Ignatius Patrick, Patrick (2020) Assessing LOKI by learning from Mitsuku and dataset themes.

Imbrea, A. (2020) An empirical comparison of automated machine learning techniques for data streams.

Imhof, Thomas (2020) Home telemonitoring acceptance for eye care patients.

Jaarsveld, F. van (2020) Estimating the effects of the Macroscopic Traffic Parameters on the overall Cooperative Awareness Message generations.

Jansen, G.A.A. (2020) Underground Wireless Communication and Wake-Up at 125 kHz.

Jansen, L.W.L. (2020) Comparing cloud security directions between the Academia and the Industry.

Jeulink, Kevin (2020) Smart sports exercises project : the detection of (in)correct motion during resistance training.

Kamies, Bram (2020) Abeona: A generalized framework for state space exploration algorithm composition.

Kampen, C.M. van (2020) Formal Automated Verification of a Work-Stealing Deque.

Kant, M.W.E. (2020) Authorization, privacy and informed consent : who is allowed access to which medical information? : The development of an authorization model for the Datakluis application.

Karsten, Jarik (2020) Crunching Attack Trees : efficient algorithms for computation of metrics.

Karuppannan, Sriganesh (2020) Analysis of various demand side management control mechanisms for a smart solar carpark.

Keijzer, N. (2020) The new generation of ransomware : an in depth study of Ransomware-as-a-Service.

Kerimov, Emil (2020) FPGA-based AES variants against side-channel attacks.

Kerkhof, R.G. (2020) Natural Language Processing for scoring open-ended questions : a systematic review.

Klotz, M.S. (2020) Extending the shunting plan generator of the Dutch railways with non-service train traffic.

Knol, R. (2020) Emotional activity detection using behavioural sounds.

Kok, M.R. (2020) Biologically Realistic Artificial Neural Networks.

Koning, S. (2020) Modelling and visualizing emergency egress.

Kortstra, Wybren (2020) Automatic Registration of Clinical Auditsfor Head and Neck Oncology at MST.

Kräwinkel, R.W. (2020) The effect of writing and transmitting SD card data on the consistency of SD card write performance.

Kukuk, L. (2020) Analyzing adoption of contact tracing apps using UTAUT.

Kumashev, Yernar (2020) GPGPU Verification: Correctness of Odd-Even Transposition Sort Algorithm.

Lapshyna, V. (2020) Sparse artificial neural networks : Adaptive performance-based connectivity inspired by human-brain processes.

Leemans, T.T.J. (2020) An Anomaly Forecasting Method for Support Processes.

Leendertz, R.R. (2020) Validating the Maneuver Coordination Protocol with UPPAAL.

Li, Y. (2020) Interactive visualization of book publication history.

Licu, D.V. (2020) Automatic container code identification using Machine Learning.

Lijcklama à Nijeholt, D.J. (2020) Control for Cooperative Autonomous Driving Inspired by Bird Flocking Behavior.

Lijzenga, O. (2020) Symbolic parity games : Two novel fixpoint iteration algorithms with strategy derivation.

Linssen, R.H.H.G.M. (2020) Vulnerability of DNS name servers against BGP hijacking.

Loos, B. (2020) Designing a smartphone application for supporting the COMET-program in mental health care.

Lu, C. (2020) Deep sleep stage detection.

Lucas, R.H. (2020) Workflow improvement by artifact development.

Lummen, D.L.M. (2020) An analysis of Link and Node Level Resilience on Network Resilience.

Lüpkes, Niklas (2020) Using static weight estimation of general trees to efficiently parallelize the execution of DEMKit Simulation Models.

Maas, Jelle (2020) Cyber attack detection in smart grids.

Macarie, M. (2020) DNS bitsquatting in the wild.

Mathivanan, Rajavarman (2020) Texture Based Autonomous Reconstruction of 3D Point Cloud Models using Fully Actuated UAVs.

Mauritz, R.R. (2020) Improving data quality in a probabilistic database by means of an autoencoder.

Meijer, J.J.W. (2020) Morphing detection based on regional analysis of local frequency content.

Meijer, Max Jan (2020) Exploring augmented reality for enhancing ADAS and remote driving through 5G study of applying augmented reality to improve safety in ADAS and remote driving use cases.

Middelkoop, D.E.V. (2020) Sensitivity analysis of predicting wireless c hannels within an indoor factory floor.

Miedema, Lukas (2020) QuickInterp - Improving interpreter performance with superinstructions.

Minnema, Jeroen (2020) Towards component-based, sensor-independent and back-end independent SLAM.

Miu, Ioana (2020) Fundamental characteristics and concept of material passports.

Mol, S. (2020) Movement localization in indoor environments by means of light and air pressure sensors.

Myśliwiec, J. (2020) Generating short RPG side-quest stories with transformers.

Nguyen, M. (2020) Interaction technology in improving learning of sports tactics : A novel way of teaching adult novice players the volleyball side-out rotation with an interactive LED floor.

Ni, Z. (2020) An improved Java-based single sign-on solution.

Nijeboer, F.J. (2020) Detection of HTTPS encrypted DNS traffic.

Nijholt, M.H. (2020) Predicting of project spending for an NGO.

Nijland, R.G. (2020) Using in-game data to give insights in the performance of eSporters.

Nijpels, S.T. (2020) Implementing feedback systems and content creation tools in an educational game.

Noort, N. van (2020) Machine Learning for monitoring attacks in the cloud.

Obbink, Ruben (2020) Development and Optimization of a Robot Navigation Algorithm combining Deep Reinforcement Learning and State Representation Learning.

Oldengarm, B.M.J. (2020) Improving human activity recognition using embedded smartphone sensors.

Oorschot, D.H.M.A. van (2020) Let’s sort this out: GPGPU Verification of Radix Sort.

Orlinski, Jakub (2020) MEG-driven emotion classification using convolutional and recurrent Neural Networks.

Oude Roelink, B.M. (2020) On the security of authentication when linking federated identities.

Padubidri, C.P. (2020) Sea lion Counting from Aerial Images with Deep Learning : A density Map Approach.

Pebesma, J.L. (2020) Towards transfer learning in e-discovery : finding the optimal classifier and evaluating domain adaptation methods.

Pebesma, J.L. (2020) Towards transfer learning in e-discovery : finding the optimal classifier and evaluating domain adaptation methods.

Perera, Navoda (2020) An API for intelligent deployment of numerical calculations.

Perkowski, Ernest (2020) Impact of ensemble machine learning methods on handling missing data.

Peters, S.T.H. (2020) Distribution of advertisements on YouTube among several content categories.

Plentinger, C.S. (2020) GUI for FIG : visualising simulation results.

Ploeg, E.M. van der (2020) Developing a Platform to Emulate Fault Injection Attacks on Cryptographic Implementations.

Poirot, Maarten G. (2020) Split Learning in Health Care: Multi-center Deep Learning without sharing patient data.

Poot, Martijn (2020) Real time posture tracking using Breathline : posture , body position and movement classification using an Arduino, accelerometer and k-Nearest Neighbour classification.

Popa, A. (2020) Feature evaluation for detection of COVID-19 in pulmonary CT scan images.

Praas, J.W. (2020) Predicting influence spread in online social networks using combinations of node centralities.

Prieto Álvarez, Roberto (2020) Design of a Flat-Swipe Finger Vein Recognition Device in the NIR Spectrum.

Quattrocchi, J. L. (2020) Reaction-Diffusion patterns modelled by Continuous-State Cellular Automata.

Rawat, K. (2020) Human activity recognition based on energy efficient schemes.

Reesink, T.B.J. (2020) Creating 3D faces from 2D images using GANs.

Rengers, J.J. (2020) Investigating association between musical features and emotion through EEG signal analysis.

Riesewijk, M. (2020) High availability orchestration of Linux containers in mission-critical on-premise systems.

Rijn, K.D. van (2020) A binary decision diagram based approach on improving probabilistic databases.

Robert, Julien (2020) Recipe suggestion for meal-sharing online Marketplaces.

Robson, Francis (2020) Using Temperature and Humidity Sensors to Propose a New Form of Flat Roof Leakage Detection.

Roelink, M.J. (2020) Encoding deadlock-free monitors in the VerCors verification tool.

Rubbens, R.B. (2020) Improving Support for Java Exceptions and Inheritance in VerCors.

Rump, A. (2020) Automated assessment of learning objectives in programming assignments.

Rus, Adrian-Catalin (2020) Modelling and evaluating Obstructive Sleep Apnea management protocols with UPPAAL.

Sain, R. de (2020) Impact of language on detecting agitation.

Sawaryn, B. (2020) Modelling fluctuations of blood glucose levels based on food intake and physical activity in patients with Diabetes Mellitus Type 2 : development of a controlled protocol which administer perturbations in daily life situations.

Schmit, C. (2020) Smoothed analysis of the ICP algorithm for arbitrary probability distributions.

Scholten, R.H.D. (2020) Secure biometric verification in a malicious attacker model setting.

Schooltink, W.T. (2020) Testing the sensitivity of machine learning classifiers to attribute noise in training data.

Schrama, M.L. (2020) Improving speech emotion recognition by identifying the speaker with Multi-task Learning.

Schrijver, G. (2020) Using process mining to compare different variants of the same reimbursement process : A case study.

Sievers, C.T. (2020) Bag-of-words location retrieval : Including position of local features.

Sivasubramanian, Kimsukha Selvi (2020) A comparative analysis of Post-Quantum Hash-based Signature Algorithm.

Slagman, Hermannus (2020) Presenting Automatic Analysis Of Uroflowmetry Curves.

Slebos, Stijn (2020) Modeling empathy in social human-robot interaction.

Sleutjes, A.R. (2020) Identification of Profiles Based on Physical Behaviour Patterns.

Slooten, N. van (2020) A maturity level assessment of process mining bottleneck analysis techniques.

Sonneveld, J.J. (2020) A gravitational approach for ranking Autonomous Systems in Large Autonomous System Networks.

Spijker, B.C. van 't (2020) Classifying Classical Piano Music Into Time Period Using Machine Learning.

Staal, P.J. (2020) An Analysis of Programming Paradigms in High-Level Synthesis Tools.

Stapel, F.T.A. (2020) A Heuristic Approach to Indoor Rock Climbing Route Generation.

Steenbeek, Anne (2020) CNN based dense monocular visual SLAM for indoor mapping and autonomous exploration.

Steenmeijer, L.D. (2020) Increasing the consistency of feedback on programming code by using a tagging system.

Stellaard, Julian (2020) Tracking the process of an outbreak to a pandemic via logistical infrastructures : case study.

Stikkelorum, M.J. (2020) Automated discovery of BACnet relations from bus traffic.

Stoian, N.A. (2020) Machine Learning for anomaly detection in IoT networks : Malware analysis on the IoT-23 data set.

Stouten, Thomas (2020) Hide and seek : different scan methods to analyse peer-to-peer based blockchain networks.

Stuurman, A. and Jongh, Dr. A. de (2020) Improving frequency estimation of fingerprint minutia configurations using automated pre-selection.

Thijssen, P.G.H. (2020) OCL constraints in GROOVE.

Tol, K. M. van (2020) Ons Berichten 2.0. : Researching communication in elderly care, disabled care and mental health care for the proposal of a new messaging function within Ons.

Velden, J. van der (2020) Blacklist, do you copy? Characterizing information flow in public domain blacklists.

Veldhuis, Anouk (2020) Implementation and design of a postoperative follow-up application.

Velzel, M.M. (2020) Design2Struct : Generating website structures from design images using neural networks.

Ventur, F. (2020) Deficient testing databases : a reliability-driven evaluation of privacy models providing a trade-off between data integrity and re-identification risk.

Vogel, Koen (2020) The feasibility of low-cost Virtual Reality motion tracking for rowing technique analysis.

Vos, M.C. (2020) Finding lower bounds for the competitive ratio of the cow path problem with a non-optimal seeker.

Vouzavalis, Antonios (2020) Capturing car market dynamics in the transition towards electric mobility in an agent-based simulation model.

Vredeveld, G.W.R. (2020) Invaluable measurement networks and their critical infrastructure : Uptime discrepancy localization and network improvements.

Vredeveld, G.W.R. (2020) Invaluable measurement networks and their critical infrastructure : uptime discrepancy localization and network improvements.

Wackerle Garcia, L.M. (2020) Analysis of heuristics with random shortest path metrics on sparse graphs.

Wackerle Garcia, L.M. (2020) Analysis of heuristics with random shortest path metrics on sparse graphs.

Westerik, Lars (2020) Increasing performance personnel department Company X.

Wijburg, K.M. (2020) The state of statechains : exploring statechain improvements.

Winters, A. (2020) Examining the effect of hyperparameters on the training of a residual network for emotion recognition.

Wittendorp, T.J.J. (2020) Locomotion control interface for a remote robot (Avatar).

Witteveen, C.P.T (2020) Measuring the effectiveness of feedback on code of novice programmers.

Wolbers, J.J.H. (2020) Synchronized co-located interreality collaboration : analysis, design, and usage of a prototype research environment.

Woudstra, M.H. (2020) Exploring Possibilities to Increase Ease of Use of ITPortfolio Management.

Xhymshiti, Meriton (2020) Domain independence of Machine Learning and lexicon based methods in sentiment analysis.

Xia, Lichen (2020) How vehicles’ speeds influence the optimal configuration and performance of the C-V2X.

Yeleshetty, Deepak (2020) Item availability restricted.

Yenidogan, Berk (2020) 30-Days post-operative mortality prediction of elderly hip fracture patients.

Yuan, Ye (2020) Improving information retrieval by semantic embedding.

Zadelhoff, L.D. van (2020) Assigning inbound flights to baggage retrieval belts: A simulation study on the impact of stochasticity on the performance of different assignment heuristics.

Zandberg, Koen (2020) Dataflow-Based Model-Driven Engineering of Control Systems.

Zandbergen, N. (2020) Illuminated feedback in an online classroom : Will it help or hinder?

Zissoldt, J.E. (2020) Topic modeling in memories of elderly.

de Greeuw, P.C.A. (2020) Robustness of Microgrid Control Mechanisms Against Cyber Attacks.

van der Vijgh, M. (2020) A comparison of open-source real-time online learning frameworks for neural networks.

Şakar, Ö.F.O. (2020) Extending support for axiomatic data types in VerCors.

Šatcs, D. (2020) Understanding the lightning network capability to route payments.


Abdul Cader Hasanain, Mohamed Asif Hassan (2019) Item availability restricted.

Abraham, Remco (2019) A Formal Proof of the Termination of Zielonka's Algorithm for Solving Parity Games.

Ahmad, Fajri (2019) Enterprise Architecture Mining.

Ambrosius, J.I. (2019) The design of a validation experiment for the Tissue Active SLAM model.

Arican, Tugce (2019) Optimization of a patch-based finger vein verification with a convolutional neural network.

Aström, F.K. (2019) JOY x UT. : Designing an e-Health web-platform to promote joyful physical activity amongst university employees.

Aulia, Aimana (2019) Designing a Mobile Digital Payment Application for Gas Stations in Indonesia.

Açikalin, M.A. (2019) Profiling Recursive Resolvers at Authoritative Name Servers.

Badea, Florentina (2019) A method to improve the application portfolio m anagement decision-making process through stakeholder involvement.

Bakker, D.R. (2019) Impact-based optimisation of BGP Flowspec rules for DDoS attack mitigation.

Barbara, Mario Alessandro (2019) Proof of All : Verifiable Computation in a Nutshell.

Berg, R.T. Van den (2019) Designing a small and low-energy wildlife tag for parakeets within an urban environment capable of tracking and online activity recognition.

Bergmans, R.H.J. (2019) Computer-aided diagnosis for CT based clinical triage of ischemic and hemorrhagic stroke patients : a deep learning and quantitative image analysis approach.

Bergsma, D. (2019) Porting tree-based hash table compression to GPGPU model checking.

Berkel, A.R.R. (2019) Integration of clinical decision support systems in Dutch radiology departments.

Beuker, W. (2019) Multi-rate discrete fourier transform characteristics : results of models, simulations, and measurements.

Beunk, L.D.R. (2019) Tangible Tools and Techniques: Co-designing with Locked-In Syndrome.

Blaas, R.M. (2019) Recipe and Meal management mobile application for

Bleeker, D.A. (2019) DoS attack on recursive resolvers with DNSSEC key-tag collisions.

Blok, T. (2019) ZITA : a self learning tutoring assistant.

Blokhorst, S.H.M. (2019) Graphical User Interface for Fault Tree Analysis.

Bode, Max (2019) Evaluation of an augmented reality assisted manufacturing system for assembly guidance.

Boersen, N. (2019) Digital billboard damage detection using computer vision.

Boersma, C.H. (2019) Designing a platform to communicate posture and movement data to medical professionals.

Boersma, Kitty (2019) Using Influencing Factors and Multilayer Perceptrons for Energy Demand Prediction.

Bolding, T.G.J. (2019) Applying Peak-Shaving to Household Devices using an Event-Driven Algorithm.

Bolscher, R.T.J. (2019) Leveraging serverless cloud computing architectures : developing a serverless architecture design framework based on best practices utilizing the potential benefits of serverless computing.

Booijink, K.G. (2019) Evaluating the Scalability of MayBMS, a Probabilistic Data Tool.

Bos, W.F.A. (2019) Software Metrics as Indicators for Effort of Object-Oriented Software Projects.

Brand, Jannis (2019) Development of a Passenger Flow Visualization Tool for Cruise Line Ships.

Breed, I (2019) Hierarchical forecasting of engineering demand at KLM Engineering & Maintenance.

Brink, G.C. van den (2019) Training deep learning models to count based on synthetic data.

Brunsveld, R.D. (2019) Determining the Satisfiability of Car Configuration Models in a Repetitive Manner.

Burghardt, C.N. (2019) Item availability restricted.

Burghout, S.M.A. (2019) Essential IoT-value propositions to reinforce SME's business position.

Cai, D. (2019) A Parasite Chain Attack in IOTA.

Casano, F. (2019) Identifying how vendors and clients manage red teaming.

Cesar, M (2019) The dangers and privacy issues of motion-based side-channel attacks.

Chen, Qiurui (2019) EEG hyperscanning study of team neurodynamics analysis during cooperative and competitive interaction.

Claßen, Philipp (2019) Identification of differences in sub-population healthcare processes.

Clerkx, N.P.M (2019) Improving vehicle routing by utilizing realisation data : a case study.

Coenen, M.H. (2019) Increasing availability of the AEpu by improving the update process.

Cojocaru, Andrei (2019) Handling Missing Data: Traditional Techniques Versus Machine Learning.

Coniglio, Luigi (2019) Combining program synthesis and symbolic execution to deobfuscate binary code.

Conrads, J.G. (2019) DDoS Attack fingerprint extraction tool : making a flow-based approach as precise as a packet-based.

Coroiu, Alexandra (2019) The generalization performance of hate speech detection using machine learning.

Dai, L. (2019) Human perception of an adaptive agent's fear simulated based on TDRL Theory of emotions.

Danielecki, Daniel Mariusz (2019) Security first approach in development of Single-Page Application based on Angular.

Das, Amit (2019) Towards a hybrid customer classification and clustering scheme for effective target-group based marketing.

Delft, M. van (2019) Towards feature-based underground void detection with ground penetrating radar from within sewers using image processing.

Derks, C.C. (2019) Trends Tool, a tool for abstract textual data analysis used for additive manufacturing trend.

Dietvorst, Cornelis P. (2019) Programming data visualisations using Microsoft Power BI : building a scrap dashboard for BT2.

Dommerholt, W. (2019) Financial effects of moving patients from an inpatient to an outpatient setting : providing financial insight in the effects of discharging patients the same day as surgery instead of keeping them overnight.

Drechsel, Alexander (2019) Automatic instance-based matching of database schemas of web-harvested product data.

Duits, Ines (2019) The Post-Quantum Signal Protocol : Secure Chat in a Quantum World.

Dzulqarnain, Dzulqarnain (2019) Investigating IoT malware characteristics to improve network security.

Eibich, Natasha J. (2019) Sticky Fingers: The effect of sticky interaction patterns on the design and adoption of a Radiology Information System.

Eijkemans, Joep (2019) Motion sickness in a Virtual Reality cycling simulation.

Emous, Rob J. van (2019) Towards systematic black-box testing for exploitable race conditions in web apps.

Enendu, Somtochukwu (2019) Predicting Semantic Labels of Text Regions in Heterogeneous Document Images.

Essenstam, L. (2019) Analysing various methods for object extraction and the classification of kitchens.

Eversmann, H.Y.N. (2019) Computation offloading of augmented reality in warehouse order picking.

Fasel, R. (2019) Adapting the variational auto encoder for datasets with large amounts of missing values.

Fennis, J. (2019) Machine learning solutions for exception handling.

Fikkert, F.A.J. (2019) Linking indoor 3-dimensional visualizations with physical architectural floor plans.

Flapper, J. (2019) User access control on the blockchain for supply chain visibility.

Florijn, W.J. (2019) Information retrieval by semantically grouping search query data.

Folkertsma, Kevin (2019) RE-Play: An exploration of game induced exercise promotion in clinical use.

Freije, R.J.H (2019) Item availability restricted.

Geijs, D.J. (2019) Tumor segmentation in fluorescent TNBC immunohistochemical multiplex images using deep learning.

Gemmink, M.W.T. (2019) The adoption of reinforcement learning in the logistics industry: A case study at a large international retailer.

Gerth, Jasper (2019) Development of a system for real time localization of a team of athletes using Ultra Wide band : design choices and considerations for mesh network localization.

Geuze, N.J. (2019) Energy management in smart grids using timed automata.

Giessen, David van de (2019) Blockchain and the GDPR's right to erasure.

Go, M.L. (2019) Clustering with Outliers in a Biased Animal Movement Database.

Goossens, Bjorn (2019) Decision-Making in a Microservice Architecture.

Gosen, N. (2019) How Robotic Process Automation (RPA) influences firm financial performance in The Netherlands.

Guliker, B.E. (2019) Data storytelling: visualising linked open data of the Dutch Kadaster.

Haasjes, R.E.Y. (2019) Metamodel transformations between UML and OWL.

Harmelink, R.L.A. (2019) Computing threat points in two-player ETP-ESP games.

Harten, Anne van (2019) Analyzing Programming Education Quality based on Students' Questions.

Havinga, Thijs (2019) Embedded Infrastructure for Decentralized Energy Management.

Heijden, L.M.A. van der (2019) Classification-based Approach for Question Answering Systems: Design and Application in HR operations.

Heijs, Wouter (2019) The design of an expert profile and the availabilty of employee expertise sources.

Hendriks, M. (2019) Can machine learning automatically choose your best model checking strategy?

Hendrikse, B. (2019) Data-driven IT : tackling IT challenges with data management in a financial institution.

Hogema, T.A.M. (2019) Counting People in Simultaneous Speech using Support Vector Machines.

Hogenkamp, Tom (2019) Framework for Fine-Grained Partial Reconfiguration on FPGAs.

Hove, K.W. van (2019) Automated DDoS Attack Fingerprinting by Mimicking the Actions of a Network Operator.

Hubert, André (2019) AI-Enabled Automation : A Framework for Identifying a Company’s Automatable Core Processes.

Huiden, J.E. (2019) Generating Realistic Ghost Fingerprints by Combining Real Fingerprint Images.

Hultermans, M.A.A. (2019) A Theoretical Ad Hoc Lunar Communication Network With CubeSats as Secondary Payload of Lunar Missions.

Huttinga, S.S.J. (2019) Procesautomatisatie door middel van object detectie, een machine-learning ontwikkelingsmethodologie.

Ibrahim, Arief (2019) Forecasting patient demand and predicting inpatient admission via machine learning techniques in acute care domain.

Indrawijaya, K.R. (2019) Self-management Rehabilitation Capabilities on Older Adults by Persuasive Technology.

Jakel, Tibor (2019) Using Sentiment Data from the Global Database for Events, Language and Tone (GDELT) to Predict Short-Term Stock Price Developments.

Jansen, Bas (2019) Automated Testing of Models of Cyber-Physical Systems.

Jansen, Joost (2019) Communication of Incident Severity between Customers and Analysts in a Security Operations Center.

Jansen, Joost (2019) Detecting Combosquat Domains using Active DNS Measurements : communication of incident severity between customers and analysts in a SOC.

Janssen, Djordi (2019) The Effects of Active Learning on Computer-Aided Diagnosis in Multi-Disease Prediction of Chest X-rays.

Jarosinski, W.W. (2019) Using Co-Design to Develop ‘Autshare’, an Online Solution-Sharing Platform for Autistic Individuals.

Jellema, J.M. (2019) Polynomial Calculation of Quasi-Gray code labelings for Irregular Signal Constellations.

Jong, Koen de (2019) Detecting the online romance scam: Recognising images used in fraudulent dating profiles.

Jong, R.J. de (2019) Range characterization of backscatter Wireless Sensor Networks.

Jurriëns, Stefan (2019) A Decision Support Tool for the Medium Voltage Networks Expansion Problem.

Kaag, K.W. (2019) Encouraging collaboration between primary school children through a learning robot.

Kampen, Coen van (2019) Missing data imputation based on probabilistic data.

Karchev, F. (2019) IOT device profiling for Honeypot generation.

Karia, D. (2019) Combating money laundering on the blockchain.

Karimah, Fania Rahmanawati (2019) Redesign IT Organisational Structure: Case study of Centre for Data and Informatics Infrastructure (CDII), Ministry of Communication and Informatics Republic of Indonesia.

Kazmi, Syeda Nazish (2019) Access Control Process for a SaaS Provider.

Keijer, Julik (2019) Automated DDoS mitigation based on known attacks using a Web Application Firewall.

Keurhorst, Maaike (2019) Feedback On Gaze Behaviour In Virtual Reality Bicycle Training For Children with a Developmental Coordination Disorder.

Khan, Muhammad Daiman (2019) An investigation into trust between an SAV and its passengers.

Khasuntsev, N.A. (2019) Accurate and Efficient Classification of Cyber Security Documents.

Kim, John (2019) Building a Platform to Improve Sedentary Behaviour by Centralising Joy in Physical Activity.

Klaassen, W. (2019) Visualizing ocean carrier performance : a framework for evaluating logistic partners.

Klanberg, Indrek (2019) Item availability restricted.

Klink, K. van (2019) Detection and Identification of Roman Emperors Using Facial Recognition.

Kloppenburg, G.W. (2019) The adoption of intelligence amplification in the slotting process : a case study in the data validation automation of a Dutch Retailer.

Kobes, W.J. (2019) Efficient and accurate classification of cyber security related documents.

Kock, Joeri (2019) A signature-based Approach to DDoS Attack Mitigation using BGP Flowspec Rules.

Kock, Ties de (2019) Visualization recommendation in a natural setting.

Koelewijn, Dirk (2019) Fingerprint-Based Automated Rule Generation for DDoS Mitigation using the Berkeley Packet Filter.

Kok, H.M. (2019) Improving the efficiency and quality of help seeking and help giving for programming tutorials.

Kok, H.M. (2019) Hoe kan een tel tool ingezet worden in informatica onderwijs om de leerresultaten van leerlingen te verbeteren?

Kokkelkoren, R. (2019) Catching Flux-networks in the open.

Kolev, Stiliyan (2019) Automation of software vulnerability monitoring for third party products in large IT companies.

Kolner, Thomas (2019) Applying machine learning on the data of a controltower in a retail distribution landscape.

Kooij, D. (2019) Groovy Parity Games.

Koopman, Michael (2019) A framework for detecting and preventing security vulnerabilities in continuous integration/continuous delivery pipelines.

Koridon, M.S. (2019) Security by decision-making : a decision-making capability model for security countermeasures.

Krapukhin, Alexander (2019) Approximate Least Squares Accelerator.

Kruiper, T.R. (2019) Optimizing FPGA Designs for Maximum Throughput using RapidWright.

Kuiper, D. J. (2019) Fleet Composition in Operational Time Slot Management.

Kuipers, Floor (2019) Feed the movement - a food waste reduction app.

Kulatska, I. (2019) ArgueBot: Enabling debates through a hybrid retrieval-generation-based chatbot.

Kulkarni, Vishwajit Vijay (2019) Embedded wearable device for monitoring diabetic foot ulcer parameters.

Kumar, Shrijan (2019) Development of SLAM algorithm for a Pipe Inspection Serpentine Robot.

Kunneman, Y.J. (2019) Data science for service design : an exploration of the opportunities, challenges and methods for data mining to support the service design process.

Laat, Martin de (2019) Design and validation of Software Requirements Specification evaluation checklist.

Lammers, Mick (2019) A QA-pair generation system for the incident tickets of a public ICT Shared Service Center.

Lebbing, Peter (2019) Modelling and Realizing the Tunnelling Ball Device in UniTi and CλaSH.

Leeuwen, K.G. van (2019) From scan to speech : articulation analysis from real-time vocal tract MRI.

Legoy, V.S.M. (2019) Retrieving ATT&CK tactics and techniques in cyber threat reports.

Lenderink, R.J. (2019) Unsupervised Outlier Detection in Financial Statement Audits.

Ligtenberg, L.E.J. van (2019) Emotion dashboard for teachers in special needs education.

Linardos, Ioannis (2019) Multiscale Convolutions for an Artificial Neural Network.

Lukman, Ivan (2019) Complete Characterization of Publicly Available Domain Blacklists.

Man, R.J.P. de (2019) A formalisation of EMF by expressing Ecore as GROOVE graphs.

Man, T. (2019) Measuring and Analysing Resilience of Enterprise Architectures.

Mandasari, Yani (2019) Follow-up Question Generation.

Marin, Mihai David (2019) Effectiveness of neural language models for word prediction of textual mammography reports.

Masud, Muhammad Ahmed (2019) An Open Source Intelligence (OSINT) framework for online investigations.

Meijerink, M.M.J. (2019) Anomaly-based detection of lateral movement in a Microsoft Windows environment.

Meijerman, T.R.I. (2019) Manipulating a dissociative bond with out-of-body experience avatar in virtual reality.

Mendler, G.T. (2019) Designing a meta report for hotel customer reviews.

Mentink, T.J. (2019) Redesigning after-sales services supply chain.

Merdi, Agathi (2019) ICT Use by Refugees : The Role of Technology in Refugee Mobility.

Merdis, Vasileios (2019) Wireless communication protocols for home automation exploring the security and privacy aspects of smart home IoT devices communicating over the Z-Wave protocol.

Mitev, Zarimir (2019) Estimating User Interaction Complexity.

Mulder, Henk (2019) Performance of program verification with VerCors.

Muller, M. (2019) Creating building energy prediction models with convolutional recurrent neural networks.

Mustafa, Khaled Alaaeldin Abdelfattah (2019) Towards Continuous Control for Mobile Robot Navigation: A Reinforcement Learning and SLAM Based Approach.

Möllering, Helen (2019) Thwarting Semantic Backdoor Attacks in Privacy Preserving Federated Learning.

Naziris, Sotirios (2019) Infrastructure as code : towards dynamic and programmable IT systems.

Nguyen, ir. H.M. (2019) Formal verification of a red-black tree data structure.

Nijhuis, Mirel (2019) Creating a Google Home System Agent to reduce loneliness among older adults.

Nurlatifah, Eva (2019) Information audit triangle for practitioners.

Oliemans, R. (2019) WHOIS versus GDPR.

Overkamp, Niels (2019) Speeding up profile steering algorithms with caching for buffer type devices.

Panambur Venkatraman, V. (2019) A sensor fusion technique for head motion controlled endoscope camera system.

Pantelis, D. (2019) Design of a control strategy for a robotically assisted ultrasound guided biopsy.

Papadopoulos, Antonios (2019) The quest of "dethroning" passwords from (web)authentication schemes.

Papenmeier, A. (2019) Trust in automated decision making : how user's trust and perceived understanding is influenced by the quality of automatically generated explanations.

Peetsma, J.J. (2019) Towards A Serious Game For Assessing Self-Reliance In A Crisis.

Perera, R.A.H. (2019) Finger-Adaptive Illumination Control and Exposure Fusion Imaging for Biometric Finger Vein Recognition.

Pingen, J.J.F. (2019) Engineering Entertainment: Adaptive interventions to enhance player engagement in the Interactive Tag Playground.

Plant, O.H. (2019) DevOps under control : development of a framework for achieving internal control and effectively managing risks in a DevOps environment.

Pohekar, Ashwini (2019) ASIP design on behalf of hybrid beamforming in MIMO communication system.

Postema, J.T. (2019) Explaining system behaviour in radar systems.

Prakoso, Dimas Wibisono (2019) Semantic-aware EWC Code Recommender System for Industrial Symbiosis Marketplace.

Provoost, Jesper C. (2019) Short-term prediction and visualization of parking area states in real-time : a machine learning approach.

Prudnikova, Anna (2019) Standardized security assessment framework for ICS devices and pilot project.

Psalmerosi, Febriya Hotriati (2019) Applying Text Mining and Machine Learning to Build Methods for Automated Grading.

Pu, Leiying (2019) Co-design approach : a collective design method for improving working efficiency and satisfaction in user support design processes : an empirical study based on three comparison groups simulating a real-world quick start guide design process.

Raalte, E. van (2019) Automating system generation in Clash.

Raben, K.T. (2019) Comparing selfh-healing techniques in approximate MAC accelerators.

Radl, P.D. (2019) 3D reconstruction improvement by path planning towards physical interaction with a UAV.

Radstaak, J.M. (2019) Developing a DevOps Maturity Model: A validated model to evaluate the maturity of DevOps in organizations.

Ramesh, Darshan (2019) Item availability restricted.

Rayo Torres Rodriguez, H. (2019) A lightweight hardware architecture for intermittent computing.

Regnerus, B. (2019) Matching article sentiment in abstractive summarization of news articles.

Renssen, Martijn (2019) Classification of types of road damage using machine learning and a smartwatch.

Rhijn, Gijs van (2019) Why your back hurts : Finding an efficient way to measure and evaluate sitting posture using a combination of body sensors placed on the body and machine learning.

Richter, N.G. (2019) Process mining in programming game logs to differentiate between skill levels.

Ridder, R.K. de (2019) Business Models for Smart Mobility IoT Data.

Rietvelt, D.C.J.C. (2019) Influence of neutral word removal on sentiment analysis.

Rijnbeek, E.H. (2019) Approximate Computing - Reconsidering the Analog Computer.

Riva, Giovanni Maria (2019) Privacy architecting of GDPR-compliant high-tech systems : the PAGHS methodology.

Romeo, Pietro (2019) Discovering aspects of gaming QoE : an explorative study.

Roosmalen, J.J. van (2019) Forecasting bus ridership with trip planner usage data : a machine learning application.

Roppelt, J.C. (2019) Security risks surrounding cryptocurrency usage : a study on the security risks of cryptocurrencies and how security perception affects usage.

Ros, K. M. (2019) Airport restroom cleanliness prediction using real time user feedback data and classification techniques.

Rublein, N. (2019) Design of haptic feedback in pedal based UGV teleoperation to enhance situation awareness.

Ruis, Frank (2019) Spilling the beans: Food recipe popularity prediction using ingredient networks.

Rõžakov, Ilja (2019) A Modest Comparison of Blockchain Consensus Algorithms.

Sadad, Akhyar (2019) Reusable machine learning framework for predicting future system performance : a comparison study of validation strategy on WWTP time series data.

Sadananda Bhat, A. (2019) Hierarchical deep neural networks for MeSH subject prediction.

Salamah, Siti Yaumi (2019) Predicting demand of replacement cars for breakdown cases using machine learning techniques.

Schaik, E.J.G. van (2019) Color-based Recognition Techniques for Manipulation Detection in Advertisement Videos.

Schepers, P. (2019) Application of a process model to define potential operational functional failure conditions.

Schipper, BSc M.A. (2019) Decomposed reachability analysis for discrete linear systems.

Schmidt, R. D. (2019) Creation of a training and teaching application in AR.

Scholten, C.P.B. (2019) Hacking the router: characterizing attacks targeting low-cost routers using a honeypot router.

Schoot Uiterkamp, L. (2019) Improving text representations for NLP from bags to strings of words.

Schroten, Peter (2019) Introducing BGD: a DSL to express board games and gameplay.

Schutte, J.J. (2019) Design of a development platform to monitor and manage Low Power, Wide Area WSNs.

Schyns, J.L. (2019) Improving Scientific Search Engine Interfaces Using Scientific Networks.

Seid, Selehadin (2019) Predicting weight regain after bariatric surgery using decision tree and logistic regression.

Sharman, S.S. (2019) Item availability restricted.

Siers, W.H. (2019) Generating specifications for JSON APIs for formal and semantic use.

Sluiter, N.I. (2019) Influence Maximization in Social Networks by Injecting Memes.

Smits, J.J. (2019) What does a Domain Name Say.

Smits, Paul L. (2019) Seizure onset detection for responsive stimulation in the sensorimotor cortex.

Snijders, T.G.A. (2019) Design and implementation of a supplier portal using an empirical snapshot, with a case example.

Sonderen, T. (2019) A Manual for Attack Trees.

Spijker, K. (2019) Identifying Users’ Skill Level through the Process Mining of Software Logs.

Spijkerboer, E. C. (2019) Blockchain based transaction processing system : a reference architecture for an integrated blockchain based transaction processing system.

Sridhar Bangalore Venugopal, Sridhar Bangalore Venugopal (2019) Automatic Generation of Access Control List on Mellanox Switch For DDoS Attack Mitigation Using DDoS Fingerprints.

Srivastava, Siddhartha (2019) Benchmarking Facebook's Prophet, PELT and Twitter's Anomaly detection and automated de ployment to cloud.

Steenbergen, R.M. van (2019) New Product Forecasting with Analogous Products : Applying Random Forest and Quantile Regression Forest to forecasting and inventory management.

Sterrenburg, L.G. (2019) Design of an implementation method for customizable SaaS solutions.

Stortelder, R. (2019) Enabling centralized access to a reactive architecture for hardware control systems.

Stritzl, David (2019) Privacy-Preserving Matching Using Bloom Filters: an Analysis and an Encrypted Variant.

Sulzer, Niels (2019) Hardware-Efficient Real-Time Statistical Analysis on Streaming Data.

Sun, Aiwu (2019) Building a virtual world in ROS based on the robot's perception.

Sustronk, J.J. (2019) Predicting New Web Pages on the World Wide Web Using Topological Features.

Tariverdiyeva, Gunay (2019) Chatbots’ Perceived Usability in Information Retrieval Tasks: An Exploratory Analysis.

Teesselink, T. (2019) Identifying Application Phases in Mobile Encrypted Network Traffic.

Teunissen, T. (2019) Success factors for RPA application in small and medium sized enterprises.

Thomson, B.R. (2019) Automated vascular region segmentation in ultrasound to utilize surgical navigation in liver surgery.

Thoonen, M.A.W. (2019) Hardening FPGA-based AES implementations against side channel attacks based on power analysis.

Tintelen, B. F. M van (2019) Designing a Machine Learning Decision Tree for Information Systems: A study into the implementation of supervised and unsupervised machine learning methods.

Torres Cano, Andrés Felipe (2019) Automatic aviation safety reports classification.

Trienes, Jan (2019) Comparing rule-based, feature-based and deep neural methods for de-identification of Dutch medical records.

Tuininga, Frits Sieds (2019) Accelerating Model Driven Platforms: A study into the predictability of business process models.

Tujner, Zsolt (2019) Quantum-safe TOR, post-quantum cryptography.

Tziampazis, Christodoulos (2019) Exposure Assessment on Medical Devices in the Netherlands.

Valk, D.J. van der (2019) RPi-based passive 5-camera system for 3D face acquisition.

Vallinas Prieto, Ander (2019) Time-domain passivity enforcement for mass reduction in admittance control.

Vasileiadis, Leonidas (2019) Remote runtime detection of tampering and of dynamic analysis attempts for Android apps.

Veenstra, G.W. (2019) Generating high frame rate MR images using surrogate signals.

Vegt, M. E. M. van der (2019) Compressed Set Representations and their Effectiveness in Probabilistic Model Checking.

Vegt, Mick van der (2019) Using data to improve financial behavior : designing the personal finance platform.

Verbraak, F.M. (2019) Universal Basic Income Reforms and Household Composition : A Behavioural Microsimulation Analysis.

Verhoeven, P.L. (2019) Adaptability by Design: Incorporating Adaptability Constructs in the Design of Digital Business Ecosystems.

Verkleij, Martijn (2019) Teaching programming using industry tools.

Vermast, Alissa (2019) Using VR to induce smoke cravings in low literate or intellectually disabled individuals who have a smoking addiction.

Versloot, C.W.A. (2019) Amplifying the Analyst: Machine Learning Approaches for Buried Utility Characterization.

Visschers, S.H.J. (2019) Perception-aware visual odometry.

Visschers, Stephan H.J. (2019) Perception-aware Visual Odometry.

Visserman, H.A. (2019) Group Activity Recognition Using Channel State Information.

Vliet, T.B. van (2019) Development of a smart wearable : to monitor the physical activity of elderly hip fracture patients during their rehabilitation.

Vos, Matthijs (2019) Characterizing infrastructure of DDoS attacks based on DDoSDB fingerprints.

Vries, L. R. de (2019) Barge Collaborations within Container Logistics : A collaboration to increase the efficiency of barges and barge planning.

Vries, L.J.W. de (2019) IOTA Vulnerability: Large Weight Attack Performed in a Network.

Vries, de, R.H. (2019) Walker: Automated Assessment of Haskell Code using Syntax Tree Analysis.

Vugt, M.M.P. van (2019) The potential of synthetic training data for training deep learning models.

Walle, R. C. M. van der (2019) Streaming array modelling and generating VHDL with Python.

Weers, F.R.T. (2019) Automatic home video editing on music.

Weijers, D.S. (2019) Forecasting Airport Passenger Flow to Improve Cleanliness Perception in Restrooms.

Wels, S.J. (2019) Guaranteed-TX : The exploration of a guaranteed cross-shard transaction execution protocol for Ethereum 2.0.

Wentzel, S. D. (2019) Evaluating Information Retrieval Systems for Children in an Educational Context.

Werink, Rens (2019) On the control allocation of fully-actuated and over-actuated multirotor UAVs.

Wiedijk, R.R.A. (2019) Code Instrumentation with Mod-BEAM.

Wiefferink, BSc C.A. (2019) Visualizing the Performance of an Anycast Network.

Wieren, H.D. van (2019) Signature-Based DDoS Attack Mitigation: Automated Generating Rules for Extended Berkeley Packet Filter and Express Data Path.

Wijlens, B. (2019) Building a framework in Clash to create deterministic sensor and actuator interfaces for FPGAs.

Willems, W.J.M. (2019) Validation of a Datafication Canvas.

Wiltenburg, Daan H. (2019) Aggression Based Audio Ranking : Annotation and Automatic Ranking.

Witlox, K.H.D. (2019) Face unmorphing.

Xia, Ziyang (2019) Speech technology to support interventional radiologists by assisting the hands-occupied problem.

Yadav, Shubham (2019) An Asynchronous Approach for Designing Robust Low Power Circuits.

Yasmin, Fitri Almira (2019) Enhancement in process mining : guideline for process owner and process analyst.

Yazdani, R. (2019) Detection of Malicious IDN Homoglyph Domains Using Active DNS Measurements.

Yeung, Chin Man (2019) Effects of inserting domain vocabulary and fine-tuning BERT for German legal language.

Zaag, Heleen van der (2019) Transferring soft-skills through a digital medium: A proof of concept for co-creation facilitators.

Zande, M.J. van de (2019) Leveraging zero-knowledge succinct arguments of knowledge for efficient verification of outsourced training of artificial neural networks.

Zeng, Xiangshuai (2019) Reinforcement learning based approach for the navigation of a pipe-inspection robot at sharp pipe corners.

Zulkarnaen, Z. (2019) Separation of Interaction Wrench and Wind Disturbances from Wrench Observer in Fully-Actuated UAVs.


Aalbertsberg, A.P. (2018) Synthesis and development of a big data architecture for the management of radar measurement data.

Aker, W.J. (2018) Towards a reference architecture for privacy aware health care organizations.

Almkerk, Marc van (2018) Influence of mindfulness practices on feelings of place illusion in virtual reality.

Baardewijk, Jan Ubbo van (2018) Automatic annotation of the cooking process.

Bakker, Alexander (2018) OSSUM : a framework for determining the quality of Information Security Assessment Methodologies.

Bako, Adam (2018) Presenting temperature measurements of public spaces in Enschede.

Baksi, Shreyo (2018) Kiosk for 3D image acquisition of suspects.

Balistreri, G. (2018) Spatial Analysis of Out-of-Hospital Cardiac Arrest Incidences.

Bannink, S.N. (2018) Risk Management in Cloud Environments: Towards the Adoption of Continuous Auditing and Assurance With EU-SEC.

Barbero, Marta (2018) Reinforcement learning for robot navigation in constrained environments.

Beets, Fedor (2018) Privacy-preserving automated rental checking.

Benthem, T.S. van (2018) Visualizing business performance : real-time BI-dashboards.

Berg, B. van den (2018) Stimulus related evoked potentials around the nociceptive detection threshold.

Bernard, Tobias (2018) Design and evaluation of spatial interfaces in virtual reality.

Beunder, K.M. (2018) Correlating features of malicious software to increase insight in attribution.

Bie, J.A. de (2018) PTA as an approach to fault tree analysis.

Bitew, Semere Kiros (2018) Logical structure extraction of electronic documents using contextual information.

Bloemen, Sander (2018) Designing an application for focussed surveys.

Bloo, F.W.C. (2018) Towards updatable smart contracts.

Boelders, F.B. (2018) Developing a Ready2Help Application.

Bolhuis, W.T.C. (2018) The application of Scalable Agile in Dutch government.

Boom, Q.O. (2018) Overcoming challenges of Big Data Analytics outsourcing meant to improve Business Intelligence.

Bosdriesz, Y. L. (2018) Towards a Reference Architecture for BIM (Building Information Model) Integration in the Construction Industry.

Bosdriesz, Y. L. (2018) Towards a reference architecture for BIM (Building Information Model) integration in the construction industry.

Bouwmans, Bsc. Rens (2018) Item availability restricted.

Braham, K. (2018) Smart cities : crowd management using WiFi based infrastructure.

Brinkkemper, F.L. (2018) Decentralized credential publication and verification : a method for issuing and verifying academic degrees with smart contracts.

Brouwer, Ruben (2018) A user self-reported emotion feedback system.

Bruxvoort, Xadya van (2018) The impact of #MeToo; a data visualization.

Capra, A. (2018) Gamified musical breathing exercises for children affected by Duchenne Muscular Distrophy.

Cardoso dos Santos Coelho, T. (2018) Using digital technology to encourage cultural change and positive behaviours : case study of project SunCard.

Casteleijn, T.K. (2018) Start-up knowledge brought to large organisations : Innovation management software based on blockchain technology.

Chandramohan, Aashik (2018) Machine learning for cooperative automated driving.

Chang, B.L. (2018) A deep learning approach to estimating permanents.

Charismadiptya, G.C. (2018) The design and implementation of situation aware smart logistics in perishable food transportation.

Coenraad, T (2018) Analist: A Tool for Improved Static Type Analysis for Ruby.

Court, M.A. de la (2018) Will we let computers determine what music we listen? Exploring user acceptance of music recommenders.

Crest, Côme du (2018) Scalability & Trustlines Network architecture.

Das, B. (2018) Using mobile sensing to detect indicators of alcohol intoxication.

Denman, Quinton (2018) Generating awareness of ubiquitous monitoring within the Netherlands, referencing the Chinese Social Credit Score.

Dijk, P.A.H. van (2018) An efficient simulation of crosslinked RAFT copolymerization.

Dikken, N. (2018) Digital Sports Training Exercises for Volleyball.

Dortmann, M.L. (2018) Developing a user interface for smart rainwater buffer systems.

Dragomiretskiy, Sergey (2018) The influence of DDoS attacks on cryptocurrency exchanges.

Ekambaranathan, A. and Zaag, H. van der (2018) Vernieuwing en plezier in programmeeronderwijs in de bovenbouw.

Ekambaranathan, Anirudh (2018) Using stylometry to track cybercriminals in darknet forums.

El Assal, Karim M. (2018) Predicting user loyalty in an education support web application based on usage data.

Elskamp, F. (2018) CoDuo: a game for teaching Computational Thinking in Primary Education.

Enthoven, M.M.F.C. (2018) Error Analysis of Optical Self-Localization using Mapped and Distinguishable Beacons.

Fatseas, K. (2018) Embedded neural network design on the ZYBO FPGA for vision based object localization.

Felix, P. (2018) Data-driven retail food waste reduction : a comparison of demand forecasting techniques and dynamic pricing strategies.

Felix, P. (2018) Data-driven retail food waste reduction : a comparison of demand forecasting techniques and dynamic pricing strategies.

Fleur, S. la (2018) Static Analysis of Symbolic Transition Systems with Goose.

Frank, Fabian (2018) Consent management on the Ethereum Blockchain.

Gagelas, P. (2018) “Keep Your Eyes on the Road, Kid!” : Exploring the Potential of Virtual Reality Environments to Teach Children to Keep Their Attention While Biking.

Galvan Hernández, J.A. (2018) Motivational strategies to improve self-management for rehabilitation of older adults.

Gankema, Yvon (2018) Improvement of kitten Scanner.

Geerlings, S.A. (2018) Analysis and Design of a Dependability Manager for Self-Aware System-on-Chips.

Georgiadou, S.E. (2018) Item availability restricted.

Geretto, Elia (2018) A QBDI-based Fuzzer Targeting Magic Bytes Comparisons.

Gerritse, A.J.H. (2018) (Spirit of Create): Exploration of illusory feedback.

Geurts, Christel (2018) Item availability restricted.

Giessen, D. van de (2018) Implementing and Scaling HanzeNet.

Groot, R.J.M. de (2018) Detecting deviant behaviour in information systems by using outlier detection on logs.

Haan, L. M. de (2018) The integration of Big Data in purchasing, as designed in a new Big Data Purchasing Maturity model.

Haan, Sophie de (2018) Application design for the quantified pet domain from a user centered design perspective.

Haan, T. de (2018) BLE Localization using switched-beam angle of arrival for pallet localization in warehouses.

Hamelers, L.H. (2018) Investigating generic online animal activity recognition across different animal species.

Haq, Muhammad Yasir Muzayan (2018) Predicting Loan Default in Retail Credits: The Case of Indonesian Market.

Harleman, R.J.S. (2018) Optimizing Online Advertising using Dynamic Pricing.

Harmsen, Emiel (2018) OpenIMPRESS : an open immersive telepresence system.

Hazekamp, C. (2018) Inferring animal social interaction using proximity based on BLE and LoRa.

Heijer, Frank den (2018) Method for legacy software evaluation based on the Balanced Scorecard and AHP.

Heikamp, F. (2018) Gray-box Network Fuzzing using Genetic Algorithms and Code Coverage.

Hoedemakers, Juliette (2018) Effective visualisation of textile for a Digital Showroom.

Hoekstra, G.I.S. (2018) Towards a software architecture model for the automation of the PIRATE robot.

Hofstra, Matthijs (2018) Integrating Formal Methods Tools : A Case Study.

Hofstra, Silke (2018) Automated analysis and simulation of control systems using dataflow.

Hol, M.C. (2018) Using user workflow analysis to create insights in content-intensive applications : Combining Process Mining and Model-Driven Engineering to create a reusable, scalable and user-friendly solution.

Hoogervorst, R.W.P. (2018) A model-driven data-analysis architecture enabling reuse and insight in open data.

Horst, Oliver (2018) Development of a smart healthcare tracking system : for the hip fracture rehabilitation process.

Hristov, I. (2018) A system for improving analysis of complexes in real estate asset management.

Huizen, J.C. van (2018) Development of a prototype-centred co-design process with autistic people to support semi-independent living.

IJsselmuiden, M.J.H. van (2018) 3D-model annotation for Computer Aided Design in augmented reality.

Iadarola, Giacomo (2018) Graph-based classification for detecting instances of bug patterns.

Ingen, D. van (2018) AIRplay : designing a game for children with asthma to support self-management.

Jeltes, Claire (2018) The introduction of foetal therapy for TTTS patients in the Radboudumc : including the development of 3D FLOVA-SLAM.

Jong, R.F. de (2018) SimpleNLG-NL : Natural Language Generation for Dutch.

Jonkheim, M.H.T. (2018) Capaciteitsanalyse bij Twence: Een simulatieonderzoek naar capaciteit en doorlooptijd.

Juursema, J.A.J. (2018) Improving visual role mining using metadata.

Kamerman, Wim (2018) Classification of Event-Related Google Alerts Using Machine Learning.

Kampman, T.E. (2018) Nabaztag lives: the rebirth of a bunny : an exploration of the Nabaztag as a social robot in a domestic environment.

Keijzer, P.B. (2018) AACE - Assessment of Asthma in Children using Electromyography.

Kemp, T. (2018) Translating LTL to the equational µ-calculus using Büchi automata optimisations.

Keppels, J.H. (2018) Qualitative Measurement of BI Maturity in a SME ICT Organisation.

Kerckhoffs, N.N.J.H. (2018) Is the “Netflix model” favorable for the audio streaming industry.

Kers, Richard Jacob (2018) Low Energy Multi-Hop Mesh Network for Nomadic Localisation Sensors: On the Design, Development and Deployment.

Kers, T (2018) Household occupancy detection for burglary purposes : Risk assessment and effectivity analysis of an unobtrusive, easy-to-implement countermeasure against Wi-Fi tracking.

Kessels, Casper (2018) Rethinking the interactions between people and cars.

Kester, J.J. (2018) CheckMerge: A System for Risk Assessment of Code Merges.

Khattab, A. A. M. (2018) Towards an interactive drone : a Bayesian optimization approach.

Kimirilova, Julia (2018) Meetbaarheid van ‘openheid voor verandering’ door middel van de geautomatiseerde methoden : een literatuurreview.

Kivits, M.P.W. (2018) Constructing a Convolutional Neural Network for Semantic Segmentation of Skin Lesions using a Small Dataset.

Klein Brinke, J. (2018) Device-free sensing and deep learning : analyzing human behavior through CSI using neural networks.

Klein Essink, B. (2018) iFat: an Interface for Fault/Attack Trees.

Klein Nijenhuis, T.A.J. (2018) Discovery and Quantification of Open DNS Resolvers on IPv6.

Kleine Deters, Jan (2018) Therapeutic exercise assessment automation, a hidden Markov model approach.

Kluitenberg, H.F. (2018) Evaluating Quality of Open Source Components.

Knuppe, R. (2018) Drift correction using a multi-rate extended Kalman filter.

Kol, J.C.M. (2018) What is the effect of dominance on the human smiling behaviour in a human-agent dyad?

Kriele, M.A. (2018) Noise-based Frequency Offset Modulation Simulation Model Design : For the analysis of Transmit-Reference Medium Access Control in Multiple Access Ad-hoc Wireless Sensor Networks.

Krooneman, J.M. (2018) Designing a fall detection system for elderly.

Kuiper, F.J. (2018) Behavioural profiles of potential students as basis for more effective university recruiting.

Kuppens, D. (2018) Machine Learning for CT-based clinical triage in hemorrhagic and ischemic stroke.

Kyriazi or Qirjazi, S. (2018) Machine learning approach to model internal displacement in Somalia.

Kyrloglou, Alexandros (2018) Fixed layer Convolutional Neural Network.

Lamers, David (2018) Possibilities for blockchain in the energy transition.

Langerak, Thomas (2018) Model predictive contour control for electromagnetic induced haptic feedback.

Lankhorst, T.J.W. (2018) An architectural approach to cyber-physical system design.

Lathouwers, S.A.M. (2018) Reasoning About the Correctness of Sanitizers.

Latzer, Y.M.E. (2018) Air temperature visualization of public spaces in Enschede.

Li, Canxuan (2018) Design framework for integrating Internet of Things and Wearable Augmented Reality.

Li, Rui (2018) Comparing human-robot proxemics between virtual reality and the real world.

Lin, Shing Long (2018) Optimization for approximate softcore unsigned multipliers on ALtera FPGA's.

Loo, Rick van (2018) Increasing Throughput of FPGA-based Streaming Applications : by using Pipelining.

Looijenga, M.S. (2018) The Detection of Fake Messages using Machine Learning.

Luo, Zhipeng (2018) Network research : exploration of centrality measures and network flows using simulation studies.

Löwik, R.C.P. (2018) Tracking of wireless devices: is it possible and solvable?

Manzano Ibarra, Amaya (2018) Evaluating Usability of Communics Authoring Tool: Comparing Synchronous with Asynchronous Remote Evaluation when using Cognitive Walkthrough.

Marcon, Nicola (2018) Designing a sonic interactive open-ended playground installation.

Markova, Betina (2018) Re-play : Interactive Playground Games To Motivate Playing.

Meciani, Giovanni (2018) Implementation of a power-efficient DFT based demodulator for BFSK.

Meij, D.R. de (2018) Predicting blood glucose for type 2 diabetes patients.

Meijer, S.D. (2018) The implementation of collision avoiding haptic feedback in the pedal-based control of a robotic platform.

Meijerink, M.J. (2018) A visual DSL for automating business processes.

Meinsma, D. (2018) Digging up Malware.

Menne, Alexander (2018) Blockchain in the Sharing Economy : Will Blockchain Disrupt Today’s Winning Business Models?

Michorius, J.A.R. (2018) Fair Machine Learning.

Monteban, J. (2018) Measuring Architectural Complexity : Quantifying the objective and subjective complexity in enterprise architecture.

Morsinkhof, P.K. (2018) Assessing E-Procurement maturity as designed in an E-Procurement Maturity Model and Quadrant Model.

Mortazawy, Ali (2018) Can Smart Homes contribute to the New Product Development (NPD) process?

Muller, D.W. (2018) Predicting the performance of business partners, using issue data of the iSense system : mapping a perception to data using machine learning.

Muller, I.J.T. (2018) Improving the service control tower with proactive decision making : a two-staged alert and intervention generating model for proactive lateral transshipments in an after-sales supply chain.

Mundkur, Arnav (2018) Classification of Respiratory Data: Classifying and analyzing respiratory data to present as feedback towards cultivating habitual diaphragmatic breathing.

Nass, M. (2018) Finding intelligence in disordered boron dopant atoms.

Nauta, M. (2018) Temporal causal discovery and structure learning with attention-based convolutional neural networks.

Nazarian, Arthur (2018) Optimizing the deployment of automated external defibrillators by a data-driven algorithmic approach.

Niehoff, Dennis (2018) Evaluation of Motion Control Algorithms for Miniaturized Agents Moving Inside 3D Fluidic Microchannels.

Nyante, K.A. (2018) Secure Identity Management on the Blockchain.

Odding, A.V. (2018) Creating an Interactive Art Installation for the SmartXP.

Ok, Sun (2018) Smart Moments.

Onis, Ramon (2018) Does your model make sense? : Automatic verification of timed systems.

Oonk, N.M.J. (2018) Item availability restricted.

Oude Weernink, M.J.P. (2018) Developing a system for the integration of vehicle data.

Overbeek, E.B. (2018) Development of a platform strategy framework.

Oyediran, A.S.M. (2018) Scaling beyond HoriZZon.

Panman de Wit, J.S. (2018) Dynamic detection of mobile malware using real-life data and machine learning.

Pathak, Shreyasi (2018) Automatic structuring of breast cancer radiology reports for quality assurance.

Paulissen, J.W.H. (2018) Using depth sensing and augmented reality to improve ski-learning.

Pazhouhi, E. (2018) Automatic Product Name Recognition from Short Product Descriptions.

Pelikan, H.R.M. (2018) "What's going on there?" Negotiating common ground in robotic vs. open Surgery : a comparison of surgeon-initiated requests for action in open and robotic surgery.

Peters, ir. Rifca M. (2018) Identifying and addressing common programming misconceptions with Variables - Part II.

Planting, J (2018) Developing a data repository for the Climate Adaptive City Enschede.

Pool, A.W. (2018) An information systems model for supporting fake news disclosure.

Pühl, Julia (2018) Developing a life-storybook-application for people with dementia.

Raaijen, Thomas (2018) CRM success through enhancing the project management approach.

Rasing, A (2018) Automation and increased use of carrier data to improve the process of ocean carrier selection.

Reebroek, C. (2018) Understanding engagement behavior in online brand communities : how social identity relates to frequency of interaction and tweet sentiment.

Rejek, J. (2018) Conceptual Blending of Dialog and Image Schema - Design and Pilot Test of an Image-Schematically Metaphoric Collaborative Decision-Making Tool.

Rens, Eduard (2018) Extract offender information from text.

Ridder, L.W. van de (2018) Improvements to a tool-chain for model-driven design of Embedded Control Software.

Roediger, Sarah (2018) The effect of suspicion on emotional influence tactics in virtual human negotiation.

Rouwenhorst, J.H.J. (2018) A picture is worth a thousand words : investigating the value of Instagram posts and Twitter posts in predicting movie box office revenues.

Rozendal, S.P. (2018) Redesign of a finger vein scanner.

Schellekens, M.C.C. (2018) Reducing Meat Consumption Using A Mobile Application.

Schoppers, P.A.C. (2018) The Future of E-Learning in Higher Education : Using the scenario planning method to develop four scenarios on the futures of technology-enhanced higher education.

Schuhmacher, M. (2018) Autonomous anatomical structure recognition using machine learning.

Schutijser, C.J.T.M. (2018) Towards automated DDoS abuse protection using MUD device profiles.

Seippel, H. S. (2018) Customer purchase prediction through machine learning.

Sessink, Danique (2018) Using Machine Learning to Detect ICT in Criminal Court Cases.

Simmons, D. (2018) Social Cohesion and Sport in Overijssel : A Social Network Analysis.

Soelen, R.P van (2018) Designing music lessons for the 21st century : make learning a musical instrument more fun, playful and modern.

Spel, Jip (2018) Monotonicity in Markov chains.

Speldekamp, T.J. (2018) Disability insurance : predicting accurate inflow probabilities in an imbalanced data setting.

Spenkelink, J.S. (2018) Consumer-deployable network intrusion detection in public clouds.

Stege, S. ter (2018) Blockchain in logistics : Is blockchain in logistics hyped, or has it true potential to be a game changer?

Stegeman, Lars (2018) Solitor : runtime verification of smart contracts on the Ethereum network.

Szabó, Réka (2018) Penetration testing of AWS-based environments.

Tahir, A. (2018) Predicting Young Soccer Players Peak Potential with Optimal Age.

Tas, J.G.A. van der (2018) Improving the container planning (process), by means of a planning tool.

Teeffelen, K.J. van (2018) Intuitive Impedance Modulation in Haptic Control using Electromyography.

Timmer, I.R. (2018) Anomaly Detection of malicious TLS traffic.

Tolman, Jim (2018) Evaluation of a multi-user virtual reality system for collaborative layout planning processes.

Turkoglu, Mehmet Ozgur (2018) Essay #75933

Verburg, J.G.J. (2018) Supporting the Innovation Process of Industrial SMEs Using Mobina: The first design cycle using mockups and a validation focus group.

Verhoeven, Gijs (2018) The design of a storytelling and learning by teaching activity with a social robot as teachable main character, for primary school language learning.

Verloop, Christiaan (2018) Developing a serious game as a tool for collecting data on food waste behavior.

Vermeij, Jaap (2018) Creating an IT risk maturity model for distributed ledger applications.

Verstoep, Bart (2018) Approximate multipliers for MAC.

Vitanov, Vesselin (2018) The asteroid field of your mind : examine neurofeedback effects in an interactive art installation.

Vries, J.F. de (2018) Redesign & Implementation of a Moment Exchange Unicycle Robot.

Vulpoiu, Ruxandra (2018) Machine Learning Applications in Financial Advisory.

Wal, Djurre van der (2018) Translating AWN networks to the mCRL2 model checker: en route to formal routing protocol development.

Wang, H (2018) Understanding low resolution facial image from image formation model.

Wardhana, Girindra (2018) Automatic Segmentation and 3D Reconstruction of Liver and Tumor.

Wassenaar, J.D. (2018) Linking segments of video using text-based methods and a flexible form of segmentation : How to index, query and re-rank data from the TRECVid ( dataset?

Waterink, J. (2018) Development of a DIY and consumer ready Smart Rainwater Buffer.

Waveren, S. van (2018) Automatic image caption generation for digital cultural emages collections.

Wessels, P.D. (2018) Leveraging behavioural domain models in Model-Driven User Interface Development with GLUI.

Westra, Wybe (2018) Virtual Reality Clothing Design.

Wiefferink, T.W. (2018) Combining usage and profile data for retrospectively analyzing usability of applications with funnels.

Willemsen, M.J. (2018) Improving diagnosis by Grouping Test Cases to Reduce Complexity.

Wooning, I.J. van (2018) Optimood : Transforming Health Data into Practical Advice and Insights.

Yoe, P.C.A (2018) Analysis for a possible implementation of a machine learning algorithm in the packaging process.

Zamani, M.R. (2018) Post-Quantum Secure Authentication Methods Suitable For Quantum Key Distribution.

Zhang, Yi (2018) Situated breakdowns in video mediated communication.

Zijsling, Boris (2018) Dedicated Ambient Displays.

d'Angremont, E. (2018) Towards an automated analysis for the delineation of focal epilepsy : single pulse electrical stimulation and machine learning.


Aakster, Y.M.I (2017) Designing an interactive intervention to unconsciously steer residents of a dementia care facility away from the exit.

Aggelen, J.M. van (2017) Using virtual reality to support substance use disorder treatment in people with an intellectual disability.

Ahmed, Owais (2017) Item availability restricted.

BOON, R.N. (2017) Automatic detection of anomalies in times series data Big data for smart maintenance.

Beke, Chris ter (2017) Interaction development for personal daily support : design of conversational agent for activity tracking.

Bode, M. S. P. (2017) How to Design an Interactive Installation for Concordia.

Boersma, C.H. (2017) Improving the product search process through interface redesign.

Bonnes, Kevin (2017) Predicting mortgage demand using machine learning techniques.

Bos, L.C. (2017) Safe cycling for elderly "see".

Bosch, P.P. van den (2017) Moral Intelligence for IT production.

Brakels, M. (2017) Forward error correction and failure rates on Aurora high-speed links.

Brink, B. van den (2017) Orchestrating Similar Stream Processing Jobs to Merge Equivalent Subjobs.

Brugman, Tristan (2017) A methodology for deriving aggregate social tie strengths from mobility traces.

Brus, T.A. (2017) Applying E-learning and persuasive design : teaching new users of an online accounting tool the basics of online bookkeeping.

Buis, J.T.P. (2017) Applying intelligence amplification to the problem of schema matching.

Buit, L.J. (2017) Developing an easy-to-use Query language for verification of lighting systems.

Burghardt, Carmen (2017) How to design fashion applications.

Buursink, E.H. (2017) Evaluation and development of a decision support system for patients after an open heart surgery : Early online cardiac telerehabilitation programme.

Böckle, Marc-Philipp (2017) SAV2P-shared automated vehicle to pedestrian communication : exploring the impact of an interface for shared automated vehicles on pedestrians' level of comfort.

Cañizares, Jose Carlos (2017) The Information Society: Technological, Socioeconomic and Cultural aspects - Prolegomena for a sustainability-oriented ethics of ICT, with glossary and PhD prop.

Chenet, M. (2017) Identify and extract entities from bibliography references in a free text.

Davanian, Ali (2017) Effective granularity in Internet badhood detection: Detection rate, Precision and Implementation performance.

Deenik, W. (2017) Teaching a machine beauty : intelligent interactive evolution of abstract animations.

Delaere, Yvo (2017) Implementation and optimization of facial recognition with the IntelRealsense SR300.

Diallo, A.O. (2017) Traffic filtering based on subsystem component state.

Dijk, J. F. van (2017) Three dimensional capacitive sensing for wearable technology : a development example for creative technology.

Dijkstra, F.B. (2017) UCAVs Against Air Threats : Pre-feasibility Study for a Semi-Direct Control System.

Dillimono, D.D. (2017) Nonverbal empathetic communication in coaching wearables.

Donners, Y. (2017) 3D Interactive visualisation framework for simulated systems in large scale print system design.

Dzulqarnain, A.R. (2017) Distributed Processing for Operational Modal Analysis of Bridge Infrastructures Using Wireless Sensor Networks.

Ede, Thijs S. van (2017) Detecting adaptive data exfiltration in HTTP traffic.

Ede, Thijs S. van (2017) Detecting adaptive data exfiltration in HTTP traffic.

Elfaramawy, Ibrahim (2017) Designing an accessible workflow for Rapid Prototyping on a homemade 3-axis CNC machine.

Ellery, D. (2017) Writing reusable code for robotics.

Engelgeer, Timo (2017) Designing a wireless node-based energy meter to measure both real and reactive power.

Fahmi, Shamel (2017) Respiratory motion estimation of the liver with abdominal motion as a surrogate : a supervised learning approach.

Fasya, Evania Lina (2017) Automatic question generation for virtual humans.

Fouda, Kareem M.I.A. (2017) Payload based signature generation for DDoS attacks.

Fritz, Felix René (2017) Bike Sharing in New York City: How the Citi Bike System serves Points of Interest.

Gerats, B.G.A. (2017) Increasing technician's efficiency in executing proactive maintenance tasks : an augmented reality concept.

Goedicke, D. (2017) On-road virtual reality driving simulator.

Gottimukkala, Anirudh (2017) Implementation of a digital Class - D amplifier controller in CλaSH.

Guo, Mengran (2017) Research Line: a new design for better information sharing and storage between mentors and students in the E-mentoring process.

HE, Y. (2017) Extracting document structure of a text with visual and textual cues.

Harrower, Jeffrey (2017) Social communication and digital privacy concerns of teenagers.

Hidding, S. (2017) iBeacons for Concordia : Exploring the possibilities of iBeacons in a museum context.

Huttinga, N.R.F. (2017) Insights into deep learning methods with application to cancer imaging.

Jager, J (2017) Joint level modelling, characterisation and torque control of the SHERPA robotic arm.

Jansen van Rosendaal, J.B. (2017) A context aware dynamic lighting system for the SmartXp.

Jia, Xin (2017) Understanding social signals from nonverbal behaviors in a mobile setting.

Jong, T. de (2017) Using Requirement Templates to Automate Requirements Formalization.

Jonkman, Remi (2017) Implementation of a reliable 2D approximator using sonar.

Jundt, O. (2017) Fashion product entity matching.

Kas, G.R. (2017) Rapportage about testing of the 3D motion correction.

Kerkers, M. (2017) Assessing the Security of IEC 60870-5-104 Implementations using Automata Learning.

Kessel, L.J. van (2017) A desk light to improve working attitude.

Khotina, A. (2017) An innovative search interface for Gesture Dictionary.

Kip, J.B.W. (2017) Developing a Data Visualization Tool for Minimal Cut Sets.

Koopman, M.P. (2017) Improved customer relationship using self-service.

Korthout, N. (2017) Towards an architecture design for a future societal energy supply system.

Krak, R. (2017) Cycle-Accurate Timing Channel Analysis of Binary Code.

Kuipers, J.H. (2017) Anycast for DDoS.

Lammers, F.G. (2017) ChildFinder : Finding the Child that walked away playing.

Larizgoitia Burgaña, Jon (2017) Design and evaluation of a link-state routing protocol for Internet-Wide Geocasting.

Lechner, Zoe Carlotta (2017) Facing 21st century challenges : an assessment of the EU’s security provisions in the light of increasing cybercrime.

Lenz, Dominik (2017) Finding neural correlates for social relationships using EEG hyperscanning.

Linden, J.J. van der (2017) The relation between online entrepreneurship and offline and Web 2.0 learning technologies.

Looman, J.H.A. (2017) Mobile applications on the work floor : The use of mobile applications in fast moving consumer goods warehouses.

Manterola, Nahuel (2017) Creating 3D images for facial recognition using the RealSense SR300.

Meekes, M L (2017) Serious Game for Stroke Rehabilitation on the HTC Vive.

Mensing, Max (2017) Item availability restricted.

Meteer, O. (2017) Real-Time rasterization on the Starburst MPSoC.

Muinck Keizer, D.M. (2017) Photoacoustic Tomography for Finger Joint Imaging: Tackling Artefacts.

Muller, A. (2017) Socially shared regulation in Scrum teams : A multiple case study into the regulation processes in Scrum team meetings and variations both within and across teams.

Nab, F. (2017) Analyse en optimalisatie van het maaltijdserviceproces.

Niechwiadowicz, Karolina Julia (2017) Virtual Reality and Game Mechanics in Generalized Social Phobia Treatment.

Niesink, S.W.R. (2017) Improving biomedical information retrieval with pseudo and explicit relevance feedback.

Nieuwenburg, E.C.E.M. (2017) Project Buddiez : designing for long-distance-friendships between children.

Noppers, Joke (2017) Understanding computer science : how the discipline of computer science develops new understanding.

Okken, B. (2017) Design and Empirical study of tilting propellers of an over-actuated quadrotor.

Ong-A-Fat, K.K. (2017) Context Aware GPS Error Correction.

Oude Elferink, W.G. (2017) Multi-camera tracking of soccer players through severe occlusions.

Ozaita Araico, Alejandro (2017) Detection of the crowdedness of a place sensing the devices in the area.

Pars, Cas (2017) PHREE of Phish : The Effect of Anti-Phishing Training on the Ability of Users to Identify Phishing Emails.

Penkov, Ivan (2017) Block chain use cases beyond payments.

Pool, T.J. (2017) Drone swarming and combat management : visualizing and managing an autonomously functioning swarm of drones with as mediator Combat Management System(CMS).

QIN, L. (2017) Operator control hierarchy for multiple robot systems.

Rieffe, Dennis (2017) The traceability of medical equipment through hospitals and retirement homes.

Rindt, F.S. (2017) Developing a Smart Rainwater Buffering System for the Citizens of Enschede.

Ruiter, Bryan (2017) Towards a continuous auditing philosophy.

Ruizendaal, Rutger (2017) The potential of deep learning in marketing : insights from predicting conversion with deep learning.

Saeed, Aaqib (2017) Deep physiological arousal detection in a driving simulator.

Samuel, L.N. (2017) Computations in Stochastic Game Theory : large sets of rewards in games with communicating states and frequency-dependent transition probabilities and stage payoffs.

Sarrionandia Uriarte, Nora (2017) Efficiency of broadcasting in vehicular networks by means of 5G device-to-device communications.

Scholten, J. (2017) The determinants of cloud computing adoption in The Netherlands : a TOE-perspective.

Schreuder Goedheijt, Bart (2017) Recalling shared memories in an embodied conversational agent : personalized robot support for children with diabetes in the PAL project.

Schultz, Pim (2017) Using machine-learning models for operational exception handling : a case study at IBM.

Schurink, N.W. (2017) Hyperspectral imaging and tumor classification for intra-operative colorectal cancer resection margin evaluation.

Serban, A.C. (2017) Context based personalized ranking in academic search.

Shyvakov, O. (2017) Developing a security framework for robots.

Siebel, R. (2017) Video distribution in a D2D enabled 5G network supporting Public Safety Services.

Slot, M.C. (2017) The SocioMetricVis : Giving feedback during a brainstorm.

Slutter, M.W.J. (2017) Creating a feedback system with the Myo Armband, for home training for frail older adults.

Smit, Floris (2017) Applying data science to improve municipal youth care.

Snaauw, G. (2017) Camera calibration for oblique viewing laparoscopes.

Sondermann, Matthias (2017) Demand Response Interoperability for the residential European Energy Market - Identifying Standardization Gaps between a Demand Response pilot project and a proposed best practice.

Spil, Gino van (2017) Delay compensation in mobile face tracking.

Steeghs, G.G.T. (2017) Developing a smart rainwater buffering system for the municipality of Enschede.

Stevens, Stefanie Antonia (2017) Job satisfaction and work-life balance: an explorative study on remote workers.

Stuyver, R. W. (2017) Assessing and redesigning processes in the pharmacy to improve pharmaceutical care.

Terpstra, E. (2017) Designing a requirements engineering process for performance monitoring.

Terrivel, M (2017) Computationally Efficient Vision-based Robot Control.

Teunen, Freek (2017) Item availability restricted.

Theuns, J.K.H (2017) Visualising Origin-Destination Data with Virtual Reality: Functional prototypes and a framework for continued VR research at the ITC faculty.

Tjeerdsma, R. (2017) Developing a backend solution for ISO15118-driven EV charging with Plug-and-Charge.

Tol, K.M. van (2017) Developing a stimulating environment in a residence facility for dementia patients.

Tolle, T. (2017) Filtering social media data streams.

Torbecke, Janina (2017) Symbolic Model Checking with Partitioned BDDs in Distributed Systems.

Torn, I.A.R. (2017) The future of purchasing and industry 4.0 : how purchasing can progress and benefit the fourth industrial revolution.

Trouwborst, C. (2017) Towards increased autonomy of a rail-guided robot for the inspection of ballast water tanks.

Verkleij, Jelmer (2017) Behavioural analysis of program intent using data origins, influence and context.

Verlinden, M.G. (2017) StepFarm: An Active Video Game to Support the Self-Management of Chronic Diseases in Children.

Verzijl, Peter (2017) Using serious games to teach cause effect relationships in asphalt quality.

Vetter, Boaz (2017) Designing a smart rainwater buffer.

Vogelzang, K.H. (2017) The tennis trainer : development of a Myo armband application.

Vor dem Berge, Moritz Frederik (2017) Digital privacy : behaviour and anxieties of a young digital generation.

Vries, L R de (2017) Informatica: ontwerp van lesmodule 'Gezichtsuitdrukkingen in sociale robotica'.

Wang, Haitao (2017) Redesign of the E-Cone: A tool for treatment of hand disease.

Wentink, D.J.M. (2017) Signal Recovery using CλaSH.

Westerdijk, W.S.K. (2017) Sound Swarm : experience sound from the inside.

Wettum, Y.C. van (2017) Facial landmark tracking on a mobile device.

Wijnholt, R. (2017) Design of a real-time network channel in LUNA.

Willems, P. (2017) Mood controlled affective ambiences for the elderly.

Winsen, Stijn van (2017) Threat modelling for future vehicles : on identifying and analysing threats for future autonomous and connected vehicles.

Wohlfahrt-Laymann, Jan (2017) CogniDecline : tracking mobile interaction for cognitive assessment.

Wolbers, J.J.H. (2017) Attracting Passersby into a Building using an Interactive Installation.

Wolters, S.H.G. (2017) Smartwatch and Intellectual Disability : Designing an app that improves the lives of people with an intellectual disability and their caretakers.

Xiang, Y. (2017) How is emotion change reflected in manual and automatic annotations of different modalities?

Xie, Chenghong (2017) Design of an m-health application for low-literacy diabetes patients in India.

Yu, J.J. (2017) Essay #75354

Zijden, W. van der (2017) Multi-Tenant Customizable Databases.


Andreev, L. (2016) Sociometric badges in a high-stakes setting : living proof a sociometric feedback visualization.

Appel, R.N. and Folmer, H.H (2016) Analysis, optimization, and design of a SLAM solution for an implementation on reconfigurable hardware (FPGA) using CλaSH.

BOLSCHER, W.F. TEN and BRAAK, T.P. TER and HAAN, S.J.H. and POIROT, M.G. (2016) Item availability restricted.

Baars, D.S. (2016) Towards self-sovereign identity using blockchain technology.

Baas, S.P.R. (2016) A machine learning approach to the automatic classification of female uroflowmetry measurements.

Badin, Y. (2016) Contextual Authentication : Using Mobile Phone Movements to Authenticate Owners Implicitly.

Balk, Roland (2016) SQLento: database programming made easier.

Bankert, J.J.M. (2016) Comparison of Symbolic and Distributed Representation Language Models on the Lexical Substitution and Simplification Tasks.

Barbieri, G. (2016) Control architecture for docking UAVs with a 7-DOF manipulator.

Berg, T.M. van den (2016) Radar sensing for automotive parking distance control applications.

Berkel, A.R.R. (2016) The new Luxon : a research into software expansion in the Lighting-as-a-Service market.

Beukema, W.J.B. (2016) Enhancing Network Intrusion Detection through Host Clustering.

Boer, G. (2016) Vertrouwen in telepresence bij ouderen : het effect van technische storingen op het delen van persoonlijke informatie.

Boerdonk, R.A.C. van (2016) Pensioenbewustzijn: Kan IT hieraan bijdragen?

Bokhove, T. (2016) Improving the model management workflow.

Bol Raap, W (2016) The design of a common data model for generic synchromodal cargo-tracking in logistics using web scraping and big & open data.

Bos, K.E. and Hasper, W. (2016) Enabling measuring of the patient flow in an orthopaedic clinic.

Boti, B.R. (2016) Automatic quantification of Ki-67 proliferation index through co-registration with CAM 5.2 stained tissue to improve colorectal carcinoma diagnostics and therapy.

Braak, J.C. ter (2016) Radiolocalisation at construction sites.

Ciobotea, C. (2016) Improving payment authorization rates : by intelligently routing transactions.

Ding, H. (2016) Integrating value modeling into ArchiMate.

Dokter, J. (2016) 20-sim Template for Raspberry Pi 3.

Dute, J.A. (2016) Predicting the unpredictable : predicting surgical case durations and overtime probabilities to maximise OR-efficiency at Thoraxcentrum Twente.

Elsinga, J.W. (2016) On a framework for domain independent heuristics in graph transformation planning.

Ensink, E.S. (2016) De overstap van Excel naar Exact.

Esquivel-Vargas, Herson (2016) Automatic deployment of specification-based intrusion detection in the BACnet Protocol.

Etheredge, C.E. (2016) GoSlow: Design and Implementation of a Scalable Camera Array for High-Speed Imaging.

Fokkema, J. (2016) Using a challenge to improve face spoofing detection.

Folmer, H.H. and Appel, R.N. (2016) Analysis, optimization, and design of a SLAM solution for an implementation on reconfigurable hardware(FPGA) using CλaSH.

Franck, T. (2016) Towards an Integrated Model of Smart Manufacturing Enterprises.

Ghasemieh, H. (2016) Influence of short cycles on the PageRank distribution in scale-free random graphs.

Gijsen, N. (2016) Prototyping and feedback design in a serious game context.

Grefte, L.J.L. (2016) NI myRIO as target for 20-sim.

Hakkenberg, Chiel (2016) Experimental evaluation of LoRa(WAN) in indoor and outdoor environments.

Heijblom, A.R. (2016) Using features of models to improve state space exploration.

Herwijnen, A.G. van (2016) The influence of inner-state displays on human-human interaction.

Hessels, Stefan (2016) Bridging the gap : from process mining to business process simulation.

Hijum, S. van (2016) Symbolic model checking of timed automata using LTSmin.

Hillerström, F.H.J. (2016) Deep verification learning.

Hindriks, H.N. (2016) Vulnerability analysis of cyber security modelling language models using probabilistic logic.

Hoogesteger, Martijn (2016) Securing mobile VoIP privacy with tunnels.

Huisman, A.B. (2016) Deception detection using keystroke dynamics : on the methods to predict deceptive behavior by looking at the keystroke rhythm.

Huistra, D.J. (2016) Automated generation of attack trees by unfolding graph transformation systems.

Hulsebosch, M.A.C. (2016) Cloud Strife : an analysis of cloud-based shadow IT and a framework for managing its risks and opportunities.

Jagannatha, P. (2016) Detecting Exploit kits using Machine Learning.

Jansen, R. (2016) Waypoint navigation with obstacle avoidance for MAV's.

Janssen, Bas (2016) Determining truth in tweets using feature based supervised statistical classifiers.

Janssen, Stefan C. (2016) Reducing labeled data usage in duplicate detection using deep belief networks.

Jimenez Kwast, D. (2016) GPU-Based Photon Mapping for Approximate Real-Time Indirect Diffuse Illumination.

Kappert, K.D.R. (2016) VIRTUAL SURGERY: Development of a surgical simulation tool for the prediction of functional impairment after partial glossectomy.

Keller, Kristian M.Sc. (2016) A day ahead electricity storage flexibility prediction for peak shaving.

Klein, A.V.E. (2016) Nonverbal Communication of Anthropomorphism and its Effect on the Perception of Online Education Platforms.

Kok, K.J. (2016) TERRA support for architecture modeling.

Koot, Martijn (2016) Overzichtelijke IT Incidenten: Optimalisatie van het IT Incident Management binnen URENCO Nederland B.V. met behulp van Enterprise Architecturen.

Korać, Kristijan (2016) Impact of Data Visualisation on Users in CRM Systems.

Koukoulis, Yannis (2016) Dual laser fault injection.

Krediet, A.C. (2016) Developing and testing an APP model for Air Spiralo.

Kreiser, Simon (2016) Marrying GUI and Git : how authoring tools for E-Learning can benefit from version control.

Laarhuis, N.M. (2016) Making rational decisions about IT projects using Enterprise Architecture : a case study conducted at ASML Netherlands N.V.

Lang, Shanna de (2016) Mobile pain screening with FollowUp : an app to support anaesthesiologist in the pain screening at outpatient clinics.

Langen, S.F. van (2016) An architectural design for LAN-based web applications in a military mission- and safety-critical context.

Langkamp, L.U. (2016) Het Effect van Self- Explanation Questions in een Educatieve Game op de Game en Leerprestatie.

Laverman, G.J. (2016) Java Code Virtualization of Industrial-strength Java Code.

Le, Van Huynh (2016) Analyzing white-box designs for differential computation analysis resistance.

Lijbers, J.M. (2016) Predicting parking lot occupancy using Prediction Instrument Development for Complex Domains.

Liu, Luyao (2016) Applying intelligence amplification in decision making.

Lubberdink, W.H.H. (2016) Op weg naar een praktische en eenduidige standaardisatie van producteenheden.

Maan, H.C. (2016) Item availability restricted.

Maat, GJ ter (2016) Towards a scalable environment for traffic information services.

Man, Shen Yi (2016) Data driven banking : applying Big Data to accurately determine consumer creditworthiness.

Meer, A.J.M. van der (2016) Mapping the underworld.

Meijer, Z. (2016) Definition, ideation and validation of the 'Bucketlist'.

Mentink, Fons (2016) Machine driven predictions of the socio-economic status of Twitter users.

Moscoviter, D. (2016) Improving spatial indexing and searching for location-based DNS queries.

Münch, D. (2016) Translating clinicians’ needs into requirements for a future Computerised Decision Support System in antibiotic therapy : a user-centred design and requirements engineering approach in a German geriatric hospital setting.

Neele, Thomas (2016) GPU implementation of partial-order reduction.

Noort, W (2016) Gathering intelligence from the Bitcoin peer-to-peer network.

Nutma, J. (2016) More comprehensive demand side management by the integration of the powermatcher and triana.

Odyurt, Uraz (2016) Bring your own authenticator/authentication security in physical access control systems.

Orij, J. (2016) Self-adaptation to concept drift in web-based anomaly detection.

Ouden, J.J.A. den (2016) A quest for the best automated tests : Estimating software reliability based on Spec Explorer's on-the-fly test results.

Outersterp, R.M. van (2016) Partitioning of Spatial Data in Publish-Subscribe Messaging Systems.

PINGEN, G.L.J. (2016) Machine Learning for Ground Cover and Hot Target Analysis in RGB and Satellite Imagery.

Pakhira, A. (2016) A Fault Injection Framework for Reliability Evaluation of Networks on Chip Designed for Space Applications.

Peeters, J.J. (2016) Fast and Accurate Likelihood Ratio Based Biometric Verification in the Encrypted Domain.

Pfab, Isabel (2016) A wearable intervention for posture correction.

Pijnenborg, I. (2016) Methodological guideline to find suitable design patterns to implement adaptability.

Prause, L. (2016) Software vendors' service infusion : a generic value network of cloud-based enterprise software.

Prenger, A.H. (2016) Effect of rotating virtual product presentation on purchase intention in online stores.

Pross, L.S. (2016) Trust in the Cloud.

Rauleder, S. (2016) Cloud computing as an entrance for start-ups into ERP solutions.

Rieksen, R.H. (2016) Perfect selfie that can be used in face recognition with a passport photo.

Ritterfeld, Thom (2016) On-demand app development.

SIMSCH, J.J. (2016) Video Quality in VR : Measuring Impact of Bandwidth-Saving Approaches on Quality of Experience and Social Interaction in a HMD-mediated Video Application.

Salomons, T. (2016) Een basis voor continu verbeteren bij AWL.

Santema, S.E (2016) Insight in Scheduling Choices:A Visualisation Tool for SDF Graphs.

Schniering, A.A. (2016) The relationship between human factors and presence experienced in Virtual Environments (VEs).

Schroer, G.H. (2016) Feasibility of End-To-End Encryption using Attribute Based Encryption in Health Care.

Schultewolter, M. (2016) Verification of user information.

Slatman, H. (2016) Unboxing security analytics : towards effective data driven security operations.

Slot, M.J. (2016) Ethics of Algorithms.

Spoor, R.J.F. (2016) Design of an Ultrasound Guided Breast Biopsy End-effector.

Strooisma, Ale (2016) A monitoring solution for multi-language software.

Sybenga, S.D.A (2016) Anomaly detection in defence and surveillance.

Teerenstra, G.H.G. (2016) The start of IT Governance in a Dutch Academic Medical Centre.

Tent Beking, Michiel van (2016) Sparse Array Antenna Signal Reconstruction using Compressive Sensing for Direction of Arrival Estimation.

Teschner, J. (2016) Serious Games in Medical Education : as Learning Tools.

Thirukokaranam Chandrasekar, Krishna Kumar (2016) Tracking and Control of Soft, Self-Folding Miniaturized Agent using Ultrasound Images.

Trillhose, Frank T. (2016) Controlling the production cell using TERRA-LUNA.

Uebbing, Tobias J. (2016) User experience in smart environments : design and prototyping.

Varkevisser, R.A. (2016) Large Scale Online Readability Assessment.

Veer, D. van der (2016) Design of a GMSK Receiver Prototype on a Heterogeneous Real-time Multiprocessor Platform.

Venema, M. (2016) DM3730 Camera interfaces on Gumstix.

Verheij, J.G.J. (2016) Co-simulation between CλaSH and traditional HDLs.

Verkuil, S. (2016) CiteRep - Journal Citation Statistics for Library Collections using Document Reference Extraction Techniques.

Vijver, B. van de (2016) A Human Robot Interaction Toolkit with Heterogeneous Multilevel Multimodal Mixing.

Vinke, D. (2016) Enhancing Video Game Design: Involving Users into the Design of Video Games.

Vlutters, S. (2016) Long short-term memory networks for body movement estimation.

Vonk, Jeroen (2016) Bisimulation Reduction with MapReduce.

Vossen, J.J. van (2016) Offloading Haskell functions onto an FPGA.

Vries, J.J. de (2016) A Tick Based Fixed Priority Scheduler Suitable for Dataflow Analysis of Task Graphs.

Vries, S.H.S. de (2016) Achieving 128-bit Security against Quantum Attacks in OpenVPN.

Wang, Q. (2016) A reference architecture for integration platforms.

Werff, W.M. van der (2016) Connecting ROS to the LUNA embedded real-time framework.

Wicaksana, M.A. (2016) IPv4 vs IPv6 Anycast Catchment: a Root DNS Study.

Wijlens, Bart (2016) Intelligent heating of a room.

Wilde, Lisa de (2016) A Bayesian Network Model for predicting data breaches caused by insiders of a health care organization.

Wolf, E.R.B. de (2016) Designing an interaction method for the holograms of today.

Wolf, T. (2016) Design of an Air Factor Sensor based on Light Emission.

Wolters, N.H. (2016) Analysis of Attack Trees with Timed Automata (transforming formalisms through metamodeling).

Xu, Tingting (2016) The Effect of Cultural Difference on the Perception of Online Ordering Website Design.

ZOMPAS, A. (2016) Development of a three dimensional path planner for aerial robotic workers.

Zakiy, Mochammad Fadhli (2016) HW-SW co-Design of an On-Chip IJTAG Dependability Processor.

Zandberg, K. (2016) Passive fingerprinting on an IPv6-enabled network.

Zeilstra, J. (2016) Reasoning about Active Object Programs.


Adriaansen, A.M.A. (2015) Balancing inventory and equipment contingencies by a flexible semiconductor supply chain simulation model.

Allah Bukhsh, Zaharah (2015) BPMN Plus : a modelling language for unstructured business processes.

Baalen, R.B.C. van (2015) Is serious gaming the holy grail for the wearables industry?

Bakker, M. (2015) Numerical mathematics on FPGAs using CλaSH.

Berg, A.W. van den (2015) Improving customer satisfaction through personalization.

Berg, D.A. van den (2015) The risks and benefits of spreadsheet-based financial reporting as a form of shadow it in complex information systems: an action design research leading to the FRASIT-framework.

Berg, W. van den (2015) A systems approach to the design of a management information system for a growing IT service company.

Berkel, Niels van (2015) Item availability restricted.

Bloemen, V. (2015) On-The-Fly parallel decomposition of strongly connected components.

Blommendaal, Chris (2015) Information Security Risks for Car Manufacturers based on the in-Vehicle Network.

Boensma, Robert (2015) Geovisualization and time based mission planning on a multi-touch tabletop.

Bogaard, J.A. van den (2015) Predicting the performance of ERP in a changing and challenging energy market.

Bolhuis, M. (2015) Estimating Creditworthiness using Uncertain Online Data.

Bouius, B A.G. (2015) Characterising the Ripple Effects of Introducing Energy-Awareness Functionality in Cyber-Physical-Systems Software in Cyber-Physical System software.

Breed, I. (2015) Designing a spend analyses method for Power-Packer.

Brilman, Maarten (2015) A multimodal predictive model of successful debaters or how I learned to sway votes.

Brinkhuis, M.E. (2015) Improving the Medicaid eligibility determination process using big data.

Buuren, R.A. ten (2015) Domain-Specific Language Testing Framework.

Carvajal Gallardo, I. R. (2015) Privacy-preserving social DNA-based recommender.

Cheng, Miss Shu (2015) Translating strategy into implementation via capability-based planning.

Chromik, Justyna Joanna (2015) Booters (black)list.

DAM, M.R. (2015) Auditory processing using CλaSH.

Dekker, Thomas W.G. (2015) Applying parental involvement in secondary vocational education using a technological solution.

Dietz, W.S. (2015) A Reference Model Method to align the development of one software system with multiple Hinterland Container Terminals.

Donselaar, V.L. van (2015) Low latency asynchronous database synchronization and data transformation using the replication log.

Drijfhout, Wanno (2015) The Knowledge Cloud: Evolving the data management paradigm.

Dunn, B.C. (2015) De toepassing van de EWMA-methode op het adverteermodel van Joosten (2015).

FU, Q. (2015) Implementing a real-time control algorithm of Triana on SASensor Open Platform.

Fonville, M.E. (2015) The virtual machine delivery network.

Foustanas, Nestoras (2015) Helping elderly users control a telepresence robot with a touch screen.

Geijs, D.J (2015) Geautomatiseerde beeldanalyse van morfologische kenmerken en de motiliteit van een individuele spermatozoon.

Gerritsen, S.N.J. (2015) Using teamwork to enhance the social presence on a distributed playground.

Gijsen, Stijn (2015) Runtime Permission Checking in Concurrent Java Programs.

Hageman, Kaspar (2015) The Performance of ECC Algorithms in DNSSEC: A Model-based Approach.

Hakim, V.S. El (2015) Implementation and Analysis of Real-time Object Tracking on the Starburst MPSoC.

Harmsen, Ruud (2015) Specifying the WaveCore in CλaSH.

Hensema, M.A. (2015) Applying Agile in Enterprise Architecture.

Heukels, F.R (2015) Simultaneous Localization and Mapping (SLAM) : towards an autonomous search and rescue aiding drone.

Hoegen, Rens (2015) Human Behavior towards Virtual Humans.

Hoener, P.M. (2015) Improving the Processes and Safeguards for Fraud Detection and Prevention in US Medicaid.

Huizenga, G.R. (2015) A Front-end Application for Markov Random Field-based Texture Image Segmentation.

Huls, C. J. (2015) A scenario planning for interbank payments and Decentralized Ledger Platforms.

Jhanjhan, W.S.S. (2015) VICA: The Dutch Windmill - Towards a Contemporary Business Information Management Maturity Model.

Jutten, M.G. (2015) The Fit between Business Processes and Process Mining related Activities: a Process Mining Success Model.

KARAMPATZAKIS, E. (2015) Item availability restricted.

Kalcheva, D.K. (2015) Linked Data adoption and application within financial business processes.

Kamminga, J.W. (2015) Cooperative Localisation on Android Devices by Utilising only Environmental Sound.

Kers, R.J. (2015) Head mounted control system for robotic assisted surgery.

Kleverwal, J. (2015) Supervised text classification of medical triage reports.

Koegler, Philipp (2015) IT architectures in e-commerce: The effects of modularity, integration and type of components on e-service quality.

Koelemans, DRPM (2015) Item availability restricted.

Koenen, S.K. (2015) Assessing the level of security of an organization by analyzing the enterprise architecture : a methodology.

Kolkman, M.C. (2015) Cross-domain textual geocoding: the influence of domain-specific training data.

Kolkmeier, Jan (2015) Intimacy is Induced and Regulated Through Proxemic & Gaze Behaviour - A Study in Immersive Virtual Reality.

Krisnawati, Anastasia Maria (2015) Project portfolio valuation with Enterprise Architecture.

Kruk, D.A. van der (2015) A domain-specific language for specifying distributed real-time software system configurations.

Kumar, Atul (2015) Security Analysis of Mobile Payment Systems.

Lange, T.C.B de (2015) IS/IT integration in mergers & acquisitions: a framework for a systematic approach.

Lanting, Peter (2015) Multi-level views in a SUM-based environment.

Leeuwen, M.M. van (2015) Agile Scaling @ Topicus : s caling scrum with help of Agile Scaling frameworks at Topicus Finance.

Leur, C. de (2015) Permission-based separation logic for Scala.

Li, Qin (2015) Examining the accuracy of sentiment analysis by brand monitoring companies.

Ling, Chen (2015) Design and implementation of a control structure for a quadrupe robot.

Lippok, B.M. (2015) Ontwikkeling van een App store voor een iPaaS.

Martakis, A. (2015) Framework for Enterprise Uncertainty-Driven Decision-Making : FEUD.

Meijerink, B.J. (2015) Lossless Multicast Handovers in Proxy Fast Mobile IPv6 Networks.

Middelesch, E.W. (2015) Anonymous and hidden communication channels : a perspective on future developments.

Müller, M. C. (2015) SIDekICk - Detecting Malicious Domain Names in the .nl Zone.

Nazarian, A.A. (2015) Voorraadbeheeroptimalisatie van een retailer.

Oortwijn, W.H.M (2015) Distributed Symbolic Reachability Analysis.

Oost, M. (2015) Analysis of Homecare Nurses’ Attitudes towards, Desires for and Perceived Added Value of Tools on a Tablet.

Overbeek, T.A.G. van (2015) Floater Allocation in Paced Mixed Model Assembly Lines: Design and implementation of a method for operational scheduling of cross-trained workers in Mixed-Model Assembly Lines.

Paauw, Tim (2015) Analysis of unstructured data at GGD : text mining semi-medical notes to predict childhood obesity and abuse.

Parzian, Alessio (2015) Java Card Bytecode Verification. Designing a novel verification system.

Piggott, J.J.H. (2015) Identification of business travelers through clustering algorithms.

Pouw, I.H. (2015) You are what you eat : serious gaming for type 1 diabetic persons.

Raa, I. te (2015) Recursive functional hardware descriptions using CλaSH.

Rodday, Nils Miro (2015) Exploring Security Vulnerabilities of Unmanned Aerial Vehicles.

Roelofs, N.A.J. (2015) Incorporating Seasonality and Volatility Updating in Gas Storage Valuation for the Purpose of Validation.

Roo, M. de (2015) Optimal Event Handling by Multiple UAVs.

Ruth, F.J. van (2015) Improving problem detection and focus for root-cause analysis through case-based reasoning and group decision support systems.

Sandhaus, Hauke Gregor Wilhelm (2015) Development of a 3D navigable interface for a touchless showcase.

Scrinzi, F. (2015) Behavioral Analysis of Obfuscated Code.

Seidel, Carina (2015) Strategic insight in the Capacity & Efficiency with Hospital data.

Senden, J.M.J. (2015) Biasing a ring-oscillator based true random number generator with an electro-magnetic fault injuction using harmonic waves.

Slootweg, M.H.F. (2015) Implementing and Characterising Medical Implantable Wireless Communication Using the Microsemi ZL70102 : And Prototyping a Load Measurement Tool for Unicompartmental Knee Replacement Operations.

Starink, O.A.W. (2015) State-Save Overhead Reduction Techniques for Shared Accelerators in an MPSoC with a Ring NoC.

Sterk, Sjoerd (2015) Realisatie van rijgedrag verbetering d.m.v. een dashboard op basis van gamification.

Stojkovski, Borce (2015) Employing User-Centered Design methods for the development of a Virtual Reality training system for firefighters.

Thunnissen, J. (2015) Communication solution for ICU patients : a case study.

Veen, H. van der (2015) Composing a more complete and relevant Twitter dataset.

Veldhuis, H.D. (2015) Developing an automated solution for ETA definition concerning long distance shipping.

Venis, A.J. van de (2015) Recommendations using DBpedia : how your Facebook profile can be used to find your next greeting card.

Verhaar, Jort (2015) Micrometer scale 3d membrane printing towards locust ear imitation.

Versluijs, Wouter (2015) Understanding Information Technology : information technology as extension and its implications for the flourishing of the individual.

Vettorel, Diego (2015) Design a platform for providing home-based services concerning: care, safety, comfort and fun.

Visser, N.S. (2015) Fully automated web harvesting using a combination of new and existing heuristics.

Vocke, Tom (2015) An evaluation of the Adapteva Epiphany Many-Core Architecture.

Vorstenbosch, S. (2015) On-premise to SaaS Integration Risk Mitigation A framework to gain insight in the risks, and recommend mitigation strategies, specific to on-premise to SaaS integration.

Vos, Peter-Jan (2015) Demonstrator combining ROS/TERRA-LUNA.

Wolbers, S. (2015) Participatory design approach to improve the communication between care providers through the electronic health record.

Ye, Xiaohao (2015) GlucOnline Coach: a virtual coach app for diabetes patients.

Zanetti, Nicola (2015) Concept-drift in web-based IDS : evaluating current capabilities & future challenges.

de Vries, J. (2015) The Generation of Booter (black)lists.


A., E. (2014) Item availability restricted.

Abreha, Gebremedhin Teklemariam (2014) An environmental audio-based context recognition system using smartphones.

Aertsen, M.Y. (2014) Verifying functional requirements in multi-layer networks: a case for formal description of computer networks.

Akbar, Nurul (2014) Analysing Persuasion Principles in Phishing Emails.

Amrin, Nabila (2014) The Impact of Cyber Security on SMEs.

Anagnostopoulos, Nikolaos Athanasios (2014) Optical fault injection attacks in smart card chips and an evaluation of countermeasures against them.

Anagnostopoulos, Nikolaos Athanasios (2014) Optical fault injection attacks in smart card chips and an evaluation of countermeasures against them.

Aregay, Tesfay (2014) Ranking Factors for Web Search : Case Study in the Netherlands.

Badarinath Hampiholi, Brinda (2014) Secure & privacy-preserving eID systems with Attribute-Based Credentials.

Beckers, Mr D.K. (2014) Information waste on the World Wide Web: combating the clutter.

Beestman, Linda (2014) Interactive whiteboard use in elementary education : How to support teachers to improve their education, using the interactive whiteboard.

Berg, Boudewijn van den (2014) Visual tracking of magnetic microrobots in biomedical research applications.

Biesbroek, Rudolf (2014) Last-mile lightpath services : on packet-switched shared infrastructure.

Bokhove, Tom (2014) Public data visualisation in traffic, based on local, real-time monitoring.

Bolhuis, M (2014) Using an NFC-equipped mobile phone as a token in physical access control.

Bolscher, P.S. (2014) Automated external fraud prevention in the public sector.

Bookholt, Erik (2014) The Impact of Enterprise Architecture on Business Performance.

Boom, N. (2014) XRM at a bilateral trade organisation.

Bortolameotti, Riccardo (2014) C&C Botnet Detection over SSL.

Bos, J.C.H. (2014) Synthesizable Specification of a VLIW Processor in the Functional Hardware Description Language CλaSH.

Bos, Mart van den (2014) An integrated hydrodynamic-economic model for setting differentiated insurance premiums.

Bos, S.L. (2014) Improving the well-being of independently living seniors using ICT How can a personal service be used to improve the self-efficacy, social engagement and security awareness of independently living seniors?

Brinke, Hans ten (2014) Hide and sneak - Perceptions in The Virtual Storyteller.

Broekema, C.D. (2014) Modelling loitering character agents in conflict situations: Visualizing and evaluating interpersonal conflict strategies.

Broekhuis, Djurre (2014) Sousveillance on Intelligent Transportation Systems.

Broenink, Ralph (2014) Finding Relations Between Botnet C&Cs for Forensic Purposes.

Bronkhorst, T.A.W. (2014) Hardware design of a cooperative adaptive cruise control system using a functional programming language.

Claase, Marcella (2014) Why do users bond with online services? : a literature review on the conceptualization of online user bonding in the context of online services.

Corradin, M.C. (2014) Then and Now: On The Maturity of Cybercrime Markets - A study on regulation enforcement of forums in the online underground trading economy.

Davelaar, K.I. (2014) Protecting high school students from bullying: Bully Shield.

Demkes, K.H. (2014) Automated tuning of an algorithm for the vehicle routing problem.

Deneka, Agnes (2014) A coach ECA to increase Societal Participation of Low Literates and Non-Native Citizens in the Societal Participation Learning Support System.

Dijk, T.G. van (2014) Tuning the Parameters of a Loading Algorithm.

Drenthen, S. (2014) Towards continuous delivery in system integration projects : introducing a strategy to achieve continuous delivery and test automation with FitNesse.

Duraisingam, Prithivi Ram (2014) Crack detection in semiconductor products : machine vision techniques for detection of cracks in semiconductor products.

Elderen, Sybren van (2014) Beating Logic: Dependent types with time for synchronous circuits.

Erich, Floris Marc Arden (2014) Improving information system development and operations using the DevOps conceptual framework.

Fu, Q. (2014) Validation of Interpersonal Stances Expressed by Virtual Suspect Characters in a Police Interview Setting.

Galen, Rick van (2014) Design and feasibility of mobile peer-to-peer payment systems.

Gielen, M W (2014) Prioritizing Computer Forensics Using Triage Techniques.

Haji Ghasemi, Maryam (2014) Symbolic model checking using Zero-suppressed Decision Diagrams.

Heer, G.W.A. de (2014) Instance Pointcuts.

Hek, J. (2014) Clustering the results from brainstorm sessions.

Heling, Yoran (2014) Biased Random Periodic Switching in Direct Connect.

Hendriks, Luuk (2014) SSH Compromise Detection using NetFlow and IPFIX.

Hessels, Stefan (2014) Adoption of Personal Health Records (PHR) in The Netherlands: A study using the PRIMA-model.

Heuven, D.W. (2014) Opportunistic sensing & Aggregation network Using Smartphones and Sensor nodes.

Hoek, Marissa (2014) Generating Dutch focalized stories about interaction in a serious game.

Hummel, Tim (2014) Exploring Effects of Electromagnetic Fault Injection on a 32-bit High Speed Embedded Device Microprocessor.

Jochemsen, M.C. (2014) An exploration of content-driven commerce.

Jong, Berend J.M. de (2014) A basis for the next VHDL revision.

Jonker, M. (2014) Flow-based SSH Dictionary Attack Detection: the Effects of Aggregation.

Joustra, Yme (2014) Forecasting of wind power production in the Netherlands.

Kamp, T.R. van de (2014) Combining ABCs with ABE: Privacy-Friendly Key Generation for Smart Card Based Attribute-Based Encryption.

Kamphuis, Gertjan (2014) Adding Quality of Service to Disruption Tolerant Networking using the ORWAR routing protocol for use in military MANETs.

Kandziora, Jorne (2014) Runtime assertion checking of multithreaded Java programs - An extension of the STROBE framework.

Kars, J. (2014) Improved performance by integrated corrugator and converter scheduling.

Karuppiah Ramachandran, Vignesh Raja (2014) Characterization of Communication Mechanisms for Implantable Body Sensor Networks.

Keeris, P.J.C. (2014) Improving the boarding process of external insiders in large organisations.

Kegel, R.H.P. (2014) Development and Validation of a Personal Information Security Assistant Architecture.

Knippers, D. (2014) Querying Uncertain Data in XML.

Kooij, W.J. (2014) Playout delay of TV broadcasting.

Krist, J.O. (2014) The effect of residential storage and conrrol on the distribution net compared to central storage and control.

LU, Yuan (2014) Essay #64997

Loker, Andre (2014) Evaluating data structures for runtime storage of aspect instances.

Marenco Zúñiga, Andrés (2014) Federated Aggregated Search.

Meijer, J.J.G. (2014) Improving Reachability Analysis in Ltsmin - Guards, Read, Write and Copy Dependencies for mcrl2, Promela and Dve.

Mirchev, Hristofor (2014) Creating a Modular AspectJ Foundation for Simple and Rapid Extension Implementation.

Molder, Jantine te (2014) The redesign of a cashier trainer.

Molen, N.J van der (2014) Item availability restricted.

Nibbelke, Vincent (2014) Vascular pattern recognition for finger veins using biometric graph matching.

Nienhuis, J. (2014) Using Change Management to improve CRM User Acceptance.

Oude Elferink, Wout (2014) Fingerprint acquisition with a smartphone camera.

Pallett, Dennis (2014) Improving Query Performance of Holistic Aggregate Queries for Real-Time Data Exploration.

Paramartha, Mohammad Anggasta (2014) Design and Instantiation of Reference Architecture of Pluggable Service Platform in E-Commerce.

Peters, Rifca Marcella (2014) How Turn-Taking Influences the Perception of a Suspect in Police Interviews.

Pluimers, Peter (2014) Item availability restricted.

Putten, F.M.J. van der (2014) Advies over de mogelijkheid tot het invoeren van slechts één planningsomgeving binnen VDL ETG Almelo.

Reiling, Mark (2014) Implementation of a Monocular Structured Light Vision System for Pipe Inspection Robot PIRATE.

Ringlever, J.J. (2014) Improved timetabling for a public transport company from cost as well as passenger perspective.

Ringlever, J.J. (2014) Improved timetabling for a public transport company from cost as well as passenger perspective.

Roditi, Alexandra (2014) Quantifying the Contribution of Enterprise Architecture to Business Goals.

Roskam, Ronald (2014) Evaluation of Online Public Sexual Health Care in the Netherlands: A Scenario-Based User Evaluation.

Ruiter, Mark de (2014) Performance measurement of Hermite-based multi-carrier communication.

Schipper, Ruurd de (2014) The usefulness of IT innovation classification for business model innovation.

Selman, K.J.R. (2014) Facial expression compensation.

Sinke, Mariska (2014) Knowledge sharing in schools with data teams.

Skute, Igors (2014) Brand Equity and Co-Creation Potential in the Social Media Environment: an Analysis of Brand Engagement with Community Influencers.

Smid, Wietse (2014) Ad-hoc context-driven changes in a business process management system.

Snoyl, K.E.R. (2014) De effecten van het gebruik van het F-LinQ fotolijstje op de verbondenheid tussen ouderen en hun (klein)kinderen.

Spenkelink, H.F. (2014) The Adoption Process of Cryptocurrencies - Identifying factors that influence the adoption of cryptocurrencies from a multiple stakeholder perspective.

Spoor, R.J.F. (2014) Design of a wall latching device.

Spruijt, Robert (2014) Selecting a BI Architecture that fits Organisation's Requirements.

Staicu, Cristian-Alexandru (2014) Evaluation of HIMMO with Long Identifiers, an Extension of the HIMMO Key Establishment Scheme.

Steeg, D.P.M.H. van der (2014) Essay #65875


Strecke, Jonas (2014) A high torque variable stiffness mechanism for the 'VSDD': conceptual design, realization and experimental validation.

Tax, Niek (2014) Scaling Learning to Rank to Big Data: Using MapReduce to parallelise Learning to Rank.

Utomo, Diana (2014) A framework for cloud adoption from Enterprise Architecture and Business Perspective. Validation case study: The implementation of cloud-based contact distribution in Philips Consumer Lifestyle.

Van Nee, F.D. (2014) To a new hardware design methodology: A case study of the cochlea model.

Verbij, Ruud Paul (2014) Dutch e-voting opportunities. Risk assessment framework based on attacker resources.

Vercammen, S.A.A. (2014) Displaying intermediate results for on-going searches.

Vries, W.B. de (2014) How asymmetric is the Internet? A Study to support DDoS Mitigation approaches.

Waalewijn, Dennis (2014) Cyber Security in the Supply Chain of Industrial Embedded Devices.

Waanders, M.J.C (2014) Approximation Algorithms for Connected Graph Factor Problems.

Wagenaar, J.C.N. (2014) Collaborative Cyber Security in the Retail Sector.

Wapperom, Sjoerd (2014) Computational Modelling of Suspect Behaviour in Police Interviews.

Weber, Vincent (2014) UTFM - a Next Generation Language and Tool for Feature Modeling.

Welling, Ruud (2014) Conflict detection and analysis for single-pushout high-level replacement.

Werf, S.J. van der (2014) Measuring Workload at a ProRail Control Post.

Westenberg, R.M. (2014) Managing customer innovation in the financial services industry: A technology acceptance perspective.

Wevers, Gerben (2014) Hardware accelerator sharing within an MPSOC with a connectionless NOC.

Wevers, Gerben G.A. (2014) Hardware Accelerator Sharing within an MPSoC with a connectionless NoC.

Wiegers, R.F.P. (2014) Behavior specification for ontologically grounded conceptual models.

Wielstra, Biense Adrianus (2014) Assessing the Impact of Business Process Redesign Decisions on Internal Control within Banks: A Methodology.

Wierbosch, Mark (2014) It is raining packets.

Windhouwer, Dennis (2014) The Modularity of the Resource Utilization Model in Python.

Witte, N. (2014) Technology Acceptance of Business Meetings in a 3D Virtual Environment Supported by a Content Management System.

Zaga, Cristina (2014) Engaging child-robot interaction in a collaborative task.

ter Maat, Roel (2014) A Framework for Modular Implementation of Domain-Specific Event-Based Applications.

van Hurne, I. (2014) Towards a Unifying Framework for Modelling and Executing Model Transformations.

van Kleef, NTM (2014) Making people matches using Supervised Machine Learning algorithms.

van Lenthe, J.M. (2014) Combining Multiple Malware Detection Approaches for Achieving Higher Accuracy.

van den Bosch, S.F. (2014) Designing Secure Enterprise Architectures A comprehensive approach: framework, method, and modelling language.


Beek, Daan van (2013) Comparing the LTSmin and NuSMV reachability tools via automatic translation of their respective input languages.

Been, Henry (2013) Finding you on the Internet: Entity resolution on Twitter accounts and real world people.

Berg, F.I. van der (2013) Model checking LLVM IR using LTSmin : using relaxed memory model semantics.

Bruijn, Vincent de (2013) Model-based testing with graph grammers.

Bullée, Jan-Willem (2013) Detection of leadership in informal (small) groups based on CCTV information.

Companjen, Ben (2013) Probabilistically matching author names to researchers.

Cornelissen, Richard (2013) Towards a methodology-growing framework.

Davison, David (2013) A framework for creating semantic wikis for biomedical research laboratories.

Dirlik, S. (2013) A comparison of FFT processor designs.

Duerink, Hendrik Lodewijk (2013) Information System Data Flow within Performance Based Logistics.

Fluttert, Ernst (2013) Deciding between mobile implementation platforms - A multi-criteria decision system for implementation platforms for mobile applications.

Franssen, Tim K.C. (2013) Gesture recognition in streaming motion data using offline training with a limited training set.

Gennep, Bart van (2013) In the eye of the wizard : effects of (mutual) gaze on an avatar mediated conversation.

Hemert, Teun van (2013) Implementing flexible, extensible composition operators.

Heus, Marije de (2013) Design and evaluation of a recommender system for high school courses in the Netherlands.

Hoekerd, P.G. (2013) Using existing software to build a virtual community for telemedicine.

Hoener, P.M. (2013) Cloud Computing Security Requirements and Solutions: a Systematic Literature Review.

Huijgen, Arris (2013) Effciently protecting virtualized desktop infrastructures against malware - Performance comparison between traditional- and centralized antivirus.

Hullu, Clermond de (2013) Architectural design of modular ESB systems.

Hulsebosch, Marc (2013) Targeting gamification applications to increase user participation.

Höfer, Christina (2013) Privacy-Preserving : Charging for eMobility.

Ionita, Dan (2013) Current established risk assessment methodologies and tools.

Keijl, Edwin (2013) Picalilly: sharing photos through locative social media.

Knoben, L. and Otten, M. and Fransen, R. (2013) De waterzuivering als Petrinet: het voorspellen van overstromingen.

Kolthof, Peter (2013) Vaardigheden van middelbare scholieren voor het selecteren van informatie op het internet.

Kuiper, Guus (2013) Guaranteed-throughput improvement techniques for connectionless ring networks.

Kuipers, Elles (2013) Passend onderwijs via de elektronische leeromgeving promotie digitaal.

Laarakkers, Mark (2013) Generating continuation passing style code for the co-op language.

Misra, Gaurav (2013) Permeance of ICT in crime in India.

Moll, René (2013) A DFT based synchronization scheme for chirped communication.

Nguyen, A.D. (2013) Integration of IEC 61850 mms and lte to support remote control communications in electricity distribution grid.

Olthuis, Ferry (2013) A comparison of state space reduction techniques in SCOOP.

Oude Veldhuis, M. (2013) Multi-target user interface design and generation using model-driven engineering.

Pasveer, Marco (2013) Importance sampling for probabilistic timed automata.

Pham, Giang T. (2013) Integration of IEC 61850 MMS and LTE to support smart metering communications.

Postema, B.F. (2013) Fluid survival tool: a model checker for Hybrid Petri nets.

Riet, M. van 't (2013) Trace-based debugging for advanced-dispatching programming languages.

Roemers, Arnout (2013) An adapter-aware, non-intrusive dependency injection framework for Java.

Saman Yan, Daian Geivid (2013) The effect of Testing and Feedback in Digital Game-based Learning.

Satria, Triadimas Arief (2013) Seamless service continuity in cloud based lte systems.

Schade, Christiaan Leonard (2013) FCScan: A new lightweight and effective approach for detecting malicious content in electronic documents.

Sepulveda Bradford, G.U. (2013) What happens when a robot favors someone?: how a museum-guide robot uses gaze behavior to address multiple persons while storytelling about art.

Smits, Pieter (2013) Rationales for Modern ICT Implementation into Schools: a case of tablet PCs.

Smulders, Edwin (2013) User Space Memory Analysis.

Steeneken, Anna (2013) Tablet Gebruik voor Activerende Leeractiviteiten: Een exploratieve case study binnen het Vlaams beroeps en technisch secundair onderwijs.

Tesfay, Tesfahun Aregawy (2013) Automatic distribution analysis of business processes for cloud-based BPM.

Tijhuis, K. (2013) Methods for modelling unit operations in chemical process simulators.

Ugen, Mattijs (2013) Scalable performance for a forensic database application.

Valtulina, Luca (2013) Seamless distributed mobility management(dmm) solution in cloud based lte systems.

Veen, G.F.P. van (2013) Brain Invaders - Finding the paradox of control in a p300-game through the use of distractions.

Verver, Maks (2013) Practical improvements to parity game solving.

Vonk, J. (2013) Formal specification and verification of OpenCL Kernel optimization.

Wal, Jelmer ter (2013) Specification and verification of selected parts of the Java Collections Framework using JML* and KeY.

Wit, Jeroen de (2013) Continuous forensic readiness.

Zarghami, S. (2013) Middleware for Internet of things.


Alam, Ashiful (2012) Business information management and the cloud.

Alofs, Thijs (2012) The Interactive Storyteller A multi-user tabletop board game interface to support social interaction in AI-based interactive storytelling.

Bamberg, Rob (2012) Non-deterministic generalised stochastic petri nets modelling and analysis.

Beusink, J.W.C. (2012) Secure access contol to personal sensor information in federations of personal networks.

Biggelaar, M.E.C. van den (2012) Social media in het middelbaar beroepsonderwijs? Kansen en belemmeringen van social media voor het taal- en rekenonderwijs in het middelbaar beroepsonderwijs.

Blankendal, Göran (2012) Building an Xtext compiler for Aspect-Oriented Languages based on ALIA4J.

Brandon, Merel (2012) Effect personality matching on robot acceptance : effect of robot-user personality matching on the acceptance of domestic assistant robots for elderly.

Brands, E.H.T.B. (2012) Flow-based monitoring of GTP traffic in cellular networks.

Broek, J.D.A. van den (2012) Design and implementation of an analog-to-time-to-digital convertor.

Broek, Jurgen Gijs van den (2012) Real-world analyses of internet protocols.

Brugman, Ivo (2012) A multimodal interactive system for creative expressions.

Bruintjes, Harold (2012) Bridging GROOVE to the world using a conceptual language model.

Burgman, Ronald (2012) Partial-order reduction based on probe sets.

Chen, Zhen (2012) Workflow management solution for a security management application.

Dijk, Tom van (2012) The parallelization of binary decision diagram operations for model checking.

Donker, J.H. (2012) Handfish - tunable heterogenous multi-core simulators on multi-core hosts.

Donselaar, V.L. van (2012) Information Retrieval models based on electrical circuit analysis using Ohm’s law.

Epskamp, S.G. (2012) On the influence of stereographic 3D on user dependent direct projected augmented reality in the OR.

Gehring, Felix (2012) Software performance prediction in early development phases: A UML- and simulation-based approach.

Gerritsen, Jan-Henk (2012) Detecting synchronization conflicts for horizontally decentralized relational databases.

Groot, R.E.J. (2012) IT-based risks in advergame campaigns : a focus on fairness and privacy.

Heijden, Rens W. van der (2012) SeDyA: secure dynamic aggregation in VANETs.

Heukels, Rolf (2012) Predicting user behavior using transition probability.

Hijmans, Remco (2012) Comparing grid-based features and classification settings, in an off-line supervised human action detection and recognition task.

Hobert, L.H.X. (2012) A study on platoon formations and reliable communication in vehicle platoons.

Hoeve, Thijs ten (2012) Model based testing of a PLC based interlocking system.

Hofste, J. (2012) Scalable identity extraction and ranking in Tracks Inspector.

Huang, Liting (2012) Secure and privacy-preserving broadcast authentication for IVC.

Jansen, M. (2012) Improving inattentive operation of peripheral touch controls.

Jonkman, F. (2012) Nonverbal behaviour of an embodied storyteller.

Kalsbeek, Maarten van (2012) Interface and interaction design patterns for e-commerce checkouts.

Ketelaar, J.G. (2012) Controller design for a bipedal robot with variable stiffness actuators.

Keuper, D. (2012) XNU: a security evaluation.

Kuperus, Jasper (2012) Catching criminals by chance: a probabilistic approach to named entity recognition using targeted feedback.

Liu, Peng (2012) Test bed and sensor platform for building usage profiling.

Loch, Frieder (2012) Hierarchical gestures: ggestural shortcuts for touchscreen devices.

Middag, Jacob (2012) Convergence of an implicit runge-kutta discontinuous Galerkin method using smooth limiters.

Mols, Emiel (2012) Sharding Spotify search.

Noppen, I. (2012) Assessing the benefits of spectrum sharing in wireless access networks.

Oostinga, Ruben (2012) A java bridge for LSTMIN.

Ottow, Christiaan (2012) Hacking the next web: penetration testing over IPv6.

Sburlea, Andreea Ioana (2012) Brighten up your mind! Effects of light priming and encouraging feedback on the neural and behavioral responses in a general knowledge task.

Scheerens, Daan (2012) Practical indoor localization using bluetooth.

Schot, N. (2012) QoS-aware model-driven SOA using SoaML.

Siaw, Tien Loong (2012) Saturation for LTSmin.

Spijker, Hanno (2012) Improving information dissemination in sparse vehicular networks by adding satellite communication.

Stapersma, Paul (2012) Efficient query evaluation on probabilistic XML data : derived from a glue process with skeleton & flesh.

Stemmer, Joel (2012) detecting outliers in web-based network traffic.

Stoica, Mircea (2012) Detecting the no-control state in self-paced Brain-Computer Interfaces.

Stokkink, Gerjan (2012) Quiescent transition systems.

Teka, Abelneh Y. (2012) Analysis of indirect influence relations in goal-oriented requirements engineering.

Terwellen, Christian (2012) Evaluating the behavior of embedded control software - using a modular software-in-the-loop simulation environment and a domain specific modeling language for plant modeling.

Verberkt, S.L.C. (2012) Claiming security properties in a service oriented architecture.

Vermolen, R.M. (2012) The red queen’s race: from delivery stories to effort estimation: an empirical study.

Wagenaar, P. (2012) Detecting botnets using file system indicators.

Wevers, Lesley (2012) A persistent functional language for concurrent transaction processing.

Wicaksono, Sulistyo Unggul (2012) Enterprise knowledge : reference architecture for visualization and prototype implementation using Wiki.

Wieringa, Wilko (2012) User Handover in a Cross Media Device Environment, A Coaching Service for Physical Activity.

Wu, Xian (2012) Modeling and performance evaluation of wirelesshart.

Zandberg, Martin (2012) Optimization of aspect-instantiation strategies in the JIT-compiler.

Zanderink, Arnold (2012) Drum assistant.


Adolfsen, Martijn (2011) Industrial validation of test coverage quality.

Bergervoet, Erwin Josephus (2011) Let the game do the talking : the influence of explicitness and game behavior on comprehension in an educational computer game.

Boer Rookhuiszen, Roan (2011) Generation of German narrative probability exercises.

Bosems, Steven (2011) A Performance Analysis of Model Transformations and Tools.

Brinke, Steven te (2011) First-order function dispatch in a Java-like programming language.

Bruintjes, Tom M. (2011) Design of a Fused Multiply-Add Floating-Point and Integer Datapath.

Camacho Camacho, José Manuel (2011) Assembler a bgp-compatible multipath inter-domain routing protocol.

Dalen, J.J.M. van (2011) Designing a tool for norm interventions in IT strategy projects.

Dam, Franciscus Jozua van (2011) A stripline antenna for radiated immunity testng.

Dekens, Berend (2011) Mapping of a DAB Radio Decoder to Homogeneous Multi-Core SoC : a case study to evaluate a NLP based mapping flow.

Delden, R.W. van (2011) Design of therapeutic TagTile games for children with unilateral spastic cerebral paresis.

Eerenberg, E. (2011) Towards distributed information retrieval based on economic models.

Ende, Frederik van den (2011) Interference Nulling via a Resistor-Weighted Op-Amp Vector Modulator.

Fritz, Jako (2011) Hybrid Intrusion detection network monitoring with honeypots.

Goos, Sander (2011) A model driven approach to modernizing legacy information systems.

Grisel, I.G.J. (2011) Multimodal user interface for robotized flexible endoscopy.

Hakvoort, Gido (2011) Immersion and affect in a brain-computer interface game.

Ham, Wim van der (2011) An Appraisal Based Model of A�ect for a Negotiating Agent.

Harleman, T. (2011) Towards a generic model for audit trails.

Hassani, A.Z. (2011) Touch versus in-air Hand Gestures: Evaluating the acceptance by seniors of Human-Robot Interaction using Microsoft Kinect.

Hegeman, Erik (2011) InfoSupport - On the Quality of Quality Models.

Hu, Danchao (2011) Using actor-network theory to understand inter-organizational network aspects for strategic information systems planning.

Jeeninga, Jesper (2011) Improving communication between computer programmers and domain experts : creating a generic scenario description language to aid the process of describing scenarios for emergency response training simulators.

Jong, Maurits D. de (2011) Network Management in a Distributed System.

Kanis, Zwier (2011) Classification of Semantically Coherent Segments in Web Pages.

Klifman, T.E. (2011) Propagation of Annotations in a Streaming Context.

Kortüm, Michael (2011) Non-invasive imaging with UWB.

Lastdrager, Elmer (2011) Securing Patient Information in Medical Databases.

Meijer, Michael (2011) On a Design Space for Aggregating over Sliding Windows on a Stream.

Nijenhuis, C.F. (2011) Automatic generation of graphical domain ontology editors.

Noltes, Johan (2011) Data location compliance in cloud computing.

Nouta, Christiaan Alexander (2011) Data processing networks made easy : improving development possibilities for people with limited computer science knowledge.

Obbink, Michel (2011) Social interaction in a cooperative brain-computer interface game.

Op 't Land, Sjoerd (2011) Ranging and localisation error mitigation in indoor obstructed direct path conditions.

Ottenhof, Robbert H.J. (2011) Towards automated truancy detection.

Oude Maatman, Ruud (2011) Design and evaluate a deployment process for the ES benefits management method.

Pater, Elwin (2011) Partial Order Reduction for PINS.

Peng, Yuxi (2011) Face Recognition at a Distance: a study of super resolution.

Posthumus, Wytse Jan (2011) The situated cognitive engineering tool.

Rajput, Abdul Ghani (2011) Properties Relevant for Inferring Provenance.

Schot, Vincent (2011) Social norms to motivate IT use.

Schutte, Rik (2011) Maintaining the causal thread of execution in distributed and multilanguage software.

Sluijsmans, Dennis (2011) Performance Evaluation of Data Dissemination Protocols for an Infrastructure-to-Vehicle Cooperative Traffic Light Application.

Veen, Dirk van (2011) Secure searching through encrypted data - Creating an efficient Hidden Vector Encryption construction using Inner Product Encryption.

Visser, Thomas (2011) Toward a model for incremental grounding in dialogue systems.

Wal, Tjalling van der (2011) Streaming workflow transformation.

Wanders, Brend (2011) Exploring signalling pathways as a serious game.

Warmer, Martin (2011) Detection of web based command & control channels.

Wiekens, Adri (2011) Feedback presentation for physical activity coaching: by an embodied conversational agent or by a simple e-mail?


Admiraal, A.J. (2010) Automated ANTLR tree walker generation.

Ahmed, F. (2010) Relations between semidefinite, copositive, semi-infinite and integer programming.

Alemneh, E. (2010) Sharing nonlinear gates in the presence of glitches.

Baardman, Roel (2010) Cumulus Humilis : wireless mesh-networking for gliders.

Bakker, P.J. (2010) Train composition using motion as a common context.

Bijker, Remko (2010) Efficient pointcut projection.

Bouwhuis, Wilco (2010) Modelleren van de Neocortex : analyse en simulatie op grote schaal.

Bragt, Jasper (2010) Towards believable characters in the virtual storyteller.

Brugge, Jonathan (2010) Implementing and simulating the cross-entropy ant system.

Bukhsh, Faiza Allah (2010) Enhanced ICoNos maturity model.

Costa, Alvise (2010) Context - Free - Language Parser for Advanced Network Intrusion Detection.

Diephuis, Maurits (2010) A framework for robust forensic image identification.

Feng, Yuan (2010) Modified potential approach to efficient, linear and symmetric values for TU-games.

Franssens, Anne (2010) Impact of multiple inquires on the bluetooth discovery process : and its application to localization.

Ganzeboom, Mario S. (2010) User-independent recognition of dynamic hand gestures using a dataglove.

Hartholt, Woutske (2010) Beslissingsondersteuning voor het aanpassen van de online OK-planning.

Hartog, M.R. den (2010) Shunt planning : an integral approach of matching, parking and routing.

Hettinga, S. (2010) Performance analysis for embedded software design.

Hoeksma, Ruben (2010) Price of anarchy for machine scheduling games with sum of completion times objective.

Hollander, Emiel (2010) Dynamic access control.

Horst, Arie (2010) Sport coach : online activity using wireless sensor network.

Hove, D. ten (2010) Change management within SysML requirements models.

Jochems, Bart (2010) Detecting emotional intensity peaks in narrative conversational settings.

Kant, Gijs (2010) Distributed state space generation for graphs up to isomorphism.

Khadka, Ravi (2010) Model-driven development of service compositions : transformation from service choreography to service orchestrations.

Kok, Guido (2010) Cloud computing & confidentiality.

Korevaar, Cornelis Willem (2010) A time-frequency localized signal basis for multi-carrier communication.

Kroes, S. (2010) Domain specific embedded languages and model driven engineering.

Lange, R-J. de (2010) Provenance aware sensor networks for real-time data analysis.

Lansink, M. (2010) Hair simulation and rendering.

Lavooij, K. (2010) Near-real time statistics gathered from a continuous and voluminous data mutation stream.

Lin, Y. (2010) Architecture for IP based interconnection of heterogeneous wireless communication systems for mission-critical group oriented communications.

Moel, E.L. de (2010) Expanding the usability of recorded lectures : a new age in teaching and classroom instruction.

Palsma, T. (2010) Discovering groups using short messages from social network profiles : using hierarchically organized concepts to discover relations.

Paul, Ronald (2010) Realization and high level specification of facial expressions for embodied agents.

Peterson, R.S. (2010) Testing real-time requirements for integrated systems.

Pothoven, Tristan (2010) Workflow usage in the healthcare environment.

Punter, C.M. (2010) Multi-source entity resolution.

Qiu, Xian (2010) Bin packing games.

Schwartzenberg, J. (2010) Using machine learning techniques for advanced passive operating system fingerprinting.

Sijtema, Marten (2010) Managing variability in model transformations for model-driven product lines : extending the ATL model transformation language with variability management capabilities.

Sikkens, B. (2010) The storage and retrieval of sensor data and its annotations.

Slomp, G.H. (2010) Reducing UPPAAL models through control flow analysis.

Spijkerman, Wietze (2010) Tool support for change impact analysis in requirement models : exploiting semantics of requirement relations as traceabilitt relations.

Stuurman, Gijs (2010) Action semantics applied to model driven engineering.

Teijgeler, Stefan (2010) Connecting GROOVE to the world using XMI.

Telgen, M.G. (2010) Realistic route choice modeling.

Ugryumova, D. (2010) Control design for a chemical disinfection process using the residence time distribution.

Valk, J.J. van der (2010) The in uence of a target motion model on the exact Bayesian filter recursion; research by particle filtering.

Vlieg, Edwin (2010) Usage patterns for user-centric service composition.

Voorst, B. van (2010) Cluster-based collection selection in uncooperative distributed information retrieval.

Wester, Rinse (2010) A dataflow architecture for beamforming operations.

Yin, Haihan (2010) Developing a generic debugger for advanced-dispatching languages.

Zanden, Guido van der (2010) Quality assessment of medical health records using information extraction.


Akker, H. op den (2009) On adressee prediction for remote hybrid meeting settings or how to use multiple modalities in predicting whether or not you are being addressed in a live hybrid meeting environment.

Asuncion, C.H. (2009) Goal-driven service mediation solution.

Baaij, C. (2009) CλasH : from Haskell to hardware.

Balen, J. van (2009) A virtual billiard assistant.

Barbosa, Rafael Ramos Regis (2009) On Access Network Identification and Characterization.

Blom, Koen (2009) DVB-S signal tracking techniques for mobile hased arrays.

Bockting, S. (2009) Collection selection for distributed web search : using highly discriminative keys, query-driven indexing and ColRank.

Boot, L. (2009) Facial expressions in EEG/EMG recordings.

Bos, W.J. (2009) Interactive signaling network analysis tool.

Braak, Timon D. ter (2009) Run-time spatial resource management in heterogeneous MPSoCs.

Brand, A. (2009) An investigation in qualities of software variability.

Chauhan, P. (2009) Study the impact of smile and tail dependence on the prices of European style bivariate equity and interest rate derivatives using Copulas and UVDD model.

Diepenmaat, J. (2009) Object XML mappings.

Domburg, R.S.A. van (2009) Empirical evaluation of change impact predictions using a requirements management tool with formal relation types : a quasi-experiment.

Everse, Wouter M. (2009) Modelling and Verification of a Shortest Path Tree Protocol for Wireless Sensor Networks : Towards a Platform for Formal Verification Experiments.

Galen, J. van (2009) Modelling, simulation and impelementation of an optical beam forming network control software system.

Garcia Garcia, A. (2009) Optical phase synchronization in coherent optical beamformers for phased array receive antennas.

Graaff, V. de (2009) Towards distributed information access : possibilities and implementation.

Hagen, Gijs (2009) Het schrijven van een nieuw werkboek: hoofdstuk elektriciteit. 2e klas Havo/VWO.

Hagendoorn, B. (2009) Viscous coupling between bio-inspired hair-sensors.

Hong, L. (2009) Implementation and tuning of optical singlesideband modulation in ring resonator-based optical beam forming systems for phased-array receive antennas.

Houtman, J. (2009) Bringing scalability/failover to a complex producer/consumer implementation.

Jeckmans, A.J.P. (2009) Practical Client Puzzle from Repeated Squaring.

Kingma, J. (2009) Combined VCO/Mixer for satellite receiver in CMOS.

Klaassen, R. (2009) COPD home interaction device.

Koelewijn, J.W. (2009) Resource operations model in a dynamic world.

Kok, I. de (2009) The influence of videoconferencing and an emotional feedback support system on polyadic negotiations.

Kooijman, M. (2009) Haskell as a higher order structural hardware description language.

Kroon, E. (2009) Layered configuration management for software product lines.

Kuperus, Johan (2009) Wave monitoring using wireless sensor nodes.

Laar, B. v.d. (2009) Actual and imagined movement in BCI gaming.

Laarman, A. (2009) An Ontology-Based Metalanguage with Explicit Instantiation.

Logtenberg, Jeroen (2009) Multi-user interaction with molecular visualizations on a multi-touch table.

Looman, S.A.M. (2009) Impact Analysis of Changes in Functional Requirements in the Behavioral View of Software Architectures.

Lucassen, T. (2009) Adaptive support of human attention allocation using cognitive models.

Meertens, Lucas O. (2009) EPC to BPEL transformations.

Meij, D.P.L. van der (2009) A metamodeling approach to incremental model changes.

Meijerink, Roland (2009) Begrip in kaart: Hoe kan het gebruik van begrippenkaarten het begrip van leerlingen in 3VWO op het gebied van optica verbeteren?

Muis, Allard (2009) Patterns in data conversion.

Mutter, T. (2009) Partition-based network load balanced routing in large scale multi-sink wireless Sensor Networks.

Nijkamp, Barry (2009) Using functional design patterns to improve exports to management information systems.

Nouwens, I.C.C. (2009) Predicting dialogue state transitions using prosodic markers: Exploring AMI Corpus backchannels.

Ooms, Matthijs (2009) Provenance management in practice.

Oosting, W.M.H. (2009) Design and evaluation of a community of practice to support IT implementation/migration processes : a case study about the design of a CoP within the Suite4Basisgegevens migration.

Oostrum, A. van (2009) A model and specification for development of enterprise application frameworks.

Perk, Anno (2009) Reflection in large IT Projects : a method for project success focussing on soft factors.

Poortema, Anne (2009) Training clients using e-learning : developing an e-learning model for an international software vendor.

Rietema, Richard (2009) Automatic Verification and Analysis of Test Results of Océ Printers.

Rombouts, Wolf (2009) Context-Concept chemie en van Hiele's abstractieniveaus.

Roodenburg, S.B. (2009) Scheduling the sequential hardware-in-the-loop simulator.

Rubio Paniza, E. (2009) Design and evaluation of an MSP-based body area network management architecture using JMX.

Rutgers, Jochem (2009) VHDL voor het voortgezet onderwijs: Een nieuwe lesmodule over hardware voor informatica.

Satink, Laurens (2009) The adaptive presentation assistant using grammar-based recognition to support the process of presenting.

Schippers, Jorrit (2009) A massively scalable architecture for instant messaging & presence.

Schot, Jurgen (2009) The privacy governance framework : effectively dealing with privacy legislation.

Schouten, J.H. (2009) Optimisation of packet scheduling in wireless networks.

Span, Ruben (2009) Towards an enterprise performance management solution : a method to design and implement enterprise performance management.

Stolp, D.G.A. (2009) Using ontology mapping to automate derivation of transformations for data integration.

Sulistyo, Pythia (2009) Inter-Organizational Strategic Information Systems Planning (IOSISP) in Network Perspective: How Network Governance Influences IOSISP Effectiveness Evaluation of Healthcare, Government and logistic/Transport Industry Sectors in the Netherlands.

Tariq, T. (2009) Extending CACI : implementing support functions for the context producer and designing a security Framework.

Tijmes, M. (2009) Simulation of a ring resonator-based optical beamformer system for phased-array receive antennas.

Tjink-Kam-Jet, Kien-Tsoi T.E. (2009) Result merging for efficient distributed information retrieval.

Tommassen, P. (2009) Wacky Pirate Hijinks : causing and resolving conflict between autonomous agents in a virtual storyworld.

Veldhuis, J.W. (2009) Tool support for a metamodeling approach for reasoning about requirements.

Veldman, I. (2009) Matching profiles from social network sites : similarity calculations with social network support.

Vliek, G. (2009) Detecting spam machines, a netflow-data based approach.

Vrielink, Jasper D. (2009) Phased array processing: direction of arrival estimation on reconfigurable hardware.

Vries, E. de (2009) Touchscreen interaction for healthcare applications.

Weele, J.H.D. ter (2009) Onderzoek naar de gebruikersvriendelijkheid van boekingsformulieren.

Westmijze, M. (2009) Memory optimizations on the sequential hardware-in-the-loop simulator.

Wolterink, T.J.L. (2009) Operational Semantics Applied to Model Driven Engineering.


Babakhani, Bayan (2008) Implementation of a 2D master-slave system.

Berg, Ruben van den (2008) Interaction capabilities of Second Life : a framework to determine Second Life's suitability for a 3D virtual world application.

Bezemer, Maarten (2008) Analysing gCSP models using runtime and model analysis algorithms.

Bloem, E.J.W. van (2008) The user oriented knowledge management method : a knowledge management method for a small organization with a distributed environment.

Bloem, R.J.G. van (2008) A data transformation walkthrough.

Blumink, Remco (2008) Implementing and communicating with SHILS.

Boros, H. (2008) Context Discovery Adapter (CDA) Protocol.

Bosch, Stephan (2008) FollowMe! : distributed movement coordination in wireless sensor and actuator networks.

Brink, Tim van den (2008) Ketenarchitectuur : succes- en faalfactoren bij de invoering van het digitaal klantdossier.

Brinkman, E. (2008) Recognition of the emotion in abstract expressionistic paintings using a machine learning approach.

Broekhuizen, V.P. (2008) Security for EPC discovery services.

Daemen, P. (2008) ZMP based control in 3D passive dynamic walking.

Dam, Arjan (2008) Geographic routing in wireless sensor networks for surveillance : introducing a novel routing algorithm: GZOR.

Damman, B. (2008) Representing PCTL counterexamples.

Deddens, M.K. (2008) Toepasbaar risicomanagement in software ontwikkelingsprojecten : ontwerp en toepassing van een risicomanagementmethode voor software ontwikkelingsprojecten binnen Centric IT Solutions.

Driezen, Wouter (2008) Service-oriented and open-source software as potential markets for applications markets : analysis of the possible added value of Capgemini outsourcing's Dutch applications management service center.

Eenennaam, E.M. van (2008) Providing over-the-horizon awareness to driver support systems by means of multi-hop ad hoc vehicle -to-vehicle communication.

Engelsman, W. (2008) Method for requirements management and modeling.

Es, Frank J. van (2008) Type inference for graph transformation systems.

Fournier, Bas (2008) Preprocessing on bilingual data for Statistical Machine Translation.

Franssens, Anne (2008) Analysis of Reed Solomon error correcting codes on reconfigurable hardware.

Gaiser, Vincent Alexander (2008) Improving spatial awareness in an indoor environment with wireless positioning technology.

Gerards, M. (2008) Streaming reduction circuit for sparse matrix vector multiplication in FPGAs.

Gils, F.M.D.M. van (2008) PodVinder : spoken document retrieval for Dutch pod- and vodcasts.

Griffioen, H.T. (2008) Design of clock cleaner : a fast locking PLL.

Haanstra, Sander (2008) Analyzing and improving generalization over time in CSP-based Brain-Computer Interfaces.

Habib, Mena Badieh (2008) An intelligent system for automated arabic text categorization.

Henzen, S.F. (2008) A framework for service-oriented extensions to Ruby on Rails.

Ho, Yoeng Woey (2008) .NET integration TEAHA.

Hogt, N.A. (2008) Aanbevelingen voor een architectuur voor het regionale zorgsysteem.

Houwelingen, Jan Willem van (2008) Relevance and usability of enterprise architectures during post merger IT integrations.

Idserda, K. (2008) Simultaneous binding proxy mobile IPv6.

Jevring, Markus (2008) Automatic management of bluetooth networks for indoor localization.

Jonge, Marc de (2008) The SpinJ model checker : a fast, extensible, object-oriented model checker.

Jongeling, R. (2008) Signature modification for Compose?/.NET : implications of signature modification for generic compilers and behavioral signatures of types.

Jonker, J. (2008) Wizard of Oz for gesture prototyping.

Kaijen, J.A.H. (2008) Management of risk & information security data.

Kessel, Ruud van (2008) Querying Probabilistic XML.

Klein Wolterink, W. (2008) A content-based routing protocol for mobile ad-hoc networks using a distributed connected k-Hop dominating set as a backbone.

Klooster, J-W. van 't (2008) Context, design and implementation of a control system for ring resonator-based optical beam forming networks.

Kruiskamp, Michel (2008) FastSOA : achieving high-performance service oriented architectures.

Linders, Stefan (2008) Opportunities and limitations of using SOA concepts and technologies for building BI applications : a Delphi study.

Lonnee, J. (2008) A scalable repository based on a meta-modelling architecture.

Looise, M.J. (2008) Inter-level consistency checking between requirements and design artefacts.

Lootsma, Marten (2008) Design of the global software structure and controller framework for the 3TU soccer robot.

Lopez, J.M. (2008) Dynamic service composition in an innovative communication environment.

Mahrof, Dlovan Hoshiar (2008) Design of a fully integrated RF transceiver using noise modulation.

Melissen, Arthur (2008) Exploring neglected avenues in the modelling of attribution theory.

Meppelink, Lianne (2008) Towards interoperability between existing VoIP systems.

Munsterman, Thijs Pieter (2008) Exploring software scalability : and a method for evaluating and improving software scalability.

Nijmeijer, Tom (2008) Automatic classification of television commercials.

Nijssen, Bobby J.W. (2008) Cooperative Intelligent Transportation Systems Building a demonstrator for the CVIS-project on the Informatieve Weg.

Oever, Daniel van 't (2008) CoNSoLe: A Domain Specific Language for Network Services.

Oostrum, A.R. (2008) A service register as an information intermediary : towards a structured design approach for service registers.

Oude Alink, M.S. (2008) Increasing the spurious-free dynamic range of an integrated spectrum analyzer.

Oude Bos, Danny (2008) BrainBasher : a multi-modal BCI game for research and demonstration.

Pasch, M. (2008) Bye-bye couch potato : body movement in the gaming experience.

Roolvink, S. (2008) Detecting attacks involving DNS servers : a netflow data based approach.

Schabbink, Johan (2008) Design of a capacitive based closed-loop displacement sensor.

Schilpzand, M.P. (2008) X-Stream in MaDAM : new junction modelling in macroscopic dynamic traffic assignment models.

Scholte, Theodoor (2008) Managing continuous uncertain data by a probabilistic XML database management system.

Sealy, Timothy (2008) Implementation of aggregation based Resource Management in DiffServ (RMD) Quality of Service Model (QOSM).

Steen, H. van der (2008) Design of animation and debug facilities for gCSP.

Tigelaar, Almer S. (2008) Automatic discussion summarization : a study of Internet fora.

Timmer, M. (2008) Evaluating and predicting actual test coverage.

Twelkemeijer, R. (2008) Design of an audio power amplifier with a notch in the output impedance.

Uithol, Michiel (2008) Security in domain-driven design.

Velner, J. (2008) Integrated state-of-charge circuit for rechargeable batteries.

Vos, Geert (2008) Issues of iterative mda-bades software development processes.

Vries, A.J.K. de (2008) Improving reliability of streaming radio.

Werf, R.J. van der (2008) The Embodied Conversational Agent Toolkit : a new modularization approach.

Wijngaarden, Pieter van (2008) Error tolerance analysis of the Telefónica de España optical fibre network.

Wit, Joost de (2008) Evaluating recommender systems : an evaluation framework to predict user satisfaction for recommender systems in an electronic programme guide context.


Ambrosius, Frank (2007) Modelling and distributed controller design of the bodeRC paper-path setup.

Ambrosius, R.B.P. (2007) Elektronische leeromgeving met gebarentaalherkenning : Grafische user interface oplossingen voor ambigu¨ıteitproblemen van een gebarentaalherkenner voor een elektronische leeromgeving voor dove en slechthorende kleuters.

Atketin, Namik (2007) Ontwikkeling van een interactieve model-gedreven E-formulier generator.

Baalman, Philippus (2007) Van mono naar multi: een automatische VJ.

Baesjou, Bertrand (2007) Improving dependability of OSS access to a hierarchical distributed ad-hoc NMS.

Bergen, Marcel van (2007) Design and prototyping of a human-computer interface for a desktop tele-classroom conference application.

Bosman, Yoran Maxim (2007) Incorporating Functional Design Patterns In Software Development.

Bouwmeester, Egbert (2007) Continuous Classes of Power Amplifiers.

Braber, Kommer (2007) A policy based MBU control system using OSGi.

Buurman, H.A. (2007) Virtual Storytelling: Emotions for the narrator.

Derwort, Selmer (2007) IT governance: de doelen en de middelen: In kaart brengen van IT governance in theorie en praktijk.

Dijk, Michel van (2007) Analysis and control of nonlinear oscillators.

Doorn, Gerrit Hendrikus van (2007) Accelerated playback of meeting recordings.

Elling, Erwin (2007) Tools for fun and fruitful meetings. : “Don’t let meetings make you go bananas!”.

Fountain, Stefan J. (2007) Success prediction induction framework : success models for online applications, introducing network effects and trust constructs.

Franken, Michel (2007) Ankle actuation for planar bipedal robots.

Gribnau, Erwin (2007) Analysis, design & implementation of a high-performance main-memory object database for Splice2.

Heddema, R.R. (2007) Strategy for a robot soccer team - Let’s play robot soccer -.

Hegge, Stephan (2007) Predicting end-to-end network characteristics on mobile devices.

Herms, K.G.F. (2007) Body pose tracking in the Watching Window : a system that tracks both hands in a virtual reality environment.

Heuts, R.P. (2007) Mobile interface design for dynamic environments.

Hoogsteder, V.J.M. (2007) Strategic performance measurement for eBuddy.

Huisman, Rolf (2007) Bugspray for composition filters.

Jansen, Lisette (2007) Panze: A Multimodal Preschool Music Education System.

Kalter, Stefan Reijmer (2007) Vertical collaboration in open source business.

Kernkamp, Reinier (2007) Alignment of Requirements & Architectural Design In a Blended Delivery Model.

Klaver, Ruud (2007) Using NSIS (Next Steps in Signaling) for support of QoS aware multimedia services.

Kock, Arien S. (2007) Enhancing Synthetic Speech with Filled Pauses.

Kok, J. (2007) The design of a Delta Impact analysis model for data warehouses.

Kooijman, Ruben (2007) See, hear, listen : head movements and the sensitive artificial listener.

Kooistra, Cornelis (2007) Design and testing of embedded control software for the ViewCorrect Plotter.

Koster, J. (2007) Influencing tabletop interaction speed: directness and device.

Kosters, Dennis (2007) Invloed van slimme meters op de energiebalans: Een analyse van de invloed van het slimme meter systeem op een netbeheerder en zijn ondersteunende IT, binnen het kader van de energiebalans.

Kosters, T. (2007) Van gasbel naar gasstel : een onderzoek naar de inrichting van de shipper op de gasmarkt.

Krijnen, Bram (2007) Heat flow modeling in copiers.

Kuperus, J.H. (2007) Nested quantification in graph transformation rules.

Kuppeveld, Teun van (2007) Model-based redesign of a self-balancing scooter.

Leong, Frank (2007) Design of an oscillator for satellite reception.

Maatjes, N.C. (2007) Automated transformations from ECA rules to Jess.

Molderink, Albert (2007) Feasibility Analysis of MPEG decoding on reconfigurable hardware.

Nguyen, V.Y. (2007) Optimising techniques for model checkers.

Nguyen, Viet Yen (2007) Optimising techniques for model checkers.

Nijdam, N.A. (2007) Facial rendering.

Odijk, M. (2007) Novel sensor structures for enhanced redox cycling.

Oijen, Joost van (2007) A Framework to support the influence of culture on nonverbal behavior generation in Embodied Conversational Agents.

Oldenkamp, H.A. (2007) Probabilistic model checking : a comparison of tools.

Olthof, Mark (2007) Performance & Scalability of a Spatial Database in a GIS-Web Service Environment.

Ooms, Wendy (2007) Providing AAA with the Diameter protocol for multi-domain interacting services.

Oostveen, Laurens van (2007) Conductivity gradient focusing by pervaporationand osmosis-induced fluxes.

Ordelmans, L. (2007) The Creation of a Flexible, Functional Simulation Generator for the Montium Tile Processor.

Os, Roel van (2007) Optimizing XML information retrieval query execution at the physical level.

Papegaaij, E. (2007) The Tree Processing Language: Defining the structure and behaviour of a tree.

Penning, M.P.J. (2007) Boosting LUCK: Improving the language understanding capabilities of Kaitito.

Plass, Martijn J.A. (2007) Rules Decomposition for Distributed Context Processing.

Portengen, Rik (2007) Phased array antenna processing on reconfigurable hardware.

Pot, Wouter (2007) A machine learning approach for generating expressive musical transcriptions.

Poulisse, Gert-Jan (2007) Exploiting inter-conceptual relationships to boost SVM classification.

Prins, Martin (2007) Fast retransmission for multicast IPTV.

Putten, Ing. A.E. van (2007) Behavioural hybrid process calculus translation to modelica.

Reede, Joost (2007) On A-Select and Federated Identity Management Systems.

Reuderink, Boris (2007) Fusion for Audio-Visual Laughter Detection.

Roes, J.B.M. (2007) Identifying and solving overlap between messaging standards with the help of domain models, illustrated with HR-XML’s SIDES and SEP.

Roo, A.J. de (2007) Towards more robust advice : message flow analysis for composition Filters and its Application.

Rozen, Riemer van (2007) A Debugging Framework for NIPS.

Sambeek, M. van (2007) Real-time shadow generation for 3D simulations using modern hardware.

Scholten, F.B. (2007) The concern-oriented software architecture analysis method.

Sierhuis, Pim (2007) Het voorkomen van prestatieverlies bij de koppeling met Web services: ... en de rol van standaardisatie daarbij.

Siles Del Castillo, Hugo (2007) Hybrid Content-Based Collaborative-Filtering Music Recommendations.

Smulders, Bram (2007) SQLbusRT : real time data distribution and storage.

Sombekke, N.B.H. (2007) Graph-Based Semantics of the .NET Intermediate Language.

Spenkelink, Roy David (2007) Porting Compose* to the Java Platform.

Staal, Eric (2007) Simulation with Hamiltonian mechanics : creating a module for 20-sim.

Stellinga, Anne (2007) A low-power second-order sampling receiver for Bluetooth.

Tinselboer, Koen (2007) The use of rare key indexing for distributed web search.

Tuijn, Jasper Aartse (2007) Partial session mobility in context aware IP-based multimedia subsystem.

Tuin, Vincent van der (2007) Computer-Aided Security Surveillance : design of the Quo Vadis Object Tracker.

Veelen, P. van (2007) Clustered acoustic modelling in speech recognition.

Veen, Marcel van der (2007) Sparse matrix vector multiplication on a field programmable gate array.

Verdonkschot, S.F.G. (2007) Design and implementation of a trusted RFID reader.

Versloot, Corne (2007) Cross-document named entity coreference resolution for Dutch as a pre-process for named entity based text mining.

Vervuurt, Mark (2007) Modeling business process variability : a search for innovative solutions to business process variability modeling problems.

Vlasveld, J. (2007) On context in context-aware ICT applications.

Wijgerse, Steven (2007) Generating realistic city boundaries using two-dimensional Perlin noise.

Witteman, M.T. (2007) Efficient proximity detection among mobile clients using the GSM network.

Zwerus, Robert (2007) Storing Personal Information Management data: Akonadi - unifying PIM data for KDE.


Backx, Niels (2006) On the design of a mobile e-health platform ¿ towards deployment flexibility.

Berens, Menno (2006) De tevredenheid over shared service centers in de publieke sector : het succes van shared service centers en de oorzaken daarvan in de inrichting en het functioneren van de klant-leverancierrelatie.

Boorsma, Simon (2006) Ketenintegratie van het intermediaire distributiekanaal in de verzekeringsbranche : huidige ontwikkelingen in de verzekeringsbranche en de mogelijkheden voor Zevenwouden Verzekeringen om ketenintegratie te realiseren¿.

Bos, Pieter (2006) Interacting with a virtual conductor.

Boschman, S.R. (2006) Performing transformations on .NET intermediate language code.

Braam, G.J.M. (2006) Supporting multi-modal and multi-medial user interfaces from an embedded environment.

Broekhuijsen, Jeroen (2006) 2D Upper Body Pose Estimation from Monocular Images.

Brouwer, L.J. (2006) Monitoring van een ASR-systeem : het gebruik van interne confidencewaarden en teletekstondertiteling om de Word-Error-Rate van een herkenning te voorspellen.

Buth, Maarten Dimmen (2006) Ball-handling motion control for soccer playing mini-robots.

Cheng, W. (2006) The design of a new power combining technique for the RF power amplifiers.

Conradi, Olaf (2006) Fine-grained Join Point Model in Compose.

Derks, Theo (2006) Health at home.

Dijk, J.J. van (2006) Entiteitreconciliatie ondanks beperkte overlap door middel van objectgelijkheid : casus ¿Koppelen van persoonsgegevens zonder een gemeenschappelijke identificatie¿.

Dimitrova, Desislava C. (2006) Performance evaluation of RMD (Resource Management in DIFFSERV) within NSIS (Next Steps In Signaling).

Doornenbal, Ing. Dirk (2006) Analysis and redesign of the compose*language.

Engelen, L. van (2006) Massively parallel quantization implementation using simulated annealing.

Groen, Ruud (2006) Modelleren en analyseren van een Ethernet switch.

Groot, Paul de (2006) Enhancing the performance and testability of the MI20 robot soccer system.

Hassink, N. and Schopman, M.G. (2006) Gesture recognition in a meeting environment.

Heerde, Harold van (2006) Life-cycle privacy policies for the ambient intelligence.

Hulswit, D.R. (2006) Automatic interpretation of Nijntje-images.

Ingberg, G. (2006) Location aware performance measurements.

Kattenbelt, M.A. (2006) Towards an explicit-state model checking framework.

Kemna, Tim (2006) Bisimulation minimisation and probabilistic model checking.

Koop, O.R. (2006) Continuous and discontinuous Galerkin finite element methods of variational Boussinesq water-wave models.

Kreuk, N.A.W. (2006) The Turkish option market.

Leenslag, Wilco (2006) Werkwijze ter beoordeling van IT governance op basis van geaccepteerde methodes op het terrein van IT governance.

Linnenbank, Tristan (2006) Architectural Principles for Large Scale Web sites: a Case Study.

Linthorst, Henk-Jan (2006) De mogelijkheden van ICT in het effectiever en efficiënter functioneren van de diabetesketen.

Meijer, Gijs (2006) Performance measurement of IT investments.

Nguyen, H.Q. (2006) Analysis of crosscutting concerns in QVT-based model transformations.

Noordhuizen, Paul (2006) Analyzing aspects in production : plans for software product lines.

Nusman, Daan (2006) Real-time full-body motion capture in virtual worlds.

Overbeek, J.F. (2006) Meta Object Facility (MOF): investigation of the state of the art.

Puming, Liu (2006) Service agreements and facilities for M-health vital sign monitoring.

Rorije, R.J. (2006) Input/output in functional languages : using algebraic uniontTypes.

Rovers, Kenneth C. (2006) Front-end research for a low-cost spectrum analyser : receiver system and topology study.

Schrijver, Bert Jan (2006) Classificeren met vertrouwen : contextgevoelige tekstclassificatie met betrouwbaarheidsindicatie.

Sikkes, Bart (2006) A stable matching based adaptive subcarrier assignment method for multimodal fibre access networks.

Sirchia, Riccardo (2006) Realtime softwarematige radarscan conversie : met GPU programmeren.

Slabbers, Nanda (2006) Narration for virtual storytelling.

Smelik, R.M. (2006) Specification and Construction of Control Flow Semantics : a generic approach using graph transformations.

Speelziek, M.D. (2006) Evaluating rapide using the FRODO service discovery protocol.

Spenkelink, Dennis (2006) Incremental Compilation in Compose*.

Steeden, Remco van (2006) Communication-centric debug of systems-on-chip using networks-on-chip.

Steen, J.L.P.J. van der (2006) Investigation of the band gap widening effect in thin silicon double gate MOSFETs.

Steghuis, Claudia (2006) Service granularity in SOA-projects : a trade-off analysis.

Stehouwer, J.H. (2006) Cue phrase selection methods for textual classification problems.

Swartjes, Ivo (2006) The Plot Thickens : bringing structure and meaning into automated story generation.

Tetteroo, Arend-Jan (2006) Bomb-Proof Server : benodigde technieken en producten voor een high availability systeem en hun consequenties voor beschikbaarheid.

Veldhuijsen, Gerald van (2006) DICOM Image Retrieval.

Verbree, A.T. (2006) On the structuring of discussion transcripts based on utterances automatically classified.

Vrielink, S.B. (2006) Situational reinforcement learning : learning and combining local policies by using heuristic state preference values.

Vrijkorte, A.B. (2006) Semantics in service-oriented architectures.

Wasbeek, Edwin van (2006) A repository for the management of artifacts in system engineering.

Winkel, J.D. te (2006) Applying Composition Filters to C.


Boedeltje, Michel Ronald (2005) In response to your inquiry : Automatic E-mail Answer Suggestion in a Dutch Contact Centre.

Borkent, Michiel (2005) De- and recomposition of expression in music performance.

Borssum Waalkes, Bart (2005) Managing Genome Databases.

Burgwal, M.D. (2005) Serving the Montium : design of an energy-efficient processor-network interface.

Fikkert, F.W. (2005) Item availability restricted.

Havinga, W. (2005) Designating join points in Compose* : a predicate-based superimposition selector language for Compose.

Holzenspies, Philip (2005) SILC: SPRITE Input Language with C(++).

Klaij, Bastiaan (2005) Toegepast tokenizen voor natuurlijke taal verwerking : automatische analyse van platte en opgemaakte tekst.

Nijenhuis, Barry (2005) Smart sign for smart surroundings.

Oosterhof, N.N. (2005) Application patterns in functional languages.

Timmer, M. (2005) How to identify the speed limiting factor of a TCP flow.

Weijden, Erik van der (2005) Structuring argumentation in meetings : Visualizing the argument structure.

Withaar, T. (2005) Analyzing joint-measurements using 3D scancs and statistical models.


Ananda, Artha Sejati (2004) Design and simulation of non-zero and zero dispersion optical lattice wavelength filters.

Balkema, Wietse (2004) Realization and characterization of a 2.4 GHz radio system based on frequency offset division multiple access.

Bekkaoui, A. (2004) Link performance of the time offset transmitted reference system.

Bui, Cuong (2004) Write-intensive applications with LDAP.

Evers, Sander (2004) Form follows function. Editor GUIs in a functional style.

Roelofsen, Floris (2004) Contextual Reasoning - Complexity Analysis and Decision Procedures -.

Sözer, Hasan (2004) A peer-to-peer file sharing system for wireless ad-hoc networks.


He, Xiaobo and Mayasari, Elisabeth E. (2003) A Design of Software Architecture for “SHAPE” Workforce Management Game.


Nurdin, H.I. (2002) Mathematical modelling of bias and uncertainty in accident risk assessment.


Agung Julius, A.A. (2001) Evolution of the modal densities of a class of stochastic hybrid systems.

Donckers, L. (2001) Energy Efficient TCP.


Schiphorst, R. (2000) Demonstration of the Software-Radio Concept.


Hiemstra, D. (1996) Using statistical methods to create a bilingual dictionary.

This list was generated on Mon Aug 10 06:02:09 2020 CEST.