University of Twente Student Theses

Login

Programme: Computer Science BSc (56964)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Year | Item Type
Jump to: 2020 | 2019 | 2018 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2007 | 2004
Number of items: 84.

2020

Brinke, S.T. ten (2020) The Effect of Manipulating Perceived Action Boundaries On Catching Performance.

Imbrea, A. (2020) An empirical comparison of automated machine learning techniques for data streams.

Flederus, D.R. (2020) Enhancing music genre classification with neural networks by using extracted musical features.

Peters, S.T.H. (2020) Distribution of advertisements on YouTube among several content categories.

van der Vijgh, M. (2020) A comparison of open-source real-time online learning frameworks for neural networks.

Winters, A. (2020) Examining the effect of hyperparameters on the training of a residual network for emotion recognition.

Velden, J. van der (2020) Blacklist, do you copy? Characterizing information flow in public domain blacklists.

Praas, J.W. (2020) Predicting influence spread in online social networks using combinations of node centralities.

Jansen, L.W.L. (2020) Comparing cloud security directions between the Academia and the Industry.

Sleutjes, A.R. (2020) Identification of Profiles Based on Physical Behaviour Patterns.

Oorschot, D.H.M.A. van (2020) Let’s sort this out: GPGPU Verification of Radix Sort.

Lijcklama à Nijeholt, D.J. (2020) Control for Cooperative Autonomous Driving Inspired by Bird Flocking Behavior.

2019

Bakker, D.R. (2019) Impact-based optimisation of BGP Flowspec rules for DDoS attack mitigation.

Meijerman, T.R.I. (2019) Manipulating a dissociative bond with out-of-body experience avatar in virtual reality.

Hendriks, M. (2019) Can machine learning automatically choose your best model checking strategy?

Vries, L.J.W. de (2019) IOTA Vulnerability: Large Weight Attack Performed in a Network.

Mendler, G.T. (2019) Designing a meta report for hotel customer reviews.

Kobes, W.J. (2019) Efficient and accurate classification of cyber security related documents.

Renssen, Martijn (2019) Classification of types of road damage using machine learning and a smartwatch.

Visserman, H.A. (2019) Group Activity Recognition Using Channel State Information.

Koelewijn, Dirk (2019) Fingerprint-Based Automated Rule Generation for DDoS Mitigation using the Berkeley Packet Filter.

Cai, D. (2019) A Parasite Chain Attack in IOTA.

Keijer, Julik (2019) Automated DDoS mitigation based on known attacks using a Web Application Firewall.

Bolding, T.G.J. (2019) Applying Peak-Shaving to Household Devices using an Event-Driven Algorithm.

Schaik, E.J.G. van (2019) Color-based Recognition Techniques for Manipulation Detection in Advertisement Videos.

Krieter, Maren (2019) "Don't bother me with your information" : The Effect of Information Framing on Purchase Behavior in the Context of Plastic-free Grocery Shopping.

Dorp, M. van (2019) The Art of Corporate Storytelling : Exploring the effects of jargon and dramatic storytelling on reputation, trust and customer-company identification in the light of corporate stories.

Schudzich, Tim (2019) Music Consumers’ Adoption of Smart Speakers in the Field of Music : How do music consumers adopt towards (musical) smart speakers with reference to music marketing?

Wensing, Kasper (2019) Nuclear energy: A nuclear topic.

Cojocaru, Andrei (2019) Handling Missing Data: Traditional Techniques Versus Machine Learning.

Booijink, K.G. (2019) Evaluating the Scalability of MayBMS, a Probabilistic Data Tool.

Weers, F.R.T. (2019) Automatic home video editing on music.

Abraham, Remco (2019) A Formal Proof of the Termination of Zielonka's Algorithm for Solving Parity Games.

Sluiter, N.I. (2019) Influence Maximization in Social Networks by Injecting Memes.

Hove, K.W. van (2019) Automated DDoS Attack Fingerprinting by Mimicking the Actions of a Network Operator.

Kooij, D. (2019) Groovy Parity Games.

Hultermans, M.A.A. (2019) A Theoretical Ad Hoc Lunar Communication Network With CubeSats as Secondary Payload of Lunar Missions.

Perera, R.A.H. (2019) Finger-Adaptive Illumination Control and Exposure Fusion Imaging for Biometric Finger Vein Recognition.

Scholten, C.P.B. (2019) Hacking the router: characterizing attacks targeting low-cost routers using a honeypot router.

Ruis, Frank (2019) Spilling the beans: Food recipe popularity prediction using ingredient networks.

Coroiu, Alexandra (2019) The generalization performance of hate speech detection using machine learning.

Oliemans, R. (2019) WHOIS versus GDPR.

Verkleij, Martijn (2019) Teaching programming using industry tools.

Bleeker, D.A. (2019) DoS attack on recursive resolvers with DNSSEC key-tag collisions.

Marin, Mihai David (2019) Effectiveness of neural language models for word prediction of textual mammography reports.

Vegt, M. E. M. van der (2019) Compressed Set Representations and their Effectiveness in Probabilistic Model Checking.

Muller, M. (2019) Creating building energy prediction models with convolutional recurrent neural networks.

Vries, de, R.H. (2019) Walker: Automated Assessment of Haskell Code using Syntax Tree Analysis.

Harten, Anne van (2019) Analyzing Programming Education Quality based on Students' Questions.

Boersma, Kitty (2019) Using Influencing Factors and Multilayer Perceptrons for Energy Demand Prediction.

Jellema, J.M. (2019) Polynomial Calculation of Quasi-Gray code labelings for Irregular Signal Constellations.

Witlox, K.H.D. (2019) Face unmorphing.

Vos, Matthijs (2019) Characterizing infrastructure of DDoS attacks based on DDoSDB fingerprints.

Mitev, Zarimir (2019) Estimating User Interaction Complexity.

Spijker, K. (2019) Identifying Users’ Skill Level through the Process Mining of Software Logs.

Wentzel, S. D. (2019) Evaluating Information Retrieval Systems for Children in an Educational Context.

Tziampazis, Christodoulos (2019) Exposure Assessment on Medical Devices in the Netherlands.

Rõžakov, Ilja (2019) A Modest Comparison of Blockchain Consensus Algorithms.

Cesar, M (2019) The dangers and privacy issues of motion-based side-channel attacks.

Vermast, Alissa (2019) Using VR to induce smoke cravings in low literate or intellectually disabled individuals who have a smoking addiction.

Klink, K. van (2019) Detection and Identification of Roman Emperors Using Facial Recognition.

Kampen, Coen van (2019) Missing data imputation based on probabilistic data.

Overkamp, Niels (2019) Speeding up profile steering algorithms with caching for buffer type devices.

Schroten, Peter (2019) Introducing BGD: a DSL to express board games and gameplay.

Bos, W.F.A. (2019) Software Metrics as Indicators for Effort of Object-Oriented Software Projects.

2018

Bie, J.A. de (2018) PTA as an approach to fault tree analysis.

2015

Thunnissen, J. (2015) Communication solution for ICU patients : a case study.

Verhaar, Jort (2015) Micrometer scale 3d membrane printing towards locust ear imitation.

2014

Strecke, Jonas (2014) A high torque variable stiffness mechanism for the 'VSDD': conceptual design, realization and experimental validation.

Bokhove, Tom (2014) Public data visualisation in traffic, based on local, real-time monitoring.

Spoor, R.J.F. (2014) Design of a wall latching device.

2013

Tijhuis, K. (2013) Methods for modelling unit operations in chemical process simulators.

Vonk, J. (2013) Formal specification and verification of OpenCL Kernel optimization.

Knoben, L. and Otten, M. and Fransen, R. (2013) De waterzuivering als Petrinet: het voorspellen van overstromingen.

2012

Jansen, M. (2012) Improving inattentive operation of peripheral touch controls.

2011

Eerenberg, E. (2011) Towards distributed information retrieval based on economic models.

2010

Diephuis, Maurits (2010) A framework for robust forensic image identification.

Teijgeler, Stefan (2010) Connecting GROOVE to the world using XMI.

Vlieg, Edwin (2010) Usage patterns for user-centric service composition.

Bijker, Remko (2010) Efficient pointcut projection.

2007

Sierhuis, Pim (2007) Het voorkomen van prestatieverlies bij de koppeling met Web services: ... en de rol van standaardisatie daarbij.

Scholten, F.B. (2007) The concern-oriented software architecture analysis method.

Peeters, H.A.M. (2007) Aanbestedings Barometer : een onderzoek naar misstanden & knelpunten in de huidige aanbestedingspraktijk.

2004

Bui, Cuong (2004) Write-intensive applications with LDAP.

This list was generated on Wed Feb 19 05:05:18 2020 CET.