University of Twente Student Theses

Login

Programme: Computer Science BSc (56964)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Year | Item Type
Jump to: 2020 | 2019 | 2018 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2007 | 2004
Number of items: 156.

2020

Arkel, Lars van (2020) Demonstrating runtime assertion checking using Snap!

Artolozaga, Iñigo (2020) Mental health care in a pandemic : a survey from a design and interaction perspective.

Bandi, S.S.A. (2020) Inter-subject synchrony and emotional dynamics in magnetoencephalographic signals during music stimulation.

Banu, R. (2020) Internet of nano-things in human cancer detection.

Benen, N.J. (2020) Using Graphviz to create aesthetically pleasing LaTeXdrawings of graphs.

Breggeman, F.T. (2020) Graph Isomorphism with Pathfinding Algorithms.

Brink, K. van den (2020) Finding “The Drop” : Recognizing the climax in electronic music using classification models.

Brinke, S.T. ten (2020) The Effect of Manipulating Perceived Action Boundaries On Catching Performance.

Brunt, B.W. (2020) Decreasing the computation time that's used for saving data in the DEMKit simulator.

Constantinescu, E.M. (2020) An in-depth approach to fitting probability distributions using evolutionary algorithms.

Dulfer, R.M. (2020) The propaganda machine.

Engelenhoven, Adjorn van (2020) Modular Neural Networks using Multiple Gradients.

Filipovic, Simona (2020) Subpopulation process mining in healthcare.

Flapper, Edwin (2020) ETA Prediction for vessels using Machine Learning.

Flederus, D.R. (2020) Enhancing music genre classification with neural networks by using extracted musical features.

Gavenavicius, M. (2020) Evaluating and comparing textual summaries using question answering models and reading comprehension datasets.

Grooters, T. (2020) Analysing certificate transparency logs for let’s encrypt customer behaviour.

Gugten, L.A. van der (2020) Load balancing framework comparison.

Haas, A.N.J.P.M. (2020) Attitudes towards digital transformation at small enterprises : A cross-border analysis.

Hast, Fritz (2020) The Impact of 5G on Future Data Center’s Carbon Dioxide Emissions.

Heinen, Niek (2020) Using lightweight image classifiers for electrocardiogram classification on embedded devices.

Hetterscheid, K.J.T. (2020) Detecting agitated speech : A neural network approach.

Heyns, L. (2020) Converting Modest Models to Efficient Code.

Ignatius Patrick, Patrick (2020) Assessing LOKI by learning from Mitsuku and dataset themes.

Imbrea, A. (2020) An empirical comparison of automated machine learning techniques for data streams.

Jaarsveld, F. van (2020) Estimating the effects of the Macroscopic Traffic Parameters on the overall Cooperative Awareness Message generations.

Jansen, G.A.A. (2020) Underground Wireless Communication and Wake-Up at 125 kHz.

Jansen, L.W.L. (2020) Comparing cloud security directions between the Academia and the Industry.

Kampen, C.M. van (2020) Formal Automated Verification of a Work-Stealing Deque.

Karsten, Jarik (2020) Crunching Attack Trees : efficient algorithms for computation of metrics.

Knol, R. (2020) Emotional activity detection using behavioural sounds.

Leendertz, R.R. (2020) Validating the Maneuver Coordination Protocol with UPPAAL.

Li, Y. (2020) Interactive visualization of book publication history.

Lijcklama à Nijeholt, D.J. (2020) Control for Cooperative Autonomous Driving Inspired by Bird Flocking Behavior.

Lijzenga, O. (2020) Symbolic parity games : Two novel fixpoint iteration algorithms with strategy derivation.

Linssen, R.H.H.G.M. (2020) Vulnerability of DNS name servers against BGP hijacking.

Lummen, D.L.M. (2020) An analysis of Link and Node Level Resilience on Network Resilience.

Lüpkes, Niklas (2020) Using static weight estimation of general trees to efficiently parallelize the execution of DEMKit Simulation Models.

Maas, Jelle (2020) Cyber attack detection in smart grids.

Meijer, J.J.W. (2020) Morphing detection based on regional analysis of local frequency content.

Middelkoop, D.E.V. (2020) Sensitivity analysis of predicting wireless c hannels within an indoor factory floor.

Myśliwiec, J. (2020) Generating short RPG side-quest stories with transformers.

Nijeboer, F.J. (2020) Detection of HTTPS encrypted DNS traffic.

Nijweide, F.P.J. (2020) Autoencoder-based cleaning of non-categorical data in probabilistic databases.

Noort, N. van (2020) Machine Learning for monitoring attacks in the cloud.

Oldengarm, B.M.J. (2020) Improving human activity recognition using embedded smartphone sensors.

Oorschot, D.H.M.A. van (2020) Let’s sort this out: GPGPU Verification of Radix Sort.

Orlinski, Jakub (2020) MEG-driven emotion classification using convolutional and recurrent Neural Networks.

Oude Roelink, B.M. (2020) On the security of authentication when linking federated identities.

Peters, S.T.H. (2020) Distribution of advertisements on YouTube among several content categories.

Plentinger, C.S. (2020) GUI for FIG : visualising simulation results.

Popa, A. (2020) Feature evaluation for detection of COVID-19 in pulmonary CT scan images.

Praas, J.W. (2020) Predicting influence spread in online social networks using combinations of node centralities.

Rengers, J.J. (2020) Investigating association between musical features and emotion through EEG signal analysis.

Rijn, K.D. van (2020) A binary decision diagram based approach on improving probabilistic databases.

Roelink, M.J. (2020) Encoding deadlock-free monitors in the VerCors verification tool.

Rump, A. (2020) Automated assessment of learning objectives in programming assignments.

Rus, Adrian-Catalin (2020) Modelling and evaluating Obstructive Sleep Apnea management protocols with UPPAAL.

Sain, R. de (2020) Impact of language on detecting agitation.

Schooltink, W.T. (2020) Testing the sensitivity of machine learning classifiers to attribute noise in training data.

Schrama, M.L. (2020) Improving speech emotion recognition by identifying the speaker with Multi-task Learning.

Seteanu, R.A. (2020) Voice feature extraction from agitated speech.

Sievers, C.T. (2020) Bag-of-words location retrieval : Including position of local features.

Sleutjes, A.R. (2020) Identification of Profiles Based on Physical Behaviour Patterns.

Sonneveld, J.J. (2020) A gravitational approach for ranking Autonomous Systems in Large Autonomous System Networks.

Staal, P.J. (2020) An Analysis of Programming Paradigms in High-Level Synthesis Tools.

Stapel, F.T.A. (2020) A Heuristic Approach to Indoor Rock Climbing Route Generation.

Steenmeijer, L.D. (2020) Increasing the consistency of feedback on programming code by using a tagging system.

Stein, T.J. (2020) Uniform random samples for second-order restricted k-compositions.

Stellaard, Julian (2020) Tracking the process of an outbreak to a pandemic via logistical infrastructures : case study.

Velden, J. van der (2020) Blacklist, do you copy? Characterizing information flow in public domain blacklists.

Velzel, M.M. (2020) Design2Struct : Generating website structures from design images using neural networks.

Vliet, G.J.B van (2020) Student study-behavior and knowledge retention.

Vredeveld, G.W.R. (2020) Invaluable measurement networks and their critical infrastructure : uptime discrepancy localization and network improvements.

Wackerle Garcia, L.M. (2020) Analysis of heuristics with random shortest path metrics on sparse graphs.

Winters, A. (2020) Examining the effect of hyperparameters on the training of a residual network for emotion recognition.

Witteveen, C.P.T (2020) Measuring the effectiveness of feedback on code of novice programmers.

Woudstra, M.H. (2020) Exploring Possibilities to Increase Ease of Use of ITPortfolio Management.

Xhymshiti, Meriton (2020) Domain independence of Machine Learning and lexicon based methods in sentiment analysis.

Xia, Lichen (2020) How vehicles’ speeds influence the optimal configuration and performance of the C-V2X.

Yuan, Ye (2020) Improving information retrieval by semantic embedding.

de Greeuw, P.C.A. (2020) Robustness of Microgrid Control Mechanisms Against Cyber Attacks.

van der Vijgh, M. (2020) A comparison of open-source real-time online learning frameworks for neural networks.

Šatcs, D. (2020) Understanding the lightning network capability to route payments.

2019

Abraham, Remco (2019) A Formal Proof of the Termination of Zielonka's Algorithm for Solving Parity Games.

Bakker, D.R. (2019) Impact-based optimisation of BGP Flowspec rules for DDoS attack mitigation.

Bleeker, D.A. (2019) DoS attack on recursive resolvers with DNSSEC key-tag collisions.

Boersma, Kitty (2019) Using Influencing Factors and Multilayer Perceptrons for Energy Demand Prediction.

Bolding, T.G.J. (2019) Applying Peak-Shaving to Household Devices using an Event-Driven Algorithm.

Booijink, K.G. (2019) Evaluating the Scalability of MayBMS, a Probabilistic Data Tool.

Bos, W.F.A. (2019) Software Metrics as Indicators for Effort of Object-Oriented Software Projects.

Cai, D. (2019) A Parasite Chain Attack in IOTA.

Cesar, M (2019) The dangers and privacy issues of motion-based side-channel attacks.

Cojocaru, Andrei (2019) Handling Missing Data: Traditional Techniques Versus Machine Learning.

Coroiu, Alexandra (2019) The generalization performance of hate speech detection using machine learning.

Dorp, M. van (2019) The Art of Corporate Storytelling : Exploring the effects of jargon and dramatic storytelling on reputation, trust and customer-company identification in the light of corporate stories.

Harten, Anne van (2019) Analyzing Programming Education Quality based on Students' Questions.

Hendriks, M. (2019) Can machine learning automatically choose your best model checking strategy?

Hove, K.W. van (2019) Automated DDoS Attack Fingerprinting by Mimicking the Actions of a Network Operator.

Hultermans, M.A.A. (2019) A Theoretical Ad Hoc Lunar Communication Network With CubeSats as Secondary Payload of Lunar Missions.

Jellema, J.M. (2019) Polynomial Calculation of Quasi-Gray code labelings for Irregular Signal Constellations.

Kampen, Coen van (2019) Missing data imputation based on probabilistic data.

Keijer, Julik (2019) Automated DDoS mitigation based on known attacks using a Web Application Firewall.

Klink, K. van (2019) Detection and Identification of Roman Emperors Using Facial Recognition.

Kobes, W.J. (2019) Efficient and accurate classification of cyber security related documents.

Koelewijn, Dirk (2019) Fingerprint-Based Automated Rule Generation for DDoS Mitigation using the Berkeley Packet Filter.

Kooij, D. (2019) Groovy Parity Games.

Krieter, Maren (2019) "Don't bother me with your information" : The Effect of Information Framing on Purchase Behavior in the Context of Plastic-free Grocery Shopping.

Marin, Mihai David (2019) Effectiveness of neural language models for word prediction of textual mammography reports.

Meijerman, T.R.I. (2019) Manipulating a dissociative bond with out-of-body experience avatar in virtual reality.

Mendler, G.T. (2019) Designing a meta report for hotel customer reviews.

Mitev, Zarimir (2019) Estimating User Interaction Complexity.

Muller, M. (2019) Creating building energy prediction models with convolutional recurrent neural networks.

Oliemans, R. (2019) WHOIS versus GDPR.

Overkamp, Niels (2019) Speeding up profile steering algorithms with caching for buffer type devices.

Perera, R.A.H. (2019) Finger-Adaptive Illumination Control and Exposure Fusion Imaging for Biometric Finger Vein Recognition.

Renssen, Martijn (2019) Classification of types of road damage using machine learning and a smartwatch.

Ruis, Frank (2019) Spilling the beans: Food recipe popularity prediction using ingredient networks.

Rõžakov, Ilja (2019) A Modest Comparison of Blockchain Consensus Algorithms.

Schaik, E.J.G. van (2019) Color-based Recognition Techniques for Manipulation Detection in Advertisement Videos.

Scholten, C.P.B. (2019) Hacking the router: characterizing attacks targeting low-cost routers using a honeypot router.

Schroten, Peter (2019) Introducing BGD: a DSL to express board games and gameplay.

Schudzich, Tim (2019) Music Consumers’ Adoption of Smart Speakers in the Field of Music : How do music consumers adopt towards (musical) smart speakers with reference to music marketing?

Sluiter, N.I. (2019) Influence Maximization in Social Networks by Injecting Memes.

Spijker, K. (2019) Identifying Users’ Skill Level through the Process Mining of Software Logs.

Tziampazis, Christodoulos (2019) Exposure Assessment on Medical Devices in the Netherlands.

Vegt, M. E. M. van der (2019) Compressed Set Representations and their Effectiveness in Probabilistic Model Checking.

Verkleij, Martijn (2019) Teaching programming using industry tools.

Vermast, Alissa (2019) Using VR to induce smoke cravings in low literate or intellectually disabled individuals who have a smoking addiction.

Visserman, H.A. (2019) Group Activity Recognition Using Channel State Information.

Vos, Matthijs (2019) Characterizing infrastructure of DDoS attacks based on DDoSDB fingerprints.

Vries, L.J.W. de (2019) IOTA Vulnerability: Large Weight Attack Performed in a Network.

Vries, de, R.H. (2019) Walker: Automated Assessment of Haskell Code using Syntax Tree Analysis.

Weers, F.R.T. (2019) Automatic home video editing on music.

Wensing, Kasper (2019) Nuclear energy: A nuclear topic.

Wentzel, S. D. (2019) Evaluating Information Retrieval Systems for Children in an Educational Context.

Witlox, K.H.D. (2019) Face unmorphing.

2018

Bie, J.A. de (2018) PTA as an approach to fault tree analysis.

2015

Thunnissen, J. (2015) Communication solution for ICU patients : a case study.

Verhaar, Jort (2015) Micrometer scale 3d membrane printing towards locust ear imitation.

2014

Bokhove, Tom (2014) Public data visualisation in traffic, based on local, real-time monitoring.

Spoor, R.J.F. (2014) Design of a wall latching device.

Strecke, Jonas (2014) A high torque variable stiffness mechanism for the 'VSDD': conceptual design, realization and experimental validation.

2013

Knoben, L. and Otten, M. and Fransen, R. (2013) De waterzuivering als Petrinet: het voorspellen van overstromingen.

Tijhuis, K. (2013) Methods for modelling unit operations in chemical process simulators.

Vonk, J. (2013) Formal specification and verification of OpenCL Kernel optimization.

2012

Jansen, M. (2012) Improving inattentive operation of peripheral touch controls.

2011

Eerenberg, E. (2011) Towards distributed information retrieval based on economic models.

2010

Bijker, Remko (2010) Efficient pointcut projection.

Diephuis, Maurits (2010) A framework for robust forensic image identification.

Teijgeler, Stefan (2010) Connecting GROOVE to the world using XMI.

Vlieg, Edwin (2010) Usage patterns for user-centric service composition.

2007

Peeters, H.A.M. (2007) Aanbestedings Barometer : een onderzoek naar misstanden & knelpunten in de huidige aanbestedingspraktijk.

Scholten, F.B. (2007) The concern-oriented software architecture analysis method.

Sierhuis, Pim (2007) Het voorkomen van prestatieverlies bij de koppeling met Web services: ... en de rol van standaardisatie daarbij.

2004

Bui, Cuong (2004) Write-intensive applications with LDAP.

This list was generated on Wed Dec 2 06:03:19 2020 CET.