University of Twente Student Theses

Login

Programme: Computer Science BSc (56964)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Year | Item Type
Jump to: 2019 | 2018 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2007 | 2004
Number of items: 72.

2019

Abraham, Remco (2019) A Formal Proof of the Termination of Zielonka's Algorithm for Solving Parity Games.

Bakker, D.R. (2019) Impact-based optimisation of BGP Flowspec rules for DDoS attack mitigation.

Bleeker, D.A. (2019) DoS attack on recursive resolvers with DNSSEC key-tag collisions.

Boersma, Kitty (2019) Using Influencing Factors and Multilayer Perceptrons for Energy Demand Prediction.

Bolding, T.G.J. (2019) Applying Peak-Shaving to Household Devices using an Event-Driven Algorithm.

Booijink, K.G. (2019) Evaluating the Scalability of MayBMS, a Probabilistic Data Tool.

Bos, W.F.A. (2019) Software Metrics as Indicators for Effort of Object-Oriented Software Projects.

Cai, D. (2019) A Parasite Chain Attack in IOTA.

Cesar, M (2019) The dangers and privacy issues of motion-based side-channel attacks.

Cojocaru, Andrei (2019) Handling Missing Data: Traditional Techniques Versus Machine Learning.

Coroiu, Alexandra (2019) The generalization performance of hate speech detection using machine learning.

Dorp, M. van (2019) The Art of Corporate Storytelling : Exploring the effects of jargon and dramatic storytelling on reputation, trust and customer-company identification in the light of corporate stories.

Harten, Anne van (2019) Analyzing Programming Education Quality based on Students' Questions.

Hendriks, M. (2019) Can machine learning automatically choose your best model checking strategy?

Hove, K.W. van (2019) Automated DDoS Attack Fingerprinting by Mimicking the Actions of a Network Operator.

Hultermans, M.A.A. (2019) A Theoretical Ad Hoc Lunar Communication Network With CubeSats as Secondary Payload of Lunar Missions.

Jellema, J.M. (2019) Polynomial Calculation of Quasi-Gray code labelings for Irregular Signal Constellations.

Kampen, Coen van (2019) Missing data imputation based on probabilistic data.

Keijer, Julik (2019) Automated DDoS mitigation based on known attacks using a Web Application Firewall.

Klink, K. van (2019) Detection and Identification of Roman Emperors Using Facial Recognition.

Kobes, W.J. (2019) Efficient and accurate classification of cyber security related documents.

Koelewijn, Dirk (2019) Fingerprint-Based Automated Rule Generation for DDoS Mitigation using the Berkeley Packet Filter.

Kooij, D. (2019) Groovy Parity Games.

Krieter, Maren (2019) "Don't bother me with your information" : The Effect of Information Framing on Purchase Behavior in the Context of Plastic-free Grocery Shopping.

Marin, Mihai David (2019) Effectiveness of neural language models for word prediction of textual mammography reports.

Meijerman, T.R.I. (2019) Manipulating a dissociative bond with out-of-body experience avatar in virtual reality.

Mendler, G.T. (2019) Designing a meta report for hotel customer reviews.

Mitev, Zarimir (2019) Estimating User Interaction Complexity.

Muller, M. (2019) Creating building energy prediction models with convolutional recurrent neural networks.

Oliemans, R. (2019) WHOIS versus GDPR.

Overkamp, Niels (2019) Speeding up profile steering algorithms with caching for buffer type devices.

Perera, R.A.H. (2019) Finger-Adaptive Illumination Control and Exposure Fusion Imaging for Biometric Finger Vein Recognition.

Renssen, Martijn (2019) Classification of types of road damage using machine learning and a smartwatch.

Ruis, Frank (2019) Spilling the beans: Food recipe popularity prediction using ingredient networks.

Rõžakov, Ilja (2019) A Modest Comparison of Blockchain Consensus Algorithms.

Schaik, E.J.G. van (2019) Color-based Recognition Techniques for Manipulation Detection in Advertisement Videos.

Scholten, C.P.B. (2019) Hacking the router: characterizing attacks targeting low-cost routers using a honeypot router.

Schroten, Peter (2019) Introducing BGD: a DSL to express board games and gameplay.

Schudzich, Tim (2019) Music Consumers’ Adoption of Smart Speakers in the Field of Music : How do music consumers adopt towards (musical) smart speakers with reference to music marketing?

Sluiter, N.I. (2019) Influence Maximization in Social Networks by Injecting Memes.

Spijker, K. (2019) Identifying Users’ Skill Level through the Process Mining of Software Logs.

Tziampazis, Christodoulos (2019) Exposure Assessment on Medical Devices in the Netherlands.

Vegt, M. E. M. van der (2019) Compressed Set Representations and their Effectiveness in Probabilistic Model Checking.

Verkleij, Martijn (2019) Teaching programming using industry tools.

Vermast, Alissa (2019) Using VR to induce smoke cravings in low literate or intellectually disabled individuals who have a smoking addiction.

Visserman, H.A. (2019) Group Activity Recognition Using Channel State Information.

Vos, Matthijs (2019) Characterizing infrastructure of DDoS attacks based on DDoSDB fingerprints.

Vries, L.J.W. de (2019) IOTA Vulnerability: Large Weight Attack Performed in a Network.

Vries, de, R.H. (2019) Walker: Automated Assessment of Haskell Code using Syntax Tree Analysis.

Weers, F.R.T. (2019) Automatic home video editing on music.

Wensing, Kasper (2019) Nuclear energy: A nuclear topic.

Wentzel, S. D. (2019) Evaluating Information Retrieval Systems for Children in an Educational Context.

Witlox, K.H.D. (2019) Face unmorphing.

2018

Bie, J.A. de (2018) PTA as an approach to fault tree analysis.

2015

Thunnissen, J. (2015) Communication solution for ICU patients : a case study.

Verhaar, Jort (2015) Micrometer scale 3d membrane printing towards locust ear imitation.

2014

Bokhove, Tom (2014) Public data visualisation in traffic, based on local, real-time monitoring.

Spoor, R.J.F. (2014) Design of a wall latching device.

Strecke, Jonas (2014) A high torque variable stiffness mechanism for the 'VSDD': conceptual design, realization and experimental validation.

2013

Knoben, L. and Otten, M. and Fransen, R. (2013) De waterzuivering als Petrinet: het voorspellen van overstromingen.

Tijhuis, K. (2013) Methods for modelling unit operations in chemical process simulators.

Vonk, J. (2013) Formal specification and verification of OpenCL Kernel optimization.

2012

Jansen, M. (2012) Improving inattentive operation of peripheral touch controls.

2011

Eerenberg, E. (2011) Towards distributed information retrieval based on economic models.

2010

Bijker, Remko (2010) Efficient pointcut projection.

Diephuis, Maurits (2010) A framework for robust forensic image identification.

Teijgeler, Stefan (2010) Connecting GROOVE to the world using XMI.

Vlieg, Edwin (2010) Usage patterns for user-centric service composition.

2007

Peeters, H.A.M. (2007) Aanbestedings Barometer : een onderzoek naar misstanden & knelpunten in de huidige aanbestedingspraktijk.

Scholten, F.B. (2007) The concern-oriented software architecture analysis method.

Sierhuis, Pim (2007) Het voorkomen van prestatieverlies bij de koppeling met Web services: ... en de rol van standaardisatie daarbij.

2004

Bui, Cuong (2004) Write-intensive applications with LDAP.

This list was generated on Tue Oct 15 05:05:14 2019 CEST.