University of Twente Student Theses

Login

Programme: Computer Science BSc (56964)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Year | Item Type
Jump to: 2020 | 2019 | 2018 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2007 | 2004
Number of items: 155.

2020

Brinke, S.T. ten (2020) The Effect of Manipulating Perceived Action Boundaries On Catching Performance.

Imbrea, A. (2020) An empirical comparison of automated machine learning techniques for data streams.

Flederus, D.R. (2020) Enhancing music genre classification with neural networks by using extracted musical features.

Peters, S.T.H. (2020) Distribution of advertisements on YouTube among several content categories.

van der Vijgh, M. (2020) A comparison of open-source real-time online learning frameworks for neural networks.

Winters, A. (2020) Examining the effect of hyperparameters on the training of a residual network for emotion recognition.

Velden, J. van der (2020) Blacklist, do you copy? Characterizing information flow in public domain blacklists.

Praas, J.W. (2020) Predicting influence spread in online social networks using combinations of node centralities.

Jansen, L.W.L. (2020) Comparing cloud security directions between the Academia and the Industry.

Stapel, F.T.A. (2020) A Heuristic Approach to Indoor Rock Climbing Route Generation.

Sleutjes, A.R. (2020) Identification of Profiles Based on Physical Behaviour Patterns.

Oorschot, D.H.M.A. van (2020) Let’s sort this out: GPGPU Verification of Radix Sort.

Lijcklama à Nijeholt, D.J. (2020) Control for Cooperative Autonomous Driving Inspired by Bird Flocking Behavior.

Vliet, G.J.B van (2020) Student study-behavior and knowledge retention.

Staal, P.J. (2020) An Analysis of Programming Paradigms in High-Level Synthesis Tools.

Woudstra, M.H. (2020) Exploring Possibilities to Increase Ease of Use of ITPortfolio Management.

Hast, Fritz (2020) The Impact of 5G on Future Data Center’s Carbon Dioxide Emissions.

Kampen, C.M. van (2020) Formal Automated Verification of a Work-Stealing Deque.

de Greeuw, P.C.A. (2020) Robustness of Microgrid Control Mechanisms Against Cyber Attacks.

Maas, Jelle (2020) Cyber attack detection in smart grids.

Plentinger, C.S. (2020) GUI for FIG : visualising simulation results.

Stein, T.J. (2020) Uniform random samples for second-order restricted k-compositions.

Linssen, R.H.H.G.M. (2020) Vulnerability of DNS name servers against BGP hijacking.

Arkel, Lars van (2020) Demonstrating runtime assertion checking using Snap!

Brunt, B.W. (2020) Decreasing the computation time that's used for saving data in the DEMKit simulator.

Banu, R. (2020) Internet of nano-things in human cancer detection.

Rump, A. (2020) Automated assessment of learning objectives in programming assignments.

Haas, A.N.J.P.M. (2020) Attitudes towards digital transformation at small enterprises : A cross-border analysis.

Lijzenga, O. (2020) Symbolic parity games : Two novel fixpoint iteration algorithms with strategy derivation.

Seteanu, R.A. (2020) Voice feature extraction from agitated speech.

Witteveen, C.P.T (2020) Measuring the effectiveness of feedback on code of novice programmers.

Xia, Lichen (2020) How vehicles’ speeds influence the optimal configuration and performance of the C-V2X.

Sievers, C.T. (2020) Bag-of-words location retrieval : Including position of local features.

Dulfer, R.M. (2020) The propaganda machine.

Velzel, M.M. (2020) Design2Struct : Generating website structures from design images using neural networks.

Gavenavicius, M. (2020) Evaluating and comparing textual summaries using question answering models and reading comprehension datasets.

Knol, R. (2020) Emotional activity detection using behavioural sounds.

Popa, A. (2020) Feature evaluation for detection of COVID-19 in pulmonary CT scan images.

Xhymshiti, Meriton (2020) Domain independence of Machine Learning and lexicon based methods in sentiment analysis.

Rus, Adrian-Catalin (2020) Modelling and evaluating Obstructive Sleep Apnea management protocols with UPPAAL.

Hetterscheid, K.J.T. (2020) Detecting agitated speech : A neural network approach.

Šatcs, D. (2020) Understanding the lightning network capability to route payments.

Leendertz, R.R. (2020) Validating the Maneuver Coordination Protocol with UPPAAL.

Bandi, S.S.A. (2020) Inter-subject synchrony and emotional dynamics in magnetoencephalographic signals during music stimulation.

Oude Roelink, B.M. (2020) On the security of authentication when linking federated identities.

Li, Y. (2020) Interactive visualization of book publication history.

Myśliwiec, J. (2020) Generating short RPG side-quest stories with transformers.

Constantinescu, E.M. (2020) An in-depth approach to fitting probability distributions using evolutionary algorithms.

Roelink, M.J. (2020) Encoding deadlock-free monitors in the VerCors verification tool.

Sonneveld, J.J. (2020) A gravitational approach for ranking Autonomous Systems in Large Autonomous System Networks.

Yuan, Ye (2020) Improving information retrieval by semantic embedding.

Gugten, L.A. van der (2020) Load balancing framework comparison.

Schooltink, W.T. (2020) Testing the sensitivity of machine learning classifiers to attribute noise in training data.

Rengers, J.J. (2020) Investigating association between musical features and emotion through EEG signal analysis.

Benen, N.J. (2020) Using Graphviz to create aesthetically pleasing LaTeXdrawings of graphs.

Stellaard, Julian (2020) Tracking the process of an outbreak to a pandemic via logistical infrastructures : case study.

Nijeboer, F.J. (2020) Detection of HTTPS encrypted DNS traffic.

Vredeveld, G.W.R. (2020) Invaluable measurement networks and their critical infrastructure : uptime discrepancy localization and network improvements.

Jansen, G.A.A. (2020) Underground Wireless Communication and Wake-Up at 125 kHz.

Jaarsveld, F. van (2020) Estimating the effects of the Macroscopic Traffic Parameters on the overall Cooperative Awareness Message generations.

Breggeman, F.T. (2020) Graph Isomorphism with Pathfinding Algorithms.

Schrama, M.L. (2020) Improving speech emotion recognition by identifying the speaker with Multi-task Learning.

Artolozaga, Iñigo (2020) Mental health care in a pandemic : a survey from a design and interaction perspective.

Noort, N. van (2020) Machine Learning for monitoring attacks in the cloud.

Karsten, Jarik (2020) Crunching Attack Trees : efficient algorithms for computation of metrics.

Orlinski, Jakub (2020) MEG-driven emotion classification using convolutional and recurrent Neural Networks.

Sain, R. de (2020) Impact of language on detecting agitation.

Steenmeijer, L.D. (2020) Increasing the consistency of feedback on programming code by using a tagging system.

Oldengarm, B.M.J. (2020) Improving human activity recognition using embedded smartphone sensors.

Flapper, Edwin (2020) ETA Prediction for vessels using Machine Learning.

Middelkoop, D.E.V. (2020) Sensitivity analysis of predicting wireless c hannels within an indoor factory floor.

Lummen, D.L.M. (2020) An analysis of Link and Node Level Resilience on Network Resilience.

Meijer, J.J.W. (2020) Morphing detection based on regional analysis of local frequency content.

Filipovic, Simona (2020) Subpopulation process mining in healthcare.

Rijn, K.D. van (2020) A binary decision diagram based approach on improving probabilistic databases.

Engelenhoven, Adjorn van (2020) Modular Neural Networks using Multiple Gradients.

Lüpkes, Niklas (2020) Using static weight estimation of general trees to efficiently parallelize the execution of DEMKit Simulation Models.

Heinen, Niek (2020) Using lightweight image classifiers for electrocardiogram classification on embedded devices.

Ignatius Patrick, Patrick (2020) Assessing LOKI by learning from Mitsuku and dataset themes.

Heyns, L. (2020) Converting Modest Models to Efficient Code.

Wackerle Garcia, L.M. (2020) Analysis of heuristics with random shortest path metrics on sparse graphs.

Brink, K. van den (2020) Finding “The Drop” : Recognizing the climax in electronic music using classification models.

Grooters, T. (2020) Analysing certificate transparency logs for let’s encrypt customer behaviour.

2019

Bakker, D.R. (2019) Impact-based optimisation of BGP Flowspec rules for DDoS attack mitigation.

Meijerman, T.R.I. (2019) Manipulating a dissociative bond with out-of-body experience avatar in virtual reality.

Hendriks, M. (2019) Can machine learning automatically choose your best model checking strategy?

Vries, L.J.W. de (2019) IOTA Vulnerability: Large Weight Attack Performed in a Network.

Mendler, G.T. (2019) Designing a meta report for hotel customer reviews.

Kobes, W.J. (2019) Efficient and accurate classification of cyber security related documents.

Renssen, Martijn (2019) Classification of types of road damage using machine learning and a smartwatch.

Visserman, H.A. (2019) Group Activity Recognition Using Channel State Information.

Koelewijn, Dirk (2019) Fingerprint-Based Automated Rule Generation for DDoS Mitigation using the Berkeley Packet Filter.

Cai, D. (2019) A Parasite Chain Attack in IOTA.

Keijer, Julik (2019) Automated DDoS mitigation based on known attacks using a Web Application Firewall.

Bolding, T.G.J. (2019) Applying Peak-Shaving to Household Devices using an Event-Driven Algorithm.

Schaik, E.J.G. van (2019) Color-based Recognition Techniques for Manipulation Detection in Advertisement Videos.

Krieter, Maren (2019) "Don't bother me with your information" : The Effect of Information Framing on Purchase Behavior in the Context of Plastic-free Grocery Shopping.

Dorp, M. van (2019) The Art of Corporate Storytelling : Exploring the effects of jargon and dramatic storytelling on reputation, trust and customer-company identification in the light of corporate stories.

Schudzich, Tim (2019) Music Consumers’ Adoption of Smart Speakers in the Field of Music : How do music consumers adopt towards (musical) smart speakers with reference to music marketing?

Wensing, Kasper (2019) Nuclear energy: A nuclear topic.

Cojocaru, Andrei (2019) Handling Missing Data: Traditional Techniques Versus Machine Learning.

Booijink, K.G. (2019) Evaluating the Scalability of MayBMS, a Probabilistic Data Tool.

Weers, F.R.T. (2019) Automatic home video editing on music.

Abraham, Remco (2019) A Formal Proof of the Termination of Zielonka's Algorithm for Solving Parity Games.

Sluiter, N.I. (2019) Influence Maximization in Social Networks by Injecting Memes.

Hove, K.W. van (2019) Automated DDoS Attack Fingerprinting by Mimicking the Actions of a Network Operator.

Kooij, D. (2019) Groovy Parity Games.

Hultermans, M.A.A. (2019) A Theoretical Ad Hoc Lunar Communication Network With CubeSats as Secondary Payload of Lunar Missions.

Perera, R.A.H. (2019) Finger-Adaptive Illumination Control and Exposure Fusion Imaging for Biometric Finger Vein Recognition.

Scholten, C.P.B. (2019) Hacking the router: characterizing attacks targeting low-cost routers using a honeypot router.

Ruis, Frank (2019) Spilling the beans: Food recipe popularity prediction using ingredient networks.

Coroiu, Alexandra (2019) The generalization performance of hate speech detection using machine learning.

Oliemans, R. (2019) WHOIS versus GDPR.

Verkleij, Martijn (2019) Teaching programming using industry tools.

Bleeker, D.A. (2019) DoS attack on recursive resolvers with DNSSEC key-tag collisions.

Marin, Mihai David (2019) Effectiveness of neural language models for word prediction of textual mammography reports.

Vegt, M. E. M. van der (2019) Compressed Set Representations and their Effectiveness in Probabilistic Model Checking.

Muller, M. (2019) Creating building energy prediction models with convolutional recurrent neural networks.

Vries, de, R.H. (2019) Walker: Automated Assessment of Haskell Code using Syntax Tree Analysis.

Harten, Anne van (2019) Analyzing Programming Education Quality based on Students' Questions.

Boersma, Kitty (2019) Using Influencing Factors and Multilayer Perceptrons for Energy Demand Prediction.

Jellema, J.M. (2019) Polynomial Calculation of Quasi-Gray code labelings for Irregular Signal Constellations.

Witlox, K.H.D. (2019) Face unmorphing.

Vos, Matthijs (2019) Characterizing infrastructure of DDoS attacks based on DDoSDB fingerprints.

Mitev, Zarimir (2019) Estimating User Interaction Complexity.

Spijker, K. (2019) Identifying Users’ Skill Level through the Process Mining of Software Logs.

Wentzel, S. D. (2019) Evaluating Information Retrieval Systems for Children in an Educational Context.

Tziampazis, Christodoulos (2019) Exposure Assessment on Medical Devices in the Netherlands.

Rõžakov, Ilja (2019) A Modest Comparison of Blockchain Consensus Algorithms.

Cesar, M (2019) The dangers and privacy issues of motion-based side-channel attacks.

Vermast, Alissa (2019) Using VR to induce smoke cravings in low literate or intellectually disabled individuals who have a smoking addiction.

Klink, K. van (2019) Detection and Identification of Roman Emperors Using Facial Recognition.

Kampen, Coen van (2019) Missing data imputation based on probabilistic data.

Overkamp, Niels (2019) Speeding up profile steering algorithms with caching for buffer type devices.

Schroten, Peter (2019) Introducing BGD: a DSL to express board games and gameplay.

Bos, W.F.A. (2019) Software Metrics as Indicators for Effort of Object-Oriented Software Projects.

2018

Bie, J.A. de (2018) PTA as an approach to fault tree analysis.

2015

Thunnissen, J. (2015) Communication solution for ICU patients : a case study.

Verhaar, Jort (2015) Micrometer scale 3d membrane printing towards locust ear imitation.

2014

Strecke, Jonas (2014) A high torque variable stiffness mechanism for the 'VSDD': conceptual design, realization and experimental validation.

Bokhove, Tom (2014) Public data visualisation in traffic, based on local, real-time monitoring.

Spoor, R.J.F. (2014) Design of a wall latching device.

2013

Tijhuis, K. (2013) Methods for modelling unit operations in chemical process simulators.

Vonk, J. (2013) Formal specification and verification of OpenCL Kernel optimization.

Knoben, L. and Otten, M. and Fransen, R. (2013) De waterzuivering als Petrinet: het voorspellen van overstromingen.

2012

Jansen, M. (2012) Improving inattentive operation of peripheral touch controls.

2011

Eerenberg, E. (2011) Towards distributed information retrieval based on economic models.

2010

Diephuis, Maurits (2010) A framework for robust forensic image identification.

Teijgeler, Stefan (2010) Connecting GROOVE to the world using XMI.

Vlieg, Edwin (2010) Usage patterns for user-centric service composition.

Bijker, Remko (2010) Efficient pointcut projection.

2007

Sierhuis, Pim (2007) Het voorkomen van prestatieverlies bij de koppeling met Web services: ... en de rol van standaardisatie daarbij.

Scholten, F.B. (2007) The concern-oriented software architecture analysis method.

Peeters, H.A.M. (2007) Aanbestedings Barometer : een onderzoek naar misstanden & knelpunten in de huidige aanbestedingspraktijk.

2004

Bui, Cuong (2004) Write-intensive applications with LDAP.

This list was generated on Mon Aug 10 06:02:27 2020 CEST.