University of Twente Student Theses

Login

Programme: Computer Science MSc (60300)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Year | Item Type
Jump to: 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1996
Number of items: 578.

2020

Kortstra, Wybren (2020) Automatic Registration of Clinical Auditsfor Head and Neck Oncology at MST.

Scholten, R.H.D. (2020) Secure biometric verification in a malicious attacker model setting.

Hengst, Kimberly (2020) Best Practices in Cloud Incident Handling.

Wijburg, K.M. (2020) The state of statechains : exploring statechain improvements.

Heus, Steven de (2020) Designing and Evaluating an Educational Board Game.

Brouwer, R (2020) Learning Timed Mealy Machines of the Physical Processes of an Industrial Control System for Anomaly-based Attack Detection.

Stikkelorum, M.J. (2020) Automated discovery of BACnet relations from bus traffic.

Şakar, Ö.F.O. (2020) Extending support for axiomatic data types in VerCors.

Kamies, Bram (2020) Abeona: A generalized framework for state space exploration algorithm composition.

Rubbens, R.B. (2020) Improving Support for Java Exceptions and Inheritance in VerCors.

Heuver, Rien / P.R. (2020) Generating facial morphs through PCA and VAE.

2019

Meijerink, M.M.J. (2019) Anomaly-based detection of lateral movement in a Microsoft Windows environment.

Duits, Ines (2019) The Post-Quantum Signal Protocol : Secure Chat in a Quantum World.

Florijn, W.J. (2019) Information retrieval by semantically grouping search query data.

Srivastava, Siddhartha (2019) Benchmarking Facebook's Prophet, PELT and Twitter's Anomaly detection and automated de ployment to cloud.

Nguyen, ir. H.M. (2019) Formal verification of a red-black tree data structure.

Arican, Tugce (2019) Optimization of a patch-based finger vein verification with a convolutional neural network.

Stritzl, David (2019) Privacy-Preserving Matching Using Bloom Filters: an Analysis and an Encrypted Variant.

Kokkelkoren, R. (2019) Catching Flux-networks in the open.

Merdis, Vasileios (2019) Wireless communication protocols for home automation exploring the security and privacy aspects of smart home IoT devices communicating over the Z-Wave protocol.

Blok, T. (2019) ZITA : a self learning tutoring assistant.

Brunsveld, R.D. (2019) Determining the Satisfiability of Car Configuration Models in a Repetitive Manner.

Emous, Rob J. van (2019) Towards systematic black-box testing for exploitable race conditions in web apps.

Trienes, Jan (2019) Comparing rule-based, feature-based and deep neural methods for de-identification of Dutch medical records.

Koopman, Michael (2019) A framework for detecting and preventing security vulnerabilities in continuous integration/continuous delivery pipelines.

Schutte, J.J. (2019) Design of a development platform to monitor and manage Low Power, Wide Area WSNs.

Masud, Muhammad Ahmed (2019) An Open Source Intelligence (OSINT) framework for online investigations.

Chen, Qiurui (2019) EEG hyperscanning study of team neurodynamics analysis during cooperative and competitive interaction.

Mulder, Henk (2019) Performance of program verification with VerCors.

Kazmi, Syeda Nazish (2019) Access Control Process for a SaaS Provider.

Laat, Martin de (2019) Design and validation of Software Requirements Specification evaluation checklist.

Drechsel, Alexander (2019) Automatic instance-based matching of database schemas of web-harvested product data.

Papadopoulos, Antonios (2019) The quest of "dethroning" passwords from (web)authentication schemes.

Wiedijk, R.R.A. (2019) Code Instrumentation with Mod-BEAM.

Sonderen, T. (2019) A Manual for Attack Trees.

Karchev, F. (2019) IOT device profiling for Honeypot generation.

Zande, M.J. van de (2019) Leveraging zero-knowledge succinct arguments of knowledge for efficient verification of outsourced training of artificial neural networks.

Lukman, Ivan (2019) Complete Characterization of Publicly Available Domain Blacklists.

Vasileiadis, Leonidas (2019) Remote runtime detection of tampering and of dynamic analysis attempts for Android apps.

Klanberg, Indrek (2019) Item availability restricted.

Barbara, Mario Alessandro (2019) Proof of All : Verifiable Computation in a Nutshell.

Jansen, Joost (2019) Detecting Combosquat Domains using Active DNS Measurements : communication of incident severity between customers and analysts in a SOC.

Açikalin, M.A. (2019) Profiling Recursive Resolvers at Authoritative Name Servers.

Torres Cano, Andrés Felipe (2019) Automatic aviation safety reports classification.

Kock, Ties de (2019) Visualization recommendation in a natural setting.

Enendu, Somtochukwu (2019) Predicting Semantic Labels of Text Regions in Heterogeneous Document Images.

Siers, W.H. (2019) Generating specifications for JSON APIs for formal and semantic use.

Riva, Giovanni Maria (2019) Privacy architecting of GDPR-compliant high-tech systems : the PAGHS methodology.

Postema, J.T. (2019) Explaining system behaviour in radar systems.

Ros, K. M. (2019) Airport restroom cleanliness prediction using real time user feedback data and classification techniques.

Roppelt, J.C. (2019) Security risks surrounding cryptocurrency usage : a study on the security risks of cryptocurrencies and how security perception affects usage.

Haasjes, R.E.Y. (2019) Metamodel transformations between UML and OWL.

Prudnikova, Anna (2019) Standardized security assessment framework for ICS devices and pilot project.

Stortelder, R. (2019) Enabling centralized access to a reactive architecture for hardware control systems.

Möllering, Helen (2019) Thwarting Semantic Backdoor Attacks in Privacy Preserving Federated Learning.

Tujner, Zsolt (2019) Quantum-safe TOR, post-quantum cryptography.

Kolev, Stiliyan (2019) Automation of software vulnerability monitoring for third party products in large IT companies.

Dai, L. (2019) Human perception of an adaptive agent's fear simulated based on TDRL Theory of emotions.

Teesselink, T. (2019) Identifying Application Phases in Mobile Encrypted Network Traffic.

Casano, F. (2019) Identifying how vendors and clients manage red teaming.

Sadad, Akhyar (2019) Reusable machine learning framework for predicting future system performance : a comparison study of validation strategy on WWTP time series data.

Danielecki, Daniel Mariusz (2019) Security first approach in development of Single-Page Application based on Angular.

Wels, S.J. (2019) Guaranteed-TX : The exploration of a guaranteed cross-shard transaction execution protocol for Ethereum 2.0.

Coniglio, Luigi (2019) Combining program synthesis and symbolic execution to deobfuscate binary code.

Legoy, V.S.M. (2019) Retrieving ATT&CK tactics and techniques in cyber threat reports.

Sridhar Bangalore Venugopal, Sridhar Bangalore Venugopal (2019) Automatic Generation of Access Control List on Mellanox Switch For DDoS Attack Mitigation Using DDoS Fingerprints.

Jong, Koen de (2019) Detecting the online romance scam: Recognising images used in fraudulent dating profiles.

Wieren, H.D. van (2019) Signature-Based DDoS Attack Mitigation: Automated Generating Rules for Extended Berkeley Packet Filter and Express Data Path.

Kock, Joeri (2019) A signature-based Approach to DDoS Attack Mitigation using BGP Flowspec Rules.

Witvoet, N.N. (2019) E-reputation and its role in the overall evaluation of a company : A research into the dimensions of e-reputation and corporate reputation.

Man, R.J.P. de (2019) A formalisation of EMF by expressing Ecore as GROOVE graphs.

Bergsma, D. (2019) Porting tree-based hash table compression to GPGPU model checking.

2018

Heikamp, F. (2018) Gray-box Network Fuzzing using Genetic Algorithms and Code Coverage.

Coenraad, T (2018) Analist: A Tool for Improved Static Type Analysis for Ruby.

Wiefferink, T.W. (2018) Combining usage and profile data for retrospectively analyzing usability of applications with funnels.

Braham, K. (2018) Smart cities : crowd management using WiFi based infrastructure.

Klein Essink, B. (2018) iFat: an Interface for Fault/Attack Trees.

Fleur, S. la (2018) Static Analysis of Symbolic Transition Systems with Goose.

Tahir, A. (2018) Predicting Young Soccer Players Peak Potential with Optimal Age.

El Assal, Karim M. (2018) Predicting user loyalty in an education support web application based on usage data.

Kester, J.J. (2018) CheckMerge: A System for Risk Assessment of Code Merges.

Meijerink, M.J. (2018) A visual DSL for automating business processes.

Spenkelink, J.S. (2018) Consumer-deployable network intrusion detection in public clouds.

Spel, Jip (2018) Monotonicity in Markov chains.

Dijk, P.A.H. van (2018) An efficient simulation of crosslinked RAFT copolymerization.

Wal, Djurre van der (2018) Translating AWN networks to the mCRL2 model checker: en route to formal routing protocol development.

Wessels, P.D. (2018) Leveraging behavioural domain models in Model-Driven User Interface Development with GLUI.

Hoogervorst, R.W.P. (2018) A model-driven data-analysis architecture enabling reuse and insight in open data.

Zamani, M.R. (2018) Post-Quantum Secure Authentication Methods Suitable For Quantum Key Distribution.

Nyante, K.A. (2018) Secure Identity Management on the Blockchain.

Willemsen, M.J. (2018) Improving diagnosis by Grouping Test Cases to Reduce Complexity.

Löwik, R.C.P. (2018) Tracking of wireless devices: is it possible and solvable?

Ekambaranathan, Anirudh (2018) Using stylometry to track cybercriminals in darknet forums.

Michorius, J.A.R. (2018) Fair Machine Learning.

Timmer, I.R. (2018) Anomaly Detection of malicious TLS traffic.

Oude Weernink, M.J.P. (2018) Developing a system for the integration of vehicle data.

Meinsma, D. (2018) Digging up Malware.

Pathak, Shreyasi (2018) Automatic structuring of breast cancer radiology reports for quality assurance.

Juursema, J.A.J. (2018) Improving visual role mining using metadata.

Nauta, M. (2018) Temporal causal discovery and structure learning with attention-based convolutional neural networks.

Felix, P. (2018) Data-driven retail food waste reduction : a comparison of demand forecasting techniques and dynamic pricing strategies.

Beunder, K.M. (2018) Correlating features of malicious software to increase insight in attribution.

Bitew, Semere Kiros (2018) Logical structure extraction of electronic documents using contextual information.

Hazekamp, C. (2018) Inferring animal social interaction using proximity based on BLE and LoRa.

Beets, Fedor (2018) Privacy-preserving automated rental checking.

Lathouwers, S.A.M. (2018) Reasoning About the Correctness of Sanitizers.

Hristov, I. (2018) A system for improving analysis of complexes in real estate asset management.

Giessen, D. van de (2018) Implementing and Scaling HanzeNet.

Vulpoiu, Ruxandra (2018) Machine Learning Applications in Financial Advisory.

Geretto, Elia (2018) A QBDI-based Fuzzer Targeting Magic Bytes Comparisons.

Haan, T. de (2018) BLE Localization using switched-beam angle of arrival for pallet localization in warehouses.

Iadarola, Giacomo (2018) Graph-based classification for detecting instances of bug patterns.

Crest, Côme du (2018) Scalability & Trustlines Network architecture.

Hofstra, Matthijs (2018) Integrating Formal Methods Tools : A Case Study.

Hol, M.C. (2018) Using user workflow analysis to create insights in content-intensive applications : Combining Process Mining and Model-Driven Engineering to create a reusable, scalable and user-friendly solution.

Stegeman, Lars (2018) Solitor : runtime verification of smart contracts on the Ethereum network.

Klein Brinke, J. (2018) Device-free sensing and deep learning : analyzing human behavior through CSI using neural networks.

Szabó, Réka (2018) Penetration testing of AWS-based environments.

Oonk, N.M.J. (2018) Item availability restricted.

Onis, Ramon (2018) Does your model make sense? : Automatic verification of timed systems.

Aalbertsberg, A.P. (2018) Synthesis and development of a big data architecture for the management of radar measurement data.

2017

Zijden, W. van der (2017) Multi-Tenant Customizable Databases.

Winsen, Stijn van (2017) Threat modelling for future vehicles : on identifying and analysing threats for future autonomous and connected vehicles.

Brugman, Tristan (2017) A methodology for deriving aggregate social tie strengths from mobility traces.

Korthout, N. (2017) Towards an architecture design for a future societal energy supply system.

Jundt, O. (2017) Fashion product entity matching.

Kerkers, M. (2017) Assessing the Security of IEC 60870-5-104 Implementations using Automata Learning.

Pool, T.J. (2017) Drone swarming and combat management : visualizing and managing an autonomously functioning swarm of drones with as mediator Combat Management System(CMS).

BOON, R.N. (2017) Automatic detection of anomalies in times series data Big data for smart maintenance.

Krak, R. (2017) Cycle-Accurate Timing Channel Analysis of Binary Code.

Brink, B. van den (2017) Orchestrating Similar Stream Processing Jobs to Merge Equivalent Subjobs.

Davanian, Ali (2017) Effective granularity in Internet badhood detection: Detection rate, Precision and Implementation performance.

Tjeerdsma, R. (2017) Developing a backend solution for ISO15118-driven EV charging with Plug-and-Charge.

Diallo, A.O. (2017) Traffic filtering based on subsystem component state.

Niesink, S.W.R. (2017) Improving biomedical information retrieval with pseudo and explicit relevance feedback.

Saeed, Aaqib (2017) Deep physiological arousal detection in a driving simulator.

Serban, A.C. (2017) Context based personalized ranking in academic search.

Ong-A-Fat, K.K. (2017) Context Aware GPS Error Correction.

Shyvakov, O. (2017) Developing a security framework for robots.

Jong, T. de (2017) Using Requirement Templates to Automate Requirements Formalization.

Torbecke, Janina (2017) Symbolic Model Checking with Partitioned BDDs in Distributed Systems.

Kuipers, J.H. (2017) Anycast for DDoS.

Gupta, Amit Kumar (2017) Security risk analysis of automotive ethernet networks.

Buit, L.J. (2017) Developing an easy-to-use Query language for verification of lighting systems.

Stevens, Stefanie Antonia (2017) Job satisfaction and work-life balance: an explorative study on remote workers.

Terpstra, E. (2017) Designing a requirements engineering process for performance monitoring.

Ede, Thijs S. van (2017) Detecting adaptive data exfiltration in HTTP traffic.

Ede, Thijs S. van (2017) Detecting adaptive data exfiltration in HTTP traffic.

Ahmed, Owais (2017) Item availability restricted.

2016

Balk, Roland (2016) SQLento: database programming made easier.

Huistra, D.J. (2016) Automated generation of attack trees by unfolding graph transformation systems.

Wolters, N.H. (2016) Analysis of Attack Trees with Timed Automata (transforming formalisms through metamodeling).

Pijnenborg, I. (2016) Methodological guideline to find suitable design patterns to implement adaptability.

Ouden, J.J.A. den (2016) A quest for the best automated tests : Estimating software reliability based on Spec Explorer's on-the-fly test results.

Slatman, H. (2016) Unboxing security analytics : towards effective data driven security operations.

Berg, T.M. van den (2016) Radar sensing for automotive parking distance control applications.

Verkuil, S. (2016) CiteRep - Journal Citation Statistics for Library Collections using Document Reference Extraction Techniques.

Schultewolter, M. (2016) Verification of user information.

Neele, Thomas (2016) GPU implementation of partial-order reduction.

Strooisma, Ale (2016) A monitoring solution for multi-language software.

Beukema, W.J.B. (2016) Enhancing Network Intrusion Detection through Host Clustering.

Laverman, G.J. (2016) Java Code Virtualization of Industrial-strength Java Code.

Janssen, Bas (2016) Determining truth in tweets using feature based supervised statistical classifiers.

Vries, S.H.S. de (2016) Achieving 128-bit Security against Quantum Attacks in OpenVPN.

Noort, W (2016) Gathering intelligence from the Bitcoin peer-to-peer network.

Evers, Florine (2016) The Content and Tone of the Media Coverage with regard to the Refugee Crisis in Dutch Popular and Quality Newspapers.

Odyurt, Uraz (2016) Bring your own authenticator/authentication security in physical access control systems.

Le, Van Huynh (2016) Analyzing white-box designs for differential computation analysis resistance.

Maan, H.C. (2016) Item availability restricted.

Vonk, Jeroen (2016) Bisimulation Reduction with MapReduce.

Outersterp, R.M. van (2016) Partitioning of Spatial Data in Publish-Subscribe Messaging Systems.

Peeters, J.J. (2016) Fast and Accurate Likelihood Ratio Based Biometric Verification in the Encrypted Domain.

Elsinga, J.W. (2016) On a framework for domain independent heuristics in graph transformation planning.

Ciobotea, C. (2016) Improving payment authorization rates : by intelligently routing transactions.

Esquivel-Vargas, Herson (2016) Automatic deployment of specification-based intrusion detection in the BACnet Protocol.

Wang, Q. (2016) A reference architecture for integration platforms.

Koukoulis, Yannis (2016) Dual laser fault injection.

Hijum, S. van (2016) Symbolic model checking of timed automata using LTSmin.

Keller, Kristian M.Sc. (2016) A day ahead electricity storage flexibility prediction for peak shaving.

Zeilstra, J. (2016) Reasoning about Active Object Programs.

Hoogesteger, Martijn (2016) Securing mobile VoIP privacy with tunnels.

Maat, GJ ter (2016) Towards a scalable environment for traffic information services.

Orij, J. (2016) Self-adaptation to concept drift in web-based anomaly detection.

Badin, Y. (2016) Contextual Authentication : Using Mobile Phone Movements to Authenticate Owners Implicitly.

Schroer, G.H. (2016) Feasibility of End-To-End Encryption using Attribute Based Encryption in Health Care.

Ullah, I. (2016) Detecting Lateral Movement Attacks through SMB using BRO.

Jagannatha, P. (2016) Detecting Exploit kits using Machine Learning.

Fokkema, J. (2016) Using a challenge to improve face spoofing detection.

Hindriks, H.N. (2016) Vulnerability analysis of cyber security modelling language models using probabilistic logic.

Wilde, Lisa de (2016) A Bayesian Network Model for predicting data breaches caused by insiders of a health care organization.

Ritterfeld, Thom (2016) On-demand app development.

Heijblom, A.R. (2016) Using features of models to improve state space exploration.

2015

Senden, J.M.J. (2015) Biasing a ring-oscillator based true random number generator with an electro-magnetic fault injuction using harmonic waves.

Lanting, Peter (2015) Multi-level views in a SUM-based environment.

Bouius, B A.G. (2015) Characterising the Ripple Effects of Introducing Energy-Awareness Functionality in Cyber-Physical-Systems Software in Cyber-Physical System software.

Fonville, M.E. (2015) The virtual machine delivery network.

Middelesch, E.W. (2015) Anonymous and hidden communication channels : a perspective on future developments.

Zhang, Shu (2015) How do technical companies use microblogging?

Stottelaar, Bas G.B. (2015) Practical cyber-attacks on autonomous vehicles.

Kleverwal, J. (2015) Supervised text classification of medical triage reports.

Drijfhout, Wanno (2015) The Knowledge Cloud: Evolving the data management paradigm.

Bloemen, V. (2015) On-The-Fly parallel decomposition of strongly connected components.

Kruk, D.A. van der (2015) A domain-specific language for specifying distributed real-time software system configurations.

Scrinzi, F. (2015) Behavioral Analysis of Obfuscated Code.

Rodday, Nils Miro (2015) Exploring Security Vulnerabilities of Unmanned Aerial Vehicles.

KARAMPATZAKIS, E. (2015) Item availability restricted.

Kumar, Atul (2015) Security Analysis of Mobile Payment Systems.

Carvajal Gallardo, I. R. (2015) Privacy-preserving social DNA-based recommender.

Oortwijn, W.H.M (2015) Distributed Symbolic Reachability Analysis.

Parzian, Alessio (2015) Java Card Bytecode Verification. Designing a novel verification system.

Veen, H. van der (2015) Composing a more complete and relevant Twitter dataset.

Donselaar, V.L. van (2015) Low latency asynchronous database synchronization and data transformation using the replication log.

Müller, M. C. (2015) SIDekICk - Detecting Malicious Domain Names in the .nl Zone.

Zanetti, Nicola (2015) Concept-drift in web-based IDS : evaluating current capabilities & future challenges.

Allah Bukhsh, Zaharah (2015) BPMN Plus : a modelling language for unstructured business processes.

Venis, A.J. van de (2015) Recommendations using DBpedia : how your Facebook profile can be used to find your next greeting card.

Gijsen, Stijn (2015) Runtime Permission Checking in Concurrent Java Programs.

Leur, C. de (2015) Permission-based separation logic for Scala.

Bolhuis, M. (2015) Estimating Creditworthiness using Uncertain Online Data.

de Vries, J. (2015) The Generation of Booter (black)lists.

Buuren, R.A. ten (2015) Domain-Specific Language Testing Framework.

Martakis, A. (2015) Framework for Enterprise Uncertainty-Driven Decision-Making : FEUD.

Visser, N.S. (2015) Fully automated web harvesting using a combination of new and existing heuristics.

2014

ter Maat, Roel (2014) A Framework for Modular Implementation of Domain-Specific Event-Based Applications.

Meijer, J.J.G. (2014) Improving Reachability Analysis in Ltsmin - Guards, Read, Write and Copy Dependencies for mcrl2, Promela and Dve.

Drenthen, S. (2014) Towards continuous delivery in system integration projects : introducing a strategy to achieve continuous delivery and test automation with FitNesse.

Broenink, Ralph (2014) Finding Relations Between Botnet C&Cs for Forensic Purposes.

van Lenthe, J.M. (2014) Combining Multiple Malware Detection Approaches for Achieving Higher Accuracy.

Welling, Ruud (2014) Conflict detection and analysis for single-pushout high-level replacement.

Corradin, M.C. (2014) Then and Now: On The Maturity of Cybercrime Markets - A study on regulation enforcement of forums in the online underground trading economy.

van Hurne, I. (2014) Towards a Unifying Framework for Modelling and Executing Model Transformations.

Pallett, Dennis (2014) Improving Query Performance of Holistic Aggregate Queries for Real-Time Data Exploration.

Davelaar, K.I. (2014) Protecting high school students from bullying: Bully Shield.

A., E. (2014) Item availability restricted.

Aregay, Tesfay (2014) Ranking Factors for Web Search : Case Study in the Netherlands.

Heuven, D.W. (2014) Opportunistic sensing & Aggregation network Using Smartphones and Sensor nodes.

Badarinath Hampiholi, Brinda (2014) Secure & privacy-preserving eID systems with Attribute-Based Credentials.

Hummel, Tim (2014) Exploring Effects of Electromagnetic Fault Injection on a 32-bit High Speed Embedded Device Microprocessor.

Knippers, D. (2014) Querying Uncertain Data in XML.

Bortolameotti, Riccardo (2014) C&C Botnet Detection over SSL.

Gielen, M W (2014) Prioritizing Computer Forensics Using Triage Techniques.

Kegel, R.H.P. (2014) Development and Validation of a Personal Information Security Assistant Architecture.

Kamp, T.R. van de (2014) Combining ABCs with ABE: Privacy-Friendly Key Generation for Smart Card Based Attribute-Based Encryption.

Verbij, Ruud Paul (2014) Dutch e-voting opportunities. Risk assessment framework based on attacker resources.

Amrin, Nabila (2014) The Impact of Cyber Security on SMEs.

Weber, Vincent (2014) UTFM - a Next Generation Language and Tool for Feature Modeling.

Jonker, M. (2014) Flow-based SSH Dictionary Attack Detection: the Effects of Aggregation.

Staicu, Cristian-Alexandru (2014) Evaluation of HIMMO with Long Identifiers, an Extension of the HIMMO Key Establishment Scheme.

Kandziora, Jorne (2014) Runtime assertion checking of multithreaded Java programs - An extension of the STROBE framework.

Joustra, Yme (2014) Forecasting of wind power production in the Netherlands.

Anagnostopoulos, Nikolaos Athanasios (2014) Optical fault injection attacks in smart card chips and an evaluation of countermeasures against them.

Anagnostopoulos, Nikolaos Athanasios (2014) Optical fault injection attacks in smart card chips and an evaluation of countermeasures against them.

Mirchev, Hristofor (2014) Creating a Modular AspectJ Foundation for Simple and Rapid Extension Implementation.

Akbar, Nurul (2014) Analysing Persuasion Principles in Phishing Emails.

Wiegers, R.F.P. (2014) Behavior specification for ontologically grounded conceptual models.

Smid, Wietse (2014) Ad-hoc context-driven changes in a business process management system.

Loker, Andre (2014) Evaluating data structures for runtime storage of aspect instances.

Tax, Niek (2014) Scaling Learning to Rank to Big Data: Using MapReduce to parallelise Learning to Rank.

Heer, G.W.A. de (2014) Instance Pointcuts.

Haji Ghasemi, Maryam (2014) Symbolic model checking using Zero-suppressed Decision Diagrams.

Vries, W.B. de (2014) How asymmetric is the Internet? A Study to support DDoS Mitigation approaches.

Erich, Floris Marc Arden (2014) Improving information system development and operations using the DevOps conceptual framework.

Galen, Rick van (2014) Design and feasibility of mobile peer-to-peer payment systems.

Broekhuis, Djurre (2014) Sousveillance on Intelligent Transportation Systems.

Windhouwer, Dennis (2014) The Modularity of the Resource Utilization Model in Python.

Marenco Zúñiga, Andrés (2014) Federated Aggregated Search.

Vercammen, S.A.A. (2014) Displaying intermediate results for on-going searches.

Wevers, Gerben (2014) Hardware accelerator sharing within an MPSOC with a connectionless NOC.

2013

Hullu, Clermond de (2013) Architectural design of modular ESB systems.

Pasveer, Marco (2013) Importance sampling for probabilistic timed automata.

Sepulveda Bradford, G.U. (2013) What happens when a robot favors someone?: how a museum-guide robot uses gaze behavior to address multiple persons while storytelling about art.

Schade, Christiaan Leonard (2013) FCScan: A new lightweight and effective approach for detecting malicious content in electronic documents.

Bruijn, Vincent de (2013) Model-based testing with graph grammers.

Huijgen, Arris (2013) Effciently protecting virtualized desktop infrastructures against malware - Performance comparison between traditional- and centralized antivirus.

Been, Henry (2013) Finding you on the Internet: Entity resolution on Twitter accounts and real world people.

Roemers, Arnout (2013) An adapter-aware, non-intrusive dependency injection framework for Java.

Bullée, Jan-Willem (2013) Detection of leadership in informal (small) groups based on CCTV information.

Hemert, Teun van (2013) Implementing flexible, extensible composition operators.

Companjen, Ben (2013) Probabilistically matching author names to researchers.

Veen, G.F.P. van (2013) Brain Invaders - Finding the paradox of control in a p300-game through the use of distractions.

Ugen, Mattijs (2013) Scalable performance for a forensic database application.

Laarakkers, Mark (2013) Generating continuation passing style code for the co-op language.

Ionita, Dan (2013) Current established risk assessment methodologies and tools.

Beek, Daan van (2013) Comparing the LTSmin and NuSMV reachability tools via automatic translation of their respective input languages.

Fluttert, Ernst (2013) Deciding between mobile implementation platforms - A multi-criteria decision system for implementation platforms for mobile applications.

Misra, Gaurav (2013) Permeance of ICT in crime in India.

Riet, M. van 't (2013) Trace-based debugging for advanced-dispatching programming languages.

Postema, B.F. (2013) Fluid survival tool: a model checker for Hybrid Petri nets.

Tesfay, Tesfahun Aregawy (2013) Automatic distribution analysis of business processes for cloud-based BPM.

Wit, Jeroen de (2013) Continuous forensic readiness.

Cornelissen, Richard (2013) Towards a methodology-growing framework.

Valtulina, Luca (2013) Seamless distributed mobility management(dmm) solution in cloud based lte systems.

Nguyen, A.D. (2013) Integration of IEC 61850 mms and lte to support remote control communications in electricity distribution grid.

Pham, Giang T. (2013) Integration of IEC 61850 MMS and LTE to support smart metering communications.

Wal, Jelmer ter (2013) Specification and verification of selected parts of the Java Collections Framework using JML* and KeY.

Zarghami, S. (2013) Middleware for Internet of things.

Olthuis, Ferry (2013) A comparison of state space reduction techniques in SCOOP.

Smulders, Edwin (2013) User Space Memory Analysis.

Duerink, Hendrik Lodewijk (2013) Information System Data Flow within Performance Based Logistics.

Moll, René (2013) A DFT based synchronization scheme for chirped communication.

Verver, Maks (2013) Practical improvements to parity game solving.

Heus, Marije de (2013) Design and evaluation of a recommender system for high school courses in the Netherlands.

Berg, F.I. van der (2013) Model checking LLVM IR using LTSmin : using relaxed memory model semantics.

Höfer, Christina (2013) Privacy-Preserving : Charging for eMobility.

Kuiper, Guus (2013) Guaranteed-throughput improvement techniques for connectionless ring networks.

Dirlik, S. (2013) A comparison of FFT processor designs.

2012

Siaw, Tien Loong (2012) Saturation for LTSmin.

Zandberg, Martin (2012) Optimization of aspect-instantiation strategies in the JIT-compiler.

Scheerens, Daan (2012) Practical indoor localization using bluetooth.

Kuperus, Jasper (2012) Catching criminals by chance: a probabilistic approach to named entity recognition using targeted feedback.

Stemmer, Joel (2012) detecting outliers in web-based network traffic.

Heukels, Rolf (2012) Predicting user behavior using transition probability.

Dijk, Tom van (2012) The parallelization of binary decision diagram operations for model checking.

Spijker, Hanno (2012) Improving information dissemination in sparse vehicular networks by adding satellite communication.

Oostinga, Ruben (2012) A java bridge for LSTMIN.

Ottow, Christiaan (2012) Hacking the next web: penetration testing over IPv6.

Donker, J.H. (2012) Handfish - tunable heterogenous multi-core simulators on multi-core hosts.

Broek, Jurgen Gijs van den (2012) Real-world analyses of internet protocols.

Beusink, J.W.C. (2012) Secure access contol to personal sensor information in federations of personal networks.

Gerritsen, Jan-Henk (2012) Detecting synchronization conflicts for horizontally decentralized relational databases.

Brands, E.H.T.B. (2012) Flow-based monitoring of GTP traffic in cellular networks.

Gehring, Felix (2012) Software performance prediction in early development phases: A UML- and simulation-based approach.

Wevers, Lesley (2012) A persistent functional language for concurrent transaction processing.

Heijden, Rens W. van der (2012) SeDyA: secure dynamic aggregation in VANETs.

Mols, Emiel (2012) Sharding Spotify search.

Stokkink, Gerjan (2012) Quiescent transition systems.

Hobert, L.H.X. (2012) A study on platoon formations and reliable communication in vehicle platoons.

Teka, Abelneh Y. (2012) Analysis of indirect influence relations in goal-oriented requirements engineering.

Middag, Jacob (2012) Convergence of an implicit runge-kutta discontinuous Galerkin method using smooth limiters.

Noppen, I. (2012) Assessing the benefits of spectrum sharing in wireless access networks.

Vermolen, R.M. (2012) The red queen’s race: from delivery stories to effort estimation: an empirical study.

Burgman, Ronald (2012) Partial-order reduction based on probe sets.

Bamberg, Rob (2012) Non-deterministic generalised stochastic petri nets modelling and analysis.

Bruintjes, Harold (2012) Bridging GROOVE to the world using a conceptual language model.

Hoeve, Thijs ten (2012) Model based testing of a PLC based interlocking system.

Hofste, J. (2012) Scalable identity extraction and ranking in Tracks Inspector.

Schot, N. (2012) QoS-aware model-driven SOA using SoaML.

Terwellen, Christian (2012) Evaluating the behavior of embedded control software - using a modular software-in-the-loop simulation environment and a domain specific modeling language for plant modeling.

Stapersma, Paul (2012) Efficient query evaluation on probabilistic XML data : derived from a glue process with skeleton & flesh.

Wagenaar, P. (2012) Detecting botnets using file system indicators.

Keuper, D. (2012) XNU: a security evaluation.

Verberkt, S.L.C. (2012) Claiming security properties in a service oriented architecture.

Ketelaar, J.G. (2012) Controller design for a bipedal robot with variable stiffness actuators.

Broek, J.D.A. van den (2012) Design and implementation of an analog-to-time-to-digital convertor.

Blankendal, Göran (2012) Building an Xtext compiler for Aspect-Oriented Languages based on ALIA4J.

2011

Nouta, Christiaan Alexander (2011) Data processing networks made easy : improving development possibilities for people with limited computer science knowledge.

Op 't Land, Sjoerd (2011) Ranging and localisation error mitigation in indoor obstructed direct path conditions.

Wal, Tjalling van der (2011) Streaming workflow transformation.

Brinke, Steven te (2011) First-order function dispatch in a Java-like programming language.

Bosems, Steven (2011) A Performance Analysis of Model Transformations and Tools.

Adolfsen, Martijn (2011) Industrial validation of test coverage quality.

Jeeninga, Jesper (2011) Improving communication between computer programmers and domain experts : creating a generic scenario description language to aid the process of describing scenarios for emergency response training simulators.

Nijenhuis, C.F. (2011) Automatic generation of graphical domain ontology editors.

Dekens, Berend (2011) Mapping of a DAB Radio Decoder to Homogeneous Multi-Core SoC : a case study to evaluate a NLP based mapping flow.

Fritz, Jako (2011) Hybrid Intrusion detection network monitoring with honeypots.

Rajput, Abdul Ghani (2011) Properties Relevant for Inferring Provenance.

Veen, Dirk van (2011) Secure searching through encrypted data - Creating an efficient Hidden Vector Encryption construction using Inner Product Encryption.

Lastdrager, Elmer (2011) Securing Patient Information in Medical Databases.

Pater, Elwin (2011) Partial Order Reduction for PINS.

Ende, Frederik van den (2011) Interference Nulling via a Resistor-Weighted Op-Amp Vector Modulator.

Hegeman, Erik (2011) InfoSupport - On the Quality of Quality Models.

Noltes, Johan (2011) Data location compliance in cloud computing.

Obbink, Michel (2011) Social interaction in a cooperative brain-computer interface game.

Harleman, T. (2011) Towards a generic model for audit trails.

Bruintjes, Tom M. (2011) Design of a Fused Multiply-Add Floating-Point and Integer Datapath.

Peng, Yuxi (2011) Face Recognition at a Distance: a study of super resolution.

Meijer, Michael (2011) On a Design Space for Aggregating over Sliding Windows on a Stream.

Goos, Sander (2011) A model driven approach to modernizing legacy information systems.

Schutte, Rik (2011) Maintaining the causal thread of execution in distributed and multilanguage software.

Klifman, T.E. (2011) Propagation of Annotations in a Streaming Context.

Hassani, A.Z. (2011) Touch versus in-air Hand Gestures: Evaluating the acceptance by seniors of Human-Robot Interaction using Microsoft Kinect.

2010

Lavooij, K. (2010) Near-real time statistics gathered from a continuous and voluminous data mutation stream.

Punter, C.M. (2010) Multi-source entity resolution.

Moel, E.L. de (2010) Expanding the usability of recorded lectures : a new age in teaching and classroom instruction.

Kroes, S. (2010) Domain specific embedded languages and model driven engineering.

Admiraal, A.J. (2010) Automated ANTLR tree walker generation.

Lange, R-J. de (2010) Provenance aware sensor networks for real-time data analysis.

Sikkens, B. (2010) The storage and retrieval of sensor data and its annotations.

Bakker, P.J. (2010) Train composition using motion as a common context.

Hove, D. ten (2010) Change management within SysML requirements models.

Palsma, T. (2010) Discovering groups using short messages from social network profiles : using hierarchically organized concepts to discover relations.

Voorst, B. van (2010) Cluster-based collection selection in uncooperative distributed information retrieval.

Alemneh, E. (2010) Sharing nonlinear gates in the presence of glitches.

Horst, Arie (2010) Sport coach : online activity using wireless sensor network.

Yin, Haihan (2010) Developing a generic debugger for advanced-dispatching languages.

Peterson, R.S. (2010) Testing real-time requirements for integrated systems.

Kant, Gijs (2010) Distributed state space generation for graphs up to isomorphism.

Zanden, Guido van der (2010) Quality assessment of medical health records using information extraction.

Baardman, Roel (2010) Cumulus Humilis : wireless mesh-networking for gliders.

Bukhsh, Faiza Allah (2010) Enhanced ICoNos maturity model.

Khadka, Ravi (2010) Model-driven development of service compositions : transformation from service choreography to service orchestrations.

Schwartzenberg, J. (2010) Using machine learning techniques for advanced passive operating system fingerprinting.

Stuurman, Gijs (2010) Action semantics applied to model driven engineering.

Sijtema, Marten (2010) Managing variability in model transformations for model-driven product lines : extending the ATL model transformation language with variability management capabilities.

Hollander, Emiel (2010) Dynamic access control.

Spijkerman, Wietze (2010) Tool support for change impact analysis in requirement models : exploiting semantics of requirement relations as traceabilitt relations.

Slomp, G.H. (2010) Reducing UPPAAL models through control flow analysis.

Wester, Rinse (2010) A dataflow architecture for beamforming operations.

Kok, Guido (2010) Cloud computing & confidentiality.

Costa, Alvise (2010) Context - Free - Language Parser for Advanced Network Intrusion Detection.

Korevaar, Cornelis Willem (2010) A time-frequency localized signal basis for multi-carrier communication.

Lin, Y. (2010) Architecture for IP based interconnection of heterogeneous wireless communication systems for mission-critical group oriented communications.

2009

Mutter, T. (2009) Partition-based network load balanced routing in large scale multi-sink wireless Sensor Networks.

Bockting, S. (2009) Collection selection for distributed web search : using highly discriminative keys, query-driven indexing and ColRank.

Vliek, G. (2009) Detecting spam machines, a netflow-data based approach.

Kingma, J. (2009) Combined VCO/Mixer for satellite receiver in CMOS.

Brand, A. (2009) An investigation in qualities of software variability.

Laarman, A. (2009) An Ontology-Based Metalanguage with Explicit Instantiation.

Westmijze, M. (2009) Memory optimizations on the sequential hardware-in-the-loop simulator.

Veldhuis, J.W. (2009) Tool support for a metamodeling approach for reasoning about requirements.

Tjink-Kam-Jet, Kien-Tsoi T.E. (2009) Result merging for efficient distributed information retrieval.

Hagendoorn, B. (2009) Viscous coupling between bio-inspired hair-sensors.

Vries, E. de (2009) Touchscreen interaction for healthcare applications.

Nijkamp, Barry (2009) Using functional design patterns to improve exports to management information systems.

Everse, Wouter M. (2009) Modelling and Verification of a Shortest Path Tree Protocol for Wireless Sensor Networks : Towards a Platform for Formal Verification Experiments.

Wolterink, T.J.L. (2009) Operational Semantics Applied to Model Driven Engineering.

Oostrum, A. van (2009) A model and specification for development of enterprise application frameworks.

Meij, D.P.L. van der (2009) A metamodeling approach to incremental model changes.

Diepenmaat, J. (2009) Object XML mappings.

Braak, Timon D. ter (2009) Run-time spatial resource management in heterogeneous MPSoCs.

Sulistyo, Pythia (2009) Inter-Organizational Strategic Information Systems Planning (IOSISP) in Network Perspective: How Network Governance Influences IOSISP Effectiveness Evaluation of Healthcare, Government and logistic/Transport Industry Sectors in the Netherlands.

Barbosa, Rafael Ramos Regis (2009) On Access Network Identification and Characterization.

Rietema, Richard (2009) Automatic Verification and Analysis of Test Results of Océ Printers.

Looman, S.A.M. (2009) Impact Analysis of Changes in Functional Requirements in the Behavioral View of Software Architectures.

Graaff, V. de (2009) Towards distributed information access : possibilities and implementation.

Kroon, E. (2009) Layered configuration management for software product lines.

Koelewijn, J.W. (2009) Resource operations model in a dynamic world.

Roodenburg, S.B. (2009) Scheduling the sequential hardware-in-the-loop simulator.

Veldman, I. (2009) Matching profiles from social network sites : similarity calculations with social network support.

Baaij, C. (2009) CλasH : from Haskell to hardware.

Blom, Koen (2009) DVB-S signal tracking techniques for mobile hased arrays.

Muis, Allard (2009) Patterns in data conversion.

Vrielink, Jasper D. (2009) Phased array processing: direction of arrival estimation on reconfigurable hardware.

2008

Nijssen, Bobby J.W. (2008) Cooperative Intelligent Transportation Systems Building a demonstrator for the CVIS-project on the Informatieve Weg.

Meppelink, Lianne (2008) Towards interoperability between existing VoIP systems.

Munsterman, Thijs Pieter (2008) Exploring software scalability : and a method for evaluating and improving software scalability.

Babakhani, Bayan (2008) Implementation of a 2D master-slave system.

Oever, Daniel van 't (2008) CoNSoLe: A Domain Specific Language for Network Services.

Driezen, Wouter (2008) Service-oriented and open-source software as potential markets for applications markets : analysis of the possible added value of Capgemini outsourcing's Dutch applications management service center.

Vos, Geert (2008) Issues of iterative mda-bades software development processes.

Steen, H. van der (2008) Design of animation and debug facilities for gCSP.

Dam, Arjan (2008) Geographic routing in wireless sensor networks for surveillance : introducing a novel routing algorithm: GZOR.

Bloem, E.J.W. van (2008) The user oriented knowledge management method : a knowledge management method for a small organization with a distributed environment.

Looise, M.J. (2008) Inter-level consistency checking between requirements and design artefacts.

Jevring, Markus (2008) Automatic management of bluetooth networks for indoor localization.

Gaiser, Vincent Alexander (2008) Improving spatial awareness in an indoor environment with wireless positioning technology.

Sealy, Timothy (2008) Implementation of aggregation based Resource Management in DiffServ (RMD) Quality of Service Model (QOSM).

Scholte, Theodoor (2008) Managing continuous uncertain data by a probabilistic XML database management system.

Lootsma, Marten (2008) Design of the global software structure and controller framework for the 3TU soccer robot.

Schilpzand, M.P. (2008) X-Stream in MaDAM : new junction modelling in macroscopic dynamic traffic assignment models.

Uithol, Michiel (2008) Security in domain-driven design.

Kruiskamp, Michel (2008) FastSOA : achieving high-performance service oriented architectures.

Daemen, P. (2008) ZMP based control in 3D passive dynamic walking.

Schabbink, Johan (2008) Design of a capacitive based closed-loop displacement sensor.

Haanstra, Sander (2008) Analyzing and improving generalization over time in CSP-based Brain-Computer Interfaces.

Kessel, Ruud van (2008) Querying Probabilistic XML.

Jongeling, R. (2008) Signature modification for Compose?/.NET : implications of signature modification for generic compilers and behavioral signatures of types.

Blumink, Remco (2008) Implementing and communicating with SHILS.

Fournier, Bas (2008) Preprocessing on bilingual data for Statistical Machine Translation.

Ho, Yoeng Woey (2008) .NET integration TEAHA.

Boros, H. (2008) Context Discovery Adapter (CDA) Protocol.

Griffioen, H.T. (2008) Design of clock cleaner : a fast locking PLL.

Lonnee, J. (2008) A scalable repository based on a meta-modelling architecture.

Velner, J. (2008) Integrated state-of-charge circuit for rechargeable batteries.

Jonge, Marc de (2008) The SpinJ model checker : a fast, extensible, object-oriented model checker.

Gerards, M. (2008) Streaming reduction circuit for sparse matrix vector multiplication in FPGAs.

Twelkemeijer, R. (2008) Design of an audio power amplifier with a notch in the output impedance.

Klooster, J-W. van 't (2008) Context, design and implementation of a control system for ring resonator-based optical beam forming networks.

Roolvink, S. (2008) Detecting attacks involving DNS servers : a netflow data based approach.

Bezemer, Maarten (2008) Analysing gCSP models using runtime and model analysis algorithms.

Franssens, Anne (2008) Analysis of Reed Solomon error correcting codes on reconfigurable hardware.

Eenennaam, E.M. van (2008) Providing over-the-horizon awareness to driver support systems by means of multi-hop ad hoc vehicle -to-vehicle communication.

Bloem, R.J.G. van (2008) A data transformation walkthrough.

Henzen, S.F. (2008) A framework for service-oriented extensions to Ruby on Rails.

Damman, B. (2008) Representing PCTL counterexamples.

Timmer, M. (2008) Evaluating and predicting actual test coverage.

Bosch, Stephan (2008) FollowMe! : distributed movement coordination in wireless sensor and actuator networks.

Wit, Joost de (2008) Evaluating recommender systems : an evaluation framework to predict user satisfaction for recommender systems in an electronic programme guide context.

Mahrof, Dlovan Hoshiar (2008) Design of a fully integrated RF transceiver using noise modulation.

Habib, Mena Badieh (2008) An intelligent system for automated arabic text categorization.

2007

Roo, A.J. de (2007) Towards more robust advice : message flow analysis for composition Filters and its Application.

Franken, Michel (2007) Ankle actuation for planar bipedal robots.

Gribnau, Erwin (2007) Analysis, design & implementation of a high-performance main-memory object database for Splice2.

Hegge, Stephan (2007) Predicting end-to-end network characteristics on mobile devices.

Maatjes, N.C. (2007) Automated transformations from ECA rules to Jess.

Baesjou, Bertrand (2007) Improving dependability of OSS access to a hierarchical distributed ad-hoc NMS.

Hoogsteder, V.J.M. (2007) Strategic performance measurement for eBuddy.

Kuperus, J.H. (2007) Nested quantification in graph transformation rules.

Klaver, Ruud (2007) Using NSIS (Next Steps in Signaling) for support of QoS aware multimedia services.

Molderink, Albert (2007) Feasibility Analysis of MPEG decoding on reconfigurable hardware.

Oldenkamp, H.A. (2007) Probabilistic model checking : a comparison of tools.

Heddema, R.R. (2007) Strategy for a robot soccer team - Let’s play robot soccer -.

Poulisse, Gert-Jan (2007) Exploiting inter-conceptual relationships to boost SVM classification.

Atketin, Namik (2007) Ontwikkeling van een interactieve model-gedreven E-formulier generator.

Braber, Kommer (2007) A policy based MBU control system using OSGi.

Kooijman, Ruben (2007) See, hear, listen : head movements and the sensitive artificial listener.

Olthof, Mark (2007) Performance & Scalability of a Spatial Database in a GIS-Web Service Environment.

Papegaaij, E. (2007) The Tree Processing Language: Defining the structure and behaviour of a tree.

Plass, Martijn J.A. (2007) Rules Decomposition for Distributed Context Processing.

Reede, Joost (2007) On A-Select and Federated Identity Management Systems.

Roes, J.B.M. (2007) Identifying and solving overlap between messaging standards with the help of domain models, illustrated with HR-XML’s SIDES and SEP.

Sombekke, N.B.H. (2007) Graph-Based Semantics of the .NET Intermediate Language.

Spenkelink, Roy David (2007) Porting Compose* to the Java Platform.

Portengen, Rik (2007) Phased array antenna processing on reconfigurable hardware.

Ordelmans, L. (2007) The Creation of a Flexible, Functional Simulation Generator for the Montium Tile Processor.

Siles Del Castillo, Hugo (2007) Hybrid Content-Based Collaborative-Filtering Music Recommendations.

Zwerus, Robert (2007) Storing Personal Information Management data: Akonadi - unifying PIM data for KDE.

Tinselboer, Koen (2007) The use of rare key indexing for distributed web search.

Bergen, Marcel van (2007) Design and prototyping of a human-computer interface for a desktop tele-classroom conference application.

Veen, Marcel van der (2007) Sparse matrix vector multiplication on a field programmable gate array.

Kuppeveld, Teun van (2007) Model-based redesign of a self-balancing scooter.

Oostveen, Laurens van (2007) Conductivity gradient focusing by pervaporationand osmosis-induced fluxes.

Os, Roel van (2007) Optimizing XML information retrieval query execution at the physical level.

Putten, Ing. A.E. van (2007) Behavioural hybrid process calculus translation to modelica.

Rozen, Riemer van (2007) A Debugging Framework for NIPS.

Ambrosius, Frank (2007) Modelling and distributed controller design of the bodeRC paper-path setup.

Verdonkschot, S.F.G. (2007) Design and implementation of a trusted RFID reader.

Huisman, Rolf (2007) Bugspray for composition filters.

Smulders, Bram (2007) SQLbusRT : real time data distribution and storage.

Staal, Eric (2007) Simulation with Hamiltonian mechanics : creating a module for 20-sim.

Krijnen, Bram (2007) Heat flow modeling in copiers.

Leong, Frank (2007) Design of an oscillator for satellite reception.

Stellinga, Anne (2007) A low-power second-order sampling receiver for Bluetooth.

Vervuurt, Mark (2007) Modeling business process variability : a search for innovative solutions to business process variability modeling problems.

Veelen, P. van (2007) Clustered acoustic modelling in speech recognition.

Sambeek, M. van (2007) Real-time shadow generation for 3D simulations using modern hardware.

Nguyen, V.Y. (2007) Optimising techniques for model checkers.

Nguyen, Viet Yen (2007) Optimising techniques for model checkers.

Prins, Martin (2007) Fast retransmission for multicast IPTV.

Dijk, Michel van (2007) Analysis and control of nonlinear oscillators.

Bouwmeester, Egbert (2007) Continuous Classes of Power Amplifiers.

2006

Linnenbank, Tristan (2006) Architectural Principles for Large Scale Web sites: a Case Study.

Dimitrova, Desislava C. (2006) Performance evaluation of RMD (Resource Management in DIFFSERV) within NSIS (Next Steps In Signaling).

Bos, Pieter (2006) Interacting with a virtual conductor.

Derks, Theo (2006) Health at home.

Backx, Niels (2006) On the design of a mobile e-health platform ¿ towards deployment flexibility.

Broekhuijsen, Jeroen (2006) 2D Upper Body Pose Estimation from Monocular Images.

Smelik, R.M. (2006) Specification and Construction of Control Flow Semantics : a generic approach using graph transformations.

Buth, Maarten Dimmen (2006) Ball-handling motion control for soccer playing mini-robots.

Heerde, Harold van (2006) Life-cycle privacy policies for the ambient intelligence.

Boschman, S.R. (2006) Performing transformations on .NET intermediate language code.

Conradi, Olaf (2006) Fine-grained Join Point Model in Compose.

Groen, Ruud (2006) Modelleren en analyseren van een Ethernet switch.

Kattenbelt, M.A. (2006) Towards an explicit-state model checking framework.

Kemna, Tim (2006) Bisimulation minimisation and probabilistic model checking.

Leenslag, Wilco (2006) Werkwijze ter beoordeling van IT governance op basis van geaccepteerde methodes op het terrein van IT governance.

Nguyen, H.Q. (2006) Analysis of crosscutting concerns in QVT-based model transformations.

Noordhuizen, Paul (2006) Analyzing aspects in production : plans for software product lines.

Overbeek, J.F. (2006) Meta Object Facility (MOF): investigation of the state of the art.

Rorije, R.J. (2006) Input/output in functional languages : using algebraic uniontTypes.

Rovers, Kenneth C. (2006) Front-end research for a low-cost spectrum analyser : receiver system and topology study.

Speelziek, M.D. (2006) Evaluating rapide using the FRODO service discovery protocol.

Tetteroo, Arend-Jan (2006) Bomb-Proof Server : benodigde technieken en producten voor een high availability systeem en hun consequenties voor beschikbaarheid.

Engelen, L. van (2006) Massively parallel quantization implementation using simulated annealing.

Dijk, J.J. van (2006) Entiteitreconciliatie ondanks beperkte overlap door middel van objectgelijkheid : casus ¿Koppelen van persoonsgegevens zonder een gemeenschappelijke identificatie¿.

Koop, O.R. (2006) Continuous and discontinuous Galerkin finite element methods of variational Boussinesq water-wave models.

Doornenbal, Ing. Dirk (2006) Analysis and redesign of the compose*language.

Sikkes, Bart (2006) A stable matching based adaptive subcarrier assignment method for multimodal fibre access networks.

Veldhuijsen, Gerald van (2006) DICOM Image Retrieval.

Sirchia, Riccardo (2006) Realtime softwarematige radarscan conversie : met GPU programmeren.

Spenkelink, Dennis (2006) Incremental Compilation in Compose*.

Winkel, J.D. te (2006) Applying Composition Filters to C.

Steen, J.L.P.J. van der (2006) Investigation of the band gap widening effect in thin silicon double gate MOSFETs.

Steeden, Remco van (2006) Communication-centric debug of systems-on-chip using networks-on-chip.

2005

Borkent, Michiel (2005) De- and recomposition of expression in music performance.

Nijenhuis, Barry (2005) Smart sign for smart surroundings.

Holzenspies, Philip (2005) SILC: SPRITE Input Language with C(++).

Oosterhof, N.N. (2005) Application patterns in functional languages.

Havinga, W. (2005) Designating join points in Compose* : a predicate-based superimposition selector language for Compose.

Withaar, T. (2005) Analyzing joint-measurements using 3D scancs and statistical models.

2004

Evers, Sander (2004) Form follows function. Editor GUIs in a functional style.

Sözer, Hasan (2004) A peer-to-peer file sharing system for wireless ad-hoc networks.

2003

He, Xiaobo and Mayasari, Elisabeth E. (2003) A Design of Software Architecture for “SHAPE” Workforce Management Game.

2002

Nurdin, H.I. (2002) Mathematical modelling of bias and uncertainty in accident risk assessment.

2001

Donckers, L. (2001) Energy Efficient TCP.

Agung Julius, A.A. (2001) Evolution of the modal densities of a class of stochastic hybrid systems.

2000

Schiphorst, R. (2000) Demonstration of the Software-Radio Concept.

1996

Hiemstra, D. (1996) Using statistical methods to create a bilingual dictionary.

This list was generated on Thu Jun 4 06:02:57 2020 CEST.