35 entries found.
Student |
Thesis |
|
|
Beinema, E. | Energy Efficiency across Programming Languages Revisited | | |
Browne, R. | Analyzing the Behaviour of Players in Soccer Prior to a Shot on Target. | | |
Burggraaf, F | Predicting Scientic Impact | | |
Damhuis, L. P. | Using the rectified Linear Unitactivation function in Neural networks for Clobber | | |
Dijk, M. van | Agents for Kuhhandel | | |
Dijkhuizen, T. van | OpenPhoneMap Het Bereik van Mobiele Zendmasten op de Kaart Gezet | | |
Drogtrop, J. | Comparing Different Agents in the Game of Risk | | |
Gopal, N.A.A. | Analyzing and classifying Borderline Personality Disorder using Datamining paradigms | | |
Groeneveld, L.C. | Visualization of Patterns in Scrum Software Development | | |
Haddou, N.A. | Learning Bayesian Networks for Causal Discovery from Medical Data | | |
Jaegar, D. N. | Evaluating Protein Structure Prediction Algorithms | | |
Janssen, E. | The Leprechaun Hatting Problem | | |
Kleijn, Kelvin | Solving and Constructing Kamaji Puzzles | | |
Lubben, J. | Applying a Mixed-integer Evoutionary Strategy for the Configuration and Parameterization of a CMA-ES | | |
Noordover, K. | Analysis and Viualisation of Spatio-Temporal Hockey Data | | |
Numan, N. | A comparative Performance Analysis of Feature description Algorithms Implemented in Open CV | | |
Paul, V | Predicting the Discharge Date of Patients using Classification Techniques | | |
Renso, C. | Multiobjective Optimization of Power Grid Resilience to Random and Targeted Attacks | | |
Rijn, V. van | Quantifying Fuzzer Performance on Spatial and Temporal Memory Errors | | |
Ronde, S. J. P. M. | Detecting Anomalies with Recurrent Neural Networks | | |
Rook, J. | Characteristics of Dangerous Passes in Soccer at Women’s EURO 2017 | | |
Scholman, R. | Autonomous Navigation of the Spherical Robot BB-8 | | |
Smeding, T.J. | Fast Large-Integer Matrix Multiplication | | |
Smeyers, M. | A Browser-Based Graphical Editor for Reo Networks | | |
Smits, T. | Robots with Vectors | | |
Spelier, P. | The Complexity of Root-Finding in Orders | | |
Steffens, B. | Dynamic Reductions for More Efficient Software Verification | | |
Taleb, R. | The Effect of Activation Functions and Network Congurations on the Performance of Handwritten Character Recognition | | |
Tetteroo, J. | Sentiment Mining on Chinese product reviews | | |
Verhoef, D. | Determining Good Tactics for a Football Game using Raw Positional Data | | |
Vermeulen, W.D. | Toward a Massive Multiplayer Framework | | |
Voogt, M.A. | Optimization of Metagenomics Analysis using Distributed Computing on LLSC | | |
Vos, L. | Quantifying the Performance of Fuzzers in the Detection of Security Threats | | |
Wester, M. | Depth First Search Characterizations | | |
Zwanenburg, E. | Analyzing and classifying Borderline Personality Disorder using Datamining paradigms | | |