| Student |
Thesis |
Content |
| Altfeld, L. (Leon) | Multiobjective Bayesian Hyperparameter Optimization for a Traveling Salesman Problem | |
| Asraoui, A. (Adam) | Guiding Collaboration: Exploring Teaching Assistants’ Views on Group Work in Higher Computer Science Education | |
| Badloe, V. (Vrinda) | Relevant e-health application factors for the HHQA-model | |
| Bayraktar, S. (Serdar) | Phonetic and Semantic Alignment of Spoken Language: Conceptual Understanding of Languages without Text | |
| Behari, R. (Ryan) | Solving Fillomino: An Algorithmic and SMT-Based Approach | |
| Boer, N. (Noëlle) | An Analysis of CuBirds using Different Decision-Making Agents | |
| Brown, M.C. (Mark) | Three-player Combinatorial Games | |
| Chatterjee, S. (Soham) | Synthetic Data Generation for Lung Tumor Detection: A Comparison of StyleGAN3 and Latent Diffusion | |
| Claassen, R. (Robbie) | Hyperparameter Optimization of Pixel-based Diffusion Models with AutoML | |
| Cotino, T.C. (Tristan) | Investigating the Effectiveness of Complementary NNENUM Portfolios for Neural Network Verification Using Auto-Verify | |
| Daleman, L. (Luuk) | Reviewing the Educational Value of the ChocoPy Compiler Framework | |
| Dekker, T.W. (Thijs) | Godapt: Introducing General Video Game AI to the Godot Game Engine | |
| Dongen, M. van (Maxime) | The Teaching Methods and Strategies of Programming Education within High Schools in The Netherlands | |
| El Madkouki, A. (Ashraf) | Web Privacy in the Netherlands: A Study of Tracker Dynamics | |
| Elderbroek, L. (Liam) | Constructing a Forward-Looking Adaptation of Retrograde Analysis Through the Lens of Onitama | |
| Farzad, A. (Alette) | Teaching the Importance of Critically Reviewing the Output of Generative AI through Games | |
| Gibb, H. (Hannah) | Usability Optimisation for Fundamental Rights Assessment of Algorithms | |
| Haasdijk, T. (Tim) | Evaluating The Impact of Integrating Domain-Specific Assumptions Into Auto-sklearn | |
| Hassan, N. (Nour) | Monte Carlo Methods and Algorithms for the Card Game Hanamikoji | |
| Heuvel, A.J. van den (Jonathan) | VeryBadUSB: Expanding the Capabilities of BadUSB with USB Type-C | |
| Hobrecker, F.J. (Francesca) | Solving the Bounded Distance Decoding Problem - A Generalization of Barnes-Wall Lattice Decoding and Its Application to Tensor Hexagonal Lattices | |
| Hoor, O. ten (Olivier) | Exploring the Effectiveness of SMT Solving for Proving and Disproving the Existence of Mutually Unbiased Bases | |
| IJkema, T. (Tiemen) | Generalising, Solving, Classifying and Generating Hashi Puzzles | |
| Jansen, T. (Thomas) | Analyzing Optimization Variables in GPU Kernel Tuning | |
| Jong, D. de (Daan) | Monte Carlo Tree Search with Contextual Bandits | |
| Kaak, B. (Bryan) | Efficiency of Two SAT Encodings of Yajilin Puzzles | |
| Kooij, J. (Jasper) | AI Methods in Checkers Board Variations | |
| Kroon, M. (Margriet) | Enhancing Computational Learning and Enthusiasm in Scouts through Unplugged Activities | |
| Kruijf, R. (Robin) | PiCraft: From Text to Image to Minecraft | |
| Leenen, J.P. van (Jort) | Practical Equivalence Checking of P4 Packet Parsers | |
| Monster, L. (Leon) | Enhancing Prefuse-SSHFS Performance Through Page and Metadata Caching | |
| Radojevic, S. (Steffan) | Evaluating the Effectiveness of Multi-Striding on the Raspberry Pi 5 and Banana Pi F3 | |
| Rijnfrank, J. (Joris) | Finding the Sources of Vulnerable Code Patterns | |
| Ruigrok, M. (Max) | Generating and Solving Sigmar’s Garden Puzzles | |
| Salden, R.C. (Robert) | Developing a Digital Twin of a Food Industry Imaging Setup in Unity3D | |
| Schagen, N. van (Niels) | Developing a Backend Compiler for PDE Simulation on the Anadigm AN231E04 Hybrid Computer | |
| Setropawiro, A. (Amy) | Audio Deepfake Detection Using HuBERT Features | |
| Smedeman, R. (Ronan) | Anomaly Detection on Pollutant Levels in European Air Quality | |
| Soest, D. van (Domen) | A Data-Driven Approach to Determine Personalised Stage Suitability | |
| Sprang, L. van (Lana) | Cultural Prompting and Theory of Mind in LLMs | |
| Stevens, P. (Pieter) | SuperCode A Step Towards Sustainable Algorithms Using SLMs | |
| Stokkermans, V. (Valentijn) | Optimizing and Profiling the Preprocessing Speed of the Contraction Hierarchies Algorithm | |
| Straathof, H. (Hanna) | Solving and generating Kuroshuto puzzles | |
| Tali, T.A. (Taylan Ali) | Security Vulnerabilities in LLM-Generated Code: Analyzing Programming Queries and Their Security Risk | |
| Timman, R. (Roy) | Generating CT Scan Images of the Heart Using Generative Adversarial Networks | |
| Treffers, B. (Bas) | PassGAN and Hashcat - A Look at How Traditional Password Crackers Can Be Used to Complement PassGAN | |
| Versteeg, N. (Niels) | Accelerating Solving the Vehicle Routing Problem by Using Generative Initialization | |
| Visser, O. (Olivier) | Radio Interference Monitoring with Low-end AI-hardware | |
| Vonk, J. (Jeppe) | Designing an Auto-Scalable Benchmark Suite for GPU Kernels | |
| Vroegop, T. (Thomas) | Hyper-minimisation of Probabilistic Deterministic Finite Automata | |
| Waart, J. de (Jente) | Comparing Different Encodings for the Continuity Rule of the Logic Puzzle Context | |
| Wekken, M. van der (Miguel) | Algorithms for Rummikub Puzzles | |
| Wierenga, R. (Rick) | Optimizing Automated, Low-Volume Liquid Transfers | |
| Wiskerke, J. (Jamie) | Probability theory in the Category of Diffeological Spaces | |
| Witteveen, E. (Eef) | The Crew: a Strategy Analysis | |
| Zuijderduijn, T. (Tim) | Fineman’s Parallel Digraph Reachability in Practice | |
| Zwet, J. van der (Jasper) | Reverse Multiplication Friendly Embeddings over Ring Extensions and their Application to Multiparty Computation | |
| Student |
Thesis |
Content |
| Adelaar, B. (Branco) | The Greeting Problem - How to Have People Greet One Another in a Rectangular Room | |
| Adwan, A. (Amr) | Impact of Hyperparameters on Model Performance in Split Learning | |
| Akker, T. van den (Tristan) | Using Trains for Ice Block Puzzles | |
| Baarsen, S.T.A.N. van (Stan) | Using Binary Decision Diagrams for Exploring Graph State Orbits | |
| Bakker, M. (Michaël) | Creating Agents for the Card Game Rikken | |
| Baron, B.R. (Björn Roy) | Exception Handling Support for the Cranelift Code Generator | |
| Beerens, P. (Pjotr) | Families of Defining Polynomials of Finite Fields through Prime Power Torsion on Elliptic Curves | |
| Bergsma, T. (Teun) | Monte Carlo Methods for the Board Game Patchwork | |
| Biervliet, D. (Darryn) | Reinforcement Learning with Partitioned Quantum Circuits | |
| Boon, M. (Milan) de | Teacher Experiences on the New Digital Literacy Learning Trajectory in Primary School Education | |
| Bron, K. (Koen) | Collaborative Web-Based Tool Support for IAMA Assessments on Public Sector Algorithms | |
| Brouwer, I. (Ivor) | Quantum Game Development Using Unitary | |
| Collenburg, S. van (Sven) | Automated Machine Learning for Sea Ice Concentration Charting | |
| Combé, M. (Martijn) | Extending Mixed-Scale Dense CNNS for Classification | |
| Dam, S. van (Sven) | A Flexible, Template-Driven Generation Framework for Model-Driven Engineering | |
| Deursen, A. van (Aník) | The Role of Instruction Method in an Educational Game | |
| Deutz, F. (Fenna) | Implementing a Storage Solution Sacilitating Future Analysis of ADTs Generated by the ADT Web App | |
| Dongen, M. van (Maxime) | The Teaching Methods and Strategies of Programming Education within High Schools in The Netherlands | |
| Drenth, O. (Ole) | Generating Abdominal CT Scan Data for Pancreatic Cancer Detection Using Latent Diffusion | |
| Duivenvoorde, W. (Walt) | Simulating Differential Equations using Hybrid Digital-Analog Computers | |
| Fazlija, R. (Reshit) | Development of User-Friendly Interfaces In a Technical Tool Used To Create Attack Defense Trees for Non-Technical Users | |
| Frericks, M. (Martijn) | Optimizing the Energy Efficiency of the Nvidia Jetson | |
| Griffioen, D. (Daan) | TimeSync: Deepfake Detection with Temporal Lip Sync | |
| Groeneweg, T. (Thijs) | Adapting the CoThought Pipeline for Training a BabyLM on Dutch Data | |
| Halevy, G. (Giovanni) | Transferring Video Captioning Models from Human to Animal Data | |
| Hebinck, J. (Jayme) | ADT Create: Determination of Equivalence and Satisfiability of Attack-Defense Trees | |
| Hermans, I.F. (Iskandar Faisal) | Soft Skills in Computer Science | |
| Heslenfeld, N. (Niels) | Solving and Generating Fobidoshi Puzzles | |
| Hofstra, T. (Tobias) | Developing an Auto-Tunable GEMM Kernel that Utilizes Tensor Cores | |
| Honig, S. (Sander) | On Frogs and Swings: Analyzing Gender Differences in Language Use of Children by Examining the Focus of a Gender-Predicting BERT Model | |
| Hoogd, P. de (Pieter) | an Effective User Experience for Prototype Generation in Model Driven Engineering | |
| Hulsebosch, H. (Hugo) | An Exploration of C2 Server Fingerprinting Capabilities with Probed HTTP Data | |
| Janssen, M. (Maxim) | Optimally Weighted Machine Learning Model Ensembles using Quadratic Optimization in Python | |
| Jong, C. (Casper) de | Can the Waves of the Sea Speak to Us? | |
| Jong, T. (Tim) de | Optimizing RISC-V Binaries Using LLVM-based Same-Architecture Binary Translation | |
| Kiele, R. (Rutger) | Hartenjagen met Monte Carlo Tree Search | |
| Klaver, A. (Arie) | LLM Personalization Using Summarization: A Robotic Fitness Coach Case Study | |
| Koene, E. (Esther) | Determining game values of Hackenbush with Monte Carlo Tree Search | |
| Kroon, M. (Margriet) | Enhancing Computational Learning and Enthusiasm in Scouts through Unplugged Activities | |
| Kuiper, D. (Daniel) | Automating Dynamic Analysis of Python Proof of Concept Exploits | |
| Leito, R. (Roderick) | Integration of the EQ5D PROM Questionnaire Into a Natural and Unobtrusive Conversation Using a RASA-driven Chatbot | |
| Lin, D. (Daniel) | Quantifying Time in Minutes It Takes to Obtain a Ladder-climbable Deck in the Online Collectible Card Game Shadowverse | |
| Nehoray, M. (Mai) | AI-Driven Creativity: The Power of Dual-Agent Systems | |
| Noteborn, D. (David) | Creating a language to describe Turing machines On creating a Towards Turing machine compiler | |
| Ooijen, I. van (Imke) | Optimizing AES for RISC-V Cores | |
| Opdam, C. (Chika) | Automatic Action Detection in Cell Imaging | |
| Roestenburg, M. (Melvin) | Optimal Graph-State Preparation for Quantum Computers with SAT-Solvers | |
| Roos, R. (Renz) | Ice Skater Detection Using Computer Vision | |
| Rooskens, T. (Thomas) | Comparing a Realistic Player for the Game The Great Dalmuti Against a Model Player with Superhuman Capabilities | |
| Saint-Genez, A. (Arnaud) | Reinforcement Learning in Inventory Management: Addressing Finite Shelf Life and Lead Time in Infinite Horizon Problems | |
| Selles, L.H. (Lars) | Privacy-preserving Explainable AI in the Active Security Model | |
| Serraris, A. (Alexander) | Assessing Corporate Communication Alignment with Stated Goals Using Large Language Models | |
| Shreef, B. (Barmad) | Illuminating the EC-Bestiary: Conceptual Analysis and Benchmarking of the Invasive Weed Optimization Algorithm | |
| Smulders, S. (Samuel) | Automated Feature Selection for Unsupervised Anomaly Detection with Internal Evaluation Strategies | |
| Son, T. (Tijn) van | Evaluating Whale Optimization Algorithm: Mathematical Rigor, Reproducibility and Performance | |
| Spoel, I. van der (Ivar) | Illuminating the EC-bestiary: Conceptual Analysis and Benchmarking of the Coyote Optimization Algorithm | |
| Sprangers, H. (Huib) | A Type System for Machine Learning Pipelines | |
| Staal, R. (Robin) | Decoding the Code-breaking Game of Symble | |
| Veraar, M. (Max) | A Quantum-Inspired Algorithm for Galaxy Classification | |
| Verwaal, T. (Thomas) | Analysing the Maximum and Minimum Scores in Azul and the Orders in Which They can be Achieved | |
| Visser, M. (Max) | Using Image Captioning Model for Event and Object Recognition in Football Images | |
| Wierenga, R. (Rick) | Optimizing Automated, Low-Volume Liquid Transfers | |
| Willemsens, L. (Lucas) | Utilising Use Case Models For Multi-actor Prototype Generation | |
| Wit, N. de (Niels) | Power Leakage of AES Implementations | |
| Zuurmond, L. (Lucas) | Probably Approximately Correct Automata Extraction from Neural Networks | |
| Student |
Thesis |
Content |
| Aalst, B. van (Bas) | Ultrasound Indoor Positioning System for Localization of a Moving Object | |
| Abhelakh, Z. (Zoë) | Uncovering Influential Artists and Musical Communities in an Artist Co-Follower Network | |
| Azzegarh, O. (Oualid) | A Concurrent Visual Programming Language | |
| Baronner, T. (Thomas) | Finite accessibility of Higher-Dimensional Automata and unbounded parallelism of their languages [IW] | |
| Beek, R. van der (Rutger) | Monocular Depth Estimation Neural Networks: a Comprehensive Analysis | |
| Berg, J. van den (Joren) | Expanding Side-Channel Data Sets Using Conditional Generative Adversarial Networks | |
| Berg, P. van den (Perri) | Exploring Optimal Strategies for Dice of Doom | |
| Bingen, Z.A. (Zahir) | Verification of Combinational and Sequential Circuits in LEAN3 | |
| Boere, S. (Stijn) | Bootstrapping Speech Synthesis Training | |
| Boogaard, D. van den (Daniel) | Solving Rullo, A Mathematical Puzzle | |
| Bot, A.J. (Anthony) | Performance of Reinforcement Learning Agents within Gameworlds of Differing Coarsnesses | |
| Broch, G. (Gijs) | Deep and Shallow Features for Image Classification | |
| Broek, A. van den (Amber) | Hex Circles Winning Strategies for Variants of Hex using Pure Monte-Carlo [IW] | |
| Capelle, J. van (Jelle) | Detecting Phase Transitions using Forward-Forward Neural Networks | |
| Ende, D. van den (Dirck) | Towards a Compiler for Partial Differential Equations for Analog Computers [IW] | |
| Feijen, R. (Romke) | Counting Winning Hands in Rummikub | |
| Goemans, L. (Luca) | Scalability of Music Genre Classification Algorithms | |
| Gravesteijn, J. (Joris) | On the vulnerability of open-source eFPGAs to malicious attacks based on power-hammering designs | |
| Halsema, M.S. (Martijn) | Demystifying the Raven Roost Metaheuristic | |
| Hayat, A.A. (Aras Aslam) | An aggregrative approach to time series classification | |
| Hegeman, M. (Meili) | Generating Pipes puzzles using maze-generating algorithms | |
| Hepkema, S. (Sven) | Enabling Collaboration in a Model Design Environment | |
| Hermans, I.F. (Skandar) | Soft Skills in Computer Science | |
| Hu, Y. (Yvo) | Measuring functional volume of a general programming language based on framework code | |
| Isleyen, Y. (Yunus) | A cross-case analysis of the integration of computational thinking in the English subject | |
| Jol, C. (Casper) | How to Solve and Generate Marupeke Puzzles | |
| Jonkman, L. (Leonie) | Gender stereotypes: an analysis of Python programming books for children in the Netherlands | |
| Klaassen, H.J.R. (Rutger) | Using sentiment analysis on tweets for predicting cryptocurrency price movements: A case study | |
| Kling, A. (Alano) | Automatically Deriving Sorting Algorithms in tUPL | |
| Kompier, M. (Mark) | High-resolution SRCNN Hyperparameter Optimisation | |
| Kooistra, S. (Sara) | Achieving the Maximal Score in Azul | |
| Lawson, D. (Dominique) | Formalizing the Van Kampen Theorem for Directed Topology [IW] | |
| Lelasseux, M. (Maxine) | Analyzing offenses against life data: a machine learning approach on data extracted from the Human Relations Area Files (HRAF) database | |
| Lim, X.N. (Nuan) | Parallel code generation using SIMD on multi-core CPUs | |
| Liu, J. (Jingwen) | Evaluating the Zero-shot Performance of Three Transformer Models in Reddit Posts | |
| Martens, C. (Christian) | Ground State approximation with Product States using Graph Theory | |
| Massa, R. (Rajeck) | Implementation and Evaluation of a Detection Tool for Data Hiding Techniques in EXT4 File Systems | |
| Meza Orellana, S.G. (Stephan) | ADTLang: A Declarative Language to Describe Attack Defense Trees | |
| Mohalaia, M. (Marwa) | Implementing a User Interface for Attack-Defense Tree WebApp Using Human-Computer Interaction Principles | |
| Mulders, W.M. (Wouter) | Het Handelsreizigersprobleem opgelost met behulp van reinforcement learning [IW] | |
| Nasrat, O. (Omid) | Hedy: De implementatie van een syntax highlighter | |
| Nielen, N. van (Nick) | Visualizing, Analysing and Constructing L-systems from Arborized 3D Models using a Web Application | |
| Oei, J. (Jimmy) | Automated Dynamic Analysis of Java Exploit Proof-of-Concepts | |
| Oppenhuis, K. (Koen) | Variants of Monte Carlo Tree Search in the Game ColorShapeLinks | |
| Reijalt, P. (Petter) | Effect of Initial Sampling on Short-term Behaviour of Differential Evolution | |
| Remmelzwaal, B. (Bart) | Using simulated training data in deep learning networks | |
| Ruigrok, L. (Lars) | Benchmarking Lightweight Cryptography for TLS | |
| Schaik, C. van (Camiel) | CompAI: A user-friendly software tool to support the CapAI procedure for AI Act conformity assessment. | |
| Schuitemaker, R. (Ruben) | Quantum Money from Knots [IW] | |
| Simpeh, J. (Jeremiah) | A New Way of Learning English: Integration of Computational Thinking Through Digital Storytelling | |
| Skulj, T. (Toni) | Implementing skipping faulty code for the Hedy programming language | |
| Slangen, F. (Femke) | Strategies for the Deck Building Game Dominion | |
| Steennis, C. (Christian) | Identifying the phase change of the Ising model using a Spiking Neural Network | |
| Tatman, A. S. (Andrew) | Formal Specification and Analysis of OpenJDK’s BitSet Class | |
| The, R. (Robin) | Analysis of Exploit Code Published on GitHub | |
| Tseng, R. (Rayden) | Comparing human opinions to GPT-3.5 generated opinions on Dutch news articles | |
| Vermeulen, S.C. (Sam) | Self-Monitoring Automated Algorithm Configuration | |
| Vertegaal, L. (Lieke) | Vecs2Pauli - An Algorithm for Finding Stabilizers and Transformations of Quantum States | |
| Wong, K.M. (Kah Ming) | Efficacy and Characteristics of Search Algorithms in Quantum Tic-Tac-Toe | |
| Wuhrer, J. (Jakob) | Extending methods for approximate determinization of weighted automata to other semirings [IW] | |
| Zee, Q. (Quinten) | Development of Computational Thinking Curricula in Primary Schools | |
| Zeidi, S.S. (Seyed) | Synergizing UML Class Modeling and Natural Language to Code Conversion: A GPT-3.5-powered Approach for Seamless Software Design and Implementation | |
| Student |
Thesis |
Content |
| Al-nassar, S. (Suzan) | The Discovery of Underlying Topics within Coronavirus-Related Articles | |
| Allison, L. (Lucas) | Proxy Caching in Accenture’s Employee Evolution Tree Project | |
| Bergman, O.T.C. (Oscar) | CHAD-net: Continuous Human Action Detection in RGB video | |
| Blom, T. (Thomas) | Learning Signal-Meaning Mappings in an Emergent Communication System using Neural Networks | |
| Buurman, D. (Dennis) | Threat Intelligence Feed For Mobile Applications | |
| Dijke, J. (Job) van | Extracting Characteristics of Emotions from Audio | |
| Dirker, K. (Kenneth) | Monitoring Wildlife of the Oostvaardersplassen through Trap-camera and Computer Vision | |
| Doting, R. (Rutger) | Minority Report at the Border: An Ethical Analysis of the iBorderCtrl-project | |
| Hamdi, A. (Akram) | Fault Analysis for a New MsC Course using the ChipWhisperer | |
| Heertum, V. (Vincent) van | Clustering Financial Transactions on Inference-Accelerator Hardware | |
| Hertogh, G. (Guus) | Low-Depth QAOA and RQAOA for Max-Cut on Irregular Graphs | |
| Holtrop, S. (Sjors) | Linker-Directive Based File System in Userspace: Introducing LDP FUSE | |
| Houten, E. (Eva) van | How many Stars Does it Take to Form a Binary? Automating Analysis of Binary Formation during Core Collapse | |
| Jong, T. (Tessa) de | The Classification of Integration Aspects Regarding Systems in Healthcare Organizations | |
| Keulemans, J. (Jelle) | Automatically Detecting when Participants Want Help from their Facial Expressions in an Online Quiz | |
| Kientz, L. (Lily) | Neural Networks for Auto Battlers | |
| Klaver, M. (Marten) | Theoretical and Practical Aspects of Freecell | |
| Koning, M. (Michael) de | Extraction, Transformation, Linking and Loading of Cultural Heritage Data | |
| Kooij, E. (Emilia) van der | Investigating Teachers’ Perceptions on Student Programming Difficulties Related to Variables and Teachers’ Strategies to Help Students | |
| Laan, K. (Kyran) van der | A Computer Program that Plays the Card Game Tysiąc | |
| Laanen, R. (Rodi) | Classification of Pre-defined Movement Patterns: A Comparison between GNSS and UWB Technology. | |
| Lenstra, X. (Xander) | A Program for Analysing Combinatorial and Synchronized Games [IW] | |
| Li, L. (Leon) | Changes in Steam Genre Tags after Covid-19 | |
| Lie, K. (Kwan) | How to Win in Checkers? | |
| Marosvölgyi, C. (Charlotte) | Parsons Problems in Hedy | |
| Mourits, R. (Rob) | Solving and Generating the Nurimeizu puzzle | |
| Nouweland, L. (Luuk) van den | Automating the Process of Defining the Aesthetic Quality of an Image in a Numerical Way | |
| Opdam, T. (Tim) | Numeric Subgroup Discovery by MDL-Optimal Histograms | |
| Özbay, A.E. (Ali Esat) | An Interactive Program Visualisation Tool for Hedy | |
| Ram, J. (Jochem) | Sim-to-Real Autonomous Driving in CARLA using Image Translation and Deep Deterministic Policy Gradient | |
| Raziuddin, S. (Shabnam) | The ProgRamifications on Society, where COMPAS Guides us | |
| Reurink, A. (Andries) | On Graphene Twisted Edge Break Junction Tunneling Experiments | |
| Rooij, J. (Justin) de | Learning a NAO Robot to Balance Using Reinforcement Learning | |
| Rooij, M. (Michael) de | Handling of Abstraction by Children using the Hedy Programming Language | |
| Rooijakkers, L. (Lieuwe) | Evaluating AutoML Methods on Hybrid Inversion of PROSAIL RTM on Landsat-7 Data for AGB Estimation | |
| Rossum, N. (Nina) van | The Search for Low-code Development Platforms that Support Serious Games | |
| Schaap, A. (Anthonie) | Programmeren voor Blinde en Zwaar Slechtziende Leerlingen | |
| Schaap, L. (Lennard) | Formalised Semantics of Lustre | |
| Schreurs, L.J. (Luc) | Investigating Grammatical Evolution’s Ability to Reconstruct Mathematical Functions | |
| Soulimani, O. (Oussama) | Evaluating Android Malware Detection Explanation | |
| Stoffels, L. (Luca) | Autolayout of UML Diagrams using Metaheuristic Algorithms and Natural Computing | |
| Vink, E. (Elze) de | Solving Breakthrough Using Binary Decision Diagrams and Retrograde Analysis | |
| Voorham, J. (Jack) | Impact of Flow Anonymization on Cyberattack Detection in IoT | |
| Vries, G. (Guido) de | Detection of Indirect Gender Bias in Job Vacancy Texts | |
| Wensveen, R. (Roos) | Probing Sequences for Nonograms | |
| Wetten, F. (Fien) van | Representing the State Space of the Domino Cube in Graph Using BDDs | |
| Wheeler, M. (Michael) | Detecting Sarcomere Structures in Cardiomyocytes | |
| Zeeuw, M. (Matthijs) de | Explainable AI in Multi-Objective Design Optimization | |
| Zhang, M.Y. (Min Yi) | Teaching of Variables in Programming MOOCs: An Exploratory Study | |
| Zwart, M. (Michael) van der | A Library for BDDs and SDDs | |
| Student |
Thesis |
Content |
| Arntzenius, R. (Robert) | Agents for the Strategy Game Onitama | |
| Aygün, T. (Tayfun) | Optimizing Monte Carlo Agents for the Game Katarenga | |
| Bax, P. (Pim) | Can a rule-based algorithm accurately correct whitespace errors? | |
| Boel, M. (Marc) | Energy expenditure estimation for wheelchair users using activity type classification | |
| Bolt, J. (Julia) | Blind leren programmeren: Een studie naar de Computational Practices van kinderen met een visuele beperking bij het programmeren van muziek in Sonic Pi | |
| Bouter, D. (David) | Knowing the difference between news and opinion An explorative research project into classifying news and opinion | |
| Burgh, R. (Rogier) van den | Bomb-r-cover Expanding the difficulties of Bomberman | |
| Burghoorn, G. (Gijs) | Exploration of the ChipWhisperer Lite ARM board for education on Side-Channel Power Analysis | |
| Ebing, W. (Wouter) | Analysing Classification Of Episodes From Electronic Health Records With The Use Of Text Mining | |
| Egmond, D. (Diego) van | Efficient conversion between vtrees | |
| Heath, C. (Cheyenne) | Depression prediction using twitter data: Comparing LIWC and Bag-of-Words features | |
| Honert, N. (Nils) van der | Benchmarking default implementations of pseudorandom number generators in commonly used programming languages. | |
| Honig, B. (Bram) | A Network-based Approach for Ship-type Modelling | |
| Huang, A. (Andrew) | Segmentation based Image Retrieval using Low level image features | |
| Jong, A. (Aron) de | An Analysis of the Cooperative Card Game The Crew [IW] | |
| Kolenbrander, M. (Marcel) | The Design of a Modular Game Platform for the QuantumRules! Lab | |
| Krebbers, S. (Said) | Monte Carlo Tree Search for Dots-and-Boxes | |
| Maas, K. (Kalvin) | Full-Body Action Recognition from Monocular RGB-Video: A multi-stage approach using OpenPose and RNNs | |
| Malkoç, M. (Melda) | Prestatietest Ontwikkeling voor de Evaluatie van Python Vaardigheden van Middelbare Scholieren voor het Vak Nederlands | |
| Moison, O. (Okke) | Scratch of Scottie Go!: een vergelijking tussen twee manieren om te leren programmeren | |
| Mol, T. (Thomas) de | Synchronized Cherries [IW] | |
| Moser, D. (Dennis) | Optimization algorithms for solving incremental box placement problems. | |
| Nadif, A. (Amine) | Computational thinking integreren in de schoolvak Engels: verhaal vertellen via programmeren in Scratch | |
| Nieuwenhuizen, D. (David) | The Effect of Monte Carlo Tree Search on Modern Board Game Elements | |
| Ottevanger, L. (Laura) | Continuing levels of the programming language Hedy | |
| Peet, L. (Louise) van der | More than a one-time heist Identifying the current state of Android CPU cryptojacking | |
| Planken, D. (Daan) | Reducing the required number of qubits for a quantum algorithm for topological data analysis | |
| Poelsma, J. (Julian) | Optimizing a Quantum Approximate Optimization Algorithm using machine learning | |
| Prins, V. (Vincent) | Using Heterogeneous Primordial Particle Systems to Analyse Life-like Behaviour. | |
| Reijtenbach, R. (Rob) | Determining the Success Rate for the Game of Solitaire | |
| Remmerswaal, F. (Floyd) | Can a human-computer hybrid outperform the LTM tiling algorithm? | |
| Schendel, B. (Bob) van | Qualitative data from quantitative seed oxygen measurements | |
| Schwarze, Y. (Yenebeb) | The Voice Within the Neural Network | |
| Sevingil, C. (Cem) | A Comparison of Breadth-First Search Implementations for Real-World Networks on a Modern GPU | |
| Smit, T. (Thera) | Creating a Framework for Sublevels in Hedy | |
| Spek, C. (Corne) | Analyzing the Code Coverage of Android Apps using the Exerciser Monkey | |
| Staaij, A. (Arthur) van der | Composing instrumentation tools for Android apps | |
| Starkenburg, B. (Berend) van | Interest Point Detectors and Descriptors: an Evaluation | |
| Talsma, M. (Marit) | Quantum topological data analysis on near-term devices | |
| Vink, T. (Thomas) | Identifying anomalous trajectories from bird tracking data sets. | |
| Vrins, M. (Michiel) | Querying Frequent Itemsets in the Browser | |
| Zwaag, J. (Job) van der | Finding a Way Through the Changing Maze of Labyrinth | |
| Student |
Thesis |
Content |
| Avoird, S. (Stan) van der | Prediction and Technical Analysis of the Bitcoin Crypto Currency Using Machine Learning | |
| Bak, R. (Romke) | Finding Shortest Paths in Parallel | |
| Blom, M. (Miguel) | Hybrid Classical-Quantum Speedups for the Random k-SAT Problem using Smaller Quantum Computers | |
| Bors, P.P. (Philippe) | Analysis of Nonsimple Nonograms | |
| Bouwman, K. (Koen) | Q-learning with Parameterized Quantum Circuits: Design, Implementation and Benchmarking | |
| Coret, T. (Thomas) | The Effect of Social Reward on Swarm Robots in a Foraging Task | |
| Corsel, C.W. (Christof) | YOLO-based Obstacle Avoidance for Drones | |
| Doesburg, M. (Max) | Optimization of the Reconstruction of Zebrafish on the LLSC Using the VAST Microscope | |
| Donkers, J. (Jeroen) | Real-time Melody Harmonization in an Improvisational Context | |
| Driessen, W.A.M. (Wampie) | How Example Set Size Influences the Effectiveness of the AFL Fuzzer | |
| Ende, D. (Dyon) van der | Scraping Scratch: A Dataset of Comments and their Sentiment | |
| Gramsbergen, D.S. (Danielle) | Subcoinductive Types [IW] | |
| IJpelaar, M. (Mariska) | An Initial Exploration of the Importance of Program Instruction Order for Dynamically Scheduled Processors | |
| Kaur, K. (Kirandeep) | To What Extent Can We Use Machine Learning to Predict the Emotion of a Person after Reading a Dutch News Article? | |
| Keizer, A. (Alex) | Coalgebras of Session Types: Defining a Syntax Independent Framework | |
| Kluiver, S. (Sem) | Solving and Generating Ice Block Puzzles | |
| Marchand, Y. (Yannik) | Towards Parallel Generation of DFS Orders Using Verifiers | |
| Meijhuis, M.J. (Mark) | Using Machine Learning to Predict Price Trends in Foreign Exchange Rates | |
| Mkrtchyan, W.K. (Wahagn) | Systems of Multi-Criteria Decision Making for Skyline Queries | |
| Otten, D.D. (Daniel) | Type Theory: W-types and Bisimulation [IW] | |
| Plas, N. (Niek) van der | Classifying Citizen Complaints using Pre-trained Language Models | |
| Polen, T. (Tim) van | GPS Referencing and Data Storage Manipulation | |
| Poot, T. (Tim) | Deep Text Matching in E-Commerce | |
| Rooij, L (Lucas). van | Predicting the Characteristics of Successful Cyclists in Multi-week Races | |
| Schep, D. (David) | Fusion Approaches for Monocular Depth Estimation | |
| Schonenberg, J. (Jerry) | Differential Siamese Network for the Avoidance of Moving Obstacles | |
| Schous, V. (Vera) | Understanding and Discussing Weaknesses in Deep Neural Networks | |
| Simons, T. (Thijs) | Training Optimization in Professional Road Cycling through Time Series Prediction and Quantification | |
| Singh, H. (Hargurjit) | Setting Up a FAIR Data Point in LIACS | |
| Snelleman, T. (Thijs) | Strategic Gambling in DiminishingBridge | |
| Stee, J. (Jesper) van | Creating an AI for the Rhytm Game osu! | |
| Stokman, W. (Wouter) | Obstacle Detection and Avoidance Using Image Processing on Embedded Systems | |
| Tettelaar, K. (Kean) | Towards Multi-objective Bayesian Global Optimization for Space Missions | |
| Tubergen, J. (Jeroen) van | Assessing the Fitness of Web-applications within the Context of Mobile Phones, on Performing Spatially Distributed, Co-located, Collaborative, Audio-related Activities | |
| Verschuur, L. (Luit) | The Impact of the Naturalness of a Robot’s Voice on Human-Robot-Interaction | |
| Wanjun Xu, C. (Cassie) | Efficient Parallel Cycle Detection | |
| Wassenaar, G. (Guido) | Empirical Performance Evaluation of the Linkage Tree Genetic Algorithm | |
| Wink, T. (Thomas) | OpenML-Connect: A C++ Connection Library for OpenML | |
| Zoete, B. (Bart) de | Improving Twitter Stream Filtering using Pseudo-Relevance Feedback | |
| Zweeden, J. (Joos) van | Detecting Facial Features in Infrared Imagery | |
| Zwetsloot, M. (Marnix) | Predicting the Outcome of the Card Game Klaverjas | |
| Student |
Thesis |
Content |
| Alvarez Rodriguez, S.F. (Sebastiaan) | Static Security Analysis Methods in Android Systems: a Comparison | |
| Bergman, P. (Patrick) | Scalable Architecture for Event Management Systems | |
| Blankestijn, M.A.N. (Max) | Polyomino Packing using a Tetris-like Ruleset | |
| Blok, J. H. (Jaap) | Multi-valued Decision Variables and Redundant Coding in Evolutionary Algorithms | |
| Boks, R.M. (Rick) | Performance Comparison of Configurable Particle Swarm and Differential Evolution Algorithms | |
| Bouman, J.Q. (Jeffrey) | Recovering from Controllers Failures in Software Defined Networks | |
| Campmans, A.J. (Tony) | (In)effciënte Bewijsstrategieën | |
| Colli, M.M. (Mitchel) | Dynamic Real-time Videostream Stitching Using Multiple Uncalibrated Cameras | |
| Deering, G. (Galen) | Applications of Monte Carlo on the Board Game Six | |
| Delzenne, M.J. (Mees) | Optimizing the Citra Emulator by Decompiling Shader Machine Code | |
| Dofferhoff, R.M.J. (Rens) | A Performance Evaluation of Platform-Independent Methods to Search for Hidden Instructions on RISC Processors | |
| Domela Nieuwenhuis. D.O. (Damian) | Improving Public Speaking Performance by Facial Emotion, Body Language and Speech Recognition based Feedback | |
| Dubbeldam, S. (Stef) | Using Program Animation to resolve misconceptions in K-12 students. | |
| Flesher-Clark, A.C. (Alec) | 3D Hand Pose Estimation on a Robotic Platform | |
| Göebel, M.A. (Michael) | Developing and Verifying Methods to Search for Hidden Instructions on RISC Processors | |
| Graaf, S. (Sylvester) de | Cracking the Mastermind Code | |
| Hamer, V. (Vincent) den | Hiding in Plain Sight: How Location affects Memory Error Detectability by Fuzzers | |
| Huijben, M. (Marcel) | Efficiently combining compiler-based zero-day defenses | |
| Jonckheere, L.S. (Luc) de | Efficiently Generating the Mandelbrot and Julia Sets | |
| Jong, R.G. (Rachel) de | Comparing Two Algorithms for Finding Maximal Matchings in Bipartite Graphs | |
| Kannangara, A.R. (Aaron) | Comparing Strategic Agents for Dominance | |
| Maan, G.C. (Gijsbert) | Hardware Acceleration of Matrix Multiplication | |
| Merckens, T. (Tim) | A Further Look into Mouse Mazes | |
| Meyer, S (Samuel) | Psychology-Inspired Memory Sampling in a Deep Q Network | |
| Neuteboom, V.O. (Victor) | Personalized Modeling of Training Load and Physical Capacity of an Elite Rower | |
| Nolden, L.S.J. (Luuk) | Finding Seneca in Seneca | |
| Peters, O.R.L. (Orson) | Image Compression with Neural Networks | |
| Plug R.B.F. (Ruud) | ECG Anomaly Detection Using Long Short-Term Memory based Recurrent Neural Networks | |
| Poslavsky, V.J.A. (Victor) | System for Analysing Off-the-ball Performance of Individual Football Players using Spatiotemporal Tracking Data | |
| Sinnige, J.A. (Jelle) | GPS Referencing and Data Storage Manipulation | |
| Strating, M.W. (Martijn) | Analysis of Submissions of the Dutch Olympiad for Informatics with a Special Focus on Heuristics | |
| Swenne, M.M. (Marijn) | Solving SAT on Noisy Quantum Computers | |
| Tijssen, L. (Lars) | Analyzing Offensive Player- and Team Performance in Soccer Using Position Data | |
| Turkenburg, R.T.C. (Ruben) | Greibach Normal Form for Weighted Context-Free Grammars [IW] | |
| Varkevisser, F.E. (Florian) | Using Monte Carlo Tree Search to Play Cops & Robbers | |
| Vlasakker, R.A. (Rintse) van de | Bomb-cover Een verzamelingenoverdekkings-probleem in de Bombermanwereld | |
| Voetter, R.F. (Robin) | Volumetric Ray Tracing with Vulkan | |
| Weijer, W. (Wessel) de | A Decision Procedure for Weighted Automata Equivalence [IW] | |
| Zande, E.R. (Elgar) van der | Examining out of Bounds Defense Systems' Performance against Independent CVEs | |
| Student |
Thesis |
Content |
| Beinema, E. (Emiel) | Energy Efficiency across Programming Languages Revisited | |
| Browne, R. (Rose) | Analyzing the Behaviour of Players in Soccer Prior to a Shot on Target. | |
| Burggraaf, F (Florijn) | Predicting Scientific Impact | |
| Damhuis, L.P. (Laurens) | Using the Rectified Linear Unit Activation Function in Neural networks for Clobber | |
| Dijk, M. (Marco) van | Agents for Kuhhandel | |
| Dijkhuizen, T. (Tom) van | OpenPhoneMap Het Bereik van Mobiele Zendmasten op de Kaart Gezet | |
| Drogtrop, J. (Jimmy) | Comparing Different Agents in the Game of Risk | |
| Gopal, N.A.A. (Ashwini) | Analyzing and Classifying Borderline Personality Disorder using Datamining Paradigms | |
| Haddou, N.A. (Naoufal) | Learning Bayesian Networks for Causal Discovery from Medical Data | |
| Janssen, E. (Egon) | The Leprechaun Hatting Problem | |
| Kleijn, K. (Kelvin) | Solving and Constructing Kamaji Puzzles | |
| Lubben, J. (Jelle) | Applying a Mixed-integer Evoutionary Strategy for the Configuration and Parameterization of a CMA-ES | |
| Noordover, K. (Kevin) | Analysis and Viualisation of Spatio-Temporal Hockey Data | |
| Numan, N. (Nels) | A comparative Performance Analysis of Feature Description Algorithms Implemented in Open CV | |
| Paul, V (Valerie) | Predicting the Discharge Date of Patients using Classification Techniques | |
| Renso, C. (Caio) | Multiobjective Optimization of Power Grid Resilience to Random and Targeted Attacks | |
| Rijn, V. (Vincent) van | Quantifying Fuzzer Performance on Spatial and Temporal Memory Errors | |
| Ronde, S.J.P.M. (Sander) | Detecting Anomalies with Recurrent Neural Networks | |
| Rook, J. (Jeroen) | Characteristics of Dangerous Passes in Soccer at Women’s EURO 2017 | |
| Scholman, R. (Renzo) | Autonomous Navigation of the Spherical Robot BB-8 | |
| Smeding, T.J. (Tom) | Fast Large-Integer Matrix Multiplication [IW] | |
| Smeyers, M. (Maarten) | A Browser-Based Graphical Editor for Reo Networks | |
| Smits, T. (Taco) | Robots with Vectors | |
| Spelier, P. (Pim) | The Complexity of Root-Finding in Orders [IW] | |
| Steffens, B. (Benjamin) | Dynamic Reductions for More Efficient Software Verification | |
| Taleb, R. (Rafi) | The Effect of Activation Functions and Network Configurations on the Performance of Handwritten Character Recognition | |
| Tetteroo, J. (Jaco) | Sentiment Mining on Chinese Product Reviews | |
| Verhoef, D. (Davey) | Determining Good Tactics for a Football Game using Raw Positional Data | |
| Vermeulen, W.D. (Wouter) | Toward a Massive Multiplayer Framework | |
| Voogt, M.A. (Mick) | Optimization of Metagenomics Analysis using Distributed Computing on LLSC | |
| Vos, L. (Levi) | Quantifying the Performance of Fuzzers in the Detection of Security Threats | |
| Wester, M. (Martijn) | Depth First Search Characterizations | |
| Zwanenburg, E. (Ewout) | Analyzing and Classifying Borderline Personality Disorder using Datamining Paradigms | |
| Student |
Thesis |
Content |
| Vermetten, D. (Diederick) | Position Detection Optimization in the Context of Sensor Based Location Systems | |
| Baasdam R.W.H. (Renzo) | Numerics and Continuation for Reaction-Diffusion Equations | |
| Beljaards, L. (Laurens) | AI Agents for the Abstract Strategy Game Tak | |
| Bolster, Y. (Yorick) | Automatically finding the best blocking size for matrix multiplication | |
| Borst, R.C.P. (Robbin) | Robust self-balancing robot mimicking | |
| Brandt, O. (Oscar) | Comparing Algorithms: Calculating the Minimal Coverability Set of Petri Nets | |
| Buwalda, N. (Niek) | Open Source Systems for Dialogue Systems | |
| Cames van Batenburg D.F. J. | Identificaton of Transposable Element Insertion into the enod40 RNA | |
| Castelein, K.J.B. (Koen) | Determinization for Monte Carlo Tree Search n the Card Game Tichu | |
| Dekkers, C.H.J. (Cas) | Creating Models of Interaction for a Video Wall | |
| Dijk, S.J. (Stef) van | Solving Puzzles Using Cellular Automata | |
| Draijer W.J.W. (Wilco) | Integrating, Structuring and Visualising Cancer Data | |
| Etoeharnowo, T. (Teddy) | Neural Networks for Clobber | |
| Fokkinga, D.B. (Daniel) | Towards Learning Software Models: making documentation easier | |
| Hal, R.M. (Roy) van | Finish Photo Analysis for Athletics Track Events using Computer Vision Techniques | |
| Heijungs, S. (Simon) | Tape-quantifying Turing Machines in the Arithmetical Hierarchy | |
| Hoogenboom, C. (Cedric) | Using Probabilities to Enhance Monte Carlo Search in the Dutch Card Game Klaverjas | |
| Jansen, B.A. (Bernardus) | The state of Bufferbloat in the Netherlands | |
| Jonkman, J.L. (Jacob) | Interacting with BigEye: Using Gesture-Based Input Methods to control Applications on a Videowall | |
| Kesteloo, M.E. (Mitchell) | Using Convolutional Autoencoders to Detect Anomalies in Sewer Images | |
| Khalass, N. (Nouri) | Metaprogramming in Modern Programming Languages | |
| Klijn, M. (Michel) | A Perfect Information Scrabble Game | |
| Martens, J.R.M. (Joost) | ETA: A Modular Approach to Analyzing Time Series Data | |
| Meerkerk, R. (Ruben) | Design, Analysis, and Optimization of an Embedded Processor | |
| Meeuwsen, J. (Juliette) | Design and Implementation of 3D reconstruction from axial views on the Leiden Life Science Cluster | |
| Muinck Keizer, D. (David) de | A Control Flow Graph Generator for Java Code | |
| Muusse, I.J. (Ivo) | An Algorithm for Balancing a Binary Search Tree | |
| Oedayrajsingh Varma, V. (Vinay) | A Survey of Classical Public-key Cryptography and Post-quantum Lattice-based Cryptography | |
| Oost, K. (Kevin) | Analysing Data to Predict Processing Times of Vessels and Barges in Liquid Bulk Terminals | |
| Out, N.F. (Nils) | A Monte Carlo Strategy for the Game of Hive | |
| Peters, L.J. (Bert) | Utilizing a Tuple-Based Optimization Framework for Graph Algorithms | |
| Putman, K. (Koen) | Implementing an Interface for Virtual Input Devices into the MGSim Simulator | |
| Riet, J.C.A. (Jasper) van | Anomaly Detection with Deep Belief Networks | |
| Ruijter, F.E.C. (Floris) | Symbolic Regression of Implicit Functions | |
| Schipper, L. (Lisette) de | Compact descriptors for (near) duplicate image detection | |
| Soelaksana, E. (Erik) | Analyzing Privacy Awareness of Twitter Users Through Their Given Location Precision | |
| Spaendonck, M. (Michiel) van | Aspects of Tectonic | |
| Suanet, L. (Lars) | Finding Anomalies in Sequential Data using Local Outlier Factor | |
| Teunisse, J. (Joris) | Agents for the Card Game of Hearts | |
| Verweij, G.J.W. (Geerten) | Comparison of the Effectiveness of Shared Memory Optimizations for Stencil Computations on NVIDIA GPU Architectures | |
| Waal, P.R. (Ruben) van der | A Study of Different Approaches for Improving the Stitching of Spherical Panoramas | |
| Zaeem, S.A.F. (Sinan) | Diverse Subgroup Discovery for Big Data | |
| Zandvliet, J.J.M. (Jos) | Vectorized Sparse Matrix Kernels using Hybrid Data Layouts | |
| Zwitser, l. (Liam) | Quantum Computing | |
| Student |
Thesis |
Content |
| Bannenberg, L. (Lou) | Checking for Compatibility in Team Automata | |
| Bavdaz, A. (Alenka) | Comparing Markov Chain and Recurrent Neural Network Algorithms for Text Generation | |
| Boom, B. (Bernard) van den | Dutchism Detector | |
| Bosch, N.F.A. (Nick) van den | A Comparison of Hashing Algorithms | |
| Chow, K.L. (Kin Lok) | Multiobjective Pattern Mining in Bitcoin Data and Genetic Landscapes | |
| Duba, D. (Dico) | Retting PIPE: Extending the Petri Net tool PIPE 5 | |
| Edixhoven, L. (Luc) | Attacking the n-Puzzle Using SAT Solvers | |
| Faas, M. (Micky) | Sparse Voxel Mip-Maps: Versatile Lossy Compression of Volumetric Data | |
| Gent, D. (Daan) van | Graph Isomorphism in Quasi-polynomial Time [IW] | |
| Huibers, J. (Jarno) | AI Agents for the Card Game Love Letter | |
| Huybers, R. (Richard) | Mario (of hoe je een Programmeerwedstrijd kunt Winnen) | |
| Koschny, J. (Julius) | Design and Analysis of a Controller for the iRobot Create | |
| Lamers, C. (Christiaan) | Quantum Cryptography | |
| Latenko, A. (Alexander) | Explorative Study on Hierarchical Temporal Memory | |
| Louwe, A. (Anneloes) | Constructing Petri Net Models from Biological Literature using Structured Annotation | |
| Nibbeling, J. (Joost) | Implementation of A Parallel Back Substitution Solver on GPUs | |
| Oostdam, J. (Jasper) | Design and Simulation of an Embedded Controller for the iRobot Create robot by Integrating ROS in Gazebo | |
| Persoon, R. (Ricardo) | Design and Implementation of Website Backup as a Service | |
| Post, M. (Martijn) | Mythbusting Data Mining Urban Legends through Large Scale Experimentation | |
| Roos, D. (Dennis) | Transformation of Membrane Systems | |
| Ruijter, S. (Sander) | Dynamically Evolving L-system Generated Plant Visualizations | |
| Staalduinen, J.H. (Jan) van | Gathering and Managing Spatiotemporal Data | |
| Veen, S. (Simone) van | Anomaly Detection in Cybersecurity | |
| Visser, T. (Timothy) | Workforce Survey Data Analysis: Potentials and Pitfalls | |
| Vreumingen, D. (Dion) van | Real Time Force Field Simulation for Stm Controlled Molecular Electronics Experiments using Cuda gpu Programming | |
| Werf, U.M. (Ulbo) van der | Describing Heaps using Kleene algebra with Tests | |
| Werff, C.R.A. (Chivany) van der | Tetris Strategies in a Multiplayer Environment | |
| Woerden, W. (Wessel) van | The Closest Vector Problem in Cyclotomic Lattices [IW] | |
| Wubben, S.J. (Sander) | Predicting the Risk of Overload in Overcommitted Server Clusters | |
| Zwaan, D. (Dennis) van der | Developing an Integrated Environment for OPT Image Reconstruction | |
| Student |
Thesis |
Content |
| Berge, M. (Michiel) van den | An Algorithm for Morphing Audio | |
| Bergh, M.J.H. (Mark) van den | Hanabi: A Co-operative Game of Fireworks [IW] | |
| Boekhout, H. (Hanjo) | Combining Graph Mining and Deep Learning in Molecular Activity Prediction | |
| Bos, R. (Ralph) | Compact Decision Trees for Dou Shou Qi Tablebases | |
| Buitelaar, R. (Ruben) | Combined Neural Networks for Movie Recommendation | |
| Burger, J. (Jelco) | Context Free Guarded Languages: A System for Determining Guarded Strings | |
| Cammel, S. (Simone) | Predicting the Outcome of the Game Othello | |
| Dekker, V. (Victor) | A Difficulty Measure for Light Up Puzzles | |
| Es, D. (David) van | Deploying Phenotype Analysis on LLSC | |
| Haddou, S. (Sarah) | Using Outcome Weights in Monte-Carlo Tree Search for Multiplayer 3D Hex | |
| Kanhai, S. (Soeradj) | Mining a Scientific Conference | |
| Klaver, S. (Simon) | Analysing Electron Tomography with IMOD on the LLSC | |
| Kortsmit, M. (Marieke) | Strategies for Klondike Solitaire [IW] | |
| Marsdon, B. (Bob) | A Generalized Hough Transform for the Recognition of Cars in Images [IW] | |
| McGlinn, T. (Tama) | Analysing the Difficulty of Mazes using a Web Application | |
| Partodikromo, E. (Elisa) | Datamining the Peptide Sequenome | |
| Post, M. (Mark) | Analysis and Visualisation of Data of an Outdoor Sports Mobile Application | |
| Rooijen, A.L. (Arthur) van | TBA | |
| Schade, D. (Derek) | Image Similarity Using Color Histograms | |
| Scholtes, S. (Sem) | Integrating Data Modeling with Data Analysis in Taverna Workflows | |
| Sener, H. (Huseyin) | Building an Administrative System in a Scientific Workflow System | |
| Stevenson, C. (Claire) | Learning Software Design: Is Abstraction Ability Key? | |
| Stout, P. (Patric) | Ontology Viewer: Van Proof-of-Concept naar Layered Software | |
| Strien, B. (Bart) van | Exploring Scheduling Alternatives for a Computer Vision Application on Embedded MPSoCs | |
| Veenman, C. (Christian) | A Framework for Cross-Platform Dynamically Loaded Libraries | |
| Zabel, T. (Terry) | Video Rating and Sorting with a Genuine Approach | |