| Student |
Thesis |
Content |
| Beinema, E. (Emiel) | Energy Efficiency across Programming Languages Revisited | |
| Browne, R. (Rose) | Analyzing the Behaviour of Players in Soccer Prior to a Shot on Target. | |
| Burggraaf, F (Florijn) | Predicting Scientific Impact | |
| Damhuis, L.P. (Laurens) | Using the Rectified Linear Unit Activation Function in Neural networks for Clobber | |
| Dijk, M. (Marco) van | Agents for Kuhhandel | |
| Dijkhuizen, T. (Tom) van | OpenPhoneMap Het Bereik van Mobiele Zendmasten op de Kaart Gezet | |
| Drogtrop, J. (Jimmy) | Comparing Different Agents in the Game of Risk | |
| Gopal, N.A.A. (Ashwini) | Analyzing and Classifying Borderline Personality Disorder using Datamining Paradigms | |
| Haddou, N.A. (Naoufal) | Learning Bayesian Networks for Causal Discovery from Medical Data | |
| Janssen, E. (Egon) | The Leprechaun Hatting Problem | |
| Kleijn, K. (Kelvin) | Solving and Constructing Kamaji Puzzles | |
| Lubben, J. (Jelle) | Applying a Mixed-integer Evoutionary Strategy for the Configuration and Parameterization of a CMA-ES | |
| Noordover, K. (Kevin) | Analysis and Viualisation of Spatio-Temporal Hockey Data | |
| Numan, N. (Nels) | A comparative Performance Analysis of Feature Description Algorithms Implemented in Open CV | |
| Paul, V (Valerie) | Predicting the Discharge Date of Patients using Classification Techniques | |
| Renso, C. (Caio) | Multiobjective Optimization of Power Grid Resilience to Random and Targeted Attacks | |
| Rijn, V. (Vincent) van | Quantifying Fuzzer Performance on Spatial and Temporal Memory Errors | |
| Ronde, S.J.P.M. (Sander) | Detecting Anomalies with Recurrent Neural Networks | |
| Rook, J. (Jeroen) | Characteristics of Dangerous Passes in Soccer at Women’s EURO 2017 | |
| Scholman, R. (Renzo) | Autonomous Navigation of the Spherical Robot BB-8 | |
| Smeding, T.J. (Tom) | Fast Large-Integer Matrix Multiplication [IW] | |
| Smeyers, M. (Maarten) | A Browser-Based Graphical Editor for Reo Networks | |
| Smits, T. (Taco) | Robots with Vectors | |
| Spelier, P. (Pim) | The Complexity of Root-Finding in Orders [IW] | |
| Steffens, B. (Benjamin) | Dynamic Reductions for More Efficient Software Verification | |
| Taleb, R. (Rafi) | The Effect of Activation Functions and Network Configurations on the Performance of Handwritten Character Recognition | |
| Tetteroo, J. (Jaco) | Sentiment Mining on Chinese Product Reviews | |
| Verhoef, D. (Davey) | Determining Good Tactics for a Football Game using Raw Positional Data | |
| Vermeulen, W.D. (Wouter) | Toward a Massive Multiplayer Framework | |
| Voogt, M.A. (Mick) | Optimization of Metagenomics Analysis using Distributed Computing on LLSC | |
| Vos, L. (Levi) | Quantifying the Performance of Fuzzers in the Detection of Security Threats | |
| Wester, M. (Martijn) | Depth First Search Characterizations | |
| Zwanenburg, E. (Ewout) | Analyzing and Classifying Borderline Personality Disorder using Datamining Paradigms | |