35 entries found.
Student |
Thesis |
Content |
Beinema, E. | Energy Efficiency across Programming Languages Revisited | |
Browne, R. | Analyzing the Behaviour of Players in Soccer Prior to a Shot on Target. | |
Burggraaf, F | Predicting Scientic Impact | |
Damhuis, L. P. | Using the rectified Linear Unitactivation function in Neural networks for Clobber | |
Dijk, M. van | Agents for Kuhhandel | |
Dijkhuizen, T. van | OpenPhoneMap Het Bereik van Mobiele Zendmasten op de Kaart Gezet | |
Drogtrop, J. | Comparing Different Agents in the Game of Risk | |
Gopal, N.A.A. | Analyzing and classifying Borderline Personality Disorder using Datamining paradigms | |
Groeneveld, L.C. | Visualization of Patterns in Scrum Software Development | |
Haddou, N.A. | Learning Bayesian Networks for Causal Discovery from Medical Data | |
Jaegar, D. N. | Evaluating Protein Structure Prediction Algorithms | |
Janssen, E. | The Leprechaun Hatting Problem | |
Kleijn, Kelvin | Solving and Constructing Kamaji Puzzles | |
Lubben, J. | Applying a Mixed-integer Evoutionary Strategy for the Configuration and Parameterization of a CMA-ES | |
Noordover, K. | Analysis and Viualisation of Spatio-Temporal Hockey Data | |
Numan, N. | A comparative Performance Analysis of Feature description Algorithms Implemented in Open CV | |
Paul, V | Predicting the Discharge Date of Patients using Classification Techniques | |
Renso, C. | Multiobjective Optimization of Power Grid Resilience to Random and Targeted Attacks | |
Rijn, V. van | Quantifying Fuzzer Performance on Spatial and Temporal Memory Errors | |
Ronde, S. J. P. M. | Detecting Anomalies with Recurrent Neural Networks | |
Rook, J. | Characteristics of Dangerous Passes in Soccer at Women’s EURO 2017 | |
Scholman, R. | Autonomous Navigation of the Spherical Robot BB-8 | |
Smeding, T.J. | Fast Large-Integer Matrix Multiplication | |
Smeyers, M. | A Browser-Based Graphical Editor for Reo Networks | |
Smits, T. | Robots with Vectors | |
Spelier, P. | The Complexity of Root-Finding in Orders | |
Steffens, B. | Dynamic Reductions for More Efficient Software Verification | |
Taleb, R. | The Effect of Activation Functions and Network Congurations on the Performance of Handwritten Character Recognition | |
Tetteroo, J. | Sentiment Mining on Chinese product reviews | |
Verhoef, D. | Determining Good Tactics for a Football Game using Raw Positional Data | |
Vermeulen, W.D. | Toward a Massive Multiplayer Framework | |
Voogt, M.A. | Optimization of Metagenomics Analysis using Distributed Computing on LLSC | |
Vos, L. | Quantifying the Performance of Fuzzers in the Detection of Security Threats | |
Wester, M. | Depth First Search Characterizations | |
Zwanenburg, E. | Analyzing and classifying Borderline Personality Disorder using Datamining paradigms | |