39 entries found.
Student |
Thesis |
Content |
Alvarez Rodriguez, S.F. (Sebastiaan) | Static Security Analysis Methods in Android Systems: a Comparison | |
Bergman, P. (Patrick) | Scalable Architecture for Event Management Systems | |
Blankestijn, M.A.N. (Max) | Polyomino Packing using a Tetris-like Ruleset | |
Blok, J. H. (Jaap) | Multi-valued Decision Variables and Redundant Coding in Evolutionary Algorithms | |
Boks, R.M. (Rick) | Performance Comparison of Configurable Particle Swarm and Differential Evolution Algorithms | |
Bouman, J.Q. (Jeffrey) | Recovering from Controllers Failures in Software Defined Networks | |
Campmans, A.J. (Tony) | (In)effciënte Bewijsstrategieën | |
Colli, M.M. (Mitchel) | Dynamic Real-time Videostream Stitching Using Multiple Uncalibrated Cameras | |
Deering, G. (Galen) | Applications of Monte Carlo on the Board Game Six | |
Delzenne, M.J. (Mees) | Optimizing the Citra Emulator by Decompiling Shader Machine Code | |
Dofferhoff, R.M.J. (Rens) | A Performance Evaluation of Platform-Independent Methods to Search for Hidden Instructions on RISC Processors | |
Domela Nieuwenhuis. D.O. (Damian) | Improving Public Speaking Performance by Facial Emotion, Body Language and Speech Recognition based Feedback | |
Dubbeldam, S. (Stef) | Using Program Animation to resolve misconceptions in K-12 students. | |
Flesher-Clark, A.C. (Alec) | 3D Hand Pose Estimation on a Robotic Platform | |
Göebel, M.A. (Michael) | Developing and Verifying Methods to Search for Hidden Instructions on RISC Processors | |
Graaf, S. (Sylvester) de | Cracking the Mastermind Code | |
Hamer, V. (Vincent) den | Hiding in Plain Sight: How Location affects Memory Error Detectability by Fuzzers | |
Huijben, M. (Marcel) | Efficiently combining compiler-based zero-day defenses | |
Jonckheere, L.S. (Luc) de | Efficiently Generating the Mandelbrot and Julia Sets | |
Jong, R.G. (Rachel) de | Comparing Two Algorithms for Finding Maximal Matchings in Bipartite Graphs | |
Kannangara, A.R. (Aaron) | Comparing Strategic Agents for Dominance | |
Maan, G.C. (Gijsbert) | Hardware Acceleration of Matrix Multiplication | |
Merckens, T. (Tim) | A Further Look into Mouse Mazes | |
Meyer, S (Samuel) | Psychology-Inspired Memory Sampling in a Deep Q Network | |
Neuteboom, V.O. (Victor) | Personalized Modeling of Training Load and Physical Capacity of an Elite Rower | |
Nolden, L.S.J. (Luuk) | Finding Seneca in Seneca | |
Peters, O.R.L. (Orson) | Image Compression with Neural Networks | |
Plug R.B.F. (Ruud) | ECG Anomaly Detection Using Long Short-Term Memory based Recurrent Neural Networks | |
Poslavsky, V.J.A. (Victor) | System for Analysing Off-the-ball Performance of Individual Football Players using Spatiotemporal Tracking Data | |
Sinnige, J.A. (Jelle) | GPS Referencing and Data Storage Manipulation | |
Strating, M.W. (Martijn) | Analysis of Submissions of the Dutch Olympiad for Informatics with a Special Focus on Heuristics | |
Swenne, M.M. (Marijn) | Solving SAT on Noisy Quantum Computers | |
Tijssen, L. (Lars) | Analyzing Offensive Player- and Team Performance in Soccer Using Position Data | |
Turkenburg, R.T.C. (Ruben) | Greibach Normal Form for Weighted Context-Free Grammars [IW] | |
Varkevisser, F.E. (Florian) | Using Monte Carlo Tree Search to Play Cops & Robbers | |
Vlasakker, R.A. (Rintse) van de | Bomb-cover Een verzamelingenoverdekkings-probleem in de Bombermanwereld | |
Voetter, R.F. (Robin) | Volumetric Ray Tracing with Vulkan | |
Weijer, W. (Wessel) de | A Decision Procedure for Weighted Automata Equivalence [IW] | |
Zande, E.R. (Elgar) van der | Examining out of Bounds Defense Systems' Performance against Independent CVEs | |