39 entries found.
Student |
Thesis |
Content |
Alvarez Rodriguez, S.F. van | Static Security Analysis Methods in Android Systems: a Comparison | |
Bergman, P | Scalable Architecture for Event Management Systems | |
Blankestijn, M.A.N. (Max) | Polyomino Packing using a Tetris-like Ruleset | |
Blok, J. H. | Multi-valued Decision Variables and Redundant Coding in Evolutionary Algorithms | |
Boks, R.M. | Performance Comparison of Configurable Particle Swarm and Differential Evolution Algorithms | |
Bouman, J.Q. | Recovering from Controllers Failures in Software Defined Networks | |
Campmans, A.J. | (In)effciënte Bewijsstrategieën | |
Colli, M.M. (Mitchel) | Dynamic Real-time Videostream Stitching Using Multiple Uncalibrated Cameras | |
Deering, G. (Galen) | Applications of Monte Carlo on the Board Game Six | |
Delzenne, M.J. | Optimizing the Citra Emulator by Decompiling Shader Machine Code | |
Dofferhoff, R.M.J. | A Performance Evaluation of Platform-Independent Methods to Search for Hidden Instructions on RISC Processors | |
Domela Nieuwenhuis Nyegaard,D.O. | Improving Public Speaking Performance by Facial Emotion, Body Language and Speech Recognition based Feedback | |
Dubbeldam, S. | Using Program Animation to resolve misconceptions in K-12 students. | |
Flesher-Clark, A.C. | 3D Hand Pose Estimation on a Robotic Platform | |
Göebel, M.A. | Developing and Verifying Methods to Search for Hidden Instructions on RISC Processors | |
Graaf, S. de | Cracking the Mastermind Code | |
Hamer, V. den | Hiding in Plain Sight: How Location affects Memory Error Detectability by Fuzzers | |
Huijben, M. | Efficiently combining compiler-based zero-day defenses | |
Jonckheere, L.S. de | Efficiently Generating the Mandelbrot and Julia Sets | |
Jong, R.G. de | Comparing Two Algorithms for Finding Maximal Matchings in Bipartite Graphs | |
Kannangara, A.R. (Aaron) | Comparing Strategic Agents for Dominance | |
Maan, G.C. | Hardware Acceleration of Matrix Multiplication | |
Merckens, T. (Tim) | A Further Look into Mouse Mazes | |
Meyer, S (Samuel) | Psychology-Inspired Memory Sampling in a Deep Q Network | |
Neuteboom, V.O. | Personalized Modeling of Training Load and Physical Capacity of an Elite Rower | |
Nolden, L.S.J. | Finding Seneca in Seneca | |
Peters, O. | Image Compression with Neural Networks | |
Plug R.B.F. (Ruud) | ECG Anomaly Detection Using Long Short-Term Memory based Recurrent Neural Networks | |
Poslavsky, V.J.A. | System for Analysing Off-the-ball Performance of Individual Football Players using Spatiotemporal Tracking Data | |
Sinnige, J.A. (Jelle) | GPS Referencing and Data Storage Manipulation | |
Strating, M.W. | Analysis of Submissions of the Dutch Olympiad for Informatics with a Special Focus on Heuristics | |
Swenne, M.M. (Marijn) | Solving SAT on Noisy Quantum Computers | |
Tijssen, L. | Analyzing Offensive Player- and Team Performance in Soccer Using Position Data | |
Turkenburg, R.T.C. | Greibach Normal Form for Weighted Context-Free Grammars | |
Varkevisser, F.E. (Florian) | Using Monte Carlo Tree Search to Play Cops & Robbers | |
Vlasakker, R.A. van de | Bomb-cover Een verzamelingenoverdekkings-probleem in de Bombermanwereld | |
Voetter, R.F. (Robin) | Volumetric Ray Tracing with Vulkan | |
Weijer, W. de | A Decision Procedure for Weighted Automata Equivalence | |
Zande, E.R. van der | Examining out of Bounds Defense Systems' Performance against Independent CVEs | |