64 entries found.
Student |
Thesis |
Content |
Adelaar, B. (Branco) | The Greeting Problem - How to Have People Greet One Another in a Rectangular Room | |
Adwan, A. (Amr) | Impact of Hyperparameters on Model Performance in Split Learning | |
Akker, T. van den (Tristan) | Using Trains for Ice Block Puzzles | |
Baarsen, S.T.A.N. van (Stan) | Using Binary Decision Diagrams for Exploring Graph State Orbits | |
Bakker, M. (Michaël) | Creating Agents for the Card Game Rikken | |
Baron, B.R. (Björn Roy) | Exception Handling Support for the Cranelift Code Generator | |
Beerens, P. (Pjotr) | Families of Defining Polynomials of Finite Fields through Prime Power Torsion on Elliptic Curves | |
Bergsma, T. (Teun) | Monte Carlo Methods for the Board Game Patchwork | |
Biervliet, D. (Darryn) | Reinforcement Learning with Partitioned Quantum Circuits | |
Boon, M. (Milan) de | Teacher Experiences on the New Digital Literacy Learning Trajectory in Primary School Education | |
Bron, K. (Koen) | Collaborative Web-Based Tool Support for IAMA Assessments on Public Sector Algorithms | |
Brouwer, I. (Ivor) | Quantum Game Development Using Unitary | |
Collenburg, S. van (Sven) | Automated Machine Learning for Sea Ice Concentration Charting | |
Combé, M. (Martijn) | Extending Mixed-Scale Dense CNNS for Classification | |
Dam, S. van (Sven) | A Flexible, Template-Driven Generation Framework for Model-Driven Engineering | |
Deursen, A. van (Aník) | The Role of Instruction Method in an Educational Game | |
Deutz, F. (Fenna) | Implementing a Storage Solution Sacilitating Future Analysis of ADTs Generated by the ADT Web App | |
Dongen, M. van (Maxime) | The Teaching Methods and Strategies of Programming Education within High Schools in The Netherlands | |
Drenth, O. (Ole) | Generating Abdominal CT Scan Data for Pancreatic Cancer Detection Using Latent Diffusion | |
Duivenvoorde, W. (Walt) | Simulating Differential Equations using Hybrid Digital-Analog Computers | |
Fazlija, R. (Reshit) | Development of User-Friendly Interfaces In a Technical Tool Used To Create Attack Defense Trees for Non-Technical Users | |
Frericks, M. (Martijn) | Optimizing the Energy Efficiency of the Nvidia Jetson | |
Griffioen, D. (Daan) | TimeSync: Deepfake Detection with Temporal Lip Sync | |
Groeneweg, T. (Thijs) | Adapting the CoThought Pipeline for Training a BabyLM on Dutch Data | |
Halevy, G. (Giovanni) | Transferring Video Captioning Models from Human to Animal Data | |
Hebinck, J. (Jayme) | ADT Create: Determination of Equivalence and Satisfiability of Attack-Defense Trees | |
Hermans, I.F. (Iskandar Faisal) | Soft Skills in Computer Science | |
Heslenfeld, N. (Niels) | Solving and Generating Fobidoshi Puzzles | |
Hofstra, T. (Tobias) | Developing an Auto-Tunable GEMM Kernel that Utilizes Tensor Cores | |
Honig, S. (Sander) | On Frogs and Swings: Analyzing Gender Differences in Language Use of Children by Examining the Focus of a Gender-Predicting BERT Model | |
Hoogd, P. de (Pieter) | an Effective User Experience for Prototype Generation in Model Driven Engineering | |
Hulsebosch, H. (Hugo) | An Exploration of C2 Server Fingerprinting Capabilities with Probed HTTP Data | |
Janssen, M. (Maxim) | Optimally Weighted Machine Learning Model Ensembles using Quadratic Optimization in Python | |
Jong, C. (Casper) de | Can the Waves of the Sea Speak to Us? | |
Jong, T. (Tim) de | Optimizing RISC-V Binaries Using LLVM-based Same-Architecture Binary Translation | |
Kiele, R. (Rutger) | Hartenjagen met Monte Carlo Tree Search | |
Klaver, A. (Arie) | LLM Personalization Using Summarization: A Robotic Fitness Coach Case Study | |
Koene, E. (Esther) | Determining game values of Hackenbush with Monte Carlo Tree Search | |
Kroon, M. (Margriet) | Enhancing Computational Learning and Enthusiasm in Scouts through Unplugged Activities | |
Kuiper, D. (Daniel) | Automating Dynamic Analysis of Python Proof of Concept Exploits | |
Leito, R. (Roderick) | Integration of the EQ5D PROM Questionnaire Into a Natural and Unobtrusive Conversation Using a RASA-driven Chatbot | |
Nehoray, M. (Mai) | AI-Driven Creativity: The Power of Dual-Agent Systems | |
Noteborn, D. (David) | Creating a language to describe Turing machines On creating a Towards Turing machine compiler | |
Ooijen, I. van (Imke) | Optimizing AES for RISC-V Cores | |
Opdam, C. (Chika) | Automatic Action Detection in Cell Imaging | |
Roestenburg, M. (Melvin) | Optimal Graph-State Preparation for Quantum Computers with SAT-Solvers | |
Roos, R. (Renz) | Ice Skater Detection Using Computer Vision | |
Rooskens, T. (Thomas) | Comparing a Realistic Player for the Game The Great Dalmuti Against a Model Player with Superhuman Capabilities | |
Saint-Genez, A. (Arnaud) | Reinforcement Learning in Inventory Management: Addressing Finite Shelf Life and Lead Time in Infinite Horizon Problems | |
Selles, L.H. (Lars) | Privacy-preserving Explainable AI in the Active Security Model | |
Serraris, A. (Alexander) | Assessing Corporate Communication Alignment with Stated Goals Using Large Language Models | |
Shreef, B. (Barmad) | Illuminating the EC-Bestiary: Conceptual Analysis and Benchmarking of the Invasive Weed Optimization Algorithm | |
Smulders, S. (Samuel) | Automated Feature Selection for Unsupervised Anomaly Detection with Internal Evaluation Strategies | |
Son, T. (Tijn) van | Evaluating Whale Optimization Algorithm: Mathematical Rigor, Reproducibility and Performance | |
Spoel, I. van der (Ivar) | Illuminating the EC-bestiary: Conceptual Analysis and Benchmarking of the Coyote Optimization Algorithm | |
Sprangers, H. (Huib) | A Type System for Machine Learning Pipelines | |
Staal, R. (Robin) | Decoding the Code-breaking Game of Symble | |
Tu, S. (Siwen) | Explore the Impact of Context in News Image Captioning - CONFIDENTIAL | |
Veraar, M. (Max) | A Quantum-Inspired Algorithm for Galaxy Classification | |
Verwaal, T. (Thomas) | Analysing the Maximum and Minimum Scores in Azul and the Orders in Which They can be Achieved | |
Visser, M. (Max) | Using Image Captioning Model for Event and Object Recognition in Football Images | |
Willemsens, L. (Lucas) | Utilising Use Case Models For Multi-actor Prototype Generation | |
Wit, N. de (Niels) | Power Leakage of AES Implementations | |
Zuurmond, L. (Lucas) | Probably Approximately Correct Automata Extraction from Neural Networks | |