Student |
Thesis |
Content |
Altfeld, L. (Leon) | Multiobjective Bayesian Hyperparameter Optimization for a Traveling Salesman Problem | |
Badloe, V. (Vrinda) | Relevant e-health application factors for the HHQA-model | |
Bayraktar, S. (Serdar) | Phonetic and Semantic Alignment of Spoken Language: Conceptual Understanding of Languages without Text | |
Cotino, T.C. (Tristan) | Investigating the Effectiveness of Complementary NNENUM Portfolios for Neural Network Verification Using Auto-Verify | |
Daleman, L. (Luuk) | Reviewing the Educational Value of the ChocoPy Compiler Framework | |
Gibb, H. (Hannah) | Usability Optimisation for Fundamental Rights Assessment of Algorithms | |
Haasdijk, T. (Tim) | Evaluating The Impact of Integrating Domain-Specific Assumptions Into Auto-sklearn | |
Hobrecker, F.J. (Francesca) | Solving the Bounded Distance Decoding Problem - A Generalization of Barnes-Wall Lattice Decoding and Its Application to Tensor Hexagonal Lattices | |
Jong, D. de (Daan) | Monte Carlo Tree Search with Contextual Bandits | |
Raven, J. (Jip) | Completeness and Decidability of (Guarded) Kleene Algebra (with Tests) under the Hypothesis e = 0 | |
Rijnfrank, J. (Joris) | Finding the Sources of Vulnerable Code Patterns | |
Stevens, P. (Pieter) | SuperCode A Step Towards Sustainable Algorithms Using SLMs | |
Stokkermans, V. (Valentijn) | Optimizing and Profiling the Preprocessing Speed of the Contraction Hierarchies Algorithm | |
Straathof, H. (Hanna) | Solving and generating Kuroshuto puzzles | |
Timman, R. (Roy) | Generating CT Scan Images of the Heart Using Generative Adversarial Networks | |
Treffers, B. (Bas) | PassGAN and Hashcat - A Look at How Traditional Password Crackers Can Be Used to Complement PassGAN | |
Visser, O. (Olivier) | Radio Interference Monitoring with Low-end AI-hardware | |
Wekken, M. van der (Miguel) | Algorithms for Rummikub Puzzles | |
Wierenga, R. (Rick) | Optimizing Automated, Low-Volume Liquid Transfers | |