Student |
Thesis |
Content |
Altfeld, L. (Leon) | Multiobjective Bayesian Hyperparameter Optimization for a Traveling Salesman Problem | |
Asraoui, A. (Adam) | Guiding Collaboration: Exploring Teaching Assistants’ Views on Group Work in Higher Computer Science Education | |
Badloe, V. (Vrinda) | Relevant e-health application factors for the HHQA-model | |
Bayraktar, S. (Serdar) | Phonetic and Semantic Alignment of Spoken Language: Conceptual Understanding of Languages without Text | |
Brown, M.C. (Mark) | Three-player Combinatorial Games | |
Chatterjee, S. (Soham) | Synthetic Data Generation for Lung Tumor Detection: A Comparison of StyleGAN3 and Latent Diffusion | |
Cotino, T.C. (Tristan) | Investigating the Effectiveness of Complementary NNENUM Portfolios for Neural Network Verification Using Auto-Verify | |
Daleman, L. (Luuk) | Reviewing the Educational Value of the ChocoPy Compiler Framework | |
Dekker, T.W. (Thijs) | Godapt: Introducing General Video Game AI to the Godot Game Engine | |
Elderbroek, L. (Liam) | Constructing a Forward-Looking Adaptation of Retrograde Analysis Through the Lens of Onitama | |
Farzad, A. (Alette) | Teaching the Importance of Critically Reviewing the Output of Generative AI through Games | |
Georghiou, C. (Christos) | Topology of Decentralized Social Networks: A Case Study of Bluesky | |
Gibb, H. (Hannah) | Usability Optimisation for Fundamental Rights Assessment of Algorithms | |
Haasdijk, T. (Tim) | Evaluating The Impact of Integrating Domain-Specific Assumptions Into Auto-sklearn | |
Hassan, N. (Nour) | Monte Carlo Methods and Algorithms for the Card Game Hanamikoji | |
Heuvel, A.J. van den (Jonathan) | VeryBadUSB: Expanding the Capabilities of BadUSB with USB Type-C | |
Hobrecker, F.J. (Francesca) | Solving the Bounded Distance Decoding Problem - A Generalization of Barnes-Wall Lattice Decoding and Its Application to Tensor Hexagonal Lattices | |
Hoor, O. ten (Olivier) | Exploring the Effectiveness of SMT Solving for Proving and Disproving the Existence of Mutually Unbiased Bases | |
Jansen, T. (Thomas) | Analyzing Optimization Variables in GPU Kernel Tuning | |
Jong, D. de (Daan) | Monte Carlo Tree Search with Contextual Bandits | |
Raven, J. (Jip) | Completeness and Decidability of (Guarded) Kleene Algebra (with Tests) under the Hypothesis e = 0 | |
Rijnfrank, J. (Joris) | Finding the Sources of Vulnerable Code Patterns | |
Salden, R.C. (Robert) | Developing a Digital Twin of a Food Industry Imaging Setup in Unity3D | |
Santos Cordeira, P. dos (Phoebe) | Object Detection and Rotation Estimation Using IntelRealsense Depth Camera | |
Schagen, N. van (Niels) | Developing a Backend Compiler for PDE Simulation on the Anadigm AN231E04 Hybrid Computer | |
Smedeman, R. (Ronan) | Anomaly Detection on Pollutant Levels in European Air Quality | |
Soest, D. van (Domen) | A Data-Driven Approach to Determine Personalised Stage Suitability | |
Stevens, P. (Pieter) | SuperCode A Step Towards Sustainable Algorithms Using SLMs | |
Stokkermans, V. (Valentijn) | Optimizing and Profiling the Preprocessing Speed of the Contraction Hierarchies Algorithm | |
Straathof, H. (Hanna) | Solving and generating Kuroshuto puzzles | |
Tali, T.A. (Taylan Ali) | Security Vulnerabilities in LLM-Generated Code: Analyzing Programming Queries and Their Security Risk | |
Timman, R. (Roy) | Generating CT Scan Images of the Heart Using Generative Adversarial Networks | |
Treffers, B. (Bas) | PassGAN and Hashcat - A Look at How Traditional Password Crackers Can Be Used to Complement PassGAN | |
Visser, O. (Olivier) | Radio Interference Monitoring with Low-end AI-hardware | |
Wekken, M. van der (Miguel) | Algorithms for Rummikub Puzzles | |
Wierenga, R. (Rick) | Optimizing Automated, Low-Volume Liquid Transfers | |
Wiskerke, J. (Jamie) | Probability theory in the Category of Diffeological Spaces | |
Zuijderduijn, T. (Tim) | Fineman’s Parallel Digraph Reachability in Practice | |
Zwet, J. van der (Jasper) | Reverse Multiplication Friendly Embeddings over Ring Extensions and their Application to Multiparty Computation | |