| Student |
Thesis |
Content |
| Amatkasan, L. (Lohrenz) | Reconstructing and Smoothing Speed Skater Trajectories with Gaps and Overlap in Multi-Camera Motion Data | |
| Blommaert, M.A. (Maric) | Multi-Objective Optimization for Auto-Tuning GPU Kernels | |
| Druninck, L. van (Lennart) | On The Vulnerabilities of FPGAs to Power Hammering Circuits | |
| Fosu, E. (Ebenezer) | Efficiency of Stigmergic Communication Protocols in Multi-Agent Maze Searches | |
| Fransen, S. (Sven) | Between Service and Self: Probing Consiousness, Perspective, and Self-Preservation in Large Language Models | |
| Gerritse, R. (Renée) | From Attack Trees to Attack Graphs: Implementing Conversion and User Evaluation | |
| Goot, W. van der (Wessel) | Uncovering Malware Development Patterns: A Clustering Analysis of Pre-Deployment Malware | |
| Kraijenoord, M. (Marit) | Learning From Lifeguard Katwijk’s Incident Reports: Finding Patterns and Building a Predictive Model | |
| Lelipaly, J. (Joshua) | How to Solve and Generate Numberlink Puzzles Using SAT | |
| Neves Brito, R. das (Rivaldo) | Building an Experimental Learning Curve Database From Many Configurations of the Gradient Boosting Algorithm | |
| Ouwehand, V. (Valentijn) | Adversarial Honeypot Detection and Deployment with Reinforcement Learning | |
| Petrov, A. (Aleksandr) | Assessing Flight and Sensor Accuracy of the Crazyflie 2.1 | |
| Popele, S. van (Steven) | Attack Defence Trees in JSON: Design and Conversion | |
| Rodoe, E. (Eline) | Methods to Describe Tandem Repeats in DNA Sequences | |
| Said, M. (Mostafa) | From Logic to Code: How Philosophy Shaped the Birth of Computer Science | |
| Sin, C. Y. (Chuck) | A Comparison between Traditional and LLM Recommendation System Performance | |
| Taal, P. (Pollux) | A Heuristic Approach For Goal-Oriented Agent Navigation In A Continuous Environment | |
| Wisker, J. (Justin) | Finding the Best Balatro Start Decks Using a Tool that Calculates the Best Discards | |