416 entries found.
Student |
Thesis |
Content |
Alvarez Rodriguez, S.F. van | Static Security Analysis Methods in Android Systems: a Comparison | |
Bergman, P | Scalable Architecture for Event Management Systems | |
Blankestijn, M.A.N. | Polyomino Packing using a Tetris-like Ruleset | |
Blok, J. H. | Multi-valued Decision Variables and Redundant Coding in Evolutionary Algorithms | |
Boks, R.M. | Performance Comparison of Configurable Particle Swarm and Differential Evolution Algorithms | |
Bouman, J.Q. | Recovering from Controllers Failures in Software Defined Networks | |
Campmans, A.J. | (In)effciënte Bewijsstrategieën | |
Colli, M. | Dynamic Real-time Videostream Stitching Using Multiple Uncalibrated Cameras | |
Deering, G | Applications of Monte Carlo on the Board Game Six | |
Delzenne, M.J. | Optimizing the Citra Emulator by Decompiling Shader Machine Code | |
Dofferhof, R.M.J. | A Performance Evaluation of Platform-Independent Methods to Search for Hidden Instructions on RISC Processors | |
Domela Nieuwenhuis Nyegaard,D.O. | Improving Public Speaking Performance by Facial Emotion, Body Language and Speech Recognition based Feedback | |
Dubbeldam, S. | Using Program Animation to resolve misconceptions in K-12 students. | |
Flesher-Clark, A.C. | 3D Hand Pose Estimation on a Robotic Platform | |
Göebel, M.A. | Developing and Verifying Methods to Search for Hidden Instructions on RISC Processors | |
Graaf, S. de | Cracking the Mastermind Code | |
Hamer, V. den | Hiding in Plain Sight: How Location affects Memory Error Detectability by Fuzzers | |
Huijben, M. | Efficiently combining compiler-based zero-day defenses | |
Jonckheere, L.S. de | Efficiently Generating the Mandelbrot and Julia Sets | |
Jong, R.G. de | Comparing Two Algorithms for Finding Maximal Matchings in Bipartite Graphs | |
Kannangara, A. R. | Comparing Strategic Agents for Dominance | |
Maan, G.C. | Hardware Acceleration of Matrix Multiplication | |
Merckens, T. | A Further Look into Mouse Mazes | |
Meyer, S | Psychology-Inspired Memory Sampling in a Deep Q Network | |
Neuteboom, V.O. | Personalized Modeling of Training Load and Physical Capacity of an Elite Rower | |
Nolden, L.S.J. | Finding Seneca in Seneca | |
Peters, O. | Image Compression with Neural Networks | |
Poslavsky, V.J.A. | System for Analysing Off-the-ball Performance of Individual Football Players using Spatiotemporal Tracking Data | |
Sinnige, J.A. | GPS Referencing and Data Storage Manipulation | |
Strating, M.W. | Analysis of Submissions of the Dutch Olympiad for Informatics with a Special Focus on Heuristics | |
Swenne, M.M. | Solving SAT on Noisy Quantum Computers | |
Tijssen, L. | Analyzing Offensive Player- and Team Performance in Soccer Using Position Data | |
Turkenburg, R.T.C. | Greibach Normal Form for Weighted Context-Free Grammars | |
Varkevisser, F.E. | Using Monte Carlo Tree Search to Play Cops & Robbers | |
Vlasakker, R.A. van de | Bomb-cover Een verzamelingenoverdekkings-probleem in de Bombermanwereld | |
Voetter, R.F. | Volumetric Ray Tracing with Vulkan | |
Weijer, W. de | A Decision Procedure for Weighted Automata Equivalence | |
Zande, E.R. van der | Examining out of Bounds Defense Systems' Performance against Independent CVEs | |
Student |
Thesis |
Content |
Vermetten, D. | Position Detection Optimization in the Context of Sensor Based Location Systems | |
Baasdam R.W.H. | Numerics and Continuation for Reaction-Diffusion Equations | |
Beljaards, L. | AI agents for the abstract strategy game Tak | |
Bolster, Y. | Automatically finding the best blocking size for matrix multiplication | |
Borst, R.C.P. | Robust self-balancing robot mimicking | |
Brandt O. | Comparing Algorithms: Calculating the Minimal Coverability Set of Petri Nets | |
Buwalda, N. | Open Source Systems for Dialogue Systems | |
Cames van Batenburg D.F. J. | Identificaton of Transposable Element Insertion into the enod40 RNA | |
Castelein, K.J.B. | Determinization for Monte Carlo Tree Search n the Card Game Tichu | |
de Muinck Keizer, D. | A Control Flow Graph Generator for Java Code | |
Dekkers, C.H.J. | Creating Models of Interaction for a Video Wall | |
Dijk, S.J. van | Solving Puzzles using Cellular Automata | |
Draijer W. J.W. | Integrating, Structuring and Visualising Cancer Data | |
Etoeharnowo, T. | Neural Networks for Clobber | |
Fokkinga, D.B. | Towards Learning Software Models: making documentation easier | |
Hal, R.M. van | Finish Photo Analysis for Athletics Track Events using Computer Vision Techniques | |
Heijungs, S. | Tape-quantifying Turing Machines in the Arithmetical Hierarchy | |
Hoogenboom, C. | Using Probabilities to Enhance Monte Carlo Search in the Dutch Card Game Klaverjas | |
Jansen, B.A. | The state of Bufferbloat in the Netherlands | |
Jonkman, J.L. | Interacting with BigEye: Using Gesture-Based Input Methods to control Applications on a Videowall | |
Kesteloo, M.E. | Using Convolutional Autoencoders to Detect Anomalies in Sewer Images | |
Khalass,N. | Metaprogramming in Modern Programming Languages | |
Klijn,M. | A Perfect Information Scrabble Game | |
Martens, J.R.M. | ETA: A Modular Approach to Analyzing Time Series Data | |
Meerkerk, R. | Design, Analysis, and Optimization of an Embedded Processor | |
Meeuwsen,J. | Design and Implementation of 3D reconstruction from axial views on the Leiden Life Science Cluster | |
Muusse, I.J. | An Algorithm for Balancing a Binary Search Tree | |
Oost,K. | Analysing Data to Predict Processing Times of Vessels and Barges in Liquid Bulk Terminals | |
Out, N. F. | A Monte Carlo Strategy for the Game of Hive | |
Peters, L. J. | Utilizing a Tuple-Based Optimization Framework for Graph Algorithms | |
Putman, K. | Implementing an Interface for Virtual Input Devices into the MGSim Simulator | |
Riet, J.C.A. | Anomaly Detection with Deep Belief Networks | |
Ruijter, F.E.C. | Symbolic Regression of Implicit Functions | |
Schipper, L. | Compact descriptors for (near) duplicate image detection | |
Soelaksana, E. | Analyzing privacy awareness of Twitter users through their given location precision | |
Spaendonck, M. van | Aspects of Tectonic | |
Suanet, L. | Finding Anomalies in Sequential Data using Local Outlier Factor | |
Teunisse, J. | Agents for the Card Game of Hearts | |
Verweij, G. J. W. | Comparison of the Effectiveness of Shared Memory Optimizations for Stencil Computations on NVIDIA GPU Architectures | |
Waal, P.R. v/d | A Study of Different Approaches for Improving the Stitching of Spherical Panoramas | |
Zaeem, S.A.F. | Diverse Subgroup Discovery for Big Data | |
Zandvliet, J.J.M. | Vectorized Sparse Matrix Kernels using Hybrid Data Layouts | |
Zwitser, l. | Quantum Computing | |