Bachelor's Theses

On this page we present links to the bachelor's theses that have been produced by students of Computing Science and students of Informational Sciences at the Radboud University.


2024 2023 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006


2024

  1. Adam Farrag: Stellar Classification of Main Sequence Stars using Vision Transformers
  2. Alex Feenstra: Proving Correctness of Cryptographical Primitives through While
  3. Andrei-Radu Milicin: Investigating the impact of GitHub repository features on popularity
  4. Andrei-Sorin Ujica: Summarization for Long-Form Documents
  5. Anne den Hartog: Database energy benchmarks - an evaluation
  6. Artur Wiadrowski: Visualising divide-and-conquer algorithms with self-similar fractals
  7. Bryan Rinders: Integrating PostGuard into Filesender
  8. Casper de With: choosing words algorithmically makes texts more beautiful
  9. Cato van Ojen: Think of your MEDS - Applying the MPC-in-the-head paradigm to MEDS for reduced signature size
  10. Chris Musteata: Detecting Brandjacking-Based Malvertising
  11. Clemens van den Braak: Predicting time intervals between epilepsy hospital checkups
  12. Daan Smeets: WhisperSage - Making Side-Channel Analysis for Post-Quantum Cryptography Accessible
  13. Eline Stehouwer: Measuring the energy overhead of computer language features
  14. Esther Kinderman: Evaluating and improving the accessibility of the NS ticket machine for illiterate users
  15. Faycel Harrathi: Fine-tune Whisper for Speaker Recognition
  16. George-Nicolas Nadejde: Improving AprèsSQI-s cost model for verification
  17. Hugo Hakkenberg: Utilizing machine learning and SHAP to uncover key variables for a healthier lifestyle in Type 2 Diabetes management
  18. Illya van Knippenberg: Implementations based on weighted Finite State Automata improve efficiency of Negative Selection Algorithms
  19. Imke Huisink: Data analysis on motivation for lifestyle changes
  20. Ivo Melse: Sufficient Conditions for k-completeness using Observation Trees and Apartness
  21. Jaap Aarts: Implementing in-Database Similarity Search
  22. Jasmijn Bookelmann: FPGA High Performance Computing
  23. Jasper Laumen: Minimising Q-Weighted Finite Automata over Z
  24. Jen Dusseljee: Optimising Lung Cancer Detection by Oversampling Malignant Nodules
  25. Jermo van Oort: Differential fuzzing of stateful systems using FlexFringe
  26. Josja Koopmans: Distributed Virtual Waiting Room
  27. Julian Put: Learning Mealy Intersections
  28. Kutay Sezer: An Algorithmic Approach to Fixing Friet
  29. Lars Esselink: The state of OSS-Fuzz
  30. Lavika Singhal: Map your Neighborhood - Assessing an algorithm for solving the Isomorphism of Polynomials problem
  31. Luc Schrauwen: A SaC plotting visualisation integration in Jupyter
  32. Madelief Slaats: Exploring the Usability of Recursive Morphism Duality in the Fast Fourier Transform - An Implementation in Haskell
  33. Mark de Jong: Exploring sustainability in the computing science bachelor at Radboud University
  34. Martijn Sanders: The Lsharp Algorithm for Deterministic Finite Automata
  35. Martijn van de Wouw: Generalisations in Equivalence Proofs Using Rewriting Induction and Logically Constrained Term Rewriting Systems
  36. Michel van Wijk: Evaluating Reinforcement Learning Strategies in the Card Game Gin Rummy
  37. Mika Sipman: Constructing Zero-Knowledge Proof Systems on Sudoku Variants
  38. Mikhail Ushakov: Compiling While++ into Logically Constrained Term Rewriting Systems
  39. Milan Pullens: Using Large Language Models as an Information Retrieval Tool on Safety Data Sheets
  40. Mitchell Boesveld: From Multi Server Authentication to Multi Server Authorisation
  41. Mohamad Naseb Aljalab: Oracle Component Analysis on Pyannote speaker-diarization-3.1 Pipeline
  42. Nathalie Saba: Enhance engagement from middle school students with music as a context
  43. Nemo Ingendaa: Analysis and exploration of polynomial activation function - softRmax
  44. Nick van Oers: Pattern as an SAT problem
  45. Niels Boegman: Determining the core of the web
  46. Nikolai Savulkin: Investigating effects of electromagnetic noise on screen gleaning side-channel attack against HDMI connections
  47. Philipp Küppers: Exploring the Chemical Universe with Spiking Neural Networks
  48. Pim Leerkes: Finding New Asymptotic Bounds on the Minimal Optimal Strategy Sets of Parametric MDPs
  49. Rijk Kregting: Designing a Visualisation Tool for Energy Consumption Models in IT
  50. Robin Put: Efficient Elastic Alignment in CUDA
  51. Rowan van Rooijen: Model Learning of Lexers
  52. Ruben te Morsche: Finding the Optimal Backdoor Data Poisoning Attack
  53. Rutger Broekhoff: Formally defining the semantics for the Nix expression language
  54. Sabin-Gabriel Iacob: Polyhedra Folding Algorithms
  55. Samuel Padron: Predicting DNA sequence pair similarity with HyenaDNA
  56. Stijn Vandenput: Lock-based Authenticated Encryption in a Multi-user Setting
  57. Sven Meijboom: Enhancing Large Language Models for Structured Data Extraction
  58. Taha Hammouchi: Intrusion Detection System for 5G Core Systems
  59. Teun van Gisteren: Filtered Feelings - Investigating Frequency Filters in Speech Emotion Recognition Models
  60. Thomas Ilmer: Bot Board - Design and preliminary evaluation of a dashboard visualizing GitHub bot activity
  61. Vincent Dankbaar: The disappearance of constant-time execution
  62. Wout van den Berg: An analysis of Javascript sendBeacon method
  63. Yiğit Batuhan Yiğin: Developer-ChatGPT Conversations - Analyzing Developer Prompts
  64. Yori Jonkman: Evaluating The Use Of Entity Triggers As Explanations In Named Entity Recognition
  65. Yousif Badawi: Can we use Large Language Models to improve Automatic Speech Recognition and if so by how much

2023

  1. Alex Bui Nhat Linh: Analysing open-source 5G core networks for TLS vulnerabilities and 3GPP compliance
  2. Alperen Özkurt: Detection of AI-Made Artworks With One-Class Classification Algorithms
  3. Barıs Cagrı Atik: NFC - Exploring the Current NFC Market - Assessing Security Vulnerabilities and Potential Attacks
  4. Bart Veldman: Multi-user security analysis of three finalists of the NIST ligthweight cryptography competition
  5. Boudewijn van Gils: 3D Fishualizer
  6. Bram Kapteijns: Evaluating as a human
  7. Bram van Veenschoten: Syntax and Type Checking of Truncated Type Theory
  8. Bryan van de Ven: Cheating and anti-cheat system action impacts on user experience
  9. Camile Lendering: Inside the Cookie Jar - Tracking Consent in Digital Advertising
  10. Casper Fabritius: Level 1 BLAS routines in SaC
  11. Dick Blankvoort: Implementing Patch Theories in Homotopy Type Theory
  12. Dion Bremer: Visual Programming with the TopHat Builder
  13. Dirk Doesburg: Signatures in IRMAseal
  14. Ege Sarı: Improving Entity Linking Systems With DuckDB
  15. Elianne Heuer: Predicting wine prices using weather data
  16. Els de Haan: Differential Cryptanalysis of the SIMON block cipher
  17. Esther Shi: Developing a fallback decryption method for Postguard
  18. Falko Jansen: Deep Learning for Video Game Music Generation
  19. Felix Mölder: An investigation of the nested subset differential attack on the lifted unbalanced oil and vinegar signature scheme
  20. Fouad Lamsettef: Extending ProFuzzBench - A Benchmark for Stateful Fuzzers
  21. Gabriele Serafini: Fast And Furious - Implementing Optuna and Early Stopping in CNN-based SCA
  22. Gabriël Krouwel: Investigating the behaviour of IoT devices undergoing a deauthentication attack and its countermeasures
  23. Gijs Kopmeiners: The landscape of (un)balanced choices in cookie consent dialogues in Europe
  24. Harm Jacobs: Developing a book recommendation system
  25. Harm Roukema: Fuzzing JSON API Clients
  26. Henk Berendsen: Leakage Resilience of the Suffix Keyed Sponge
  27. Jasper Hage: Comparing the performance of MLPs in side channel attacks with different dataset - architecture customizations
  28. Jelle Medendorp: Stealth Acoustic Communication Application
  29. Jonathan Jagt: Security analysis of a TETRA Base Station air interface implementation
  30. Joost Grunwald: Stronghold - Automating corporate security
  31. Jorn Heibrink: Antivirus and EDR bypasses for initial access
  32. Jorrit de Boer: Solving Robust Reachability Using Quantified Boolean Formulas
  33. Julian van der Horst: Backdoor attack on deep neural networks using inaudible triggers
  34. Kevin van de Glind: Control Improvisation for infinite regular languages and feature-based parameters
  35. Leon Zhang: The potential of user experience design in countering email-based social engineering attacks
  36. Lucas van Kasteren: Misusing browsers login managers for data exfiltration by third parties
  37. Luuk Maas: Extending Matrix's Functionality in a Secure and Sustainable Way
  38. Maikel Jans: An Accompaniment Chatbot for People Onboarding to Open-Source Software Projects
  39. Marco Sousa-Poza: Subjective Well-Being and Temperature
  40. Marijn van Wezel: Formalizing the query language of Semantic MediaWiki
  41. Mark Fijneman: Fuzzing open source OPC UA implementations
  42. Menzo van Kessel: Achieving multiparty deadlock-free communication through linear typing
  43. Michiel Kraan: Bit-scale instead of byte-scale integer arrays in C
  44. Mick van Beijnen: Unsupervised Topic-Based Sentiment Analysis for Twitter
  45. Niels Feij: Karatsuba Algorithm for multiplication of Linearized Polynomials
  46. Norbert Boudens: Optimizing Elephant v2 for ARMv7-M
  47. Pepijn van Grunsven: Attacking the power grid by minimizing the IPv6 search space
  48. Pien van den Abeele: Designing and building a 5G security learning platform
  49. Quinn Ketelaars: A Linear Cryptanalysis of the DST40 Block Cipher
  50. Quinten Kock: Efficiently calculating reachability probabilities in Markov chains
  51. Quintine Sol: Demystifying Black-Box Survival Models
  52. Rick Litjens: Extracting firmware from flash memory chips
  53. Rico te Wechel: Bridges as an SMT problem
  54. Robin Foekens: Security of the Sponge Construction with a Random Transformation
  55. Rutger Dinnissen: Semantics of Languages with Goto
  56. Simcha van Collem: Verifying a Barrier using Iris
  57. Stefan Weijers: A feasibility study on analyzing and predicting client-side energy consumption of web browsing
  58. Stef Gijsberts: Prusti in Practice - A case study of using the Prusti auto-active program verifier for Rust
  59. Sven van der Post: Accessible Process Mining - Developing a Business User Application Utilizing the Heuristic Miner Algorithm
  60. Tea Coroş: The security risks of unverified and recycled email addresses
  61. Thijs de Jong: Mosaic as a SAT problem
  62. Thomas Broekman: Review of HLS Toolchain - Bringing Flexibility and Performance to Software Engineers
  63. Thomas Rhemrev: Creating Better Error Messages by Improving Their Presentation
  64. Tomas Woldu: Tackling the Far Output Distinction Problem
  65. Tygo Francissen: Exploring Feature Importances for Predicting Flight Delays Using Machine Learning Algorithms and Transfer Learning
  66. Walter Levens: Can a smartwatch measure sleep onset
  67. Willem Medendorp: Discovering the jump - Extending automated Kubernetes security assessment
  68. Wouter Doeland: Automated Formal Proofs Verification and Analysis of Security Protocols

2022

  1. Abdulkarim Abdulkadir: Bidirectional Context-Sensitive DGA Detection Using DistilBERT
  2. Abel Lucassen: Weighted Negative Selection
  3. Alexander Wolters: Formalizing the C preprocessor
  4. Alexandros Banos: WTFS - WebTorrent File System
  5. Alex van der Hulst: Exploring the difference between 2DFA and DFA for G-automata
  6. Anda Zāle: The Extent of Data Gathering by Third Parties on Dutch Health Websites
  7. Andrea Minichová: MM1T Learner for the 4-Way Handshake Protocol
  8. Bas van der Linden: A Component Analysis of Neural Network Architectures for Spectral based Audio Source Separation
  9. Cas Visser: Exploring Adaptive Experiments
  10. Ciske Harsema: A security analysis of the TP-Link TL-WR802N Router
  11. Daniël Vos: Data Freshness in Booking Support Systems
  12. Dante van Gemert: Task Oriented Programming in Lua
  13. Elina Antonova: mTask semantics and its comparison to TopHat
  14. Floris Valentijn: Systematic Analysis on the effect of 4G LTE Reconfiguration Settings on Measurement Report Generation
  15. Gijs Thuis: Comparing shallow autoencoders to normalization standardization and PCA as preprocessing step for outlier detection
  16. Hamzah Al Zubi: GASCAR - Genetically Automated Synthesizer Configuration for Audio Replication
  17. Hans Lous: The Influence of Graph Metrics on the Performance of Pathfinding Algorithms
  18. Iwan Litjens: An MCTS-based AI playing The Crew
  19. Jelmer Firet: Acyclic Push-Relabel
  20. Jelte Smits: Stop the infodemic - Designing and evaluating a misinformation warning mechanism based on expert voting
  21. Joshua Steinmann: Optimizing Kubernetes Cluster Down-Scaling for Resource Utilization
  22. Julius Benjamins: The covariance matrix adaptation evolution strategy - CMA-ES - as a method for fitting biological agent-based models
  23. Kimberley Frings: Formalizing and proving knights and knaves puzzles in three valued logic in Coq
  24. Koen Sauren: Improving reinforcement learning performance in 2048 using expert knowledge
  25. Laura Kolijn: Generating and Solving Skyscrapers Puzzles Using a SAT Solver
  26. Leon van den Boogaard: User understanding and user acceptance of biometric authentication on mobile phones
  27. Luke van Leijenhorst: Evaluation and analysis of a transformer model for detailed PIO element extraction on medical literature
  28. Marie-Sophie Simon: Judging a Tweets credibility - The effect of signature labels on perceived Tweet credibility
  29. Mario Tsatsev: Parameter Inference of Gravitational Waves using Inverse Autoregressive Spline Flow
  30. Marten Straatsma: Towards Formalising the Isoperimetric Theorem
  31. Max Jongmans: Online Political Participation in the Age of Digital Surveillance
  32. Michiel van de Noort: A Study of CNAME Cloaking-based Tracking on Dutch Websites
  33. Muhammad Salibi: A Comparative Study of Group Fairness Metrics for Ranked Outputs
  34. Nadezhda Dobreva: Combining Knowledge From Pre-trained Networks And Weight Agnosticism For Evolving Transferable Models
  35. Niccolò Carrivale: QuandleRUN
  36. Niek Terol: Computing apart states in a partial Mealy machine
  37. Niels Starren: Johnny can Encrypt - A Usability Study of IRMAseal
  38. Patrick van Beurden: Blueprints for out-of-core code generation using CUDA
  39. Polina Moroza: Comparison of temporal pooling methods and fusion strategies
  40. Quoc An Ha: Investigating Usability Problems in Email Encryption Tools Based on IBE
  41. Rick ten Tije: A comparison of counterexample processing techniques in Angluin-style learning algorithms
  42. Robin Holen: On iterated transducers and closure under hypotheses - Discussing the hidden relationship
  43. Robin Immel: Using automated feedback as a base for performing self-regulated learning in programming exercises
  44. Sam Haeck: Hack my audio back
  45. Sander Suverkropp: Towards a Formalization of Lsharp in Coq
  46. Seraph Jin: Classification and Interchange of Informal and Formal English Text
  47. Stefan Boneschanscher: Feature-based Randomness Constraints in Control Improvisation
  48. Stefan Jans: How to Visualise Decision-Making using Preferential Voting
  49. Stefan van Ieperen: Sniffing communications between an Arduino and its peripheral sensor
  50. Stefan Vlastuin: Educational Escape Rooms in Secondary Computer Science Education
  51. Thomas de Haan: Dark patterns in games - how do they influence player experiences and their willingness to give up personal information
  52. Thomas Klein Breteler: Improving OpenCRE
  53. Thomas Kolb: Fine-tuning Wav2vec2.0 on caption data
  54. Thomas Luijkman: Developing ELVis - A 4G network analysis and visualisation tool
  55. Ties Speel: Cryptanalysis of SPARKLE ARX-Box Alzette
  56. Tim van Alten: Investigating the Impact of Gamification on the Quality of Digital Mindfulness Practices
  57. Tom Rust: Fuzzing Zigbee using Z-Stack
  58. Tom van der Waa: The Acceptance of Digital ID Software among Dutch Elderly Citizens
  59. Vamsi Yerramsetti: ATIA - Automated Tongue Image Analysis for autoimmune disease detection with supervised machine learning models

2021

  1. Alessandra van Veen: Cookie Compliance of Dutch Hospital Websites
  2. Amber Pater: Pumping Lemma for Deterministic Weighted Automata
  3. Astrid van der Jagt: Extending context-free grammars with conjunction and negation
  4. Bart Hofman: Automated Malware Attribution - Using machine learning on binaries
  5. Bart Janssen: Incorporating Computational Thinking in Calculus lessons - a Characterisation of Algorithmic Thinking and Generalisation Skills
  6. Bram Pulles: Analysis of Akari
  7. Cas Haaijman: Axiomatising Trace Semantics for an Algebra with Parallel Composition
  8. Daan Derks: Separating the Heartbeats of Twins during Pregnancy using Random Forest
  9. Denise Verbakel: Influence of Design on Differential and Linear Propagation Properties of Block Cipher Family Skinny
  10. Dor Mariel Alter: Optimizing the NIST Post Quantum Candidate SPHINCS+ using AVX-512
  11. Evert van 't Oor: How time affects Facebook Reactions
  12. Evgeniya Ovchinnikova: Implementation of Integer Addition on a Spiking Neural Network
  13. Ferran van der Have: The X3DH Protocol - A Proof of Security
  14. Gerhard van der Knijff: Solving and generating puzzles with a connectivity constraint
  15. Giovanni Uchoa de Assis: Differential Analysis of SATURNIN and SPONGENT
  16. Hermen van Westen: Effect of Surface Form Dictionary on Effectiveness in Entity Linking
  17. Jesse Ravensbergen: Biased Perceptions of Media Sources
  18. Jordy Aaldering: A new semantics for array programming languages - how to introduce some laziness without being lazy
  19. Julius Landsman: Analysis of Confined Blocks World
  20. Kirsten Hagenaars: Using Equations to Define Non-Structurally Recursive Functions in Coq
  21. Koen Verdenius: A POMDP model for safety-critical systems and its deteriorating sensors
  22. Lars Jeurissen: E-mail phishing prevention proposal - CEPP
  23. Lisa Hoek: Web classification using DMOZ
  24. Lisa Kalse: Supply of and Demand for Information Regarding Update Support when Buying Smartphones
  25. Mathieu Bangma: ECDSA Based 2FA in the Browser
  26. Maurice Dibbets: Discovery of information disclosure vulnerabilities in the software development process
  27. Maxim van Loo: Automating the Light Switch
  28. Menno Bartels: Closure Properties of Nominal Languages under Substitutions
  29. Michiel Philipse: Distributed Knowledge Proofs in the Coq Proof Assistant
  30. Michiel Verloop: A Critical Review - Exploring Optimization Strategies in Board Game Abalone for Alpha-Beta Search
  31. Mike Schopman: Validating the accuracy of the MaxMind GeoLite2 City database
  32. Mitchel Jansen: Recognising Client-side Behavioral Detection of Web Bots
  33. Niels van Harten: Generating Mutation Operators for a Search-Based Model-Driven Implementation of the Next Release Problem
  34. Onno de Gouw: Mutual privacy and good manners on the social web
  35. Paolo Scattolin: A proposal for the use of Attack Trees in a semi-formal framework for modelling attacks and tolerance solutions with Petri Nets
  36. Patrick Lodeweegs: Approaches to stateful fuzzing of the IRC protocol
  37. Reinier Sanders: To Click Or Not To Click - A User Study on Phishing Click-Through Rates in Instant Messaging Applications
  38. Roland Leferink: Search personalization on Google.nl
  39. Stefan Popa: You Have Been Previewed - Information Leaks of Content Previews in Mobile Messengers
  40. Steven Bronsveld: Transducer Degrees
  41. Steven Maarse: Coupled transformation of feature models and domain models for software product lines
  42. Suzan Erven: Fusible Numbers and the Provability of Computability
  43. Tijn Berns: Exploring Unlearnable Examples
  44. Tom Aarsen: Implementation Evaluation and Comparison of Python Modules implementing Morphological Analysis and Generation
  45. Willem Lambooy: Linearly and arboreally stackable quantum-dot cellular automata and their discrete simulation
  46. Wouter Damen: Generating Kick Drum Samples with Neural Networks
  47. Wouter van Battum: Using IRMA as an authentication method for eduVPN

2020

  1. Abe Heemskerk: Introducing Programming in Primary Education - A Review of Scientific Literature
  2. Arie-Jan Kruijsse: Online verificatie van leeftijd en gezag
  3. Arne Diehl: Cognitive Psychology For Black Box Models - On Holistic And Featural Face Processing in Neural Networks
  4. Auke Zeilstra: An exploration of static analysis used on C cryptography libraries
  5. Bart Pleiter: Fuzzing Wi-Fi in IoT devices
  6. Bob Ruiken: The Impact Of Sorts On Non-Termination Analysis Of Term Rewriting Systems
  7. Ceel Pierik: Infinite Omniscient Sets in Constructive Mathematics
  8. Charlotte Leuverink: An implementation of Andersen-style pointer analysis for the x86 mov instruction
  9. Daniel Goßen: Design and implementation of a stealthy OpenWPM web scraper
  10. Dave Artz: Information Technology Support for the Arterial Thoracic Outlet Syndrome
  11. Egidius Mysliwietz: Identifying rootkit stealth strategies
  12. Eline Bovy: Comparison of the second round candidates of the NIST lightweight cryptography competition
  13. Ellen Gunnarsdóttir: Trezor One side-channel analysis setup
  14. Evelien van Workum: Perceptions of Dutch - Former - CS Teachers regarding the Assessment of Fundamentally New Learning Objectives
  15. Floris Hendriks: Analysis of key management in Matrix
  16. Gunnar Noordbruis: Energy efficient WLAN using WiFi standards on an Archer C7 AC1750 access point
  17. Hylke de Zee: Informatie behoeften Google Analytics gebruikers
  18. Ilse Arwert: Embryo Classification using Neural Networks
  19. Jaap Dijkstra: Gaussian Processes versus Autoregressive Wild Bootstrap - Climate Application
  20. Jan Aarts: A GWAS about the wingsize of Nasonia Vitripennis
  21. Jesse van Son: Security by design in Azure DevOps pipelines - a case study at SpendLab technology - redacted
  22. Job Doesburg: Using IRMA for small scale digital elections
  23. Johan Sijtsma: Creating a Formal Model of the Game 2048
  24. Joren Vrancken: A Methodology for Penetration Testing Docker Systems
  25. Josien Visschedijk: Text mining pathology reports
  26. Julian Besems: A Specification Language and Semantics for Architectural Design
  27. Kirsten Kingma: Parsons' puzzles as formative assessment
  28. Koen Wösten: Abstract Nonsense and Programming - Uses of Category Theory in Computer Science
  29. Lars Kuipers: Analysis of Attack Trees - fast algorithms for subclasses
  30. Lars van Rhijn: Using optimized electric vehicle charging for demand side management
  31. Laura Philipse: Routing Algorithms for Autonomous Agricultural Vehicles
  32. Luko van der Maas: Creating Canned Recursion in Functional Programming Languages from Category Theory
  33. Luna Elise Schernthaner: Mediation Analysis of Nurse Practitioner Impact on Renal Outcome in CKD Patients
  34. Marc van de Werfhorst: Security recommendations for Agile and DevOps development at Ridder Data Systems
  35. Maris Galesloot: Exploring taint analysis methods for the grey-box learning of Java systems
  36. Matti Eisenlohr: The effects of search languages on multilingual online news consumption
  37. Mauk Lemmen: Optimizing Elephant for RISC-V
  38. Michael de Jong: Java Implementation and Analysis of Multi-party Private Set Intersection Protocols
  39. Michel de Boer: Secure communication channels for the mTask system
  40. Milan van Stiphout: Flood-It as a SAT Problem
  41. Mischa van Reede: Evaluating the practicality of using blockchain technology in different use cases in the healthcare sector
  42. Pascal Bongartz: Automatic code generation for protocols via Dezyne and Nail
  43. Pascal Engelbarts: Technology usage patterns of the Dutch youth in relation to social isolation
  44. Rick Koenders: Intuitionism in Lean
  45. Rick van der Wal: The usefulness of automated style-related feedback to object-oriented programming students
  46. Romy Stähli: Access Control in a Task-Based Methodology
  47. Ruben Holubek: Designing and evaluating a learning activity about debugging for novice programmers
  48. Steven Wallis de Vries: Designing a simple and secure email delivery protocol - SMTPsec
  49. Tobias van der Werff: Detecting Fingerspelling in Sign Language Videos Using Pose Information
  50. Toine Hulshof: Cross-Platform Mobile App Development - Translating SwiftUI to Jetpack Compose and vice versa
  51. Tom Smitjes: Connecting Mixed-Integer Linear Programming and Finite-memory POMDP Strategies
  52. Tosca Klijnsma: Semantic Equivalence of Task-Oriented Programs in TopHat
  53. Yannick Hogewind: Data-Driven Estimation of Retail Building Energy Consumption

2019

  1. Constantin Blach: Xoodoo Trail Analysis
  2. David Korsman: De oorzaken en gevolgen van het uitstellen van de IPv6-adoptie
  3. Dennis Kleverwal: Writing with Dobot Magician
  4. Gijs Hendriksen: Extending WASP providing context to a personal web archive
  5. Hendrik Werner: The State of Entropy Generation in Practice
  6. Hendrik Willing: Effectiveness of Common Defense Mechanisms Against Adversarial Inputs for DNN based Android Malware Detectors
  7. Huy Nguyen: Exploring Python as a replacement for C++ in Imperative Programming for Computing Science at Radboud University
  8. Jeroen Wijenbergh: Performance comparison of DNS over HTTPS to unencrypted DNS
  9. Justin Hende: MineChecker - A tool for detecting click-based browser cryptomining
  10. Kevin Heijligers: Algoritmen unplugged - conceptueel begrip van leerlingen in het voortgezet onderwijs
  11. Lars Jellema: Optimizing Ascon on RISC-V
  12. Lennart Jansen: Maatregelen ter bescherming van patiëntendossiers van extra beschermde personen tegen oneigenlijke inzage in ziekenhuizen
  13. Maaike van Leuken: Comparing Correlation Coefficient and Difference of Means in a Differential Power Analysis Attack
  14. Maarten Dorrestijn: Finding the guard leveraging bandwidth statistics to identify TOR guard nodes
  15. Manuela Bergau: Human-in-the-loop Strategy Synthesis PAC-MAN verified
  16. Max van Deurzen: The anatomy of the modern window manager - a case study for X in an Agile manner
  17. Nick Nibbeling: Comparing privacy plugins
  18. Nienke Wessel: The Semantics of Ownership and Borrowing in the Rust Programming Language
  19. Raka Schipperheijn: Implementing Xoodoo with protection against single fault attacks on Cortex-M4
  20. Reinier Joosse: An Extended Algorithm for Learning Serial Compositions of Mealy Machines
  21. Richard van Ginkel: Security in public Wi-Fi networks
  22. Robin Smit: A machine learning approach for recommending items in League of Legends
  23. Sam Sweere: Increasing the Perceptual Image Quality of Adversarial Queries for Content-based Image Retrieval
  24. Thomas_van_der_Burgt___Implementing_the_NIST_lightweight_cryptography_candidates_Xooday_and_Subterranean_2.0
  25. Thomas van Ouwerkerk: Investigating the minimality of the ZH-calculus
  26. Thomas Welten: Predicting Pelvic Floor Surgery Outcomes

2018

  1. Aaron Visschedijk: Trading Bitcoin using artificial neural networks
  2. Aucke Bos: Visulizing differences between HTML documents
  3. Bart Gruppen: From mu-regular expressions to CFGs and back
  4. Bart van den Boom: State machine inference of thread networking protocol
  5. Bart van de Put: Scoring Entity-Relationship Diagrams Drawn by a Computer Algorithm
  6. Bas Hofmans: Transducers over G-sets and their properties
  7. Bram in t Zandt: Software Supply Chain Security for Banking Websites
  8. Dion Scheper: Irma over Bluetooth
  9. Evi Sijben: A deep residual network for recognizing cluster-based generic photo categories
  10. Frank Gerlings: Digital flowchart maker
  11. Giel Besouw: Simulating NXT robots
  12. Gijs Cuyck: A complete version of the ADS method for comformance testing
  13. Hoang Gia Linh: Optimization of the NTT function on ARMv8-A SVE
  14. Ischa Stork: Performing an online template attack on two different implementations of FourQ
  15. Janne van den Hout: Continuations in functional programming languages
  16. Jan Potma: An exponential construction for Sokoban
  17. Jasper Haasdijk: Searching IPFS
  18. Jelle Loman: Comparing the performance of the Laplace and Staircase mechanisms in differential privacy
  19. Jeremy Guijt: Checking model learning hypotheses with symbolic execution
  20. Jeroen van Alem: Improving Mobile Ad Hoc Networks in Realtime Situations
  21. Jeroen van Voorst: Augmented reality as a general indoor and outdoor navigation solution
  22. Joep Veldhoven: Automata extended to nominal sets
  23. Jonathan Moerman: Evaluating the performance of open source static analysis tools
  24. Joris den Elzen: Characteristic Formulas and CakeML
  25. Jos Craaijo: An efficient parsing machine for PEGs
  26. Jules van Thoor: Learning state machines of TLS 1.3 implementations
  27. Leo Cornelissen: Simulating Lego Mindstorms EV3 robits using Unity and Python
  28. Lotte Fekkes: Comparing Bitcoin and Ethereum
  29. Mark Wijkhuizen: Security analysis of the Itasks framework
  30. Marnix Suilen: Reachability properties for uncertain MDPs
  31. Max Leijtens: Solar panels and LoRaWAN
  32. Mees Neijenhuis: Improving decision tree learning by looking ahead
  33. Mick Koomen: Using power analysis to differentiate between malicious repackaged apps and clean apps
  34. Nathan van Beusekom: Properties of codings in lambda-calculus
  35. Niek Janssen: Stateful Programming in Clean
  36. Niels Drueten: Security analysis of DTLS 1 2 implementations
  37. Niels van den Hork: Data Representatie van Afbeeldingen in het VO Lesontwerp en Begripsproblemen
  38. Nikki van der Gouw: Representatie van spraak in diepe neurale netwerken
  39. Noel Bangma: Ascon An attempt in NEON on the Cortex-A8
  40. Phil Geelhoed: Investigation into voice search
  41. Randy Wanga: Analysing Spotify listening data from Armada music
  42. Rick Lukassen: Determining the Neo-Piagetian reasoning level of novice programmers
  43. Robin Elbers: On the replication of CycleGAN
  44. Sander Hendrix: Accessing PEP data
  45. Sebastiaan Versteeg: Inferring state machines of Tunneled Direct-Link Setup
  46. Serena Rietbergen: 2-Way Finite Automata
  47. Stan van Lier: Robustness of federated averaging for non-IID data
  48. Tiko Huizinga: Using NFC enabled Android devices to attack RFID systems
  49. Timo Maarse: Parsing with derivatives in Haskell
  50. Timo Schrijvers: Learning register automata using Taint analysis
  51. Tom Nijholt: Why do we need and want cryptocurrency
  52. Tom Sweers: Autoencoding credit card fraude
  53. Willem van Summeren: Tree Automata
  54. Wouter de Boer: Power Analysis of the Ledger NanoS

2017

  1. Bart Veldhuizen: Automated state machine learning of IPsec implementations
  2. Camil Staps: Code-generation-for-the-Thumb-2-instruction-set
  3. Erin van der Veen: The Practical Performance of Automata Minimization Algorithms
  4. Flip van Spaendonck: Comparing Web Page Layouts using Tree Edit Distance
  5. Jan Martens: Parsing-expression-grammars-constructing-a-linear-time-parser
  6. Jordy Gennissen: Gamut Sifting through Images to Detect Android Malware
  7. Laurens Kuiper: Axis-Parallel Five-in-a-Row is PSPACE-Complete
  8. Luuk Arts: Comparing Discretization Methods for Applying Q-learning in Continuous State-Action Space
  9. Martin Meyers: Side channel protected Keyak on ARM Cortex-M4
  10. Marvin van Bekkum: Een technische en juridische analyse van het protocol van de Veilige E-mail Coalitie
  11. Mathis Sackers: A Comparison of String Distance Metrics on Usernames for Cross Platform Identification
  12. Matthias Vogelaar: Defining the Undefined in C
  13. Michel Botros: Supervised Learning in Human Activity Recognition based on Multimodal Body Sensing
  14. Michel Kok: A Context-based Introduction to Finite State Automata in Secondary Education
  15. Oussama Danba: Implementing the authenticated cipher MORUS using NEON
  16. Robin Tonen: Exploring Variable Ranges in Machine Learned Models
  17. Sietse Mooren: Link prediction op het RU domein
  18. Stan Derksen: Creating-a-secure-virtual-private-network-using-minimal-code
  19. Tessa Schlief: Leren-Programmeren-in-Python
  20. Thijs Voncken: Procedural-maze-generation-an-L-System-based-approach
  21. Thijs Werrij: Het-uitbreiden-en-evalueren-van-scatterplots
  22. Tim van Dijk: A high-performance threshold implementation of a BaseKing variant on an ARM architecture
  23. Toon Lenaerts: Improving-protocol-state-fuzzing-of-SSH
  24. Twan Cuijpers: Recognizing text in the wild
  25. Ward Theunisse: Breaking the chain Security analysis of a pilot system for detainee monitoring in the Dutch Custodial Institutions Agency
  26. Willem Boumans: Web tracking and current countermeasures

2016

  1. Abdullah Rasool: AAWSOME
  2. Bauke Brenninkmeijer: Catching IMSI-catcher-catchers
  3. Gerben van der Lubbe: A New Hope for Nussbaumer
  4. Ivar Derksen: HTML5 Tracking Techniques in Practice
  5. Jan Schmidt: Towards More Flexible Automatic Decision Making
  6. Jeftha Spunda: Approximate Nearest Neighbor Field Computation via k-d Trees
  7. Justin Mol: The Evolvability of iTasks using Normalized Systems
  8. Koen Basten: Classifying Landsat Terrain Images via Random Forests
  9. Lars Kuijpers: Invloed van MetaCost op imbalanced classificatie problemen
  10. Laurens Brinker: Security analysis of the IRMA app using SPARTA and fuzzing
  11. Maarten Schellevis: Getting access to your own Fitbit data
  12. Matjah Sonneveld: Protecting app secrets in Android
  13. Matthias Ghering: Evil Twin Vulnerabilities in Wi-Fi Networks
  14. Nick Tönissen: Een tool voor acceptatieonderzoek naar IT
  15. Patrick Tan: How to Evaluate Network Models Used in Clinical Decision Making
  16. Paul Huberts: Het gebruik van architectuurconcepten bij de ontwikkeling van web-mobiele applicaties
  17. Sander van Dam: Sufficient conditions for sound hashing using a truncated permutation
  18. Stijn Meijer: Secure Location Verification for ADS-B
  19. Ties Robroek: Accelerating BCCD using parallel computing
  20. Timo van Niedek: Phonetic Classification in TensorFlow
  21. Tom Nies: Privacy Protection Against Cross-Device Tracking Methods
  22. Tom Nikken: Een Deductieve Semantiek voor iTasks
  23. Tom Sandmann: Relevant biomarkers in the prediction of good and bad days for multiple sclerosis patients
  24. Wietse Kuipers: Improving matchmaking with game data
  25. Wouter van der Linde: Parallel SHA 256 in NEON for use in hash based signatures

2015

  1. Aaron van Geffen: Digitizing an interactive collaborative teaching methodology using web technologies
  2. Bas Elbers: De menselijke maat in een zich ontwikkelende techniek
  3. Berry Lyklema: Social Media & Werkafspraken
  4. Charlie Gerhardus: Een ownership based garbage collector voor de taal cgt
  5. Daniel Roeven: Snap-to-Style
  6. Daniel van Loon: Het overzichtelijk houden van kennis bij het gebruik van Scrum
  7. Demian Janssen: On-parsing-expression-grammars
  8. Dion van de Vooren: Hoe accuraat kun je de populariteit van muziek voorspellen met behulp van social media
  9. Emma Gerritse: Herbrands theorem
  10. Jolein Kluten: Inzet-van-speelelementen-bij-organisatie-veranderingen
  11. Jonathan Seesink: The applicability of Grinbath EyeGuide Tracker to mobile devices for usability testing
  12. Julian Neeleman: Optimisations and Generalisations of Retrograde Analysis
  13. Koen Vijverberg: Finding hyperintensities in the brain using unsupervised feature learning
  14. Leon Botros: Optimizing NORX for Atmel 8bit AVR microcontrollers
  15. Luuk Scholten: Transforming ORM into O-RM
  16. Martin Huyben: Toepassingen in COcaml
  17. Mats Ouborg: Formalizing Group Model Building
  18. Maurice Knoop: Introduction to YARMIS a dynamic alternative to RMI
  19. Michael Jansen: Smartphone privacy demo
  20. Rick Erkens: The Turing machine model extended with interaction
  21. Rob ten Berge: Statistical Model Checking of a Digital Hydraulic Power Management System
  22. Ronnie Swanink: Persistent-effects-of-man-in-the-middle-attacks
  23. Sanne Boumans: Lost in Translation Automatic Learning of Statistical Models for Language Translation
  24. Simon Brugman: Computationally Feasible Logo Recognition using Deep Learning
  25. Stan Philipsen: Usability van Wikipedia editors
  26. Stijn Voss: Training the CIA model using back propagation
  27. Sven Arissen: 414 bit multiplication on the ARM Cortex M0
  28. Thomas de Bel: K Means clustering of a database with PTSD and other psychiatric patients
  29. Thom Wiggers: Implementing CAESAR candidate Prost on ARM11
  30. Tobias Schroeter: Het gebruik van Automated Assessment Tools in programmeercursussen
  31. Tom Evers: Twee-manieren-voor-het-leren-van-een-DTD-bij-voorbeelden-van-XML-documenten
  32. Tom van Bussel: Inferring gene regulatory data

2014

  1. Ben Brucker: Government intervention on consumer crypto hardware
  2. Gerco van Heerdt: Efficient Inference of Mealy Machines
  3. Gerdriaan Mulder: LTE WiFi Handover Strangelove
  4. Jip Dekker: Generating Google Go framework from Uppaal models
  5. Joep Top: Een BASS-FinLog achitectuuranalyse
  6. Jory van Keulen: Smart Charging A privacy and security analysis
  7. Lars Bade: Vertrouwelijkheid in het iRN
  8. Laurens van Dijk: Finding musical genre similarity using machine learning techniques
  9. Marvin Barron: Shortest Path Estimation for small world networks
  10. Max Tijssen: Automatic modeling of SSH implementations with state machine learning algorithms
  11. Mirjam van Nahmen: Automatically Learning a Model of the SSH2 Transport Layer
  12. Moritz Neikes: Efficiency of large scale DC networks
  13. Patrick Verleg: Cache Cookies searching for hidden browser storage
  14. Pien Walraven: Communicatie binnen software development teams Scrum versus waterval
  15. Rafael Alejandro Imamgiller: Formal Characterisation of the Functional Strategy
  16. Ramon van Sparrentak: A concrete deskolemization algorithm
  17. Rodin Aarssen: Proving a folk theorem using Kleene Algebra with Tests
  18. Tim Janssen: A Linear Quantile Mixed Regression Model for Prediction of Airline Ticket Prices
  19. Wesley Janssen: Curve25519 in 18 tweets

2013

  1. Bas van Zadelhoff: Towards Large Diagnostic Bayesian Network Models
  2. Ben Siebert: Smartphone-privacy
  3. Bram Arends: Quaternionen voor proper rigid body transformations in computer graphics
  4. Eduardo Pablo Novella Lorente: Reverse engineering Internet Banking
  5. Elmar Dongelmans: Leerstijlen en e-learning
  6. Idzard Stoker: Computational thinking in lesmateriaal voor informatica
  7. Joel Cox: Profiling knowledge workers using open online profiles
  8. Joeri Arendsen: Advance Organizers
  9. Joost Janssen: The ACCQ Methodology Assuring Consumer Satisfaction of Cloud Service Quality
  10. Joost Rijneveld: How the Dutch broke the Japanese Blue Code in the late 1930s
  11. Judith van Stegeren: Exploring the inference problem for D0L-Systems
  12. Kelley Philip van Evert: Graph models for the untyped lambda-calculus
  13. Kevin Valk: AndroidCard A framework for writing NFC applets on Android
  14. Koen Buitenhuis: DigiD vs. JavaScript the risk of using third party JavaScript on government websites
  15. Koen van Ingen: Cookiewalls Een probleem met een technische oplossing
  16. Linus van Elswijk: Hierarchical Path-Finding Theta star Combining HPA star and Theta star
  17. Maarten Bovy: Digitale medische verslaglegging Een koppeling tussen patient conditie en dossier
  18. Martijn Terpstra: WhatsApp and privacy
  19. Mathijs Vos: Voor de draad ermee Een vakdidactische verkenning van programmeren met threads
  20. Matthijs Hendriks: Analysing Multicriteria Route Planning
  21. Nicky van Rijsbergen: Responsible Disclosure een kritische beschouwing
  22. Niels van der Weide: Computing Exact Solutions of Initial Value Problems
  23. Petra van den Bos: Vakdidactische aspecten van security
  24. Ramon Janssen: Learning a State Diagram of TCP Using Abstraction
  25. Raoul Estourgie: Analysis of Android Authenticators
  26. Robin Munsterman: Equality of infinite objects
  27. Sanne Derckx: Is de smartphone smart genoeg voor ouderen
  28. Sven van Valburg: Security of Browser Add-ons A Firefox 21 Case Study
  29. Thomas Naegele: MapReduce Framework Performance Comparison
  30. Wouter Geraedts: Time-Based Modeling and Verification of Flow Systems in UPPAAL

2012

  1. Bas Visser: Facebook Privacy
  2. Bas Vossen: Problem Solving Perspectives
  3. Beau Verdiesen: The webmail experience
  4. Christiaan Hillen: The IT Anamnesis
  5. Danny Romme: Hoe denken middelbare scholieren over de Informatiewetenschappen
  6. Dennis Brentjes: Concurrency issues in the iTasks3 framework
  7. Eamonn Cassidy: Hoe draagt draadloze communicatie bij aan de procescommunicatie binnen de Nederlandse Spoorwegen
  8. Erik Boss: Evaluating implementations of SSH by means of model-based testing
  9. Feike Geerts: Usability Microsoft Word
  10. Ferdi van der Werf: Op zoek naar mogelijkheden en randvoorwaarden voor robotica onderwijs in het VWO
  11. Hans Harmannij: Logging NFC data on a Google Nexus S
  12. Ivan Koster: Reinforcement Learning and the Parallel Actions Common Goal problem
  13. Jan Vogels: Regels voor Serious Gaming in Requirements Engineering
  14. Jasper van Duijnhoven: How can game genres contribute to the learning process
  15. Joost Kraaijeveld: Probabilistic causal logic in discrete event training simulations
  16. Koray Yanik: Designing a functional and minimalistic Operating System
  17. Ko Stoffelen: Comparison of chain merge behaviour of TMTO methods
  18. Manu Drijvers: Model Checking Tamper-Evident Pairing
  19. Marcel van der Made: Een case-study naar het leren van real-time automaten
  20. Marc Schoolderman: Fuzzy lexical matching
  21. Marijn van der Zaag: Digitalisering van contant geld
  22. Mark Zandstra: Genereren van operationele specificaties aan de hand van UML diagrammen
  23. Mehdi Aqadjani Memar: Hardware Onafhankelijk Besturingssysteem
  24. Michiel van Lierop: Crossing Borders an Analysis of the Experiences of Dutch Bachelor Students Working on the Community Outreach Project in India and Zambia
  25. Niklas Weber: Typed Skipgrams Investigated
  26. Patrick Schileffski: Do not track
  27. Peter Maandag: Solving 3-Sat
  28. Philipp Jakubeit: Implementation and Analysis of OpenPGP Functionality via NFC
  29. Robert Kleinpenning: Is Javacardsign correct and secure
  30. Roberto Alves de Almeida Junior: Model-based Testing with a B Model of the EMV Standard
  31. Sjors Gielen: SIM Toolkit In Practice
  32. Stein Keijzers: Voxel Pad Reductie
  33. Tim Cooijmans: Internetverkeer als bewijsmateriaal
  34. Tom de Ruijter: Online and co-regularized algorithms for large scale learning
  35. Willem Burgers: Session Proxy A prevention method for session hijacking in Blackboard
  36. Xander Damen: Een keuze voor webserver architecturen afhankelijk van het dynamisch karakter van een website

2011

  1. Anne Westerhof: Antivirus software versus Malware
  2. Bart Leusink: Serious Gaming in Software Engineering
  3. Bart Lutgens: Stealth SMS Description of how it works
  4. Bram Vonk: Autoriteiten vinden op Twitter
  5. Christiaan Thijssen: Leefpatronen in Twitterberichten van actieve gebruikers
  6. Dennis Aarts: Modeling concepts taught by a board game
  7. Erik Maessen: FNWISurvey Nieuw enquete systeem voor de FNWI
  8. Geert Smelt: Programming Web Applications Securely
  9. Ilian van der Velden: Leren programmeren Programmeeronderwijs op de middelbare school
  10. Iris Trepels: The Open Source Community and Piracy
  11. Joost Kremers: Practical hacking AES using the S-box weakness
  12. Joost Timmerman: Where am I? Where should I go?
  13. Kevin Reintjes: Veiliger authenticeren met de Yubikey
  14. Nick Gubbels: Extending F-lite with generic: G-lite
  15. Niek Wolfkamp: Online and offline privacy
  16. Niels Braakensiek: Organisational Communication uitdrukbaar in Demo?
  17. Rens van Summeren: Security in Online Gaming
  18. Robin Oostrum: De kwaliteit van fonetische transcripties
  19. Rob Thijssen: Argument based modeling analyses on business process models
  20. Roel van Rijswijck: Negotiations as Conceptualizations
  21. Steffen Janssen: Decoding directed covert attention in BCIs using HMMs
  22. Tim van Lokven: Review and Comparison of Instant Messaging Protocols
  23. Wouter Lockefeer: CleanDoc

2010

  1. Albert Gerritsen: Expressieherkenning
  2. Antolin Janssen: Kernel Machines for Multi-Class Classification: A Joint Kernel Approach
  3. Bram Bruines: Plankalkul
  4. Carsten Ruetz: Timed Model-Based Conformance testing
  5. Jeffrey Kwee: Serious Gaming in Requirements Engineering
  6. Jeffrey Lemein: fMRI-Based Image Reconstruction Using the Elastic Net
  7. Lars Lockefeer: Encrypted SMS an analysis of the theoretical necessities and implementation possibilities
  8. Louis Onrust: Paraphrasing factoid dependency trees into fluent sentences in a natural language
  9. Marco Henrix: Aan de hand van hersenactiviteit reconstrueren wat iemand ziet
  10. Mark Spreeuwenberg: Het testen van smart meters
  11. Marlon Baeten: Rahisi simple web development
  12. Martin Devillers: Analyzing password strength
  13. Rik Janssen: Hoe ziet een systeem eruit dat klassiek slagwerkles computationeel kan ondersteunen?
  14. Robin Rutten: XMPP en het real-time web
  15. Royce Benda: Informatiekunde Inleven en laten Beleven

2009

  1. Daan Pijper: Requirements, informatica versus architectuur
  2. Feng Zhu: Smart Card Based Solutions for Secure Internet Banking with a primitive reader or mobile phone
  3. Freek van den Berg: Creating a meta model describing a production system's concepts and their relations
  4. Jelle Schuhmacher: Intrusion Detection met Core Vector Machines
  5. Jeroen Claassens: Hamminggetallen Een complexiteitsvergelijking tussen verschillende algoritmen
  6. Joost Koppers: Database encryptie schema's Omgaan met privacygevoelige informatie
  7. Jos Groenewegen: Supporting sign language in Human Computer Interaction Understanding the challenge
  8. Kevin Vriens: Automatisch parkeren: Hoe werkt het?
  9. Koen Hulsman: Persoonlijk nieuws: een kijkje in de keuken van de personalisatie van online nieuwswebsites
  10. Martijn Sprengers: The Effects of Different Bayesian Poison Methods on the Quality of the Bayesian Spam Filter SpamBayes
  11. Matthijs Smith: Implicit Information Retrieval
  12. Mirko van Ede: Testondersteuning in frameworks voor webapplicaties
  13. Pepijn Arts: Semantische Web Services
  14. Philipp van Bebber: Internet Banking Shopping: De gevaren achter het hangslot
  15. Richard Willems: Knowledge sharing and retention through the use of collaboration software
  16. Ruben Muijrers: Expressieherkenning met PCA en SVM
  17. Sander van Hooft: ICT for Ethiopia's land administration
  18. Steffen Michels: Analysing Onion Routing
  19. Thierry Stamper: Mislukte IT projecten: een kwestie van beter plannen?
  20. Walter Moerkerken: Conceptualiseringstechnieken uit de ICT toegepast op Enterprise Architecturing

2008

  1. Adam Cornelissen: A Modern Turing Test
  2. Bernard van Gastel: Reliability of a read-write lock implementation
  3. Erik Crombag: DigiCoach
  4. Erik Steinmann: De acceptatie van internetcensuur door bezoekers van Nederlandse online nieuwsgemeenschappen
  5. Fabian van den Broek: Static Code Analysis In Java
  6. Julian Verdurmen: Firefox extension security
  7. Julius Muecke: Database Schema Integratie
  8. Juul Coolen: Temporele doorloop in systeemontwikkeling recht-toe-recht-aan versus herhaling
  9. Laura Nij Bijvank: Automatische code generatie met de TimesTool
  10. Leon Swinkels: Towards a security-classification of wireless networks an empirical approach
  11. Leon Swinkels: Towards a security-classification of wireless networks an empirical approach
  12. Martijn Ermers: Datatranslatie met MT
  13. Robbert Krebbers: Uitdrukkingskracht van XML schema's
  14. Rolf Markwat: SOA: Bijdrage of hype voor portal Radboud Universiteit?

2007

  1. Allan van Hulst: From Java to mCRL2
  2. Bart Schotten: Een Vergelijking van Elektronische Betaalmethoden voor E-commerce
  3. Eddy Klomp: Quality Aspects and Decision Points
  4. Frank van der Loo: Error correctie in VOiP
  5. Freek Verbeek: Getallen En Functies In De Pi-Calculus
  6. Ilona Wilmont: Enhancing usability for elderly people
  7. Jean-Pierre de Rooij: Is an electronic passport usable as an authentication token?
  8. Johan Janssen: Using JML to protect Java code against SQL injection
  9. Jordy Voesten: Business Rules and iData: A Powerful Combination?
  10. Nina Hoedt: Internetverslaving onder Informatica en Informatiekunde studenten
  11. Sven Haster: Een technische analyse van RIESKOA
  12. Wouter Roelofs: The AOL Scandal

2006

  1. Alex Hamakers: Nieuwe werelden, oude gevaren: cheating in MMORPGs
  2. Daan Laros: Integriteit van mens en systeem
  3. Danny Sarbo: Bachelorscriptie Informatiekunde
  4. Dennis Janse: Het Semantische Web
  5. Dirk Tonnaer: Diagnostic decision support in de huisartsgeneeskunde
  6. Eelis van der Weegen: Formalizing the Hamming Stream in Coq
  7. Francois Kooman: Websurfen met onbetrouwbare computers
  8. Hensley Hanse: Formele talen voor een formele RE
  9. Johan Stortelder: Spraaksynthese
  10. John Akkermans: Online privacy in ruil voor terrorismebestrijding
  11. Mark Jenniskens: De toepasbaarheid van ISO 9126 voor kwaliteitsbeoordeling van m-services
  12. Mark van Liefland: Requirements Engineering bij marktgedreven IT-bedrijven
  13. Martijn Moraal: Massive Multiplayer Online Game Architectures
  14. Martin van de Goor: Genetische algoritmes en parallellisme
  15. Matthijs Mekking: Capability of Kerberos
  16. Matthijs van Roosmalen: Requirements & Verandering
  17. Paul Dekkers: Publieke Software
  18. Rene Joosten: Requirements Engineering voor informatiesystemen
  19. Rody Kersten: The composition Agreement in Ambient Networks
  20. Rogier Lommers: Profiling onder studenten Informatica en Informatiekunde
  21. Roy Bos: Informatiearchitectuur
  22. Thomas Dobbe: Requirements Traceability
  23. Thomas Janssen: Recommender Systems voor het realtime aanbieden van nieuwssecties
  24. Tom van den Broek: Object Relational Mappings
  25. Vincent Driessen: The Power of Wobbly Types

This page was generated on Thu 21 Nov 2024 03:33:17 AM CET