Bachelor's Theses
On this page we present links to the bachelor's theses that have
been produced by students of Computing Science and students of
Informational Sciences at the Radboud University.
2024
- Adam Farrag: Stellar Classification of Main Sequence Stars using Vision Transformers
- Alex Feenstra: Proving Correctness of Cryptographical Primitives through While
- Andrei-Radu Milicin: Investigating the impact of GitHub repository features on popularity
- Andrei-Sorin Ujica: Summarization for Long-Form Documents
- Anne den Hartog: Database energy benchmarks - an evaluation
- Artur Wiadrowski: Visualising divide-and-conquer algorithms with self-similar fractals
- Axel van Abkoude: Addressing the Addressability Problem - Dense-Padded Packed Booleans in SaC
- Bryan Rinders: Integrating PostGuard into Filesender
- Casper de With: choosing words algorithmically makes texts more beautiful
- Cato van Ojen: Think of your MEDS - Applying the MPC-in-the-head paradigm to MEDS for reduced signature size
- Chris Musteata: Detecting Brandjacking-Based Malvertising
- Clemens van den Braak: Predicting time intervals between epilepsy hospital checkups
- Daan Smeets: WhisperSage - Making Side-Channel Analysis for Post-Quantum Cryptography Accessible
- Eline Stehouwer: Measuring the energy overhead of computer language features
- Esther Kinderman: Evaluating and improving the accessibility of the NS ticket machine for illiterate users
- Faycel Harrathi: Fine-tune Whisper for Speaker Recognition
- George-Nicolas Nadejde: Improving AprèsSQI-s cost model for verification
- Hugo Hakkenberg: Utilizing machine learning and SHAP to uncover key variables for a healthier lifestyle in Type 2 Diabetes management
- Illya van Knippenberg: Implementations based on weighted Finite State Automata improve efficiency of Negative Selection Algorithms
- Imke Huisink: Data analysis on motivation for lifestyle changes
- Ivo Melse: Sufficient Conditions for k-completeness using Observation Trees and Apartness
- Jaap Aarts: Implementing in-Database Similarity Search
- Jasmijn Bookelmann: FPGA High Performance Computing
- Jasper Laumen: Minimising Q-Weighted Finite Automata over Z
- Jen Dusseljee: Optimising Lung Cancer Detection by Oversampling Malignant Nodules
- Jermo van Oort: Differential fuzzing of stateful systems using FlexFringe
- Jokubas Tumelis: Collecting and analysing signal measurements to localise cell towers
- Joram Ruijtenberg: Implementation of an Optimized Version of the Post-Quantum Signature Scheme ALTEQ
- Joris Ballemans: Using Scraped Data from Web Pages for Improving the Efficiency of Location Disambiguation
- Josja Koopmans: Distributed Virtual Waiting Room
- Julian Put: Learning Mealy Intersections
- Kutay Sezer: An Algorithmic Approach to Fixing Friet
- Lars Esselink: The state of OSS-Fuzz
- Lavika Singhal: Map your Neighborhood - Assessing an algorithm for solving the Isomorphism of Polynomials problem
- Luc Schrauwen: A SaC plotting visualisation integration in Jupyter
- Madelief Slaats: Exploring the Usability of Recursive Morphism Duality in the Fast Fourier Transform - An Implementation in Haskell
- Mark de Jong: Exploring sustainability in the computing science bachelor at Radboud University
- Martijn Sanders: The Lsharp Algorithm for Deterministic Finite Automata
- Martijn van de Wouw: Generalisations in Equivalence Proofs Using Rewriting Induction and Logically Constrained Term Rewriting Systems
- Michel van Wijk: Evaluating Reinforcement Learning Strategies in the Card Game Gin Rummy
- Mika Sipman: Constructing Zero-Knowledge Proof Systems on Sudoku Variants
- Mikhail Ushakov: Compiling While++ into Logically Constrained Term Rewriting Systems
- Milan Pullens: Using Large Language Models as an Information Retrieval Tool on Safety Data Sheets
- Mitchell Boesveld: From Multi Server Authentication to Multi Server Authorisation
- Mohamad Naseb Aljalab: Oracle Component Analysis on Pyannote speaker-diarization-3.1 Pipeline
- Nathalie Saba: Enhance engagement from middle school students with music as a context
- Nemo Ingendaa: Analysis and exploration of polynomial activation function - softRmax
- Nick van Oers: Pattern as an SAT problem
- Niels Boegman: Determining the core of the web
- Nikolai Savulkin: Investigating effects of electromagnetic noise on screen gleaning side-channel attack against HDMI connections
- Philipp Küppers: Exploring the Chemical Universe with Spiking Neural Networks
- Pim Leerkes: Finding New Asymptotic Bounds on the Minimal Optimal Strategy Sets of Parametric MDPs
- Rijk Kregting: Designing a Visualisation Tool for Energy Consumption Models in IT
- Robin Put: Efficient Elastic Alignment in CUDA
- Rowan van Rooijen: Model Learning of Lexers
- Ruben te Morsche: Finding the Optimal Backdoor Data Poisoning Attack
- Rutger Broekhoff: Formally defining the semantics for the Nix expression language
- Sabin-Gabriel Iacob: Polyhedra Folding Algorithms
- Samuel Padron: Predicting DNA sequence pair similarity with HyenaDNA
- Stijn Vandenput: Lock-based Authenticated Encryption in a Multi-user Setting
- Sven Meijboom: Enhancing Large Language Models for Structured Data Extraction
- Taha Hammouchi: Intrusion Detection System for 5G Core Systems
- Teun van Gisteren: Filtered Feelings - Investigating Frequency Filters in Speech Emotion Recognition Models
- Thijs van den Berg: Analysing the structure of Latin sentences using formal grammar
- Thomas Ilmer: Bot Board - Design and preliminary evaluation of a dashboard visualizing GitHub bot activity
- Vincent Dankbaar: The disappearance of constant-time execution
- Violeta Sizonenko: Measuring Evolution of Cookie Dialogues
- Wout van den Berg: An analysis of Javascript sendBeacon method
- Yiğit Batuhan Yiğin: Developer-ChatGPT Conversations - Analyzing Developer Prompts
- Yori Jonkman: Evaluating The Use Of Entity Triggers As Explanations In Named Entity Recognition
- Yousif Badawi: Can we use Large Language Models to improve Automatic Speech Recognition and if so by how much
2023
- Alex Bui Nhat Linh: Analysing open-source 5G core networks for TLS vulnerabilities and 3GPP compliance
- Alperen Özkurt: Detection of AI-Made Artworks With One-Class Classification Algorithms
- Barıs Cagrı Atik: NFC - Exploring the Current NFC Market - Assessing Security Vulnerabilities and Potential Attacks
- Bart Veldman: Multi-user security analysis of three finalists of the NIST ligthweight cryptography competition
- Boudewijn van Gils: 3D Fishualizer
- Bram Kapteijns: Evaluating as a human
- Bram van Veenschoten: Syntax and Type Checking of Truncated Type Theory
- Bryan van de Ven: Cheating and anti-cheat system action impacts on user experience
- Camile Lendering: Inside the Cookie Jar - Tracking Consent in Digital Advertising
- Casper Fabritius: Level 1 BLAS routines in SaC
- Dick Blankvoort: Implementing Patch Theories in Homotopy Type Theory
- Dion Bremer: Visual Programming with the TopHat Builder
- Dirk Doesburg: Signatures in IRMAseal
- Ege Sarı: Improving Entity Linking Systems With DuckDB
- Elianne Heuer: Predicting wine prices using weather data
- Els de Haan: Differential Cryptanalysis of the SIMON block cipher
- Esther Shi: Developing a fallback decryption method for Postguard
- Falko Jansen: Deep Learning for Video Game Music Generation
- Felix Mölder: An investigation of the nested subset differential attack on the lifted unbalanced oil and vinegar signature scheme
- Fouad Lamsettef: Extending ProFuzzBench - A Benchmark for Stateful Fuzzers
- Gabriele Serafini: Fast And Furious - Implementing Optuna and Early Stopping in CNN-based SCA
- Gabriël Krouwel: Investigating the behaviour of IoT devices undergoing a deauthentication attack and its countermeasures
- Gijs Kopmeiners: The landscape of (un)balanced choices in cookie consent dialogues in Europe
- Harm Jacobs: Developing a book recommendation system
- Harm Roukema: Fuzzing JSON API Clients
- Henk Berendsen: Leakage Resilience of the Suffix Keyed Sponge
- Jasper Hage: Comparing the performance of MLPs in side channel attacks with different dataset - architecture customizations
- Jelle Medendorp: Stealth Acoustic Communication Application
- Jonathan Jagt: Security analysis of a TETRA Base Station air interface implementation
- Joost Grunwald: Stronghold - Automating corporate security
- Jorn Heibrink: Antivirus and EDR bypasses for initial access
- Jorrit de Boer: Solving Robust Reachability Using Quantified Boolean Formulas
- Julian van der Horst: Backdoor attack on deep neural networks using inaudible triggers
- Kevin van de Glind: Control Improvisation for infinite regular languages and feature-based parameters
- Leon Zhang: The potential of user experience design in countering email-based social engineering attacks
- Lucas van Kasteren: Misusing browsers login managers for data exfiltration by third parties
- Luuk Maas: Extending Matrix's Functionality in a Secure and Sustainable Way
- Maikel Jans: An Accompaniment Chatbot for People Onboarding to Open-Source Software Projects
- Marco Sousa-Poza: Subjective Well-Being and Temperature
- Marijn van Wezel: Formalizing the query language of Semantic MediaWiki
- Mark Fijneman: Fuzzing open source OPC UA implementations
- Menzo van Kessel: Achieving multiparty deadlock-free communication through linear typing
- Michiel Kraan: Bit-scale instead of byte-scale integer arrays in C
- Mick van Beijnen: Unsupervised Topic-Based Sentiment Analysis for Twitter
- Niels Feij: Karatsuba Algorithm for multiplication of Linearized Polynomials
- Norbert Boudens: Optimizing Elephant v2 for ARMv7-M
- Pepijn van Grunsven: Attacking the power grid by minimizing the IPv6 search space
- Pien van den Abeele: Designing and building a 5G security learning platform
- Quinn Ketelaars: A Linear Cryptanalysis of the DST40 Block Cipher
- Quinten Kock: Efficiently calculating reachability probabilities in Markov chains
- Quintine Sol: Demystifying Black-Box Survival Models
- Rick Litjens: Extracting firmware from flash memory chips
- Rico te Wechel: Bridges as an SMT problem
- Robin Foekens: Security of the Sponge Construction with a Random Transformation
- Rutger Dinnissen: Semantics of Languages with Goto
- Simcha van Collem: Verifying a Barrier using Iris
- Stefan Weijers: A feasibility study on analyzing and predicting client-side energy consumption of web browsing
- Stef Gijsberts: Prusti in Practice - A case study of using the Prusti auto-active program verifier for Rust
- Sven van der Post: Accessible Process Mining - Developing a Business User Application Utilizing the Heuristic Miner Algorithm
- Tea Coroş: The security risks of unverified and recycled email addresses
- Thijs de Jong: Mosaic as a SAT problem
- Thomas Broekman: Review of HLS Toolchain - Bringing Flexibility and Performance to Software Engineers
- Thomas Rhemrev: Creating Better Error Messages by Improving Their Presentation
- Tomas Woldu: Tackling the Far Output Distinction Problem
- Tygo Francissen: Exploring Feature Importances for Predicting Flight Delays Using Machine Learning Algorithms and Transfer Learning
- Walter Levens: Can a smartwatch measure sleep onset
- Willem Medendorp: Discovering the jump - Extending automated Kubernetes security assessment
- Wouter Doeland: Automated Formal Proofs Verification and Analysis of Security Protocols
2022
- Abdulkarim Abdulkadir: Bidirectional Context-Sensitive DGA Detection Using DistilBERT
- Abel Lucassen: Weighted Negative Selection
- Alexander Wolters: Formalizing the C preprocessor
- Alexandros Banos: WTFS - WebTorrent File System
- Alex van der Hulst: Exploring the difference between 2DFA and DFA for G-automata
- Anda Zāle: The Extent of Data Gathering by Third Parties on Dutch Health Websites
- Andrea Minichová: MM1T Learner for the 4-Way Handshake Protocol
- Bas van der Linden: A Component Analysis of Neural Network Architectures for Spectral based Audio Source Separation
- Cas Visser: Exploring Adaptive Experiments
- Ciske Harsema: A security analysis of the TP-Link TL-WR802N Router
- Daniël Vos: Data Freshness in Booking Support Systems
- Dante van Gemert: Task Oriented Programming in Lua
- Elina Antonova: mTask semantics and its comparison to TopHat
- Floris Valentijn: Systematic Analysis on the effect of 4G LTE Reconfiguration Settings on Measurement Report Generation
- Gijs Thuis: Comparing shallow autoencoders to normalization standardization and PCA as preprocessing step for outlier detection
- Hamzah Al Zubi: GASCAR - Genetically Automated Synthesizer Configuration for Audio Replication
- Hans Lous: The Influence of Graph Metrics on the Performance of Pathfinding Algorithms
- Iwan Litjens: An MCTS-based AI playing The Crew
- Jelmer Firet: Acyclic Push-Relabel
- Jelte Smits: Stop the infodemic - Designing and evaluating a misinformation warning mechanism based on expert voting
- Joshua Steinmann: Optimizing Kubernetes Cluster Down-Scaling for Resource Utilization
- Julius Benjamins: The covariance matrix adaptation evolution strategy - CMA-ES - as a method for fitting biological agent-based models
- Kimberley Frings: Formalizing and proving knights and knaves puzzles in three valued logic in Coq
- Koen Sauren: Improving reinforcement learning performance in 2048 using expert knowledge
- Laura Kolijn: Generating and Solving Skyscrapers Puzzles Using a SAT Solver
- Leon van den Boogaard: User understanding and user acceptance of biometric authentication on mobile phones
- Luke van Leijenhorst: Evaluation and analysis of a transformer model for detailed PIO element extraction on medical literature
- Marie-Sophie Simon: Judging a Tweets credibility - The effect of signature labels on perceived Tweet credibility
- Mario Tsatsev: Parameter Inference of Gravitational Waves using Inverse Autoregressive Spline Flow
- Marten Straatsma: Towards Formalising the Isoperimetric Theorem
- Max Jongmans: Online Political Participation in the Age of Digital Surveillance
- Michiel van de Noort: A Study of CNAME Cloaking-based Tracking on Dutch Websites
- Muhammad Salibi: A Comparative Study of Group Fairness Metrics for Ranked Outputs
- Nadezhda Dobreva: Combining Knowledge From Pre-trained Networks And Weight Agnosticism For Evolving Transferable Models
- Niccolò Carrivale: QuandleRUN
- Niek Terol: Computing apart states in a partial Mealy machine
- Niels Starren: Johnny can Encrypt - A Usability Study of IRMAseal
- Patrick van Beurden: Blueprints for out-of-core code generation using CUDA
- Polina Moroza: Comparison of temporal pooling methods and fusion strategies
- Quoc An Ha: Investigating Usability Problems in Email Encryption Tools Based on IBE
- Rick ten Tije: A comparison of counterexample processing techniques in Angluin-style learning algorithms
- Robin Holen: On iterated transducers and closure under hypotheses - Discussing the hidden relationship
- Robin Immel: Using automated feedback as a base for performing self-regulated learning in programming exercises
- Sam Haeck: Hack my audio back
- Sander Suverkropp: Towards a Formalization of Lsharp in Coq
- Seraph Jin: Classification and Interchange of Informal and Formal English Text
- Stefan Boneschanscher: Feature-based Randomness Constraints in Control Improvisation
- Stefan Jans: How to Visualise Decision-Making using Preferential Voting
- Stefan van Ieperen: Sniffing communications between an Arduino and its peripheral sensor
- Stefan Vlastuin: Educational Escape Rooms in Secondary Computer Science Education
- Thomas de Haan: Dark patterns in games - how do they influence player experiences and their willingness to give up personal information
- Thomas Klein Breteler: Improving OpenCRE
- Thomas Kolb: Fine-tuning Wav2vec2.0 on caption data
- Thomas Luijkman: Developing ELVis - A 4G network analysis and visualisation tool
- Ties Speel: Cryptanalysis of SPARKLE ARX-Box Alzette
- Tim van Alten: Investigating the Impact of Gamification on the Quality of Digital Mindfulness Practices
- Tom Rust: Fuzzing Zigbee using Z-Stack
- Tom van der Waa: The Acceptance of Digital ID Software among Dutch Elderly Citizens
- Vamsi Yerramsetti: ATIA - Automated Tongue Image Analysis for autoimmune disease detection with supervised machine learning models
2021
- Alessandra van Veen: Cookie Compliance of Dutch Hospital Websites
- Amber Pater: Pumping Lemma for Deterministic Weighted Automata
- Astrid van der Jagt: Extending context-free grammars with conjunction and negation
- Bart Hofman: Automated Malware Attribution - Using machine learning on binaries
- Bart Janssen: Incorporating Computational Thinking in Calculus lessons - a Characterisation of Algorithmic Thinking and Generalisation Skills
- Bram Pulles: Analysis of Akari
- Cas Haaijman: Axiomatising Trace Semantics for an Algebra with Parallel Composition
- Daan Derks: Separating the Heartbeats of Twins during Pregnancy using Random Forest
- Denise Verbakel: Influence of Design on Differential and Linear Propagation Properties of Block Cipher Family Skinny
- Dor Mariel Alter: Optimizing the NIST Post Quantum Candidate SPHINCS+ using AVX-512
- Evert van 't Oor: How time affects Facebook Reactions
- Evgeniya Ovchinnikova: Implementation of Integer Addition on a Spiking Neural Network
- Ferran van der Have: The X3DH Protocol - A Proof of Security
- Gerhard van der Knijff: Solving and generating puzzles with a connectivity constraint
- Giovanni Uchoa de Assis: Differential Analysis of SATURNIN and SPONGENT
- Hermen van Westen: Effect of Surface Form Dictionary on Effectiveness in Entity Linking
- Jesse Ravensbergen: Biased Perceptions of Media Sources
- Jordy Aaldering: A new semantics for array programming languages - how to introduce some laziness without being lazy
- Julius Landsman: Analysis of Confined Blocks World
- Kirsten Hagenaars: Using Equations to Define Non-Structurally Recursive Functions in Coq
- Koen Verdenius: A POMDP model for safety-critical systems and its deteriorating sensors
- Lars Jeurissen: E-mail phishing prevention proposal - CEPP
- Lisa Hoek: Web classification using DMOZ
- Lisa Kalse: Supply of and Demand for Information Regarding Update Support when Buying Smartphones
- Mathieu Bangma: ECDSA Based 2FA in the Browser
- Maurice Dibbets: Discovery of information disclosure vulnerabilities in the software development process
- Maxim van Loo: Automating the Light Switch
- Menno Bartels: Closure Properties of Nominal Languages under Substitutions
- Michiel Philipse: Distributed Knowledge Proofs in the Coq Proof Assistant
- Michiel Verloop: A Critical Review - Exploring Optimization Strategies in Board Game Abalone for Alpha-Beta Search
- Mike Schopman: Validating the accuracy of the MaxMind GeoLite2 City database
- Mitchel Jansen: Recognising Client-side Behavioral Detection of Web Bots
- Niels van Harten: Generating Mutation Operators for a Search-Based Model-Driven Implementation of the Next Release Problem
- Onno de Gouw: Mutual privacy and good manners on the social web
- Paolo Scattolin: A proposal for the use of Attack Trees in a semi-formal framework for modelling attacks and tolerance solutions with Petri Nets
- Patrick Lodeweegs: Approaches to stateful fuzzing of the IRC protocol
- Reinier Sanders: To Click Or Not To Click - A User Study on Phishing Click-Through Rates in Instant Messaging Applications
- Roland Leferink: Search personalization on Google.nl
- Stefan Popa: You Have Been Previewed - Information Leaks of Content Previews in Mobile Messengers
- Steven Bronsveld: Transducer Degrees
- Steven Maarse: Coupled transformation of feature models and domain models for software product lines
- Suzan Erven: Fusible Numbers and the Provability of Computability
- Tijn Berns: Exploring Unlearnable Examples
- Tom Aarsen: Implementation Evaluation and Comparison of Python Modules implementing Morphological Analysis and Generation
- Willem Lambooy: Linearly and arboreally stackable quantum-dot cellular automata and their discrete simulation
- Wouter Damen: Generating Kick Drum Samples with Neural Networks
- Wouter van Battum: Using IRMA as an authentication method for eduVPN
2020
- Abe Heemskerk: Introducing Programming in Primary Education - A Review of Scientific Literature
- Arie-Jan Kruijsse: Online verificatie van leeftijd en gezag
- Arne Diehl: Cognitive Psychology For Black Box Models - On Holistic And Featural Face Processing in Neural Networks
- Auke Zeilstra: An exploration of static analysis used on C cryptography libraries
- Bart Pleiter: Fuzzing Wi-Fi in IoT devices
- Bob Ruiken: The Impact Of Sorts On Non-Termination Analysis Of Term Rewriting Systems
- Ceel Pierik: Infinite Omniscient Sets in Constructive Mathematics
- Charlotte Leuverink: An implementation of Andersen-style pointer analysis for the x86 mov instruction
- Daniel Goßen: Design and implementation of a stealthy OpenWPM web scraper
- Dave Artz: Information Technology Support for the Arterial Thoracic Outlet Syndrome
- Egidius Mysliwietz: Identifying rootkit stealth strategies
- Eline Bovy: Comparison of the second round candidates of the NIST lightweight cryptography competition
- Ellen Gunnarsdóttir: Trezor One side-channel analysis setup
- Evelien van Workum: Perceptions of Dutch - Former - CS Teachers regarding the Assessment of Fundamentally New Learning Objectives
- Floris Hendriks: Analysis of key management in Matrix
- Gunnar Noordbruis: Energy efficient WLAN using WiFi standards on an Archer C7 AC1750 access point
- Hylke de Zee: Informatie behoeften Google Analytics gebruikers
- Ilse Arwert: Embryo Classification using Neural Networks
- Jaap Dijkstra: Gaussian Processes versus Autoregressive Wild Bootstrap - Climate Application
- Jan Aarts: A GWAS about the wingsize of Nasonia Vitripennis
- Jesse van Son: Security by design in Azure DevOps pipelines - a case study at SpendLab technology - redacted
- Job Doesburg: Using IRMA for small scale digital elections
- Johan Sijtsma: Creating a Formal Model of the Game 2048
- Joren Vrancken: A Methodology for Penetration Testing Docker Systems
- Josien Visschedijk: Text mining pathology reports
- Julian Besems: A Specification Language and Semantics for Architectural Design
- Kirsten Kingma: Parsons' puzzles as formative assessment
- Koen Wösten: Abstract Nonsense and Programming - Uses of Category Theory in Computer Science
- Lars Kuipers: Analysis of Attack Trees - fast algorithms for subclasses
- Lars van Rhijn: Using optimized electric vehicle charging for demand side management
- Laura Philipse: Routing Algorithms for Autonomous Agricultural Vehicles
- Luko van der Maas: Creating Canned Recursion in Functional Programming Languages from Category Theory
- Luna Elise Schernthaner: Mediation Analysis of Nurse Practitioner Impact on Renal Outcome in CKD Patients
- Marc van de Werfhorst: Security recommendations for Agile and DevOps development at Ridder Data Systems
- Maris Galesloot: Exploring taint analysis methods for the grey-box learning of Java systems
- Matti Eisenlohr: The effects of search languages on multilingual online news consumption
- Mauk Lemmen: Optimizing Elephant for RISC-V
- Michael de Jong: Java Implementation and Analysis of Multi-party Private Set Intersection Protocols
- Michel de Boer: Secure communication channels for the mTask system
- Milan van Stiphout: Flood-It as a SAT Problem
- Mischa van Reede: Evaluating the practicality of using blockchain technology in different use cases in the healthcare sector
- Pascal Bongartz: Automatic code generation for protocols via Dezyne and Nail
- Pascal Engelbarts: Technology usage patterns of the Dutch youth in relation to social isolation
- Rick Koenders: Intuitionism in Lean
- Rick van der Wal: The usefulness of automated style-related feedback to object-oriented programming students
- Romy Stähli: Access Control in a Task-Based Methodology
- Ruben Holubek: Designing and evaluating a learning activity about debugging for novice programmers
- Steven Wallis de Vries: Designing a simple and secure email delivery protocol - SMTPsec
- Tobias van der Werff: Detecting Fingerspelling in Sign Language Videos Using Pose Information
- Toine Hulshof: Cross-Platform Mobile App Development - Translating SwiftUI to Jetpack Compose and vice versa
- Tom Smitjes: Connecting Mixed-Integer Linear Programming and Finite-memory POMDP Strategies
- Tosca Klijnsma: Semantic Equivalence of Task-Oriented Programs in TopHat
- Yannick Hogewind: Data-Driven Estimation of Retail Building Energy Consumption
2019
- Constantin Blach: Xoodoo Trail Analysis
- David Korsman: De oorzaken en gevolgen van het uitstellen van de IPv6-adoptie
- Dennis Kleverwal: Writing with Dobot Magician
- Gijs Hendriksen: Extending WASP providing context to a personal web archive
- Hendrik Werner: The State of Entropy Generation in Practice
- Hendrik Willing: Effectiveness of Common Defense Mechanisms Against Adversarial Inputs for DNN based Android Malware Detectors
- Huy Nguyen: Exploring Python as a replacement for C++ in Imperative Programming for Computing Science at Radboud University
- Jeroen Wijenbergh: Performance comparison of DNS over HTTPS to unencrypted DNS
- Justin Hende: MineChecker - A tool for detecting click-based browser cryptomining
- Kevin Heijligers: Algoritmen unplugged - conceptueel begrip van leerlingen in het voortgezet onderwijs
- Lars Jellema: Optimizing Ascon on RISC-V
- Lennart Jansen: Maatregelen ter bescherming van patiëntendossiers van extra beschermde personen tegen oneigenlijke inzage in ziekenhuizen
- Maaike van Leuken: Comparing Correlation Coefficient and Difference of Means in a Differential Power Analysis Attack
- Maarten Dorrestijn: Finding the guard leveraging bandwidth statistics to identify TOR guard nodes
- Manuela Bergau: Human-in-the-loop Strategy Synthesis PAC-MAN verified
- Max van Deurzen: The anatomy of the modern window manager - a case study for X in an Agile manner
- Nick Nibbeling: Comparing privacy plugins
- Nienke Wessel: The Semantics of Ownership and Borrowing in the Rust Programming Language
- Raka Schipperheijn: Implementing Xoodoo with protection against single fault attacks on Cortex-M4
- Reinier Joosse: An Extended Algorithm for Learning Serial Compositions of Mealy Machines
- Richard van Ginkel: Security in public Wi-Fi networks
- Robin Smit: A machine learning approach for recommending items in League of Legends
- Sam Sweere: Increasing the Perceptual Image Quality of Adversarial Queries for Content-based Image Retrieval
- Thomas_van_der_Burgt___Implementing_the_NIST_lightweight_cryptography_candidates_Xooday_and_Subterranean_2.0
- Thomas van Ouwerkerk: Investigating the minimality of the ZH-calculus
- Thomas Welten: Predicting Pelvic Floor Surgery Outcomes
2018
- Aaron Visschedijk: Trading Bitcoin using artificial neural networks
- Aucke Bos: Visulizing differences between HTML documents
- Bart Gruppen: From mu-regular expressions to CFGs and back
- Bart van den Boom: State machine inference of thread networking protocol
- Bart van de Put: Scoring Entity-Relationship Diagrams Drawn by a Computer Algorithm
- Bas Hofmans: Transducers over G-sets and their properties
- Bram in t Zandt: Software Supply Chain Security for Banking Websites
- Dion Scheper: Irma over Bluetooth
- Evi Sijben: A deep residual network for recognizing cluster-based generic photo categories
- Frank Gerlings: Digital flowchart maker
- Giel Besouw: Simulating NXT robots
- Gijs Cuyck: A complete version of the ADS method for comformance testing
- Hoang Gia Linh: Optimization of the NTT function on ARMv8-A SVE
- Ischa Stork: Performing an online template attack on two different implementations of FourQ
- Janne van den Hout: Continuations in functional programming languages
- Jan Potma: An exponential construction for Sokoban
- Jasper Haasdijk: Searching IPFS
- Jelle Loman: Comparing the performance of the Laplace and Staircase mechanisms in differential privacy
- Jeremy Guijt: Checking model learning hypotheses with symbolic execution
- Jeroen van Alem: Improving Mobile Ad Hoc Networks in Realtime Situations
- Jeroen van Voorst: Augmented reality as a general indoor and outdoor navigation solution
- Joep Veldhoven: Automata extended to nominal sets
- Jonathan Moerman: Evaluating the performance of open source static analysis tools
- Joris den Elzen: Characteristic Formulas and CakeML
- Jos Craaijo: An efficient parsing machine for PEGs
- Jules van Thoor: Learning state machines of TLS 1.3 implementations
- Leo Cornelissen: Simulating Lego Mindstorms EV3 robits using Unity and Python
- Lotte Fekkes: Comparing Bitcoin and Ethereum
- Mark Wijkhuizen: Security analysis of the Itasks framework
- Marnix Suilen: Reachability properties for uncertain MDPs
- Max Leijtens: Solar panels and LoRaWAN
- Mees Neijenhuis: Improving decision tree learning by looking ahead
- Mick Koomen: Using power analysis to differentiate between malicious repackaged apps and clean apps
- Nathan van Beusekom: Properties of codings in lambda-calculus
- Niek Janssen: Stateful Programming in Clean
- Niels Drueten: Security analysis of DTLS 1 2 implementations
- Niels van den Hork: Data Representatie van Afbeeldingen in het VO Lesontwerp en Begripsproblemen
- Nikki van der Gouw: Representatie van spraak in diepe neurale netwerken
- Noel Bangma: Ascon An attempt in NEON on the Cortex-A8
- Phil Geelhoed: Investigation into voice search
- Randy Wanga: Analysing Spotify listening data from Armada music
- Rick Lukassen: Determining the Neo-Piagetian reasoning level of novice programmers
- Robin Elbers: On the replication of CycleGAN
- Sander Hendrix: Accessing PEP data
- Sebastiaan Versteeg: Inferring state machines of Tunneled Direct-Link Setup
- Serena Rietbergen: 2-Way Finite Automata
- Stan van Lier: Robustness of federated averaging for non-IID data
- Tiko Huizinga: Using NFC enabled Android devices to attack RFID systems
- Timo Maarse: Parsing with derivatives in Haskell
- Timo Schrijvers: Learning register automata using Taint analysis
- Tom Nijholt: Why do we need and want cryptocurrency
- Tom Sweers: Autoencoding credit card fraude
- Willem van Summeren: Tree Automata
- Wouter de Boer: Power Analysis of the Ledger NanoS
2017
- Bart Veldhuizen: Automated state machine learning of IPsec implementations
- Camil Staps: Code-generation-for-the-Thumb-2-instruction-set
- Erin van der Veen: The Practical Performance of Automata Minimization Algorithms
- Flip van Spaendonck: Comparing Web Page Layouts using Tree Edit Distance
- Jan Martens: Parsing-expression-grammars-constructing-a-linear-time-parser
- Jordy Gennissen: Gamut Sifting through Images to Detect Android Malware
- Laurens Kuiper: Axis-Parallel Five-in-a-Row is PSPACE-Complete
- Luuk Arts: Comparing Discretization Methods for Applying Q-learning in Continuous State-Action Space
- Martin Meyers: Side channel protected Keyak on ARM Cortex-M4
- Marvin van Bekkum: Een technische en juridische analyse van het protocol van de Veilige E-mail Coalitie
- Mathis Sackers: A Comparison of String Distance Metrics on Usernames for Cross Platform Identification
- Matthias Vogelaar: Defining the Undefined in C
- Michel Botros: Supervised Learning in Human Activity Recognition based on Multimodal Body Sensing
- Michel Kok: A Context-based Introduction to Finite State Automata in Secondary Education
- Oussama Danba: Implementing the authenticated cipher MORUS using NEON
- Robin Tonen: Exploring Variable Ranges in Machine Learned Models
- Sietse Mooren: Link prediction op het RU domein
- Stan Derksen: Creating-a-secure-virtual-private-network-using-minimal-code
- Tessa Schlief: Leren-Programmeren-in-Python
- Thijs Voncken: Procedural-maze-generation-an-L-System-based-approach
- Thijs Werrij: Het-uitbreiden-en-evalueren-van-scatterplots
- Tim van Dijk: A high-performance threshold implementation of a BaseKing variant on an ARM architecture
- Toon Lenaerts: Improving-protocol-state-fuzzing-of-SSH
- Twan Cuijpers: Recognizing text in the wild
- Ward Theunisse: Breaking the chain Security analysis of a pilot system for detainee monitoring in the Dutch Custodial Institutions Agency
- Willem Boumans: Web tracking and current countermeasures
2016
- Abdullah Rasool: AAWSOME
- Bauke Brenninkmeijer: Catching IMSI-catcher-catchers
- Gerben van der Lubbe: A New Hope for Nussbaumer
- Ivar Derksen: HTML5 Tracking Techniques in Practice
- Jan Schmidt: Towards More Flexible Automatic Decision Making
- Jeftha Spunda: Approximate Nearest Neighbor Field Computation via k-d Trees
- Justin Mol: The Evolvability of iTasks using Normalized Systems
- Koen Basten: Classifying Landsat Terrain Images via Random Forests
- Lars Kuijpers: Invloed van MetaCost op imbalanced classificatie problemen
- Laurens Brinker: Security analysis of the IRMA app using SPARTA and fuzzing
- Maarten Schellevis: Getting access to your own Fitbit data
- Matjah Sonneveld: Protecting app secrets in Android
- Matthias Ghering: Evil Twin Vulnerabilities in Wi-Fi Networks
- Nick Tönissen: Een tool voor acceptatieonderzoek naar IT
- Patrick Tan: How to Evaluate Network Models Used in Clinical Decision Making
- Paul Huberts: Het gebruik van architectuurconcepten bij de ontwikkeling van web-mobiele applicaties
- Sander van Dam: Sufficient conditions for sound hashing using a truncated permutation
- Stijn Meijer: Secure Location Verification for ADS-B
- Ties Robroek: Accelerating BCCD using parallel computing
- Timo van Niedek: Phonetic Classification in TensorFlow
- Tom Nies: Privacy Protection Against Cross-Device Tracking Methods
- Tom Nikken: Een Deductieve Semantiek voor iTasks
- Tom Sandmann: Relevant biomarkers in the prediction of good and bad days for multiple sclerosis patients
- Wietse Kuipers: Improving matchmaking with game data
- Wouter van der Linde: Parallel SHA 256 in NEON for use in hash based signatures
2015
- Aaron van Geffen: Digitizing an interactive collaborative teaching methodology using web technologies
- Bas Elbers: De menselijke maat in een zich ontwikkelende techniek
- Berry Lyklema: Social Media & Werkafspraken
- Charlie Gerhardus: Een ownership based garbage collector voor de taal cgt
- Daniel Roeven: Snap-to-Style
- Daniel van Loon: Het overzichtelijk houden van kennis bij het gebruik van Scrum
- Demian Janssen: On-parsing-expression-grammars
- Dion van de Vooren: Hoe accuraat kun je de populariteit van muziek voorspellen met behulp van social media
- Emma Gerritse: Herbrands theorem
- Jolein Kluten: Inzet-van-speelelementen-bij-organisatie-veranderingen
- Jonathan Seesink: The applicability of Grinbath EyeGuide Tracker to mobile devices for usability testing
- Julian Neeleman: Optimisations and Generalisations of Retrograde Analysis
- Koen Vijverberg: Finding hyperintensities in the brain using unsupervised feature learning
- Leon Botros: Optimizing NORX for Atmel 8bit AVR microcontrollers
- Luuk Scholten: Transforming ORM into O-RM
- Martin Huyben: Toepassingen in COcaml
- Mats Ouborg: Formalizing Group Model Building
- Maurice Knoop: Introduction to YARMIS a dynamic alternative to RMI
- Michael Jansen: Smartphone privacy demo
- Rick Erkens: The Turing machine model extended with interaction
- Rob ten Berge: Statistical Model Checking of a Digital Hydraulic Power Management System
- Ronnie Swanink: Persistent-effects-of-man-in-the-middle-attacks
- Sanne Boumans: Lost in Translation Automatic Learning of Statistical Models for Language Translation
- Simon Brugman: Computationally Feasible Logo Recognition using Deep Learning
- Stan Philipsen: Usability van Wikipedia editors
- Stijn Voss: Training the CIA model using back propagation
- Sven Arissen: 414 bit multiplication on the ARM Cortex M0
- Thomas de Bel: K Means clustering of a database with PTSD and other psychiatric patients
- Thom Wiggers: Implementing CAESAR candidate Prost on ARM11
- Tobias Schroeter: Het gebruik van Automated Assessment Tools in programmeercursussen
- Tom Evers: Twee-manieren-voor-het-leren-van-een-DTD-bij-voorbeelden-van-XML-documenten
- Tom van Bussel: Inferring gene regulatory data
2014
- Ben Brucker: Government intervention on consumer crypto hardware
- Gerco van Heerdt: Efficient Inference of Mealy Machines
- Gerdriaan Mulder: LTE WiFi Handover Strangelove
- Jip Dekker: Generating Google Go framework from Uppaal models
- Joep Top: Een BASS-FinLog achitectuuranalyse
- Jory van Keulen: Smart Charging A privacy and security analysis
- Lars Bade: Vertrouwelijkheid in het iRN
- Laurens van Dijk: Finding musical genre similarity using machine learning techniques
- Marvin Barron: Shortest Path Estimation for small world networks
- Max Tijssen: Automatic modeling of SSH implementations with state machine learning algorithms
- Mirjam van Nahmen: Automatically Learning a Model of the SSH2 Transport Layer
- Moritz Neikes: Efficiency of large scale DC networks
- Patrick Verleg: Cache Cookies searching for hidden browser storage
- Pien Walraven: Communicatie binnen software development teams Scrum versus waterval
- Rafael Alejandro Imamgiller: Formal Characterisation of the Functional Strategy
- Ramon van Sparrentak: A concrete deskolemization algorithm
- Rodin Aarssen: Proving a folk theorem using Kleene Algebra with Tests
- Tim Janssen: A Linear Quantile Mixed Regression Model for Prediction of Airline Ticket Prices
- Wesley Janssen: Curve25519 in 18 tweets
2013
- Bas van Zadelhoff: Towards Large Diagnostic Bayesian Network Models
- Ben Siebert: Smartphone-privacy
- Bram Arends: Quaternionen voor proper rigid body transformations in computer graphics
- Eduardo Pablo Novella Lorente: Reverse engineering Internet Banking
- Elmar Dongelmans: Leerstijlen en e-learning
- Idzard Stoker: Computational thinking in lesmateriaal voor informatica
- Joel Cox: Profiling knowledge workers using open online profiles
- Joeri Arendsen: Advance Organizers
- Joost Janssen: The ACCQ Methodology Assuring Consumer Satisfaction of Cloud Service Quality
- Joost Rijneveld: How the Dutch broke the Japanese Blue Code in the late 1930s
- Judith van Stegeren: Exploring the inference problem for D0L-Systems
- Kelley Philip van Evert: Graph models for the untyped lambda-calculus
- Kevin Valk: AndroidCard A framework for writing NFC applets on Android
- Koen Buitenhuis: DigiD vs. JavaScript the risk of using third party JavaScript on government websites
- Koen van Ingen: Cookiewalls Een probleem met een technische oplossing
- Linus van Elswijk: Hierarchical Path-Finding Theta star Combining HPA star and Theta star
- Maarten Bovy: Digitale medische verslaglegging Een koppeling tussen patient conditie en dossier
- Martijn Terpstra: WhatsApp and privacy
- Mathijs Vos: Voor de draad ermee Een vakdidactische verkenning van programmeren met threads
- Matthijs Hendriks: Analysing Multicriteria Route Planning
- Nicky van Rijsbergen: Responsible Disclosure een kritische beschouwing
- Niels van der Weide: Computing Exact Solutions of Initial Value Problems
- Petra van den Bos: Vakdidactische aspecten van security
- Ramon Janssen: Learning a State Diagram of TCP Using Abstraction
- Raoul Estourgie: Analysis of Android Authenticators
- Robin Munsterman: Equality of infinite objects
- Sanne Derckx: Is de smartphone smart genoeg voor ouderen
- Sven van Valburg: Security of Browser Add-ons A Firefox 21 Case Study
- Thomas Naegele: MapReduce Framework Performance Comparison
- Wouter Geraedts: Time-Based Modeling and Verification of Flow Systems in UPPAAL
2012
- Bas Visser: Facebook Privacy
- Bas Vossen: Problem Solving Perspectives
- Beau Verdiesen: The webmail experience
- Christiaan Hillen: The IT Anamnesis
- Danny Romme: Hoe denken middelbare scholieren over de Informatiewetenschappen
- Dennis Brentjes: Concurrency issues in the iTasks3 framework
- Eamonn Cassidy: Hoe draagt draadloze communicatie bij aan de procescommunicatie binnen de Nederlandse Spoorwegen
- Erik Boss: Evaluating implementations of SSH by means of model-based testing
- Feike Geerts: Usability Microsoft Word
- Ferdi van der Werf: Op zoek naar mogelijkheden en randvoorwaarden voor robotica onderwijs in het VWO
- Hans Harmannij: Logging NFC data on a Google Nexus S
- Ivan Koster: Reinforcement Learning and the Parallel Actions Common Goal problem
- Jan Vogels: Regels voor Serious Gaming in Requirements Engineering
- Jasper van Duijnhoven: How can game genres contribute to the learning process
- Joost Kraaijeveld: Probabilistic causal logic in discrete event training simulations
- Koray Yanik: Designing a functional and minimalistic Operating System
- Ko Stoffelen: Comparison of chain merge behaviour of TMTO methods
- Manu Drijvers: Model Checking Tamper-Evident Pairing
- Marcel van der Made: Een case-study naar het leren van real-time automaten
- Marc Schoolderman: Fuzzy lexical matching
- Marijn van der Zaag: Digitalisering van contant geld
- Mark Zandstra: Genereren van operationele specificaties aan de hand van UML diagrammen
- Mehdi Aqadjani Memar: Hardware Onafhankelijk Besturingssysteem
- Michiel van Lierop: Crossing Borders an Analysis of the Experiences of Dutch Bachelor Students Working on the Community Outreach Project in India and Zambia
- Niklas Weber: Typed Skipgrams Investigated
- Patrick Schileffski: Do not track
- Peter Maandag: Solving 3-Sat
- Philipp Jakubeit: Implementation and Analysis of OpenPGP Functionality via NFC
- Robert Kleinpenning: Is Javacardsign correct and secure
- Roberto Alves de Almeida Junior: Model-based Testing with a B Model of the EMV Standard
- Sjors Gielen: SIM Toolkit In Practice
- Stein Keijzers: Voxel Pad Reductie
- Tim Cooijmans: Internetverkeer als bewijsmateriaal
- Tom de Ruijter: Online and co-regularized algorithms for large scale learning
- Willem Burgers: Session Proxy A prevention method for session hijacking in Blackboard
- Xander Damen: Een keuze voor webserver architecturen afhankelijk van het dynamisch karakter van een website
2011
- Anne Westerhof: Antivirus software versus Malware
- Bart Leusink: Serious Gaming in Software Engineering
- Bart Lutgens: Stealth SMS Description of how it works
- Bram Vonk: Autoriteiten vinden op Twitter
- Christiaan Thijssen: Leefpatronen in Twitterberichten van actieve gebruikers
- Dennis Aarts: Modeling concepts taught by a board game
- Erik Maessen: FNWISurvey Nieuw enquete systeem voor de FNWI
- Geert Smelt: Programming Web Applications Securely
- Ilian van der Velden: Leren programmeren Programmeeronderwijs op de middelbare school
- Iris Trepels: The Open Source Community and Piracy
- Joost Kremers: Practical hacking AES using the S-box weakness
- Joost Timmerman: Where am I? Where should I go?
- Kevin Reintjes: Veiliger authenticeren met de Yubikey
- Nick Gubbels: Extending F-lite with generic: G-lite
- Niek Wolfkamp: Online and offline privacy
- Niels Braakensiek: Organisational Communication uitdrukbaar in Demo?
- Rens van Summeren: Security in Online Gaming
- Robin Oostrum: De kwaliteit van fonetische transcripties
- Rob Thijssen: Argument based modeling analyses on business process models
- Roel van Rijswijck: Negotiations as Conceptualizations
- Steffen Janssen: Decoding directed covert attention in BCIs using HMMs
- Tim van Lokven: Review and Comparison of Instant Messaging Protocols
- Wouter Lockefeer: CleanDoc
2010
- Albert Gerritsen: Expressieherkenning
- Antolin Janssen: Kernel Machines for Multi-Class Classification: A Joint Kernel Approach
- Bram Bruines: Plankalkul
- Carsten Ruetz: Timed Model-Based Conformance testing
- Jeffrey Kwee: Serious Gaming in Requirements Engineering
- Jeffrey Lemein: fMRI-Based Image Reconstruction Using the Elastic Net
- Lars Lockefeer: Encrypted SMS an analysis of the theoretical necessities and implementation possibilities
- Louis Onrust: Paraphrasing factoid dependency trees into fluent sentences in a natural language
- Marco Henrix: Aan de hand van hersenactiviteit reconstrueren wat iemand ziet
- Mark Spreeuwenberg: Het testen van smart meters
- Marlon Baeten: Rahisi simple web development
- Martin Devillers: Analyzing password strength
- Rik Janssen: Hoe ziet een systeem eruit dat klassiek slagwerkles computationeel kan ondersteunen?
- Robin Rutten: XMPP en het real-time web
- Royce Benda: Informatiekunde Inleven en laten Beleven
2009
- Daan Pijper: Requirements, informatica versus architectuur
- Feng Zhu: Smart Card Based Solutions for Secure Internet Banking with a primitive reader or mobile phone
- Freek van den Berg: Creating a meta model describing a production system's concepts and their relations
- Jelle Schuhmacher: Intrusion Detection met Core Vector Machines
- Jeroen Claassens: Hamminggetallen Een complexiteitsvergelijking tussen verschillende algoritmen
- Joost Koppers: Database encryptie schema's Omgaan met privacygevoelige informatie
- Jos Groenewegen: Supporting sign language in Human Computer Interaction Understanding the challenge
- Kevin Vriens: Automatisch parkeren: Hoe werkt het?
- Koen Hulsman: Persoonlijk nieuws: een kijkje in de keuken van de personalisatie van online nieuwswebsites
- Martijn Sprengers: The Effects of Different Bayesian Poison Methods on the Quality of the Bayesian Spam Filter SpamBayes
- Matthijs Smith: Implicit Information Retrieval
- Mirko van Ede: Testondersteuning in frameworks voor webapplicaties
- Pepijn Arts: Semantische Web Services
- Philipp van Bebber: Internet Banking Shopping: De gevaren achter het hangslot
- Richard Willems: Knowledge sharing and retention through the use of collaboration software
- Ruben Muijrers: Expressieherkenning met PCA en SVM
- Sander van Hooft: ICT for Ethiopia's land administration
- Steffen Michels: Analysing Onion Routing
- Thierry Stamper: Mislukte IT projecten: een kwestie van beter plannen?
- Walter Moerkerken: Conceptualiseringstechnieken uit de ICT toegepast op Enterprise Architecturing
2008
- Adam Cornelissen: A Modern Turing Test
- Bernard van Gastel: Reliability of a read-write lock implementation
- Erik Crombag: DigiCoach
- Erik Steinmann: De acceptatie van internetcensuur door bezoekers van Nederlandse online nieuwsgemeenschappen
- Fabian van den Broek: Static Code Analysis In Java
- Julian Verdurmen: Firefox extension security
- Julius Muecke: Database Schema Integratie
- Juul Coolen: Temporele doorloop in systeemontwikkeling recht-toe-recht-aan versus herhaling
- Laura Nij Bijvank: Automatische code generatie met de TimesTool
- Leon Swinkels: Towards a security-classification of wireless networks an empirical approach
- Leon Swinkels: Towards a security-classification of wireless networks an empirical approach
- Martijn Ermers: Datatranslatie met MT
- Robbert Krebbers: Uitdrukkingskracht van XML schema's
- Rolf Markwat: SOA: Bijdrage of hype voor portal Radboud Universiteit?
2007
- Allan van Hulst: From Java to mCRL2
- Bart Schotten: Een Vergelijking van Elektronische Betaalmethoden voor E-commerce
- Eddy Klomp: Quality Aspects and Decision Points
- Frank van der Loo: Error correctie in VOiP
- Freek Verbeek: Getallen En Functies In De Pi-Calculus
- Ilona Wilmont: Enhancing usability for elderly people
- Jean-Pierre de Rooij: Is an electronic passport usable as an authentication token?
- Johan Janssen: Using JML to protect Java code against SQL injection
- Jordy Voesten: Business Rules and iData: A Powerful Combination?
- Nina Hoedt: Internetverslaving onder Informatica en Informatiekunde studenten
- Sven Haster: Een technische analyse van RIESKOA
- Wouter Roelofs: The AOL Scandal
2006
- Alex Hamakers: Nieuwe werelden, oude gevaren: cheating in MMORPGs
- Daan Laros: Integriteit van mens en systeem
- Danny Sarbo: Bachelorscriptie Informatiekunde
- Dennis Janse: Het Semantische Web
- Dirk Tonnaer: Diagnostic decision support in de huisartsgeneeskunde
- Eelis van der Weegen: Formalizing the Hamming Stream in Coq
- Francois Kooman: Websurfen met onbetrouwbare computers
- Hensley Hanse: Formele talen voor een formele RE
- Johan Stortelder: Spraaksynthese
- John Akkermans: Online privacy in ruil voor terrorismebestrijding
- Mark Jenniskens: De toepasbaarheid van ISO 9126 voor kwaliteitsbeoordeling van m-services
- Mark van Liefland: Requirements Engineering bij marktgedreven IT-bedrijven
- Martijn Moraal: Massive Multiplayer Online Game Architectures
- Martin van de Goor: Genetische algoritmes en parallellisme
- Matthijs Mekking: Capability of Kerberos
- Matthijs van Roosmalen: Requirements & Verandering
- Paul Dekkers: Publieke Software
- Rene Joosten: Requirements Engineering voor informatiesystemen
- Rody Kersten: The composition Agreement in Ambient Networks
- Rogier Lommers: Profiling onder studenten Informatica en Informatiekunde
- Roy Bos: Informatiearchitectuur
- Thomas Dobbe: Requirements Traceability
- Thomas Janssen: Recommender Systems voor het realtime aanbieden van nieuwssecties
- Tom van den Broek: Object Relational Mappings
- Vincent Driessen: The Power of Wobbly Types
This page was generated on Sun 22 Dec 2024 03:33:18 AM CET