Searched for: contributor%3A%22Venkatesha+Prasad%2C+R.R.+%28graduation+committee%29%22
(1 - 16 of 16)
document
Thiessen, Sven (author)
The uprise of the Internet of Things (IoT) has been a hot topic for several years. While many see these devices and think they bring ease to their lives, it is far from reality. Researchers found many privacy and security problems within these devices in the last years. The popularity of these devices causes many users to bring a device into...
master thesis 2022
document
Hondelink, Dieuwer (author)
Digital signatures are used everywhere around us. They are well-studied and have been standardized since 1994. In 2002, Johnson et al. introduced the notion of homomorphic digital signatures, allowing one to perform computations on signed data. These signatures are especially useful for linear network coding, a technique used to improve...
master thesis 2022
document
Kapitonenko, Nik (author)
JSGLR2 is a java implementation of the Scannerless Generalized LR-parsing (SGLR) algorithm. It employs a modular architecture. This architecture comes with a performance overhead for letting multiple components interact with each other. This paper looks into the size of the performance overhead penalty for the recovery parser variant. It does so...
bachelor thesis 2021
document
de Ruiter, Justin (author)
The Scannerless Generalized-LR (SGLR) parsing algorithm allows parsing of declarative and modular syntax definitions. However, SGLR is notorious for having low performance, negatively impacting its adoption in practice. This paper presents several performance optimizations for JSGLR2, which is an implementation of SGLR. All optimizations are...
bachelor thesis 2021
document
Coman, Mara (author)
JSGLR2 is a modular Java implementation of the SGLR parsing algorithm that supports systematic benchmarking and improvement of its several parsing variants. By splitting the code into several components, they can be tested in isolation and thus optimized more effortlessly. The modular architecture, although beneficial for efficiently identifying...
bachelor thesis 2021
document
Toman, Martin (author)
Under what conditions can cooperation emerge and how can we sustain it? We build a computer simulation of a multi-agent spatial environment using Prisoner’s Dilemma as the principal agent interaction. We expand the model by allowing agents to remember a fixed number of past defectors and abstain from interacting with them again. Agents will be...
bachelor thesis 2021
document
Tofacchi, Tommaso (author)
The complex dynamics that shape human interactions have been the object of studies for decades. One of the most famous examples to analyse the cooperative or defective nature of people is the Iterated Prisoner’s Dilemma (IPD), a versatile dynamic game which has been shown capable of capturing the emergence of cooperative behaviours in...
bachelor thesis 2021
document
Timmermans, Raymond (author)
This paper combines the concepts of noise and stability in the iterated prisoner's dilemma. The purpose is to find strategies that score well (have a high cooperation percentage) in a homogeneous noisy environment, but are also robust to invasions. Generally, strategies that perform best under noise are maximally forgiving, however,...
bachelor thesis 2021
document
Gismondi, Roberta (author)
Decision-making dynamics and their impact of human behaviour have raised a large number of questions throughout the years. Traits like competition and collaboration amongst agents are often studied, in the context of Game Theory, by the medium of games such as the Iterative Prisoners’ Dilemma.Furthermore, many realistic scenarios and possible...
bachelor thesis 2021
document
Knops, Per (author)
In the Iterated Prisoner’s Dilemma players can take advantage of other players. This has no drawbacks for the player after that game, since it is assumed that the players have no memory. When reputation is introduced however, a single game of the Prisoner’s Dilemma can influence other games. In this paper research is done on how reputation can...
bachelor thesis 2021
document
de Hoog, Dion (author)
In this research, we use different supervised and unsupervised machine learning techniques to detect anomalies in NetFlow data. We aim to create a system for home or small-business use where the user is in control. We use WEKA for the machine learning models and feature selection. The UGR’16 dataset is used to train and test the models. We...
master thesis 2021
document
Lazo, Claudio (author)
Algorithmic decision-making (ADM) is becoming increasingly prevalent in society, due to the rapid technological developments in Artificial Intelligence. ADM make substantially impactful decisions about people: diagnosing whether we have a disease, what news and which ads we get to see, whether we<br/>are eligible for a job, benefits, a college...
master thesis 2020
document
Karayalçin, Sengim (author)
Blockchains and cryptocurrencies, like Ripple, are becoming more widely used. Testing the large decentralized systems these technologies on is complex, as the behavior of the system is dependent on many external factors. We will examine the viability of using passive model inference techniques to test the systems based on the network traffic...
bachelor thesis 2020
document
Behnen, Francis (author)
The XRP network (Ripple network) is a global transaction network that settles trans- actions in seconds. It is a technology that provides new opportunities for traditional fi- nancial institutions and startups. In the XRP network, participants depend on each other’s functioning. However, at present Ripple Labs, Inc. is the only actor monitor-...
bachelor thesis 2020
document
Roelvink, Marijn (author)
Ripple is a relatively new payments network that aims to improve the financial system by unifying its underlying infrastructure. Given its critical function, its system must be reliable and free of bugs. Therefore it should be tested extensively. One of the test methods that has not been used on it yet is log inference, a method that has a good...
bachelor thesis 2020
document
Bubberman, Wolf (author)
The Ripple XRP Ledger network hosts a cryptocurrency called XRP which uses the TLS protocol to send messages between nodes. It is crucial that the network is tested against attacks to ensure its security. The Ripple XRP Ledger could be vulnerable to a Man-in-the-Middle (MITM) attack. This MITM attack is an attack which can intercept and modify...
bachelor thesis 2020
Searched for: contributor%3A%22Venkatesha+Prasad%2C+R.R.+%28graduation+committee%29%22
(1 - 16 of 16)