Searched for: department:"Software%5C+Technology"
(81 - 100 of 278)

Pages

document
Van Schooten, S. (author), De Groot, E. (author)
While software is becoming increasingly important in our world, software development is also advancing with an increasing pace. One of the reasons is the increase in available information, which triggered the birth of a new programming paradigm: Model Driven Development (henceforth MDD). Though this can shorten the development time and make it...
bachelor thesis 2015
document
De Jong, N. (author)
Twitter contains massive amounts of user generated content that also contains a lot of valuable information for various interested parties. Twitcident has been developed to process and filter this information in real-time for interested parties by monitoring a set of predefined topics, exploiting humans as sensors. An analysis of the relevant...
master thesis 2015
document
Mackenbach, C.M. (author), Ang, A.W.Z. (author)
KeyLocker, a start-up developing cryptographic products that put the control of encryption keys into the hands of the end-users, has requested a review of their own software development process. During their first year of existence, the company experienced problems in following software development methodologies, sharing knowledge effectively...
bachelor thesis 2015
document
De Jong, M. (author)
When a web service or application evolves, its database schema --- tables, constraints, and indices --- often need to evolve along with it. Depending on the database, some of these changes require a full table lock, preventing the service from accessing the tables under change. To deal with this, web services are typically taken offline...
master thesis 2015
document
Tan, J. (author)
Computational RFID (CRFID) devices are emerging platforms that can enable perennial computation and sensing by eliminating the need for batteries. Although much research has been devoted to improving upstream (CRFID to RFID reader) communication rates, the opposite direction has so far been neglected, presumably due to the difficulty of...
master thesis 2015
document
De Bokx, R. (author)
The recently introduced Linkage Tree Genetic Algorithm (LTGA) has shown to exhibit excellent scalability on a variety of optimization problems. LTGA employs Linkage Trees (LTs) to identify and exploit linkage information between problem variables. In this work we present two parallel implementations of LTGA that enable us to leverage the...
master thesis 2015
document
Abdollahi Jounaghani, S. (author), Mol, R.G. (author)
In order to cope with various supplies and loads in an autonomous microgrid, a system of sensors and a control unit was developed. The goals of this system are to cope efficiently in the event of an energy supply shortage, and to prevent such events as much as possible. To achieve these goals, the aim was to manage energy in the system as...
bachelor thesis 2015
document
Booij, T.M. (author), Klavers, R.A. (author)
bachelor thesis 2015
document
Chiu, A.S.Y. (author), Faber, J. (author), Man, K.H. (author)
bachelor thesis 2015
document
Hejderup, J.I. (author)
Web-enabled services hold valuable information that attracts attackers to exploit services for unauthorized access. The transparency of Open-Source projects, shallow screening of hosted projects on public software repositories and access to vulnerability databases pave the way for attackers to gain strategic information to exploit software...
master thesis 2015
document
Oosterwaal, S. (author)
With the increasing popularity of open-source version control platforms like GitHub, developers get more feedback on the changes they make. A common tool in version control systems is the highlighted difference view of the source code. This enables reviewers to quickly view the changes made. A missing feature is comparison of the test coverage....
master thesis 2015
document
Wilmer, D. (author)
Robustness is essential for schedules if they are being executed under uncertain conditions. In this thesis we research robustness in Partial Order Schedules, which represent sets of solutions for instances of the Resource-Constrained Project Scheduling Problem. They can be generated using a greedy procedure called Chaining, which can be easily...
master thesis 2015
document
Wilco, W.C. (author)
The increasing number of criminals that exploit the speed and anonymity of the Web has become of increasing concern. Little effort has been spent to trace the authors of malicious code. To that end we investigated authorship identification and verification of JavaScript source code. We evaluated three character based approaches and propose a new...
master thesis 2014
document
Hoogendijk, S.P. (author)
Question Routing systems aim at routing questions to users that are more suited to answer them. Different techniques are used to match candidate users to questions, by considering properties of both. Existing techniques however do not consider the expertise of the candidate. This work proposes an approach to Question Routing in which the user...
master thesis 2014
document
Basak, D. (author)
Crowdsourcing and Human computation have enabled industry, and scientists to create innovative solutions by harnessing organized collective human effort. In human computation platforms, it is observed that workers spend a considerable amount of time searching for appropriate tasks, thus losing revenues that they could have made and, ultimately,...
master thesis 2014
document
Basak, D. (author)
Crowdsourcing and Human computation have enabled industry, and scientists to create innovative solutions by harnessing organized collective human effort. In human computation platforms, it is observed that workers spend a considerable amount of time searching for appropriate tasks, thus losing revenues that they could have made and, ultimately,...
master thesis 2014
document
Rentmeester, M. (author)
Most recommender systems recommend items from a single domain. However, usually users’ preferences span across multiple domains. Cross-domain recommender systems can successfully recommend items in multiple domains when there is knowledge about the user’s preferences for items in at least one of the domains and when there is knowledge about...
master thesis 2014
document
Hartveld, D.L. (author)
Microsoft has introduced the async/await keywords in C# 5.0 to support developers that need to apply asynchronous programming techniques. However, do developers really use the new keywords, and do they use them correctly? An empirical survey of 1378 open source repositories from GitHub and CodePlex shows that developers often make mistakes. By...
master thesis 2014
document
Ipema, C.W. (author)
This thesis studies parameters that are assumed to in?uence the outcomes of tender procedures. These parameters are learning, transaction costs, repetition, complex bids, uncertainty, continued work and irrationality. Government agencies have some degree of freedom when they use tender procedures. They can use this freedom to design the perfect...
master thesis 2014
document
Cadariu, M.D. (author)
Known security vulnerabilities are introduced in software systems as a result of depending on third-party components. These documented software weaknesses are hiding in plain sight and represent the lowest hanging fruit for attackers. Despite the risk they introduce for software systems, it has been shown that developers consistently download...
master thesis 2014
Searched for: department:"Software%5C+Technology"
(81 - 100 of 278)

Pages