Searched for: mods_note_programme_s%3A%22Computer%255C%2BScience%22
(1 - 20 of 308)

Pages

document
de Vries, Rolf (author)
As software systems evolve over time, the quality of its structure and code degrade unless developers regularly maintain it, requiring significant effort. Automated tools to help developers maintain software have been well-studied in the past. <br/>In particular, software remodularisation tools focus on improving the code structure quality with...
master thesis 2022
document
Eysbach, Jelle (author)
Serverless computing is a relatively recent paradigm that promises fine-grained billing and ease-of-use by abstracting away cloud infrastructure for developers. There is an increasing interest in using the serverless paradigm to execute data analysis tasks. Serverless functions often interact with external services, which can be considered...
master thesis 2022
document
Koops, Reinier (author)
Natural Language Interfaces for Databases (NLIDBs) offer a way for users to reason about data. It does not require the user to know the data structure, its relations, or familiarity with a query language like SQL. It only requires the use of Natural Language. This thesis focuses on a subset of NLIDBs, namely those with 'plain English' sentences...
master thesis 2022
document
Karayalçin, Sengim (author)
Some of the most prominent types of attacks against modern cryptographic implementations are side-channel attacks. These attacks leverage some unintended, often physical, leakage of the implementation to retrieve secret information. In recent times, a large part of the focus of side-channel research has been on deep learning methods. These...
master thesis 2022
document
Barendse, Thomas (author)
Demand for online grocer Picnic has increased exponentially over the past years, and their truck transport operation must scale with it. Given the resource constraints at all warehouses, as well as other specific restrictions, this poses a Multi Depot Pickup and Delivery Problem with Resource Constraints, for which no good solutions are found to...
master thesis 2022
document
Oolbekkink, Gerben (author)
Web APIs are being used for increasingly larger and complex use cases. Right now it can be hard to make sure that what is documented about an API is correct everywhere and to know if a change will have impact on the users of a web API. When details are missing in an API specification users of that API need to make assumptions about how the API...
master thesis 2022
document
Veraart, Maartje (author)
The rise of alarming cyber breaches and cyber security attacks is causing the world to consider the security of our cyber space. A Security Operations Center (SOC) is a center where the security of a company is monitored to prevent cyber breaches. Security analysts in the SOC examine alerts that come from different devices and analyse what is...
master thesis 2022
document
Kapadia, Mihir (author)
Emotion Recognition is one of the vastly studied areas of affective computing. Attempts have been made to design emotion recognition systems for everyday settings. The ubiquitous nature of Intelligent voice assistants (IVAs) in households, make them a great anchor for the introduction of emotion recognition technology to consumers. The existing...
master thesis 2022
document
Zhang, Zhiyue (author)
The rapid growth of the Internet use has allowed social networks to become the most effective means for marketing, leading to the emergence of "viral marketing" as a business model. The biggest challenge that is facing "viral marketing" is selecting seed users from the whole user set to form a "seed-set" to spread the influence and maximize the...
master thesis 2022
document
Veelers, Rozemarijn (author)
Mixing services try to distort cash flow tracking of cryptocurrencies and obfuscate the origin of customers’ earnings by substituting customers’ cryptocurrency funds with the funds of other customers or the mixers’ private assets. This quality makes mixing services interesting for money laundering, and they are therefore often used by criminals....
master thesis 2022
document
Mastenbroek, Fabian (author)
Cloud datacenters underpin our increasingly digital society, serving stakeholders across industry, government, and academia. These stakeholders have come to expect reliable operation and high quality of service, yet demand low cost, high scalability, and corporate (environmental) responsibility. Datacenter operators are confronted frequently...
master thesis 2022
document
Heddes, Rens (author)
Recent large scale cyber security incidents such as the Equifax data breach, where the personal information of around 160 million Americans leaked, demonstrate the current risk of security vulnerabilities libraries which software projects depend on.<br/>The usage of libraries forms an integral part of modern software development and is a...
master thesis 2022
document
Huang, Wenxuan (author)
Supervised machine learning is a growing assistive framework for professional decision-making. Yet bias that causes unfair discrimination has already been presented in the datasets. This research proposes a method to reduce model unfairness during the machine learning training process without altering the sample value or the prediction value....
master thesis 2022
document
Hartman, Toine (author)
Pattern matching is the act of checking if a value is in the set of values described by a pattern. Many programming languages provide constructs to pattern match on program values. Pattern matching constructs appear in different variants. Stratego, a term rewriting language, features first-class pattern matching, which attempts to match a...
master thesis 2022
document
Abrahams, Joël (author)
Quantum networks allow multiple devices to exchange information encoded within quantum systems.<br/>Such quantum networks use classical control messages to coordinate entanglement between nodes.<br/>Third parties which can forge such control messages may interfere with the workings of quantum links, however:<br/>They may either perform...
master thesis 2022
document
Schijlen, Fiske (author)
Side-channel attacks (SCA) can obtain secret information related to the private key used during encryption executed on some device by exploiting leakage in power traces produced by the device. In recent years, researchers found that a neural network (NN) can be employed to execute a powerful profiled SCA, even on targets protected with...
master thesis 2022
document
Basu, Debadeep (author)
This work applies the theory of group equivariance to the domain of video action recognition replacing standard 3Dconvolutions with group convolutions which are equivariant to temporal direction, and multiples of 90-degree spatial rotations. We propose a temporal direction symmetry group T2 and extend the standard planar rotations group to three...
master thesis 2021
document
Baas, Berend (author)
Existing work in shape editing applications using deep learning has primarily focused on shape interpolation.<br/>We propose a pair of techniques that utilize the latent space of deformation networks to provide control schemes for semantic shape editing applications.<br/><br/>The first technique presented utilizes linear directions as...
master thesis 2021
document
Gobardhan, Rommy (author)
The study of epidemic spreading processes on contact based complex networks has gained a lot of traction in recent years. These processes can entail a variety of problems such as disease spreading, opinion spreading in social networks or even airport congestion in airline networks. One of the key tasks in this area of research and also of this...
master thesis 2021
document
de Boer, Toon (author)
Many development models exist, but finding which one is the right for a specific project or software company is difficult. Every project has its requirements and might need its own development model. The most popular development models are trunk-based development and merge requests.<br/>There are no clear science-based guidelines on when to...
master thesis 2021
Searched for: mods_note_programme_s%3A%22Computer%255C%2BScience%22
(1 - 20 of 308)

Pages