|
|
Student |
Title |
Plan |
Thesis
|
Abstract
|
|
|
------ computing science ------ |
------ computing science ------ |
|
|
|
|
2008 |
Berkane, Rafih |
Metadata-based data quality indication |
|
||
|
2008 |
Lommers, Rogier |
A scientific approach to operational management |
|
|
2008 |
Sprik, Ester |
Kwaliteitsverbetering in de Software Fabriek |
|
|
|
2008 |
Goor, Martin van de |
Localization in wireless sensor networks |
|
|
|
|
2008 |
Kupers, Thijs |
Modelleren van CMS gebaseerde webapplicaties |
|||
|
2008 |
Janssen, Thomas |
Improving the fitting of hearing aids |
|
|
2008 |
Pardo, Carlos |
Web page ranks |
|
|
|
|
2008 |
Lijnse, Bas |
Between types and tables |
|
|
2008 |
Rover, Joost |
Accuracy improvement of an optical paper position
sensor |
|
|
2008 |
Lopez, Alejandro |
Uncovering JavaScript |
|
|
|
2008 |
Janse, Dennis |
Herbruikbaarheid van functionele ontwerpen |
|||
|
2008 |
Koopmans, Frank |
Local communities within the web graph |
|
|
|
|
2008 |
Elbers, Willem |
Optimizing web page interest |
|
|
|
|
2008 |
Janssen, Johan |
Authenticatie en autorisatie |
|||
|
2008 |
Bos, Roy |
Payment services information modelling |
|
|
|
|
2008 |
Claessens, Jos |
Opinion mining |
|
|
|
|
2008 |
Jager, Chris |
Service-oriented architecture |
|
|
|
|
2008 |
Sessink, Jantien |
Analysis of Jackrabbit software using Java
pathfinder |
|
||
|
2007 |
Hendricksen, Richard |
E-sales dialogs |
|||
|
2007 |
Kizito, Michael |
Radio frequency
identification |
|
||
|
2007 |
Jans, Mark |
Tools for tools |
|
||
|
2007 |
Dekkers, Paul |
Complex event processing |
|
||
|
2007 |
Kavuma, Joseph |
Reducing modelling
complexity |
|||
|
2007 |
Komakec, Regina |
Intrusion detection in
distributed multimedia applications |
|||
|
2007 |
Meulenbroeks, Bart |
Dynamic updates in
navigation systems |
|
||
|
2007 |
Muhwezi, Loy |
Evaluation of system security using security
patterns |
|||
|
2007 |
Brakman, Hugo |
Java card software
analysis |
|
||
|
2007 |
Abunyang, Emmanuel |
Mobile banking in
developing countries |
|||
|
2007 |
Driessen, Vincent |
Applicability of software factories |
|
||
|
2007 |
Beek, Martijn van |
Comparison of enterprise digital rights
management systems |
|
|
|
|
2007 |
Vermolen, Sander |
Discharging proof
obligations |
|||
|
2007 |
Jong, Daan de |
Converting midlet navigation graphs into JML |
|||
|
2007 |
Rutten, Daniel |
Refining a searcher's information need level |
|||
|
2007 |
Bakker, Jeroen |
Refining a searcher's information need level |
|||
|
2007 |
Schierboom, Erik |
Verification of IPC |
|
||
|
2007 |
Berlijn, Jasper |
Firewalls and risks |
|
||
|
2007 |
Ssekibuule, Richard |
Testing of Java Card applications |
|
||
|
2006 |
Mirembe, Drake |
Tele-medicine in developing countries |
|
||
|
2006 |
Villalba, Manuel |
Finding bugs in Java |
|
||
|
2006 |
Aguti, Beatrice |
Web services |
|
|
|
|
2006 |
Mekking, Matthijs |
Formalization and verification of protocols |
|
||
|
2006 |
Vermeer, Koen |
Guiding children on the internet |
|
||
|
2006 |
Vu, Khanh |
Guiding children on the internet |
|
||
|
2006 |
Kerkhoff, Bart |
Scenario-based scheduling for real-time systems |
|||
|
2006 |
Lensink, Leonard |
Induction and co-induction
in Sparkle |
|
||
|
2006 |
Gilissen, Christian |
Analysis of time-series gene expression data |
|||
|
2006 |
Engelen, Arnout |
Nullness analysis of Java
source code |
|
||
|
2006 |
Samulski, Maurice |
Classification
of breast lesions in digital mammograms |
|||
|
2006 |
Broekhuizen,
Jeroen |
3D projection for event display |
|||
|
2006 |
Gozalbo, Roberto |
Securing Surf net |
|
||
|
2006 |
Graat, Michiel |
Static analysis of Java card applications |
|
|
|
|
2005 |
Broekman, Michiel |
End-to-end application security using trusted computing |
|||
|
2005 |
Jaspers, Richard |
Functionaliteit van de data
hub van het ministerie van landbouw |
|||
|
2005 |
Hartogensis, Sander |
Improving software development |
|
||
|
2005 |
Ewalds, Wouter |
Data transformations for user profiling |
|||
|
2005 |
Heunen, Chris |
Complexity
in the real world |
|
|
|
|
2005 |
Kesteren, Ron van |
Proof
support for type classes |
|
||
|
2005 |
Weeda , Renske |
Giggle : internet
search engine for kids |
|||
|
2005 |
Gendt, Jolanda van |
Giggle : internet
search engine for kids |
|||
|
|
|
|
|
|
|
|
|
------ information science ------ |
------ information science ------ |
|
|
|
|
2008 |
Dammers, Herman |
A digital ecology |
|
|
|
2008 |
Heerkens, Rogier |
De
mens als kennisdrager |
|
|
|
2008 |
Tenbult, Peter |
Metrieken
voor datamodellen |
||||
|
2008 |
Hoedt, Nina |
Evaluatie van regels op hun geschiktheid voor
automatische uitvoering |
|
|
||
|
2008 |
Kuipers, Wouter van |
Beveiliging van PHP web
applicaties |
|
2008 |
Rachmann, Alexander |
Engineering and using
domain-specifc rule languages |
|
|
|
2008 |
Schotten, Bart |
The modeling process as a game |
|
|
|
2008 |
Kersten, Jordy |
Propositions and ECM policies |
|
2008 |
Leeuwen, Paul van |
Electronic
payment |
|
|
|
|
2008 |
Jansen, Marco |
Systeemontwikkeling en cultuur |
|
|
|
2008 |
Klomp, Eddy |
Conceptualisation in a requirements development
process |
|||
|
2008 |
Hanse, Hensley |
Enterprise architectuur - een effectief stuurmiddel? |
|
|
|
2008 |
Verbeek, Freek |
Classically typed calculi |
|
||
|
2008 |
Blommert, Marco |
Formulating architecture
principles |
|||
|
2008 |
Ramspeck, Bertram |
Strategies for formulating principles |
|
||
|
2008 |
Roos, Evelien |
Cultural foundations of computer security |
|
|
|
|
2008 |
Stortelder, Johan |
Opinion mining |
|
|
|
|
2008 |
Beijnen, Erik van |
Performance
testing on content management systems |
|
|
|
|
2007 |
Anuk, Mehmet |
Modelleren met behulp van viewpoints |
|
||
|
2007 |
Klein Holte, Ludo |
Designing a digital architecture |
|||
|
2007 |
Victoria, Harvey |
Dialogen in het modelleerproces |
|||
|
2007 |
Ockers, Rob |
Digitale overheidsdiensten |
|||
|
2007 |
Roelofs, Jeroen |
Strategieën voor
requirements engineering |
|||
|
2007 |
Rossum, Rene van |
Informatievoorziening in de zorg |
|
|
|
|
2007 |
Sarbo, Danny |
Samenwerking in structuur |
|
||
|
2007 |
Jochems, Marc |
DigiD en privacy |
|
||
|
2007 |
Haren, Robert van |
Expectations in electronic voting |
|||
|
2007 |
Bruijsten, Ferry |
De confidentialiteit van het elektronisch
patiëntdossier |
|||
|
2007 |
Hinne, Max |
Local identification of web graph communities |
|
||
|
2007 |
Liefland, Mark van |
Digital architecture in the context of
outsourcing |
|
||
|
2007 |
Kessel, Dirk Jan van |
Success factors in mergers and acquisition |
|
||
|
2007 |
Nellen, Chris |
Architecture evaluation |
|
||
|
2007 |
Leusink, Thijs |
Semantic grid |
|
|
|
|
2007 |
Couwenberg, Maikel |
Conceptualisatie en ICT |
|
||
|
2007 |
Wout, Robin van het |
Architectuurdocumentatie evaluatie |
|||
|
2007 |
Dobbe, Thomas |
Service oriented architecture |
|
||
|
2007 |
Hamakkers, Alex |
Confidentialiteit van
elektronische patiëntendossiers |
|
||
|
2006 |
Buitenhuis, Pieter |
Foundations of the
architectural principle |
|||
|
2006 |
Vos, Peter |
Software packages for enterprise architectures |
|||
|
2006 |
Rutteman, Michiel |
De menselijke maat in de IT |
|
||
|
2006 |
Reijbroek, Joris |
Empirical evaluation of modelling strategies |
|
|
|
|
2006 |
Horsels, Jurre |
IT
factors of merger and acquisition processes |
|
||
|
2006 |
Peeters, Paul |
Evaluation
of e-commerce websites |
|||
|
2006 |
Kieskamp, Arjan |
De bouwstenen van social engineering |
|
||
|
2006 |
Smit, Robert |
De bouwstenen van social engineering |
|
||
|
2006 |
Cratsz, Kim |
Demystifying metadata and meta modelling |
|||
|
2006 |
Krol, Leon |
Privacy policies for software |
|||
|
2006 |
Tonissen, Bas |
Opportunities in data
warehouses |
|
||
|
2006 |
Laros, Daan |
Consumer-oriented
architecture in health care |
|
|
|
|
2006 |
Reulink, Niek |
Conceptual
models versus SQL-2003 |
|||
|
2006 |
Lindeman, Leonie |
Modelling
processes |
|||
|
2006 |
Wielen, Marc van der |
Improving
the quality of data-integration systems |
|
|
|
|
2006 |
Kempen, Rob van |
Improving
the quality of data-integration systems |
|
|
|
|
2006 |
Bongers, Lucien |
Security binnen enterprise architectuur |
|
||
|
2006 |
Graaf, Erwin van der |
Architectuurprincipes
en clustercriteria |
|
||
|
2005 |
Kuiper, Reinout |
ICT en cultuur |
|||
|
2005 |
Janssen, Jeroen |
Digitale architectuur |
|
|
|
|
2005 |
Janssen, Dick |
Social engineering: de menselijke schakel in de
informatie beveiliging |
|||
|
2005 |
Ruben Melaard |
Digitale architectuur |
|
||
|
2005 |
Hoogeboom, Gerben |
Communication and visualization of information |
|
|
|
|
2005 |
Houben, Michel |
Het
proces om tot applicatie-architectuur te komen |
|
||
|
2005 |
Verbruggen, Bas |
The adaptive enterprise |
|||
|
2005 |
Nuland, Ron van |
Architectuurprincipes van de
Raboud Universiteit Nijmegen |
|||
|
2005 |
Magee, Chris |
Modelleren van processen,
diensten, en produkten |
|
|
|
|
2005 |
Habraken, Robin |
Using qualitative research methodologies in IS
development |
|
||
|
2005 |
Hendriks, Maarten |
Managing risks in implementation of ICT in
developing countries |
|||
|
2005 |
Overbeek, Sietse |
Architectuurschets voor een digitale
werkruimte van een topmanager |