Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Delft University of Technology" +contributor:("Finavaro Aniche, M."). Showing records 1 – 15 of 15 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Delft University of Technology

1. de Boer, Y.J.I. (author). Authorship Attribution of Malware Binaries.

Degree: 2020, Delft University of Technology

 Attribution of the malware to the developers writing the malware is an important factor in cybercrime investigative work. Clustering together not only malware of the… (more)

Subjects/Keywords: Malware families; Clustering; Malware binary; Dynamic Analysis; Static Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

de Boer, Y. J. I. (. (2020). Authorship Attribution of Malware Binaries. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:8546cb88-eb01-4946-baca-0a5d1846cb92

Chicago Manual of Style (16th Edition):

de Boer, Y J I (author). “Authorship Attribution of Malware Binaries.” 2020. Masters Thesis, Delft University of Technology. Accessed March 01, 2021. http://resolver.tudelft.nl/uuid:8546cb88-eb01-4946-baca-0a5d1846cb92.

MLA Handbook (7th Edition):

de Boer, Y J I (author). “Authorship Attribution of Malware Binaries.” 2020. Web. 01 Mar 2021.

Vancouver:

de Boer YJI(. Authorship Attribution of Malware Binaries. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Mar 01]. Available from: http://resolver.tudelft.nl/uuid:8546cb88-eb01-4946-baca-0a5d1846cb92.

Council of Science Editors:

de Boer YJI(. Authorship Attribution of Malware Binaries. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:8546cb88-eb01-4946-baca-0a5d1846cb92


Delft University of Technology

2. Skoulos, R. (author). Learning State Machines faster using Locality-Sensitive Hashing and an application in network-based threat detection.

Degree: 2020, Delft University of Technology

The internet traffic is constantly rising nowadays due to the significant increase of the devices connected to the Internet. As a consequence, many cyber risks… (more)

Subjects/Keywords: state machines; network threat detection; locality-sensitive hashing; anomaly detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Skoulos, R. (. (2020). Learning State Machines faster using Locality-Sensitive Hashing and an application in network-based threat detection. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:3ee92a9d-d555-498b-9694-298e07051833

Chicago Manual of Style (16th Edition):

Skoulos, R (author). “Learning State Machines faster using Locality-Sensitive Hashing and an application in network-based threat detection.” 2020. Masters Thesis, Delft University of Technology. Accessed March 01, 2021. http://resolver.tudelft.nl/uuid:3ee92a9d-d555-498b-9694-298e07051833.

MLA Handbook (7th Edition):

Skoulos, R (author). “Learning State Machines faster using Locality-Sensitive Hashing and an application in network-based threat detection.” 2020. Web. 01 Mar 2021.

Vancouver:

Skoulos R(. Learning State Machines faster using Locality-Sensitive Hashing and an application in network-based threat detection. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Mar 01]. Available from: http://resolver.tudelft.nl/uuid:3ee92a9d-d555-498b-9694-298e07051833.

Council of Science Editors:

Skoulos R(. Learning State Machines faster using Locality-Sensitive Hashing and an application in network-based threat detection. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:3ee92a9d-d555-498b-9694-298e07051833


Delft University of Technology

3. Liu, J.C.M. (author). Perspective Discovery in Controversial Debates: An exploration of unsupervised topic models.

Degree: 2020, Delft University of Technology

Since the introduction of the Web, online platforms have become a place to share opinions across various domains (e.g., social media platforms, discussion fora or… (more)

Subjects/Keywords: sentiment analysis; controversial debates; topic modelling; joint topic modelling; opinion mining

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, J. C. M. (. (2020). Perspective Discovery in Controversial Debates: An exploration of unsupervised topic models. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:7c09a506-7bc0-4b26-a2f3-5f69ceeb74f4

Chicago Manual of Style (16th Edition):

Liu, J C M (author). “Perspective Discovery in Controversial Debates: An exploration of unsupervised topic models.” 2020. Masters Thesis, Delft University of Technology. Accessed March 01, 2021. http://resolver.tudelft.nl/uuid:7c09a506-7bc0-4b26-a2f3-5f69ceeb74f4.

MLA Handbook (7th Edition):

Liu, J C M (author). “Perspective Discovery in Controversial Debates: An exploration of unsupervised topic models.” 2020. Web. 01 Mar 2021.

Vancouver:

Liu JCM(. Perspective Discovery in Controversial Debates: An exploration of unsupervised topic models. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Mar 01]. Available from: http://resolver.tudelft.nl/uuid:7c09a506-7bc0-4b26-a2f3-5f69ceeb74f4.

Council of Science Editors:

Liu JCM(. Perspective Discovery in Controversial Debates: An exploration of unsupervised topic models. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:7c09a506-7bc0-4b26-a2f3-5f69ceeb74f4


Delft University of Technology

4. Schröder, Casper (author). Expanding Search-Based Software Modularization to Enterprise-Level Projects: A Case Study at Adyen.

Degree: 2020, Delft University of Technology

Code quality of software products often degrades while they grow. Counteracting the degradation of code quality or improving it requires immense effort. Tools that reduce… (more)

Subjects/Keywords: Remodularization; Modularization; Architecture; Code Quality; Optimization; Enterprise; Interview; Adyen; NSGA II; Coupling; Cohesion; Refactoring; Developer; Search-Based

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Schröder, C. (. (2020). Expanding Search-Based Software Modularization to Enterprise-Level Projects: A Case Study at Adyen. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:6d119eba-76e2-4ebd-8dc7-17f865c2d0cb

Chicago Manual of Style (16th Edition):

Schröder, Casper (author). “Expanding Search-Based Software Modularization to Enterprise-Level Projects: A Case Study at Adyen.” 2020. Masters Thesis, Delft University of Technology. Accessed March 01, 2021. http://resolver.tudelft.nl/uuid:6d119eba-76e2-4ebd-8dc7-17f865c2d0cb.

MLA Handbook (7th Edition):

Schröder, Casper (author). “Expanding Search-Based Software Modularization to Enterprise-Level Projects: A Case Study at Adyen.” 2020. Web. 01 Mar 2021.

Vancouver:

Schröder C(. Expanding Search-Based Software Modularization to Enterprise-Level Projects: A Case Study at Adyen. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Mar 01]. Available from: http://resolver.tudelft.nl/uuid:6d119eba-76e2-4ebd-8dc7-17f865c2d0cb.

Council of Science Editors:

Schröder C(. Expanding Search-Based Software Modularization to Enterprise-Level Projects: A Case Study at Adyen. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:6d119eba-76e2-4ebd-8dc7-17f865c2d0cb


Delft University of Technology

5. Dekker, F.W. (author). Privacy-Preserving Data Aggregation with Probabilistic Range Validation.

Degree: 2020, Delft University of Technology

 Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended… (more)

Subjects/Keywords: Privacy; Data aggregation; Applied cryptography; Hypergraphs

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dekker, F. W. (. (2020). Privacy-Preserving Data Aggregation with Probabilistic Range Validation. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:5d769bad-a615-41b1-908e-2b52dd10e268

Chicago Manual of Style (16th Edition):

Dekker, F W (author). “Privacy-Preserving Data Aggregation with Probabilistic Range Validation.” 2020. Masters Thesis, Delft University of Technology. Accessed March 01, 2021. http://resolver.tudelft.nl/uuid:5d769bad-a615-41b1-908e-2b52dd10e268.

MLA Handbook (7th Edition):

Dekker, F W (author). “Privacy-Preserving Data Aggregation with Probabilistic Range Validation.” 2020. Web. 01 Mar 2021.

Vancouver:

Dekker FW(. Privacy-Preserving Data Aggregation with Probabilistic Range Validation. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Mar 01]. Available from: http://resolver.tudelft.nl/uuid:5d769bad-a615-41b1-908e-2b52dd10e268.

Council of Science Editors:

Dekker FW(. Privacy-Preserving Data Aggregation with Probabilistic Range Validation. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:5d769bad-a615-41b1-908e-2b52dd10e268


Delft University of Technology

6. Catshoek, Tom (author). Exploiting structure in counterexamples to speed up equivalence checking in the minimally adequate teacher framework: Active Learning.

Degree: 2021, Delft University of Technology

 Active state machine learning algorithms are a class of algorithms that allow us to infer state machines representing certain systems. These algorithms interact with a… (more)

Subjects/Keywords: State machine learning; Active Learning; Equivalence checking; RERS; Mealy machine

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Catshoek, T. (. (2021). Exploiting structure in counterexamples to speed up equivalence checking in the minimally adequate teacher framework: Active Learning. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:8e5486e4-da37-43ac-8653-3f1e87a95253

Chicago Manual of Style (16th Edition):

Catshoek, Tom (author). “Exploiting structure in counterexamples to speed up equivalence checking in the minimally adequate teacher framework: Active Learning.” 2021. Masters Thesis, Delft University of Technology. Accessed March 01, 2021. http://resolver.tudelft.nl/uuid:8e5486e4-da37-43ac-8653-3f1e87a95253.

MLA Handbook (7th Edition):

Catshoek, Tom (author). “Exploiting structure in counterexamples to speed up equivalence checking in the minimally adequate teacher framework: Active Learning.” 2021. Web. 01 Mar 2021.

Vancouver:

Catshoek T(. Exploiting structure in counterexamples to speed up equivalence checking in the minimally adequate teacher framework: Active Learning. [Internet] [Masters thesis]. Delft University of Technology; 2021. [cited 2021 Mar 01]. Available from: http://resolver.tudelft.nl/uuid:8e5486e4-da37-43ac-8653-3f1e87a95253.

Council of Science Editors:

Catshoek T(. Exploiting structure in counterexamples to speed up equivalence checking in the minimally adequate teacher framework: Active Learning. [Masters Thesis]. Delft University of Technology; 2021. Available from: http://resolver.tudelft.nl/uuid:8e5486e4-da37-43ac-8653-3f1e87a95253


Delft University of Technology

7. Suresha Konandur, Sharanya (author). Test Code Comprehension: Insights from an Eye Tracker.

Degree: 2020, Delft University of Technology

Software maintenance is an essential and time-consuming task during the software development cycle. Readability of test code is a crucial element for performing programming tasks,… (more)

Subjects/Keywords: Code comprehension; Test code; Eye Tracking; Readability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Suresha Konandur, S. (. (2020). Test Code Comprehension: Insights from an Eye Tracker. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:6ba7bd64-478d-4c44-8a96-78922122cbd9

Chicago Manual of Style (16th Edition):

Suresha Konandur, Sharanya (author). “Test Code Comprehension: Insights from an Eye Tracker.” 2020. Masters Thesis, Delft University of Technology. Accessed March 01, 2021. http://resolver.tudelft.nl/uuid:6ba7bd64-478d-4c44-8a96-78922122cbd9.

MLA Handbook (7th Edition):

Suresha Konandur, Sharanya (author). “Test Code Comprehension: Insights from an Eye Tracker.” 2020. Web. 01 Mar 2021.

Vancouver:

Suresha Konandur S(. Test Code Comprehension: Insights from an Eye Tracker. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Mar 01]. Available from: http://resolver.tudelft.nl/uuid:6ba7bd64-478d-4c44-8a96-78922122cbd9.

Council of Science Editors:

Suresha Konandur S(. Test Code Comprehension: Insights from an Eye Tracker. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:6ba7bd64-478d-4c44-8a96-78922122cbd9


Delft University of Technology

8. Gerling, Jan (author). Machine Learning for Software Refactoring: a Large-Scale Empirical Study.

Degree: 2020, Delft University of Technology

Refactorings tackle the challenge of architectural degradation of object-oriented software projects by improving its internal structure without changing the behavior. Refactorings improve software quality and… (more)

Subjects/Keywords: Refactoring; software engineering; machine learning; data set; open source; Java

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gerling, J. (. (2020). Machine Learning for Software Refactoring: a Large-Scale Empirical Study. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:bf649e9c-9d53-4e8c-a91b-f0a6b6aab733

Chicago Manual of Style (16th Edition):

Gerling, Jan (author). “Machine Learning for Software Refactoring: a Large-Scale Empirical Study.” 2020. Masters Thesis, Delft University of Technology. Accessed March 01, 2021. http://resolver.tudelft.nl/uuid:bf649e9c-9d53-4e8c-a91b-f0a6b6aab733.

MLA Handbook (7th Edition):

Gerling, Jan (author). “Machine Learning for Software Refactoring: a Large-Scale Empirical Study.” 2020. Web. 01 Mar 2021.

Vancouver:

Gerling J(. Machine Learning for Software Refactoring: a Large-Scale Empirical Study. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Mar 01]. Available from: http://resolver.tudelft.nl/uuid:bf649e9c-9d53-4e8c-a91b-f0a6b6aab733.

Council of Science Editors:

Gerling J(. Machine Learning for Software Refactoring: a Large-Scale Empirical Study. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:bf649e9c-9d53-4e8c-a91b-f0a6b6aab733


Delft University of Technology

9. Proost, Rick (author). A distributed and scalable real-time log analysis.

Degree: 2020, Delft University of Technology

Monitoring software behaviour is being done in various ways. Log messages are being output by almost any kind of running software system. Therefore, learning how… (more)

Subjects/Keywords: Scalable Log Data Analysis; Distributed Systems; Real-time Log Data Analysis; Software Monitoring

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Proost, R. (. (2020). A distributed and scalable real-time log analysis. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:d01caad2-e537-4a1d-b0ca-c83db77cf1fe

Chicago Manual of Style (16th Edition):

Proost, Rick (author). “A distributed and scalable real-time log analysis.” 2020. Masters Thesis, Delft University of Technology. Accessed March 01, 2021. http://resolver.tudelft.nl/uuid:d01caad2-e537-4a1d-b0ca-c83db77cf1fe.

MLA Handbook (7th Edition):

Proost, Rick (author). “A distributed and scalable real-time log analysis.” 2020. Web. 01 Mar 2021.

Vancouver:

Proost R(. A distributed and scalable real-time log analysis. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Mar 01]. Available from: http://resolver.tudelft.nl/uuid:d01caad2-e537-4a1d-b0ca-c83db77cf1fe.

Council of Science Editors:

Proost R(. A distributed and scalable real-time log analysis. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:d01caad2-e537-4a1d-b0ca-c83db77cf1fe


Delft University of Technology

10. Haakman, M.P.A. (author). Studying the Machine Learning Lifecycle and Improving Code Quality of Machine Learning Applications.

Degree: 2020, Delft University of Technology

As organizations start to adopt machine learning in critical business scenarios, the development processes change and the reliability of the applications becomes more important. To… (more)

Subjects/Keywords: Machine Learning Lifecycle; FinTech; Static Code Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Haakman, M. P. A. (. (2020). Studying the Machine Learning Lifecycle and Improving Code Quality of Machine Learning Applications. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:38ff4e9a-222a-4987-998c-ac9d87880907

Chicago Manual of Style (16th Edition):

Haakman, M P A (author). “Studying the Machine Learning Lifecycle and Improving Code Quality of Machine Learning Applications.” 2020. Masters Thesis, Delft University of Technology. Accessed March 01, 2021. http://resolver.tudelft.nl/uuid:38ff4e9a-222a-4987-998c-ac9d87880907.

MLA Handbook (7th Edition):

Haakman, M P A (author). “Studying the Machine Learning Lifecycle and Improving Code Quality of Machine Learning Applications.” 2020. Web. 01 Mar 2021.

Vancouver:

Haakman MPA(. Studying the Machine Learning Lifecycle and Improving Code Quality of Machine Learning Applications. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Mar 01]. Available from: http://resolver.tudelft.nl/uuid:38ff4e9a-222a-4987-998c-ac9d87880907.

Council of Science Editors:

Haakman MPA(. Studying the Machine Learning Lifecycle and Improving Code Quality of Machine Learning Applications. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:38ff4e9a-222a-4987-998c-ac9d87880907


Delft University of Technology

11. Gamvrinos, S. (author). Language-agnostic Incremental Code Clone Detection.

Degree: 2020, Delft University of Technology

Code duplication is a form of technical debt frequently observed in software systems. Its existence negatively affects the maintainability of a system in numerous ways.… (more)

Subjects/Keywords: Software Engineering; Software Maintenance; Code Duplication; Language-Independent Incremental Clone Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gamvrinos, S. (. (2020). Language-agnostic Incremental Code Clone Detection. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:399edf65-69c6-4d20-a3d7-9658ccb9bc17

Chicago Manual of Style (16th Edition):

Gamvrinos, S (author). “Language-agnostic Incremental Code Clone Detection.” 2020. Masters Thesis, Delft University of Technology. Accessed March 01, 2021. http://resolver.tudelft.nl/uuid:399edf65-69c6-4d20-a3d7-9658ccb9bc17.

MLA Handbook (7th Edition):

Gamvrinos, S (author). “Language-agnostic Incremental Code Clone Detection.” 2020. Web. 01 Mar 2021.

Vancouver:

Gamvrinos S(. Language-agnostic Incremental Code Clone Detection. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Mar 01]. Available from: http://resolver.tudelft.nl/uuid:399edf65-69c6-4d20-a3d7-9658ccb9bc17.

Council of Science Editors:

Gamvrinos S(. Language-agnostic Incremental Code Clone Detection. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:399edf65-69c6-4d20-a3d7-9658ccb9bc17


Delft University of Technology

12. Grent, H.A. (author). Automatically Identifying Parameter Constraints for Complex Web APIs: A Case Study at Adyen.

Degree: 2020, Delft University of Technology

Web APIs can have constraints on parameters, such that not all parameters are either always required or always optional. Sometimes the presence or value of… (more)

Subjects/Keywords: Software Engineering; Web API; Parameter Constraints; Parameter Dependencies; API Specifications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Grent, H. A. (. (2020). Automatically Identifying Parameter Constraints for Complex Web APIs: A Case Study at Adyen. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:672634ec-53ee-4ebd-a1f0-c958c646a261

Chicago Manual of Style (16th Edition):

Grent, H A (author). “Automatically Identifying Parameter Constraints for Complex Web APIs: A Case Study at Adyen.” 2020. Masters Thesis, Delft University of Technology. Accessed March 01, 2021. http://resolver.tudelft.nl/uuid:672634ec-53ee-4ebd-a1f0-c958c646a261.

MLA Handbook (7th Edition):

Grent, H A (author). “Automatically Identifying Parameter Constraints for Complex Web APIs: A Case Study at Adyen.” 2020. Web. 01 Mar 2021.

Vancouver:

Grent HA(. Automatically Identifying Parameter Constraints for Complex Web APIs: A Case Study at Adyen. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Mar 01]. Available from: http://resolver.tudelft.nl/uuid:672634ec-53ee-4ebd-a1f0-c958c646a261.

Council of Science Editors:

Grent HA(. Automatically Identifying Parameter Constraints for Complex Web APIs: A Case Study at Adyen. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:672634ec-53ee-4ebd-a1f0-c958c646a261


Delft University of Technology

13. Sellik, Hendrig (author). Learning Off-By-One Mistakes: An Empirical Study on Different Deep Learning Models.

Degree: 2020, Delft University of Technology

Mistakes in binary conditions are a source of error in many software systems. They happen when developers use < or > instead of <= or… (more)

Subjects/Keywords: Deep learning; java; off-by-one; error; detection; Machine Learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sellik, H. (. (2020). Learning Off-By-One Mistakes: An Empirical Study on Different Deep Learning Models. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:1fe836a3-1874-497e-b05e-666588168717

Chicago Manual of Style (16th Edition):

Sellik, Hendrig (author). “Learning Off-By-One Mistakes: An Empirical Study on Different Deep Learning Models.” 2020. Masters Thesis, Delft University of Technology. Accessed March 01, 2021. http://resolver.tudelft.nl/uuid:1fe836a3-1874-497e-b05e-666588168717.

MLA Handbook (7th Edition):

Sellik, Hendrig (author). “Learning Off-By-One Mistakes: An Empirical Study on Different Deep Learning Models.” 2020. Web. 01 Mar 2021.

Vancouver:

Sellik H(. Learning Off-By-One Mistakes: An Empirical Study on Different Deep Learning Models. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Mar 01]. Available from: http://resolver.tudelft.nl/uuid:1fe836a3-1874-497e-b05e-666588168717.

Council of Science Editors:

Sellik H(. Learning Off-By-One Mistakes: An Empirical Study on Different Deep Learning Models. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:1fe836a3-1874-497e-b05e-666588168717


Delft University of Technology

14. Zwaan, Aron (author). Composable Type System Specification using Heterogeneous Scope Graphs.

Degree: 2021, Delft University of Technology

Static Analysis is of indispensable value for the robustness of software systems and the efficiency of developers. Moreover, many modern-day software systems are composed of… (more)

Subjects/Keywords: Statix; Multi-language; Type checking; Name binding; Scope graph; Spoofax

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zwaan, A. (. (2021). Composable Type System Specification using Heterogeneous Scope Graphs. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:68b7291c-0f81-4a70-89bb-37624f8615bd

Chicago Manual of Style (16th Edition):

Zwaan, Aron (author). “Composable Type System Specification using Heterogeneous Scope Graphs.” 2021. Masters Thesis, Delft University of Technology. Accessed March 01, 2021. http://resolver.tudelft.nl/uuid:68b7291c-0f81-4a70-89bb-37624f8615bd.

MLA Handbook (7th Edition):

Zwaan, Aron (author). “Composable Type System Specification using Heterogeneous Scope Graphs.” 2021. Web. 01 Mar 2021.

Vancouver:

Zwaan A(. Composable Type System Specification using Heterogeneous Scope Graphs. [Internet] [Masters thesis]. Delft University of Technology; 2021. [cited 2021 Mar 01]. Available from: http://resolver.tudelft.nl/uuid:68b7291c-0f81-4a70-89bb-37624f8615bd.

Council of Science Editors:

Zwaan A(. Composable Type System Specification using Heterogeneous Scope Graphs. [Masters Thesis]. Delft University of Technology; 2021. Available from: http://resolver.tudelft.nl/uuid:68b7291c-0f81-4a70-89bb-37624f8615bd


Delft University of Technology

15. Heemskerk, Bart (author). The Error that is the Error Message: Comparing information expectations of novice programmers against the information in Python error messages.

Degree: 2020, Delft University of Technology

Learning to program is not a easy task, as has become evident from the abundance of research papers concerning the subject. One of the learning… (more)

Subjects/Keywords: Error Messages; Component Framework; Novice programmers; Information expectation; Python

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Heemskerk, B. (. (2020). The Error that is the Error Message: Comparing information expectations of novice programmers against the information in Python error messages. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:0fe63cc5-653f-479c-8faf-84add0b44e0f

Chicago Manual of Style (16th Edition):

Heemskerk, Bart (author). “The Error that is the Error Message: Comparing information expectations of novice programmers against the information in Python error messages.” 2020. Masters Thesis, Delft University of Technology. Accessed March 01, 2021. http://resolver.tudelft.nl/uuid:0fe63cc5-653f-479c-8faf-84add0b44e0f.

MLA Handbook (7th Edition):

Heemskerk, Bart (author). “The Error that is the Error Message: Comparing information expectations of novice programmers against the information in Python error messages.” 2020. Web. 01 Mar 2021.

Vancouver:

Heemskerk B(. The Error that is the Error Message: Comparing information expectations of novice programmers against the information in Python error messages. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Mar 01]. Available from: http://resolver.tudelft.nl/uuid:0fe63cc5-653f-479c-8faf-84add0b44e0f.

Council of Science Editors:

Heemskerk B(. The Error that is the Error Message: Comparing information expectations of novice programmers against the information in Python error messages. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:0fe63cc5-653f-479c-8faf-84add0b44e0f

.