Programme and proceedings
The conference will start with a plenary session in the morning, July 5, 2019. In the afternoon there were parallel sessions with the various tracks. The slots allocated for the presentations at the conference will be 15 minutes per paper. This includes the presentation itself (12 minutes), and 3 minutes questioning. The preferred language is English.
The papers scheduled in the morning session are best paper nominations. Out of these papers the best papers will be selected, and awarded with the TSCiT best paper award.
The proceedings will be published on-line with open access policies.
Conference programme
08:30 Reception with Coffee/Tea (Ravelijn Atrium)
Morning session (Ravelijn 1501 ): best paper nominees
08:55 Opening speech
09:00 Session: Best paper nominees
Christian Scholten, "Hacking the router: characterizing real attacks targeting low-cost routers using a honeypot router"
Harindu Perera, "Finger-Adaptive Illumination Control and Exposure Fusion Imaging for Biometric Finger Vein Recognition"
Myrthe Hultermans, "A Theoretical Ad Hoc Lunar Communication Network With CubeSats as Secondary Payload of Lunar Missions"
Mihai David Marin, "Effectiveness of neural language models for word prediction in mammography report writing"
Daan Kooij, "Groovy Parity Games"
David van de Giessen, "Blockchain and the GDPR's right to erasure"
10:30 – 10:45 Coffee/Tea Break (Ravelijn Atrium)
10:45 Session: Best paper nominees
Remco Abraham, "A Formal Proof of the Termination of Zielonka's Algorithm for Solving Parity Games"
Floris Weers, "Automatic home video editing on music"
Suzanna Wentzel, "Evaluating Information Retrieval Systems for Children in an Educational Context"
Tjo-Kin Man, "Measuring and Analysing Resilience of Enterprise Architectures"
Jaimie Jellema, "Polynomial Calculation of Quasi-Gray code Labelings for Irregular Signal Constellations"
12:00 Best paper award ceremony
12:30 - 13:30 Lunch - Ravelijn Atrium
Afternoon sessions - Ravelijn
13:30 Dependable networks (RA 2501)
Rens Oliemans, "WHOIS versus GDPR"
Matthijs Vos, "Characterizing infrastructure of DDoS attacks based on DDoSDB fingerprints"
Dex Bleeker, "DoS attack on recursive resolvers with DNSSEC key-tag collisions"
Koen van Hove, "Automated DDoS Attack Fingerprinting paper"
Christodoulos Tziampazis, "Exposure Assessment on Hospitals’ Software Infrastructures and Medical Devices"
13:30 Data and network science (RA 2502)
Andrei Cojocaru, "Handling Missing Data: Traditional Techniques Versus Machine Learning"
Niels Sluiter, "Maximizing Influence in Social Networks by Injecting Memes"
Dominique Weijers, "Forecasting Airport Passenger Flow to Improve Cleanliness Perception in Restrooms"
Frank Ruis, "Spilling the beans: Food recipe popularity prediction using ingredient networks"
Coen van Kampen, "Missing Data Imputation Based On Probabilistic Data"
13:30 Internet of Things (RA 2503)
Remco Loof, "Predicting an Athletes’ Internal Load Based on Their External Load"
Alexandra Matei, "Detection of Health Problems based on Medical Historical Records"
Reinier de Ridder, "Business Models and Supporting Technology for Smart Mobility IoT Data"
Thomas Hogema, "Counting People in Simultaneous Speech using Support Vector Machines "
Magdali Go, "Clustering with outliers in a biased animal movement database"
13:30 Information management (RA 2504)
Julian Flapper, "User access control on the blockchain for supply chain visibility"
Rob van Schooten, "Characteristics of highly uncertain and complex projects"
Robert Brouwer, "Predicting Influence of YouTube Video"
Gido Cooiman, "Output vs. Outcome: Measuring Usability in a Business to Business Context"
Melvin Willems, "Validation of a Datafication Canvas"
Anne-Marijn Valk, "Ethics in datafication: expanding on a new datafication framework"
15:00 – 15:15 Coffee/Tea Break - Ravelijn Atrium
15:15 Data and network science/Biometrics (RA 2501)
Philipp Claßen, "Identification of differences in sub-population healthcare processes"
Kitty Boersma, "Using influencing factors and Multilayer Perceptrons for energy demand prediction"
Mauk Muller, "Creating building energy prediction models with convolutional recurrent neural networks"
Milo Cesar, "The dangers and privacy issues of motion-based side-channel attacks"
Kevin Witlox, "Face ummorphing"
Karel van Klink, "Detection and Identification of Roman Emperors Using Facial Recognition"
15:15 Data and network science (RA 2502)
Nick Richter, "Process mining in programming game logs to differentiate between skill levels"
Djordi Janssen, "The Effects of Active Learning on Computer-Aided Diagnosis in Multi-Disease Prediction of Chest X-rays"
Kevin Booijink, "Evaluating the Scalability of Probabilistic Database Tools"
Kjell Spijker, "Identifying Users’ Skill Level through the Process Mining of Software Logs"
Anne van Harten, "Analyzing Programming Education Quality based on Students' Questions"
15:15 Software technology and Formal methods (RA 2503)
Zarimir Mitev, "Estimating User Interaction Complexity"
Martijn Verkleij, "Teaching programming using industry tools"
Rick de Vries Walker, " Automated Assessment of Haskell Code using Syntax Tree Analysis"
Marck van der Vegt, "Compressed Set Representations and their Effectiveness in Probabilistic Model Checking"
Ilja Rõžakov, "A Modest Comparison Of Blockchain Consensus Algorithms"
15:15 Intelligent interaction/Embedded systems (RA 2504)
Alexandra Coroiu, "The generalization performance of hate speech detection using machine learning"
Daphne Rietvelt, "Influence of neutral word removal on sentiment analysis"
Alissa Vermast, "Using VR to induce smoke cravings in low literate or intellectually disabled individuals who have a smoking addiction"
Johanna Spanier, "The Illusion of an autonomous social robot in a therapy setting"
Niels Overkamp, "Speeding up algorithms with caching for electric vehicle charging using profile steering"
16:45 Reception (Educafe)
The programme at a glance gives an overview of the whole programme and its tracks. The proceedings of the past conferences are still available.
DISCLAIMER
Permission to make digital or hard copies of all or part of the on this website presented work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission.
Copyright University of Twente, Twente Student Conference on IT, Enschede, the Netherlands.