Skip to main content
Sign in
Summit Research Repository
SIGN IN
SFU Mail
goSFU
Canvas
Library Catalogue
Search
Search
This site
SFU.ca
Submit your Research
Menu
Main navigation
Home
Collections
About
Contact
Search Summit
Search
Search
Sort by
Relevance
Title
Order
Asc
Desc
Search
Displaying 1 - 20 of 30
Are bosses brokers? A network approach to leadership in organized crime
Author:
Tsai, Kristen
Date created:
2020-05-25
Enhanced fireworks algorithm to optimize extended Kalman filter speed estimation of an induction motor drive system
Author:
Manson, Katherine
Date created:
2019-08-15
“On to the next one:” Using social network data to inform police target prioritization
Author:
Hashimi, Sadaf
Date created:
2015-08-05
The criminal career evolution of child exploitation websites: identification, survival, and community
Author:
Westlake, Bryce Garreth
Date created:
2015-08-04
Terrorist Networks and the Collective Criminal Career: The Relationship between Group Structure and Trajectories
Author:
Ouellet, Marie Lavinia
Date created:
2016-08-18
Analysis of Cooperative Communication and Link Layer Performance under Imperfectly Known Fading Channel Gains
Author:
Zarei Ghanavati, Ali
Date created:
2015-09-04
The Impact of Opinion Leadership and External Events on Forum Participants Following ISIS Online
Author:
Thomas, Evan Nathan Patrick
Date created:
2016-04-25
The emergence of violent narratives in the life-course trajectories of online forum participants
Author:
Levey, Philippa
Date created:
2016-07-11
NapMap Protocol
Author:
Seyedin, Ehsan
Date created:
2012-08-16
Depends who offers and where offered: the context of drug offers and first time cannabis use
Author:
Anamali, Morena
Date created:
2013-04-17
The symbolic benefits of delinquency for adolescents
Author:
Gallupe, Owen Scott
Date created:
2012-07-19
Novel ABC- and BBO-Based Evolutionary Algorithms and Their Illustrations to Wireless Communications
Author:
Ashrafinia, Saeed
Date created:
2012-12-21
Trusting the Con Man: The Role of Social Networks in the Diffusion of Fraud
Author:
Nash, Rebecca Margaret
Date created:
2013-08-15
Conventional capital, criminal capital, and criminal careers in drug trafficking
Author:
Wang, Wei
Date created:
2013-08-14
EasyMap MAC Protocol
Author:
Yang, Shaoyun
Date created:
2013-01-11
Resource allocation in wireless relay networks
Author:
Pareek, Udit
Date created:
2012-05-09
Analyzing online child exploitation networks: an examination of severity and connectivity
Author:
Westlake, Bryce Garreth
Date created:
2011-04-18
On the throughput gain of rapid symbol duration adaptation with dynamic spreading gain control
Author:
Xue, Song
Date created:
2010-08-03
Wireless mesh network system design and implementation for surveillance, health monitoring and tracking
Author:
Hung, Benny Siu Lam
Date created:
2010-08-09
Computationally efficient algorithms for resource allocation in cognitive radio and green communication systems
Author:
Naeem, Muhammad
Date created:
2011-05-11
Pagination
1
2
››
Next page
Last »
Last page