Skip to main content
Sign in
Summit Research Repository
SIGN IN
SFU Mail
goSFU
Canvas
Library Catalogue
Search
Search
This site
SFU.ca
Submit your Research
Menu
Main navigation
Home
Collections
About
Contact
Search Summit
Search
Search
Sort by
Relevance
Title
Order
Asc
Desc
Search
Displaying 1 - 20 of 29
Exploration of students’ perception and usage of personalized reminder feedback in their time management
Author:
Fathi, Ladan
Date created:
2019-11-20
Evaluation of Support Vector Machine kernels for detecting network anomalies
Author:
Batta, Prerna
Date created:
2019-04-18
Technology-enhanced learning: Using learning analytics to unveil students’ use of multiple devices in blended learning
Author:
Sher, Varshita
Date created:
2019-11-26
Application of machine learning techniques for detecting anomalies in communication networks
Author:
Ding, Qingye
Date created:
2018-06-19
Developing and Validating Customizable Process Models
Author:
Asadi, Mohsen
Date created:
2014-09-02
Algorithms and tools for anonymization of the internet traffic
Author:
Farah, Tanjila
Date created:
2013-02-26
Varying Effects of Learning Analytics Visualizations for Students with Different Achievement Goal Orientations
Author:
Shirazi Beheshtiha, Seyedeh Sanam
Date created:
2015-11-06
Applications of Reinforcement Learning to Routing and Virtualization in Computer Networks
Author:
Haeri, Soroush
Date created:
2016-03-17
Leveraging MSLQ dataset for predicting students’ achievement goal orientations
Author:
Ali, Liaqat
Date created:
2016-07-12
Quality-aware Service-Oriented Software Product Lines: Feature-Driven Process Configuration and Optimization
Author:
Mohabbati, Bardia
Date created:
2013-12-10
Towards automated feature model configuration with optimizing the non-functional requirements
Author:
Soltani, Samaneh
Date created:
2012-07-06
Comparison of machine learning models for classification of BGP anomalies
Author:
Al-Rousan, Nabil Mashhour
Date created:
2012-08-06
User perceptions of adaptivity in ubiquitous systems: a critical exploration
Author:
Tanenbaum, Karen
Date created:
2012-11-20
Distributed intelligent systems for control with distributed hash table
Author:
Zhang, Chi
Date created:
2011-12-01
Collection and characterization of BCNET BGP traffic
Author:
Lally, Sukhchandan
Date created:
2012-05-25
Policy conflict detection using Alloy: an explorative study
Author:
Sheidaei, Shahin
Date created:
2010-04-12
Detection of denial of service attacks using echo state networks
Author:
Bekshentayeva, Kamila
Date created:
2021-07-23
Machine learning classification of internet worms and ransomware attacks and effect of BGP feature properties
Author:
Takhar, Hardeep Kaur
Date created:
2023-04-19
Machine learning for detecting ransomware attacks using BGP routing records
Author:
Gonzalez Rios, Ana
Date created:
2022-08-24
Machine learning for classifying anomalies and intrusions in communication networks
Author:
Li, Zhida
Date created:
2022-04-14
Pagination
1
2
››
Next page
Last »
Last page