Skip to main content
Sign in
Summit Research Repository
SIGN IN
SFU Mail
goSFU
Canvas
Library Catalogue
Search
Search
This site
SFU.ca
Submit your Research
Menu
Main navigation
Home
Collections
About
Contact
Search Summit
Search
Search
Sort by
Relevance
Title
Order
Asc
Desc
Search
Displaying 1 - 20 of 35
Exploring behavioral data in online social media with focus on user connectivity and mobility
Author (aut):
Liang, Hongwei
Date created:
2018-04-23
Towards recommendation with user action sequences
Author (aut):
Tang, Jiaxi
Date created:
2019-12-18
Evaluation of Support Vector Machine kernels for detecting network anomalies
Author (aut):
Batta, Prerna
Date created:
2019-04-18
Secure and efficient search over outsourced databases
Author (aut):
Lin, Weipeng
Date created:
2019-05-24
Application of machine learning techniques for detecting anomalies in communication networks
Author (aut):
Ding, Qingye
Date created:
2018-06-19
Multiple-sized Bucketization For Privacy Protection
Author (aut):
Wang, Peng
Date created:
2014-05-05
Algorithms and tools for anonymization of the internet traffic
Author (aut):
Farah, Tanjila
Date created:
2013-02-26
Improving Recommender Systems with Rich Side Information
Author (aut):
Zhang, Chenyi
Date created:
2015-08-04
KeyLabel Algorithms for Keyword Search in Large Graphs
Author (aut):
Wang, Yue
Date created:
2015-08-24
False alarm reduction in maritime anomaly detection with contextual verification
Author (aut):
Radon, Aungon Nag
Date created:
2015-08-18
Sensitive disclosures under differential privacy guarantees
Author (aut):
Han, Chao
Date created:
2016-01-15
Applications of Reinforcement Learning to Routing and Virtualization in Computer Networks
Author (aut):
Haeri, Soroush
Date created:
2016-03-17
Identifying PCB contaminated transformers through active learning
Author (aut):
Yeh, Yin Chu
Date created:
2012-08-27
Comparison of machine learning models for classification of BGP anomalies
Author (aut):
Al-Rousan, Nabil Mashhour
Date created:
2012-08-06
Distributed intelligent systems for control with distributed hash table
Author (aut):
Zhang, Chi
Date created:
2011-12-01
Collection and characterization of BCNET BGP traffic
Author (aut):
Lally, Sukhchandan
Date created:
2012-05-25
Privacy preserving range query search over encrypted numeric data in cloud
Author (aut):
Yan, Yongmin
Date created:
2013-08-12
X-outlier detection and periodicity detection in load curve data in power systems
Author (aut):
Guo, Zhihui
Date created:
2011-08-16
Enhancing utility in privacy preserving data publishing
Author (aut):
Liu, Junqiang
Date created:
2010-08-06
On the utility of randomization approaches for privacy preserving data publishing
Author (aut):
Chaytor, Rhonda Lee
Date created:
2010-06-08
Pagination
1
2
››
Next page
Last »
Last page