University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Academic/Research unit is "Faculty of Engineering and Physical Sciences > Computing Science"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Item Type | No Grouping
Number of items at this level: 494.

UNSPECIFIED

Abadi, BM, Jarchi, D and Sanei, S (2009) SIMULTANEOUS LOCALIZATION AND SEPARATION OF BIOMEDICAL SIGNALS BY TENSOR FACTORIZATION In: 15th IEEE/SP Workshop on Statistical Signal Processing, 2009-08-31 - 2009-09-03, Cardiff, WALES.

Abadi, BM, Sarrafzadeh, A, Ghaderi, F and Sanei, S (2009) SEMI-BLIND CHANNEL ESTIMATION IN MIMO COMMUMICATION BY TENSOR FACTORIZATION In: 15th IEEE/SP Workshop on Statistical Signal Processing, 2009-08-31 - 2009-09-03, Cardiff, WALES.

Abadi, BM, Sarrafzadeh, A, Jarchi, D, Abolghasemi, V and Sanei, S (2009) SEMI-BLIND SIGNAL SEPARATION AND CHANNEL ESTIMATION IN MIMO COMMUNICATION SYSTEMS BY TENSOR FACTORIZATION In: 15th IEEE/SP Workshop on Statistical Signal Processing, 2009-08-31 - 2009-09-03, Cardiff, WALES.

Abdalla, M, Chevalier, C, Manulis, M and Pointcheval, D (2010) Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys In: Third International Conference on Cryptology in Africa AFRICACRYPT 2010, 2010-05-03 - 2010-05-06, Stellenbosch, South Africa.

Abdel Halim, I, Sharp, J, Schneider, S and Treharne, H (2010) Formal Verification of Tokeneer Behaviours Modelled in fUML Using CSP In: 12th International Conference on Formal Engineering Methods, 2010-11-17 - 2010-11-19, Shanghai, China.

Abdelhalim, I, Schneider, S and Treharne, H (2012) An Optimization Approach for Effective Formalized fUML Model Checking.

Abdelhalim, I, Schneider, S and Treharne, H (2011) Towards a practical approach to check UML/fUML models consistency using CSP In: 13th International Conference on Formal Engineering Methods, ICFEM 2011, 2011-10-26 - 2011-10-28, Durham, UK.

Abdelhalim, I, Schneider, SA and Treharne, H (2013) An integrated framework for checking the behaviour of fUML models using CSP International Journal on Software Tools for Technology Transfer, 15 (4). 375 - 396. ISSN 1433-2779

Abolghasemi, V, Ferdowsi, S and Sanei, S (2011) Sparse multichannel source separation using incoherent K-SVD method In: SSP '11, 2011-06-28 - 2011-06-30, Nice, France.

Abolghasemi, V, Sanei, S, Ferdowsi, S, Ghaderi, F and Belcher, A (2009) Segmented compressive sensing In: SSP '09, 2009-08-31 - 2009-09-03, Cardiff, UK.

Ahmad, JJ, Li, S, Thavot, R and Mattavelli, M (2013) Secure computing with the MPEG RVC framework Signal Processing: Image Communication, 28 (10). 1315 - 1334. ISSN 0923-5965

Ahmad, K, Casey, M and Bale, T (2002) Connectionist simulation of quantification skills CONNECTION SCIENCE, 14 (3). 165 - 201. ISSN 0954-0091

Ahmad, K, Casey, M, Vrusias, B, Saragiotis, P, Windeatt, T and Roli, F (2003) Combining multiple modes of information using unsupervised neural classifiers In: 4th International Workshop on Multiple Clasifier Systems (MCS 2003), 2003-06-11 - 2003-06-13, UNIV SURREY, GUILDFORD, ENGLAND.

Ahmad, Khurshid and Vrusias, Bogdan (2004) Learning to visualise high-dimensional data Proceedings of the 8th International Conference on Information Visualisation. pp. 507-512.

Ahmad, Khurshid, Vrusias, Bogdan and Tariq, Mariam (2002) Co-operative neural networks and 'integrated' classification Proceedings of the 2002 International Joint Conference on Neural Networks (IJCNN'02) IEEE, 2. pp. 1546-1551.

Ahmad, Khurshir, Salway, Andrew and Lansdale, Janet (1997) (An)notating dance: Multimedia storage and retrieval 1998 International Conference of Computational Intelligence and Multimedia Applications (ICCIMA '98). pp. 788-793.

Albukhanajer, W, Jin, Y, Briffa, JA and Williams, G A Comparative Study of Multi-Objective Evolutionary Trace Transform Methods for Robust Feature Extraction

Albukhanajer, WA, Jin, Y, Briffa, JA and Williams, G (2012) Evolutionary Multi-Objective Optimization of Trace Transform for Invariant Feature Extraction In: 2012 IEEE congres on Evolutionary Computation (CEC), 2012-06-10 - 2012-06-15, Brisbane, Australia.

Alfraih, AA, Briffa, JA and Wesemeyer, S Forgery Localization Based on Image Chroma Feature Extraction In: Intern. Conf. on Imaging for Crime Detection and Prevention (ICDP), 2013-12-16 - 2013-12-17, London.

Alshehri, AA, Briffa, JA, Schneider, SA and Wesemeyer, S (2013) Formal Security Analysis of NFC M-coupon Protocols using Casper/FDR In: NFC 2013 : 5th International Workshop On Near Field Communication, 2013-02-05 - 2013-02-05, Zurich.

Alsudani, F and Casey, MC (2009) The Effect of Aesthetics on Web Credibility In: 23rd BCS conference on Human Computer Interaction (HCI 2009), 2009-09-01 - 2009-09-05, Cambridge, UK.

Alvarez, G, Amigó, JM, Arroyo, D and Li, S (2011) Lessons learnt from the cryptanalysis of chaos-based ciphers In: Chaos-Based Cryptography: Theory,Algorithms and Applications. Studies in Computational Intelligence, 354 (8). Springer, 257 - 295. ISBN 978-3-642-20541-5

Alvarez, G, Hernández, L, Muñoz, J, Montoya, F and Li, SJ (2005) Security analysis of communication system based on the synchronization of different order chaotic systems Physics Letters. Section A: General, Atomic and Solid State Physics, 345 (4-6). 245 - 250. ISSN 0375-9601

Alvarez, G and Li, SJ (2006) Breaking an encryption scheme based on chaotic baker map Physics Letters, Section A: General, Atomic and Solid State Physics, 352 (1-2). 78 - 82. ISSN 0375-9601

Alvarez, G and Li, SJ (2009) Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption Communications in Nonlinear Science and Numerical Simulation, 14 (11). 3743 - 3749. ISSN 1007-5704

Alvarez, G and Li, SJ (2006) Some basic cryptographic requirements for chaos-based cryptosystems International Journal of Bifurcation and Chaos, 16 (8). 2129 - 2151. ISSN 0218-1274

Alvarez, G, Li, SJ and Hernandez, L (2007) Analysis of security problems in a medical image encryption system Computers in Biology and Medicine, 37 (3). 424 - 427. ISSN 0010-4825

Anonymous, Unspecified (2008) Simple and Secure Electronic Voting with Pret a Voter Technical Report. Department of Computing, University of Surrey. (Unpublished)

Arroyo, D, Alvarez, G, Amigo, JM and Li, SJ (2011) Cryptanalysis of a family of self-synchronizing chaotic stream ciphers Communications in Nonlinear Science and Numerical Simulation, 16 (2). 805 - 813. ISSN 1007-5704

Arroyo, D, Alvarez, G, Li, SJ, Li, CQ and Fernandez, V (2009) Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity International Journal of Modern Physics B, 23 (5). 651 - 659. ISSN 0217-9792

Arroyo, D, Alvarez, G, Li, SJ, Li, CQ and Nunez, J (2008) Cryptanalysis of a discrete-time synchronous chaotic encryption system Physics Letters. Section A: General, Atomic and Solid State Physics, 372 (7). 1034 - 1039. ISSN 0375-9601

Arroyo, D, Li, CQ, Li, SJ and Alvarez, G (2009) Cryptanalysis of a computer cryptography scheme based on a filter bank Chaos Solitons and Fractals, 41 (1). 410 - 413. ISSN 0960-0779

Arroyo, D, Li, CQ, Li, SJ, Alvarez, G and Halang, WA (2009) Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm Chaos Solitons and Fractals, 41 (5). 2613 - 2616. ISSN 0960-0779

Arroyo, D, Li, SJ, Amigo, JM, Alvarez, G and Rhouma, R (2010) Comment on "Image encryption with chaotically coupled chaotic maps" Physica D-Nonlinear Phenomena, 239 (12). 1002 - 1006. ISSN 0167-2789

Arroyo, D, Rhouma, R, Alvarez, G, Li, SJ and Fernandez, V (2008) On the security of a new image encryption scheme based on chaotic map lattices Chaos, 18 (3). ISSN 1054-1500

Asghar, HJ, Pieprzyk, J, Li, S and Wang, H (2013) Cryptanalysis of the convex hull click human identification protocol International Journal of Information Security, 12 (2). 83 - 96. ISSN 1615-5262

Athanasiou, M, Clark, JY, Kokol, P, Podgorelec, V, MiceticTurk, D, Zorman, M and Verlic, M (2007) A Bayesian network model for the diagnosis of the caring procedure for wheelchair users with spinal injury Twentieth IEEE International Symposium on Computer-Based Medical Systems, Proceedings. 433 - 438.

Babiloni, F, Cichocki, A, Sanei, S, Astolfi, L, Cincotti, F and Gonzalez Andino, S (2011) Selected papers from the 4th International Conference on Bioinspired Systems and Cognitive Signal Processing. Computational Intelligence and Neuroscience, 2011. 913040 - ?. ISSN 1687-5265

Baldas, V, Tang, L, Bountris, P, Saleh, G and Koutsouris, D (2011) A real-time automatic instrument tracking system on cataract surgery videos for dexterity assessment Proceedings of the IEEE International Conference on Information Technology Applications in Biomedicine. 1 - 4.

Bardyn, D, Briffa, JA, Dooms, A and Schelkens, P (2011) Forensic Data Hiding Optimized for JPEG 2000 In: IEEE International Symposium on Circuits and Systems (ISCAS), 2011, 2011-05-15 - 2011-05-18, Rio de Janeiro, Brazil.

Bateman, PJ, Ho, ATS and Briffa, JA (2012) Image Forensics of High Dynamic Range Imaging In: 10th International Workshop, IWDW 2011, 2011-10-23 - 2011-10-26, Atlantic City.

Bismark, D, Heather, JA, Peel, RMA, Schneider, SA, Xia, Z and Ryan, PYA (2009) Experiences Gained from the first Prêt à Voter Implementation In: First International Workshop on Requirements Engineering for e-Voting Systems (RE-VOTE), 2009, 2010-08-31 - 2010-08-31, Atlanta, GA.

Bresson, E, Brecher, T and Manulis, M (2009) Fully Robust Tree-Diffie-Hellman Group Key Exchange In: Cryptology and Network Security, 8th International Conference, 2009-12-12 - 2009-12-14, Kanazawa, Ishikawa, Japan.

Bresson, E and Manulis, M (2008) Securing Group Key Exchange against Strong Corruptions In: ACM Symposium on Information, Computer & Communication Security (ASIACCS '08), 2008-03-18 - 2008-03-20, Tokyo, Japan.

Bresson, E, Manulis, M and Schwenk, JO (2007) On Security Models and Compilers for Group Key Exchange Protocols In: Advances in Information and Computer Security, 2nd Intl. Workshop on Security, 2007-10-29 - 2007-10-31, Nara, Japan.

Briffa, JA A GPU Implementation of a MAP Decoder for Synchronization Error Correcting Codes IEEE Commun. Lett., 17. 996 - 999.

Briffa, JA and Buttigieg, V (1999) Error Performance of Tunstall Coding IEE Electron. Lett., 35 (23). 2021 - 2022.

Briffa, JA and Buttigieg, V (2000) Interleavers for Unpunctured Symmetric Turbo Codes In: Proceedings. IEEE International Symposium on Information Theory, 2000., 2000-06-25 - ?, Sorrento, Italy.

Briffa, JA and Buttigieg, V (2002) Interleaving and Termination in Unpunctured Symmetric Turbo Codes IEE Proc. in Commun., 149. 6 - 12.

Briffa, JA and Buttigieg, V (1998) Investigation of the Error Performance of Tunstall Coding In: Proceedings. 1998 IEEE International Symposium on Information Theory, 1998., 1998-08-16 - ?, Cambridge MA, USA.

Briffa, JA, Culnane, C and Treharne, H (2010) Imperceptible printer dot watermarking for binary documents In: Optics, photonics, and digital technologies for multimedia applications, 2010-04-12 - 2010-04-15, Brussels, Belgium.

Briffa, JA and Das, M (2003) Channel models for high-capacity information hiding in images In: Encryption and Security II, 2002-07-09 - ?, Seattle, WA, USA.

Briffa, JA, Schaathun, HG and Wahab, AWA (2009) Has F5 Really Been Broken? In: 3rd International Conference on Crime Detection and Prevention (ICDP 2009), 2009-12-03 - 2009-12-03, London.

Briffa, JA, Schaathun, HG and Wesemeyer, S (2010) An Improved Decoding Algorithm for the Davey-MacKay Construction In: IEEE International Conference on Communications (ICC), 2010, 2010-05-23 - 2010-05-27, Cape Town.

Browne, Anthony, Jakary, Angela, Vinogradov, Sophia, Fu, Yu and Deicken, Raymond (2008) Automatic Relevance Determination for Identifying Thalamic Regions Implicated in Schizophrenia IEEE Transactions on Neural Networks, 19 (6). pp. 1101-1107. ISSN 1045-9227

Browne, Antony, Hudson, Brian, Whitley, David, Ford, Martyn, Picton, Phil and Kazemian, Hassan (2003) Knowledge extraction from neural networks Proceedings of the 29th Annual Conference of the IEEE Industrial Electronics Society. pp. 1909-1913.

Browne, Antony and Pilkington, John (1994) Variable Binding in a Neural Network using a Distributed Representation Proceedings of the IEE Colloquium on Symbolic and Neural Cognitive Engineering. 4.1-4.4.

Browne, Antony and Sun, Ron (2001) Connectionist inference models Neural Networks, 14. pp. 1331-1355.

Bryans, J and Schneider, SA CSP, PVS and a recursive authentication protocol In: DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997-09-03 - ?, Rutgers University.

Bryant, D and Krause, P (2008) A review of current defeasible reasoning implementations KNOWLEDGE ENGINEERING REVIEW, 23 (3). 227 - 260. ISSN 0269-8889

Bryant, D, Krause, P, Moschoyiannis, S, Fisher, M, VanDerHoek, W, Konev, B and Lisitsa, A (2006) A tool to facilitate agent deliberation In: 10th European Conference on Logics in Artificial Intelligence, 2006-09-13 - 2006-09-15, Liverpool, ENGLAND.

Burton, C, Culnane, C, Heather, J, Peacock, T, Ryan, P, Schneider, S, Srinivasan, S, Teague, V, Wen, R and Xia, Z (2012) A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission In: EVOTE 2012, 2012-07-11 - 2012-07-14, Lochau/Bregenz, Austria.

Burton, C, Culnane, C, Heather, JA, Peacock, T, Ryan, PYA, Schneider, SA, Srinivasan, S, Teague, V, Wen, R and Xia, Z A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission In: E-VOTE 5th International Conference on Electronic Voting 2012, 2012-07-11 - 2012-07-14, Bregenz, Austria.

Burton, C, Culnane, C, Heather, JA, Peacock, T, Ryan, PYA, Schneider, SA, Srinivasan, S, Teague, V, Wen, R and Xia, Z (2012) Using Pret a Voter in Victorian State elections In: 2012 Electronic Voting Technology/Workshop on Electronic Voting, 2012-08-06 - 2012-08-07.

Bush, D and Jin, Y (2012) Calcium control of triphasic hippocampal STDP JOURNAL OF COMPUTATIONAL NEUROSCIENCE, 33 (3). 495 - 514. ISSN 0929-5313

Buttigieg, V and Briffa, JA (2011) Codebook and Marker Sequence Design for Synchronization-Correcting Codes In: IEEE International Symposium on Information Theory Proceedings (ISIT), 2011, 2011-07-31 - 2011-08-05, St Petersburg.

Cao, Y, Jin, Y, Kowalczykiewicz, M and Sendhoff, B (2008) Prediction of convergence dynamics of design performance using differential recurrent neural networks.

Casey, M, Ahmad, K, Yang, ZR, Everson, R and Yin, H (2004) In-situ learning in multi-net systems In: 5th International Conference on Intelligent Data Engineering and Automated Learning (IDEAL 2004), 2004-08-25 - 2004-08-27, Execter, ENGLAND.

Casey, MC (2004) Integrated Learning in Multi-net Systems Doctoral thesis, University of Surrey.

Casey, MC and Ahmad, K (2006) A competitive neural model of small number detection NEURAL NETWORKS, 19 (10). 1475 - 1489. ISSN 0893-6080

Casey, MC and Damper, RI (2010) Editorial: Special Issue on Biologically-Inspired Information Fusion INFORM FUSION, 11 (1). 2 - 3. ISSN 1566-2535

Casey, MC, Hickman, DL, Pavlou, A and Sadler, JRE (2011) Small-scale Anomaly Detection in Panoramic Imaging using Neural Models of Low-level Vision In: SDisplay Technologies and Applications for Defense, Security, and Avionics V; and Enhanced and Synthetic Vision 2011, 2011-04-25 - 2011-04-29, Florida.

Casey, MC and Pavlou, A (2008) A Behavioral Model of Sensory Alignment in the Superficial and Deep Layers of the Superior Colliculus In: International Joint Conference on Neural Networks, 2008-06-01 - 2008-06-08, Hong Kong, PEOPLES R CHINA.

Casey, MC, Pavlou, A and Timotheou, A (2012) Audio-Visual Localization with Hierarchical Topographic Maps: Modeling the Superior Colliculus Neurocomputing, 97. 344 - 356. ISSN 0925-2312

Casey, MC, Pavlou, A and Timotheou, A (2010) Mind the (Computational) Gap In: UK Workshop on Computational Intelligence (UKCI 2010), 2010-09-08 - 2010-09-10, University of Essex.

Catuogno, L, Löhr, H, Manulis, M, Sadeghi, A-R and Winandy, M (2009) Transparent Mobile Storage Protection in Trusted Virtual Domains In: 23rd Large Installation System Administration Conference, 2009-11-01 - 2009-11-06, Baltimore, MD.

Chaum, D, Ryan, PYA and Schneider, SA (2005) A Practical Voter-Verifiable Election Scheme. In: European Symposium on Research in Computer Security, 2005-09-12 - 2005-09-14, Milan, Italy.

Chrol-Cannon, J, Grüning, A and Jin, Y (2012) The Emergence of Polychronous Groups under Varying Input Patterns, Plasticity Rules and Network Connectivities In: IJCNN The 2012 International Joint Conference on Neural Networks, 2012-06-10 - 2012-06-15, Brisbane, QLD.

Cichocki, A and Sanei, S (2007) EEG/MEG signal processing. Comput Intell Neurosci. 97026 - ?. ISSN 1687-5265

Clark, JY (2012) Automated plant identification using artificial neural networks In: IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB), 2012-05-09 - 2012-05-12, San Diego.

Clark, JY, Corney, DPA and Tang, HL (2012) Automated Plant Identification using Artificial Neural Networks In: CIBCB'12, 2012-05-09 - 2012-05-12, San Diego, USA.

Cohen, Gerard, Encheva, S. and Schaathun, Hans (2002) More on (2,2)-separating systems IEEE Transactions on Information Theory, 48 (9). ISSN 0018-9448

Cohen, Gerard and Schaathun, Hans Georg (2003) New upper bounds on separating codes In: 10th International Conference on Telecommunications, 2003. ICT 2003..

Cohen, Gerard D. and Schaathun, H. (2004) Upper bounds on separating codes IEEE Transactions on Information Theory, 50 (5). ISSN 0018-9448

Cooke, N, Gillam, L, Wrobel, P, Cooke, H and Al-Obaidli, F (2011) A high-performance plagiarism detection system In: PAN at CLEF 2011, 2011-09-19 - 2011-09-22, Amsterdam.

Corney, DP, Tang, HL, Clark, JY, Hu, Y and Jin, J (2012) Automating digital leaf measurement: the tooth, the whole tooth, and nothing but the tooth. PLoS One, 7 (8). e42112 - ?. ISSN 1932-6203

Corney, DP, Tang, HL, Clark, JY, Hu, Y and Jin, J (2012) Automating digital leaf measurement: the tooth, the whole tooth, and nothing but the tooth. PLoS One, 7 (8). e42112 - ?. ISSN 1932-6203

Corney, DPA, Clark, JY, Tang, HL and Wilkin, P (2012) Automatic Extraction of Leaf Characters from Herbarium Specimens Taxon: International Journal of Plant Taxonomy, Phylogeny and Evolution, 61 (1). 231 - 244. ISSN 0040-0262

Corney, DPA, Clark, JY, Tang, HL and Wilkin, P (2012) Automatic Extraction of Leaf Characters from Herbarium Specimens Taxon: International Journal of Plant Taxonomy, Phylogeny and Evolution, 61 (1). 231 - 244. ISSN 0040-0262

Cristofaro, ED, Manulis, M and Poettering, B (2011) Private Discovery of Common Social Contacts In: 9th International Conference on Applied Cryptography and Network Security (ACNS 2011), 2011-06-07 - 2011-06-10, Nerja, Spain.

Culnane, C, Bismark, D, Heather, JA, Schneider, SA, Srinivasan, S and Xia, Z Authentication Codes In: EVT/WOTE 2011, 2011-08-08 - 2011-08-09, San Francisco, USA.

Culnane, C, Treharne, H and Ho, ATS (2008) Improving mutli-set formatted binary text watermarking using continuous line embedding

Culnane, C, Treharne, H, Ho, ATS, Shi, YQ and Jeon, B (2006) A new multi-set modulation technique for increasing hiding capacity of binary watermark for print and scan processes In: UNSPECIFIED SPRINGER-VERLAG BERLIN, 96 - 110.

Culnane, Chris, Heather, James, Schneider, Steve , Srinivasan, Sriramkrishnan and Xia, Zhe (2010) Trustworthy Voting Systems Technical Report: System Design Technical Report. Department of Computing, University of Surrey. (Unpublished)

Delicata, R and Schneider, S (2007) An algebraic approach to the verification of a class of Diffie-Hellman protocols INT J INF SECUR, 6 (2-3). 183 - 196. ISSN 1615-5262

Delicata, R and Schneider, S (2006) A formal approach for reasoning about a class of Diffle-Hellman protocols In: UNSPECIFIED UNSPECIFIED, 34 - 46.

Delicata, Rob and Schneider, Steve A. (2005) Temporal rank functions for forward secrecy 18th IEEE Workshop on Computer Security Foundations, 2005. pp. 126-139.

Delicata, Robert and Schneider, Steve (2004) Towards the Rank Function Verification of protocols that use Temporary Secrets

Demirel, D, Henning, M, Ryan, PYA, Schneider, S and Volkamer, M (2011) Feasibility Analysis of Prêt à Voter for German Federal Elections.

Diakos, T, Brown, TWC and Briffa, JA (2013) Evaluating the eavesdropping range of varying magnetic field strengths in NFC standards In: European Conference of Antennas and Propagation, 2013-04-08 - ?.

Diakos, TP, Briffa, JA, Brown, TWC and Wesemeyer, S (2013) Eavesdropping Near Field Contactless Payments: A Quantitative Analysis IET Journal of Engineering.

Dutertre, B and Schneider, S (1997) Using a PVS Embedding of CSP to Verify Authentication Protocols. In: 10th International Conference on Theorem Proving in Higher Order Logics, 1997-08-19 - 1997-08-22, Murray Hill, NJ, USA.

Dutertre, B and Schneider, SA Using a PVS embedding of CSP to verify authentication protocols In: 10th International Theorem Proving in Higher Order Logic Conference, 1997 - ?.

Emelia Akashah, PA, Sugathan, SK and Ho, ATS (2008) Receiver operating characteristic (ROC) graph to determine the most suitable pairs analysis threshold value In: WCECS '08, 2008-10-22 - 2008-10-24, San Francisco, USA.

Evans, N and Schneider, S (2000) Analysing Time Dependent Security Properties in CSP Using PVS. In: European Symposium on Research in Computer Security, 2000-10-04 - 2000-10-06, Toulouse, France.

Fenton, Norman, Neil, Martin, Marsh, William, Hearty, Peter, Radlinski, Lukasz and Krause, Paul (2007) Project Data Incorporating Qualitative Facts for Improved Software Defect Prediction In: Third International Workshop on Predictor Models in Software Engineering (PROMISE'07: ICSE Workshops 2007).

Ferdowsi, S, Abolghasemi, V, Ahmadyfard, A and Sanei, S (2009) AN IMPROVED EYE DETECTION METHOD BASED ON STATISTICAL MOMENTS In: 15th IEEE/SP Workshop on Statistical Signal Processing, 2009-08-31 - 2009-09-03, Cardiff, WALES.

Finke, A, Jin, Y and Ritter, H (2009) A P300 based brain-robot interface for shaping human-robot interaction In: Bernstein Conference on Computational Neuroscience, 2009-09-30 - 2009-10-02, Frankfurt, Germany.

Fleischhacker, N, Günther, F, Kiefer, F, Manulis, M and Poettering, B (2013) Pseudorandom Signatures

Foulle, S, Schneider, S, Traoré, J and Xia, Z (2007) Threat analysis of a practical voting scheme with receipts In: First International Conference VOTE-ID 2007, 2007-10-04 - 2007-10-05, Bochum, Germany.

Gajek, S, Manulis, M, Sadeghi, A-R and Schwenk, J (2008) Provably Secure Browser-Based User-Aware Mutual Authentication over TLS In: ACM Symposium on Information, Computer & Communication Security (ASIACCS '08), 2008-03-18 - 2008-03-20, Tokyo, Japan.

Gajek, S, Manulis, M and Schwenk, J (2008) Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy In: 13th Australasian Conference, ACISP 2008, 2008-07-07 - 2008-07-09, Wollongong, Australia.

Gehrmann, E, Glaesser, C, Jin, Y, Sendhoff, B, Drossel, B and Hamacher, K (2011) Robustness of glycolysis in yeast to internal and external noise PHYSICAL REVIEW E, 84. ISSN 1539-3755

Ghaderi, F, Mohseni, HR, McWhirter, JG and Sanei, S (2009) BLIND SOURCE EXTRACTION OF PERIODIC SIGNALS In: IEEE International Conference on Acoustics, Speech and Signal Processing, 2009-04-19 - 2009-04-24, Taipei, TAIWAN.

Ghodsi, M, Hassani, H and Sanei, S (2010) Extracting fetal heart signal from noisy maternal ECG by singular spectrum analysis Journal of Statistics and its Interface, Special Issue on the Application of SSA, 3 (3). 399 - 411. ISSN 1938-7989

Ghodsi, M and Sanei, S (2011) Support vector machines for classification of temporomandibular disorders Data Science, 9. 373 - 388. ISSN 1680-743X

Gillam, L, Li, B and O'Loughlin, J (2012) Teaching Clouds: Lessons Taught and Lessons Learnt In: Cloud Computing for Teaching and Learning: Strategies for Design and Implementation. IGI Global.

Gillam, L, Li, B, O'Loughlin, J and Singh Tomar, AP (2012) Fair Benchmarking for Cloud Computing Systems Project Report. University of Surrey.

Gillam, L, Newbold, N and Cooke, N (2012) Educated guesses and equality judgements: using search engines and pairwise match for external plagiarism detection In: 4th PAN workshop, 2012-09-17 - 2012-09-20, Rome, Italy.

Gillam, L and Vartapetiance, A (2012) Quite Simple Approaches for Authorship Attribution, Intrinsic Plagiarism Detection and Sexual Predator Identification In: 4th PAN workshop; CLEF 2012, 2012-09-17 - 2012-09-20, Rome, Italy.

Goh, J, Tang, HL, Peto, T and Saleh, G (2012) An evolutionary approach for determining hidden Markov model for medical image analysis 2012 IEEE Congress on Evolutionary Computation, CEC 2012.

Goh, J, Tang, L and Al Turk, L (2010) Evolving the structure of hidden Markov models for micro aneurysms detection Proceedings of UK Workshop on Computational Intelligence. 1 - 6.

Goh, J, Tang, LL, Saleh, G, Al Turk, L, Fu, Y and Browne, A (2010) Filtering Normal Retinal Images for Diabetic Retinopathy Screening Using Multiple Classifiers In: 9th International Conference on Information Technology and Applications in Biomedicine, 2009-11-04 - 2009-11-07, Larnaka, CYPRUS.

Gong, Li, Guttman, Joshua, Ryan, Peter and Schneider, Steve A. (2003) Guest Editorial - Overview the <i>IEEE Journal on Selected Areas in Communications</i>, Issue on Design and Analysis Techniques for Security Assurance, 21. pp. 1-4.

Gräning, L, Jin, Y and Sendhoff, B (2005) Efficient evolutionary optimization using individual-based evolution control and neural networks: A comparative study.

Grüning, A (2005) Back-propagation as reinforcement in prediction tasks In: ICANN 2005 15th International Conference, 2005-09-11 - 2005-09-15, Warsaw, Poland.

Grüning, A (2007) Elman Backpropagation as Reinforcement for Simple Recurrent Networks Neural Computation, 19 (11). 3108 - 3131. ISSN 0899-7667

Grüning, A (2006) Stack- and Queue-like Dynamics in Recurrent Neural Networks Connection Science, 18. 23 - 42. ISSN 0954-0091

Grüning, A and Kibrik, AA (2005) Modeling Referential Choice in Discourse: A Cognitive Calculative Approach and a Neural Network Approach In: Anaphora Processing: Linguistic, Cognitive and Computational Modelling. John Benjamins, 163 - 198. ISBN 90 272 4777 3

Grüning, A and Kibrik, AA (2002) Referential Choice and Activation Factors: A Neural Network Approach In: DAARC 2002, 2002-09-18 - 2002-09-20, Lisbon, Portugal.

Grüning, A and PG, AV (2011) The Accumulation Theory of Ageing Preprint.

Grüning, A and Sporea, I (2012) Supervised Learning of Logical Operations in Layered Spiking Neural Networks with Spike Train Encoding Neural Processing Letters, volume. ISSN 1370-4621

Grüning, A and Treves, A (2006) Distributed neural blackboards could be more attractive Behavioral and Brain Sciences, 29. 79 - 80. ISSN 0140-525X

Guo, H, Meng, Y and Jin, Y (2010) Analysis of local communication load in shape formation of a distributed morphogenetic swarm robotic system In: 2010 IEEE Congress on Evolutionary Computation, 2010-07-18 - 2010-07-23, Barcelona.

Guo, H, Meng, Y and Jin, Y (2009) Self-adaptive multi-robot construction using gene regulatory networks

Günther, F, Manulis, M and Strufe, T (2011) Cryptographic Treatment of Private User Profiles In: 15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS, 2011-02-28 - 2011-03-04, St Lucia.

Havell, B, Marshall, D, Hicks, Y, Rosin, P, Sanei, S and Aubrey, A (2010) Comparison of techniques for audio driven facial animation In: FAA 2010, 2010-10-21 - 2010-10-21, Edinburgh, UK.

He, Z, Cichocki, A, Li, Y, Xie, S and Sanei, S (2009) K-hyperline clustering learning for sparse component analysis Signal Processing, 89 (6). 1011 - 1022.

Heather, J, Lowe, G and Schneider, S (2003) How to Prevent Type Flaw Attacks on Security Protocols. Journal of Computer Security, 11 (2). 217 - 244. ISSN 0926-227X

Heather, J, Lowe, G and Schneider, S (2003) How to prevent type flaw attacks on security protocols Journal of Computer Security, 11 (2). 217 - 244. ISSN 0926-227X

Heather, J, Lowe, G and Schneider, S (2003) How to prevent type flaw attacks on security protocols Journal of Computer Security, 11 (2). 217 - 244. ISSN 0926-227X

Heather, J, Ryan, PYA and Teague, V (2010) Pretty good democracy for more expressive voting schemes In: 15th European Symposium on Research in Computer Security, 2010-09-20 - 2010-09-22, Athens, Greece.

Heather, J and Schneider, S (2002) Equal To The Task? In: European Symposium on Research on Computer Security.

Heather, J and Schneider, S (2000) Towards Automatic Verification of Authentication Protocols on an Unbounded Network. CSFW'00. 132 - 143.

Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function Journal of Computer Security, 13 (2). 317 - 344. ISSN 0926-227X

Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function Journal of Computer Security, 13 (2). 317 - 344. ISSN 0926-227X

Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function. Journal of Computer Security, 13 (2). 317 - 344. ISSN 0926-227X

Heather, J, Schneider, S and Teague, V (2013) Cryptographic protocols with everyday objects Formal Aspects of Computing. 1 - 26. ISSN 0934-5043

Heather, J and Wei, K (2009) Where next for formal methods? Lecture Notes in Computer Science, 5087. 52 - 58. ISSN 0302-9743

Heather, J. (2000) Oh!... Is it really you? Using rank functions to verify authentication protocols Doctoral thesis, Royal Holloway, University of London.

Heather, JA (2010) Turnitoff: identifying and fixing a hole in current plagiarism detection software Journal of Assessment and Evaluation in Higher Education, 35 (6). 647 - 660. ISSN 0260-2938

Heather, JA, Llewellyn, MH, Teague, VJ and Wen, R (2012) On the Side-Effects of Introducing E-voting In: VoteID 2011: Third International Conference, 2011-09-28 - 2011-09-29, Tallinn, Estonia.

Heather, JA and Lundin, D (2009) The Append-only Web Bulletin Board Technical Report. Springer-Verlag.

Heather, James (1997) Exploiting a weakness of RSA Masters thesis, Oxford University.

Heather, James (2002) Strand spaces and rank functions:more than distant cousins

Heather, James and Schneider, Steve A. (2011) A formal framework for modelling coercion resistance and receipt freeness Technical Report. Department of Computing, University of Surrey.

Helleseth, Tor and Schaathun, Hans (2004) On the (2-1) Separating Weight of the Kerdock Code IEEE Transactions on Information Theory, 50 (12). pp. 3312-3315. ISSN 0018-9448

Hippisley, Andrew, Cheng, David and Ahmad, Khurshid (2005) The head-modifier principle and multilingual term extraction Natural Language Engineering, 11. pp. 129-157.

Ho, ATS (2008) Semi-fragile watermarking and authentication for law enforcement applications In: ICICIC '07, 2007-09-05 - 2007-09-07, Kumamoto, Japan.

Ho, ATS, Zhu, X, Tang, LH, Sanei, S, Chambers, JA, McWhirter, J, Hicks, Y and Constantinides, AG (2007) Digital watermarking authentication and restoration for Chinese calligraphy images In: 15th International Conference on Digital Signal Processing, 2007-07-01 - 2007-07-04, Cardiff Univ, Cardiff, WALES.

Ho, Anthony T. S. (2001) Robust copyright protection of satellite images using a noveldigital image-in-image watermarking algorithm In: IGARSS 2001. Scanning the Present and Resolving the Future. Proceedings. IEEE 2001 International Geoscience and Remote Sensing Symposium (Cat. No.01CH37217).

Ho, Anthony T. S., Puhan, Niladri B., Makur, A., Marziliano, Pina and Guan, Y. L. (2004) Imperceptible data embedding in sharply-contrasted binary images In: ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004..

Ho, Anthony T. S., Puhan, Niladri B., Marziliano, Pina, Makur, Anamitra and Guan, Y. L. (2004) Perception based binary image watermarking

Ho, Anthony T. S., Shen, Jun, Chow, Andrew K. K. and Woon, Jerry (2003) Robust digital image-in-image watermarking algorithm using the fast Hadamard transform

Ho, Anthony T. S., Shen, Jun, Tan, Soon Hie and Kot, Alex C. (2002) Digital image-in-image watermarking for copyright protection of satellite images using the fast Hadamard transform In: IEEE International Geoscience and Remote Sensing Symposium.

Ho, Anthony T. S. and Shu, Feng (2003) A print-and-scan resilient digital watermark for card authentication In: Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint.

Ho, Anthony T. S. and Shu, Feng (2004) A robust spread-spectrum watermarking method using two-level quantization In: 2004 International Conference on Image Processing, 2004. ICIP '04..

Ho, Anthony T. S., Tham, W. H. and Low, K. S. (2005) Improving classification accuracy in through-wall radar imaging using hybrid prony's and singular value decomposition method

Ho, Anthony T. S., Tham, W. H. and Low, K. S. (2005) Through-wall radar image reconstruction based on time-domain transient signals in the presence of noise

Ho, Anthony T. S., Zhu, Xunzhan and Guan, Yong Liang (2004) Image Content Authentication Using Pinned Sine Transform EURASIP Journal on Advances in Signal Processing, 2004 (14). pp. 2174-2184. ISSN 1687-6172

Ho, Anthony T. S., Zhu, Xunzhan, Guan, Yong Liang and Marziliano, Pina (2004) Slant transform watermarking for textured images

Ho, Anthony T. S., Zhu, Xunzhan and Shen, Jun (2004) Authentication of biomedical images based on zero location watermarking In: ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004..

Ho, Anthony T. S., Zhu, Xunzhan and Tang, Lilian H. (2007) Digital Watermarking Authentication and Restoration for Chinese Calligraphy Images In: 2007 15th International Conference on Digital Signal Processing.

Ho, Anthony T. S., Zhu, Xunzhan and Woon, W. M. (2005) A semi-fragile pinned sine transform watermarking system for content authentication of satellite images In: Proceedings. 2005 IEEE International Geoscience and Remote Sensing Symposium, 2005. IGARSS '05..

Ho, Anthony Tung Shuen, Seumahu, Eliza Steve, Tam, Siu-Chung, Chin, Teck Wei and Lim, Hock Seng (1998) Improving SAR image classification in tropical region through fusion with SPOT data In: IGARSS '98. Sensing and Managing the Environment. 1998 IEEE International Geoscience and Remote Sensing. Symposium Proceedings. (Cat. No.98CH36174).

Ho, Anthony Tung-Shuen, Yu, Tao and Tam, Siu-Chung (1999) Improving vector quantization of satellite images through theapplication of bi-orthogonal wavelets In: IEEE 1999 International Geoscience and Remote Sensing Symposium. IGARSS'99 (Cat. No.99CH36293).

Huesken, M, Jin, Y and Sendhoff, B (2005) Structure optimization of neural networks for evolutionary design optimization Soft Computing, 12 (1). 21 - 28. ISSN 1432-7643

Ifill, W, Schneider, S and Treharne, H (2007) Augmenting B with control annotations In: 7th International Conference of B Users, 2007-01-17 - 2007-01-19, Univ Franche Comte, Besancon, FRANCE.

Inden, B, Jin, Y, Haschke, R and Ritter, H (2012) Evolving neural fields for problems with large input and output spaces Neural Networks, 28. 24 - 39. ISSN 0893-6080

Inden, B, Jin, Y, Haschke, R and Ritter, H (2011) Exploiting inherent regularity in control of multilegged robot locomotion by evolving neural fields

Inden, B, Jin, Y, Haschke, R and Ritter, H (2010) NEATfields: Evolution of neural fields for visual discrimination and multiple pole balancing tasks In: Genetic and Evolutionary Computation Conference, 2010-07-07 - ?, Portland.

Ioannou, P, Casey, MC and Gruning, A (2012) Evaluating the Effect of Spiking Network Parameters on Polychronization In: 22nd International Conference on Artificial Neural Networks, 2012-09-11 - 2012-09-14.

Jacobs, J. C., van Moll, J. H., Krause, P. J., Kusters, R. J. and Trienekens, J. J. M. (2003) Effects of virtual development on product quality: exploring defect causes In: Eleventh Annual International Workshop on Software Technology and Engineering Practice.

James, P, Moller, F, Nguyen, HN, Roggenbach, M, Schneider, SA and Treharne, H (2013) On Modelling and Verifying Railway Interlockings: Tracking Train Lengths Technical Report.

James, P, Trumble, M, Treharne, H, Roggenbach, M and Schneider, S (2013) OnTrack: An Open Tooling Environment for Railway Verification. NASA Formal Methods, 7871. 435 - 440.

Jarchi, D, Makkiabadi, B and Sanei, S (2009) ESTIMATION OF TRIAL TO TRIAL VARIABILITY OF P300 SUBCOMPONENTS BY COUPLED RAO-BLACKWELLISED PARTICLE FILTERING In: 15th IEEE/SP Workshop on Statistical Signal Processing, 2009-08-31 - 2009-09-03, Cardiff, WALES.

Jarchi, D, Makkiabadi, B and Sanei, S (2011) Instantaneous phase tracking of oscillatory signals using EMD and Rao-Blackwellised particle filtering In: ICASSP 2011, 2011-05-22 - 2011-05-27.

Javed, Y, Nazir, M, Khan, MM, Khayam, SA and Li, SJ (2012) Captchæcker: Reconfigurable CAPTCHAs Based on Automated Security and Usability Analysis In: 4th Symposium on Configuration Analytics and Automation (SafeConfig 2011), 2011-10-31 - 2011-11-01, Arlington, VA, USA.

Jiang, W, Ho, ATS, Treharne, H and Yun-Qing, S (2011) Local Binary Patterns for Printer Identification based on Texture Analysis Technical Report.

Jin, Y (2005) A comprehensive survey of fitness approximation in evolutionary computation Soft Computing, 9 (1). 3 - 12. ISSN 1432-7643

Jin, Y, Gruna, R, Paenke, I and Sendhoff, B (2009) Evolutionary Multi-objective Optimization of Robustness and Innovation in Redundant Genetic Representations In: IEEE Symposium on Computational Intelligence in Multi-Criteria Decision-Making, 2009-03-30 - 2009-04-02, Nashville, TN.

Jin, Y, Gruna, R and Sendhoff, B (2009) Pareto analysis of evolutionary and learning systems Frontiers of Computer Science in China, 3 (1). 4 - 17. ISSN 1673-7466

Jin, Y, Guo, H and Meng, Y (2012) A Hierarchical Gene Regulatory Network for Adaptive Multirobot Pattern Formation IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 42 (3). 805 - 816. ISSN 1083-4419

Jin, Y, Guo, H and Meng, Y (2009) Robustness Analysis and Failure Recovery of a Bio-Inspired Self-Organizing Multi-Robot System.

Jin, Y, Oh, S and Jeon, M (2010) Incremental approximation of nonlinear constraint functions for evolutionary constrained optimization In: Congress on Evolutionary Computation, 2010-07-18 - ?, Barcelona.

Jin, Y, Okabe, T and Sendhoff, B (2001) Adapting Weighted Aggregation for Multiobjective Evolution Strategies.

Jin, Y, Okabe, T and Sendhoff, B (2004) Neural network regularization and ensembling using multi-objective evolutionary algorithms In: Congress on Evolutionary Computation, 2004-06-19 - ?.

Jin, Y, Olhofer, M and Sendhoff, B (2001) Managing approximate models in evolutionary aerodynamic design optimization In: 2001 IEEE Conference on Evolutionary Computation, ICEC, 2001-05-27 - 2001-05-30.

Jin, Y and Sendhoff, B (2004) Constructing dynamic optimization test problems using the multi-objective optimization concept. In: EvoWorkshops 2004, 2004-04-05 - 2004-04-07, Coimbra, Portugal.

Jin, Y and Sendhoff, B (2004) Constructing dynamic optimization test problems using the multi-objective optimization concept. In: EvoWorkshops 2004, 2004-04-05 - 2004-04-07, Coimbra, Portugal.

Jin, Y and Sendhoff, B (2008) Evolving in silico Bistable and Oscillatory Dynamics for Gene Regulatory Network Motifs In: IEEE Congress on Evolutionary Computation, 2008-06-01 - 2008-06-06, Hong Kong, PEOPLES R CHINA.

Jin, Y and Sendhoff, B (1999) Knowledge incorporation into neural networks from fuzzy rules Neural Processing Letters, 10 (3). 231 - 242. ISSN 1370-4621

Jin, Y and Sendhoff, B (2004) Reducing Fitness Evaluations Using Clustering Techniques and Neural Network Ensembles.

Jin, Y and Sendhoff, B (2003) Trade-off between performance and robustness: An evolutionary multiobjective approach

Jin, Y, Sendhoff, B and Meng, Y (2009) Influence of regulation logic on the easiness of evolving sustained oscillation for gene regulatory networks

Jin, Y and Trommler, J (2010) A fitness-independent evolvability measure for evolutionary developmental systems In: IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology, 2010-05-02 - ?, Montreal.

Jing, M and Sanei, S (2007) A novel constrained topographic independent component analysis for separation of epileptic seizure signals. Comput Intell Neurosci. 21315 - ?. ISSN 1687-5265

Jones, B, Jin, Y, Sendhoff, B and Yao, X (2010) Emergent Distribution of Computational Workload in the Evolution of an Undulatory Animat.

Jones, B, Jin, Y, Sendhoff, B and Yao, X (2011) The effect of proprioceptive feedback on the distribution of sensory information in a model of an undulatory organism In: 10th European Conference, ECAL 2009, 2009-09-13 - 2009-09-16, Budapest, Hungary.

Jones, B, Jin, Y, Sendhoff, B and Yao, X (2009) The evolutionary emergence of neural organization in a hydra-like animat In: Bernstein Conference on Computational Neuroscience, 2009-09-30 - 2009-10-02, Frankfurt, Germany.

Kafas, K, Aljaffan, N and Li, S (2013) Poster: Visual Password Checker In: 9th Symposium On Usable Privacy and Security (SOUPS 2013), 2013-07-24 - 2013-07-26, Newcastle, UK.

Khare, VR, Yao, X, Sendhoff, B, Jin, Y and Wersing, H (2005) Co-evolutionary modular neural networks for automatic problem decomposition

Koukoumpetsos, K., Antonopoulos, N., Zhang, K. and Exarchakos, G. (2008) Improving Availability of Mobile Code Systems by Decoupling Interaction from Mobility In: Seventh International Conference on Networking (icn 2008).

Krause, PJ, Fenton, N, Neil, M, Marsh, W, Hearty, P and Radlinski, L (2008) On the effectiveness of early life cycle defect prediction with Bayesian Nets Empirical Software Engineering: an international journal, 13 (5). 499 - 537. ISSN 1382-3256

Krause, PJ and Marinos, A (2009) An SBVR framework for RESTful Web Applications Lecture Notes in Computer Science: Rule Interchange and Applications, 5858. 144 - 158.

Krause, PJ, Perez-Minana, E and Thornton, J (2012) Bayesian Networks for the management of Greenhouse Gas emissions in the British agricultural sector Environmental Modelling and Software, 35. 132 - 148. ISSN 1364-8152

Krause, PJ, Razavi, AR, Moschoyiannis, S and Marinos, A (2009) Stability and Complexity in Digital Ecosystems In: 3rd IEEE International Conference on Digital Ecosystems and Technologies, 2009-06-01 - 2009-06-03, Istanbul, TURKEY.

Krause, Paul J., Freimut, Bernd and Suryn, Witold (2002) New directions in measurement for software quality control

Kroustis, Constantinos A and Casey, Matthew C (2008) Combining Heuristics and Q-Learning in an Adaptive Light Seeking Robot Technical Report. Department of Computing, University of Surrey. (Unpublished)

Le, MN, Ong, Y-S, Jin, Y and Sendhoff, B (2009) Lamarckian memetic algorithms: local optimum and connectivity structure analysis Memetic Computing, 1 (3). 175 - 190. ISSN 1865-9292

Lee, TKM, Belkhatir, M and Sanei, S (2009) On the Compensation for the Effects of Occlusion in Fronto-Normal Gait Signal Processing In: ISM '09, 2009-12-14 - 2009-12-16, San Diego, USA.

Li, B and Gillam, L (2009) Grid Service Level Agreements using Financial Risk Analysis Techniques In: Handbook of Research on P2P and Grid Systems for Service-Oriented Computing: Models, Methodologies and Applications. IGI-Global.

Li, B and Gillam, L (2010) Towards Application-Specific Service Level Agreements: Experiments in Clouds and Grids In: Cloud Computing: Principles, Systems and Applications. Springer. ISBN 9781849962407

Li, CQ, Li, SJ, Alvarez, G, Chen, G and Lo, K-T (2008) Cryptanalysis of a chaotic block cipher with external key and its improved version Chaos Solitons and Fractals, 37 (1). 299 - 307. ISSN 0960-0779

Li, CQ, Li, SJ, Alvarez, G, Chen, GR and Lo, KT (2007) Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations Physics Letters. Section A: General, Atomic and Solid State Physics, 369 (1-2). 23 - 30. ISSN 0375-9601

Li, CQ, Li, SJ, Asim, M, Nunez, J, Alvarez, G and Chen, GR (2009) On the security defects of an image encryption scheme Image and Vision Computing, 27 (9). 1371 - 1381. ISSN 0262-8856

Li, CQ, Li, SJ, Chen, G and Halang, WA (2009) Cryptanalysis of an image encryption scheme based on a compound chaotic sequence Image and Vision Computing, 27 (8). 1035 - 1039. ISSN 0262-8856

Li, CQ, Li, SJ, Chen, GR, Chen, G and Hu, L (2005) Cryptanalysis of a new signal security system for multimedia data transmission EURASIP Journal on Applied Signal Processing, 8. 1277 - 1288. ISSN 1110-8657

Li, CQ, Li, SJ and Lo, KT (2011) Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps Communications in Nonlinear Science and Numerical Simulation, 16 (2). 837 - 843. ISSN 1007-5704

Li, CQ, Li, SJ, Lo, KT and Kyamakya, K (2010) A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system Journal of Systems and Software, 83 (8). 1443 - 1452. ISSN 0164-1212

Li, CQ, Li, SJ, Lou, D-C and Zhang, D (2006) On the security of the Yen-Guo's domino signal encryption algorithm (DSEA) Journal of Systems and Software, 79 (2). 253 - 258. ISSN 0164-1212

Li, CQ, Li, SJ, Zhang, D and Chen, G (2006) Cryptanalysis of a data security protection scheme for VoIP IEE Proceedings-Vision, Image & Signal Processing, 153 (1). 1 - 10. ISSN 1350-245X

Li, SJ (2012) On the Performance of Secret Entropy Coding: A Perspective Beyond Security In: Autonomous Systems: Developments and Trends. Studies in Computational Intelligence, 391 . Springer, 389 - 401. ISBN 978-3-642-24805-4

Li, SJ, Chen, G, Cheung, A, Bhargava, B and Lo, K-T (2007) On the design of perceptual MPEG-video encryption algorithms IEEE Transactions on Circuits and Systems for Video Technology, 17 (2). 214 - 223. ISSN 1051-8215

Li, SJ, Chen, G and Mou, XQ (2005) On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps International Journal of Bifurcation and Chaos, 15 (10). 3119 - 3151. ISSN 0218-1274

Li, SJ, Chen, G and Álvarez, G (2006) Return-map cryptanalysis revisited International Journal of Bifurcation and Chaos, 16 (5). 1557 - 1568. ISSN 0218-1274

Li, SJ, Chen, GR and Mou, XQ (2004) On the security of the Yi-Tan-Siew chaotic cipher IEEE Transactions on Circuits and Systems. Part 2: Express Briefs, 51 (12). 665 - 669. ISSN 1057-7130

Li, SJ, Chen, GR, Wong, K-W, Mou, XQ and Cai, YL (2004) Baptista-type chaotic cryptosystems: Problems and countermeasures Physics Letters. Section A: General, Atomic and Solid State Physics, 332 (5-6). 368 - 375. ISSN 0375-9601

Li, SJ, Li, CQ, Chen, GR, Bourbakis, NG and Lo, KT (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks Signal Processing-Image Communication, 23 (3). 212 - 223. ISSN 0923-5965

Li, SJ, Li, CQ, Chen, GR and Lo, KT (2008) Cryptanalysis of the RCES/RSES image encryption scheme Journal of Systems and Software, 81 (7). 1130 - 1143. ISSN 0164-1212

Li, SJ, Li, CQ, Lo, K-T and Chen, G (2006) Cryptanalysis of an image encryption scheme Journal of Electronic Imaging, 15 (4). ISSN 1017-9909

Li, SJ, Li, CQ, Lo, KT and Chen, GR (2008) Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion IEEE Transactions on Circuits and Systems for Video Technology, 18 (3). 338 - 349. ISSN 1051-8215

Li, SJ, Li, CQ, Lo, KT and Chen, GR (2008) Cryptanalyzing an encryption scheme based on blind source separation IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 55 (4). 1055 - 1063. ISSN 1549-8328

Li, SJ and Lo, K-T (2007) Security problems with improper implementations of improved FEA-M Journal of Systems and Software, 80 (5). 791 - 794. ISSN 0164-1212

Li, SJ, Mou, XQ and Cai, YL (2001) Improving security of a chaotic encryption approach Physics Letters. Section A: General, Atomic and Solid State Physics, 290 (3-4). 127 - 133. ISSN 0375-9601

Li, SJ, Mou, XQ and Cai, YL (2001) Pseudo-Random Bit Generator Based on Couple Chaotic Systems and its Application in Stream-Ciphers Cryptography In: 2nd International Conference on Cryptology in India (INDOCRYPT 2001), 2001-12-16 - 2001-12-20, Chennai, India.

Li, SJ, Mou, XQ, Cai, YL, Ji, Z and Zhang, JH (2003) On the security of a chaotic encryption scheme: Problems with computerized chaos in finite computing precision Computer Physics Communications, 153 (1). 52 - 58. ISSN 0010-4655

Li, SJ, Mou, XQ, Ji, Z, Zhang, JH and Cai, YL (2003) Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems Physics Letters. Section A: General, Atomic and Solid State Physics, 307 (1). 22 - 28. ISSN 0375-9601

Li, SJ, Mou, XQ, Yang, BL, Ji, Z and Zhang, JH (2003) Problems with a probabilistic encryption scheme based on chaotic systems International Journal of Bifurcation and Chaos, 13 (10). 3063 - 3077. ISSN 0218-1274

Li, SJ, Sadeghi, A-R, Heisrath, S, Schmitz, R and Ahmad, JJ (2012) hPIN/hTAN: A lightweight and low-cost e-banking solution against untrusted computers In: 15th International Conference on Financial Cryptography and Data Security (FC 2011), 2011-02-28 - 2011-03-04, Gros Islet, St. Lucia.

Li, SJ, Álvarez, G, Chen, GR and Mou, XQ (2005) Breaking a chaos-noise-based secure communication scheme Chaos, 15 (1). ISSN 1054-1500

Lim, D, Ong, Y-S, Jin, Y and Sendhoff, B (2008) Evolutionary optimization with dynamic fidelity computational models

Lim, D, Ong, Y-S, Jin, Y and Sendhoff, B (2007) A study on metamodeling techniques, ensembles, and multi-surrogates in evolutionary computation In: GECCO'07 Genetic and Evolutionary Computation Conference, 2007-07-07 - ?, London, UK.

Lim, D, Ong, Y-S, Jin, Y, Sendhoff, B and Lee, BS (2006) Inverse multi-objective robust evolutionary design Genetic Programming and Evolvable Machines, 7 (4). 383 - 404. ISSN 1389-2576

Liu, Lu, Antonopoulos, Nick and Makin, Stephen (2007) Social Peer-to-Peer for Resource Discovery In: 15th EUROMICRO International Conference on Parallel, Distributed and Network-Based Processing (PDP'07).

Liu, Lu, Mackin, Stephen and Antonopoulos, Nick (2006) Small World Architecture For Peer-to-Peer Networks In: 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.

Llewellyn, M, Schneider, SA, Xia, Z, Culnane, C, Heather, J, Ryan, PYA and Srinivasan, S (2013) Testing Voters’ Understanding of a Security Mechanism Used in Verifiable Voting The USENIX Journal of Election Technology and Systems, 1. 53 - 61. ISSN 2328-2797

Lo, JL, Sanei, S and Nazarpour, K (2009) An adaptive source-channel coding with feedback for progressive transmission of medical images. Int J Telemed Appl, 2009. 519417 - ?. ISSN 1687-6415

Lundin, D, Treharne, HE, Ryan, PYA, Schneider, SA and Heather, JA (2006) Distributed Creation of the Ballot Form in Prêt à Voter using an element of Visual Encryption In: IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 2006-06-28 - ?.

Lundin, D, Treharne, HE, Ryan, PYA, Schneider, SA, Heather, JA and Xia, Z Tear and Destroy: Chain voting and destruction problems shared by Prêt à Voter and Punchscan and a solution using Visual Encryption In: IAVoSS Workshop on Frontiers in Electronic Elections (FEE 2006), 2006-09-19 - 2006-09-19, Hamburg, Germany.

Lundin, David and Ryan, Peter Y A Human Readable Paper Verification of Pret a Voter Technical Report. Department of Computing, University of Surrey. (Unpublished)

Mak, Lee-Onn and Krause, Paul J. (2006) Detection & Management of Concept Drift In: 2006 International Conference on Machine Learning and Cybernetics.

Manulis, M (2006) Democratic Group Signatures - On an Example of Joint Ventures In: 2006 ACM Symposium on Information, computer and communications security, 2006-03-21 - 2006-03-23, Taipei, Taiwan.

Manulis, M (2009) Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys In: Applied Cryptography and Network Security: 7th International Conference, 2009-06-02 - 2009-06-05, Paris-Rocquencourt, France.

Manulis, M (2009) Securing Remote Access Inside Wireless Mesh Networks In: 10th International Workshop, WISA 2009, 2009-08-25 - 2009-08-27, Busan, Korea.

Manulis, M, Leroy, D, Koeune, F, Bonaventure, O and Quisquater, J-J (2009) Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home In: ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), 2009-03-10 - 2009-03-12, Sydney, Australia.

Manulis, M and Poettering, B (2011) Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation In: 6th ACM Symposium on Information, Computer and Communications Security, 2011-03-22 - 2011-03-24, Hong Kong.

Manulis, M, Suzuki, K and Ustaoglu, B (2009) Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange In: 12th International Conference on Information, Security, and Cryptology (ICISC 2009), 2009-12-02 - 2009-12-04, Seoul, Korea.

Manulis, M, Suzuki, K and Ustaoglu, B (2013) Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange IEICE Transactions, 96-A. 101 - 110. ISSN 0916-8508

Marinos, A, Razavi, A, Moschoyiannis, S, Krause, P, Damiani, E, Zhang, J and Chang, R (2009) RETRO: A Consistent and Recoverable RESTful Transaction Model In: IEEE International Conference on Web Services (ICWS 2009), 2009-07-06 - 2009-07-10, Los Angeles, CA.

McEwan, AA and Schneider, S (2006) A verified development of hardware using CSP||B In: 4th ACM/IEEE International Conference on Formal Methods and Models for Co-Design, 2006-07-27 - 2006-07-30, Napa Valley, CA.

Meng, Y, Jin, Y, Yin, J and Conforth, M (2010) Human activity detection using spiking neural networks regulated by a gene regulatory network In: International Joint Conference on Neural Networks, 2010-07-18 - 2010-07-23, Barcelona.

Meng, Y, Zheng, Y and Jin, Y (2010) A Morphogenetic Approach to Self-Reconfigurable Modular Robots using a Hybrid Hierarchical Gene Regulatory Network In: Artificial Life XII, 2010-08-19 - 2010-08-23, Odense, Denmark.

Mitchell, Bill (2008) Characterizing Communication Channel Deadlocks in Sequence Diagrams IEEE Transactions on Software Engineering, 34 (3). pp. 305-320. ISSN 0098-5589

Mitchell, Bill (2005) Resolving race conditions in asynchronous partial order scenarios IEEE Transactions on Software Engineering, 31 (9). pp. 767-784. ISSN 0098-5589

Mohseni, HR, Ghaderi, F, Wilding, EE and Sanei, S (2009) A BEAMFORMING PARTICLE FILTER FOR EEG DIPOLE SOURCE LOCALIZATION In: IEEE International Conference on Acoustics, Speech and Signal Processing, 2009-04-19 - 2009-04-24, Taipei, TAIWAN.

Moler, F, Nguyen, HN, Roggenbach, M, Schneider, SA and Treharne, H (2012) Combining event-based and state-based modelling for railway verification Technical Report. (Unpublished)

Moller, F, Nguyen, HN, Roggenbach, M, Schneider, S and Treharne, H (2013) Defining and model checking abstractions of complex railway models using CSP||B Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7857 L. 193 - 208. ISSN 0302-9743

Moran, M, Heather, J and Schneider, S (2013) Automated Anonymity Verification of the ThreeBallot Voting System.

Moran, M, Heather, J and Schneider, S (2014) Verifying anonymity in voting systems using CSP FORMAL ASPECTS OF COMPUTING, 26 (1). 63 - 98. ISSN 0934-5043

Moran, M, Heather, JA and Schneider, SA (2011) Anonymity and CSP for Voting Systems In: CryptoForma 2011, 2011-06-21 - ?, Limerick.

Moran, Murat (2013) Voting Systems CSP Models [Dataset] (Unpublished)

Moran, Murat and Heather, James (2013) Automated Analysis of Voting Systems with Dolev-Yao Intruder Model In: 13th International Workshop on Automated Verification of Critical Systems (AVoCS), 11-13 Sept 2013, University of Surrey.

Moran, Murat, Heather, James and Schneider, Steve (2013) Automated Anonymity Verification of the ThreeBallot Voting System Integrated Formal Methods (iFM) Proceedings, 7940. pp. 94-108. ISSN 0302-9743

Moran, Murat, Heather, James and Schneider, Steve (2012) Verifying anonymity in voting systems using CSP Formal Aspects of Computing. ISSN 0934-5043

Moschoyiannis, S, Krause, P, Bryant, D and McBurney, P (2009) Verifiable Protocol Design for Agent Argumentation Dialogues In: 3rd IEEE International Conference on Digital Ecosystems and Technologies, 2009-06-01 - 2009-06-03, Istanbul, TURKEY.

Moschoyiannis, S, Krause, PJ and Georgiou, P (2012) An animation tool for exploring transactions in a de In: 6th IEEE International conference on Digital Ecosystems Technologies (DEST), 2012-06-18 - 2012-06-20, Campione d'Italia.

Moschoyiannis, S, Krause, PJ and Shields, MW (2009) A True-Concurrent Interpretation of Behavioural Scenarios Electronic Notes in Theoretical Computer Science, 203 (7). 3 - 22. ISSN 1571-0661

Moschoyiannis, S, Küster-Filipe, J and Shields, MW (2006) A Formal Approach to Constructing Well-Behaved Systems using Components In: Mathematical frameworks for component software - Models for Analysis and Synthesis. Series on Component-Based Software Development, 2 . World Scientific Pub Co Inc, 321 - 349. ISBN 981270017X

Moschoyiannis, S, Marinos, A and Krause, P (2010) Generating SQL queries from SBVR rules In: Rule ML 2010: The 4th International Web Rule Symposium: Research Based and Industry Focused, 2010-10-21 - 2010-10-23, Washington, DC, USA.

Moschoyiannis, S, Razavi, A and Krause, P (2010) Transaction Scripts: Making Implicit Scenarios Explicit Electronic Notes in Theoretical Computer Science, 238 (6). 63 - 79. ISSN 1571-0661

Moschoyiannis, S, Razavi, AR, Zheng, YY and Krause, P (2008) Long-running Transactions: semantics, schemas, implementation In: IEEE DEST 2008, 2008-02-26 - 2008-02-29, Phitsanuloke, Thailand.

Moschoyiannis, S and Shields, MW (2004) A set-theoretic framework for component composition FUNDAMENTA INFORMATICAE, 59 (4). 373 - 396. ISSN 0169-2968

Moschoyiannis, S, Shields, MW, Lilius, J, Balarin, F and Machado, RJ (2003) Component-based design: Towards guided composition In: 3rd International Conference on Application of Concurrency to System Design, 2003-06-18 - 2003-06-20, Guimaraes, PORTUGAL.

Moschoyiannis, SK, Razavi, AR, Moschoyiannis, SK and Krause, PJ (2007) A coordination model for distributed transactions in Digital Business EcoSystems Proceedings of the 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, DEST 2007. 159 - 164.

Moschoyiannis, SK, Razavi, AR, Moschoyiannis, SK and Krause, PJ (2007) A coordination model for distributed transactions in Digital Business EcoSystems

Muchungi, K and Casey, MC Simulating Light Adaptation in the Retina with Rod-Cone Coupling In: 22nd International Conference on Artificial Neural Networks, 2012-09-11 - 2012-09-14.

Nazarpour, K, Mohseni, HR, Hesse, CW, Chambers, JA and Sanei, S (2008) A novel semiblind signal extraction approach for the removal of eye-blink artifact from EEGs EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2008. ? - ?. ISSN 1687-6172

Nieto, JMG, Manulis, M, Poettering, B, Rangasamy, J and Stebila, D (2012) Publicly Verifiable Ciphertexts In: 8th International Conference, SCN 2012, 2012-09-05 - 2012-09-07, Amalfi, Italy.

Nieto, JMG, Manulis, M and Sun, D (2012) Fully Private Revocable Predicate Encryption In: 17th Australasian Conference, ACISP 2012, 2012-07-09 - 2012-07-11, Wollongong, NSW, Australia.

Notley, S and Grüning, A (2012) Improved Spike-Timed Mappings using a Tri-Phasic Spike Timing-Dependent Plasticity Rule In: The 2012 International Joint Conference on Neural Networks (IJCNN), 2012-06-10 - 2012-06-15.

Okabe, T, Foli, K, Olhofer, M, Jin, Y and Sendhoff, B (2003) Comparative studies on micro heat exchanger optimisation.

Okabe, T, Jin, Y, Olhofer, M and Sendhoff, B (2004) On test functions for evolutionary multi-objective optimization

Okabe, T, Jin, Y and Sendhoff, B (2005) Theoretical comparisons of search dynamics of genetic algorithms and evolution strategies.

Okabe, T, Jin, Y and Sendhoff, B (2005) A new approach to dynamics analysis of genetic algorithms without selection

Orue, A, Fernandez, V, Alvarez, G, Pastor, G, Romera, M, Montoya, F, Sanchez-Avila, C and Li, SJ (2009) Breaking a SC-CNN-based Chaotic Masking Secure Communication System International Journal of Bifurcation and Chaos, 19 (4). 1329 - 1338. ISSN 0218-1274

Orue, AB, Alvarez, G, Pastor, G, Romera, M, Montoya, F and Li, SJ (2010) A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis Communications in Nonlinear Science and Numerical Simulation, 15 (11). 3471 - 3483. ISSN 1007-5704

Orue, AB, Fernandez, V, Alvarez, G, Pastor, G, Romera, M, Li, SJ and Montoya, F (2008) Determination of the parameters for a Lorenz system and application to break the security of two-channel chaotic cryptosystems Physics Letters. Section A: General, Atomic and Solid State Physics, 372 (34). 5588 - 5592. ISSN 0375-9601

Pankajakshan, V and Ho, ATS (2007) Improving video steganalysis using temporal correlation 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS. 287 - 290.

Pankajakshan, V, Ho, ATS, Liao, BY, Pan, JS, Jain, LC, Liao, M, Noda, H and Ho, ATS (2007) Improving video steganalysis using temporal correlation In: 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2007-11-26 - 2007-11-28, Kaohsiung, TAIWAN.

Pavlou, A and Casey, M (2009) A Computational Platform for Visual Fear Conditioning In: International Joint Conference on Neural Networks, 2009-06-14 - 2009-06-19, Atlanta, GA.

Pavlou, A and Casey, M (2009) Identifying Emotions Using Topographic Conditioning Maps In: 15th International Conference on Neuro-Information Processing, 2008-11-25 - 2008-11-28, Auckland, NEW ZEALAND.

Pavlou, A and Casey, MC Simulating the Effects of Cortical Feedback in the Superior Colliculus with Topographic Maps In: International Joint Conference on Neural Networks (IJCNN) 2010, 2010-07-18 - 2010-07-23, Barcelona.

Peacock, T, Ryan, PYA, Schneider, S and Xia, Z (2013) Verifiable Voting Systems Computer and Information Security Handbook. 1103 - 1125.

Puhan, NB, Ho, ATS and Sattar, F (2008) Erasable authentication watermarking in binary document images In: ICICIC '07, 2008-09-05 - 2008-09-07, Kumamoto, Japan.

Puhan, NB, Ho, ATS and Sattar, F (2008) Erasable authentication watermarking in binary document images Proceedings of Second International Conference on Innovative Computing, Information and Control. 288 - 288.

Puhan, NB, Ho, ATS and Sattar, F (2009) Localization and text sequence restoration using noise pixels in binary document image watermarking JOURNAL OF ELECTRONIC IMAGING, 18 (2). ? - ?. ISSN 1017-9909

Puhan, Niladri D. and Ho, Anthony T. S. (2005) Binary document image watermarking for secure authentication using perceptual modeling In: Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..

Qadir, G, Zhao, X, Ho, ATS and Casey, MC (2011) Image Forensic of Glare Feature for Improving Image Retrieval Using Benford's Law In: IEEE ISCAS, 2011, 2011-05-15 - 2011-05-18, Rio de Janeiro, Brazil.

Qadir, G, Zhao, X, Ho, ATS and Casey, MC (2011) Image Forensic of Glare Feature for Improving Image Retrieval Using Benford's Law

Razavi, A, Moschoyiannis, S and Krause, P (2009) An open digital environment to support business ecosystems Peer-to-Peer Networking and Applications, 2 (4). 367 - 397. ISSN 1936-6450

Razavi, AR, Malone, PJ, Moschoyiannis, S, Jennings, B and Krause, PJ (2007) A distributed transaction and accounting model for digital ecosystem composed services In: IEEE International Conference on Digital Ecosystems and Technologies, 2007-02-21 - 2007-02-23, Cairns, AUSTRALIA.

Razavi, AR, Malone, PJ, Moschoyiannis, S, Jennings, B and Krause, PJ (2007) A distributed transaction and accounting model for digital ecosystem composed services In: IEEE International Conference on Digital Ecosystems and Technologies, 2007-02-21 - 2007-02-23, Cairns, AUSTRALIA.

Razavi, AR, Moschoyiannis, S, Krause, PJ, Malone, PJ and Jennings, B (2007) A distributed transaction and accounting model for digital ecosystem composed services

Razavi, AR, Moschoyiannis, SK and Krause, PJ (2007) A coordination model for distributed transactions in Digital Business EcoSystems In: IEEE International Conference on Digital Ecosystems and Technologies, 2007-02-21 - 2007-02-23, Cairns, AUSTRALIA.

Razavi, AR, Moschoyiannis, SK and Krause, PJ (2008) A scale-free business network for digital ecosystems In: 2nd IEEE DEST 2008, 2008-06-26 - 2008-06-29, Phitsanulok, Thailand.

Rhouma, R, Solak, E, Arroyo, D, Li, SJ, Alvarez, G and Belghith, S (2009) Comment on "Modified Baptista type chaotic cryptosystem via matrix secret key" [Phys. Lett. A 372 (2008) 5427] Physics Letters. Section A: General, Atomic and Solid State Physics, 373 (37). 3398 - 3400. ISSN 0375-9601

Ryan, P. Y. and Schneider, Steve A. (2001) Process algebra and non-interference Journal of Computer Security, 9. pp. 75-103.

Ryan, PYA, Bismark, D, Heather, JA, Schneider, SA and Xia, Z (2009) The Prêt à Voter Verifiable Election System IEEE Transactions on Information Forensics and Security, 4 (4). 662 - 673. ISSN 1556-6013

Ryan, PYA and Schneider, SA (2001) Process Algebra and Non-Interference. Journal of Computer Security, 9 (1/2). 75 - 103. ISSN 0926-227X

Ryan, PYA and Schneider, SA (1999) Process Algebra and Non-Interference. In: IEEE Computer Security Foundations Workshop, 1999-06-28 - 1999-06-30, Mordano, Italy.

Ryan, PYA, Schneider, SA, Gollmann, D, Meier, J and Sabelfeld, A (2006) Pret a Voter with Re-encryption Mixes In: 11th European Symposium on Research in Computer Security, 2006-09-18 - 2006-09-20, Hamburg, GERMANY.

Salter, J. and Antonopoulos, N. (2004) An Efficient Fault Tolerant Approach to Resource Discovery in P2P Networks Other.

Salter, James and Antonopoulos, Nick (2006) CinemaScreen Recommender Agent: Combining Collaborative and Content-Based Filtering IEEE Intelligent Systems, 21 (1). pp. 35-41. ISSN 1541-1672

Salter, James and Antonopoulos, Nick (2006) CinemaScreen recommender agent: combining collaborative and content-based filtering IEEE Intelligent Systems, 21 (1). pp. 35-41. ISSN 1541-1672

Salway, Andrew and Ahmad, Khurshid (1999) Multimedia Systems and Semiotics: Collateral Texts for Video Annotation IEE Colloquium on Multimedia Databases and MPEG-7. 7/1-7/7.

Salway, Andrew and Ahmad, Khurshid (1997) The role of metaphors in financial texts

Salway, Andrew, Graham, Mike , Tomadaki, Eleftheria and Xu, Yan (2003) Linking Video and Text via Representations of Narrative

Salway, Andrew and Martinec, Radan (2005) Some ideas for modelling image-text combinations

Salway, Andrew and Tomadaki, Eleftheria (2002) Temporal Information in Collateral Texts for Indexing Movies

Salway, Andrew, Vassiliou, Andrew and Ahmad, Khurshid (2005) What Happens in Films? IEEE International Conference on Multimedia and Expo (ICME), 2005 . pp. 49-52.

Salway, Andrew and Xu, Yan (2005) Navigating stories in films Project Report.

Sanei, S, Lee, TKM and Lee, TKM (2011) Detection of periodic signals using a new adaptive line enhancer based on singular spectrum analysis In: ICICS 2011, 2011-12-13 - 2011-12-16, Singapore.

Sanei, S and jing, M (2009) Simultaneous EEG-fMRI Analysis with Application to Detection and Localizaion of Seizure Signal Sources In: Recent Advances in Signal Processing. IN-TECH. ISBN 978-953-307-002-5

Schaathun, HG (2006) The Boneh-Shaw fingerprinting scheme is better than we thought IEEE Transactions on Information Forensics and Security, 1 (2). 248 - 255. ISSN 1556-6013

Schaathun, HG (2008) On the assumption of equal contributions in fingerprinting IEEE Transactions on Information Forensics and Security, 3 (3). 569 - 572. ISSN 1556-6013

Schaathun, HG and Cohen, GD (2006) Nested codes for constrained memory and for dirty paper

Schaathun, Hans (2005) The second support weight distribution of the Kasami codes IEEE Transactions on Information Theory, 51 (8). ISSN 0018-9448

Schaathun, Hans Georg (2004) Duality and Support Weight Distributions IEEE Transactions on Information Theory, 50 (5). pp. 862-867. ISSN 0018-9448

Schaathun, Hans Georg (2004) Fighting Three Pirates with Scattering Codes Proceedings of the International Symposium on Information Theory 2004. p. 203.

Schaathun, Hans Georg (2001) A Lower Bound on the Greedy Weights of Product Codes and Projective Multisets

Schaathun, Hans Georg (2006) On Watermarking/Fingerprinting for Copyright Protection Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC '06). pp. 50-53.

Schaathun, Hans Georg (2000) Projective systems and higher weights In: 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

Schaathun, Hans Georg (2000) The Weight Hierarchy of Product Codes IEEE Transactions on Information Theory, 46 (7). pp. 2648-2651.

Schaathun, Hans Georg and Fernandez, Marcel (2005) Boneh-Shaw Fingerprinting and Soft Decision Decoding In: IEEE Information Theory Workshop, 2005..

Schmitz, R, Li, S, Grecos, C and Zhang, X (2012) A New Approach to Commutative Watermarking-Encryption In: 13th IFIP TC 6/TC 11 International Conference (CMS 2012), 2012-09-03 - 2012-09-05, Canterbury, UK.

Schmitz, R, Li, S, Grecos, C and Zhang, X (2013) Towards More Robust Commutative Watermarking-Encryption of Images In: 15th IEEE International Symposium on Multimedia (ISM 2013), 2013-12-09 - 2013-12-11, Anaheim, California, USA.

Schmitz, R and Li, SJ (2011) Neue Entwicklungen in der e-Banking Security (Recent Developments in e-Banking Security) PIK - Praxis der Informationsverarbeitung und Kommunikation, 34 (4). 176 - 184. ISSN 0930-5157

Schneider, S (1999) Abstraction and Testing.

Schneider, S (1998) Formal Analysis of a Non-Repudiation Protocol. In: IEEE Computer Security Foundations Workshop, 1998-06-09 - 1998-06-11, Rockport, MA, USA.

Schneider, S (2001) May Testing, Non-interference, and Compositionality. In: The First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology (MFCSIT2000), 2000-07-20 - 2000-07-21, Cork, ireland.

Schneider, S (1993) Timewise Refinement for Communicating Processes. In: Mathematical Foundations of Programming Semantics, 1993-04-07 - 1993-04-10.

Schneider, S (1997) Timewise Refinement for Communicating Processes. Science of Computer Programming, 28 (1). 43 - 90.

Schneider, S (1997) Verifying authentication protocols with CSP. In: IEEE Computer Security Foundations Workshop, 1997-06-10 - 1997-06-12, Rockport, MA , USA.

Schneider, S, Cavalcanti, A, Treharne, H and Woodcock, J (2006) A layered behavioural model of platelets In: 11th IEEE International Conference on Engineering of Complex Computer Systems, 2006-08-15 - 2006-08-17, Stanford, CA.

Schneider, S, Hoang, TS, Robinson, K and Treharne, H (2006) Tank monitoring: a pAMN case study Formal Aspects of Computing, 18 (3). 308 - 328. ISSN 0934-5043

Schneider, S, Llewellyn, M, Culnane, C, Heather, J, Srinivasan, S and Xia, Z (2011) Focus group views on Prêt à Voter 1.0

Schneider, S and Sidiropoulos, A (1996) CSP and Anonymity. In: European Symposium on Research in Computer Security, 1996-09-25 - 1996-09-27, Rome, Italy.

Schneider, S and Treharne, H (2005) CSP theorems for communicating B machines FORMAL ASPECTS OF COMPUTING, 17 (4). 390 - 422. ISSN 0934-5043

Schneider, S and Treharne, H (2009) Changing System Interfaces Consistently: A New Refinement Strategy for CSP||B In: 7th International Conference on Integrated Formal Methods, 2009-02-16 - 2009-02-19, Dusseldorf, GERMANY.

Schneider, S and Treharne, H (2011) Changing system interfaces consistently: A new refinement strategy for CSP||B Science of Computer Programming, 76 (10). 837 - 860. ISSN 0167-6423

Schneider, S and Treharne, H (2002) Communicating B Machines. Lecture Notes in Computer Science, 2272. 416 - 435.

Schneider, S and Treharne, H (2004) Verifying Controlled Components. In: 4th International Conference on Integrated Formal Methods, 2004 - ?.

Schneider, S, Treharne, H and Evans, N (2005) Chunks: Component verification in CSP||B In: 5th International Conference on Integrated Formal Methods, 2005-11-29 - 2005-12-02, Eindhoven, Netherlands.

Schneider, S, Treharne, H, McEwan, A and Ifill, W (2008) Experiments in Translating CSP||B to Handel-C In: Communicating Process Architectures 2008 - WoTUG-31, 2008-09-07 - 2008-09-10, York, UK.

Schneider, S, Treharne, H and Wehrheim, H (2011) A CSP Account of Event-B Refinement In: Refine 2011, 2011-06-20 - 2011-06-20, Limerick, Ireland.

Schneider, SA (2011) Security Analysis using Rank Functions in CSP In: Formal Models and Techniques for Analyzing Security Protocols. Cryptology and Information Security (10). IOS Press. ISBN 978-1-60750-713-0

Schneider, SA and Delicata, R (2004) Verifying Security Protocols: An Application of CSP. In: Communicating Sequential Processes: The First 25 Years, Symposium on the Occasion of 25 Years of CSP, 2004-07-07 - 2004-07-08, London.

Schneider, SA and Heather, JA A Formal Framework for Modelling Coercion Resistance and Receipt Freeness In: FM 2012: 18th International Symposium on Formal Methods, 2012-08-27 - 2012-08-31.

Schneider, SA, Hoang, TS, Robinson, K and Treharne, H (2005) Tank Monitoring: A pAMN Case Study. Electronic Notes in Theoretical Computer Science, 2 (137). 183 - 204.

Schneider, SA, Srinivasan, S, Culnane, C, Heather, JA and Xia, Z (2012) Prêt à Voter with Write-Ins In: VoteID 2011: Third International Conference, 2011-09-28 - 2011-09-29, Tallinn, Estonia.

Schneider, SA, Treharne, H and Vajar, B Introducing mobility into CSP||B In: 7th International Workshop on Automated Verification of Critical Systems, 2007-09-10 - 2007-09-12, Oxford, UK.

Schneider, SA, Treharne, H and Wehrheim, H (2011) A CSP Account of Event-B Refinement In: REFINE 2011, 2011-06-20 - 2011-06-20, Limerick.

Schneider, SA, Treharne, HE and Wehrheim, H (2014) The Behavioural Semantics of Event-B Re finement Formal Aspects of Computing: applicable formal methods, 26. 251 - 280.

Schneider, SA, Treharne, HE and Wehrheim, H (2012) The Behavioural Semantics of Event-B Refinement Formal Aspects of Computing: applicable formal methods. ? - ?. ISSN 0934-5043

Schneider, SA, Treharne, HE and Wehrheim, H (2011) Bounded Retransmission in Event-B||CSP: a Case Study Electronic Notes in Theoretical Computer Science, 280. 69 - 80. ISSN 1571-0661

Schneider, SA, Treharne, HE and Wehrheim, H (2010) A CSP approach to Control in Event-B Integrated Formal Methods/Lecture Notes in Computer Science, 6396. 260 - 274.

Schneider, Steve and Delicata, Robert (2005) Verifying Security Protocols: An Application of CSP In: UNSPECIFIED UNSPECIFIED, pp. 243-263.

Schneider, Steve, Hoang, Thai Son, Robinson, Ken and Treharne, Helen (2005) Tank monitoring: a pAMN case study Electronic Notes in Theoretical Computer Science, 137 (2). pp. 183-204. ISSN 15710661

Schneider, Steve, Treharne, Helen and Wehrheim, Heike (2011) Stepwise Refinement in Event-B CSP. Part 1: Safety Technical Report. Department of Computing, University of Surrey. (Unpublished)

Schneider, Steve A (2002) Verifying authentication protocol implementations

Schneider, Steve A. (1998) Formal analysis of a non-repudiation protocol Proceedings of the 11th IEEE Computer Security Foundations Workshop. pp. 9-11.

Schneider, Steve A. (1996) Security properties and CSP Proceedings of the 1996 IEEE Symposium on Security and Privacy. pp. 174-187.

Schneider, Steve A. (1998) Verifying authentication protocols in CSP IEEE Transactions on Software Engineering, 24. pp. 741-758.

Schneider, Steve A. and Treharne, Helen (2004) Verifying controlled components

Schneider, Steve A., Treharne, Helen and Wehrheim, Heike (2011) Bounded Retransmission in Event-B||CSP: A Case Study Department of Computing, University of Surrey. (Unpublished)

Schramm, L, Jin, Y and Sendhoff, B (2011) Emerged coupling of motor control and morphological development in evolution of multi-cellular animats In: 10th European Conference, ECAL 2009, 2009-09-13 - 2009-09-16, Budapest, Hungary.

Schramm, L, Jin, Y and Sendhoff, B (2011) Redundancy creates opportunity in developmental representations

Schramm, L, Valente Martins, V, Jin, Y and Sendhoff, B (2010) Analysis of gene regulatory network motifs in evolutionary development of multi-cellular organisms In: Artificial Life XII, 2010-08-19 - 2010-08-23, Odense, Denmark.

Shaikh, SA, Bush, VJ and Schneider, SA (2009) Specifying authentication using signal events in CSP Computers and Security, 28 (5). 310 - 324. ISSN 0167-4048

Sharp, James and Treharne, Helen (2011) CASE Technical Report: Automated Transformations from VHDL to CSP Technical Report. Department of Computing, University of Surrey. (Unpublished)

Shields, MW and Casey, MC (2008) A theoretical framework for multiple neural network systems NEUROCOMPUTING, 71 (7-9). 1462 - 1476. ISSN 0925-2312

Shields, Mike W and Casey, Matthew C (2008) A Theoretical Framework for Multiple Neural Network Systems Neurocomputing, 71 (7-9). pp. 1462-1476. ISSN 09252312

Sporea, I and Grüning, A (2012) Classification of Distorted Patterns by Feed-forward Spiking Neural Networks In: International Conference on Articifial Neural Networks 2012, 2012-09-11 - 2012-09-14, Lausanne, Switzerland.

Sporea, I and Grüning, A (2010) Modelling the McGurk Effect In: 18th European Symposium on Artificial Neural Networks (ESANN 2010), 2010-04-28 - ?, Bruges, Belgium.

Sporea, I and Grüning, A (2011) Reference time in SpikeProp Proceedings of the International Joint Conference on Neural Networks. 1090 - 1092. ISSN 2161-4393

Sporea, I and Grüning, A (2010) A distributed model of memory for the McGurk effect In: International Joint Conference on Neural Networks, 2010-07-18 - ?, Barcelona.

Spyrou, L, Jing, M, Sanei, S and Sumich, A (2007) Separation and localisation of P300 sources and their subcomponents using constrained blind source separation EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING. ? - ?. ISSN 1687-6180

Steiner, T, Jin, Y and Sendhoff, B (2010) Evolving heterochrony for cellular differentiation using vector field embryogeny In: Genetic and Evolutionary Computation Conference, 2010-07-07 - 2010-07-11, Portland.

Steiner, T, Jin, Y and Sendhoff, B (2009) Vector field embryogeny PLoS ONE, 4 (12). 1 - 16. ISSN 1932-6203

Steiner, T, Jin, Y and Sendhoff, B (2008) A cellular model for the evolutionary development of lightweight material with an inner structure In: 10th Annual Conference on Genetic and Evolutionary Computation 2008, 2008-07-12 - ?, Atlanta, GA.

Steiner, T, Schramm, L, Jin, Y and Sendhoff, B (2007) Emergence of feedback in artificial gene regulatory networks.

Subramaniam, SR, Georgakis, A, Ling, BWK, Goh, J, Tang, HL, Peto, T and Saleh, G (2012) Optimal and simultaneous designs of Hermitian transforms and masks for reducing intraclass separations of feature vectors for anomaly detection of diabetic retinopathy images Proceedings of the 2012 8th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2012.

Tam, Siu-Chung, Neo, Wah-Peng, Chua, Hock-Chuan, Ho, Anthony T. S. and Lee, Sing (1998) A novel technique for measuring the pulsewidth of nanosecond laser pulses IEEE Transactions on Instrumentation and Measurement, 47 (4). pp. 997-1000. ISSN 00189456

Tam, Siu-Chung, Tan, Siong-Chai, Neo, Wah-Peng, Foong, Sze-Chern, Chan, Choon-Hao, Ho, Anthony T. S., Chua, Hock-Chuan and Lee, Sing (2001) Fuzzy logic control of a nitrogen laser Optical Engineering, 40 (2). pp. 237-244. ISSN 00913286

Tang, HL, Alghamdi, HS and Alshomrani, S (2012) Hybrid ACO and TOFA feature selection approach for text classification 2012 IEEE Congress on Evolutionary Computation, CEC 2012.

Tang, HL, Goh, J, Hu, Y, Wang, S, Peto, T, Saleh, GM, Ling, BW-K and Al turk, LI (2013) The Reading of Components of Diabetic Retinopathy: An Evolutionary Approach for Filtering Normal Digital Fundus Imaging in Screening and Population Based Studies PLoS ONE, 8 (7). ISSN 1932-6203

Tang, HL, Goh, J, Peto, T, Ling, BW, Al Turk, LI, Hu, Y, Wang, S and Saleh, GM (2013) The reading of components of diabetic retinopathy: an evolutionary approach for filtering normal digital fundus imaging in screening and population based studies. PLoS One, 8 (7). e66730 - ?.

Taskaya-Tamizel, T and Casey, Matthew C (2005) A comparative study of autoregressive neural network hybrids Neural Networks, 18 (5-6). pp. 781-789. ISSN 08936080

Taskaya-Temizel, T and Casey, MC (2005) A comparative study of autoregressive neural network hybrids NEURAL NETWORKS, 18 (5-6). 781 - 789. ISSN 0893-6080

Taskaya-Temizel, T, Casey, MC and Ahmad, K (2005) Pre-processing inputs for optimally-configured time-delay neural networks Electronics Letters, 41 (4). 198 - 200. ISSN 0013-5194

Taskaya-Temizel, T, Casey, MC, Singh, S, Singh, M, Apte, C and Perner, P (2005) Configuration of neural networks for the analysis of seasonal time series In: 3rd International Conference on Advances in Pattern Recognition, 2005-08-22 - 2005-08-25, Bath, ENGLAND.

Tomadaki, Eleftheria and Salway, Andrew (2005) Matching Verb Attributes for Cross-Document Event Co-reference Procs. Interdisciplinary Workshop on the Identification and Representation of Verb Features and Verb Classes. pp. 127-132.

Treharne, H, Draper, J and Schneider, S (1998) Test Case Preparation Using a Prototype. In: B’98: Recent Advances in the Development and Use of the B Method, 1998 - ?.

Treharne, H and Schneider, S (2000) How to Drive a B Machine. In: ZB 2000: Formal Specification and Development in Z and B, First International Conference of B and Z Users, 2000-08-29 - 2000-09-02, York, UK.

Treharne, H, Schneider, S and Bramble, M (2003) Composing Specifications Using Communication. Lecture Notes in Computer Science, 2651. 58 - 78.

Treharne, Helen, Draper, J. and Schneider, Steve A. (1998) Test case preparation using a prototype

Tsalaile, T, Naqvi, SM, Nazarpour, K, Sanei, S and Chambers, JA (2008) Blind source extraction of heart sound signals from lung sound recordings exploiting periodicity of the heart sound In: 33rd IEEE International Conference on Acoustics, Speech and Signal Processing, 2008-03-30 - 2008-04-04, Las Vegas, NV.

Turner, E, Treharne, H, Schneider, S and Evans, N (2008) Automatic generation of CSP||B skeletons from xUML models In: 5th International Colloquium on Theoretical Aspects of Computing (ICTAC 2008), 2008-09-01 - 2008-09-03, Sabanci Univ, Istanbul, TURKEY.

Vajar, B, Schneider, S and Treharne, H Mobile CSP||B In: 9th International Workshop on Automated Verification of Critical Systems, 2009-09-23 - 2009-09-25.

Vassiliou, Andrew, Salway, Andrew and Pitt, David (2004) Formalising Stories: sequences of events and state changes 2004 IEEE International Conference on Multimedia and Expo (ICME).

Vrusias, B, Newbold, N, Makris, D, Renno, J-P, Jones, G and Ahmad, K (2007) A framework for ontology enriched semantic annotation of CCTV video 8th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2007.

Vrusias, B, Newbold, N, Makris, D, Renno, J-P, Jones, G and Ahmad, K (2007) A framework for ontology enriched semantic annotation of CCTV video 8th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2007.

Vrusias, BL and Golledge, I (2009) Online Self-Organised Map Classifiers as Text Filters for Spam Email Detection Journal of Information Assurance and Security (JIAS), 4 (2). 151 - 160. ISSN 1554-1010

Vrusias, BL, Qin, G and Gillam, L (2010) Background Filtering for Improving of Object Detection in Images In: 20th IEEE International Conference on Pattern Recognition (ICPR), 2010-08-23 - 2010-08-27, Istanbul, Turkey.

Vrusias, BL, Vomvoridis, L and Gillam, L (2007) Distributing SOM ensemble training using grid middleware IEEE International Joint Conference on Neural Networks (IJCNN 2007). 2712 - 2717. ISSN 1098-7576

Wahab, AWA, Briffa, JA and Schaathun, HG On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography In: Digital Watermarking7th International Workshop, IWDW 2008, 2008-11-10 - 2008-11-12, Busan, Korea.

Wahab, AWA, Ho, ATS and Li, S (2012) Inter-Camera Model Image Source Identification with Conditional Probability Features In: IIEEJ 3rd Image Electronics and Visual Computing Workshop (IEVC 2012), 2012-11-21 - 2012-11-24, Kuching, Malyasia.

Wei, K and Heather, J (2005) Embedding the stable failures model of CSP in PVS Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3771 L. 246 - 265. ISSN 0302-9743

Wei, K and Heather, J (2007) A theorem-proving approach to verification of fair non-repudiation protocols Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4691 L. 202 - 219.

Williams, DM, Treharne, H, Ho, ATS and Culnane, C (2008) Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol In: ACM Multimedia and Security Workshop, 2008-09-22 - 2008-09-23, Oxford Univ Comp Lab, Oxford, ENGLAND.

Williams, DM, Treharnea, H and Ho, ATS (2010) On the importance of one-time key pairs in buyer-seller watermarking protocols In: SECRYPT 2010, 2010-07-26 - 2010-07-28, Athens, Greece.

Willmes, L, Bäck, T, Jin, Y and Sendhoff, B (2003) Comparing neural networks and Kriging for fitness approximation in evolutionary optimization.

Wong, K-W, Man, K-P, Li, SJ and Liao, XF (2005) A More Secure Chaotic Cryptographic Scheme based on The Dynamic Look-up Table Circuits, Systems and Signal Processing, 24 (5). 571 - 584. ISSN 0278-081X

Woon, Wee Meng, Ho, Anthony T. S., Yu, Tao, Tam, Siu Chung, Tan, Siong Chai and Yap, Lian Teck (2000) Achieving high data compression of self-similar satellite imagesusing fractal In: IGARSS 2000. IEEE 2000 International Geoscience and Remote Sensing Symposium. Taking the Pulse of the Planet: The Role of Remote Sensing in Managing the Environment. Proceedings (Cat. No.00CH37120).

Xia, Yan and Ho, Anthony T. S. (2000) 3D vector topology model in the Visualization System In: IGARSS 2000. IEEE 2000 International Geoscience and Remote Sensing Symposium. Taking the Pulse of the Planet: The Role of Remote Sensing in Managing the Environment. Proceedings (Cat. No.00CH37120).

Xia, Yan, Ho, Anthony T. S. and Ji, YanWen (2001) A novel wavelet stereo matching method to improve DEM accuracygenerated from SPOT stereo image pairs In: IGARSS 2001. Scanning the Present and Resolving the Future. Proceedings. IEEE 2001 International Geoscience and Remote Sensing Symposium (Cat. No.01CH37217).

Xia, Yan, Ho, Anthony T. S. and Zhang, YuCheng (2000) CIMO - Component Integration MOdel In: Proceedings Seventh Asia-Pacific Software Engeering Conference. APSEC 2000.

Xia, Z, Culnane, C, Heather, J, Jonker, H, Ryan, P, Schneider, S and Srinivasan, S Versatile Pret a Voter: Handling multiple election methods with a unified interface In: IndoCrypt 2010, 2010-12-12 - 2010-12-15, Hyderabad, India.

Xia, Z, Culnane, C, Heather, JA, Jonker, H, Ryan, PYA, Schneider, SA and Srinivasan, S (2010) Versatile Pret a Voter: Handling Multiple Election Methods with a Unified Interface In: Indocrypt, 2010-12-12 - 2010-12-15, Hyderabad, India.

Xia, Z and Schneider, S A New Receipt-Free E-Voting Scheme Based on Blind Signature In: WOTE: Workshop on Trustworthy Elections, 2006-06-29 - 2006-06-30, Cambridge, UK.

Xia, Z, Schneider, SA, Heather, J, Ryan, PYA, Lundin, D and Howard, P (2007) Pret a Voter: All-in-one In: WOTE: Workshop on Trustworthy Elections, 2007-06-20 - 2007-06-22, Ottawa, Canada.

Xia, Z, Schneider, SA, Heather, J and Traoré, J (2008) Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. In: USENIX/ACCURATE Electronic Voting Workshop, 2008-07-28 - 2008-07-29, San Jose, USA.

Xia, Z, Schneider, SA, Heather, JA, Ryan, PYA, Lundin, D, Peel, RMA and Howard, PJ (2007) Prêt à Voter: All-in-one In: IAVoSS Workshop On Trustworthy Elections (WOTE 2007), 2007-06-20 - 2007-06-21, Ottawa, Canada.

Xia, Z, Schneider, SA, Heather, JA and Traoré, J (2008) Analysis, improvement and simplification of the Prêt à Voter with Paillier encryption

Yeung, WL and Schneider, SA (2003) Design and verification of distributed recovery blocks with CSP FORM METHOD SYST DES, 22 (3). 225 - 248. ISSN 0925-9856

Yeung, WL and Schneider, SA (2005) Formal verification of fault-tolerant software design: the CSP approach MICROPROCESSORS AND MICROSYSTEMS, 29 (5). 197 - 209. ISSN 0141-9331

Yeung, WL and Schneider, SA (2005) Formal verification of fault-tolerant software design: the CSP approach MICROPROCESS MICROSY, 29 (5). 197 - 209. ISSN 0141-9331

Yu, Tao, Ho, Anthony Tung-Shuen and Tam, Siu-Chung (1999) A novel hybrid bi-orthogonal wavelets/ADPCM algorithm for very lowbit rate satellite image compression In: IEEE 1999 International Geoscience and Remote Sensing Symposium. IGARSS'99 (Cat. No.99CH36293).

Yu, X, Jin, Y, Tang, K and Yao, X (2010) Robust optimization over time -- A new perspective on dynamic optimization problems In: Congress on Evolutionary Computation, 2010-07-18 - ?, Barcelona.

Yusoff, N and Grüning, A (2012) Learning Anticipation through Priming in Spatio-Temporal Neural Networks

Yusoff, N and Grüning, A (2010) Supervised Associative Learning in Spiking Neural Network In: Artificial Neural Networks – ICANN 2010, 2010-09-15 - 2010-09-18, Thessaloniki, Greece.

Yusoff, N and Grüning, A (2010) Supervised Associative Learning in Spiking Neural Network In: Artificial Neural Networks – ICANN 2010, 2010-09-15 - 2010-09-18, Thessaloniki, Greece.

Yusoff, N, Grüning, A and Browne, A (2009) Modelling the Stroop Effect: Dynamics in Inhibition of Automatic Stimuli Processing In: Second International Conference in Cognitive Neurodynamics (ICCN 2009), 2009-11-15 - ?, Hangzhou, China.

Yusoff, N, Grüning, A and Notley, S (2012) Pair-associate Learning with Modulated Spike-Time Dependent Plasticity In: 22nd International Conference on Artificial Neural Networks, 2012-09-11 - 2012-09-14, Lausanne, Switzerland.

Zhang, Jing and Ho, Anthony T. S. (2005) Robust digital image-in-video watermarking for the emerging H.264/AVC standard In: IEEE Workshop on Signal Processing Systems Design and Implementation, 2005..

Zhang, Fan, Povey, David and Krause, Paul J. (2007) Protein Attributes Microtuning System (PAMS): an effective tool to increase protein structure prediction by data purification In: 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference.

Zhang, J, Ho, ATS, Qiu, G and Marziliano, P (2007) Robust video watermarking of H.264/AVC IEEE Transactions on Circuits and Systems II: Express Briefs, 54 (2). 205 - 209. ISSN 1057-7130

Zhang, Jing and Ho, Anthony T. S. (2005) Efficient RobustWatermarking of Compressed 2-D Grayscale Patterns for H.264/AVC In: 2005 IEEE 7th Workshop on Multimedia Signal Processing.

Zhang, Jing and Ho, Anthony T. S. (2006) Efficient Video Authentication for H.264/AVC In: First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

Zhang, Jing and Ho, Anthony T. S. (2003) An efficient digital image-in-image watermarking algorithm using the integer discrete cosine transform (IntDCT) In: Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint.

Zhang, Liyang, Soong, Boon-Hee, Ho, Anthony T. S. and Ong, Jin-Teung (2000) Using RBF algorithm for landcover or clutter classification formobile planning In: VTC2000-Spring. 2000 IEEE 51st Vehicular Technology Conference Proceedings (Cat. No.00CH37026).

Zhao, X, Ho, ATS and Shi, YQ (2009) IMAGE FORENSICS USING GENERALISED BENFORD'S LAW FOR ACCURATE DETECTION OF UNKNOWN JPEG COMPRESSION IN WATERMARKED IMAGES In: 16th International Conference on Digital Signal Processing, 2009-07-05 - 2009-07-07, Santorini, GREECE.

Zhao, X, Ho, ATS, Treharne, H, Pankajakshan, V, Culnane, C, Jiang, W, Liao, BY, Pan, JS, Jain, LC, Liao, M, Noda, H and Ho, ATS (2007) A novel semi-fragile image watermarking, authentication and self-restoration technique using the slant transform In: 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2007-11-26 - 2007-11-28, Kaohsiung, TAIWAN.

Zhao, Xi (2009) Robust and Semi-fragile Watermarking Techniques for Image Content Protection Technical Report. Department of Computing, University of Surrey. (Unpublished)

Zheng, Y, Krause, P and Mei, H (2006) Asynchronous semantics and anti-patterns for interacting web services In: 6th International Conference on Quality Software, 2006-10-27 - 2006-10-28, Beijing, PEOPLES R CHINA.

Zheng, Y, Meng, Y and Jin, Y (2010) Fusing bottom-up and top-down pathways in neural networks for visual object recognition In: 2010 International Joint Conference on Neural Networks (IJCNN), 2010-07-18 - 2010-07-23, Barcelona.

Zheng, Y, Meng, Y and Jin, Y (2011) Object recognition using a bio-inspired neuron model with bottom-up and top-down pathways Neurocomputing, 74 (17). 3158 - 3169. ISSN 0925-2312

Zheng, Y, Zhou, J, Krause, P and Latifi, S (2007) A model checking based test case generation framework for web services In: 4th International Conference on Information Technology - New Generations, 2007-04-02 - 2007-04-04, Las Vegas, NV.

Zheng, Y, Zhou, J, Krause, P, Muller, P, Liggesmeyer, P and Maehle, E (2007) Analysis of BPEL data dependencies In: 33rd EUROMICRO Conference on Software Engineering and Advanced Applications, 2007-08-27 - 2007-08-31, Lubeck, GERMANY.

Zheng, Yongyan and Krause, Paul J. (2007) Automata Semantics and Analysis of BPEL In: 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference.

Zheng, Yongyan, Zhou, Jiong and Krause, Paul (2007) An Automatic Test Case Generation Framework for Web Services Journal of Software (JSW), 2. pp. 64-77.

Zhou, A, Jin, Y, Zhang, Q, Sendhoff, B and Tsang, EPK (2006) Prediction-Based Population Re-initialization for Evolutionary Dynamic Multi-objective Optimization.

Zhou, A, Zhang, Q and Jin, Y (2009) Approximating the set of pareto-optimal solutions in both the decision and objective spaces by an estimation of distribution algorithm IEEE Transactions on Evolutionary Computation, 13 (5). 1167 - 1189. ISSN 1089-778X

Zhou, A, Zhang, Q, Jin, Y and Sendhoff, B (2007) Adaptive modelling strategy for continuous multi-objective optimization

Zhou, A, Zhang, Q, Jin, Y, Sendhoff, B, Tsang, E, Runarsson, TP, Beyer, HG, Burke, E, MereloGuervos, JJ, Whitley, LD and Yao, X (2006) Modelling the population distribution in multi-objective optimization by generative topographic mapping In: 9th International Conference on Parallel Problem Solving from Nature (PPSN IX), 2006-09-09 - 2006-09-13, Univ Iceland, Reykjavik, ICELAND.

Zhou, A, Zhang, Q, Jin, Y, Sendhoff, B and Tsang, EPK (2007) Global multiobjective optimization via estimation of distribution algorithm with biased initialization and crossover.

Zhou, A, Zhang, Q, Jin, Y, Tsang, E and Okabe, T (2005) A model-based evolutionary algorithm for Bi-objective optimization In: IEEE Congress on Evolutionary Computation, CEC 2005, 2005-09-02 - 2005-09-05, Edinburgh, UK.

Zhu, KF, Li, SJ and Saupe, D (2012) An objective method of measuring texture preservation for camcorder performance evaluation In: IS&T/SPIE Electronic Imaging 2012, 2012-01-22 - 2012-01-26, Burlingame, CA, USA.

Zhu, X, Ho, ATS and Marziliano, P (2006) Image authentication and restoration using irregular sampling for traffic enforcement applications In: 1st International Conference on Innovative Computing, Information and Control (ICICIC 2006), 2006-08-30 - 2006-09-01, Beijing, PEOPLES R CHINA.

Zhu, Xunzhan and Ho, Anthony T. S. (2003) A slant transform watermarking for copyright protection of satellite images In: Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint.

Álvarez, G and Li, SJ (2004) Breaking network security based on synchronized chaos Computer Communications, 27 (16). 1679 - 1681. ISSN 0140-3664

Álvarez, G, Li, SJ, Montoya, F, Pastor, G and Romera, M (2005) Breaking projective chaos synchronization secure communication using filtering and generalized synchronization Chaos Solitons and Fractals, 24 (3). 775 - 783. ISSN 0960-0779

This list was generated on Mon Jul 28 19:30:56 2014 IST.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800