University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Academic/Research unit is "Faculty of Engineering and Physical Sciences > Computer Science"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Item Type | No Grouping
Jump to: A | B | C | G | H | K | L | S
Number of items: 16.

A

Ahmad, K, Casey, M and Bale, T (2002) Connectionist simulation of quantification skills CONNECTION SCIENCE, 14 (3). pp. 165-201.

Ahmad, Khurshid, Vrusias, Bogdan and Tariq, Mariam (2002) Co-operative neural networks and 'integrated' classification Proceedings of the 2002 International Joint Conference on Neural Networks (IJCNN'02) IEEE, 2. pp. 1546-1551.

B

Briffa, JA and Buttigieg, V (2002) Interleaving and Termination in Unpunctured Symmetric Turbo Codes IEE Proc. in Commun., 149 (1), 1. pp. 6-12.

C

Cohen, Gerard, Encheva, S. and Schaathun, Hans (2002) More on (2,2)-separating systems IEEE Transactions on Information Theory, 48 (9).

G

Grüning, A and Kibrik, AA (2002) Referential Choice and Activation Factors: A Neural Network Approach In: DAARC 2002, 2002-09-18 - 2002-09-20, Lisbon, Portugal.

H

Heather, J and Schneider, S (2002) Equal To The Task? In: European Symposium on Research on Computer Security.

Heather, James (2002) Strand spaces and rank functions:more than distant cousins

Ho, Anthony T. S., Shen, Jun, Tan, Soon Hie and Kot, Alex C. (2002) Digital image-in-image watermarking for copyright protection of satellite images using the fast Hadamard transform In: IEEE International Geoscience and Remote Sensing Symposium.

K

KaewTraKulPong, P and Bowden, R (2002) An Improved Adaptive Background Mixture Model for Real-time Tracking with Shadow Detection In: Video-Based Surveillance Systems. Springer US, New York. ISBN 978-1-4613-5301-0

Krause, Paul J., Freimut, Bernd and Suryn, Witold (2002) New directions in measurement for software quality control

L

Li, SJ and Zheng, X (2002) Cryptanalysis of a chaotic image encryption method In: 2002 IEEE International Symposium on Circuits and Systems (ISCAS 2002), 2002-05-26 - 2002-05-29, Scottsdale, Arizona, US.

Li, SJ, Zheng, X, Mou, XQ and Cai, YL (2002) Chaotic encryption scheme for real-time digital video In: IS&T/SPIE 14th Annual Symposium on Electronic Imaging (EI 2002), 2002-01-20 - 2002-01-22, San Jose, CA, USA.

Li, Shujun and Zheng, X (2002) On the security of an image encryption method In: 2002 IEEE International Conference on Image Processing (2002), 2002-09-22 - 2002-09-25, Rochester, NY, USA.

S

Salway, Andrew and Tomadaki, Eleftheria (2002) Temporal Information in Collateral Texts for Indexing Movies

Schneider, S and Treharne, H (2002) Communicating B Machines. Lecture Notes in Computer Science, 2272. pp. 416-435.

Schneider, Steve A (2002) Verifying authentication protocol implementations In: 5th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2002), 20 - 22 March 2002, Enschede, The Netherlands.

This list was generated on Wed Apr 1 11:46:06 2020 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800