University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Academic/Research unit is "Faculty of Engineering and Physical Sciences > Computer Science"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Item Type | No Grouping
Jump to: A | B | C | G | H | J | L | M | O | S | T | W | Y | Z
Number of items: 29.

A

Ahmad, K, Casey, M, Vrusias, B, Saragiotis, P, Windeatt, T and Roli, F (2003) Combining multiple modes of information using unsupervised neural classifiers In: 4th International Workshop on Multiple Clasifier Systems (MCS 2003), 2003-06-11 - 2003-06-13, UNIV SURREY, GUILDFORD, ENGLAND.

B

Bowden, R, Zisserman, A, Kadir, T and Brady, M (2003) Vision based Interpretation of Natural Sign Languages In: 3rd International Conference on Computer Vision Systems - ICVS 2003, 2003-04-01 - 2003-04-03, Graz, Austria.

Briffa, JA and Das, M (2003) Channel models for high-capacity information hiding in images In: Encryption and Security II, 2002-07-09 - ?, Seattle, WA, USA.

Browne, Antony, Hudson, Brian, Whitley, David, Ford, Martyn, Picton, Phil and Kazemian, Hassan (2003) Knowledge extraction from neural networks Proceedings of the 29th Annual Conference of the IEEE Industrial Electronics Society. pp. 1909-1913.

C

Cohen, Gerard and Schaathun, Hans Georg (2003) New upper bounds on separating codes In: 10th International Conference on Telecommunications, 2003. ICT 2003..

G

Gong, Li, Guttman, Joshua, Ryan, Peter and Schneider, Steve A. (2003) Guest Editorial - Overview the <i>IEEE Journal on Selected Areas in Communications</i>, Issue on Design and Analysis Techniques for Security Assurance, 21. pp. 1-4.

Granger, Robert (2003) Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic In: The 9th IMA International Conference on Cryptography and Coding, 16-18 Dec 2003, Cirencester, UK.

H

Heather, J, Lowe, G and Schneider, S (2003) How to Prevent Type Flaw Attacks on Security Protocols. Journal of Computer Security, 11 (2). pp. 217-244.

Heather, J, Lowe, G and Schneider, S (2003) How to prevent type flaw attacks on security protocols Journal of Computer Security, 11 (2). pp. 217-244.

Heather, J, Lowe, G and Schneider, S (2003) How to prevent type flaw attacks on security protocols Journal of Computer Security, 11 (2). pp. 217-244.

Heather, J. and Hill, D. (2003) I'm not signing that Proceedings of the 1st International Workshop on Formal Aspects in Security and Trust (FAST 2003), Pisa, Italy. pp. 71-81.

Ho, Anthony T. S., Shen, Jun, Chow, Andrew K. K. and Woon, Jerry (2003) Robust digital image-in-image watermarking algorithm using the fast Hadamard transform

Ho, Anthony T. S. and Shu, Feng (2003) A print-and-scan resilient digital watermark for card authentication In: Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint.

J

Jacobs, J. C., van Moll, J. H., Krause, P. J., Kusters, R. J. and Trienekens, J. J. M. (2003) Effects of virtual development on product quality: exploring defect causes In: Eleventh Annual International Workshop on Software Technology and Engineering Practice.

Jin, Y and Sendhoff, B (2003) Extracting interpretable fuzzy rules from RBF networks Neural Processing Letters, 17 (2). pp. 149-164.

Jin, Y and Sendhoff, B (2003) Trade-off between performance and robustness: An evolutionary multiobjective approach

L

Li, SJ, Mou, XQ, Cai, YL, Ji, Z and Zhang, JH (2003) On the security of a chaotic encryption scheme: Problems with computerized chaos in finite computing precision Computer Physics Communications, 153 (1). pp. 52-58.

Li, SJ, Mou, XQ, Ji, Z, Zhang, JH and Cai, YL (2003) Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems Physics Letters. Section A: General, Atomic and Solid State Physics, 307 (1). pp. 22-28.

Li, SJ, Mou, XQ, Yang, BL, Ji, Z and Zhang, JH (2003) Problems with a probabilistic encryption scheme based on chaotic systems International Journal of Bifurcation and Chaos, 13 (10). pp. 3063-3077.

Li, SJ and Shum, HY (2003) Secure Human-Computer Identification against Peeping Attacks (SecHCI): A Survey .

M

Moschoyiannis, Sotiris, Shields, MW, Lilius, J, Balarin, F and Machado, RJ (2003) Component-based design: Towards guided composition In: 3rd International Conference on Application of Concurrency to System Design, 2003-06-18 - 2003-06-20, Guimaraes, PORTUGAL.

O

Okabe, T, Foli, K, Olhofer, M, Jin, Y and Sendhoff, B (2003) Comparative studies on micro heat exchanger optimisation.

S

Salway, Andrew, Graham, Mike, Tomadaki, Eleftheria and Xu, Yan (2003) Linking Video and Text via Representations of Narrative

T

Treharne, H, Schneider, S and Bramble, M (2003) Composing Specifications Using Communication. Lecture Notes in Computer Science, 2651. pp. 58-78.

W

Willmes, L, Bäck, T, Jin, Y and Sendhoff, B (2003) Comparing neural networks and Kriging for fitness approximation in evolutionary optimization.

Y

Yeung, WL and Schneider, SA (2003) Design and verification of distributed recovery blocks with CSP FORM METHOD SYST DES, 22 (3). pp. 225-248.

Yeung, WL and Schneider, SA (2003) Design and verification of distributed recovery blocks with CSP FORMAL METHODS IN SYSTEM DESIGN, 22 (3). pp. 225-248.

Z

Zhang, Jing and Ho, Anthony T. S. (2003) An efficient digital image-in-image watermarking algorithm using the integer discrete cosine transform (IntDCT) In: Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint.

Zhu, Xunzhan and Ho, Anthony T. S. (2003) A slant transform watermarking for copyright protection of satellite images In: Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint.

This list was generated on Fri Apr 10 02:02:41 2020 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800