University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Academic/Research unit is "Faculty of Engineering and Physical Sciences > Computer Science"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Item Type | No Grouping
Jump to: A | C | D | E | G | H | J | K | L | M | O | P | S | T | V | W | Y | Z | Á
Number of items: 56.


Alvarez, G, Hernández, L, Muñoz, J, Montoya, F and Li, SJ (2005) Security analysis of communication system based on the synchronization of different order chaotic systems Physics Letters. Section A: General, Atomic and Solid State Physics, 345 (4-6). pp. 245-250.


Chaum, D, Ryan, PYA and Schneider, SA (2005) A Practical Voter-Verifiable Election Scheme. In: European Symposium on Research in Computer Security, 2005-09-12 - 2005-09-14, Milan, Italy.


Delicata, Rob and Schneider, Steve A. (2005) Temporal rank functions for forward secrecy In: 18th IEEE Workshop on Computer Security Foundations, 2005, 20-22 Jun 2005, Aix-en-Provence, France.


Ellis, L and Bowden, R (2005) A generalised exemplar approach to modelling perception action couplings In: Tenth IEEE International Conference on Computer Vision Workshops (ICCVW'05), 2005-10-17 - 2005-10-20, Beijing, China.


Granger, R., Page, D. and Stam, M. (2005) Hardware and Software Normal Basis Arithmetic for Pairing-Based Cryptography in Characteristic Three IEEE Transactions on Computers, 54 (7). pp. 852-860.

Granger, Robert and Vercauteren, F. (2005) On the Discrete Logarithm Problem on Algebraic Tori In: The 25th Annual International Cryptology Conference - Advances in Cryptology (CRYPTO 2005), 14-18 Aug 2005, Santa Barbara, California, USA.

Gräning, L, Jin, Y and Sendhoff, B (2005) Efficient evolutionary optimization using individual-based evolution control and neural networks: A comparative study.

Grüning, A (2005) Back-propagation as reinforcement in prediction tasks In: ICANN 2005 15th International Conference, 2005-09-11 - 2005-09-15, Warsaw, Poland.

Grüning, A and Kibrik, AA (2005) Modeling Referential Choice in Discourse: A Cognitive Calculative Approach and a Neural Network Approach In: Anaphora Processing: Linguistic, Cognitive and Computational Modelling. John Benjamins, pp. 163-198. ISBN 90 272 4777 3


Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function Journal of Computer Security, 13 (2). pp. 317-344.

Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function. Journal of Computer Security, 13 (2). pp. 317-344.

Heather, J. and Clark, J. (2005) Family Secrets Formal Aspects in Security and Trust. pp. 99-114.

Hippisley, Andrew, Cheng, David and Ahmad, Khurshid (2005) The head-modifier principle and multilingual term extraction Natural Language Engineering, 11. pp. 129-157.

Ho, Anthony T. S., Tham, W. H. and Low, K. S. (2005) Improving classification accuracy in through-wall radar imaging using hybrid prony's and singular value decomposition method

Ho, Anthony T. S., Tham, W. H. and Low, K. S. (2005) Through-wall radar image reconstruction based on time-domain transient signals in the presence of noise

Ho, Anthony T. S., Zhu, Xunzhan and Woon, W. M. (2005) A semi-fragile pinned sine transform watermarking system for content authentication of satellite images In: Proceedings. 2005 IEEE International Geoscience and Remote Sensing Symposium, 2005. IGARSS '05..

Huesken, M, Jin, Y and Sendhoff, B (2005) Structure optimization of neural networks for evolutionary design optimization Soft Computing, 12 (1). pp. 21-28.


Jin, Y (2005) A comprehensive survey of fitness approximation in evolutionary computation Soft Computing, 9 (1). pp. 3-12.


Khare, VR, Yao, X, Sendhoff, B, Jin, Y and Wersing, H (2005) Co-evolutionary modular neural networks for automatic problem decomposition


Li, CQ, Li, SJ, Chen, GR, Chen, G and Hu, L (2005) Cryptanalysis of a new signal security system for multimedia data transmission EURASIP Journal on Applied Signal Processing, 8, 962703. pp. 1277-1288.

Li, CQ, Li, SJ, Zhang, D and Chen, GR (2005) Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher In: 2nd International Symposium on Neural Networks (ISNN 2005), 2005-05-30 - 2005-06-01, Chongqing, China.

Li, S (2005) Evaluating Determinants of Two Classes of Special Matrices .

Li, SJ (2005) Null Polynomials modulo m .

Li, SJ (2005) Permutation Polynomials modulo m .

Li, SJ (2005) When Chaos Meets Computers .

Li, SJ, Chen, G and Mou, XQ (2005) On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps International Journal of Bifurcation and Chaos, 15 (10). pp. 3119-3151.

Li, SJ and Shum, HY (2005) Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI . (Unpublished)

Li, SJ, Álvarez, G, Chen, GR and Mou, XQ (2005) Breaking a chaos-noise-based secure communication scheme Chaos, 15 (1), 013703.


Micilotta, A, Ong, E and Bowden, R (2005) Real-time Upper Body 3D Reconstruction from a Single Uncalibrated Camera In: EUROGRAPHICS 2005: The European Association for Computer Graphics 26th Annual Conference, 2005-08-29 - 2005-09-02, Trinity College Dublin, Ireland.

Mitchell, Bill (2005) Resolving race conditions in asynchronous partial order scenarios IEEE Transactions on Software Engineering, 31 (9). pp. 767-784.


Okabe, T, Jin, Y and Sendhoff, B (2005) Theoretical comparisons of search dynamics of genetic algorithms and evolution strategies.

Okabe, T, Jin, Y and Sendhoff, B (2005) A new approach to dynamics analysis of genetic algorithms without selection


Puhan, Niladri D. and Ho, Anthony T. S. (2005) Binary document image watermarking for secure authentication using perceptual modeling In: Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..


Salway, Andrew and Martinec, Radan (2005) Some ideas for modelling image-text combinations

Salway, Andrew, Vassiliou, Andrew and Ahmad, Khurshid (2005) What Happens in Films? IEEE International Conference on Multimedia and Expo (ICME), 2005. pp. 49-52.

Salway, Andrew and Xu, Yan (2005) Navigating stories in films Project Report.

Schaathun, Hans (2005) The second support weight distribution of the Kasami codes IEEE Transactions on Information Theory, 51 (8).

Schaathun, Hans Georg and Fernandez, Marcel (2005) Boneh-Shaw Fingerprinting and Soft Decision Decoding In: IEEE Information Theory Workshop, 2005..

Schneider, S and Treharne, H (2005) CSP theorems for communicating B machines FORMAL ASPECTS OF COMPUTING, 17 (4). pp. 390-422.

Schneider, S, Treharne, H and Evans, N (2005) Chunks: Component verification in CSP||B In: 5th International Conference on Integrated Formal Methods, 2005-11-29 - 2005-12-02, Eindhoven, Netherlands.

Schneider, SA, Hoang, TS, Robinson, K and Treharne, H (2005) Tank Monitoring: A pAMN Case Study. Electronic Notes in Theoretical Computer Science, 2 (137). pp. 183-204.

Schneider, Steve and Delicata, Robert (2005) Verifying Security Protocols: An Application of CSP In: UNSPECIFIED UNSPECIFIED, pp. 243-263.

Schneider, Steve, Hoang, Thai Son, Robinson, Ken and Treharne, Helen (2005) Tank monitoring: a pAMN case study Electronic Notes in Theoretical Computer Science, 137 (2). pp. 183-204.


Taskaya-Tamizel, T and Casey, Matthew C (2005) A comparative study of autoregressive neural network hybrids Neural Networks, 18 (5-6). pp. 781-789.

Taskaya-Temizel, T, Casey, MC and Ahmad, K (2005) Pre-processing inputs for optimally-configured time-delay neural networks Electronics Letters, 41 (4). pp. 198-200.

Taskaya-Temizel, T, Casey, MC, Singh, S, Singh, M, Apte, C and Perner, P (2005) Configuration of neural networks for the analysis of seasonal time series In: 3rd International Conference on Advances in Pattern Recognition, 2005-08-22 - 2005-08-25, Bath, ENGLAND.

Tomadaki, Eleftheria and Salway, Andrew (2005) Matching Verb Attributes for Cross-Document Event Co-reference Procs. Interdisciplinary Workshop on the Identification and Representation of Verb Features and Verb Classes. pp. 127-132.


van Dijk, Marten, Granger, Robert, Page, Dan, Rubin, Karl, Silverberg, Alice, Stam, Martijn and Woodruff, David (2005) Practical Cryptography in High Dimensional Tori In: the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques - Advances in Cryptology (EUROCRYPT 2005), 22-26 May 2005, Aarhus, Denmark.


Wei, K and Heather, J (2005) Embedding the stable failures model of CSP in PVS Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3771 L. pp. 246-265.

Wong, K-W, Man, K-P, Li, SJ and Liao, XF (2005) A More Secure Chaotic Cryptographic Scheme based on The Dynamic Look-up Table Circuits, Systems and Signal Processing, 24 (5). pp. 571-584.


Yeung, WL and Schneider, SA (2005) Formal verification of fault-tolerant software design: the CSP approach MICROPROCESS MICROSY, 29 (5). pp. 197-209.

Yeung, WL and Schneider, SA (2005) Formal verification of fault-tolerant software design: the CSP approach MICROPROCESSORS AND MICROSYSTEMS, 29 (5). pp. 197-209.


Zhang, Jing and Ho, Anthony T. S. (2005) Efficient RobustWatermarking of Compressed 2-D Grayscale Patterns for H.264/AVC In: 2005 IEEE 7th Workshop on Multimedia Signal Processing.

Zhang, Jing and Ho, Anthony T. S. (2005) Robust digital image-in-video watermarking for the emerging H.264/AVC standard In: IEEE Workshop on Signal Processing Systems Design and Implementation, 2005..

Zhou, A, Zhang, Q, Jin, Y, Tsang, E and Okabe, T (2005) A model-based evolutionary algorithm for Bi-objective optimization In: IEEE Congress on Evolutionary Computation, CEC 2005, 2005-09-02 - 2005-09-05, Edinburgh, UK.


Álvarez, G, Li, SJ, Montoya, F, Pastor, G and Romera, M (2005) Breaking projective chaos synchronization secure communication using filtering and generalized synchronization Chaos Solitons and Fractals, 24 (3). pp. 775-783.

This list was generated on Tue Mar 2 17:16:10 2021 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800