University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Academic/Research unit is "Faculty of Engineering and Physical Sciences > Computer Science"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Item Type | No Grouping
Jump to: A | B | C | D | G | L | M | R | S | T | Z
Number of items: 37.


Alvarez, G and Li, SJ (2006) Breaking an encryption scheme based on chaotic baker map Physics Letters, Section A: General, Atomic and Solid State Physics, 352 (1-2). pp. 78-82.

Alvarez, G and Li, SJ (2006) Some basic cryptographic requirements for chaos-based cryptosystems International Journal of Bifurcation and Chaos, 16 (8). pp. 2129-2151.


Bowden, R, Gilbert, A and KaewTraKulPong, P (2006) Tracking Objects Across Uncalibrated Arbitary Topology Camera Networks In: Intelligent Distributed Video Surveillance Systems. Institution of Engineering and Technology, Stevenage, United Kingdom, pp. 157-182. ISBN 9780863415043

Bryant, D, Krause, Paul, Moschoyiannis, Sotiris, Fisher, M, VanDerHoek, W, Konev, B and Lisitsa, A (2006) A tool to facilitate agent deliberation. In Proc. of 10th European Conference on Logics in Artificial Intelligence (JELIA'06) In: 10th European Conference on Logics in Artificial Intelligence, 2006-09-13 - 2006-09-15, Liverpool, ENGLAND.


Casey, MC and Ahmad, K (2006) A competitive neural model of small number detection NEURAL NETWORKS, 19 (10). pp. 1475-1489.

Culnane, C, Treharne, H, Ho, ATS, Shi, YQ and Jeon, B (2006) A new multi-set modulation technique for increasing hiding capacity of binary watermark for print and scan processes In: UNSPECIFIED SPRINGER-VERLAG BERLIN, pp. 96-110.


Delicata, R and Schneider, S (2006) A formal approach for reasoning about a class of Diffle-Hellman protocols In: UNSPECIFIED UNSPECIFIED, pp. 34-46.


Granger, R., Page, D. and Stam, M. (2006) On Small Characteristic Algebraic Tori in Pairing-Based Cryptography LMS Journal of Computation and Mathematics, 9. pp. 64-85.

Granger, Robert, Page, D. and Smart, N. P. (2006) High Security Pairing-Based Cryptography Revisited In: the 7th International Algorithmic Number Theory Symposium (ANTS-VII), 23-28 Jul 2006, Berlin, Germany.

Grüning, A (2006) Stack- and Queue-like Dynamics in Recurrent Neural Networks Connection Science, 18, 1. pp. 23-42.

Grüning, A and Treves, A (2006) Distributed neural blackboards could be more attractive Behavioral and Brain Sciences, 29, 1. pp. 79-80.


Latif, MA, Sanei, S, Chambers, J and Shoker, L (2006) Localization of abnormal EEG sources using blind source separation partially constrained by the locations of known sources IEEE SIGNAL PROC LET, 13 (3). pp. 117-120.

Li, CQ, Li, SJ, Lou, D-C and Zhang, D (2006) On the security of the Yen-Guo's domino signal encryption algorithm (DSEA) Journal of Systems and Software, 79 (2). pp. 253-258.

Li, CQ, Li, SJ, Zhang, D and Chen, G (2006) Cryptanalysis of a data security protection scheme for VoIP IEE Proceedings-Vision, Image & Signal Processing, 153 (1). pp. 1-10.

Li, SJ, Chen, G and Álvarez, G (2006) Return-map cryptanalysis revisited International Journal of Bifurcation and Chaos, 16 (5). pp. 1557-1568.

Li, SJ, Li, CQ, Lo, K-T and Chen, G (2006) Cryptanalysis of an image encryption scheme Journal of Electronic Imaging, 15 (4).

Lim, D, Ong, Y-S, Jin, Y, Sendhoff, B and Lee, BS (2006) Inverse multi-objective robust evolutionary design Genetic Programming and Evolvable Machines, 7 (4). pp. 383-404.

Liu, Lu, Mackin, Stephen and Antonopoulos, Nick (2006) Small World Architecture For Peer-to-Peer Networks In: 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.

Lundin, D, Treharne, HE, Ryan, PYA, Schneider, SA and Heather, JA (2006) Distributed Creation of the Ballot Form in Prêt à Voter using an element of Visual Encryption In: IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 2006-06-28 - ?.


Mak, Lee-Onn and Krause, Paul J. (2006) Detection & Management of Concept Drift In: 2006 International Conference on Machine Learning and Cybernetics.

Manulis, M (2006) Democratic Group Signatures - On an Example of Joint Ventures In: 2006 ACM Symposium on Information, computer and communications security, 2006-03-21 - 2006-03-23, Taipei, Taiwan.

McEwan, AA and Schneider, S (2006) A verified development of hardware using CSP||B In: 4th ACM/IEEE International Conference on Formal Methods and Models for Co-Design, 2006-07-27 - 2006-07-30, Napa Valley, CA.

Moschoyiannis, Sotiris, Küster-Filipe, J and Shields, MW (2006) A Formal Approach to Constructing Well-Behaved Systems using Components In: Mathematical frameworks for component software - Models for Analysis and Synthesis. Series on Component-Based Software Development, 2 . World Scientific Pub Co Inc, pp. 321-349. ISBN 981270017X


Ryan, PYA, Schneider, SA, Gollmann, D, Meier, J and Sabelfeld, A (2006) Pret a Voter with Re-encryption Mixes In: 11th European Symposium on Research in Computer Security, 2006-09-18 - 2006-09-20, Hamburg, GERMANY.


Salter, James and Antonopoulos, Nick (2006) CinemaScreen Recommender Agent: Combining Collaborative and Content-Based Filtering IEEE Intelligent Systems, 21 (1). pp. 35-41.

Salter, James and Antonopoulos, Nick (2006) CinemaScreen recommender agent: combining collaborative and content-based filtering IEEE Intelligent Systems, 21 (1). pp. 35-41.

Schaathun, HG (2006) The Boneh-Shaw fingerprinting scheme is better than we thought IEEE Transactions on Information Forensics and Security, 1 (2). pp. 248-255.

Schaathun, HG and Cohen, GD (2006) Nested codes for constrained memory and for dirty paper

Schaathun, Hans Georg (2006) On Watermarking/Fingerprinting for Copyright Protection Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC '06). pp. 50-53.

Schneider, S, Cavalcanti, A, Treharne, H and Woodcock, J (2006) A layered behavioural model of platelets In: 11th IEEE International Conference on Engineering of Complex Computer Systems, 2006-08-15 - 2006-08-17, Stanford, CA.

Schneider, S, Hoang, TS, Robinson, K and Treharne, H (2006) Tank monitoring: a pAMN case study Formal Aspects of Computing, 18 (3). pp. 308-328.


Took, CC, Sanei, S and Chambers, J (2006) A filtering approach to underdetermined blind source separation with application to temporomandibular disorders ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 3.


Zhang, Jing and Ho, Anthony T. S. (2006) Efficient Video Authentication for H.264/AVC In: First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

Zheng, Y, Krause, P and Mei, H (2006) Asynchronous semantics and anti-patterns for interacting web services In: 6th International Conference on Quality Software, 2006-10-27 - 2006-10-28, Beijing, PEOPLES R CHINA.

Zhou, A, Jin, Y, Zhang, Q, Sendhoff, B and Tsang, EPK (2006) Prediction-Based Population Re-initialization for Evolutionary Dynamic Multi-objective Optimization.

Zhou, A, Zhang, Q, Jin, Y, Sendhoff, B, Tsang, E, Runarsson, TP, Beyer, HG, Burke, E, MereloGuervos, JJ, Whitley, LD and Yao, X (2006) Modelling the population distribution in multi-objective optimization by generative topographic mapping In: 9th International Conference on Parallel Problem Solving from Nature (PPSN IX), 2006-09-09 - 2006-09-13, Univ Iceland, Reykjavik, ICELAND.

Zhu, Xinyao, Ho, Anthony and Marziliano, P (2006) Image authentication and restoration using irregular sampling for traffic enforcement applications In: 1st International Conference on Innovative Computing, Information and Control (ICICIC 2006), 2006-08-30 - 2006-09-01, Beijing, PEOPLES R CHINA.

This list was generated on Sun Feb 28 00:10:15 2021 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800