University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Academic/Research unit is "Faculty of Engineering and Physical Sciences > Computer Science"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Item Type | No Grouping
Jump to: A | B | C | D | F | G | H | I | J | L | P | R | S | V | W | X | Z
Number of items: 40.

A

Alvarez, G, Li, SJ and Hernandez, L (2007) Analysis of security problems in a medical image encryption system Computers in Biology and Medicine, 37 (3). pp. 424-427.

Athanasiou, M, Clark, JY, Kokol, P, Podgorelec, V, MiceticTurk, D, Zorman, M and Verlic, M (2007) A Bayesian network model for the diagnosis of the caring procedure for wheelchair users with spinal injury Twentieth IEEE International Symposium on Computer-Based Medical Systems, Proceedings. pp. 433-438.

B

Bresson, E and Manulis, M (2007) Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust In: 4th International Conference, ATC 2007, 2007-07-11 - 2007-07-13, Hong Kong, China.

Bresson, E, Manulis, M and Schwenk, JO (2007) On Security Models and Compilers for Group Key Exchange Protocols In: Advances in Information and Computer Security, 2nd Intl. Workshop on Security, 2007-10-29 - 2007-10-31, Nara, Japan.

C

Cichocki, A and Sanei, S (2007) EEG/MEG signal processing. Comput Intell Neurosci.

D

Delicata, R and Schneider, S (2007) An algebraic approach to the verification of a class of Diffie-Hellman protocols INT J INF SECUR, 6 (2-3). pp. 183-196.

F

Fenton, Norman, Neil, Martin, Marsh, William, Hearty, Peter, Radlinski, Lukasz and Krause, Paul (2007) Project Data Incorporating Qualitative Facts for Improved Software Defect Prediction In: Third International Workshop on Predictor Models in Software Engineering (PROMISE'07: ICSE Workshops 2007).

Foulle, S, Schneider, S, Traoré, J and Xia, Z (2007) Threat analysis of a practical voting scheme with receipts In: First International Conference VOTE-ID 2007, 2007-10-04 - 2007-10-05, Bochum, Germany.

G

Granger, R., Hess, F., Oyono, R., Thériault, N. and Vercauteren, F. (2007) Ate Pairing on Hyperelliptic Curves In: The 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques - Advances in Cryptology (EUROCRYPT 2007), 20-24 May 2007, Barcelona, Spain.

Grüning, A (2007) Elman Backpropagation as Reinforcement for Simple Recurrent Networks Neural Computation, 19 (11). pp. 3108-3131.

H

Ho, ATS, Zhu, X, Tang, LH, Sanei, S, Chambers, JA, McWhirter, J, Hicks, Y and Constantinides, AG (2007) Digital watermarking authentication and restoration for Chinese calligraphy images In: 15th International Conference on Digital Signal Processing, 2007-07-01 - 2007-07-04, Cardiff Univ, Cardiff, WALES.

Ho, Anthony T. S., Zhu, Xunzhan and Tang, Lilian H. (2007) Digital Watermarking Authentication and Restoration for Chinese Calligraphy Images In: 2007 15th International Conference on Digital Signal Processing.

I

Ifill, W, Schneider, S and Treharne, H (2007) Augmenting B with control annotations In: 7th International Conference of B Users, 2007-01-17 - 2007-01-19, Univ Franche Comte, Besancon, FRANCE.

J

Jing, M and Sanei, S (2007) A novel constrained topographic independent component analysis for separation of epileptic seizure signals. Comput Intell Neurosci.

L

Li, CQ, Li, SJ, Alvarez, G, Chen, GR and Lo, KT (2007) Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations Physics Letters. Section A: General, Atomic and Solid State Physics, 369 (1-2). pp. 23-30.

Li, SJ, Chen, G, Cheung, A, Bhargava, B and Lo, K-T (2007) On the design of perceptual MPEG-video encryption algorithms IEEE Transactions on Circuits and Systems for Video Technology, 17 (2). pp. 214-223.

Li, SJ and Lo, K-T (2007) Security problems with improper implementations of improved FEA-M Journal of Systems and Software, 80 (5). pp. 791-794.

Lim, D, Ong, Y-S, Jin, Y and Sendhoff, B (2007) A study on metamodeling techniques, ensembles, and multi-surrogates in evolutionary computation In: GECCO'07 Genetic and Evolutionary Computation Conference, 2007-07-07 - ?, London, UK.

Lim, D, Ong, Y-S, Jin, Y, Sendhoff, B and Lee, B-S (2007) Efficient Hierarchical Parallel Genetic Algorithms using Grid computing Future Generation Computer Systems, 23 (4). pp. 658-670.

Liu, Lu, Antonopoulos, Nick and Makin, Stephen (2007) Social Peer-to-Peer for Resource Discovery In: 15th EUROMICRO International Conference on Parallel, Distributed and Network-Based Processing (PDP'07).

P

Pankajakshan, V and Ho, ATS (2007) Improving video steganalysis using temporal correlation 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS. pp. 287-290.

Pankajakshan, V, Ho, ATS, Liao, BY, Pan, JS, Jain, LC, Liao, M, Noda, H and Ho, ATS (2007) Improving video steganalysis using temporal correlation In: 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2007-11-26 - 2007-11-28, Kaohsiung, TAIWAN.

R

Razavi, AR, Malone, PJ, Moschoyiannis, Sotiris, Jennings, B and Krause, Paul (2007) A distributed transaction and accounting model for digital ecosystem composed services In: IEEE International Conference on Digital Ecosystems and Technologies, 2007-02-21 - 2007-02-23, Cairns, AUSTRALIA.

Razavi, AR, Moschoyiannis, Sotiris and Krause, Paul (2007) A coordination model for distributed transactions in Digital Business EcoSystems Proceedings of the 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, DEST 2007. pp. 159-164.

S

Spyrou, L, Jing, M, Sanei, S and Sumich, A (2007) Separation and localisation of P300 sources and their subcomponents using constrained blind source separation EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, ARTN 8.

Steiner, T, Schramm, L, Jin, Y and Sendhoff, B (2007) Emergence of feedback in artificial gene regulatory networks.

V

Vrusias, B, Newbold, N, Makris, D, Renno, J-P, Jones, G and Ahmad, K (2007) A framework for ontology enriched semantic annotation of CCTV video 8th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2007.

Vrusias, BL, Vomvoridis, L and Gillam, L (2007) Distributing SOM ensemble training using grid middleware IEEE International Joint Conference on Neural Networks (IJCNN 2007). pp. 2712-2717.

W

Wei, K and Heather, J (2007) A theorem-proving approach to verification of fair non-repudiation protocols Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4691 L. pp. 202-219.

X

Xia, Z, Schneider, SA, Heather, J, Ryan, PYA, Lundin, D and Howard, P (2007) Pret a Voter: All-in-one In: WOTE: Workshop on Trustworthy Elections, 2007-06-20 - 2007-06-22, Ottawa, Canada.

Xia, Z, Schneider, SA, Heather, JA, Ryan, PYA, Lundin, D, Peel, RMA and Howard, PJ (2007) Prêt à Voter: All-in-one In: IAVoSS Workshop On Trustworthy Elections (WOTE 2007), 2007-06-20 - 2007-06-21, Ottawa, Canada.

Z

Zhang, Fan, Povey, David and Krause, Paul J. (2007) Protein Attributes Microtuning System (PAMS): an effective tool to increase protein structure prediction by data purification In: 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference.

Zhang, J, Ho, Anthony, Qiu, G and Marziliano, P (2007) Robust video watermarking of H.264/AVC IEEE Transactions on Circuits and Systems II: Express Briefs, 54 (2). pp. 205-209.

Zhao, X, Ho, ATS, Treharne, H, Pankajakshan, V, Culnane, C, Jiang, W, Liao, BY, Pan, JS, Jain, LC, Liao, M, Noda, H and Ho, ATS (2007) A novel semi-fragile image watermarking, authentication and self-restoration technique using the slant transform In: 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2007-11-26 - 2007-11-28, Kaohsiung, TAIWAN.

Zheng, Y, Zhou, J, Krause, P and Latifi, S (2007) A model checking based test case generation framework for web services In: 4th International Conference on Information Technology - New Generations, 2007-04-02 - 2007-04-04, Las Vegas, NV.

Zheng, Y, Zhou, J, Krause, P, Muller, P, Liggesmeyer, P and Maehle, E (2007) Analysis of BPEL data dependencies In: 33rd EUROMICRO Conference on Software Engineering and Advanced Applications, 2007-08-27 - 2007-08-31, Lubeck, GERMANY.

Zheng, Yongyan and Krause, Paul J. (2007) Automata Semantics and Analysis of BPEL In: 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference.

Zheng, Yongyan, Zhou, Jiong and Krause, Paul (2007) An Automatic Test Case Generation Framework for Web Services Journal of Software (JSW), 2. pp. 64-77.

Zhou, A, Zhang, Q, Jin, Y and Sendhoff, B (2007) Adaptive modelling strategy for continuous multi-objective optimization

Zhou, A, Zhang, Q, Jin, Y, Sendhoff, B and Tsang, EPK (2007) Global multiobjective optimization via estimation of distribution algorithm with biased initialization and crossover.

This list was generated on Sat Apr 4 23:13:40 2020 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800