University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Academic/Research unit is "Faculty of Engineering and Physical Sciences > Computer Science"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Item Type | No Grouping
Jump to: A | B | C | D | F | G | H | I | J | L | P | R | S | V | W | X | Z
Number of items: 40.


Alvarez, G, Li, SJ and Hernandez, L (2007) Analysis of security problems in a medical image encryption system Computers in Biology and Medicine, 37 (3). pp. 424-427.

Athanasiou, M, Clark, JY, Kokol, P, Podgorelec, V, MiceticTurk, D, Zorman, M and Verlic, M (2007) A Bayesian network model for the diagnosis of the caring procedure for wheelchair users with spinal injury Twentieth IEEE International Symposium on Computer-Based Medical Systems, Proceedings. pp. 433-438.


Bresson, E and Manulis, M (2007) Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust In: 4th International Conference, ATC 2007, 2007-07-11 - 2007-07-13, Hong Kong, China.

Bresson, E, Manulis, M and Schwenk, JO (2007) On Security Models and Compilers for Group Key Exchange Protocols In: Advances in Information and Computer Security, 2nd Intl. Workshop on Security, 2007-10-29 - 2007-10-31, Nara, Japan.


Cichocki, A and Sanei, S (2007) EEG/MEG signal processing. Comput Intell Neurosci.


Delicata, R and Schneider, S (2007) An algebraic approach to the verification of a class of Diffie-Hellman protocols INT J INF SECUR, 6 (2-3). pp. 183-196.


Fenton, Norman, Neil, Martin, Marsh, William, Hearty, Peter, Radlinski, Lukasz and Krause, Paul (2007) Project Data Incorporating Qualitative Facts for Improved Software Defect Prediction In: Third International Workshop on Predictor Models in Software Engineering (PROMISE'07: ICSE Workshops 2007).

Foulle, S, Schneider, S, Traoré, J and Xia, Z (2007) Threat analysis of a practical voting scheme with receipts In: First International Conference VOTE-ID 2007, 2007-10-04 - 2007-10-05, Bochum, Germany.


Granger, R., Hess, F., Oyono, R., Thériault, N. and Vercauteren, F. (2007) Ate Pairing on Hyperelliptic Curves In: The 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques - Advances in Cryptology (EUROCRYPT 2007), 20-24 May 2007, Barcelona, Spain.

Grüning, A (2007) Elman Backpropagation as Reinforcement for Simple Recurrent Networks Neural Computation, 19 (11). pp. 3108-3131.


Ho, ATS, Zhu, X, Tang, LH, Sanei, S, Chambers, JA, McWhirter, J, Hicks, Y and Constantinides, AG (2007) Digital watermarking authentication and restoration for Chinese calligraphy images In: 15th International Conference on Digital Signal Processing, 2007-07-01 - 2007-07-04, Cardiff Univ, Cardiff, WALES.

Ho, Anthony T. S., Zhu, Xunzhan and Tang, Lilian H. (2007) Digital Watermarking Authentication and Restoration for Chinese Calligraphy Images In: 2007 15th International Conference on Digital Signal Processing.


Ifill, W, Schneider, S and Treharne, H (2007) Augmenting B with control annotations In: 7th International Conference of B Users, 2007-01-17 - 2007-01-19, Univ Franche Comte, Besancon, FRANCE.


Jing, M and Sanei, S (2007) A novel constrained topographic independent component analysis for separation of epileptic seizure signals. Comput Intell Neurosci.


Li, CQ, Li, SJ, Alvarez, G, Chen, GR and Lo, KT (2007) Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations Physics Letters. Section A: General, Atomic and Solid State Physics, 369 (1-2). pp. 23-30.

Li, SJ, Chen, G, Cheung, A, Bhargava, B and Lo, K-T (2007) On the design of perceptual MPEG-video encryption algorithms IEEE Transactions on Circuits and Systems for Video Technology, 17 (2). pp. 214-223.

Li, SJ and Lo, K-T (2007) Security problems with improper implementations of improved FEA-M Journal of Systems and Software, 80 (5). pp. 791-794.

Lim, D, Ong, Y-S, Jin, Y and Sendhoff, B (2007) A study on metamodeling techniques, ensembles, and multi-surrogates in evolutionary computation In: GECCO'07 Genetic and Evolutionary Computation Conference, 2007-07-07 - ?, London, UK.

Lim, D, Ong, Y-S, Jin, Y, Sendhoff, B and Lee, B-S (2007) Efficient Hierarchical Parallel Genetic Algorithms using Grid computing Future Generation Computer Systems, 23 (4). pp. 658-670.

Liu, Lu, Antonopoulos, Nick and Makin, Stephen (2007) Social Peer-to-Peer for Resource Discovery In: 15th EUROMICRO International Conference on Parallel, Distributed and Network-Based Processing (PDP'07).


Pankajakshan, V and Ho, ATS (2007) Improving video steganalysis using temporal correlation 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS. pp. 287-290.

Pankajakshan, V, Ho, ATS, Liao, BY, Pan, JS, Jain, LC, Liao, M, Noda, H and Ho, ATS (2007) Improving video steganalysis using temporal correlation In: 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2007-11-26 - 2007-11-28, Kaohsiung, TAIWAN.


Razavi, AR, Malone, PJ, Moschoyiannis, Sotiris, Jennings, B and Krause, Paul (2007) A distributed transaction and accounting model for digital ecosystem composed services In: IEEE International Conference on Digital Ecosystems and Technologies, 2007-02-21 - 2007-02-23, Cairns, AUSTRALIA.

Razavi, AR, Moschoyiannis, Sotiris and Krause, Paul (2007) A coordination model for distributed transactions in Digital Business EcoSystems Proceedings of the 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, DEST 2007. pp. 159-164.


Spyrou, L, Jing, M, Sanei, S and Sumich, A (2007) Separation and localisation of P300 sources and their subcomponents using constrained blind source separation EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, ARTN 8.

Steiner, T, Schramm, L, Jin, Y and Sendhoff, B (2007) Emergence of feedback in artificial gene regulatory networks.


Vrusias, B, Newbold, N, Makris, D, Renno, J-P, Jones, G and Ahmad, K (2007) A framework for ontology enriched semantic annotation of CCTV video 8th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2007.

Vrusias, BL, Vomvoridis, L and Gillam, L (2007) Distributing SOM ensemble training using grid middleware IEEE International Joint Conference on Neural Networks (IJCNN 2007). pp. 2712-2717.


Wei, K and Heather, J (2007) A theorem-proving approach to verification of fair non-repudiation protocols Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4691 L. pp. 202-219.


Xia, Z, Schneider, SA, Heather, J, Ryan, PYA, Lundin, D and Howard, P (2007) Pret a Voter: All-in-one In: WOTE: Workshop on Trustworthy Elections, 2007-06-20 - 2007-06-22, Ottawa, Canada.

Xia, Z, Schneider, SA, Heather, JA, Ryan, PYA, Lundin, D, Peel, RMA and Howard, PJ (2007) Prêt à Voter: All-in-one In: IAVoSS Workshop On Trustworthy Elections (WOTE 2007), 2007-06-20 - 2007-06-21, Ottawa, Canada.


Zhang, Fan, Povey, David and Krause, Paul J. (2007) Protein Attributes Microtuning System (PAMS): an effective tool to increase protein structure prediction by data purification In: 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference.

Zhang, J, Ho, Anthony, Qiu, G and Marziliano, P (2007) Robust video watermarking of H.264/AVC IEEE Transactions on Circuits and Systems II: Express Briefs, 54 (2). pp. 205-209.

Zhao, X, Ho, ATS, Treharne, H, Pankajakshan, V, Culnane, C, Jiang, W, Liao, BY, Pan, JS, Jain, LC, Liao, M, Noda, H and Ho, ATS (2007) A novel semi-fragile image watermarking, authentication and self-restoration technique using the slant transform In: 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2007-11-26 - 2007-11-28, Kaohsiung, TAIWAN.

Zheng, Y, Zhou, J, Krause, P and Latifi, S (2007) A model checking based test case generation framework for web services In: 4th International Conference on Information Technology - New Generations, 2007-04-02 - 2007-04-04, Las Vegas, NV.

Zheng, Y, Zhou, J, Krause, P, Muller, P, Liggesmeyer, P and Maehle, E (2007) Analysis of BPEL data dependencies In: 33rd EUROMICRO Conference on Software Engineering and Advanced Applications, 2007-08-27 - 2007-08-31, Lubeck, GERMANY.

Zheng, Yongyan and Krause, Paul J. (2007) Automata Semantics and Analysis of BPEL In: 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference.

Zheng, Yongyan, Zhou, Jiong and Krause, Paul (2007) An Automatic Test Case Generation Framework for Web Services Journal of Software (JSW), 2. pp. 64-77.

Zhou, A, Zhang, Q, Jin, Y and Sendhoff, B (2007) Adaptive modelling strategy for continuous multi-objective optimization

Zhou, A, Zhang, Q, Jin, Y, Sendhoff, B and Tsang, EPK (2007) Global multiobjective optimization via estimation of distribution algorithm with biased initialization and crossover.

This list was generated on Tue Mar 2 02:23:31 2021 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800