University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Academic/Research unit is "Faculty of Engineering and Physical Sciences > Computer Science"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Item Type | No Grouping
Jump to: A | B | C | E | G | H | J | K | L | M | N | O | P | R | S | T | W | X
Number of items: 41.

A

Anonymous, Unspecified (2008) Simple and Secure Electronic Voting with Pret a Voter Technical Report. Department of Computing, University of Surrey. (Unpublished)

Arroyo, D, Alvarez, G, Li, SJ, Li, CQ and Nunez, J (2008) Cryptanalysis of a discrete-time synchronous chaotic encryption system Physics Letters. Section A: General, Atomic and Solid State Physics, 372 (7). pp. 1034-1039.

Arroyo, D, Rhouma, R, Alvarez, G, Li, SJ and Fernandez, V (2008) On the security of a new image encryption scheme based on chaotic map lattices Chaos, 18 (3), 033112.

B

Bresson, E and Manulis, M (2008) Securing Group Key Exchange against Strong Corruptions In: ACM Symposium on Information, Computer & Communication Security (ASIACCS '08), 2008-03-18 - 2008-03-20, Tokyo, Japan.

Browne, Anthony, Jakary, Angela, Vinogradov, Sophia, Fu, Yu and Deicken, Raymond (2008) Automatic Relevance Determination for Identifying Thalamic Regions Implicated in Schizophrenia IEEE Transactions on Neural Networks, 19 (6). pp. 1101-1107.

Bryant, D and Krause, P (2008) A review of current defeasible reasoning implementations KNOWLEDGE ENGINEERING REVIEW, 23 (3). pp. 227-260.

C

Cao, Y, Jin, Y, Kowalczykiewicz, M and Sendhoff, B (2008) Prediction of convergence dynamics of design performance using differential recurrent neural networks.

Casey, MC and Pavlou, A (2008) A Behavioral Model of Sensory Alignment in the Superficial and Deep Layers of the Superior Colliculus In: International Joint Conference on Neural Networks, 2008-06-01 - 2008-06-08, Hong Kong, PEOPLES R CHINA.

Culnane, C, Treharne, H and Ho, ATS (2008) Improving mutli-set formatted binary text watermarking using continuous line embedding

E

Emelia Akashah, PA, Sugathan, SK and Ho, ATS (2008) Receiver operating characteristic (ROC) graph to determine the most suitable pairs analysis threshold value In: WCECS '08, 2008-10-22 - 2008-10-24, San Francisco, USA.

G

Gajek, S, Manulis, M, Sadeghi, A-R and Schwenk, J (2008) Provably Secure Browser-Based User-Aware Mutual Authentication over TLS In: ACM Symposium on Information, Computer & Communication Security (ASIACCS '08), 2008-03-18 - 2008-03-20, Tokyo, Japan.

Gajek, S, Manulis, M and Schwenk, J (2008) Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy In: 13th Australasian Conference, ACISP 2008, 2008-07-07 - 2008-07-09, Wollongong, Australia.

H

Ho, ATS (2008) Semi-fragile watermarking and authentication for law enforcement applications In: ICICIC '07, 2007-09-05 - 2007-09-07, Kumamoto, Japan.

Hou, Wensheng, Shen, Shan, Szameitat, Andre J, Jiang, Yingtao, Zheng, Jun, van Loon, Monique and Sterr, Annette (2008) A behaviour study of the effects of visual feedback on fluctuating isometric force production with force tracking tasks International Journal of Biomedical Engineering and Technology, 1 (4). pp. 367-381.

J

Jin, Y and Sendhoff, B (2008) Evolving in silico Bistable and Oscillatory Dynamics for Gene Regulatory Network Motifs In: IEEE Congress on Evolutionary Computation, 2008-06-01 - 2008-06-06, Hong Kong, PEOPLES R CHINA.

K

Koukoumpetsos, K., Antonopoulos, N., Zhang, K. and Exarchakos, G. (2008) Improving Availability of Mobile Code Systems by Decoupling Interaction from Mobility In: Seventh International Conference on Networking (icn 2008).

Krause, PJ, Fenton, N, Neil, M, Marsh, W, Hearty, P and Radlinski, L (2008) On the effectiveness of early life cycle defect prediction with Bayesian Nets Empirical Software Engineering: an international journal, 13 (5). pp. 499-537.

Kroustis, Constantinos A and Casey, Matthew C (2008) Combining Heuristics and Q-Learning in an Adaptive Light Seeking Robot Technical Report. Department of Computing, University of Surrey. (Unpublished)

L

Lee, TKM, Belkhatir, M, Lee, PA and Sanei, Saeid (2008) Fronto-Normal Gait Incorporating Accurate Practical Looming Compensation In: 19th International Conference on Pattern Recognition (ICPR 2008), 2008-12-08 - 2008-12-11, Tampa, FL.

Li, CQ, Li, SJ, Alvarez, G, Chen, G and Lo, K-T (2008) Cryptanalysis of a chaotic block cipher with external key and its improved version Chaos Solitons and Fractals, 37 (1). pp. 299-307.

Li, SJ, Li, CQ, Chen, GR, Bourbakis, NG and Lo, KT (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks Signal Processing-Image Communication, 23 (3). pp. 212-223.

Li, SJ, Li, CQ, Chen, GR and Lo, KT (2008) Cryptanalysis of the RCES/RSES image encryption scheme Journal of Systems and Software, 81 (7). pp. 1130-1143.

Li, SJ, Li, CQ, Lo, KT and Chen, GR (2008) Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion IEEE Transactions on Circuits and Systems for Video Technology, 18 (3). pp. 338-349.

Li, SJ, Li, CQ, Lo, KT and Chen, GR (2008) Cryptanalyzing an encryption scheme based on blind source separation IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 55 (4). pp. 1055-1063.

Lim, D, Ong, Y-S, Jin, Y and Sendhoff, B (2008) Evolutionary optimization with dynamic fidelity computational models

M

Mitchell, Bill (2008) Characterizing Communication Channel Deadlocks in Sequence Diagrams IEEE Transactions on Software Engineering, 34 (3). pp. 305-320.

Moschoyiannis, Sotiris, Razavi, AR, Zheng, YY and Krause, Paul (2008) Long-running Transactions: semantics, schemas, implementation In: IEEE DEST 2008, 2008-02-26 - 2008-02-29, Phitsanuloke, Thailand.

N

Nazarpour, K, Mohseni, HR, Hesse, CW, Chambers, JA and Sanei, S (2008) A novel semiblind signal extraction approach for the removal of eye-blink artifact from EEGs EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2008, ARTN 8.

O

Orue, AB, Fernandez, V, Alvarez, G, Pastor, G, Romera, M, Li, SJ and Montoya, F (2008) Determination of the parameters for a Lorenz system and application to break the security of two-channel chaotic cryptosystems Physics Letters. Section A: General, Atomic and Solid State Physics, 372 (34). pp. 5588-5592.

P

Puhan, NB, Ho, ATS and Sattar, F (2008) Erasable authentication watermarking in binary document images In: ICICIC '07, 2008-09-05 - 2008-09-07, Kumamoto, Japan.

R

Razavi, AR, Moschoyiannis, Sotiris and Krause, Paul (2008) A scale-free business network for digital ecosystems In: 2nd IEEE DEST 2008, 2008-06-26 - 2008-06-29, Phitsanulok, Thailand.

S

Schaathun, HG (2008) On the assumption of equal contributions in fingerprinting IEEE Transactions on Information Forensics and Security, 3 (3). pp. 569-572.

Schneider, S, Treharne, H, McEwan, A and Ifill, W (2008) Experiments in Translating CSP||B to Handel-C In: Communicating Process Architectures 2008 - WoTUG-31, 2008-09-07 - 2008-09-10, York, UK.

Shields, MW and Casey, MC (2008) A theoretical framework for multiple neural network systems NEUROCOMPUTING, 71 (7-9). pp. 1462-1476.

Shields, Mike W and Casey, Matthew C (2008) A Theoretical Framework for Multiple Neural Network Systems Neurocomputing, 71 (7-9). pp. 1462-1476.

Steiner, T, Jin, Y and Sendhoff, B (2008) A cellular model for the evolutionary development of lightweight material with an inner structure In: 10th Annual Conference on Genetic and Evolutionary Computation 2008, 2008-07-12 - ?, Atlanta, GA.

T

Tsalaile, T, Naqvi, SM, Nazarpour, K, Sanei, S and Chambers, JA (2008) Blind source extraction of heart sound signals from lung sound recordings exploiting periodicity of the heart sound In: 33rd IEEE International Conference on Acoustics, Speech and Signal Processing, 2008-03-30 - 2008-04-04, Las Vegas, NV.

Turner, E, Treharne, H, Schneider, S and Evans, N (2008) Automatic generation of CSP||B skeletons from xUML models In: 5th International Colloquium on Theoretical Aspects of Computing (ICTAC 2008), 2008-09-01 - 2008-09-03, Sabanci Univ, Istanbul, TURKEY.

W

Williams, DM, Treharne, H, Ho, ATS and Culnane, C (2008) Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol In: ACM Multimedia and Security Workshop, 2008-09-22 - 2008-09-23, Oxford Univ Comp Lab, Oxford, ENGLAND.

X

Xia, Z, Schneider, SA, Heather, J and Traoré, J (2008) Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. In: USENIX/ACCURATE Electronic Voting Workshop, 2008-07-28 - 2008-07-29, San Jose, USA.

Xia, Z, Schneider, SA, Heather, JA and Traoré, J (2008) Analysis, improvement and simplification of the Prêt à Voter with Paillier encryption

This list was generated on Wed Apr 8 16:21:40 2020 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800