University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Academic/Research unit is "Faculty of Engineering and Physical Sciences > Computer Science"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Item Type | No Grouping
Jump to: A | B | C | E | G | H | J | K | L | M | N | O | P | R | S | T | W | X
Number of items: 41.


Anonymous, Unspecified (2008) Simple and Secure Electronic Voting with Pret a Voter Technical Report. Department of Computing, University of Surrey. (Unpublished)

Arroyo, D, Alvarez, G, Li, SJ, Li, CQ and Nunez, J (2008) Cryptanalysis of a discrete-time synchronous chaotic encryption system Physics Letters. Section A: General, Atomic and Solid State Physics, 372 (7). pp. 1034-1039.

Arroyo, D, Rhouma, R, Alvarez, G, Li, SJ and Fernandez, V (2008) On the security of a new image encryption scheme based on chaotic map lattices Chaos, 18 (3), 033112.


Bresson, E and Manulis, M (2008) Securing Group Key Exchange against Strong Corruptions In: ACM Symposium on Information, Computer & Communication Security (ASIACCS '08), 2008-03-18 - 2008-03-20, Tokyo, Japan.

Browne, Anthony, Jakary, Angela, Vinogradov, Sophia, Fu, Yu and Deicken, Raymond (2008) Automatic Relevance Determination for Identifying Thalamic Regions Implicated in Schizophrenia IEEE Transactions on Neural Networks, 19 (6). pp. 1101-1107.

Bryant, D and Krause, P (2008) A review of current defeasible reasoning implementations KNOWLEDGE ENGINEERING REVIEW, 23 (3). pp. 227-260.


Cao, Y, Jin, Y, Kowalczykiewicz, M and Sendhoff, B (2008) Prediction of convergence dynamics of design performance using differential recurrent neural networks.

Casey, MC and Pavlou, A (2008) A Behavioral Model of Sensory Alignment in the Superficial and Deep Layers of the Superior Colliculus In: International Joint Conference on Neural Networks, 2008-06-01 - 2008-06-08, Hong Kong, PEOPLES R CHINA.

Culnane, C, Treharne, H and Ho, ATS (2008) Improving mutli-set formatted binary text watermarking using continuous line embedding


Emelia Akashah, PA, Sugathan, SK and Ho, ATS (2008) Receiver operating characteristic (ROC) graph to determine the most suitable pairs analysis threshold value In: WCECS '08, 2008-10-22 - 2008-10-24, San Francisco, USA.


Gajek, S, Manulis, M, Sadeghi, A-R and Schwenk, J (2008) Provably Secure Browser-Based User-Aware Mutual Authentication over TLS In: ACM Symposium on Information, Computer & Communication Security (ASIACCS '08), 2008-03-18 - 2008-03-20, Tokyo, Japan.

Gajek, S, Manulis, M and Schwenk, J (2008) Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy In: 13th Australasian Conference, ACISP 2008, 2008-07-07 - 2008-07-09, Wollongong, Australia.


Ho, ATS (2008) Semi-fragile watermarking and authentication for law enforcement applications In: ICICIC '07, 2007-09-05 - 2007-09-07, Kumamoto, Japan.

Hou, Wensheng, Shen, Shan, Szameitat, Andre J, Jiang, Yingtao, Zheng, Jun, van Loon, Monique and Sterr, Annette (2008) A behaviour study of the effects of visual feedback on fluctuating isometric force production with force tracking tasks International Journal of Biomedical Engineering and Technology, 1 (4). pp. 367-381.


Jin, Y and Sendhoff, B (2008) Evolving in silico Bistable and Oscillatory Dynamics for Gene Regulatory Network Motifs In: IEEE Congress on Evolutionary Computation, 2008-06-01 - 2008-06-06, Hong Kong, PEOPLES R CHINA.


Koukoumpetsos, K., Antonopoulos, N., Zhang, K. and Exarchakos, G. (2008) Improving Availability of Mobile Code Systems by Decoupling Interaction from Mobility In: Seventh International Conference on Networking (icn 2008).

Krause, PJ, Fenton, N, Neil, M, Marsh, W, Hearty, P and Radlinski, L (2008) On the effectiveness of early life cycle defect prediction with Bayesian Nets Empirical Software Engineering: an international journal, 13 (5). pp. 499-537.

Kroustis, Constantinos A and Casey, Matthew C (2008) Combining Heuristics and Q-Learning in an Adaptive Light Seeking Robot Technical Report. Department of Computing, University of Surrey. (Unpublished)


Lee, TKM, Belkhatir, M, Lee, PA and Sanei, Saeid (2008) Fronto-Normal Gait Incorporating Accurate Practical Looming Compensation In: 19th International Conference on Pattern Recognition (ICPR 2008), 2008-12-08 - 2008-12-11, Tampa, FL.

Li, CQ, Li, SJ, Alvarez, G, Chen, G and Lo, K-T (2008) Cryptanalysis of a chaotic block cipher with external key and its improved version Chaos Solitons and Fractals, 37 (1). pp. 299-307.

Li, SJ, Li, CQ, Chen, GR, Bourbakis, NG and Lo, KT (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks Signal Processing-Image Communication, 23 (3). pp. 212-223.

Li, SJ, Li, CQ, Chen, GR and Lo, KT (2008) Cryptanalysis of the RCES/RSES image encryption scheme Journal of Systems and Software, 81 (7). pp. 1130-1143.

Li, SJ, Li, CQ, Lo, KT and Chen, GR (2008) Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion IEEE Transactions on Circuits and Systems for Video Technology, 18 (3). pp. 338-349.

Li, SJ, Li, CQ, Lo, KT and Chen, GR (2008) Cryptanalyzing an encryption scheme based on blind source separation IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 55 (4). pp. 1055-1063.

Lim, D, Ong, Y-S, Jin, Y and Sendhoff, B (2008) Evolutionary optimization with dynamic fidelity computational models


Mitchell, Bill (2008) Characterizing Communication Channel Deadlocks in Sequence Diagrams IEEE Transactions on Software Engineering, 34 (3). pp. 305-320.

Moschoyiannis, Sotiris, Razavi, AR, Zheng, YY and Krause, Paul (2008) Long-running Transactions: semantics, schemas, implementation In: IEEE DEST 2008, 2008-02-26 - 2008-02-29, Phitsanuloke, Thailand.


Nazarpour, K, Mohseni, HR, Hesse, CW, Chambers, JA and Sanei, S (2008) A novel semiblind signal extraction approach for the removal of eye-blink artifact from EEGs EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2008, ARTN 8.


Orue, AB, Fernandez, V, Alvarez, G, Pastor, G, Romera, M, Li, SJ and Montoya, F (2008) Determination of the parameters for a Lorenz system and application to break the security of two-channel chaotic cryptosystems Physics Letters. Section A: General, Atomic and Solid State Physics, 372 (34). pp. 5588-5592.


Puhan, NB, Ho, ATS and Sattar, F (2008) Erasable authentication watermarking in binary document images In: ICICIC '07, 2008-09-05 - 2008-09-07, Kumamoto, Japan.


Razavi, AR, Moschoyiannis, Sotiris and Krause, Paul (2008) A scale-free business network for digital ecosystems In: 2nd IEEE DEST 2008, 2008-06-26 - 2008-06-29, Phitsanulok, Thailand.


Schaathun, HG (2008) On the assumption of equal contributions in fingerprinting IEEE Transactions on Information Forensics and Security, 3 (3). pp. 569-572.

Schneider, S, Treharne, H, McEwan, A and Ifill, W (2008) Experiments in Translating CSP||B to Handel-C In: Communicating Process Architectures 2008 - WoTUG-31, 2008-09-07 - 2008-09-10, York, UK.

Shields, MW and Casey, MC (2008) A theoretical framework for multiple neural network systems NEUROCOMPUTING, 71 (7-9). pp. 1462-1476.

Shields, Mike W and Casey, Matthew C (2008) A Theoretical Framework for Multiple Neural Network Systems Neurocomputing, 71 (7-9). pp. 1462-1476.

Steiner, T, Jin, Y and Sendhoff, B (2008) A cellular model for the evolutionary development of lightweight material with an inner structure In: 10th Annual Conference on Genetic and Evolutionary Computation 2008, 2008-07-12 - ?, Atlanta, GA.


Tsalaile, T, Naqvi, SM, Nazarpour, K, Sanei, S and Chambers, JA (2008) Blind source extraction of heart sound signals from lung sound recordings exploiting periodicity of the heart sound In: 33rd IEEE International Conference on Acoustics, Speech and Signal Processing, 2008-03-30 - 2008-04-04, Las Vegas, NV.

Turner, E, Treharne, H, Schneider, S and Evans, N (2008) Automatic generation of CSP||B skeletons from xUML models In: 5th International Colloquium on Theoretical Aspects of Computing (ICTAC 2008), 2008-09-01 - 2008-09-03, Sabanci Univ, Istanbul, TURKEY.


Williams, DM, Treharne, H, Ho, ATS and Culnane, C (2008) Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol In: ACM Multimedia and Security Workshop, 2008-09-22 - 2008-09-23, Oxford Univ Comp Lab, Oxford, ENGLAND.


Xia, Z, Schneider, SA, Heather, J and Traoré, J (2008) Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. In: USENIX/ACCURATE Electronic Voting Workshop, 2008-07-28 - 2008-07-29, San Jose, USA.

Xia, Z, Schneider, SA, Heather, JA and Traoré, J (2008) Analysis, improvement and simplification of the Prêt à Voter with Paillier encryption

This list was generated on Tue Mar 2 17:15:44 2021 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800