University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Academic/Research unit is "Faculty of Engineering and Physical Sciences > Computer Science"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Item Type | No Grouping
Jump to: A | B | C | F | G | H | J | K | L | M | O | P | R | S | V | Y | Z
Number of items: 62.

A

Abadi, BM, Jarchi, D and Sanei, S (2009) SIMULTANEOUS LOCALIZATION AND SEPARATION OF BIOMEDICAL SIGNALS BY TENSOR FACTORIZATION In: 15th IEEE/SP Workshop on Statistical Signal Processing, 2009-08-31 - 2009-09-03, Cardiff, WALES.

Abadi, BM, Sarrafzadeh, A, Ghaderi, F and Sanei, S (2009) SEMI-BLIND CHANNEL ESTIMATION IN MIMO COMMUMICATION BY TENSOR FACTORIZATION In: 15th IEEE/SP Workshop on Statistical Signal Processing, 2009-08-31 - 2009-09-03, Cardiff, WALES.

Abadi, BM, Sarrafzadeh, A, Jarchi, D, Abolghasemi, V and Sanei, S (2009) SEMI-BLIND SIGNAL SEPARATION AND CHANNEL ESTIMATION IN MIMO COMMUNICATION SYSTEMS BY TENSOR FACTORIZATION In: 15th IEEE/SP Workshop on Statistical Signal Processing, 2009-08-31 - 2009-09-03, Cardiff, WALES.

Abolghasemi, V, Sanei, Saeid, Ferdowsi, S, Ghaderi, F and Belcher, A (2009) Segmented compressive sensing In: SSP '09, 2009-08-31 - 2009-09-03, Cardiff, UK.

Alsudani, F and Casey, MC (2009) The Effect of Aesthetics on Web Credibility In: 23rd BCS conference on Human Computer Interaction (HCI 2009), 2009-09-01 - 2009-09-05, Cambridge, UK.

Alvarez, G and Li, SJ (2009) Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption Communications in Nonlinear Science and Numerical Simulation, 14 (11). pp. 3743-3749.

Arroyo, D, Alvarez, G, Li, SJ, Li, CQ and Fernandez, V (2009) Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity International Journal of Modern Physics B, 23 (5). pp. 651-659.

Arroyo, D, Li, CQ, Li, SJ and Alvarez, G (2009) Cryptanalysis of a computer cryptography scheme based on a filter bank Chaos Solitons and Fractals, 41 (1). pp. 410-413.

Arroyo, D, Li, CQ, Li, SJ, Alvarez, G and Halang, WA (2009) Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm Chaos Solitons and Fractals, 41 (5). pp. 2613-2616.

B

Bismark, D, Heather, JA, Peel, RMA, Schneider, SA, Xia, Z and Ryan, PYA (2009) Experiences Gained from the first Prêt à Voter Implementation In: First International Workshop on Requirements Engineering for e-Voting Systems (RE-VOTE), 2009, 2010-08-31 - 2010-08-31, Atlanta, GA.

Bresson, E, Brecher, T and Manulis, M (2009) Fully Robust Tree-Diffie-Hellman Group Key Exchange In: Cryptology and Network Security, 8th International Conference, 2009-12-12 - 2009-12-14, Kanazawa, Ishikawa, Japan.

Briffa, JA, Schaathun, H and Wahab, AWA (2009) Has F5 Really Been Broken? In: 3rd International Conference on Crime Detection and Prevention (ICDP 2009), 2009-12-03 - 2009-12-03, London.

C

Catuogno, L, Löhr, H, Manulis, M, Sadeghi, A-R and Winandy, M (2009) Transparent Mobile Storage Protection in Trusted Virtual Domains In: 23rd Large Installation System Administration Conference, 2009-11-01 - 2009-11-06, Baltimore, MD.

F

Ferdowsi, S, Abolghasemi, V, Ahmadyfard, A and Sanei, S (2009) AN IMPROVED EYE DETECTION METHOD BASED ON STATISTICAL MOMENTS In: 15th IEEE/SP Workshop on Statistical Signal Processing, 2009-08-31 - 2009-09-03, Cardiff, WALES.

Finke, A, Jin, Y and Ritter, H (2009) A P300 based brain-robot interface for shaping human-robot interaction In: Bernstein Conference on Computational Neuroscience, 2009-09-30 - 2009-10-02, Frankfurt, Germany.

G

Ghaderi, F, Mohseni, HR, McWhirter, JG and Sanei, S (2009) BLIND SOURCE EXTRACTION OF PERIODIC SIGNALS In: IEEE International Conference on Acoustics, Speech and Signal Processing, 2009-04-19 - 2009-04-24, Taipei, TAIWAN.

Guo, H, Meng, Y and Jin, Y (2009) Self-adaptive multi-robot construction using gene regulatory networks

H

He, Z, Cichocki, A, Li, Y, Xie, S and Sanei, S (2009) K-hyperline clustering learning for sparse component analysis Signal Processing, 89 (6). pp. 1011-1022.

Heather, J and Wei, K (2009) Where next for formal methods? Lecture Notes in Computer Science, 5087. pp. 52-58.

Heather, JA and Lundin, D (2009) The Append-only Web Bulletin Board In: Formal Aspects in Security and Trust 5th International Workshop (FAST 2008), 9-10 Oct 2008, Malaga, Spain.

J

Jarchi, D, Makkiabadi, B and Sanei, S (2009) ESTIMATION OF TRIAL TO TRIAL VARIABILITY OF P300 SUBCOMPONENTS BY COUPLED RAO-BLACKWELLISED PARTICLE FILTERING In: 15th IEEE/SP Workshop on Statistical Signal Processing, 2009-08-31 - 2009-09-03, Cardiff, WALES.

Jin, Y, Gruna, R, Paenke, I and Sendhoff, B (2009) Evolutionary Multi-objective Optimization of Robustness and Innovation in Redundant Genetic Representations In: IEEE Symposium on Computational Intelligence in Multi-Criteria Decision-Making, 2009-03-30 - 2009-04-02, Nashville, TN.

Jin, Y, Gruna, R and Sendhoff, B (2009) Pareto analysis of evolutionary and learning systems Frontiers of Computer Science in China, 3 (1). pp. 4-17.

Jin, Y, Guo, H and Meng, Y (2009) Robustness Analysis and Failure Recovery of a Bio-Inspired Self-Organizing Multi-Robot System.

Jin, Y, Sendhoff, B and Meng, Y (2009) Influence of regulation logic on the easiness of evolving sustained oscillation for gene regulatory networks

Jones, B, Jin, Y, Sendhoff, B and Yao, X (2009) The evolutionary emergence of neural organization in a hydra-like animat In: Bernstein Conference on Computational Neuroscience, 2009-09-30 - 2009-10-02, Frankfurt, Germany.

K

Krause, PJ and Marinos, A (2009) An SBVR framework for RESTful Web Applications Lecture Notes in Computer Science: Rule Interchange and Applications, 5858. pp. 144-158.

Krause, Paul, Razavi, AR, Moschoyiannis, Sotiris and Marinos, A (2009) Stability and Complexity in Digital Ecosystems In: 3rd IEEE International Conference on Digital Ecosystems and Technologies, 2009-06-01 - 2009-06-03, Istanbul, TURKEY.

L

Le, MN, Ong, Y-S, Jin, Y and Sendhoff, B (2009) Lamarckian memetic algorithms: local optimum and connectivity structure analysis Memetic Computing, 1 (3). pp. 175-190.

Lee, TKM, Belkhatir, M and Sanei, S (2009) Coping with full occlusion in fronto-normal gait by using missing data theory In: ICICS 2009, 2009-12-08 - 2009-12-10, Macau, China.

Lee, TKM, Belkhatir, M and Sanei, S (2009) On the Compensation for the Effects of Occlusion in Fronto-Normal Gait Signal Processing In: ISM '09, 2009-12-14 - 2009-12-16, San Diego, USA.

Li, B and Gillam, L (2009) Grid Service Level Agreements using Financial Risk Analysis Techniques In: Handbook of Research on P2P and Grid Systems for Service-Oriented Computing: Models, Methodologies and Applications. IGI-Global.

Li, CQ, Li, SJ, Asim, M, Nunez, J, Alvarez, G and Chen, GR (2009) On the security defects of an image encryption scheme Image and Vision Computing, 27 (9). pp. 1371-1381.

Li, CQ, Li, SJ, Chen, G and Halang, WA (2009) Cryptanalysis of an image encryption scheme based on a compound chaotic sequence Image and Vision Computing, 27 (8). pp. 1035-1039.

Li, SJ, Asghar, HJ, Pieprzyk, J, Sadeghi, AR, Schmitz, R and Wang, HX (2009) On the Security of PAS (Predicate-based Authentication Service) In: 25th Annual Computer Security Applications Conference (ACSAC 2009), 2009-12-07 - 2009-12-11, Honolulu, HI, USA.

Li, SJ, Chen, G, Cheung, A, Lo, KT and Kankanhalli, M (2009) On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables In: 3rd Pacific-Rim Symposium on Image and Video Technology (PSIVT 2009), 2009-01-13 - 2009-01-16, Tokyo, JAPAN.

Lo, JL, Sanei, S and Nazarpour, K (2009) An adaptive source-channel coding with feedback for progressive transmission of medical images. Int J Telemed Appl, 2009.

M

Manulis, M (2009) Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys In: Applied Cryptography and Network Security: 7th International Conference, 2009-06-02 - 2009-06-05, Paris-Rocquencourt, France.

Manulis, M (2009) Securing Remote Access Inside Wireless Mesh Networks In: 10th International Workshop, WISA 2009, 2009-08-25 - 2009-08-27, Busan, Korea.

Manulis, M, Leroy, D, Koeune, F, Bonaventure, O and Quisquater, J-J (2009) Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home In: ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), 2009-03-10 - 2009-03-12, Sydney, Australia.

Manulis, M, Suzuki, K and Ustaoglu, B (2009) Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange In: 12th International Conference on Information, Security, and Cryptology (ICISC 2009), 2009-12-02 - 2009-12-04, Seoul, Korea.

Marinos, A, Razavi, A, Moschoyiannis, Sotiris, Krause, Paul, Damiani, E, Zhang, J and Chang, R (2009) RETRO: A Consistent and Recoverable RESTful Transaction Model In: IEEE International Conference on Web Services (ICWS 2009), 2009-07-06 - 2009-07-10, Los Angeles, CA.

Mohseni, HR, Ghaderi, F, Wilding, EE and Sanei, S (2009) A BEAMFORMING PARTICLE FILTER FOR EEG DIPOLE SOURCE LOCALIZATION In: IEEE International Conference on Acoustics, Speech and Signal Processing, 2009-04-19 - 2009-04-24, Taipei, TAIWAN.

Moschoyiannis, Sotiris, Krause, Paul, Bryant, D and McBurney, P (2009) Verifiable Protocol Design for Agent Argumentation Dialogues In: 3rd IEEE International Conference on Digital Ecosystems and Technologies, 2009-06-01 - 2009-06-03, Istanbul, TURKEY.

Moschoyiannis, Sotiris, Krause, Paul and Shields, MW (2009) A True-Concurrent Interpretation of Behavioural Scenarios. In Proc. of ETAPS 2007 - Formal Foundations of Embedded Software and Component-Based Software Architectures (FESCA'07) Electronic Notes in Theoretical Computer Science, 203 (7). pp. 3-22.

O

Orue, A, Fernandez, V, Alvarez, G, Pastor, G, Romera, M, Montoya, F, Sanchez-Avila, C and Li, SJ (2009) Breaking a SC-CNN-based Chaotic Masking Secure Communication System International Journal of Bifurcation and Chaos, 19 (4). pp. 1329-1338.

P

Pavlou, A and Casey, M (2009) A Computational Platform for Visual Fear Conditioning In: International Joint Conference on Neural Networks, 2009-06-14 - 2009-06-19, Atlanta, GA.

Pavlou, A and Casey, M (2009) Identifying Emotions Using Topographic Conditioning Maps In: 15th International Conference on Neuro-Information Processing, 2008-11-25 - 2008-11-28, Auckland, NEW ZEALAND.

Puhan, NB, Ho, ATS and Sattar, F (2009) Localization and text sequence restoration using noise pixels in binary document image watermarking JOURNAL OF ELECTRONIC IMAGING, 18 (2), ARTN 0.

R

Razavi, A, Moschoyiannis, Sotiris and Krause, Paul (2009) An open digital environment to support business ecosystems Peer-to-Peer Networking and Applications, 2 (4). pp. 367-397.

Rhouma, R, Solak, E, Arroyo, D, Li, SJ, Alvarez, G and Belghith, S (2009) Comment on "Modified Baptista type chaotic cryptosystem via matrix secret key" [Phys. Lett. A 372 (2008) 5427] Physics Letters. Section A: General, Atomic and Solid State Physics, 373 (37). pp. 3398-3400.

Ryan, P.Y.A., Bismark, D., Heather, J., Schneider, S. and Xia, Z. (2009) Prêt à Voter: a voter-verifiable voting system Information Forensics and Security, IEEE Transactions on, 4 (4). pp. 662-673.

Ryan, PYA, Bismark, D, Heather, JA, Schneider, SA and Xia, Z (2009) The Prêt à Voter Verifiable Election System IEEE Transactions on Information Forensics and Security, 4 (4). pp. 662-673.

S

Sanei, S and jing, M (2009) Simultaneous EEG-fMRI Analysis with Application to Detection and Localizaion of Seizure Signal Sources In: Recent Advances in Signal Processing. IN-TECH. ISBN 978-953-307-002-5

Schneider, S and Treharne, H (2009) Changing System Interfaces Consistently: A New Refinement Strategy for CSP||B In: 7th International Conference on Integrated Formal Methods, 2009-02-16 - 2009-02-19, Dusseldorf, GERMANY.

Shaikh, SA, Bush, VJ and Schneider, SA (2009) Specifying authentication using signal events in CSP Computers and Security, 28 (5). pp. 310-324.

Steiner, T, Jin, Y and Sendhoff, B (2009) Vector field embryogeny PLoS ONE, 4 (12). pp. 1-16.

V

Vrusias, BL and Golledge, I (2009) Online Self-Organised Map Classifiers as Text Filters for Spam Email Detection Journal of Information Assurance and Security (JIAS), 4 (2). pp. 151-160.

Y

Yusoff, N, Grüning, A and Browne, A (2009) Modelling the Stroop Effect: Dynamics in Inhibition of Automatic Stimuli Processing In: Second International Conference in Cognitive Neurodynamics (ICCN 2009), 2009-11-15 - ?, Hangzhou, China.

Z

Zhao, X, Ho, ATS and Shi, YQ (2009) IMAGE FORENSICS USING GENERALISED BENFORD'S LAW FOR ACCURATE DETECTION OF UNKNOWN JPEG COMPRESSION IN WATERMARKED IMAGES In: 16th International Conference on Digital Signal Processing, 2009-07-05 - 2009-07-07, Santorini, GREECE.

Zhao, Xi (2009) Robust and Semi-fragile Watermarking Techniques for Image Content Protection Technical Report. Department of Computing, University of Surrey. (Unpublished)

Zhou, A, Zhang, Q and Jin, Y (2009) Approximating the set of pareto-optimal solutions in both the decision and objective spaces by an estimation of distribution algorithm IEEE Transactions on Evolutionary Computation, 13 (5). pp. 1167-1189.

This list was generated on Wed Apr 1 11:56:43 2020 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800