University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Academic/Research unit is "Faculty of Engineering and Physical Sciences > Computer Science"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Item Type | No Grouping
Jump to: A | B | C | D | G | H | I | J | L | M | N | P | Q | S | Z
Number of items: 44.

A

Abdelhalim, I, Schneider, S and Treharne, H (2011) Towards a practical approach to check UML/fUML models consistency using CSP In: 13th International Conference on Formal Engineering Methods, ICFEM 2011, 2011-10-26 - 2011-10-28, Durham, UK.

Abolghasemi, V, Ferdowsi, S and Sanei, S (2011) Sparse multichannel source separation using incoherent K-SVD method In: SSP '11, 2011-06-28 - 2011-06-30, Nice, France.

Alvarez, G, Amigó, JM, Arroyo, D and Li, S (2011) Lessons learnt from the cryptanalysis of chaos-based ciphers In: Chaos-Based Cryptography: Theory,Algorithms and Applications. Studies in Computational Intelligence, 354 (8). Springer, pp. 257-295. ISBN 978-3-642-20541-5

Arroyo, D, Alvarez, G, Amigo, JM and Li, SJ (2011) Cryptanalysis of a family of self-synchronizing chaotic stream ciphers Communications in Nonlinear Science and Numerical Simulation, 16 (2). pp. 805-813.

Asghar, HJ, Li, SJ, Pieprzyk, J and Wang, HX (2011) Cryptanalysis of the convex hull click human identification protocol In: 13th International Information Security Conference (ISC 2011), 2010-10-25 - 2010-10-28, Boca Raton, FL, USA.

B

Babiloni, F, Cichocki, A, Sanei, S, Astolfi, L, Cincotti, F and Gonzalez Andino, S (2011) Selected papers from the 4th International Conference on Bioinspired Systems and Cognitive Signal Processing. Computational Intelligence and Neuroscience, 2011.

Baldas, V, Tang, L, Bountris, P, Saleh, G and Koutsouris, D (2011) A real-time automatic instrument tracking system on cataract surgery videos for dexterity assessment Proceedings of the IEEE International Conference on Information Technology Applications in Biomedicine. pp. 1-4.

Bardyn, D, Briffa, JA, Dooms, A and Schelkens, P (2011) Forensic Data Hiding Optimized for JPEG 2000 In: IEEE International Symposium on Circuits and Systems (ISCAS), 2011, 2011-05-15 - 2011-05-18, Rio de Janeiro, Brazil.

Buttigieg, V and Briffa, JA (2011) Codebook and Marker Sequence Design for Synchronization-Correcting Codes In: IEEE International Symposium on Information Theory Proceedings (ISIT), 2011, 2011-07-31 - 2011-08-05, St Petersburg.

C

Casey, MC, Hickman, DL, Pavlou, A and Sadler, JRE (2011) Small-scale Anomaly Detection in Panoramic Imaging using Neural Models of Low-level Vision In: SDisplay Technologies and Applications for Defense, Security, and Avionics V; and Enhanced and Synthetic Vision 2011, 2011-04-25 - 2011-04-29, Florida.

Cooke, N, Gillam, L, Wrobel, P, Cooke, H and Al-Obaidli, F (2011) A high-performance plagiarism detection system In: PAN at CLEF 2011, 2011-09-19 - 2011-09-22, Amsterdam.

Cristofaro, ED, Manulis, Mark and Poettering, B (2011) Private Discovery of Common Social Contacts In: 9th International Conference on Applied Cryptography and Network Security (ACNS 2011), 2011-06-07 - 2011-06-10, Nerja, Spain.

D

Demirel, D, Henning, M, Ryan, PYA, Schneider, S and Volkamer, M (2011) Feasibility Analysis of Prêt à Voter for German Federal Elections.

G

Gehrmann, E, Glaesser, C, Jin, Y, Sendhoff, B, Drossel, B and Hamacher, K (2011) Robustness of glycolysis in yeast to internal and external noise PHYSICAL REVIEW E, 84, 021913.

Ghodsi, M and Sanei, S (2011) Support vector machines for classification of temporomandibular disorders Data Science, 9. pp. 373-388.

Gillam, L and Cooke, N (2011) Clowns, Crowds and Clouds: A Cross-Enterprise Approach to Detecting Information Leakage without Leaking Information In: Cloud Computing for Enterprise Architectures. Springer-Verlag New York Inc, pp. 301-322. ISBN 1447122356

Grüning, A and PG, AV (2011) The Accumulation Theory of Ageing Preprint.

Günther, F, Manulis, M and Strufe, T (2011) Cryptographic Treatment of Private User Profiles In: 15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS, 2011-02-28 - 2011-03-04, St Lucia.

H

Heather, James and Schneider, Steve A. (2011) A formal framework for modelling coercion resistance and receipt freeness Technical Report. Department of Computing, University of Surrey.

I

Inden, B, Jin, Y, Haschke, R and Ritter, H (2011) Exploiting inherent regularity in control of multilegged robot locomotion by evolving neural fields

J

Jarchi, D, Makkiabadi, B and Sanei, S (2011) Instantaneous phase tracking of oscillatory signals using EMD and Rao-Blackwellised particle filtering In: ICASSP 2011, 2011-05-22 - 2011-05-27.

Jiang, W, Ho, ATS, Treharne, H and Yun-Qing, S (2011) Local Binary Patterns for Printer Identification based on Texture Analysis Technical Report.

Jones, B, Jin, Y, Sendhoff, B and Yao, X (2011) The effect of proprioceptive feedback on the distribution of sensory information in a model of an undulatory organism In: 10th European Conference, ECAL 2009, 2009-09-13 - 2009-09-16, Budapest, Hungary.

L

Li, CQ, Li, SJ and Lo, KT (2011) Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps Communications in Nonlinear Science and Numerical Simulation, 16 (2). pp. 837-843.

M

Manulis, M and Poettering, B (2011) Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation In: 6th ACM Symposium on Information, Computer and Communications Security, 2011-03-22 - 2011-03-24, Hong Kong.

Moran, M, Heather, JA and Schneider, SA (2011) Anonymity and CSP for Voting Systems In: CryptoForma 2011, 2011-06-21 - ?, Limerick.

N

Nazir, M, Javed, Y, Khan, MM, Khayam, SA and Li, SJ (2011) Poster: Captchæcker – Automating Usability-Security Evaluation of Textual CAPTCHAs [UNSPECIFIED]

P

Paukkeri, M-S, Kivimäki, I, Tirunagari, S, Oja, E and Honkela, T (2011) Effect of Dimensionality Reduction on Different Distance Measures in Document Clustering.

Perković, T, Mumtaz, A, Javed, Y, Li, SJ, Khayam, SA and Čagalj, M (2011) Breaking Undercover: Exploiting Design Flaws and Nonuniform Human Behavior In: 7th Symposium On Usable Privacy and Security (SOUPS 2011), 2011-07-20 - 2011-07-22, Carnegie Mellon University in Pittsburgh, PA, USA.

Q

Qadir, G, Zhao, X, Ho, ATS and Casey, MC (2011) Image Forensic of Glare Feature for Improving Image Retrieval Using Benford's Law In: IEEE ISCAS, 2011, 2011-05-15 - 2011-05-18, Rio de Janeiro, Brazil.

S

Sanei, S, Lee, TKM and Lee, TKM (2011) Detection of periodic signals using a new adaptive line enhancer based on singular spectrum analysis In: ICICS 2011, 2011-12-13 - 2011-12-16, Singapore.

Schmitz, R and Li, SJ (2011) Neue Entwicklungen in der e-Banking Security (Recent Developments in e-Banking Security) PIK - Praxis der Informationsverarbeitung und Kommunikation, 34 (4). pp. 176-184.

Schneider, S, Llewellyn, M, Culnane, C, Heather, J, Srinivasan, S and Xia, Z (2011) Focus group views on Prêt à Voter 1.0

Schneider, S and Treharne, H (2011) Changing system interfaces consistently: A new refinement strategy for CSP||B Science of Computer Programming, 76 (10). pp. 837-860.

Schneider, S, Treharne, H and Wehrheim, H (2011) A CSP Account of Event-B Refinement In: Refine 2011, 2011-06-20 - 2011-06-20, Limerick, Ireland.

Schneider, SA (2011) Security Analysis using Rank Functions in CSP In: Formal Models and Techniques for Analyzing Security Protocols. Cryptology and Information Security (10). IOS Press. ISBN 978-1-60750-713-0

Schneider, SA, Treharne, HE and Wehrheim, H (2011) Bounded Retransmission in Event-B||CSP: a Case Study Electronic Notes in Theoretical Computer Science, 280. pp. 69-80.

Schneider, Steve, Treharne, Helen and Wehrheim, Heike (2011) Stepwise Refinement in Event-B CSP. Part 1: Safety Technical Report. Department of Computing, University of Surrey. (Unpublished)

Schneider, Steve A., Treharne, Helen and Wehrheim, Heike (2011) Bounded Retransmission in Event-B||CSP: A Case Study Department of Computing, University of Surrey. (Unpublished)

Schramm, L, Jin, Y and Sendhoff, B (2011) Emerged coupling of motor control and morphological development in evolution of multi-cellular animats In: 10th European Conference, ECAL 2009, 2009-09-13 - 2009-09-16, Budapest, Hungary.

Schramm, L, Jin, Y and Sendhoff, B (2011) Redundancy creates opportunity in developmental representations

Sharp, James and Treharne, Helen (2011) CASE Technical Report: Automated Transformations from VHDL to CSP Technical Report. Department of Computing, University of Surrey. (Unpublished)

Sporea, I and Grüning, A (2011) Reference time in SpikeProp Proceedings of the International Joint Conference on Neural Networks. pp. 1090-1092.

Z

Zheng, Y, Meng, Y and Jin, Y (2011) Object recognition using a bio-inspired neuron model with bottom-up and top-down pathways Neurocomputing, 74 (17). pp. 3158-3169.

This list was generated on Sat Mar 28 00:43:04 2020 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800