Items where Academic/Research unit is "Faculty of Engineering and Physical Sciences > Computer Science"
![]() | Up a level |
A
Abdelhalim, I, Schneider, S and Treharne, H (2011) Towards a practical approach to check UML/fUML models consistency using CSP In: 13th International Conference on Formal Engineering Methods, ICFEM 2011, 2011-10-26 - 2011-10-28, Durham, UK.
Abolghasemi, V, Ferdowsi, S and Sanei, S (2011) Sparse multichannel source separation using incoherent K-SVD method In: SSP '11, 2011-06-28 - 2011-06-30, Nice, France.
Alvarez, G, Amigó, JM, Arroyo, D and Li, S (2011) Lessons learnt from the cryptanalysis of chaos-based ciphers In: Chaos-Based Cryptography: Theory,Algorithms and Applications. Studies in Computational Intelligence, 354 (8). Springer, pp. 257-295. ISBN 978-3-642-20541-5
Arroyo, D, Alvarez, G, Amigo, JM and Li, SJ (2011) Cryptanalysis of a family of self-synchronizing chaotic stream ciphers Communications in Nonlinear Science and Numerical Simulation, 16 (2). pp. 805-813.
Asghar, HJ, Li, SJ, Pieprzyk, J and Wang, HX (2011) Cryptanalysis of the convex hull click human identification protocol In: 13th International Information Security Conference (ISC 2011), 2010-10-25 - 2010-10-28, Boca Raton, FL, USA.
B
Babiloni, F, Cichocki, A, Sanei, S, Astolfi, L, Cincotti, F and Gonzalez Andino, S (2011) Selected papers from the 4th International Conference on Bioinspired Systems and Cognitive Signal Processing. Computational Intelligence and Neuroscience, 2011.
Baldas, V, Tang, L, Bountris, P, Saleh, G and Koutsouris, D (2011) A real-time automatic instrument tracking system on cataract surgery videos for dexterity assessment Proceedings of the IEEE International Conference on Information Technology Applications in Biomedicine. pp. 1-4.
Bardyn, D, Briffa, JA, Dooms, A and Schelkens, P (2011) Forensic Data Hiding Optimized for JPEG 2000 In: IEEE International Symposium on Circuits and Systems (ISCAS), 2011, 2011-05-15 - 2011-05-18, Rio de Janeiro, Brazil.
Buttigieg, V and Briffa, JA (2011) Codebook and Marker Sequence Design for Synchronization-Correcting Codes In: IEEE International Symposium on Information Theory Proceedings (ISIT), 2011, 2011-07-31 - 2011-08-05, St Petersburg.
C
Casey, MC, Hickman, DL, Pavlou, A and Sadler, JRE (2011) Small-scale Anomaly Detection in Panoramic Imaging using Neural Models of Low-level Vision In: SDisplay Technologies and Applications for Defense, Security, and Avionics V; and Enhanced and Synthetic Vision 2011, 2011-04-25 - 2011-04-29, Florida.
Cooke, N, Gillam, L, Wrobel, P, Cooke, H and Al-Obaidli, F (2011) A high-performance plagiarism detection system In: PAN at CLEF 2011, 2011-09-19 - 2011-09-22, Amsterdam.
Cristofaro, ED, Manulis, Mark and Poettering, B (2011) Private Discovery of Common Social Contacts In: 9th International Conference on Applied Cryptography and Network Security (ACNS 2011), 2011-06-07 - 2011-06-10, Nerja, Spain.
D
Demirel, D, Henning, M, Ryan, PYA, Schneider, S and Volkamer, M (2011) Feasibility Analysis of Prêt à Voter for German Federal Elections.
G
Gehrmann, E, Glaesser, C, Jin, Y, Sendhoff, B, Drossel, B and Hamacher, K (2011) Robustness of glycolysis in yeast to internal and external noise PHYSICAL REVIEW E, 84, 021913.
Ghodsi, M and Sanei, S (2011) Support vector machines for classification of temporomandibular disorders Data Science, 9. pp. 373-388.
Gillam, L and Cooke, N (2011) Clowns, Crowds and Clouds: A Cross-Enterprise Approach to Detecting Information Leakage without Leaking Information In: Cloud Computing for Enterprise Architectures. Springer-Verlag New York Inc, pp. 301-322. ISBN 1447122356
Grüning, A and PG, AV (2011) The Accumulation Theory of Ageing Preprint.
Günther, F, Manulis, M and Strufe, T (2011) Cryptographic Treatment of Private User Profiles In: 15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS, 2011-02-28 - 2011-03-04, St Lucia.
H
Heather, James and Schneider, Steve A. (2011) A formal framework for modelling coercion resistance and receipt freeness Technical Report. Department of Computing, University of Surrey.
I
Inden, B, Jin, Y, Haschke, R and Ritter, H (2011) Exploiting inherent regularity in control of multilegged robot locomotion by evolving neural fields
J
Jarchi, D, Makkiabadi, B and Sanei, S (2011) Instantaneous phase tracking of oscillatory signals using EMD and Rao-Blackwellised particle filtering In: ICASSP 2011, 2011-05-22 - 2011-05-27.
Jiang, W, Ho, ATS, Treharne, H and Yun-Qing, S (2011) Local Binary Patterns for Printer Identification based on Texture Analysis Technical Report.
Jones, B, Jin, Y, Sendhoff, B and Yao, X (2011) The effect of proprioceptive feedback on the distribution of sensory information in a model of an undulatory organism In: 10th European Conference, ECAL 2009, 2009-09-13 - 2009-09-16, Budapest, Hungary.
L
Li, CQ, Li, SJ and Lo, KT (2011) Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps Communications in Nonlinear Science and Numerical Simulation, 16 (2). pp. 837-843.
M
Manulis, M and Poettering, B (2011) Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation In: 6th ACM Symposium on Information, Computer and Communications Security, 2011-03-22 - 2011-03-24, Hong Kong.
Moran, M, Heather, JA and Schneider, SA (2011) Anonymity and CSP for Voting Systems In: CryptoForma 2011, 2011-06-21 - ?, Limerick.
N
Nazir, M, Javed, Y, Khan, MM, Khayam, SA and Li, SJ (2011) Poster: Captchæcker – Automating Usability-Security Evaluation of Textual CAPTCHAs [UNSPECIFIED]
P
Paukkeri, M-S, Kivimäki, I, Tirunagari, S, Oja, E and Honkela, T (2011) Effect of Dimensionality Reduction on Different Distance Measures in Document Clustering.
Perković, T, Mumtaz, A, Javed, Y, Li, SJ, Khayam, SA and Čagalj, M (2011) Breaking Undercover: Exploiting Design Flaws and Nonuniform Human Behavior In: 7th Symposium On Usable Privacy and Security (SOUPS 2011), 2011-07-20 - 2011-07-22, Carnegie Mellon University in Pittsburgh, PA, USA.
Q
Qadir, G, Zhao, X, Ho, ATS and Casey, MC (2011) Image Forensic of Glare Feature for Improving Image Retrieval Using Benford's Law In: IEEE ISCAS, 2011, 2011-05-15 - 2011-05-18, Rio de Janeiro, Brazil.
S
Sanei, S, Lee, TKM and Lee, TKM (2011) Detection of periodic signals using a new adaptive line enhancer based on singular spectrum analysis In: ICICS 2011, 2011-12-13 - 2011-12-16, Singapore.
Schmitz, R and Li, SJ (2011) Neue Entwicklungen in der e-Banking Security (Recent Developments in e-Banking Security) PIK - Praxis der Informationsverarbeitung und Kommunikation, 34 (4). pp. 176-184.
Schneider, S, Llewellyn, M, Culnane, C, Heather, J, Srinivasan, S and Xia, Z (2011) Focus group views on Prêt à Voter 1.0
Schneider, S and Treharne, H (2011) Changing system interfaces consistently: A new refinement strategy for CSP||B Science of Computer Programming, 76 (10). pp. 837-860.
Schneider, S, Treharne, H and Wehrheim, H (2011) A CSP Account of Event-B Refinement In: Refine 2011, 2011-06-20 - 2011-06-20, Limerick, Ireland.
Schneider, SA (2011) Security Analysis using Rank Functions in CSP In: Formal Models and Techniques for Analyzing Security Protocols. Cryptology and Information Security (10). IOS Press. ISBN 978-1-60750-713-0
Schneider, SA, Treharne, HE and Wehrheim, H (2011) Bounded Retransmission in Event-B||CSP: a Case Study Electronic Notes in Theoretical Computer Science, 280. pp. 69-80.
Schneider, Steve, Treharne, Helen and Wehrheim, Heike (2011) Stepwise Refinement in Event-B CSP. Part 1: Safety Technical Report. Department of Computing, University of Surrey. (Unpublished)
Schneider, Steve A., Treharne, Helen and Wehrheim, Heike (2011) Bounded Retransmission in Event-B||CSP: A Case Study Department of Computing, University of Surrey. (Unpublished)
Schramm, L, Jin, Y and Sendhoff, B (2011) Emerged coupling of motor control and morphological development in evolution of multi-cellular animats In: 10th European Conference, ECAL 2009, 2009-09-13 - 2009-09-16, Budapest, Hungary.
Schramm, L, Jin, Y and Sendhoff, B (2011) Redundancy creates opportunity in developmental representations
Sharp, James and Treharne, Helen (2011) CASE Technical Report: Automated Transformations from VHDL to CSP Technical Report. Department of Computing, University of Surrey. (Unpublished)
Sporea, I and Grüning, A (2011) Reference time in SpikeProp Proceedings of the International Joint Conference on Neural Networks. pp. 1090-1092.
Z
Zheng, Y, Meng, Y and Jin, Y (2011) Object recognition using a bio-inspired neuron model with bottom-up and top-down pathways Neurocomputing, 74 (17). pp. 3158-3169.