University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Browse by Publication

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Number of items: 31.

Chen, L, Laing, TM and Martin, KM (2017) Revisiting and extending the AONT-RS scheme: a robust computationally secure secret sharing scheme In: 9th International Conference on Cryptology and Information Security. AFRICACRYPT 2017, 2017-05-24 - 2017-05-26, Dakar, Senegal.

Zakarya, M and Gillam, L (2017) An energy aware cost recovery approach for virtual machine migration In: 13th International Conference on Economics of Grids, Clouds, Systems and Services, 2016-09-20 - 2016-09-22, Athens, Greece.

Hadfield, SJ, Bowden, R and Lebeda, K (2016) The Visual Object Tracking VOT2016 Challenge Results In: European Conference on Computer Vision (ECCV) 2016 workshops, 2016-10-08-2016-10-10, Amsterdam, Netherlands.

Alghamdi, HS, Tang, HL, Waheeb, SA and Peto, T (2016) Automatic Optic Disc Abnormality Detection in Fundus Images: A Deep Learning Approach In: OMIA3 (MICCAI 2016), 2016-10-17 - 2016-10-21, Athens.

Simpson, AR, Roma, G and Plumbley, M (2015) Deep Karaoke: Extracting Vocals from Musical Mixtures Using a Convolutional Deep Neural Network In: Latent Variable Analysis and Signal Separation: 12th International Conference, LVA/ICA 2015, 25-28 Aug 2015, Liberec, Czech Republic.

Schneider, S, Treharne, H, Wehrheim, H and Williams, D (2014) Managing LTL properties in Event-B refinement Lecture Notes in Computer Science. pp. 221-237.

Lebeda, Karel, Matas, Jiri and Bowden, Richard (2013) Tracking the Untrackable: How to Track When Your Object Is Featureless In: ACCV workshop on Detection and Tracking in Challenging Environments, 5-9 November 2012, Daejeon, South Korea.

Panov, M, Tatarchuk, A, Mottl, V and Windridge, D (2011) A modified neutral point method for kernel-based fusion of pattern-recognition modalities with incomplete data sets Lecture Notes in Computer Science, 6713. pp. 126-136.

Abdel Halim, I, Sharp, J, Schneider, S and Treharne, H (2010) Formal Verification of Tokeneer Behaviours Modelled in fUML Using CSP In: 12th International Conference on Formal Engineering Methods, 2010-11-17 - 2010-11-19, Shanghai, China.

Yusoff, N and Grüning, A (2010) Supervised Associative Learning in Spiking Neural Network In: Artificial Neural Networks – ICANN 2010, 2010-09-15 - 2010-09-18, Thessaloniki, Greece.

Yusoff, N and Grüning, A (2010) Supervised Associative Learning in Spiking Neural Network In: Artificial Neural Networks – ICANN 2010, 2010-09-15 - 2010-09-18, Thessaloniki, Greece.

Xia, Z, Culnane, C, Heather, JA, Jonker, H, Ryan, PYA, Schneider, SA and Srinivasan, S (2010) Versatile Pret a Voter: Handling Multiple Election Methods with a Unified Interface In: Indocrypt, 2010-12-12 - 2010-12-15, Hyderabad, India.

Barnaghi, P, Moessner, K, Presser, M and Meissner, S (2009) Preface In: 4th European Conference, EuroSSC 2009, 2009-09-16 - 2009-09-18, Guildford, UK.

Heather, J and Wei, K (2009) Where next for formal methods? Lecture Notes in Computer Science, 5087. pp. 52-58.

Brown, AW and McDermid, J (2007) The Art and Science of Software Architecture

Brown, AW, Delbaere, M and Johnston, S (2007) A Practical Perspective on the Design and Implementation of Service-oriented Solutions

Brown, AW and Johnston, SK (2006) A Model-driven Development Approach to Creating Service-oriented Solutions

Jin, Y, Sendhoff, B and Körner, E (2005) Evolutionary multi-objective optimization for simultaneous generation of signal-type and symbol-type representations

Jin, Y, Olhofer, M and Sendhoff, B (2005) On evolutionary optimization of large problems using small populations

Chaum, D, Ryan, PYA and Schneider, SA (2005) A Practical Voter-Verifiable Election Scheme. In: European Symposium on Research in Computer Security, 2005-09-12 - 2005-09-14, Milan, Italy.

Schneider, S and Treharne, H (2004) Verifying Controlled Components. In: 4th International Conference on Integrated Formal Methods, 2004 - ?.

Schneider, SA and Delicata, R (2004) Verifying Security Protocols: An Application of CSP. In: Communicating Sequential Processes: The First 25 Years, Symposium on the Occasion of 25 Years of CSP, 2004-07-07 - 2004-07-08, London.

Treharne, H, Schneider, S and Bramble, M (2003) Composing Specifications Using Communication. Lecture Notes in Computer Science, 2651. pp. 58-78.

Brown, AW and Booch, G (2002) Reusing open Source Software and Practices In: 7th International Conference on Software Reuse, 2002-04-15 - 2002-04-19, Austin, Texas.

Schneider, S and Treharne, H (2002) Communicating B Machines. Lecture Notes in Computer Science, 2272. pp. 416-435.

Starck, J and Hilton, A (2002) Reconstruction of animated models from images using constrained deformable surfaces In: 10th Conf. on Discrete Geometry for Computer Imagery, 2002-04-03 - ?.

Evans, N and Schneider, S (2000) Analysing Time Dependent Security Properties in CSP Using PVS. In: European Symposium on Research in Computer Security, 2000-10-04 - 2000-10-06, Toulouse, France.

Treharne, H and Schneider, S (2000) How to Drive a B Machine. In: ZB 2000: Formal Specification and Development in Z and B, First International Conference of B and Z Users, 2000-08-29 - 2000-09-02, York, UK.

Treharne, H, Draper, J and Schneider, S (1998) Test Case Preparation Using a Prototype. In: B’98: Recent Advances in the Development and Use of the B Method, 1998 - ?.

Dutertre, B and Schneider, S (1997) Using a PVS Embedding of CSP to Verify Authentication Protocols. In: 10th International Conference on Theorem Proving in Higher Order Logics, 1997-08-19 - 1997-08-22, Murray Hill, NJ, USA.

Schneider, SA and Heather, JA A Formal Framework for Modelling Coercion Resistance and Receipt Freeness In: FM 2012: 18th International Symposium on Formal Methods, 2012-08-27 - 2012-08-31.

This list was generated on Sat May 27 04:22:22 2017 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800