Now showing items 101-120 of 144

    • Reflections on academic leadership 

      Loomes, M.J.; Christianson, B. (2006)
      This article introduces some reflections on the aspect of teaching and learning that is often called ‘academic leadership’. Programme tutors, curriculum developers and those with special responsibility for academic quality, ...
    • Relative width of sublattices 

      Christianson, B. (1991)
      Kendall has given a geometrical characterization of vector lattices among the vector spaces with a generating cone. The characterizing property is that the cone should have a linearly compact simplex as a base. Among the ...
    • Relay-proof channels using UWB lasers 

      Christianson, B.; Shafarenko, Alex; Stajano, Frank; Wong, Ford-Long (Springer Nature, 2014)
      Alice is a hand-held device. Bob is a device providing a service, such as an ATM, an automatic door, or an anti-aircraft gun pointing at the gyro-copter in which Alice is travelling. Bob and Alice have never met, but share ...
    • Remodelling the attacker : (transcript of discussion) 

      Christianson, B. (2011)
      Welcome to the 16th Security Protocols Workshop, or the XVIth Workshop for those of you still think in Latin, and consequently don't regard IP6 as an advance over IPv1. Our theme this year, the Mornington Crescent of ...
    • Remote booting in a hostile world: to whom am I speaking? [Computer security] 

      Lomas, M.; Christianson, B. (1995)
      Today's networked computer systems are very vulnerable to attack: terminal software, like that used by the X Window System, is frequently passed across a network, and a trojan horse can easily be inserted while it is in ...
    • Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks 

      Alocious, Chaminda; Xiao, Hannan; Christianson, B. (Institute of Electrical and Electronics Engineers (IEEE), 2016-04)
      Wireless network security requirements are becoming more important and critical. The modern network security architectures require more attention to provide security in each network layer. This will require understanding ...
    • Reverse accumulation and accurate rounding error estimates for taylor series coefficient 

      Christianson, B. (1992)
      We begin by extending the technique of reverse accumulation so as to obtain gradients of univariate Taylor series coefficients. This is done by re-interpreting the same formulae used to reverse accumulategradients in the ...
    • Reverse accumulation and attractive fixed points 

      Christianson, B. (1994)
      We apply reverse accumulation to obtain automatic gradients and error estimates of functions which include in their computation a convergent iteration of the form y= Φ(y,u), where y and u are vectors. We suggest an ...
    • Reverse accumulation and implicit functions 

      Christianson, B. (1998)
      We begin by introducing a simple technique for using reverse accumulation the first derivatives of target functions which include in their construction the solution of systems of linear or nonlinear equations. In the linear ...
    • Reverse accumulation of functions containing gradients 

      Christianson, B. (1993)
      We extend the technique of reverse accumulation so as to allow efficient extraction of gradients of scalar valued functions which are themselves constructed by composing operations which include taking derivatives of ...
    • Reverse differentiation and the inverse diffusion problem 

      Davies, A.J.; Christianson, B.; Dixon, Laurence; Roy, R; van der Zee, P. (1997-06)
      In this paper the task of solving the inverse photon diffusion problem in human tissue will be discussed. In such problems the optical properties of the tissue are to be determined from a knowledge of measured values of ...
    • The Role of Publications and Other Artefacts in Submissions for the UK PhD 

      Christianson, B.; Elliot, Martin; Massey, Ben (UK Council for Graduate Education, 2015-02)
      The traditional examination format for PhD degrees in the UK is the chapter-based dissertation as the basis for oral examination. However pressures to publish prior to thesis submission and hence to allow incorporation of ...
    • Roles and rights 

      Low, M.R.; Christianson, B. (University of Hertfordshire, 1995)
      In this paper we describe and discuss a protection model designed by Coulouris and Dollimore to protect objects which are shared by different principals participating in a co-operative task. We then show that the ...
    • A scalable approach to computing representative lowest common ancestor in directed acyclic graphs 

      Dash, Santanu; Scholz, Sven-Bodo; Herhut, Stephan; Christianson, B. (2013-11)
      LCA computation for vertex pairs in trees can be achieved in constant time after linear-time preprocessing. However, extension of these techniques to compute LCA for vertex-pairs in DAGs has been not possible due to the ...
    • Second-order adjoints by source code manipulation of numerical programs 

      Naumann, U.; Maier, M.; Riehme, Jan; Christianson, B. (RWTH Aachen, 2007)
      The analysis and modification of numerical programs in the context of generating and optimizing adjoint code automatically probably ranges among the technically and theoretically most challenging source transformation ...
    • Secure Sessions from Weak Secrets 

      Christianson, B.; Roe, M.; Wheeler, D. (2005)
      Sometimes two parties who already share a weak secret k such as a password wish to share also a strong secret s such as a session key without revealing information about k to an active attacker. We assume that both parties ...
    • Security protocol deployment risk : (transcript of discussion) 

      Christianson, B. (2011)
      The level of confidence you need in the secrecy of the key you are using to upload your initials to the high score on Tour of Duty is probably different to the confidence you need to do a multi-million pound transaction. ...
    • Security Protocols XIX : 19th International Workshop 

      Christianson, B.; Crispo, Bruno; Malcolm, James; Stajano, Frank; School of Computer Science; Science & Technology Research Institute (Springer Nature, 2011)
    • Security Protocols XVI : 16th International Workshop 

      Christianson, B.; Malcolm, James; Matyas, Vashek; Roe, Michael; School of Computer Science; Science & Technology Research Institute (Springer Nature, 2011)
    • Self authenticating proxies 

      Low, M.R.; Christianson, B. (University of Hertfordshire, 1994)
      Authentication and access control are usually implemented as two separate protection mechanisms because they are logically separate functions. A consistent approach to both of these functions is proposed in this paper. In ...