- UHRA Home
- University of Hertfordshire
- Browsing University of Hertfordshire by Author
Browsing University of Hertfordshire by Author "Christianson, B."
Now showing items 121-140 of 144
-
A self-stabilizing Pantoja-like indirect algorithm for optimal control
Christianson, B. (2001)In 1983 Pantoja described a computationally efficient stagewise construction of the Newton direction for the discrete time optimal control problem. Automatic Differentiation can be used to implement Pantoja's algorithm and ... -
Sharing storage using dirty vectors
Christianson, B.; Dixon, L.; Brown, S. (Society for Industrial and Applied Mathematics (SIAM Press), 1996)Consider a computation F with n inputs (independent variables) and m outputs (dependent variables) and suppose that we wish to evaluate the Jacobian of F. Automatic differentiation commonly performs this evaluation by ... -
Shrink-wrapped optimism: the DODA approach to distributed document processing
Christianson, B.; Snook, J.F. (University of Hertfordshire, 1994)In this paper we introduce a distributed object-based document architecture called DODA in order to illustrate a novel strategy for achieving both high availability and high integrity in the context of open processing ... -
Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing
Christianson, B.; Snook, J.F. (2003)In this paper we introduce a distributed object-based document architecture called DODA in order to illustrate a novel strategy for achieving both high availability and high integrity in the context of open processing ... -
Simulating Perceptions of Security
Wernick, Paul; Christianson, Bruce; Spring, William (Springer Nature, 2017-11-29)Systems complicated enough to have ongoing security issues are difficult to understand, and hard to model. The models are hard to understand, even when they are right (another reason they are usually wrong), and too ... -
Software defect prediction using static code metrics underestimates defect-proneness
Gray, David; Bowes, David; Davey, N.; Sun, Yi; Christianson, B. (Institute of Electrical and Electronics Engineers (IEEE), 2010)Many studies have been carried out to predict the presence of software code defects using static code metrics. Such studies typically report how a classifier performs with real world data, but usually no analysis of the ... -
A superscalar architecture to exploit instruction level parallelism
Steven, G.B.; Christianson, B.; Collins, R.; Steven, F.L.; Potter, R. (1997-03-17)If a high-performance superscalar processor is to realise its full potential, the compiler must re-order or schedule the object code at compile time. This scheduling creates groups of adjacent instructions that are independent ... -
A Survey of Access Control Models in Wireless Sensor Networks
Maw, Htoo Aung; Xiao, Hannan; Christianson, B.; Malcolm, James (2014-06-20)Wireless sensor networks (WSNs) have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote ... -
The system likes you : (transcript of discussion)
Christianson, B. (2007) -
Technique for authentication, access control and resource management in open distributed systems
Low, M.R.; Christianson, B. (1994)A consistent approach to authentication and access control is proposed. In this new approach, resource management is included. By combining the properties of public key encryption with cascading proxies a single mechanism ... -
Testing should help to insert new bugs or how to modify programs predictably?
Christianson, B.; Barrett, R. (University of Hertfordshire, 1992)Software maintenance is often regarded as consisting of two different activities, fixing bugs and modifying the code to adapt to changing requirements. We argue that these activities are really two faces of the same coin, ... -
Theatre as a Discussion Tool in Human-Robot Interaction Experiments : A Pilot Study
Chatley, A.R.; Dautenhahn, K.; Walters, M.L.; Syrdal, D.S.; Christianson, B. (Institute of Electrical and Electronics Engineers (IEEE), 2010)In the field of Human-Robot Interaction (HRI), a novel experimental methodology is presented for carrying out studies which uses a theatrical presentation with an actor interacting and cooperating with robots in realistic ... -
To whom am I speaking? Remote booting in a hostile world
Lomas, M.; Christianson, B. (University of Hertfordshire, 1994)We consider the problem of booting a workstation across a network. We allow "maintenance" (that is, change without notice by untrusted parties such as adversaries and system managers) to be freely performed upon the network, ... -
Towards an Energy Efficient Branch Prediction Scheme Using Profiling, Adaptive Bias Measurement and Delay Region Scheduling.
Hicks, M.; Egan, C.; Christianson, B.; Quick, P. (2007)Dynamic branch predictors account for between 10% and 40% of a processor’s dynamic power consumption. This power cost is proportional to the number of accesses made to that dynamic predictor during a program’s execution. ... -
Trust*: Using Local Guarantees to Extend the Reach of Trust
Clarke, Stephen; Christianson, B.; Xiao, Hannan (Springer Nature, 2013)We propose a new concept called trust* as a way of avoiding the necessity to transitively trust others in a range of distributed environments. The trust* approach uses guarantees based upon already established trust ... -
Trustworthiness and Authentication in Ubiquitous Computing
Xiao, Hannan; Malcolm, James; Christianson, B.; Zhang, Y. (ACM Press, 2012-10)In a pervasive computing environment, principle authentication veries if a person is the one he claims to be. However, being sure that you are talking to the expected entity does not mean this entity is trusted to do what ... -
Using the support vector machine as a classification method for software defect prediction with static code metrics
Gray, David; Bowes, D.; Davey, N.; Sun, Yi; Christianson, B. (2009)The automated detection of defective modules within software systems could lead to reduced development costs and more reliable software. In this work the static code metrics for a collection of modules contained within ... -
Vintage Bit Cryptography
Christianson, B.; Shafarenko, A. (2009)We propose to use a Random High-Rate Binary (RHRB) stream for the purpose of key distribution. The idea is as follows. Assume availability of a high-rate (terabits per second) broadcaster sending random content. Members ... -
Wearing Mummy's clothes: an introduction to academical archaeology
Groves, N.; Christianson, B. (2004)This note is based upon the observation that the academic dress (AD) adopted by (former) British colonies and dominions potentially provides an archaeological record of UK AD. -
What Software Evolution and Biological Evolution Don't Have in Common
Nehaniv, C.L.; Hewitt, J.; Christianson, B.; Wernick, P. (Institute of Electrical and Electronics Engineers (IEEE), 2006)Understanding software change as an evolutionary process analogous to biological evolution is an increasingly popular approach to software evolvability but requires some caution. Issues of evolvability make sense not only ...