Now showing items 121-140 of 144

    • A self-stabilizing Pantoja-like indirect algorithm for optimal control 

      Christianson, B. (2001)
      In 1983 Pantoja described a computationally efficient stagewise construction of the Newton direction for the discrete time optimal control problem. Automatic Differentiation can be used to implement Pantoja's algorithm and ...
    • Sharing storage using dirty vectors 

      Christianson, B.; Dixon, L.; Brown, S. (Society for Industrial and Applied Mathematics (SIAM Press), 1996)
      Consider a computation F with n inputs (independent variables) and m outputs (dependent variables) and suppose that we wish to evaluate the Jacobian of F. Automatic differentiation commonly performs this evaluation by ...
    • Shrink-wrapped optimism: the DODA approach to distributed document processing 

      Christianson, B.; Snook, J.F. (University of Hertfordshire, 1994)
      In this paper we introduce a distributed object-based document architecture called DODA in order to illustrate a novel strategy for achieving both high availability and high integrity in the context of open processing ...
    • Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing 

      Christianson, B.; Snook, J.F. (2003)
      In this paper we introduce a distributed object-based document architecture called DODA in order to illustrate a novel strategy for achieving both high availability and high integrity in the context of open processing ...
    • Simulating Perceptions of Security 

      Wernick, Paul; Christianson, Bruce; Spring, William (Springer Nature, 2017-11-29)
      Systems complicated enough to have ongoing security issues are difficult to understand, and hard to model. The models are hard to understand, even when they are right (another reason they are usually wrong), and too ...
    • Software defect prediction using static code metrics underestimates defect-proneness 

      Gray, David; Bowes, David; Davey, N.; Sun, Yi; Christianson, B. (Institute of Electrical and Electronics Engineers (IEEE), 2010)
      Many studies have been carried out to predict the presence of software code defects using static code metrics. Such studies typically report how a classifier performs with real world data, but usually no analysis of the ...
    • A superscalar architecture to exploit instruction level parallelism 

      Steven, G.B.; Christianson, B.; Collins, R.; Steven, F.L.; Potter, R. (1997-03-17)
      If a high-performance superscalar processor is to realise its full potential, the compiler must re-order or schedule the object code at compile time. This scheduling creates groups of adjacent instructions that are independent ...
    • A Survey of Access Control Models in Wireless Sensor Networks 

      Maw, Htoo Aung; Xiao, Hannan; Christianson, B.; Malcolm, James (2014-06-20)
      Wireless sensor networks (WSNs) have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote ...
    • Technique for authentication, access control and resource management in open distributed systems 

      Low, M.R.; Christianson, B. (1994)
      A consistent approach to authentication and access control is proposed. In this new approach, resource management is included. By combining the properties of public key encryption with cascading proxies a single mechanism ...
    • Testing should help to insert new bugs or how to modify programs predictably? 

      Christianson, B.; Barrett, R. (University of Hertfordshire, 1992)
      Software maintenance is often regarded as consisting of two different activities, fixing bugs and modifying the code to adapt to changing requirements. We argue that these activities are really two faces of the same coin, ...
    • Theatre as a Discussion Tool in Human-Robot Interaction Experiments : A Pilot Study 

      Chatley, A.R.; Dautenhahn, K.; Walters, M.L.; Syrdal, D.S.; Christianson, B. (Institute of Electrical and Electronics Engineers (IEEE), 2010)
      In the field of Human-Robot Interaction (HRI), a novel experimental methodology is presented for carrying out studies which uses a theatrical presentation with an actor interacting and cooperating with robots in realistic ...
    • To whom am I speaking? Remote booting in a hostile world 

      Lomas, M.; Christianson, B. (University of Hertfordshire, 1994)
      We consider the problem of booting a workstation across a network. We allow "maintenance" (that is, change without notice by untrusted parties such as adversaries and system managers) to be freely performed upon the network, ...
    • Towards an Energy Efficient Branch Prediction Scheme Using Profiling, Adaptive Bias Measurement and Delay Region Scheduling. 

      Hicks, M.; Egan, C.; Christianson, B.; Quick, P. (2007)
      Dynamic branch predictors account for between 10% and 40% of a processor’s dynamic power consumption. This power cost is proportional to the number of accesses made to that dynamic predictor during a program’s execution. ...
    • Trust*: Using Local Guarantees to Extend the Reach of Trust 

      Clarke, Stephen; Christianson, B.; Xiao, Hannan (Springer Nature, 2013)
      We propose a new concept called trust* as a way of avoiding the necessity to transitively trust others in a range of distributed environments. The trust* approach uses guarantees based upon already established trust ...
    • Trustworthiness and Authentication in Ubiquitous Computing 

      Xiao, Hannan; Malcolm, James; Christianson, B.; Zhang, Y. (ACM Press, 2012-10)
      In a pervasive computing environment, principle authentication veries if a person is the one he claims to be. However, being sure that you are talking to the expected entity does not mean this entity is trusted to do what ...
    • Using the support vector machine as a classification method for software defect prediction with static code metrics 

      Gray, David; Bowes, D.; Davey, N.; Sun, Yi; Christianson, B. (2009)
      The automated detection of defective modules within software systems could lead to reduced development costs and more reliable software. In this work the static code metrics for a collection of modules contained within ...
    • Vintage Bit Cryptography 

      Christianson, B.; Shafarenko, A. (2009)
      We propose to use a Random High-Rate Binary (RHRB) stream for the purpose of key distribution. The idea is as follows. Assume availability of a high-rate (terabits per second) broadcaster sending random content. Members ...
    • Wearing Mummy's clothes: an introduction to academical archaeology 

      Groves, N.; Christianson, B. (2004)
      This note is based upon the observation that the academic dress (AD) adopted by (former) British colonies and dominions potentially provides an archaeological record of UK AD.
    • What Software Evolution and Biological Evolution Don't Have in Common 

      Nehaniv, C.L.; Hewitt, J.; Christianson, B.; Wernick, P. (Institute of Electrical and Electronics Engineers (IEEE), 2006)
      Understanding software change as an evolutionary process analogous to biological evolution is an increasingly popular approach to software evolvability but requires some caution. Issues of evolvability make sense not only ...