Now showing items 21-40 of 144

    • The challenges of efficient code-generation for massively parallel architectures 

      McGuiness, Jason M.; Egan, Colin; Christianson, B.; Gao, Guang (2006)
      Overcoming the memory wall [15] may be achieved by increasing the bandwidth and reducing the latency of the processor to memory connection, for example by implementing Cellular architectures, such as the IBM Cyclops. Such ...
    • Cheap Newton steps for optimal control problems: automatic differentiation and Pantoja's algorithm 

      Christianson, B. (1999)
      In this paper we discuss Pantoja's construction of the Newton direction for discrete time optimal control problems. We show that automatic differentiation (AD) techniques can be used to calculate the Newton direction ...
    • Computing in the 21st century : nanocircuitry, defect tolerance and quantum logic - Discussion 

      Christianson, B.; Williams, N. S.; Beth, T.; Williams, R. S. (1998-08-15)
    • Concluding discussion - When does confidentiality harm security? 

      Christianson, B.; Aura, T; Wheeler, D; Harbison, W; Gligor, V; Paulson, L; Blaze, M; Ioannidis, J (2002)
      Bruce Christianson: We’ve just about got to the point now where we can see how real communities could actually achieve genuinely secure end-to-end confidentiality in a heterogeneous dynamic mobile environment. That’s still ...
    • Delegation and not-so smart cards 

      Christianson, B.; Malcolm, J. (1999)
      We consider three aspects of delegation: What kinds of binding are required between real world artifacts and bit patterns? What are the atomic elements of a security policy and in what ways must they fit together? What are ...
    • A different approach of using Personas in human-robot interaction : Integrating Personas as computational models to modify robot companions' behaviour 

      Duque, I.; Dautenhahn, K.; Koay, K.L.; Willcock, L.; Christianson, B. (Institute of Electrical and Electronics Engineers (IEEE), 2013)
      The current paper focuses on a novel integration of the Personas technique into HRI studies, and the definition of a Persona-Based Computational Behaviour Model for achieving socially intelligent robot companions in living ...
    • Directed Acyclic Graphs 

      Christianson, B.; Santanu, Dash (2015-12-16)
      This source code implements a unified framework for pre-processing Directed Acyclic Graphs (DAGs) to lookup reachability between two vertices as well as compute the least upper bound of two vertices in constant time. Our ...
    • Doctors' greens 

      Christianson, B. (2006)
      Everybody knows that doctors wear scarlet, at least on red-letter days. Many are aware that, in addition to scarlet, Henry VIII’s Act lists cloth of the colours mulberry and violet as proper alternatives to black for the ...
    • A Domain-Oriented Approach for Access Control in Pervasive Environments 

      Li, J.; Christianson, B. (Institute of Electrical and Electronics Engineers (IEEE), 2008)
      Pervasive computing envisions an environment in which we are surrounded by many embedded computer devices. Those networked devices provide us with a mobile, spontaneous and dynamic way to access various resources provided ...
    • A Dynamic Reputation Management System for Mobile Ad Hoc Networks 

      Chiejina, Eric; Xiao, Hannan; Christianson, B. (2015-04-17)
      Nodes in mobile ad hoc networks (MANETs) are mandated to utilize their limited energy resources in forwarding routing control and data packets for other nodes. Since a MANET lacks a centralized administration and control, ...
    • A Dynamic Reputation Management System for Mobile Ad Hoc Networks 

      Chiejina, Eric; Xiao, Hannan; Christianson, B. (Institute of Electrical and Electronics Engineers (IEEE), 2014-11-20)
      Nodes in mobile ad hoc networks (MANETs) are mandated to utilize their limited energy resources in forwarding routing control and data packets for other nodes. Since a MANET lacks a centralized administration and control, ...
    • Energy Consumption in Mobile Ad Hoc Networks 

      Xiao, Hannan; Ibrahim, Dashti; Christianson, B. (Institute of Electrical and Electronics Engineers (IEEE), 2014-04)
      Mobile Ad hoc Networks (MANETs) are composed of moving mobile nodes that are battery operated. This paper proposes a set of performance metrics in evaluating energy efficiency in MANETs, and studies the energy consumption ...
    • An enhanced fuzzy ARM approach for intrusion detection 

      Abouzakhar, N.S.; Chen, H.; Christianson, B. (2011-04-01)
      The integration of fuzzy logic with data mining methods such as association rules has achieved interesting results in various digital forensics applications. As a data mining technique, the association rule mining (ARM) ...
    • Enhancements to Prepare-and-Measure Based QKD Protocols 

      Ryan, Peter Y.A.; Christianson, B. (Springer Nature, 2013)
      We propose some simple changes to a class of Quantum Key Distribution protocols. The first enhancement ensures early detection of any attempted Man-in-the-Middle attack and results in less leakage of key material to any ...
    • An evaluation of break-the-glass access control model for medical data in wireless sensor networks 

      Maw, Htoo Aung; Xiao, Hannan; Christianson, B.; Malcolm, James (Institute of Electrical and Electronics Engineers (IEEE), 2015-01)
      Wireless Sensor Networks (WSNs) have recently attracted a lot of attention in the research community because it is easy to deploy them in the physical environment and collect and disseminate environmental data from them. ...
    • Evaluation of Logarithmic integrals in two dimensional boundary element computation 

      Davies, A.; Crann, D.; Christianson, B. (Queen Mary, Univ of London, 2003)
    • The evolution of the Oxford simple shape 

      Christianson, B. (2002)
      The Oxford simple shape could, with some justification, be described as one of the ugliest and least dignified hood patterns in the world. This short paper takes as premise the belief that all Oxford hoods were at one time ...
    • Exploring robot etiquette : Refining a HRI home companion scenario based on feedback from two artists who lived with robots in the UH robot house 

      Koay, K.L.; Walters, M.L.; May, A.; Dumitriu, A.; Christianson, B.; Burke, N.; Dautenhahn, K. (Springer Nature, 2013-12)
      This paper presents an exploratory Human-Robot Interaction study which investigated robot etiquette, in particular focusing on understanding the types and forms of robot behaviours that people might expect from a robot ...
    • Extending Trust in Peer-to-Peer Networks 

      Clarke, S.; Christianson, B.; Xiao, Hannan (2010)
      This paper presents a way of reducing the risk involved with downloading corrupt content from unknown (and hence untrusted) principals in a P2P network. This paper gives a brief overview of the need for trust in P2P networks, ...
    • “Fair” Authentication in Pervasive Computing 

      Christianson, B.; Li, J.; Loomes, M. (2006)
      Authentication is traditionally required to be strong enough to distinguish legitimate entities from unauthorised entities, and always involves some form of proof of identity, directly or indirectly. Conventional storable ...