Now showing items 41-60 of 144

    • File server architecture for an open distributed document system 

      Christianson, B.; Hu, P. (University of Hertfordshire, 1994)
      In this paper we will investigate design and implementation strategies for a file server in an open distributed document system. The aim of the open distributed document system is to provide and environment where a group ...
    • Formal Systems, Not Methods 

      Loomes, M.; Christianson, B.; Davey, N. (2004)
      In this paper we will present an approach for teaching formalisms to Computer Science undergraduate students that has been developed over the past 23 years at the University of Hertfordshire (formerly Hatfield Polytechnic). ...
    • Further thoughts on precision 

      Gray, D.; Bowes, David; Davey, Neil; Sun, Yi; Christianson, B. (2011)
      Background: There has been much discussion amongst automated software defect prediction researchers regarding use of the precision and false positive rate classifier performance metrics. Aim: To demonstrate and explain why ...
    • Further thoughts on precision 

      Gray, D.; Bowes, David; Davey, N.; Sun, Yi; Christianson, B. (2011)
      Background: There has been much discussion amongst automated software defect prediction researchers regarding use of the precision and false positive rate classifier performance metrics. Aim: To demonstrate and explain why ...
    • Gearing up : How to eat your cryptocake and still have it 

      Shafarenko, A.; Christianson, B. (2011-01-01)
      Often Alice and Bob share a fixed quantity of master key and subsequently need to agree a larger amount of session key material. At present, they are inclined to be cautious about generating too much session key material ...
    • Geometric approach to Fletcher's ideal penalty function 

      Christianson, B. (1995)
      In this note, we derive a geometric formulation of an ideal penalty function for equality constrained problems. This differentiable penalty function requires no parameter estimation or adjustment, has numerical conditioning ...
    • Giving reverse differentiation a helping hand 

      Christianson, B.; Davies, A.; Dixon, Laurence; Roy, R.; van der Zee, P. (1997)
      Reverse automatic differentiation provides a very low bound on the operations count for calculating a gradient of a scalar function in n dimensions but suffers from a high storage requirement. In this paper we will show ...
    • Global convergence using de-linked Goldstein or Wolfe linesearch conditions 

      Christianson, B. (2009)
      Goldstein or Wolfe conditions can be imposed on a linesearch to ensure convergence of an iterative nonlinear optimization algorithm to a stationary point. However it is actually not necessary to find a single step which ...
    • Globalization of Pantoja's optimal control algorithm 

      Christianson, B.; Bartholomew-Biggs, M. (Springer Nature, 2002)
      In 1983 Pantoja described a stagewise construction of the Newton direction for a general class of discrete time optimal control problems. His algorithm incurs amazingly low overheads: the cost (measured in target function ...
    • Hades - towards the design of an asynchronous superscalar processor 

      Elston, C.J.; Christianson, B.; Findlay, P.; Steven, G.B. (University of Hertfordshire, 1995)
      Hades is a processor architecture aimed at single and multiple-instruction-issue asynchronous implementations. This paper uses a baseline version of Hades to illustrate some of the difficulties encountered in asynchronous ...
    • Hierarchical Trustworthy Authentication for Pervasive Computing 

      Xiao, Hannan; Malcolm, J.; Christianson, B. (Institute of Electrical and Electronics Engineers (IEEE), 2007)
    • High Capacity Associative Memories and Small World Networks 

      Davey, N.; Christianson, B.; Adams, R.G. (Institute of Electrical and Electronics Engineers (IEEE), 2004-07)
      Models of associative memory usually have full connectivity or if diluted, random symmetric connectivity. In contrast biological neural systems have predominantly local, non-symmetric connectivity. Here we investigate ...
    • Implementations of quantum logic : fundamental and experimental limits - Discussion 

      Christianson, B.; Knight, P.L.; Beth, T. (1998-08-15)
    • In the pink: the strange case of Trinity College Dublin 

      Christianson, B. (2004)
      According to the frontispiece of Taylor’s history of the University of Dublin, published in 1845, the MA hood of Trinity College was once lined with pink.1 However in Gutch’s table of 1858 the MA lining is listed as dark ...
    • Introduction : Alice doesn't live here anymore (transcript) 

      Christianson, B. (2011-01-01)
      Hello everyone and welcome to the 19th Security Protocols Workshop. The theme this year, which it is traditional to mention in the first session (and then never refer to again), is "Alice doesn't live here anymore". One ...
    • Introduction : Virtually perfect security (transcript of discussion) 

      Christianson, B. (Springer Nature, 2014)
      “Virtually Perfect Security” is an attempt to tie together three slightly different interlocking strands. The first is the fact that although we talk about security as if it were some sort of metaphysical property (so that ...
    • An introduction to the Hatfield superscalar architecture 

      Steven, G.B.; Christianson, B.; Collins, R.; Potter, R.; Steven, F.L. (University of Hertfordshire, 1996)
      If a high-performance superscalar processor is to realise its full potential, the complier must re-order or schedule the object code at compile time. This scheduling creates groups of adjacent instructions that are independent ...
    • Intrusion Detection System using Bayesian Network Modeling 

      Alocious, Chaminda; Abouzakhar, Nasser; Xiao, Hannan; Christianson, B. (ACPI (Academic Conference Publishing International), 2014-07)
      Computer Network Security has become a critical and important issue due to ever increasing cyber-crimes. Cybercrimes are spanning from simple piracy crimes to information theft in international terrorism. Defence security ...
    • Inverse systems of abstract Lebesgue spaces 

      Christianson, B. (1990)
      We show that inverse limits exist in the category of L spaces and positive linear contractions between them. This result generalizes the wellknown classical results for inverse systems of Choquet Simplexes and of L-balls, ...
    • Is your computing environment secure? Security problems with interrupt handling mechanisms 

      Christianson, B.; Hu, P. (University of Hertfordshire, 1995)
      In an open distributed system, resources must be shared among various users. Security is one of the major issues in designing such a system. When a computer system is connected to a network, it is very important to ensure ...