- UHRA Home
- University of Hertfordshire
- Browsing University of Hertfordshire by Author
Browsing University of Hertfordshire by Author "Christianson, B."
Now showing items 41-60 of 144
-
File server architecture for an open distributed document system
Christianson, B.; Hu, P. (University of Hertfordshire, 1994)In this paper we will investigate design and implementation strategies for a file server in an open distributed document system. The aim of the open distributed document system is to provide and environment where a group ... -
Formal Systems, Not Methods
Loomes, M.; Christianson, B.; Davey, N. (2004)In this paper we will present an approach for teaching formalisms to Computer Science undergraduate students that has been developed over the past 23 years at the University of Hertfordshire (formerly Hatfield Polytechnic). ... -
Further thoughts on precision
Gray, D.; Bowes, David; Davey, Neil; Sun, Yi; Christianson, B. (2011)Background: There has been much discussion amongst automated software defect prediction researchers regarding use of the precision and false positive rate classifier performance metrics. Aim: To demonstrate and explain why ... -
Further thoughts on precision
Gray, D.; Bowes, David; Davey, N.; Sun, Yi; Christianson, B. (2011)Background: There has been much discussion amongst automated software defect prediction researchers regarding use of the precision and false positive rate classifier performance metrics. Aim: To demonstrate and explain why ... -
Gearing up : How to eat your cryptocake and still have it
Shafarenko, A.; Christianson, B. (2011-01-01)Often Alice and Bob share a fixed quantity of master key and subsequently need to agree a larger amount of session key material. At present, they are inclined to be cautious about generating too much session key material ... -
Geometric approach to Fletcher's ideal penalty function
Christianson, B. (1995)In this note, we derive a geometric formulation of an ideal penalty function for equality constrained problems. This differentiable penalty function requires no parameter estimation or adjustment, has numerical conditioning ... -
Giving reverse differentiation a helping hand
Christianson, B.; Davies, A.; Dixon, Laurence; Roy, R.; van der Zee, P. (1997)Reverse automatic differentiation provides a very low bound on the operations count for calculating a gradient of a scalar function in n dimensions but suffers from a high storage requirement. In this paper we will show ... -
Global convergence using de-linked Goldstein or Wolfe linesearch conditions
Christianson, B. (2009)Goldstein or Wolfe conditions can be imposed on a linesearch to ensure convergence of an iterative nonlinear optimization algorithm to a stationary point. However it is actually not necessary to find a single step which ... -
Globalization of Pantoja's optimal control algorithm
Christianson, B.; Bartholomew-Biggs, M. (Springer Nature, 2002)In 1983 Pantoja described a stagewise construction of the Newton direction for a general class of discrete time optimal control problems. His algorithm incurs amazingly low overheads: the cost (measured in target function ... -
Hades - towards the design of an asynchronous superscalar processor
Elston, C.J.; Christianson, B.; Findlay, P.; Steven, G.B. (University of Hertfordshire, 1995)Hades is a processor architecture aimed at single and multiple-instruction-issue asynchronous implementations. This paper uses a baseline version of Hades to illustrate some of the difficulties encountered in asynchronous ... -
Hierarchical Trustworthy Authentication for Pervasive Computing
Xiao, Hannan; Malcolm, J.; Christianson, B. (Institute of Electrical and Electronics Engineers (IEEE), 2007) -
High Capacity Associative Memories and Small World Networks
Davey, N.; Christianson, B.; Adams, R.G. (Institute of Electrical and Electronics Engineers (IEEE), 2004-07)Models of associative memory usually have full connectivity or if diluted, random symmetric connectivity. In contrast biological neural systems have predominantly local, non-symmetric connectivity. Here we investigate ... -
Implementations of quantum logic : fundamental and experimental limits - Discussion
Christianson, B.; Knight, P.L.; Beth, T. (1998-08-15) -
In the pink: the strange case of Trinity College Dublin
Christianson, B. (2004)According to the frontispiece of Taylor’s history of the University of Dublin, published in 1845, the MA hood of Trinity College was once lined with pink.1 However in Gutch’s table of 1858 the MA lining is listed as dark ... -
Introduction : Alice doesn't live here anymore (transcript)
Christianson, B. (2011-01-01)Hello everyone and welcome to the 19th Security Protocols Workshop. The theme this year, which it is traditional to mention in the first session (and then never refer to again), is "Alice doesn't live here anymore". One ... -
Introduction : Virtually perfect security (transcript of discussion)
Christianson, B. (Springer Nature, 2014)“Virtually Perfect Security” is an attempt to tie together three slightly different interlocking strands. The first is the fact that although we talk about security as if it were some sort of metaphysical property (so that ... -
An introduction to the Hatfield superscalar architecture
Steven, G.B.; Christianson, B.; Collins, R.; Potter, R.; Steven, F.L. (University of Hertfordshire, 1996)If a high-performance superscalar processor is to realise its full potential, the complier must re-order or schedule the object code at compile time. This scheduling creates groups of adjacent instructions that are independent ... -
Intrusion Detection System using Bayesian Network Modeling
Alocious, Chaminda; Abouzakhar, Nasser; Xiao, Hannan; Christianson, B. (ACPI (Academic Conference Publishing International), 2014-07)Computer Network Security has become a critical and important issue due to ever increasing cyber-crimes. Cybercrimes are spanning from simple piracy crimes to information theft in international terrorism. Defence security ... -
Inverse systems of abstract Lebesgue spaces
Christianson, B. (1990)We show that inverse limits exist in the category of L spaces and positive linear contractions between them. This result generalizes the wellknown classical results for inverse systems of Choquet Simplexes and of L-balls, ... -
Is your computing environment secure? Security problems with interrupt handling mechanisms
Christianson, B.; Hu, P. (University of Hertfordshire, 1995)In an open distributed system, resources must be shared among various users. Security is one of the major issues in designing such a system. When a computer system is connected to a network, it is very important to ensure ...