Research publications: Recent submissions
Now showing items 8961-8980 of 9764
-
Technique for authentication, access control and resource management in open distributed systems
(1994)A consistent approach to authentication and access control is proposed. In this new approach, resource management is included. By combining the properties of public key encryption with cascading proxies a single mechanism ... -
Key-spoofing attacks on nested signature blocks
(1995)For a given signature block and any other data, there exists a key which produces the same signature block. The threat that this poses to schemes which use nested signature blocks as pointers to other tokens is identified, ... -
Optimizing Preventive Maintenance Models.
(2005)We consider the problem of scheduling preventive maintenance so as to minimize the expected total repair and replacement costs over the lifetime of a system. Our AD-based approach involves some non-standard features, such ... -
“Fair” Authentication in Pervasive Computing
(2006)Authentication is traditionally required to be strong enough to distinguish legitimate entities from unauthorised entities, and always involves some form of proof of identity, directly or indirectly. Conventional storable ... -
Formal Systems, Not Methods
(2004)In this paper we will present an approach for teaching formalisms to Computer Science undergraduate students that has been developed over the past 23 years at the University of Hertfordshire (formerly Hatfield Polytechnic). ... -
Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing
(2003)In this paper we introduce a distributed object-based document architecture called DODA in order to illustrate a novel strategy for achieving both high availability and high integrity in the context of open processing ... -
Auditable Anonymous Delegation
(2005)The contribution of this paper is an alternative mechanism for delegation, whereby users can share their credentials in such a way that it is difficult for the delegatee to re-use credentials of the delegator. An auditor ... -
Anonymous Context Based Role Activation Mechanism
(2005)Privacy is not an explicit goal of traditional authorisation mechanisms. The contribution of this paper is an authorisation mechanism which takes identity out of the trust management envelope. Our protocol supports weak ... -
Wavelet neural network approach for fault diagnosis of analogue circuits
(2004)A systematic method for fault diagnosis of analogue circuits based on the combination of neural networks and wavelet transforms is presented. Using wavelet decomposition as a tool for removing noise from the sampled signals, ... -
Tuning of leapfrog multiple loop feedback bandpass filters
(2001)Off-line tuning of leapfrog multiple loop feedback bandpass filters is demonstrated using a modification of Dishal's method. The proposed method has advantages including simplified tuning circuits and algorithms, minimal ... -
Improved dynamic cutting force model in ball end milling - Part 1 : Theoretical modelling and experimental callibration
(2005)An accurate cutting force model of ball-end milling is essential for precision prediction and compensation of tool deflection that dominantly determines the dimensional accuracy of the machined surface. This paper presents ... -
A simulated investigation on the machining instability and dynamic surface generation
(2005)In this paper, the authors propose the generic concept of machining instability based on the analysis of all kinds of machining instable behaviours and their features. The investigation covers all aspects of the machining ... -
Improved dynamic cutting force model in peripheral milling - Part 2 : experimental verification and prediction
(2004)Cutting trials reveal that a measure of cutter run-out is always unavoidable in peripheral milling. This paper improves and extends the dynamic cutting force model of peripheral milling based on the theoretical analytical ... -
3D extension of Bresenham's algorith and its application in straight-line interpretation
(2002)Conventional straight-line generating algorithms, such as the digital differential analyser (DDA), Bresenham's algorithm and the mid-point algorithm, are suitable only for planer straight lines on the coordinate planes, ...