Items where Author is "<span class="person_name">Christianson, B.</span>"
Number of items: 141.
Article
  • A Dynamic Reputation Management System for Mobile Ad Hoc Networks. (2015) Eric Chiejina, Hannan Xiao and B. Christianson
  • Not Just Cyberwarfare. (2015) B. Christianson
  • A Survey of Access Control Models in Wireless Sensor Networks. (2014) Htoo Aung Maw, Hannan Xiao, B. Christianson and James Malcolm
  • A scalable approach to computing representative lowest common ancestor in directed acyclic graphs. (2013) Santanu Dash, Sven-Bodo Scholz, Stephan Herhut and B. Christianson
  • Living in an Impossible World : Real-izing the Consequences of Intransitive Trust. (2013) B. Christianson
  • A Purple Passion? : Queen's College Oxford and the Blood of the Lord. (2012) B. Christianson
  • An enhanced fuzzy ARM approach for intrusion detection. (2011) N.S. Abouzakhar, H. Chen and B. Christianson
  • Further thoughts on precision. (2011) D. Gray, David Bowes, N. Davey, Yi Sun and B. Christianson
  • Modelling and Analysis of TCP Performance in Wireless Multihop Networks. (2010) Hannan Xiao, Ying Zhang, James Malcolm, B. Christianson and Kee Chaing Chua
  • Extending Trust in Peer-to-Peer Networks. (2010) S. Clarke, B. Christianson and Hannan Xiao
  • Multi-channel key agreement using encrypted public key exchange. (2010) B. Christianson and J. Li
  • Multichannel protocols to prevent relay attacks. (2010) Frank Stajano, Ford-Long Wong and B. Christianson
  • A non-transitive trust model for key distribution. (2010) S. Herald, S. Clarke and B. Christianson
  • Global convergence using de-linked Goldstein or Wolfe linesearch conditions. (2009) B. Christianson
  • A Purchase Protocol with Multichannel Authentication. (2009) Hannan Xiao, B. Christianson and Ying Zhang
  • Vintage Bit Cryptography. (2009) B. Christianson and A. Shafarenko
  • Recognizing Facial Expressions : A Comparison of Computational Approaches. (2008) A. Shenoy, T.M. Gale, N. Davey, B. Christianson and R. Frank
  • Automatic Propagation of Uncertainties. (2006) B. Christianson and M. Cox
  • Doctors' greens. (2006) B. Christianson
  • Optimizing Preventive Maintenance Models. (2006) M. Bartholomew-Biggs, B. Christianson and M. Zuo
  • Reflections on academic leadership. (2006) M.J. Loomes and B. Christianson
  • The challenges of efficient code-generation for massively parallel architectures. (2006) Jason M. McGuiness, Colin Egan, B. Christianson and Guang Gao
  • Lined with gold: London University and the colour of science. (2005) B. Christianson
  • Secure Sessions from Weak Secrets. (2005) B. Christianson, M. Roe and D. Wheeler
  • In the pink: the strange case of Trinity College Dublin. (2004) B. Christianson
  • Wearing Mummy's clothes: an introduction to academical archaeology. (2004) N. Groves and B. Christianson
  • Oxford Blues: the search for the origins of the lay bachelors' hood. (2003) B. Christianson
  • Merkle Puzzles Revisited — Finding Matching Elements between Lists. (2002) B. Christianson and D. Wheeler
  • The evolution of the Oxford simple shape. (2002) B. Christianson
  • Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. (2001) B. Christianson, B. Crispo and J. Malcolm
  • A self-stabilizing Pantoja-like indirect algorithm for optimal control. (2001) B. Christianson
  • Automatic Differentiation of Algorithms. (2000) M. Bartholomew-Biggs, S. Brown, B. Christianson and L. Dixon
  • Cheap Newton steps for optimal control problems: automatic differentiation and Pantoja's algorithm. (1999) B. Christianson
  • Binding bit patterns to real world entities. (1998) B. Christianson and J. Malcolm
  • Reverse accumulation and implicit functions. (1998) B. Christianson
  • Why isn't trust transitive? (1997) B. Christianson and W.S. Harbison
  • Geometric approach to Fletcher's ideal penalty function. (1995) B. Christianson
  • Positive fixed points of lattices under semigroups of positive linear operators. (1995) B. Christianson
  • Remote booting in a hostile world: to whom am I speaking? [Computer security]. (1995) M. Lomas and B. Christianson
  • Reverse accumulation and attractive fixed points. (1994) B. Christianson
  • Automatic Hessians by reverse accumulation. (1992) B. Christianson
  • Reverse accumulation and accurate rounding error estimates for taylor series coefficient. (1992) B. Christianson
  • Relative width of sublattices. (1991) B. Christianson
  • Inverse systems of abstract Lebesgue spaces. (1990) B. Christianson
  • The positive fixed points of Banach lattices. (1989) B. Christianson
  • The system likes you : (transcript of discussion). (2007) B. Christianson
  • “Fair” Authentication in Pervasive Computing. (2006) B. Christianson, J. Li and M. Loomes
  • Where have all the protocols gone? (2005) B. Christianson
  • Concluding discussion - When does confidentiality harm security? (2002) B. Christianson, T Aura, D Wheeler, W Harbison, V Gligor, L Paulson, M Blaze and J Ioannidis
  • Technique for authentication, access control and resource management in open distributed systems. (1994) M.R. Low and B. Christianson
  • Formal Systems, Not Methods. (2004) M. Loomes, B. Christianson and N. Davey
  • Anonymous Context Based Role Activation Mechanism. (2005) P. Das Chowdhury, B. Christianson and J. Malcolm
  • Auditable Anonymous Delegation. (2005) B. Christianson, P. Das Chowdhury and J. Malcolm
  • Key-spoofing attacks on nested signature blocks. (1995) B. Christianson and M.R. Low
  • Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing. (2003) B. Christianson and J.F. Snook
  • Preface. (2011) B. Christianson, J. Malcolm, B. Crispo and F. Stajano
  • Pictures Can’t Lie under Oath. (2000) B. Christianson, J. Malcolm and B. Robinson
  • Reverse differentiation and the inverse diffusion problem. (1997) A.J. Davies, B. Christianson, Laurence Dixon, R Roy and P. van der Zee
  • A superscalar architecture to exploit instruction level parallelism. (1997) G.B. Steven, B. Christianson, R. Collins, F.L. Steven and R. Potter
  • Delegation and not-so smart cards. (1999) B. Christianson and J. Malcolm
  • Anonymous authentication. (2006) P. Das Chowdhury, J. Malcolm and B. Christianson
  • Giving reverse differentiation a helping hand. (1997) B. Christianson, A. Davies, Laurence Dixon, R. Roy and P. van der Zee
  • Preface: Special issue dedicated to Andreas Griewank on the occasion of his 60th birthday Preface. (2012) B. Christianson, Uwe Naumann, Jean Utke and Andrea Walther
  • When is a protocol broken? (Transcript of discussion). (2010) B. Christianson
  • Implementations of quantum logic : fundamental and experimental limits - Discussion. (1998) B. Christianson, P.L. Knight and T. Beth
  • Computing in the 21st century : nanocircuitry, defect tolerance and quantum logic - Discussion. (1998) B. Christianson, N. S. Williams, T. Beth and R. S. Williams
  • Using the support vector machine as a classification method for software defect prediction with static code metrics. (2009) David Gray, D. Bowes, N. Davey, Yi Sun and B. Christianson
  • Optimization and automatic differentiation in Ada : some practical experience. (1994) M. Bartholomew-Biggs, Lynda Bartholomew-Biggs and B. Christianson
  • Book Section
  • Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks. (2016) Chaminda Alocious, Hannan Xiao and B. Christianson
  • Pico without public keys. (2015) B. Christianson, Frank Stajano, Mark Lomas, Graeme Jenkinson, Payne Jeunese, Quentin Stafford-Fraser and Max Spencer
  • Analysis of DoS Attacks at MAC Layer in Mobile Adhoc Networks. (2015) Chaminda Alocious, Hannan Xiao and B. Christianson
  • An evaluation of break-the-glass access control model for medical data in wireless sensor networks. (2015) Htoo Aung Maw, Hannan Xiao, B. Christianson and James Malcolm
  • A Dynamic Reputation Management System for Mobile Ad Hoc Networks. (2014) Eric Chiejina, Hannan Xiao and B. Christianson
  • Intrusion Detection System using Bayesian Network Modeling. (2014) Chaminda Alocious, Nasser Abouzakhar, Hannan Xiao and B. Christianson
  • Energy Consumption in Mobile Ad Hoc Networks. (2014) Hannan Xiao, Dashti Ibrahim and B. Christianson
  • Introduction : Virtually perfect security (transcript of discussion). (2014) B. Christianson
  • More security or less insecurity. (2014) Partha Das Chowdhury and B. Christianson
  • More security or less insecurity (transcript of discussion). (2014) B. Christianson
  • Relay-proof channels using UWB lasers. (2014) B. Christianson, Alex Shafarenko, Frank Stajano and Ford-Long Wong
  • An Adaptive Access Control Model for Medical Data in Wireless Sensor Networks. (2013) Htoo Maw, Hannan Xiao and B. Christianson
  • A Candour-based Trust and Reputation Management System for Mobile Ad Hoc Networks. (2013) Eric Chiejina, Hannan Xiao and B. Christianson
  • A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance. (2013) Chaminda Alocious, Hannan Xiao and B. Christianson
  • Modular design of data-parallel graph algorithms. (2013) Santanu Dash, Sven-Bodo Scholz and B. Christianson
  • Trust*: Using Local Guarantees to Extend the Reach of Trust. (2013) Stephen Clarke, B. Christianson and Hannan Xiao
  • An Adaptive Access Control Model with Privileges Overriding and Behaviour Monitoring in Wireless Sensor Networks. (2012) Htoo Aung Maw, Hannan Xiao and B. Christianson
  • Trustworthiness and Authentication in Ubiquitous Computing. (2012) Hannan Xiao, James Malcolm, B. Christianson and Y. Zhang
  • A Leibniz notation for automatic differentiation. (2012) B. Christianson
  • Gearing up : How to eat your cryptocake and still have it. (2011) A. Shafarenko and B. Christianson
  • Arty-facts : The role of performance in the "conventional" PhD. (2011) B. Christianson and Steven Adams
  • The misuse of the NASA metrics data program data sets for automated software defect prediction. (2011) D. Gray, David Bowes, N. Davey, Yi Sun and B. Christianson
  • Software defect prediction using static code metrics underestimates defect-proneness. (2010) David Gray, David Bowes, N. Davey, Yi Sun and B. Christianson
  • Theatre as a Discussion Tool in Human-Robot Interaction Experiments : A Pilot Study. (2010) A.R. Chatley, K. Dautenhahn, M.L. Walters, D.S. Syrdal and B. Christianson
  • A Domain-Oriented Approach for Access Control in Pervasive Environments. (2008) J. Li and B. Christianson
  • A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment. (2008) Hannan Xiao, B. Christianson and Y. Zhang
  • Hierarchical Trustworthy Authentication for Pervasive Computing. (2007) Hannan Xiao, J. Malcolm and B. Christianson
  • A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. (2007) S.M. Bo, Hannan Xiao, A. Adereti, J. Malcolm and B. Christianson
  • Reducing the Branch Power Cost In Embedded Processors Through Static Scheduling, Profiling and SuperBlock Formation. (2006) M. Hicks, C. Egan, B. Christianson and P. Quick
  • What Software Evolution and Biological Evolution Don't Have in Common. (2006) C.L. Nehaniv, J. Hewitt, B. Christianson and P. Wernick
  • Associative Memories with Small World Connectivity. (2005) N. Davey, L. Calcraft, B. Christianson and R.G. Adams
  • High Capacity Associative Memories and Small World Networks. (2004) N. Davey, B. Christianson and R.G. Adams
  • Globalization of Pantoja's optimal control algorithm. (2002) B. Christianson and M. Bartholomew-Biggs
  • A Note About the Semantics of Delegation. (1999) B. Crispo and B. Christianson
  • Sharing storage using dirty vectors. (1996) B. Christianson, L. Dixon and S. Brown
  • Reverse accumulation of functions containing gradients. (1993) B. Christianson
  • Monograph
  • Further thoughts on precision. (2011) D. Gray, David Bowes, Neil Davey, Yi Sun and B. Christianson
  • Conference or Workshop Item
  • Towards an Energy Efficient Branch Prediction Scheme Using Profiling, Adaptive Bias Measurement and Delay Region Scheduling. (2007) M. Hicks, C. Egan, B. Christianson and P. Quick
  • Optimizing Preventive Maintenance Models. (2005) B. Christianson and M. Bartholomew-Biggs
  • Book
  • Second-order adjoints by source code manipulation of numerical programs. (2007) U. Naumann, M. Maier, Jan Riehme and B. Christianson
  • Academic dress in the University of Hertfordshire. (2006) B. Christianson
  • Merkle puzzles revisited - finding matching elements between lists. (1999) B. Christianson and D. Wheeler
  • Binding bit patterns to real world entities. (1997) B. Christianson and J. Malcolm
  • An introduction to the Hatfield superscalar architecture. (1996) G.B. Steven, B. Christianson, R. Collins, R. Potter and F.L. Steven
  • Authentication v Certification. (1995) M.R. Low and B. Christianson
  • Hades - towards the design of an asynchronous superscalar processor. (1995) C.J. Elston, B. Christianson, P. Findlay and G.B. Steven
  • Is your computing environment secure? Security problems with interrupt handling mechanisms. (1995) B. Christianson and P. Hu
  • Nested signature blocks. (1995) M.R. Low and B. Christianson
  • Roles and rights. (1995) M.R. Low and B. Christianson
  • File server architecture for an open distributed document system. (1994) B. Christianson and P. Hu
  • Self authenticating proxies. (1994) M.R. Low and B. Christianson
  • Shrink-wrapped optimism: the DODA approach to distributed document processing. (1994) B. Christianson and J.F. Snook
  • To whom am I speaking? Remote booting in a hostile world. (1994) M. Lomas and B. Christianson
  • Positive fixed points of lattices under semigroups of positive linear operators. (1993) B. Christianson
  • Testing should help to insert new bugs or how to modify programs predictably? (1992) B. Christianson and R. Barrett
  • Why is software development so difficult to manage? (1992) R. Barrett and B. Christianson
  • Optimizing real-time transport protocols. (1990) B. Christianson
  • Report
  • The Role of Publications and Other Artefacts in Submissions for the UK PhD. (2015) B. Christianson, Martin Elliot and Ben Massey
  • Other
  • Application of automatic differentiation to race car performance optimisation. (2002) B. Christianson, D. Casanova, R.S. Sharp, M. Final and P. Symonds
  • A mapping study of software code cloning. (2012) T. Shippey, D. Bowes, B. Christianson and T. Hall
  • My familiar robot companion : Preferences and perceptions of CHARLY, a companion humanoid autonomous robot for living with you. (2012) M.L. Walters, D.S. Syrdal, K. Dautenhahn, A. Dumitriu, A. May, B. Christianson and K.L. Koay
  • Evaluation of Logarithmic integrals in two dimensional boundary element computation. (2003) A. Davies, D. Crann and B. Christianson
  • Introduction : Alice doesn't live here anymore (transcript). (2011) B. Christianson
  • The Laplace transform dual reciprocity boundary element method for electromagnetic heating problems. (2005) D. Crann, A. Davies and B. Christianson
  • Security protocol deployment risk : (transcript of discussion). (2011) B. Christianson
  • Automatic first- and second-order adjoints for truncated Newton. (2007) Uwe Naumann, M. Maier, Jan Riehme and B. Christianson
  • Remodelling the attacker : (transcript of discussion). (2011) B. Christianson
  • Automatic differentiation of computer programs in a parallel computing environment. (1997) S. Brown and B. Christianson
  • Enhancements to Prepare-and-Measure Based QKD Protocols. (2013) Peter Y.A. Ryan and B. Christianson
  • A different approach of using Personas in human-robot interaction : Integrating Personas as computational models to modify robot companions' behaviour. (2013) I. Duque, K. Dautenhahn, K.L. Koay, L. Willcock and B. Christianson
  • Exploring robot etiquette : Refining a HRI home companion scenario based on feedback from two artists who lived with robots in the UH robot house. (2013) K.L. Koay, M.L. Walters, A. May, A. Dumitriu, B. Christianson, N. Burke and K. Dautenhahn
  • Artists as HRI pioneers : A creative approach to developing novel interactions for living with robots. (2013) H. Lehmann, M.L. Walters, A. Dumitriu, A. May, K.L. Koay, J. Sàez-Pons, D.S. Syrdal, L.J. Wood, Joe Saunders, N. Burke, I. Duque-Garcia, B. Christianson and K. Dautenhahn
  • Data Collection
  • Directed Acyclic Graphs. (2025) B. Christianson and Dash Santanu