Items where Author is "<span class="person_name">Christianson, B.</span>"
Number of items: 141.
  • Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks. (2016) Chaminda Alocious, Hannan Xiao and B. Christianson
  • Pico without public keys. (2015) B. Christianson, Frank Stajano, Mark Lomas, Graeme Jenkinson, Payne Jeunese, Quentin Stafford-Fraser and Max Spencer
  • Analysis of DoS Attacks at MAC Layer in Mobile Adhoc Networks. (2015) Chaminda Alocious, Hannan Xiao and B. Christianson
  • A Dynamic Reputation Management System for Mobile Ad Hoc Networks. (2015) Eric Chiejina, Hannan Xiao and B. Christianson
  • Not Just Cyberwarfare. (2015) B. Christianson
  • The Role of Publications and Other Artefacts in Submissions for the UK PhD. (2015) B. Christianson, Martin Elliot and Ben Massey
  • An evaluation of break-the-glass access control model for medical data in wireless sensor networks. (2015) Htoo Aung Maw, Hannan Xiao, B. Christianson and James Malcolm
  • A Dynamic Reputation Management System for Mobile Ad Hoc Networks. (2014) Eric Chiejina, Hannan Xiao and B. Christianson
  • Intrusion Detection System using Bayesian Network Modeling. (2014) Chaminda Alocious, Nasser Abouzakhar, Hannan Xiao and B. Christianson
  • A Survey of Access Control Models in Wireless Sensor Networks. (2014) Htoo Aung Maw, Hannan Xiao, B. Christianson and James Malcolm
  • Energy Consumption in Mobile Ad Hoc Networks. (2014) Hannan Xiao, Dashti Ibrahim and B. Christianson
  • Introduction : Virtually perfect security (transcript of discussion). (2014) B. Christianson
  • More security or less insecurity. (2014) Partha Das Chowdhury and B. Christianson
  • More security or less insecurity (transcript of discussion). (2014) B. Christianson
  • Relay-proof channels using UWB lasers. (2014) B. Christianson, Alex Shafarenko, Frank Stajano and Ford-Long Wong
  • A scalable approach to computing representative lowest common ancestor in directed acyclic graphs. (2013) Santanu Dash, Sven-Bodo Scholz, Stephan Herhut and B. Christianson
  • An Adaptive Access Control Model for Medical Data in Wireless Sensor Networks. (2013) Htoo Maw, Hannan Xiao and B. Christianson
  • A Candour-based Trust and Reputation Management System for Mobile Ad Hoc Networks. (2013) Eric Chiejina, Hannan Xiao and B. Christianson
  • Living in an Impossible World : Real-izing the Consequences of Intransitive Trust. (2013) B. Christianson
  • A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance. (2013) Chaminda Alocious, Hannan Xiao and B. Christianson
  • Modular design of data-parallel graph algorithms. (2013) Santanu Dash, Sven-Bodo Scholz and B. Christianson
  • Trust*: Using Local Guarantees to Extend the Reach of Trust. (2013) Stephen Clarke, B. Christianson and Hannan Xiao
  • An Adaptive Access Control Model with Privileges Overriding and Behaviour Monitoring in Wireless Sensor Networks. (2012) Htoo Aung Maw, Hannan Xiao and B. Christianson
  • Trustworthiness and Authentication in Ubiquitous Computing. (2012) Hannan Xiao, James Malcolm, B. Christianson and Y. Zhang
  • A Leibniz notation for automatic differentiation. (2012) B. Christianson
  • A Purple Passion? : Queen's College Oxford and the Blood of the Lord. (2012) B. Christianson
  • An enhanced fuzzy ARM approach for intrusion detection. (2011) N.S. Abouzakhar, H. Chen and B. Christianson
  • Gearing up : How to eat your cryptocake and still have it. (2011) A. Shafarenko and B. Christianson
  • Arty-facts : The role of performance in the "conventional" PhD. (2011) B. Christianson and Steven Adams
  • Further thoughts on precision. (2011) D. Gray, David Bowes, N. Davey, Yi Sun and B. Christianson
  • The misuse of the NASA metrics data program data sets for automated software defect prediction. (2011) D. Gray, David Bowes, N. Davey, Yi Sun and B. Christianson
  • Modelling and Analysis of TCP Performance in Wireless Multihop Networks. (2010) Hannan Xiao, Ying Zhang, James Malcolm, B. Christianson and Kee Chaing Chua
  • Extending Trust in Peer-to-Peer Networks. (2010) S. Clarke, B. Christianson and Hannan Xiao
  • Multi-channel key agreement using encrypted public key exchange. (2010) B. Christianson and J. Li
  • Multichannel protocols to prevent relay attacks. (2010) Frank Stajano, Ford-Long Wong and B. Christianson
  • Software defect prediction using static code metrics underestimates defect-proneness. (2010) David Gray, David Bowes, N. Davey, Yi Sun and B. Christianson
  • Theatre as a Discussion Tool in Human-Robot Interaction Experiments : A Pilot Study. (2010) A.R. Chatley, K. Dautenhahn, M.L. Walters, D.S. Syrdal and B. Christianson
  • A non-transitive trust model for key distribution. (2010) S. Herald, S. Clarke and B. Christianson
  • Global convergence using de-linked Goldstein or Wolfe linesearch conditions. (2009) B. Christianson
  • A Purchase Protocol with Multichannel Authentication. (2009) Hannan Xiao, B. Christianson and Ying Zhang
  • Vintage Bit Cryptography. (2009) B. Christianson and A. Shafarenko
  • A Domain-Oriented Approach for Access Control in Pervasive Environments. (2008) J. Li and B. Christianson
  • A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment. (2008) Hannan Xiao, B. Christianson and Y. Zhang
  • Recognizing Facial Expressions : A Comparison of Computational Approaches. (2008) A. Shenoy, T.M. Gale, N. Davey, B. Christianson and R. Frank
  • Hierarchical Trustworthy Authentication for Pervasive Computing. (2007) Hannan Xiao, J. Malcolm and B. Christianson
  • A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. (2007) S.M. Bo, Hannan Xiao, A. Adereti, J. Malcolm and B. Christianson
  • Second-order adjoints by source code manipulation of numerical programs. (2007) U. Naumann, M. Maier, Jan Riehme and B. Christianson
  • Academic dress in the University of Hertfordshire. (2006) B. Christianson
  • Automatic Propagation of Uncertainties. (2006) B. Christianson and M. Cox
  • Doctors' greens. (2006) B. Christianson
  • Optimizing Preventive Maintenance Models. (2006) M. Bartholomew-Biggs, B. Christianson and M. Zuo
  • Reducing the Branch Power Cost In Embedded Processors Through Static Scheduling, Profiling and SuperBlock Formation. (2006) M. Hicks, C. Egan, B. Christianson and P. Quick
  • Reflections on academic leadership. (2006) M.J. Loomes and B. Christianson
  • What Software Evolution and Biological Evolution Don't Have in Common. (2006) C.L. Nehaniv, J. Hewitt, B. Christianson and P. Wernick
  • The challenges of efficient code-generation for massively parallel architectures. (2006) Jason M. McGuiness, Colin Egan, B. Christianson and Guang Gao
  • Associative Memories with Small World Connectivity. (2005) N. Davey, L. Calcraft, B. Christianson and R.G. Adams
  • Lined with gold: London University and the colour of science. (2005) B. Christianson
  • Secure Sessions from Weak Secrets. (2005) B. Christianson, M. Roe and D. Wheeler
  • High Capacity Associative Memories and Small World Networks. (2004) N. Davey, B. Christianson and R.G. Adams
  • In the pink: the strange case of Trinity College Dublin. (2004) B. Christianson
  • Wearing Mummy's clothes: an introduction to academical archaeology. (2004) N. Groves and B. Christianson
  • Oxford Blues: the search for the origins of the lay bachelors' hood. (2003) B. Christianson
  • Globalization of Pantoja's optimal control algorithm. (2002) B. Christianson and M. Bartholomew-Biggs
  • Merkle Puzzles Revisited — Finding Matching Elements between Lists. (2002) B. Christianson and D. Wheeler
  • The evolution of the Oxford simple shape. (2002) B. Christianson
  • Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. (2001) B. Christianson, B. Crispo and J. Malcolm
  • A self-stabilizing Pantoja-like indirect algorithm for optimal control. (2001) B. Christianson
  • Automatic Differentiation of Algorithms. (2000) M. Bartholomew-Biggs, S. Brown, B. Christianson and L. Dixon
  • Cheap Newton steps for optimal control problems: automatic differentiation and Pantoja's algorithm. (1999) B. Christianson
  • Merkle puzzles revisited - finding matching elements between lists. (1999) B. Christianson and D. Wheeler
  • A Note About the Semantics of Delegation. (1999) B. Crispo and B. Christianson
  • Binding bit patterns to real world entities. (1998) B. Christianson and J. Malcolm
  • Reverse accumulation and implicit functions. (1998) B. Christianson
  • Binding bit patterns to real world entities. (1997) B. Christianson and J. Malcolm
  • Why isn't trust transitive? (1997) B. Christianson and W.S. Harbison
  • Sharing storage using dirty vectors. (1996) B. Christianson, L. Dixon and S. Brown
  • An introduction to the Hatfield superscalar architecture. (1996) G.B. Steven, B. Christianson, R. Collins, R. Potter and F.L. Steven
  • Authentication v Certification. (1995) M.R. Low and B. Christianson
  • Geometric approach to Fletcher's ideal penalty function. (1995) B. Christianson
  • Hades - towards the design of an asynchronous superscalar processor. (1995) C.J. Elston, B. Christianson, P. Findlay and G.B. Steven
  • Is your computing environment secure? Security problems with interrupt handling mechanisms. (1995) B. Christianson and P. Hu
  • Nested signature blocks. (1995) M.R. Low and B. Christianson
  • Positive fixed points of lattices under semigroups of positive linear operators. (1995) B. Christianson
  • Remote booting in a hostile world: to whom am I speaking? [Computer security]. (1995) M. Lomas and B. Christianson
  • Roles and rights. (1995) M.R. Low and B. Christianson
  • File server architecture for an open distributed document system. (1994) B. Christianson and P. Hu
  • Reverse accumulation and attractive fixed points. (1994) B. Christianson
  • Self authenticating proxies. (1994) M.R. Low and B. Christianson
  • Shrink-wrapped optimism: the DODA approach to distributed document processing. (1994) B. Christianson and J.F. Snook
  • To whom am I speaking? Remote booting in a hostile world. (1994) M. Lomas and B. Christianson
  • Positive fixed points of lattices under semigroups of positive linear operators. (1993) B. Christianson
  • Reverse accumulation of functions containing gradients. (1993) B. Christianson
  • Automatic Hessians by reverse accumulation. (1992) B. Christianson
  • Reverse accumulation and accurate rounding error estimates for taylor series coefficient. (1992) B. Christianson
  • Testing should help to insert new bugs or how to modify programs predictably? (1992) B. Christianson and R. Barrett
  • Why is software development so difficult to manage? (1992) R. Barrett and B. Christianson
  • Relative width of sublattices. (1991) B. Christianson
  • Inverse systems of abstract Lebesgue spaces. (1990) B. Christianson
  • Optimizing real-time transport protocols. (1990) B. Christianson
  • The positive fixed points of Banach lattices. (1989) B. Christianson
  • Directed Acyclic Graphs. (2025) B. Christianson and Dash Santanu
  • Application of automatic differentiation to race car performance optimisation. (2002) B. Christianson, D. Casanova, R.S. Sharp, M. Final and P. Symonds
  • The system likes you : (transcript of discussion). (2007) B. Christianson
  • “Fair” Authentication in Pervasive Computing. (2006) B. Christianson, J. Li and M. Loomes
  • Where have all the protocols gone? (2005) B. Christianson
  • Further thoughts on precision. (2011) D. Gray, David Bowes, Neil Davey, Yi Sun and B. Christianson
  • Concluding discussion - When does confidentiality harm security? (2002) B. Christianson, T Aura, D Wheeler, W Harbison, V Gligor, L Paulson, M Blaze and J Ioannidis
  • A mapping study of software code cloning. (2012) T. Shippey, D. Bowes, B. Christianson and T. Hall
  • Towards an Energy Efficient Branch Prediction Scheme Using Profiling, Adaptive Bias Measurement and Delay Region Scheduling. (2007) M. Hicks, C. Egan, B. Christianson and P. Quick
  • Technique for authentication, access control and resource management in open distributed systems. (1994) M.R. Low and B. Christianson
  • Formal Systems, Not Methods. (2004) M. Loomes, B. Christianson and N. Davey
  • Anonymous Context Based Role Activation Mechanism. (2005) P. Das Chowdhury, B. Christianson and J. Malcolm
  • Optimizing Preventive Maintenance Models. (2005) B. Christianson and M. Bartholomew-Biggs
  • My familiar robot companion : Preferences and perceptions of CHARLY, a companion humanoid autonomous robot for living with you. (2012) M.L. Walters, D.S. Syrdal, K. Dautenhahn, A. Dumitriu, A. May, B. Christianson and K.L. Koay
  • Evaluation of Logarithmic integrals in two dimensional boundary element computation. (2003) A. Davies, D. Crann and B. Christianson
  • Introduction : Alice doesn't live here anymore (transcript). (2011) B. Christianson
  • The Laplace transform dual reciprocity boundary element method for electromagnetic heating problems. (2005) D. Crann, A. Davies and B. Christianson
  • Auditable Anonymous Delegation. (2005) B. Christianson, P. Das Chowdhury and J. Malcolm
  • Key-spoofing attacks on nested signature blocks. (1995) B. Christianson and M.R. Low
  • Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing. (2003) B. Christianson and J.F. Snook
  • Preface. (2011) B. Christianson, J. Malcolm, B. Crispo and F. Stajano
  • Pictures Can’t Lie under Oath. (2000) B. Christianson, J. Malcolm and B. Robinson
  • Security protocol deployment risk : (transcript of discussion). (2011) B. Christianson
  • Reverse differentiation and the inverse diffusion problem. (1997) A.J. Davies, B. Christianson, Laurence Dixon, R Roy and P. van der Zee
  • Automatic first- and second-order adjoints for truncated Newton. (2007) Uwe Naumann, M. Maier, Jan Riehme and B. Christianson
  • A superscalar architecture to exploit instruction level parallelism. (1997) G.B. Steven, B. Christianson, R. Collins, F.L. Steven and R. Potter
  • Remodelling the attacker : (transcript of discussion). (2011) B. Christianson
  • Delegation and not-so smart cards. (1999) B. Christianson and J. Malcolm
  • Anonymous authentication. (2006) P. Das Chowdhury, J. Malcolm and B. Christianson
  • Automatic differentiation of computer programs in a parallel computing environment. (1997) S. Brown and B. Christianson
  • Enhancements to Prepare-and-Measure Based QKD Protocols. (2013) Peter Y.A. Ryan and B. Christianson
  • A different approach of using Personas in human-robot interaction : Integrating Personas as computational models to modify robot companions' behaviour. (2013) I. Duque, K. Dautenhahn, K.L. Koay, L. Willcock and B. Christianson
  • Exploring robot etiquette : Refining a HRI home companion scenario based on feedback from two artists who lived with robots in the UH robot house. (2013) K.L. Koay, M.L. Walters, A. May, A. Dumitriu, B. Christianson, N. Burke and K. Dautenhahn
  • Giving reverse differentiation a helping hand. (1997) B. Christianson, A. Davies, Laurence Dixon, R. Roy and P. van der Zee
  • Preface: Special issue dedicated to Andreas Griewank on the occasion of his 60th birthday Preface. (2012) B. Christianson, Uwe Naumann, Jean Utke and Andrea Walther
  • When is a protocol broken? (Transcript of discussion). (2010) B. Christianson
  • Implementations of quantum logic : fundamental and experimental limits - Discussion. (1998) B. Christianson, P.L. Knight and T. Beth
  • Computing in the 21st century : nanocircuitry, defect tolerance and quantum logic - Discussion. (1998) B. Christianson, N. S. Williams, T. Beth and R. S. Williams
  • Using the support vector machine as a classification method for software defect prediction with static code metrics. (2009) David Gray, D. Bowes, N. Davey, Yi Sun and B. Christianson
  • Artists as HRI pioneers : A creative approach to developing novel interactions for living with robots. (2013) H. Lehmann, M.L. Walters, A. Dumitriu, A. May, K.L. Koay, J. Sàez-Pons, D.S. Syrdal, L.J. Wood, Joe Saunders, N. Burke, I. Duque-Garcia, B. Christianson and K. Dautenhahn
  • Optimization and automatic differentiation in Ada : some practical experience. (1994) M. Bartholomew-Biggs, Lynda Bartholomew-Biggs and B. Christianson