Author
Number of items: 140.
Differentiating through Conjugate Gradient. (2018)
Bruce Christianson
Simulating Perceptions of Security. (2017)
Paul Wernick,
Bruce Christianson
and
William Spring
A Portrait of an Oxford Nobleman, circa 1705. (2016)
Bruce Christianson
and
Joan Kendall
Building an Ensemble for Software Defect Prediction Based on Diversity Selection. (2016)
Jean Petri,
David Bowes,
Tracy Hall,
Bruce Christianson
and
Nathan Baddoo
BTG-AC: Break-The-Glass Access Control Model for Medical Data in Wireless Sensor Networks. (2016)
Htoo Maw,
Hannan Xiao,
Bruce Christianson
and
James Malcolm
Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks. (2016)
Chaminda Alocious,
Hannan Xiao
and
B. Christianson
Pico without public keys. (2015)
B. Christianson,
Frank Stajano,
Mark Lomas,
Graeme Jenkinson,
Payne Jeunese,
Quentin Stafford-Fraser
and
Max Spencer
A Dynamic Reputation Management System for Mobile Ad Hoc Networks. (2015)
Eric Chiejina,
Hannan Xiao
and
B. Christianson
The Role of Publications and Other Artefacts in Submissions for the UK PhD. (2015)
B. Christianson,
Martin Elliot
and
Ben Massey
An evaluation of break-the-glass access control model for medical data in wireless sensor networks. (2015)
Htoo Aung Maw,
Hannan Xiao,
B. Christianson
and
James Malcolm
A Dynamic Reputation Management System for Mobile Ad Hoc Networks. (2014)
Eric Chiejina,
Hannan Xiao
and
B. Christianson
Intrusion Detection System using Bayesian Network Modeling. (2014)
Chaminda Alocious,
Nasser Abouzakhar,
Hannan Xiao
and
B. Christianson
A Survey of Access Control Models in Wireless Sensor Networks. (2014)
Htoo Aung Maw,
Hannan Xiao,
B. Christianson
and
James Malcolm
Energy Consumption in Mobile Ad Hoc Networks. (2014)
Hannan Xiao,
Dashti Ibrahim
and
B. Christianson
Introduction : Virtually perfect security (transcript of discussion). (2014)
B. Christianson
More security or less insecurity. (2014)
Partha Das Chowdhury
and
B. Christianson
More security or less insecurity (transcript of discussion). (2014)
B. Christianson
Relay-proof channels using UWB lasers. (2014)
B. Christianson,
Alex Shafarenko,
Frank Stajano
and
Ford-Long Wong
Artists as HRI pioneers : A creative approach to developing novel interactions for living with robots. (2013)
H. Lehmann,
M.L. Walters,
A. Dumitriu,
A. May,
K.L. Koay,
J. Sàez-Pons,
D.S. Syrdal,
L.J. Wood,
Joe Saunders,
N. Burke,
I. Duque-Garcia,
B. Christianson
and
K. Dautenhahn
Exploring robot etiquette : Refining a HRI home companion scenario based on feedback from two artists who lived with robots in the UH robot house. (2013)
K.L. Koay,
M.L. Walters,
A. May,
A. Dumitriu,
B. Christianson,
N. Burke
and
K. Dautenhahn
A scalable approach to computing representative lowest common ancestor in directed acyclic graphs. (2013)
Santanu Dash,
Sven-Bodo Scholz,
Stephan Herhut
and
B. Christianson
An Adaptive Access Control Model for Medical Data in Wireless Sensor Networks. (2013)
Htoo Maw,
Hannan Xiao
and
B. Christianson
A Candour-based Trust and Reputation Management System for Mobile Ad Hoc Networks. (2013)
Eric Chiejina,
Hannan Xiao
and
B. Christianson
Enhancements to Prepare-and-Measure Based QKD Protocols. (2013)
Peter Y.A. Ryan
and
B. Christianson
Living in an Impossible World : Real-izing the Consequences of Intransitive Trust. (2013)
B. Christianson
A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance. (2013)
Chaminda Alocious,
Hannan Xiao
and
B. Christianson
Modular design of data-parallel graph algorithms. (2013)
Santanu Dash,
Sven-Bodo Scholz
and
B. Christianson
Trust*: Using Local Guarantees to Extend the Reach of Trust. (2013)
Stephen Clarke,
B. Christianson
and
Hannan Xiao
A different approach of using Personas in human-robot interaction : Integrating Personas as computational models to modify robot companions' behaviour. (2013)
I. Duque,
K. Dautenhahn,
K.L. Koay,
L. Willcock
and
B. Christianson
An Adaptive Access Control Model with Privileges Overriding and Behaviour Monitoring in Wireless Sensor Networks. (2012)
Htoo Aung Maw,
Hannan Xiao
and
B. Christianson
Trustworthiness and Authentication in Ubiquitous Computing. (2012)
Hannan Xiao,
James Malcolm,
B. Christianson
and
Y. Zhang
A Leibniz notation for automatic differentiation. (2012)
B. Christianson
My familiar robot companion : Preferences and perceptions of CHARLY, a companion humanoid autonomous robot for living with you. (2012)
M.L. Walters,
D.S. Syrdal,
K. Dautenhahn,
A. Dumitriu,
A. May,
B. Christianson
and
K.L. Koay
Preface: Special issue dedicated to Andreas Griewank on the occasion of his 60th birthday Preface. (2012)
B. Christianson,
Uwe Naumann,
Jean Utke
and
Andrea Walther
A Purple Passion? : Queen's College Oxford and the Blood of the Lord. (2012)
B. Christianson
A mapping study of software code cloning. (2012)
T. Shippey,
D. Bowes,
B. Christianson
and
T. Hall
An enhanced fuzzy ARM approach for intrusion detection. (2011)
N.S. Abouzakhar,
H. Chen
and
B. Christianson
Gearing up : How to eat your cryptocake and still have it. (2011)
A. Shafarenko
and
B. Christianson
Introduction : Alice doesn't live here anymore (transcript). (2011)
B. Christianson
Arty-facts : The role of performance in the "conventional" PhD. (2011)
B. Christianson
and
Steven Adams
Further thoughts on precision. (2011)
D. Gray,
David Bowes,
N. Davey,
Yi Sun
and
B. Christianson
Preface. (2011)
B. Christianson,
J. Malcolm,
B. Crispo
and
F. Stajano
Remodelling the attacker : (transcript of discussion). (2011)
B. Christianson
Security protocol deployment risk : (transcript of discussion). (2011)
B. Christianson
The misuse of the NASA metrics data program data sets for automated software defect prediction. (2011)
D. Gray,
David Bowes,
N. Davey,
Yi Sun
and
B. Christianson
Modelling and Analysis of TCP Performance in Wireless Multihop Networks. (2010)
Hannan Xiao,
Ying Zhang,
James Malcolm,
B. Christianson
and
Kee Chaing Chua
Extending Trust in Peer-to-Peer Networks. (2010)
S. Clarke,
B. Christianson
and
Hannan Xiao
Multi-channel key agreement using encrypted public key exchange. (2010)
B. Christianson
and
J. Li
Multichannel protocols to prevent relay attacks. (2010)
Frank Stajano,
Ford-Long Wong
and
B. Christianson
Software defect prediction using static code metrics underestimates defect-proneness. (2010)
David Gray,
David Bowes,
N. Davey,
Yi Sun
and
B. Christianson
Theatre as a Discussion Tool in Human-Robot Interaction Experiments : A Pilot Study. (2010)
A.R. Chatley,
K. Dautenhahn,
M.L. Walters,
D.S. Syrdal
and
B. Christianson
When is a protocol broken? (Transcript of discussion). (2010)
B. Christianson
A non-transitive trust model for key distribution. (2010)
S. Herald,
S. Clarke
and
B. Christianson
Global convergence using de-linked Goldstein or Wolfe linesearch conditions. (2009)
B. Christianson
A Purchase Protocol with Multichannel Authentication. (2009)
Hannan Xiao,
B. Christianson
and
Ying Zhang
Using the support vector machine as a classification method for software defect prediction with static code metrics. (2009)
David Gray,
D. Bowes,
N. Davey,
Yi Sun
and
B. Christianson
Vintage Bit Cryptography. (2009)
B. Christianson
and
A. Shafarenko
A Domain-Oriented Approach for Access Control in Pervasive Environments. (2008)
J. Li
and
B. Christianson
A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment. (2008)
Hannan Xiao,
B. Christianson
and
Y. Zhang
Recognizing Facial Expressions : A Comparison of Computational Approaches. (2008)
A. Shenoy,
T.M. Gale,
N. Davey,
B. Christianson
and
R. Frank
Automatic first- and second-order adjoints for truncated Newton. (2007)
Uwe Naumann,
M. Maier,
Jan Riehme
and
B. Christianson
Hierarchical Trustworthy Authentication for Pervasive Computing. (2007)
Hannan Xiao,
J. Malcolm
and
B. Christianson
A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. (2007)
S.M. Bo,
Hannan Xiao,
A. Adereti,
J. Malcolm
and
B. Christianson
Second-order adjoints by source code manipulation of numerical programs. (2007)
U. Naumann,
M. Maier,
Jan Riehme
and
B. Christianson
The system likes you : (transcript of discussion). (2007)
B. Christianson
Academic dress in the University of Hertfordshire. (2006)
B. Christianson
Anonymous authentication. (2006)
P. Das Chowdhury,
J. Malcolm
and
B. Christianson
Automatic Propagation of Uncertainties. (2006)
B. Christianson
and
M. Cox
Doctors' greens. (2006)
B. Christianson
“Fair” Authentication in Pervasive Computing. (2006)
B. Christianson,
J. Li
and
M. Loomes
Optimizing Preventive Maintenance Models. (2006)
M. Bartholomew-Biggs,
B. Christianson
and
M. Zuo
Reducing the Branch Power Cost In Embedded Processors Through Static Scheduling, Profiling and SuperBlock Formation. (2006)
M. Hicks,
C. Egan,
B. Christianson
and
P. Quick
Reflections on academic leadership. (2006)
M.J. Loomes
and
B. Christianson
What Software Evolution and Biological Evolution Don't Have in Common. (2006)
C.L. Nehaniv,
J. Hewitt,
B. Christianson
and
P. Wernick
The challenges of efficient code-generation for massively parallel architectures. (2006)
Jason M. McGuiness,
Colin Egan,
B. Christianson
and
Guang Gao
Anonymous Context Based Role Activation Mechanism. (2005)
P. Das Chowdhury,
B. Christianson
and
J. Malcolm
Associative Memories with Small World Connectivity. (2005)
N. Davey,
L. Calcraft,
B. Christianson
and
R.G. Adams
Auditable Anonymous Delegation. (2005)
B. Christianson,
P. Das Chowdhury
and
J. Malcolm
The Laplace transform dual reciprocity boundary element method for electromagnetic heating problems. (2005)
D. Crann,
A. Davies
and
B. Christianson
Lined with gold: London University and the colour of science. (2005)
B. Christianson
Secure Sessions from Weak Secrets. (2005)
B. Christianson,
M. Roe
and
D. Wheeler
Where have all the protocols gone? (2005)
B. Christianson
High Capacity Associative Memories and Small World Networks. (2004)
N. Davey,
B. Christianson
and
R.G. Adams
Formal Systems, Not Methods. (2004)
M. Loomes,
B. Christianson
and
N. Davey
In the pink: the strange case of Trinity College Dublin. (2004)
B. Christianson
Wearing Mummy's clothes: an introduction to academical archaeology. (2004)
N. Groves
and
B. Christianson
Evaluation of Logarithmic integrals in two dimensional boundary element computation. (2003)
A. Davies,
D. Crann
and
B. Christianson
Oxford Blues: the search for the origins of the lay bachelors' hood. (2003)
B. Christianson
Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing. (2003)
B. Christianson
and
J.F. Snook
Application of automatic differentiation to race car performance optimisation. (2002)
B. Christianson,
D. Casanova,
R.S. Sharp,
M. Final
and
P. Symonds
Concluding discussion - When does confidentiality harm security? (2002)
B. Christianson,
T Aura,
D Wheeler,
W Harbison,
V Gligor,
L Paulson,
M Blaze
and
J Ioannidis
Globalization of Pantoja's optimal control algorithm. (2002)
B. Christianson
and
M. Bartholomew-Biggs
Merkle Puzzles Revisited — Finding Matching Elements between Lists. (2002)
B. Christianson
and
D. Wheeler
The evolution of the Oxford simple shape. (2002)
B. Christianson
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. (2001)
B. Christianson,
B. Crispo
and
J. Malcolm
A self-stabilizing Pantoja-like indirect algorithm for optimal control. (2001)
B. Christianson
Automatic Differentiation of Algorithms. (2000)
M. Bartholomew-Biggs,
S. Brown,
B. Christianson
and
L. Dixon
Pictures Can’t Lie under Oath. (2000)
B. Christianson,
J. Malcolm
and
B. Robinson
Cheap Newton steps for optimal control problems: automatic differentiation and Pantoja's algorithm. (1999)
B. Christianson
Delegation and not-so smart cards. (1999)
B. Christianson
and
J. Malcolm
Merkle puzzles revisited - finding matching elements between lists. (1999)
B. Christianson
and
D. Wheeler
A Note About the Semantics of Delegation. (1999)
B. Crispo
and
B. Christianson
Computing in the 21st century : nanocircuitry, defect tolerance and quantum logic - Discussion. (1998)
B. Christianson,
N. S. Williams,
T. Beth
and
R. S. Williams
Implementations of quantum logic : fundamental and experimental limits - Discussion. (1998)
B. Christianson,
P.L. Knight
and
T. Beth
Binding bit patterns to real world entities. (1998)
B. Christianson
and
J. Malcolm
Reverse accumulation and implicit functions. (1998)
B. Christianson
Reverse differentiation and the inverse diffusion problem. (1997)
A.J. Davies,
B. Christianson,
Laurence Dixon,
R Roy
and
P. van der Zee
A superscalar architecture to exploit instruction level parallelism. (1997)
G.B. Steven,
B. Christianson,
R. Collins,
F.L. Steven
and
R. Potter
Automatic differentiation of computer programs in a parallel computing environment. (1997)
S. Brown
and
B. Christianson
Binding bit patterns to real world entities. (1997)
B. Christianson
and
J. Malcolm
Giving reverse differentiation a helping hand. (1997)
B. Christianson,
A. Davies,
Laurence Dixon,
R. Roy
and
P. van der Zee
Why isn't trust transitive? (1997)
B. Christianson
and
W.S. Harbison
Sharing storage using dirty vectors. (1996)
B. Christianson,
L. Dixon
and
S. Brown
An introduction to the Hatfield superscalar architecture. (1996)
G.B. Steven,
B. Christianson,
R. Collins,
R. Potter
and
F.L. Steven
Authentication v Certification. (1995)
M.R. Low
and
B. Christianson
Geometric approach to Fletcher's ideal penalty function. (1995)
B. Christianson
Hades - towards the design of an asynchronous superscalar processor. (1995)
C.J. Elston,
B. Christianson,
P. Findlay
and
G.B. Steven
Is your computing environment secure? Security problems with interrupt handling mechanisms. (1995)
B. Christianson
and
P. Hu
Key-spoofing attacks on nested signature blocks. (1995)
B. Christianson
and
M.R. Low
Nested signature blocks. (1995)
M.R. Low
and
B. Christianson
Positive fixed points of lattices under semigroups of positive linear operators. (1995)
B. Christianson
Remote booting in a hostile world: to whom am I speaking? [Computer security]. (1995)
M. Lomas
and
B. Christianson
Roles and rights. (1995)
M.R. Low
and
B. Christianson
File server architecture for an open distributed document system. (1994)
B. Christianson
and
P. Hu
Optimization and automatic differentiation in Ada : some practical experience. (1994)
M. Bartholomew-Biggs,
Lynda Bartholomew-Biggs
and
B. Christianson
Reverse accumulation and attractive fixed points. (1994)
B. Christianson
Self authenticating proxies. (1994)
M.R. Low
and
B. Christianson
Shrink-wrapped optimism: the DODA approach to distributed document processing. (1994)
B. Christianson
and
J.F. Snook
Technique for authentication, access control and resource management in open distributed systems. (1994)
M.R. Low
and
B. Christianson
To whom am I speaking? Remote booting in a hostile world. (1994)
M. Lomas
and
B. Christianson
Positive fixed points of lattices under semigroups of positive linear operators. (1993)
B. Christianson
Reverse accumulation of functions containing gradients. (1993)
B. Christianson
Automatic Hessians by reverse accumulation. (1992)
B. Christianson
Reverse accumulation and accurate rounding error estimates for taylor series coefficient. (1992)
B. Christianson
Testing should help to insert new bugs or how to modify programs predictably? (1992)
B. Christianson
and
R. Barrett
Why is software development so difficult to manage? (1992)
R. Barrett
and
B. Christianson
Relative width of sublattices. (1991)
B. Christianson
Inverse systems of abstract Lebesgue spaces. (1990)
B. Christianson
Optimizing real-time transport protocols. (1990)
B. Christianson
The positive fixed points of Banach lattices. (1989)
B. Christianson