Author

Number of items: 140.
2018
  • Differentiating through Conjugate Gradient. (2018) Bruce Christianson
  • 2017
  • Simulating Perceptions of Security. (2017) Paul Wernick, Bruce Christianson and William Spring
  • 2016
  • A Portrait of an Oxford Nobleman, circa 1705. (2016) Bruce Christianson and Joan Kendall
  • Building an Ensemble for Software Defect Prediction Based on Diversity Selection. (2016) Jean Petri, David Bowes, Tracy Hall, Bruce Christianson and Nathan Baddoo
  • BTG-AC: Break-The-Glass Access Control Model for Medical Data in Wireless Sensor Networks. (2016) Htoo Maw, Hannan Xiao, Bruce Christianson and James Malcolm
  • Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks. (2016) Chaminda Alocious, Hannan Xiao and B. Christianson
  • 2015
  • Pico without public keys. (2015) B. Christianson, Frank Stajano, Mark Lomas, Graeme Jenkinson, Payne Jeunese, Quentin Stafford-Fraser and Max Spencer
  • A Dynamic Reputation Management System for Mobile Ad Hoc Networks. (2015) Eric Chiejina, Hannan Xiao and B. Christianson
  • The Role of Publications and Other Artefacts in Submissions for the UK PhD. (2015) B. Christianson, Martin Elliot and Ben Massey
  • An evaluation of break-the-glass access control model for medical data in wireless sensor networks. (2015) Htoo Aung Maw, Hannan Xiao, B. Christianson and James Malcolm
  • 2014
  • A Dynamic Reputation Management System for Mobile Ad Hoc Networks. (2014) Eric Chiejina, Hannan Xiao and B. Christianson
  • Intrusion Detection System using Bayesian Network Modeling. (2014) Chaminda Alocious, Nasser Abouzakhar, Hannan Xiao and B. Christianson
  • A Survey of Access Control Models in Wireless Sensor Networks. (2014) Htoo Aung Maw, Hannan Xiao, B. Christianson and James Malcolm
  • Energy Consumption in Mobile Ad Hoc Networks. (2014) Hannan Xiao, Dashti Ibrahim and B. Christianson
  • Introduction : Virtually perfect security (transcript of discussion). (2014) B. Christianson
  • More security or less insecurity. (2014) Partha Das Chowdhury and B. Christianson
  • More security or less insecurity (transcript of discussion). (2014) B. Christianson
  • Relay-proof channels using UWB lasers. (2014) B. Christianson, Alex Shafarenko, Frank Stajano and Ford-Long Wong
  • 2013
  • Artists as HRI pioneers : A creative approach to developing novel interactions for living with robots. (2013) H. Lehmann, M.L. Walters, A. Dumitriu, A. May, K.L. Koay, J. Sàez-Pons, D.S. Syrdal, L.J. Wood, Joe Saunders, N. Burke, I. Duque-Garcia, B. Christianson and K. Dautenhahn
  • Exploring robot etiquette : Refining a HRI home companion scenario based on feedback from two artists who lived with robots in the UH robot house. (2013) K.L. Koay, M.L. Walters, A. May, A. Dumitriu, B. Christianson, N. Burke and K. Dautenhahn
  • A scalable approach to computing representative lowest common ancestor in directed acyclic graphs. (2013) Santanu Dash, Sven-Bodo Scholz, Stephan Herhut and B. Christianson
  • An Adaptive Access Control Model for Medical Data in Wireless Sensor Networks. (2013) Htoo Maw, Hannan Xiao and B. Christianson
  • A Candour-based Trust and Reputation Management System for Mobile Ad Hoc Networks. (2013) Eric Chiejina, Hannan Xiao and B. Christianson
  • Enhancements to Prepare-and-Measure Based QKD Protocols. (2013) Peter Y.A. Ryan and B. Christianson
  • Living in an Impossible World : Real-izing the Consequences of Intransitive Trust. (2013) B. Christianson
  • A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance. (2013) Chaminda Alocious, Hannan Xiao and B. Christianson
  • Modular design of data-parallel graph algorithms. (2013) Santanu Dash, Sven-Bodo Scholz and B. Christianson
  • Trust*: Using Local Guarantees to Extend the Reach of Trust. (2013) Stephen Clarke, B. Christianson and Hannan Xiao
  • A different approach of using Personas in human-robot interaction : Integrating Personas as computational models to modify robot companions' behaviour. (2013) I. Duque, K. Dautenhahn, K.L. Koay, L. Willcock and B. Christianson
  • 2012
  • An Adaptive Access Control Model with Privileges Overriding and Behaviour Monitoring in Wireless Sensor Networks. (2012) Htoo Aung Maw, Hannan Xiao and B. Christianson
  • Trustworthiness and Authentication in Ubiquitous Computing. (2012) Hannan Xiao, James Malcolm, B. Christianson and Y. Zhang
  • A Leibniz notation for automatic differentiation. (2012) B. Christianson
  • My familiar robot companion : Preferences and perceptions of CHARLY, a companion humanoid autonomous robot for living with you. (2012) M.L. Walters, D.S. Syrdal, K. Dautenhahn, A. Dumitriu, A. May, B. Christianson and K.L. Koay
  • Preface: Special issue dedicated to Andreas Griewank on the occasion of his 60th birthday Preface. (2012) B. Christianson, Uwe Naumann, Jean Utke and Andrea Walther
  • A Purple Passion? : Queen's College Oxford and the Blood of the Lord. (2012) B. Christianson
  • A mapping study of software code cloning. (2012) T. Shippey, D. Bowes, B. Christianson and T. Hall
  • 2011
  • An enhanced fuzzy ARM approach for intrusion detection. (2011) N.S. Abouzakhar, H. Chen and B. Christianson
  • Gearing up : How to eat your cryptocake and still have it. (2011) A. Shafarenko and B. Christianson
  • Introduction : Alice doesn't live here anymore (transcript). (2011) B. Christianson
  • Arty-facts : The role of performance in the "conventional" PhD. (2011) B. Christianson and Steven Adams
  • Further thoughts on precision. (2011) D. Gray, David Bowes, N. Davey, Yi Sun and B. Christianson
  • Preface. (2011) B. Christianson, J. Malcolm, B. Crispo and F. Stajano
  • Remodelling the attacker : (transcript of discussion). (2011) B. Christianson
  • Security protocol deployment risk : (transcript of discussion). (2011) B. Christianson
  • The misuse of the NASA metrics data program data sets for automated software defect prediction. (2011) D. Gray, David Bowes, N. Davey, Yi Sun and B. Christianson
  • 2010
  • Modelling and Analysis of TCP Performance in Wireless Multihop Networks. (2010) Hannan Xiao, Ying Zhang, James Malcolm, B. Christianson and Kee Chaing Chua
  • Extending Trust in Peer-to-Peer Networks. (2010) S. Clarke, B. Christianson and Hannan Xiao
  • Multi-channel key agreement using encrypted public key exchange. (2010) B. Christianson and J. Li
  • Multichannel protocols to prevent relay attacks. (2010) Frank Stajano, Ford-Long Wong and B. Christianson
  • Software defect prediction using static code metrics underestimates defect-proneness. (2010) David Gray, David Bowes, N. Davey, Yi Sun and B. Christianson
  • Theatre as a Discussion Tool in Human-Robot Interaction Experiments : A Pilot Study. (2010) A.R. Chatley, K. Dautenhahn, M.L. Walters, D.S. Syrdal and B. Christianson
  • When is a protocol broken? (Transcript of discussion). (2010) B. Christianson
  • A non-transitive trust model for key distribution. (2010) S. Herald, S. Clarke and B. Christianson
  • 2009
  • Global convergence using de-linked Goldstein or Wolfe linesearch conditions. (2009) B. Christianson
  • A Purchase Protocol with Multichannel Authentication. (2009) Hannan Xiao, B. Christianson and Ying Zhang
  • Using the support vector machine as a classification method for software defect prediction with static code metrics. (2009) David Gray, D. Bowes, N. Davey, Yi Sun and B. Christianson
  • Vintage Bit Cryptography. (2009) B. Christianson and A. Shafarenko
  • 2008
  • A Domain-Oriented Approach for Access Control in Pervasive Environments. (2008) J. Li and B. Christianson
  • A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment. (2008) Hannan Xiao, B. Christianson and Y. Zhang
  • Recognizing Facial Expressions : A Comparison of Computational Approaches. (2008) A. Shenoy, T.M. Gale, N. Davey, B. Christianson and R. Frank
  • 2007
  • Automatic first- and second-order adjoints for truncated Newton. (2007) Uwe Naumann, M. Maier, Jan Riehme and B. Christianson
  • Hierarchical Trustworthy Authentication for Pervasive Computing. (2007) Hannan Xiao, J. Malcolm and B. Christianson
  • A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. (2007) S.M. Bo, Hannan Xiao, A. Adereti, J. Malcolm and B. Christianson
  • Second-order adjoints by source code manipulation of numerical programs. (2007) U. Naumann, M. Maier, Jan Riehme and B. Christianson
  • The system likes you : (transcript of discussion). (2007) B. Christianson
  • 2006
  • Academic dress in the University of Hertfordshire. (2006) B. Christianson
  • Anonymous authentication. (2006) P. Das Chowdhury, J. Malcolm and B. Christianson
  • Automatic Propagation of Uncertainties. (2006) B. Christianson and M. Cox
  • Doctors' greens. (2006) B. Christianson
  • “Fair” Authentication in Pervasive Computing. (2006) B. Christianson, J. Li and M. Loomes
  • Optimizing Preventive Maintenance Models. (2006) M. Bartholomew-Biggs, B. Christianson and M. Zuo
  • Reducing the Branch Power Cost In Embedded Processors Through Static Scheduling, Profiling and SuperBlock Formation. (2006) M. Hicks, C. Egan, B. Christianson and P. Quick
  • Reflections on academic leadership. (2006) M.J. Loomes and B. Christianson
  • What Software Evolution and Biological Evolution Don't Have in Common. (2006) C.L. Nehaniv, J. Hewitt, B. Christianson and P. Wernick
  • The challenges of efficient code-generation for massively parallel architectures. (2006) Jason M. McGuiness, Colin Egan, B. Christianson and Guang Gao
  • 2005
  • Anonymous Context Based Role Activation Mechanism. (2005) P. Das Chowdhury, B. Christianson and J. Malcolm
  • Associative Memories with Small World Connectivity. (2005) N. Davey, L. Calcraft, B. Christianson and R.G. Adams
  • Auditable Anonymous Delegation. (2005) B. Christianson, P. Das Chowdhury and J. Malcolm
  • The Laplace transform dual reciprocity boundary element method for electromagnetic heating problems. (2005) D. Crann, A. Davies and B. Christianson
  • Lined with gold: London University and the colour of science. (2005) B. Christianson
  • Secure Sessions from Weak Secrets. (2005) B. Christianson, M. Roe and D. Wheeler
  • Where have all the protocols gone? (2005) B. Christianson
  • 2004
  • High Capacity Associative Memories and Small World Networks. (2004) N. Davey, B. Christianson and R.G. Adams
  • Formal Systems, Not Methods. (2004) M. Loomes, B. Christianson and N. Davey
  • In the pink: the strange case of Trinity College Dublin. (2004) B. Christianson
  • Wearing Mummy's clothes: an introduction to academical archaeology. (2004) N. Groves and B. Christianson
  • 2003
  • Evaluation of Logarithmic integrals in two dimensional boundary element computation. (2003) A. Davies, D. Crann and B. Christianson
  • Oxford Blues: the search for the origins of the lay bachelors' hood. (2003) B. Christianson
  • Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing. (2003) B. Christianson and J.F. Snook
  • 2002
  • Application of automatic differentiation to race car performance optimisation. (2002) B. Christianson, D. Casanova, R.S. Sharp, M. Final and P. Symonds
  • Concluding discussion - When does confidentiality harm security? (2002) B. Christianson, T Aura, D Wheeler, W Harbison, V Gligor, L Paulson, M Blaze and J Ioannidis
  • Globalization of Pantoja's optimal control algorithm. (2002) B. Christianson and M. Bartholomew-Biggs
  • Merkle Puzzles Revisited — Finding Matching Elements between Lists. (2002) B. Christianson and D. Wheeler
  • The evolution of the Oxford simple shape. (2002) B. Christianson
  • 2001
  • Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. (2001) B. Christianson, B. Crispo and J. Malcolm
  • A self-stabilizing Pantoja-like indirect algorithm for optimal control. (2001) B. Christianson
  • 2000
  • Automatic Differentiation of Algorithms. (2000) M. Bartholomew-Biggs, S. Brown, B. Christianson and L. Dixon
  • Pictures Can’t Lie under Oath. (2000) B. Christianson, J. Malcolm and B. Robinson
  • 1999
  • Cheap Newton steps for optimal control problems: automatic differentiation and Pantoja's algorithm. (1999) B. Christianson
  • Delegation and not-so smart cards. (1999) B. Christianson and J. Malcolm
  • Merkle puzzles revisited - finding matching elements between lists. (1999) B. Christianson and D. Wheeler
  • A Note About the Semantics of Delegation. (1999) B. Crispo and B. Christianson
  • 1998
  • Computing in the 21st century : nanocircuitry, defect tolerance and quantum logic - Discussion. (1998) B. Christianson, N. S. Williams, T. Beth and R. S. Williams
  • Implementations of quantum logic : fundamental and experimental limits - Discussion. (1998) B. Christianson, P.L. Knight and T. Beth
  • Binding bit patterns to real world entities. (1998) B. Christianson and J. Malcolm
  • Reverse accumulation and implicit functions. (1998) B. Christianson
  • 1997
  • Reverse differentiation and the inverse diffusion problem. (1997) A.J. Davies, B. Christianson, Laurence Dixon, R Roy and P. van der Zee
  • A superscalar architecture to exploit instruction level parallelism. (1997) G.B. Steven, B. Christianson, R. Collins, F.L. Steven and R. Potter
  • Automatic differentiation of computer programs in a parallel computing environment. (1997) S. Brown and B. Christianson
  • Binding bit patterns to real world entities. (1997) B. Christianson and J. Malcolm
  • Giving reverse differentiation a helping hand. (1997) B. Christianson, A. Davies, Laurence Dixon, R. Roy and P. van der Zee
  • Why isn't trust transitive? (1997) B. Christianson and W.S. Harbison
  • 1996
  • Sharing storage using dirty vectors. (1996) B. Christianson, L. Dixon and S. Brown
  • An introduction to the Hatfield superscalar architecture. (1996) G.B. Steven, B. Christianson, R. Collins, R. Potter and F.L. Steven
  • 1995
  • Authentication v Certification. (1995) M.R. Low and B. Christianson
  • Geometric approach to Fletcher's ideal penalty function. (1995) B. Christianson
  • Hades - towards the design of an asynchronous superscalar processor. (1995) C.J. Elston, B. Christianson, P. Findlay and G.B. Steven
  • Is your computing environment secure? Security problems with interrupt handling mechanisms. (1995) B. Christianson and P. Hu
  • Key-spoofing attacks on nested signature blocks. (1995) B. Christianson and M.R. Low
  • Nested signature blocks. (1995) M.R. Low and B. Christianson
  • Positive fixed points of lattices under semigroups of positive linear operators. (1995) B. Christianson
  • Remote booting in a hostile world: to whom am I speaking? [Computer security]. (1995) M. Lomas and B. Christianson
  • Roles and rights. (1995) M.R. Low and B. Christianson
  • 1994
  • File server architecture for an open distributed document system. (1994) B. Christianson and P. Hu
  • Optimization and automatic differentiation in Ada : some practical experience. (1994) M. Bartholomew-Biggs, Lynda Bartholomew-Biggs and B. Christianson
  • Reverse accumulation and attractive fixed points. (1994) B. Christianson
  • Self authenticating proxies. (1994) M.R. Low and B. Christianson
  • Shrink-wrapped optimism: the DODA approach to distributed document processing. (1994) B. Christianson and J.F. Snook
  • Technique for authentication, access control and resource management in open distributed systems. (1994) M.R. Low and B. Christianson
  • To whom am I speaking? Remote booting in a hostile world. (1994) M. Lomas and B. Christianson
  • 1993
  • Positive fixed points of lattices under semigroups of positive linear operators. (1993) B. Christianson
  • Reverse accumulation of functions containing gradients. (1993) B. Christianson
  • 1992
  • Automatic Hessians by reverse accumulation. (1992) B. Christianson
  • Reverse accumulation and accurate rounding error estimates for taylor series coefficient. (1992) B. Christianson
  • Testing should help to insert new bugs or how to modify programs predictably? (1992) B. Christianson and R. Barrett
  • Why is software development so difficult to manage? (1992) R. Barrett and B. Christianson
  • 1991
  • Relative width of sublattices. (1991) B. Christianson
  • 1990
  • Inverse systems of abstract Lebesgue spaces. (1990) B. Christianson
  • Optimizing real-time transport protocols. (1990) B. Christianson
  • 1989
  • The positive fixed points of Banach lattices. (1989) B. Christianson