UCL logo

UCL Discovery

UCL home » Library Services » Electronic resources » UCL Discovery

Browse by UCL Departments and Centres

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author | Type
Jump to: B | C | D | F | L | Q | R | S
Number of items: 27.

B

BLANDFORD, AE; (1986) MICROCOMPUTERS IN EDUCATION - SELF,J. COMPUT EDUC , 10 (2) 328 - 329.

BLANDFORD, AE; (1986) UNDERSTANDING COMPUTER-BASED EDUCATION - SIEGEL,MA, DAVIS,DM. COMPUT EDUC , 10 (4) 446 - 448.

BLANDFORD, AE; SMITH, PR; (1986) THE CADED PROJECT. U COMPUT , 8 (3) 141 - 145.

BLANDFORD, AE; SMITH, PR; (1986) THE EVOLUTION OF COMPUTER-BASED LEARNING SOFTWARE-DESIGN - COMPUTER-ASSISTED TEACHING UNIT EXPERIENCE. COMPUT EDUC , 10 (2) 251 - 257.

Biggs, N; Boshier, A; Shawe-Taylor, J; (1986) Cubic Distance-regular Graphs. Journal of the London Mathematical Society , 33 (2) pp. 385-394.

Boie, RA; Cox, IJ; Rehak, P; (1986) ON OPTIMUM EDGE RECOGNITION USING MATCHED FILTERS. pp. 100-108.

C

COX, IJ; SHEPPARD, CJR; (1986) INFORMATION CAPACITY AND RESOLUTION IN AN OPTICAL-SYSTEM. J OPT SOC AM A , 3 (8) 1152 - 1158.

COX, IJ; SHEPPARD, CJR; (1986) THE INFORMATION CAPACITY OF A MULTIDIMENSIONAL COMMUNICATIONS-SYSTEM. INT J ELECTRON , 60 (5) 655 - 662.

Clack, C; Peyton Jones, SL; (1986) The four-stroke reduction engine. Presented at: UNSPECIFIED.

Cloetens, H; Desmedt, Y; Bierens, L; Vandewalle, J; Govaerts, R; (1986) Additional Properties in the S-Boxes of the DES. Presented at: UNSPECIFIED.

Cunningham, R; Finkelstein, A; (1986) Formal requirements specification: the FOREST project. In: 3rd International Workshop Software Specification and Design. (pp. 186-192). IEEE Computer Society Press

D

DESMEDT, Y; (1986) UNCONDITIONALLY SECURE AUTHENTICATION SCHEMES AND PRACTICAL AND THEORETICAL CONSEQUENCES. LECT NOTES COMPUT SC , 218 42 - 55.

DESMEDT, Y; ODLYZKO, AM; (1986) A CHOSEN TEXT ATTACK ON THE RSA CRYPTOSYSTEM AND SOME DISCRETE LOGARITHM SCHEMES. LECT NOTES COMPUT SC , 218 516 - 522.

Desmedt, Y; (1986) Is There an ultimate Use of Cryptography? Presented at: UNSPECIFIED.

Desmedt, Y; Hoornaert, F; Quisquater, J-J; (1986) Several Exhaustive Key Search Machines and DES. Presented at: UNSPECIFIED.

F

Finkelstein, A; (1986) Making formal specifications dynamic objects. In: Dowson, M, (ed.) (pp. pp. 133-136). IEEE Computer Society

Finkelstein, A; Potts, C; (1986) Formal requirements specification of real-time embedded systems.

Finkelstein, A; Potts, C; (1986) Structured common sense: the elicitation and formalisation of system requirements. In: SE 1986. (pp. 236-250). Peter Peregrinus

L

Langdon, WB; (1986) The Native Mode Restore. The Globalpages 28 - 28.

Langdon, WB; (1986) Odd Problems with Installing Fortran. The Globalpages 26 - 27.

Langdon, WB; (1986) Recovering Corrupted Files-11 Directories. The Globalpages 24 - 25.

Q

QUISQUATER, JJ; DESMEDT, Y; DAVIO, M; (1986) THE IMPORTANCE OF GOOD KEY SCHEDULING SCHEMES (HOW TO MAKE A SECURE DES SCHEME WITH LESS-THAN-OR-EQUAL-TO-48 BIT KEYS). LECT NOTES COMPUT SC , 218 537 - 542.

R

Rogers, Y; (1986) Evaluating the meaningfulness of icon sets to represent command operations. In: (Proceedings) People and Computers: Designing for Usability II. HCI'86 Conference. (pp. 86 - 603). Cambridge University Press: Cambridge.

Rogers, Y; (1986) Pictorial representations of abstract concepts relating to human-computer interaction. ACM SIGCHI , 18 43 - 45.

Rogers, Y; (1986) The potential of the visual image at the interface. Current Psychological Research and Reviews , 5 105 - 119.

S

Shawe-Taylor, J; (1986) Generating Strong Primes. Electronics Letters , 22 (16) pp. 875-877.

Slater, M; (1986) SEGMENTS ON BIT-MAPPED GRAPHICS DISPLAYS. Software - Practice and Experience , 16 (11) pp. 965-980.

This list was generated on Sun Aug 21 05:49:27 2016 BST.