UCL logo

UCL Discovery

UCL home » Library Services » Electronic resources » UCL Discovery

Browse by UCL Departments and Centres

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author | Type
Number of items: 30.


Arridge, SR; (1989) A note on the spherical harmonic expansion of the Mie scattering kernel. Journal of Modern Optics , 36 (6) pp. 685-692.

Bressloff, PC; Gorse, D; Taylor, JG; (1989) Non-linear model of memory. IJCNN Int Jt Conf Neural Network 601-.


Chambers, WG; Clarkson, T; Gorse, D; Taylor, JG; (1989) Hardware realisable models of neural processing. 665-.

Finkelstein, A; (1989) A structural framework for the formal representation of cooperation. ISPW pp. 61-63. 10.1109/ISPW.1989.690418.

Finkelstein, A; Fischer, M; (1989) Arranging a Marriage in Pakistan and Legal Expert Systems. Computers and Law (61)

Gorse, D; Taylor, JG; (1989) Towards a hardware realisable model of the neuron. IJCNN Int Jt Conf Neural Network 602-.

Li, Z; Hopfield, JJ; (1989) Modeling the olfactory bulb and its neural oscillatory processings. Biological Cybernetics , 61 pp. 379-392.

Peyton Jones, SL; Clack, C; Salkild, J; (1989) High-performance parallel graph reduction. Lecture Notes in Computer Science , 365 pp. 193-206. 10.1007/3540512845_40.

Rogers, Y; (1989) Icon Design for the User Interface. International Reviews of Ergonomics: 3 129 - 155.

Rounce, P; Chan, K; Mackay, S; Steptoe, K; (1989) VLSI Architecture Research within the ESPRIT SPAN Project. Microprocessing and Microprogramming , 26 pp. 139-152.

Slater, M; Davison, A; Smith, M; (1989) Liberation from rectangles: A tiling method for dynamic modification of objects on raster displays. Computers and Graphics , 13 (1) pp. 83-89. 10.1016/0097-8493(89)90043-5.


Shawe-Taylor, J; (1989) Review of "Cryptography - An Introduction to Computer Security", by Seberry and Peiprzek. [Book]. Prentice Hall advances in computer science series: Vol.12. Prentice Hall, Sydney

Book chapter

Cohen, D; Shawe-Taylor, J; (1989) Feedforward Neural Networks: a Tutorial. In: UNSPECIFIED Inst of Physics Pub Inc

Finkelstein, A; (1989) "Not Waving but Drowning": Representation Schemes for Modelling Software Development. In: Druffel, LE and Fairley, D and Bjørner, D, (eds.) Proceedings of the 11th International Conference on Software Engineering, Pittsburg, PA, USA, May 15-18, 1989. (pp. 402-404). IEEE Computer Society / ACM Press

Finkelstein, A; (1989) An example of software development modelling. In: Perry, DE, (ed.) Proceedings of the Fifth International Software Process Workshop (ISPW '89), October 1989, Kennebunkport, Maine, USA. (pp. 151-153). IEEE Computer Society

Finkelstein, L; Finkelstein, A; (1989) Instruments and Instrument Systems: design principles. In: Singh, M, (ed.) Systems and Control Encylopedia, IV. (pp. 2533-2536). Pergamon Press

Gabbay, DM; Hodkinson, IM; Hunter, A; (1989) Using the Temporal Logic RDL for Design Specifications. In: Yonezawa, A and Ito, T, (eds.) Concurrency: Theory, Language, And Architecture, UK/Japan Workshop, Oxford, UK, September 25-27, 1989, Proceedings. (pp. 64-78). Springer

Shawe-Taylor, J; (1989) Building Symmetries into Feedforward Networks. In: UNSPECIFIED (pp. 158-162). Inspec/Iee

Proceedings paper

Finkelstein, A; Fuks, H; (1989) Multi-Party Specification. In: (pp. pp. 185-195). IEEE Computer Society Press: Washington, D.C., US.

Finkelstein, A; Hagelstein, J; (1989) Formal Frameworks for Understanding Information System Requirements Engineering: a research agenda. In: Nijssen, S and Twine, S, (eds.) (Proceedings) IFIP CRIS Review Workshop. North Holland

O'Hearn, PW; Stachniak, Z; (1989) A Resolution Framework for Finitely-Valued First-Order Logics. In: SCAI. (pp. 69 - 81).

O'Hearn, PW; Stachniak, Z; (1989) Note on Theorem Proving Strategies for Resolution Counterparts of Non-Classical Logics. In: Gonnet, GH, (ed.) ISSAC. (pp. 364 - 372). ACM


Riess, P; Shawe-Taylor, J; (1989) The RSA Public Key Cryptosystem.

Conference item

Burmester, M; Desmedt, Y; Piper, F; Walker, M; (1989) A General Zero-Knowledge Scheme (Extended Abstract). Presented at: UNSPECIFIED.

Davida, GI; Desmedt, Y; Matt, BJ; (1989) Defending Systems against Viruses through Cryptographic Authentication. Presented at: UNSPECIFIED.

Davida, GI; Desmedt, Y; Peralta, R; (1989) A Key Distribution System Based On Any One-Way Function (Extended Abstract). Presented at: UNSPECIFIED.

Desmedt, Y; (1989) Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context. Presented at: UNSPECIFIED.

Dowell, J; Long, JB; (1989) A late evaluation of a messaging system design and the target of early evaluation methods. Presented at: UNSPECIFIED.

Sasse, MA; (1989) How to t(r)ap user's mental models. Presented at: UNSPECIFIED.

This list was generated on Sun Oct 23 05:52:02 2016 BST.