UCL logo

UCL Discovery

UCL home » Library Services » Electronic resources » UCL Discovery

Browse by UCL Departments and Centres

Up a level
Export as [feed] RSS 2.0 [feed] RSS 1.0 [feed] Atom
Group by: Author | Type
Jump to: B | C | D | Q | R | S
Number of items: 20.

B

Biggs, N; Boshier, A; Shawe-Taylor, J; (1986) Cubic Distance-regular Graphs. Journal of the London Mathematical Society , 33 (2) 385 - 394.

BLANDFORD, AE; (1986) MICROCOMPUTERS IN EDUCATION - SELF,J. COMPUT EDUC , 10 (2) 328 - 329.

BLANDFORD, AE; (1986) UNDERSTANDING COMPUTER-BASED EDUCATION - SIEGEL,MA, DAVIS,DM. COMPUT EDUC , 10 (4) 446 - 448.

BLANDFORD, AE; SMITH, PR; (1986) THE CADED PROJECT. U COMPUT , 8 (3) 141 - 145.

BLANDFORD, AE; SMITH, PR; (1986) THE EVOLUTION OF COMPUTER-BASED LEARNING SOFTWARE-DESIGN - COMPUTER-ASSISTED TEACHING UNIT EXPERIENCE. COMPUT EDUC , 10 (2) 251 - 257.

Boie, RA; Cox, IJ; Rehak, P; (1986) ON OPTIMUM EDGE RECOGNITION USING MATCHED FILTERS. 100 - 108.

C

Clack, C; Peyton Jones, SL; (1986) The four-stroke reduction engine. In: Proceedings of the 1986 ACM conference on LISP and functional programming. (pp. 220 - 232). ACM Press: New York, US.

Cloetens, H; Desmedt, Y; Bierens, L; Vandewalle, J; Govaerts, R; (1986) Additional Properties in the S-Boxes of the DES. In: EUROCRYPT. (pp. 20 - 20).

COX, IJ; SHEPPARD, CJR; (1986) INFORMATION CAPACITY AND RESOLUTION IN AN OPTICAL-SYSTEM. J OPT SOC AM A , 3 (8) 1152 - 1158.

COX, IJ; SHEPPARD, CJR; (1986) THE INFORMATION CAPACITY OF A MULTIDIMENSIONAL COMMUNICATIONS-SYSTEM. INT J ELECTRON , 60 (5) 655 - 662.

D

DESMEDT, Y; (1986) UNCONDITIONALLY SECURE AUTHENTICATION SCHEMES AND PRACTICAL AND THEORETICAL CONSEQUENCES. LECT NOTES COMPUT SC , 218 42 - 55.

Desmedt, Y; (1986) Is There an ultimate Use of Cryptography? In: Odlyzko, AM, (ed.) CRYPTO. (pp. 459 - 463). Springer

Desmedt, Y; Hoornaert, F; Quisquater, J-J; (1986) Several Exhaustive Key Search Machines and DES. In: EUROCRYPT. (pp. 17 - 19).

DESMEDT, Y; ODLYZKO, AM; (1986) A CHOSEN TEXT ATTACK ON THE RSA CRYPTOSYSTEM AND SOME DISCRETE LOGARITHM SCHEMES. LECT NOTES COMPUT SC , 218 516 - 522.

Q

QUISQUATER, JJ; DESMEDT, Y; DAVIO, M; (1986) THE IMPORTANCE OF GOOD KEY SCHEDULING SCHEMES (HOW TO MAKE A SECURE DES SCHEME WITH LESS-THAN-OR-EQUAL-TO-48 BIT KEYS). LECT NOTES COMPUT SC , 218 537 - 542.

R

Rogers, Y; (1986) Evaluating the meaningfulness of icon sets to represent command operations. In: (Proceedings) People and Computers: Designing for Usability II. HCI'86 Conference. (pp. 86 - 603). Cambridge University Press: Cambridge.

Rogers, Y; (1986) Pictorial representations of abstract concepts relating to human-computer interaction. ACM SIGCHI , 18 43 - 45.

Rogers, Y; (1986) The potential of the visual image at the interface. Current Psychological Research and Reviews , 5 105 - 119.

S

Shawe-Taylor, J; (1986) Generating Strong Primes. Electronics Letters , 22 (16) 875 - 877.

Slater, M; (1986) Segments on Bit-mapped Graphics Displays. Softw., Pract. Exper. , 16 , Article 11. 10.1002/spe.4380161102.

This list was generated on Sun Jul 27 12:31:00 2014 BST.