University of Hertfordshire

Publications

  1. 1993
  2. Self defence in open systems using self authenticating proxies

    Low, M. R., 1993, University of Hertfordshire. (UH Computer Science Technical Report; vol. 161)

    Research output: Book/ReportOther report

  3. Sequential animation of a structured analysis required logical model of a vending machine controller

    Fensome, D. A., 1993, University of Hertfordshire. (UH Computer Science Technical Report; vol. 169)

    Research output: Book/ReportOther report

  4. The object modeling technique

    Levine, D. & Britton, C., 1993, University of Hertfordshire. (UH Computer Science Technical Report; vol. 165)

    Research output: Book/ReportOther report

  5. The use of metrics in connectionist psychological models

    Lyon, C. & Davey, N., 1993, University of Hertfordshire. (UH Computer Science Technical Report; vol. 157)

    Research output: Book/ReportOther report

  6. Use of multimedia in a public information system

    Hewitt, J., Sapsford-Francis, J. & Halford, P., 1993, University of Hertfordshire. (UH Computer Science Technical Report; vol. 155)

    Research output: Book/ReportOther report

  7. 1992
  8. A comparison of development methods used in traditional engineering and software engineering

    Mayes, A., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 147)

    Research output: Book/ReportOther report

  9. A program for animating CCS specifications

    Stobo, J. R., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 145)

    Research output: Book/ReportOther report

  10. A survey of the current state of reuse in a software environment

    Mayes, A., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 146)

    Research output: Book/ReportOther report

  11. An investigation of types leading to an examination of some aspects of F-bounded interfaces and the type classes of Haskell

    Buchanan, K. M. & Dickerson, R., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 154)

    Research output: Book/ReportOther report

  12. Are there any parallels between object-oriented system development and other branches of engineering?

    Mayes, A. & Britton, C., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 139)

    Research output: Book/ReportOther report

  13. CCS and object-oriented concepts

    Buchanan, M. & Dickerson, R., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 140)

    Research output: Book/ReportOther report

  14. Do we still need the system life cycle?

    Britton, C., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 135)

    Research output: Book/ReportOther report

  15. Effects of fungicide timing on fungal diseases, growth and yield of linseed

    Davis, H. & Fitt, B. D. L., 1992, Annals of Applied Biology .

    Research output: Book/ReportOther report

  16. Eiffel, the universe and everything. (somethings anyway)

    Mayes, A. & Barrett, R., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 138)

    Research output: Book/ReportOther report

  17. Experience of using Coad and Yourdon object-oriented analysis and design

    Mayes, A. & Barrett, R., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 148)

    Research output: Book/ReportOther report

  18. Fine grained object protection in UNIX

    Low, M. R., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 130)

    Research output: Book/ReportOther report

  19. Minimal kernels and security

    Low, M. R., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 143)

    Research output: Book/ReportOther report

  20. Neural nets for a language processing task: tag disambiguation

    Lyon, C., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 123)

    Research output: Book/ReportOther report

  21. Prototyping real time engineering systems using Hatley & Pirbhai's requirement model

    Fensome, D. A., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 131)

    Research output: Book/ReportOther report

  22. Security system case study

    Loomes, M. & Britton, C., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 136)

    Research output: Book/ReportOther report

  23. Static instruction scheduling for the HARP multiple-instruction-issue architecture

    Gray, S. M., Adams, R. G., Green, G. J. & Steven, G. B., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 142)

    Research output: Book/ReportOther report

  24. Testing should help to insert new bugs or how to modify programs predictably?

    Christianson, B. & Barrett, R., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 144)

    Research output: Book/ReportOther report

  25. The Notary

    Low, M. R., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 153)

    Research output: Book/ReportOther report

  26. The responsibility driven object-oriented design method advocated by Wirfs-Brock, Wilkerson and Weiner

    Mayes, A., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 149)

    Research output: Book/ReportOther report

  27. Towards a satisfaction relation between CCS specifications and their refinements

    Baillie, E. J., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 152)

    Research output: Book/ReportOther report