University of Hertfordshire

Publications

  1. Optimizing real-time transport protocols

    Christianson, B., 1990, University of Hertfordshire. (UH Computer Science Technical Report; vol. 115)

    Research output: Book/ReportOther report

  2. Overloading and polymorphism in the interpretation of inheritance in C++

    Buchanan, M., 1994, University of Hertfordshire. (UH Computer Science Technical Report; vol. 202)

    Research output: Book/ReportOther report

  3. Persuading developers to buy into software process improvement: an exploratory analysis

    Rainer, A., Hall, T. & Baddoo, N., 2002, University of Hertfordshire.

    Research output: Book/ReportOther report

  4. Positive fixed points of lattices under semigroups of positive linear operators

    Christianson, B., 1993, University of Hertfordshire. (UH Computer Science Technical Report; vol. 177)

    Research output: Book/ReportOther report

  5. Potential for asynchronous microprocessor design

    Elston, C. J., 1994, University of Hertfordshire. (UH Computer Science Technical Report; vol. 182)

    Research output: Book/ReportOther report

  6. Protocol for a Systematic Literature Review of Motivation in Software Engineering

    Beecham, S., Baddoo, N., Hall, T., Robinson, H. & Sharp, H., 2006, University of Hertfordshire.

    Research output: Book/ReportOther report

  7. Prototyping real time engineering systems using Hatley & Pirbhai's requirement model

    Fensome, D. A., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 131)

    Research output: Book/ReportOther report

  8. Providing public access to information in complex and weakly structures domains: a 3-layered model for hypermedia information systems

    Bearne, M., Jones, S., Hewitt, J. & Sapsford-Francis, J., 1995, University of Hertfordshire. (UH Computer Science Technical Report; vol. 235)

    Research output: Book/ReportOther report

  9. Quantified reasoning in formal specification : transfer of everyday errors and biases?

    Vinter, R. J., Loomes, M. J. & Kornbrot, D., 1997, University of Hertfordshire. (UH Computer Science Technical Report; vol. 299)

    Research output: Book/ReportOther report

  10. Reasoning about formal software specifications : an initial investigation

    Vinter, R. J., Loomes, M. J. & Kornbrot, D., 1996, University of Hertfordshire. (UH Computer Science Technical Report; vol. 249)

    Research output: Book/ReportOther report

  11. Register bypassing in an asynchronous superscalar processor

    Davies, S. J., Elston, C. J. & Findlay, P., 1999, University of Hertfordshire. (UH Computer Science Technical Report; vol. 328)

    Research output: Book/ReportOther report

  12. Report of a pilot study of individually configurable multimedia learning prototypes in the development of a co-operative student model of learner characteristics

    Barker, T., Jones, S., Britton, C. & Messer, D. J., 1999, University of Hertfordshire. (UH Computer Science Technical Report; vol. 338)

    Research output: Book/ReportOther report

  13. Research issues associated with process algebras and the object-orientated paradigm

    Taylor, P. N., 1997, University of Hertfordshire. (UH Computer Science Technical Report; vol. 281)

    Research output: Book/ReportOther report

  14. Researching Learners’ Journeys: STROLL: a JISC funded project (Student Reflections On Lifelong e-Learning)

    Jefferies, A., Bullen, P. & Hyde, R., 1 Mar 2009, University of Hertfordshire. 32 p.

    Research output: Book/ReportOther report

  15. Resilient process theory (RsPT)

    Taylor, P. N., 1997, University of Hertfordshire. (UH Computer Science Technical Report; vol. 282)

    Research output: Book/ReportOther report

  16. Roles and rights

    Low, M. R. & Christianson, B., 1995, University of Hertfordshire. (UH Computer Science Technical Report; vol. 232)

    Research output: Book/ReportOther report

  17. Second-order adjoints by source code manipulation of numerical programs

    Naumann, U., Maier, M., Riehme, J. & Christianson, B., 2007, RWTH Aachen. 17 p. (RWTH Aachen, Dept Comp Science, Technical report; no. AIB TR 2007-13)

    Research output: Book/ReportOther report

  18. Security system case study

    Loomes, M. & Britton, C., 1992, University of Hertfordshire. (UH Computer Science Technical Report; vol. 136)

    Research output: Book/ReportOther report

  19. Self authenticating proxies

    Low, M. R. & Christianson, B., 1994, University of Hertfordshire. (UH Computer Science Technical Report; vol. 201)

    Research output: Book/ReportOther report

  20. Self defence in open systems using self authenticating proxies

    Low, M. R., 1993, University of Hertfordshire. (UH Computer Science Technical Report; vol. 161)

    Research output: Book/ReportOther report

  21. Sequential animation of a structured analysis required logical model of a vending machine controller

    Fensome, D. A., 1993, University of Hertfordshire. (UH Computer Science Technical Report; vol. 169)

    Research output: Book/ReportOther report

  22. Seven lesser known myths of formal methods : uncovering the psychology of formal specification

    Vinter, R. J., Loomes, M. J. & Kornbrot, D., 1996, University of Hertfordshire. (UH Computer Science Technical Report; vol. 250)

    Research output: Book/ReportOther report

  23. Shrink-wrapped optimism: the DODA approach to distributed document processing

    Christianson, B. & Snook, J. F., 1994, University of Hertfordshire. (UH Computer Science Technical Report; vol. 187)

    Research output: Book/ReportOther report

  24. Silver Surfers: Social Inclusion or Exclusion in a Digital World

    Choudrie, J. & Grey, S., 31 Aug 2008, Hatfield: University of Hertfordshire. 71 p.

    Research output: Book/ReportOther report

  25. Six curricular questions of Michael Gove

    Bage, G., Mar 2013, Cambridge Primary Review Website. 5 p.

    Research output: Book/ReportOther report

Previous 1...3 4 5 6 7 8 9 10 Next