Search
ComputingReviews.com
Processing encrypted data
Ahituv N., Lapid Y., Neumann S. Communications of the ACM30(9):777-780,1987.Type:Article
Published By:
ACM Press
Use your personal or institutional subscription to read the
fulltext of the article.
You can purchase an article without having a subscription.
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy