Works matching IS 00104620 AND DT 1988 AND VI 31 AND IP 5
1
- Computer Journal, 1988, v. 31, n. 5, p. 476, doi. 10.1093/comjnl/31.5.476
- Article
2
- Computer Journal, 1988, v. 31, n. 5, p. 474, doi. 10.1093/comjnl/31.5.474
- Article
3
- Computer Journal, 1988, v. 31, n. 5, p. 465, doi. 10.1093/comjnl/31.5.465
- Article
4
- Computer Journal, 1988, v. 31, n. 5, p. 431, doi. 10.1093/comjnl/31.5.431
- Article
5
- Computer Journal, 1988, v. 31, n. 5, p. 457, doi. 10.1093/comjnl/31.5.457
- Dillon, A.;
- McKnight, C.;
- Richardson, J.
- Article
6
- Computer Journal, 1988, v. 31, n. 5, p. 445, doi. 10.1093/comjnl/31.5.445
- Barnard, P.;
- Wilson, M.;
- Maclean, A.
- Article
7
- Computer Journal, 1988, v. 31, n. 5, p. 437, doi. 10.1093/comjnl/31.5.437
- Morris, D.;
- Theaker, C. J.;
- Phillips, R.;
- Love, W.
- Article
8
- Computer Journal, 1988, v. 31, n. 5, p. 426, doi. 10.1093/comjnl/31.5.426
- Article
9
- Computer Journal, 1988, v. 31, n. 5, p. 420, doi. 10.1093/comjnl/31.5.420
- Article
10
- Computer Journal, 1988, v. 31, n. 5, p. 409, doi. 10.1093/comjnl/31.5.409
- Jagodzinski, A. P.;
- Clarke, D. D.
- Article
11
- Computer Journal, 1988, v. 31, n. 5, p. 398, doi. 10.1093/comjnl/31.5.398
- Hirschheim, R.;
- Newman, M.
- Article
12
- Computer Journal, 1988, v. 31, n. 5, p. 391, doi. 10.1093/comjnl/31.5.391
- Article
13
- Computer Journal, 1988, v. 31, n. 5, p. 386, doi. 10.1093/comjnl/31.5.386
- Article