Works matching IS 00104620 AND DT 1992 AND VI 35 AND IP 5
1
- Computer Journal, 1992, v. 35, n. 5, p. 451, doi. 10.1093/comjnl/35.5.451
- Article
2
- Computer Journal, 1992, v. 35, n. 5, p. 450-a, doi. 10.1093/comjnl/35.5.450-a
- Article
3
- Computer Journal, 1992, v. 35, n. 5, p. 450, doi. 10.1093/comjnl/35.5.450
- Article
4
- Computer Journal, 1992, v. 35, n. 5, p. 539, doi. 10.1093/comjnl/35.5.539
- Article
5
- Computer Journal, 1992, v. 35, n. 5, p. 539-a, doi. 10.1093/comjnl/35.5.539-a
- Article
6
- Computer Journal, 1992, v. 35, n. 5, p. 535, doi. 10.1093/comjnl/35.5.535
- Article
7
- Computer Journal, 1992, v. 35, n. 5, p. 538, doi. 10.1093/comjnl/35.5.538
- Article
8
- Computer Journal, 1992, v. 35, n. 5, p. 537, doi. 10.1093/comjnl/35.5.537
- Article
9
- Computer Journal, 1992, v. 35, n. 5, p. 533, doi. 10.1093/comjnl/35.5.533
- Ng, D. T. H.;
- Oommen, B. J.
- Article
10
- Computer Journal, 1992, v. 35, n. 5, p. 530, doi. 10.1093/comjnl/35.5.530
- Article
11
- Computer Journal, 1992, v. 35, n. 5, p. 527, doi. 10.1093/comjnl/35.5.527
- Article
12
- Computer Journal, 1992, v. 35, n. 5, p. 524, doi. 10.1093/comjnl/35.5.524
- Bertossi, A. A.;
- Luccio, F.;
- Pagli, L.;
- Lodi, E.
- Article
13
- Computer Journal, 1992, v. 35, n. 5, p. 514, doi. 10.1093/comjnl/35.5.514
- Søndergaard, H.;
- Sestoft, P.
- Article
14
- Computer Journal, 1992, v. 35, n. 5, p. 501, doi. 10.1093/comjnl/35.5.501
- Article
15
- Computer Journal, 1992, v. 35, n. 5, p. 513, doi. 10.1093/comjnl/35.5.513
- Article
16
- Computer Journal, 1992, v. 35, n. 5, p. 500, doi. 10.1093/comjnl/35.5.500
- Article
17
- Computer Journal, 1992, v. 35, n. 5, p. 492, doi. 10.1093/comjnl/35.5.492
- Auramäki, E.;
- Hirschheim, R.;
- Lyytinen, K.
- Article
18
- Computer Journal, 1992, v. 35, n. 5, p. 478, doi. 10.1093/comjnl/35.5.478
- van Sinderen, M.;
- Pires, L. Ferreira;
- Vissers, C. A.
- Article
19
- Computer Journal, 1992, v. 35, n. 5, p. 441, doi. 10.1093/comjnl/35.5.441
- Article
20
- Computer Journal, 1992, v. 35, n. 5, p. 491, doi. 10.1093/comjnl/35.5.491
- Article
21
- Computer Journal, 1992, v. 35, n. 5, p. 477-a, doi. 10.1093/comjnl/35.5.477-a
- Article
22
- Computer Journal, 1992, v. 35, n. 5, p. 477, doi. 10.1093/comjnl/35.5.477
- Article
23
- Computer Journal, 1992, v. 35, n. 5, p. 468, doi. 10.1093/comjnl/35.5.468
- Ehrig, H.;
- Mahr, B.;
- Orejas, F.
- Article
24
- Computer Journal, 1992, v. 35, n. 5, p. 467, doi. 10.1093/comjnl/35.5.467
- Article
25
- Computer Journal, 1992, v. 35, n. 5, p. 460, doi. 10.1093/comjnl/35.5.460
- Ehrig, H.;
- Mahr, B.;
- Classen, I.;
- Orejas, F.
- Article
26
- Computer Journal, 1992, v. 35, n. 5, p. 431, doi. 10.1093/comjnl/35.5.431
- Article
27
- Computer Journal, 1992, v. 35, n. 5, p. 430-a, doi. 10.1093/comjnl/35.5.430-a
- Article
28
- Computer Journal, 1992, v. 35, n. 5, p. 430, doi. 10.1093/comjnl/35.5.430
- Article
29
- Computer Journal, 1992, v. 35, n. 5, p. 424, doi. 10.1093/comjnl/35.5.424
- Article
30
- Computer Journal, 1992, v. 35, n. 5, p. 423, doi. 10.1093/comjnl/35.5.423
- Article
31
- Computer Journal, 1992, v. 35, n. 5, p. 419, doi. 10.1093/comjnl/35.5.419
- Article
32
- Computer Journal, 1992, v. 35, n. 5, p. 417, doi. 10.1093/comjnl/35.5.417
- Article