Works matching IS 00104620 AND DT 1994 AND VI 37 AND IP 8


Results: 25
    1

    Review: Book Review.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 732, doi. 10.1093/comjnl/37.8.732-a
    By:
    • Rao, P. V. S.
    Publication type:
    Article
    2

    Review: Book Review.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 731, doi. 10.1093/comjnl/37.8.731-a
    By:
    • Johnson, R. C.
    Publication type:
    Article
    3

    Review: Book Review.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 732, doi. 10.1093/comjnl/37.8.732
    By:
    • Vytopil, J.
    Publication type:
    Article
    4

    Review: Book Review.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 731, doi. 10.1093/comjnl/37.8.731
    By:
    • Gupta, A.
    Publication type:
    Article
    5

    Review: Book Review.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 730, doi. 10.1093/comjnl/37.8.730-a
    By:
    • Joy, M.
    Publication type:
    Article
    6

    Review: Book Review.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 730, doi. 10.1093/comjnl/37.8.730
    By:
    • Czarnecki, C.
    Publication type:
    Article
    7

    Review: Book Review.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 728, doi. 10.1093/comjnl/37.8.728
    By:
    • Stroud, R.
    Publication type:
    Article
    8

    Review: Book Review.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 727, doi. 10.1093/comjnl/37.8.727-a
    By:
    • Stroud, R.
    Publication type:
    Article
    9

    Review: Book Review.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 727, doi. 10.1093/comjnl/37.8.727
    By:
    • Mullender, S. J.
    Publication type:
    Article
    10

    Review: Book Review.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 726, doi. 10.1093/comjnl/37.8.726
    By:
    • Jones, J.
    Publication type:
    Article
    11

    Review: Book Review.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 725, doi. 10.1093/comjnl/37.8.725-a
    By:
    • Nori, K. V.
    Publication type:
    Article
    12

    Review: Book Review.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 725, doi. 10.1093/comjnl/37.8.725
    By:
    • Czarnecki, C.
    Publication type:
    Article
    13

    Review: Book Review.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 722, doi. 10.1093/comjnl/37.8.722
    By:
    • Mukherjee, P.
    Publication type:
    Article
    14

    Review: Book Review.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 722, doi. 10.1093/comjnl/37.8.722-a
    By:
    • Hayes, G.
    Publication type:
    Article
    15

    Review: Book Review.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 723, doi. 10.1093/comjnl/37.8.723
    By:
    • Shawe-Taylor, J.
    Publication type:
    Article
    16

    Review: Book Review.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 721, doi. 10.1093/comjnl/37.8.721
    By:
    • Brown, C.
    Publication type:
    Article
    17

    Review: Book Review.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 720, doi. 10.1093/comjnl/37.8.720-a
    By:
    • Hanna, F. K.
    Publication type:
    Article
    18

    Review: Book Review.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 720, doi. 10.1093/comjnl/37.8.720
    By:
    • Matthews, S.
    Publication type:
    Article
    19

    An Analysis of Spiral Hashing.

    Published in:
    Computer Journal, 1994, v. 37, n. 8, p. 715, doi. 10.1093/comjnl/37.8.715
    By:
    • Chu, J.-H.;
    • Knott, G. D.
    Publication type:
    Article
    20
    21
    22
    23
    24
    25