Works matching IS 00104620 AND DT 1975 AND VI 18 AND IP 3


Results: 49
    1

    Special notice.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 287
    Publication type:
    Article
    2

    Call for papers.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 287
    Publication type:
    Article
    3

    Erratum.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 287
    Publication type:
    Article
    4

    Correspondence.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 286
    By:
    • Kline, J. V.
    Publication type:
    Article
    5

    Correspondence.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 286
    By:
    • Mullins, R. S.
    Publication type:
    Article
    6

    Correspondence.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 285
    By:
    • Bradley, J.
    Publication type:
    Article
    7

    Correspondence.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 285
    By:
    • Crombie, D. B.
    Publication type:
    Article
    8

    Correspondence.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 285
    By:
    • Edwards, J. P. N.
    Publication type:
    Article
    9

    Correspondence.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 284
    By:
    • Andrew, A. M.
    Publication type:
    Article
    10

    Correspondence.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 284
    By:
    • Ewen-Smith, B. M.
    Publication type:
    Article
    11

    Correspondence.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 283
    By:
    • Howell, K. M.
    Publication type:
    Article
    12

    Correspondence.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 283
    By:
    • Arthur, D. F.
    Publication type:
    Article
    13

    Correspondence.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 282
    By:
    • Sandys, M. A.
    Publication type:
    Article
    14

    Discussion.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 279
    By:
    • Lauer, H. C.
    Publication type:
    Article
    15

    Hashing functions.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 265
    By:
    • Knott, G. D.
    Publication type:
    Article
    16

    Review: Book review.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 264
    By:
    • Morton, K. W.
    Publication type:
    Article
    17

    Review: Book review.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 264
    By:
    • Kemp, R. H.
    Publication type:
    Article
    18
    19
    20

    Review: Book review.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 251
    By:
    • Olle, T. W.
    Publication type:
    Article
    21
    22

    Review: Book review.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 249
    By:
    • Brown, D. A. H.
    Publication type:
    Article
    23
    24
    25

    Review: Book review.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 242
    By:
    • Walker, B. S.
    Publication type:
    Article
    26

    Review: Book review.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 242
    By:
    • Lehman, M. M.
    Publication type:
    Article
    27
    28
    29
    30

    Review: Book review.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 233
    By:
    • Andrew, A. M.
    Publication type:
    Article
    31
    32

    Review: Book review.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 230
    By:
    • Albasiny, E. L.
    Publication type:
    Article
    33

    Review: Book review.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 230
    By:
    • Mercer, C. A.
    Publication type:
    Article
    34
    35

    Review: Book review.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 226
    By:
    • Mercer, C. A.
    Publication type:
    Article
    36
    37

    The standard EMAS subsystem.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 213
    By:
    • Millard, G. E.;
    • Rees, D. J.;
    • Whitfield, H.
    Publication type:
    Article
    38

    Review: Book review.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 222
    By:
    • Knowles, J. S.
    Publication type:
    Article
    39

    Review: Book review.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 222
    By:
    • Young, A.
    Publication type:
    Article
    40

    Review: Book review.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 222
    By:
    • Rogers, M. H.
    Publication type:
    Article
    41
    42
    43
    44

    Review: Book review.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 205
    By:
    • Easteal, C. D.
    Publication type:
    Article
    45

    Review: Book review.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 205
    By:
    • Young, A.
    Publication type:
    Article
    46
    47
    48

    Review: Book review.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 197
    By:
    • Burstall, R. M.
    Publication type:
    Article
    49

    Insuring computers.

    Published in:
    Computer Journal, 1975, v. 18, n. 3, p. 194
    By:
    • Allen, K. J.
    Publication type:
    Article