CORE
🇺🇦Â
 make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
Filters
2 research outputs found
Recommended from our members
Defining computer security needs in a university data base environment.
Author
Ball Leslie D.
Publication venue
ScholarWorks@UMass Amherst
Publication date
01/01/1975
Field of study
Get PDF
ScholarWorks@UMass Amherst
Execution time requirements for encipherment programs
Author
Baran
Carroll J.M.
+11Â more
Conway R.
Garrison W.A.
Golomb S.
Graft C.
Hoffman J.
Lance J. Hoffman
Peterson H. E.
Skatrud R.O.
Theodore D. Friedman
Turn R.
Turn R.
Publication venue
'Association for Computing Machinery (ACM)'
Publication date
Field of study
No full text
Crossref