Login / Signup
Academic freedom and the hacker ethic.
Tom Cross
Published in:
Commun. ACM (2006)
Keyphrases
</>
network security
search algorithm
databases
cooperative
knowledge base
case study
three dimensional
computer science
evolutionary algorithm