Login / Signup

Academic freedom and the hacker ethic.

Tom Cross
Published in: Commun. ACM (2006)
Keyphrases
  • network security
  • search algorithm
  • databases
  • cooperative
  • knowledge base
  • case study
  • three dimensional
  • computer science
  • evolutionary algorithm