𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Design and analysis of firewall-penetrated scheme based on trusted host

✍ Scribed by Deng-yin ZHANG; Qian-qian WANG; Jian XU


Book ID
108484693
Publisher
Chinese Electronic Periodical Services
Year
2007
Tongue
English
Weight
732 KB
Volume
14
Category
Article
ISSN
1005-8885

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Macroscopic analysis of design processes
✍ Masaki Suwa; Terry Purcell; John Gero πŸ“‚ Article πŸ“… 1998 πŸ› Elsevier Science 🌐 English βš– 515 KB

D esign is a kind of apprenticeship in which skills and expertise are acquired after learning basic techniques, assimilating domainspecific and general knowledge, and inspecting past good examples. The acquired expertise, however, is often tacit and implicit. Even skilled designers cannot articulate