Skip to Main Content
This issue contains five papers and a technical note on a variety of subjects, including box-structured methods, disk I/O wait time savings, project management, the Retail Application Architecture* (RAA*), computerized recognition of faces, and attacks on cryptographic control vectors. It also contains an index for 1989 through 1992.
Note: The Institute of Electrical and Electronics Engineers, Incorporated is distributing this Article with permission of the International Business Machines Corporation (IBM) who is the exclusive owner. The recipient of this Article may not assign, sublicense, lease, rent or otherwise transfer, reproduce, prepare derivative works, publicly display or perform, or distribute the Article.