Hacker News new | past | comments | ask | show | jobs | submit login

There's a chapter in Hillis' thesis on it (which this re-posting has just prompted me to finally read): http://dspace.mit.edu/handle/1721.1/14719



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: