#! | 100 lines | 100 code | 0 blank | 0 comment | 0 complexity | 6b408241dd5abe62068b896e5ac5ac79 MD5 | raw file
1.\" This module is believed to contain source code proprietary to AT&T. 2.\" Use and redistribution is subject to the Berkeley Software License 3.\" Agreement and your Software Agreement with AT&T (Western Electric). 4.\" 5.\" @(#)ttack 8.1 (Berkeley) 6/8/93 6.\" Copyright (C) Caldera International Inc. 2001-2002. All rights reserved. 7.\" 8.\" Redistribution and use in source and binary forms, with or without 9.\" modification, are permitted provided that the following conditions are 10.\" met: 11.\" 12.\" Redistributions of source code and documentation must retain the above 13.\" copyright notice, this list of conditions and the following 14.\" disclaimer. 15.\" 16.\" Redistributions in binary form must reproduce the above copyright 17.\" notice, this list of conditions and the following disclaimer in the 18.\" documentation and/or other materials provided with the distribution. 19.\" 20.\" All advertising materials mentioning features or use of this software 21.\" must display the following acknowledgement: 22.\" 23.\" This product includes software developed or owned by Caldera 24.\" International, Inc. Neither the name of Caldera International, Inc. 25.\" nor the names of other contributors may be used to endorse or promote 26.\" products derived from this software without specific prior written 27.\" permission. 28.\" 29.\" USE OF THE SOFTWARE PROVIDED FOR UNDER THIS LICENSE BY CALDERA 30.\" INTERNATIONAL, INC. AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR 31.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 32.\" WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE 33.\" DISCLAIMED. IN NO EVENT SHALL CALDERA INTERNATIONAL, INC. BE LIABLE 34.\" FOR ANY DIRECT, INDIRECT INCIDENTAL, SPECIAL, EXEMPLARY, OR 35.\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 36.\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR 37.\" BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, 38.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE 39.\" OR OTHERWISE) RISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN 40.\" IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 41.\" 42.\" $FreeBSD$ 43.\" 44.SH 45Acknowledgements 46.PP 47I am deeply indebted to J. F. Ossanna, 48the author of 49.UL troff , 50for his repeated patient explanations 51of 52fine points, 53and for his continuing willingness to 54adapt 55.UL troff 56to make other uses easier. 57I am also grateful to Jim Blinn, Ted Dolotta, 58Doug McIlroy, Mike Lesk and Joel Sturman 59for helpful comments on this paper. 60.SH 61References 62.LP 63.IP  64J. F. Ossanna, 65.ul 66.UC NROFF/TROFF 67User's Manual, 68Bell Laboratories 69Computing Science Technical Report 54, 1976. 70.IP  71B. W. Kernighan, 72.ul 73A System for Typesetting Mathematics _ User's Guide 74.ul 75(Second Edition), 76Bell Laboratories 77Computing Science Technical Report 17, 1977. 78.IP  79M. E. Lesk, 80.ul 81TBL _ A Program to Format Tables, 82Bell Laboratories 83Computing Science Technical Report 49, 1976. 84.IP  85M. E. Lesk, 86.ul 87Typing Documents on UNIX, 88Bell Laboratories, 1978. 89.IP  90J. R. Mashey and D. W. Smith, 91.ul 92PWB/MM _ 93.ul 94Programmer's Workbench Memorandum Macros, 95Bell Laboratories internal memorandum. 96.IP  97Eric P. Allman, 98.ul 99Writing Papers with NROFF using -me, 100University of California, Berkeley.