

Author: Wang Yiqin Wang Dan
Publisher: Society for Technical Communication
ISSN: 0049-3155
Source: Technical Communication, Vol.56, Iss.1, 2009-02, pp. : 39-50
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content








Computer Gaming and Technical Communication:
Technical Communication, Vol. 55, Iss. 3, 2008-08 ,pp. :


Technical Communication Consulting as a Business
Technical Communication, Vol. 49, Iss. 2, 2002-05 ,pp. :