

Author: Graham W.C. Majumdar S.
Publisher: Academic Press
ISSN: 0743-7315
Source: Journal of Parallel and Distributed Computing, Vol.58, Iss.3, 1999-09, pp. : 389-424
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




From client/server to intranet
By Wen H Joseph
Information Management & Computer Security, Vol. 6, Iss. 1, 1998-01 ,pp. :


By Lyu Jr. Jung Lee Ming-Chang Ding Jyh-Hong Gunasekaran A.
International Journal of Information Technology and Management, Vol. 1, Iss. 2-3, 2003-07 ,pp. :

