

Author: Izza Said Imache Rabah
Publisher: Inderscience Publishers
ISSN: 1461-4111
Source: International Journal of Information Technology and Management, Vol.9, Iss.4, 2010-09, pp. : 423-445
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


COMBINING TECHNOLOGIES TO ACHIEVE DECISIONAL TRUST
By Sanin Cesar Szczerbicki Edward Toro Carlos
Cybernetics and Systems, Vol. 39, Iss. 7, 2008-10 ,pp. :





