

Author: Casu Matteo Cicala Giuseppe Tacchella Armando
Publisher: Springer Publishing Company
ISSN: 1387-3326
Source: Information Systems Frontiers, Vol.15, Iss.5, 2013-11, pp. : 849-871
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










By Liu Chi-Lun
Kybernetes: The International Journal of Systems & Cybernetics, Vol. 43, Iss. 2, 2014-02 ,pp. :