

Publisher: Bentham Science Publishers
E-ISSN: 1876-4037|6|3|143-144
ISSN: 1876-4029
Source: Micro and Nanosystems, Vol.6, Iss.3, 2014-08, pp. : 143-144
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Top-down driven architecture design
Information Management & Computer Security, Vol. 5, Iss. 4, 1997-04 ,pp. :




A top-down approach for approximate data anonymisation
By Li JianQiang
Enterprise Information Systems, Vol. 7, Iss. 3, 2013-08 ,pp. :


Integrated modeling with top-down approach in subsidiary industries
By Aleixos N. Company P. Contero M.
Computers in Industry, Vol. 53, Iss. 1, 2004-01 ,pp. :


Computing abduction by using TMS with top-down expectation
The Journal of Logic Programming, Vol. 44, Iss. 1, 2000-07 ,pp. :