

Author: Mu Kedian Jin Zhi Lu Ruqian Peng Yan
Publisher: Springer Publishing Company
ISSN: 0219-1377
Source: Knowledge and Information Systems, Vol.11, Iss.1, 2007-01, pp. : 85-104
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content










By Gomaa H. Kerschberg L. Sugumaran V. Bosch C. Tavakoli I. O'Hara L.
Automated Software Engineering, Vol. 3, Iss. 3-4, 1996-08 ,pp. :