

Publisher: IGI Global_journal
E-ISSN: 1947-8216|4|4|55-63
ISSN: 1947-8208
Source: International Journal of Knowledge and Systems Science (IJKSS), Vol.4, Iss.4, 2013-10, pp. : 55-63
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




Detecting the error threshold for rule-based programs: a logit model
By Moores T.T.
Expert Systems with Applications, Vol. 19, Iss. 3, 2000-10 ,pp. :




By Wang Shan
International Journal of Networking and Virtual Organisations, Vol. 11, Iss. 3-4, 2012-09 ,pp. :