

Publisher: IGI Global_journal
E-ISSN: 2155-5036|5|1|20-34
ISSN: 2155-5028
Source: International Journal of Signs and Semiotic Systems (IJSSS), Vol.5, Iss.1, 2016-01, pp. : 20-34
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


By Mahoney A.
Computers and the Humanities, Vol. 37, Iss. 4, 2003-11 ,pp. :








Reasoning about security in sensor networks
CONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE (ELECTRONIC), Vol. 1532-0626, Iss. 15, 2015-10 ,pp. :