

Publisher: IGI Global_journal
E-ISSN: 1942-3608|9|2|1-16
ISSN: 1942-3594
Source: International Journal of Applied Evolutionary Computation (IJAEC), Vol.9, Iss.2, 2018-04, pp. : 1-16
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


''Top-down'' versus ''Bottom-up'' - Different approaches to security
By Wilson P.
Network Security, Vol. 2003, Iss. 12, 2003-12 ,pp. :






Top-down and bottom-up expert estimation of software development effort
By Jorgensen M.
Information and Software Technology, Vol. 46, Iss. 1, 2004-01 ,pp. :