Author: Khataniar Guruprasad
Publisher: Springer Publishing Company
ISSN: 1936-6442
Source: Peer-to-Peer Networking and Applications, Vol.4, Iss.3, 2011-09, pp. : 251-258
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Design Churn as Predictor of Vulnerabilities?
International Journal of Secure Software Engineering (IJSSE), Vol. 5, Iss. 3, 2014-07 ,pp. :
Counting non-isomorphic chord diagrams
Theoretical Computer Science, Vol. 204, Iss. 1, 1998-09 ,pp. :