

Author: Kreinovich Vladik Starks Scott
Publisher: Springer Publishing Company
ISSN: 1385-3139
Source: Reliable Computing, Vol.13, Iss.1, 2007-02, pp. : 119-124
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content






By Lodwick Weldon Kreinovich Vladik
Reliable Computing, Vol. 10, Iss. 1, 2004-02 ,pp. :

