Author: Armengol E.
Publisher: Springer Publishing Company
ISSN: 0885-6125
Source: Machine Learning, Vol.41, Iss.3, 2000-12, pp. : 259-294
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
''Top-down'' versus ''Bottom-up'' - Different approaches to security
By Wilson P.
Network Security, Vol. 2003, Iss. 12, 2003-12 ,pp. :