

Author: Roberge L.
Publisher: Springer Publishing Company
ISSN: 0924-8463
Source: Artificial Intelligence and Law, Vol.10, Iss.4, 2002-01, pp. : 261-282
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Information Technology in the Practice of Law Enforcement
Journal of Cases on Information Technology (JCIT), Vol. 7, Iss. 1, 2005-01 ,pp. :








By Rudall B.H.
Kybernetes: The International Journal of Systems & Cybernetics, Vol. 40, Iss. 9-10, 2011-10 ,pp. :