

Author: Defersha Fantahun M. Chen Mingyuan
Publisher: Inderscience Publishers
ISSN: 1745-7645
Source: International Journal of Operational Research, Vol.10, Iss.4, 2011-04, pp. : 458-468
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


By Aravindkrishna T. Balasubramanian V. Narendran T.T.
International Journal of Enterprise Network Management, Vol. 3, Iss. 3, 2010-04 ,pp. :





