

Author: Kim Young-Il Song Jae-Ju Shin Jin-Ho Yi Bong-Jae Choi Hoon
Publisher: Inderscience Publishers
ISSN: 0952-8091
Source: International Journal of Computer Applications in Technology, Vol.34, Iss.4, 2009-03, pp. : 241-248
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










By Chien Hung-Yu Lee Chin-Feng Liu Shih-Bin Wu Tzong-Chen
International Journal of Internet Protocol Technology, Vol. 5, Iss. 3, 2010-09 ,pp. :