

Author: Thompson Phil Lehaney Brian
Publisher: Inderscience Publishers
ISSN: 1470-9503
Source: International Journal of Networking and Virtual Organisations, Vol.5, Iss.2, 2008-02, pp. : 190-203
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


By Almeida Eduardo Sunyé Gerson Traon Yves Valduriez Patrick
Empirical Software Engineering, Vol. 15, Iss. 4, 2010-08 ,pp. :





