

Author: Feng Jun Zhu Yuelong Mukai Naoto Watanabe Toyohide
Publisher: Springer Publishing Company
ISSN: 0924-669X
Source: Applied Intelligence, Vol.26, Iss.1, 2007-02, pp. : 69-79
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content






By Wilson Jeffery W. Chen I.R.
International Journal of Pervasive Computing and Communications, Vol. 5, Iss. 4, 2009-11 ,pp. :