

Author: Piramuthu Selwyn
Publisher: Springer Publishing Company
ISSN: 1385-951X
Source: Information Technology and Management, Vol.6, Iss.4, 2005-10, pp. : 351-362
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content







