

Publisher: John Wiley & Sons Inc
E-ISSN: 2047-7481|27|1|22-49
ISSN: 2047-7473
Source: JOURNAL OF SOFTWARE: EVOLUTION AND PROCESS (ELECTRONIC), Vol.27, Iss.1, 2015-01, pp. : 22-49
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content








Leveraging Objects for Mission-Critical Applications
Journal of Cases on Information Technology (JCIT), Vol. 1, Iss. 1, 1999-01 ,pp. :