

Publisher: IGI Global_journal
E-ISSN: 1938-0208|3|1|33-49
ISSN: 1938-0194
Source: International Journal of Web Portals (IJWP), Vol.3, Iss.1, 2011-01, pp. : 33-49
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Anatomy of enterprise collaborations
Production Planning and Control, Vol. 12, Iss. 5, 2001-07 ,pp. :


Secure collaborations over message boards
By Ramkumar Mahalingam Memon Nasir
International Journal of Security and Networks, Vol. 1, Iss. 1-2, 2006-09 ,pp. :




Model Checking UML State Machines and Collaborations
By Schafer T. Knapp A. Merz S.
Electronic Notes in Theoretical Computer Science, Vol. 55, Iss. 3, 2004-01 ,pp. :