

Publisher: IGI Global_journal
E-ISSN: 1548-7725|5|1|358-369
ISSN: 1548-7717
Source: Journal of Cases on Information Technology (JCIT), Vol.5, Iss.1, 2003-01, pp. : 358-369
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




By Manganari Emmanouela E. Siomkos George J. Rigopoulou Irini D. Vrechopoulos Adam P.
Internet Research: Electronic Networking Applications and Policy, Vol. 21, Iss. 3, 2011-01 ,pp. :




Closure operations for digital topology
By Slapal J.
Theoretical Computer Science, Vol. 305, Iss. 1, 2003-08 ,pp. :