

Author: Thanh Hoang Chi
Publisher: Inderscience Publishers
ISSN: 1751-5858
Source: International Journal of Intelligent Information and Database Systems, Vol.7, Iss.2, 2013-04, pp. : 135-147
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content








By Gogoi Prasanta Bhattacharyya Dhruba K. Kalita Jugal K.
International Journal of Security and Networks, Vol. 8, Iss. 2, 2013-08 ,pp. :


By Saeki Shin'ichirou Bhalla Subhash Hasegawa Masaki
International Journal of Computational Science and Engineering, Vol. 3, Iss. 2, 2007-11 ,pp. :