

Author: Beach Regina
Publisher: The Charleston Company
ISSN: 1525-4003
Source: The Charleston Advisor, Vol.9, Iss.1, 2007-07, pp. : 42-43
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




By Chou David C Tripuramallu Hima Bindu Chou Amy Y
Information Management & Computer Security, Vol. 13, Iss. 5, 2005-05 ,pp. :


Electronic Notes in Theoretical Computer Science, Vol. 4, Iss. 1, 2004-01 ,pp. :


Journal of Symbolic Computation, Vol. 22, Iss. 3, 1996-03 ,pp. :


A defect theorem for bi-infinite words
By Karhumaki J. Manuch J. Plandowski W.
Theoretical Computer Science, Vol. 292, Iss. 1, 2003-01 ,pp. :