

Author: Kang J.-K. Shivdasani A. Chen H.M. Wang W. Smith D. Chan S.C.
Publisher: Elsevier
ISSN: 0304-3975
Source: Theoretical Computer Science, Vol.1336, Iss.2, 1997-08, pp. : 171-179
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content








From business to software: a B2B survey
By Dorn Jürgen
Information Systems and e-Business Management, Vol. 7, Iss. 2, 2009-03 ,pp. :


Semantic Synchronization in B2B Transactions
Journal of Cases on Information Technology (JCIT), Vol. 11, Iss. 4, 2009-10 ,pp. :