

Author: Sargent R G
Publisher: Palgrave Macmillan Ltd
ISSN: 1747-7786
Source: Journal of Simulation, Vol.7, Iss.1, 2013-02, pp. : 12-24
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content








Enterprise model verification and validation: an approach
By Chapurlat V. Kamsu-Foguem B. Prunet F.
Annual Reviews in Control, Vol. 27, Iss. 2, 2003-01 ,pp. :


Design and Verification of Logical Models
Automation and Remote Control, Vol. 65, Iss. 6, 2004-06 ,pp. :