

Author: Hurley S.
Publisher: Springer Publishing Company
ISSN: 0254-5330
Source: Annals of Operations Research, Vol.107, Iss.1-4, 2001-10, pp. : 211-224
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










By Wei Zuying Zhang Tianrong Wu Fan Gao Xiaofeng Chen Guihai Yi Ping
Personal and Ubiquitous Computing, Vol. 18, Iss. 4, 2014-04 ,pp. :