

Author: Leith P.
Publisher: Springer Publishing Company
ISSN: 0924-8463
Source: Artificial Intelligence and Law, Vol.6, Iss.2-4, 1998-01, pp. : 289-309
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




Malware Attacks: Why, When and How?
SourceOECD Science & Information Technology, Vol. 2009, Iss. 2, 2009-02 ,pp. :


Introduction: Agents and Norms: How to fill the gap?
By Conte R.
Artificial Intelligence and Law, Vol. 7, Iss. 1, 1999-03 ,pp. :


Digital Creativity, Vol. 23, Iss. 1, 2012-03 ,pp. :