

Publisher: OECD Publishing
ISSN: 1608-0270
Source: SourceOECD Science & Information Technology, Vol.2007, Iss.5, 2007-06, pp. : 90-103
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


International Journal of ICT Research and Development in Africa (IJICTRDA), Vol. 1, Iss. 1, 2010-01 ,pp. :






Regulation of Overlaps in Technology Development Activities
By Liu J.
Annals of Operations Research, Vol. 98, Iss. 1-4, 2000-12 ,pp. :


Problem driven CVE technology development
By Economou D. Mitchell W.L. Pettifer S.R.
Journal of Network and Computer Applications, Vol. 25, Iss. 4, 2002-10 ,pp. :