Legacy Model Reconfiguration Using Graph-Theoretic

Year
2008
Type(s)
Author(s)
Abdullah Azween
Source
International Journal of Computer Science and Network Security, 8(11): 177—183, 2008
Url
http://paper.ijcsns.org/07_book/200811/20081125.pdf