How to apply CBR methods in Web service composition?
Source:
2nd international conference on Security of information and networks,(2006)
6
Views
Information & Security: An International Journal
16
(2005):
79-92.
Peer-reviewed open-access journal
published since 1998 by Procon Ltd.