DC Field | Value | Language |
---|---|---|
dc.contributor.author | Son, J.H. | ko |
dc.contributor.author | Kim, Myoung Ho | ko |
dc.date.accessioned | 2007-09-18T02:17:40Z | - |
dc.date.available | 2007-09-18T02:17:40Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2001-04 | - |
dc.identifier.citation | Seventh Int'l Conf. on Database Systems for Advanced Applications, pp.146 - 147 | - |
dc.identifier.uri | http://hdl.handle.net/10203/1454 | - |
dc.description.sponsorship | This work was supported in part by the Hacking and Virus research Center. | en |
dc.language | English | - |
dc.language.iso | en_US | en |
dc.publisher | IEEE | - |
dc.title | Analyzing the Critical Path for the Well-formed Workflow Schema | - |
dc.type | Conference | - |
dc.identifier.wosid | 000168450100018 | - |
dc.identifier.scopusid | 2-s2.0-59849125978 | - |
dc.type.rims | CONF | - |
dc.citation.beginningpage | 146 | - |
dc.citation.endingpage | 147 | - |
dc.citation.publicationname | Seventh Int'l Conf. on Database Systems for Advanced Applications | - |
dc.identifier.conferencecountry | HK | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Kim, Myoung Ho | - |
dc.contributor.nonIdAuthor | Son, J.H. | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.