Protected: A few examples of research using CL methods This content is password-protected. To view it, please enter the password below. Password: