Search Results - mathematical (logic OR login)-(logic OR login) and constraint programming

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Source: Theoretical Computer Science. 744:56-77

    File Description: application/pdf

  8. 8

    Authors: Smith, Alice E.

    Source: INFORMS Journal on Computing; May/Jun2024, Vol. 36 Issue 3, p705-707, 3p

  9. 9
  10. 10

    Contributors: Lobo, J [Univ. of Illinois, Chicago, IL (US). Dept. of Electrical Engineering and Computer Science]

    Source: Conference: 7. international symposium on methodologies for intelligent systems,Trondheim (Norway),15-18 Jun 1993; Other Information: PBD: [1993]

    File Description: Medium: ED; Size: 12 p.

  11. 11

    Contributors: Lobo, J [Univ. of Illinois, Chicago (United States)]

    Source: Conference: 7. international symposium on methodologies for intelligent systems, Trondheim (Norway), 15-18 Jun 1993

    File Description: Medium: ED; Size: Pages: (12 p)

  12. 12

    Source: Journal of Logical and Algebraic Methods in Programming. 92:45-63

  13. 13

    Relation: info:eu-repo/semantics/altIdentifier/arxiv/2007.16077; ARXIV: 2007.16077

  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Contributors: Cohen, J [Michtom School of Computer Science, Brandeis Univ., MA (US)]

    Source: Communications of the ACM (Association of Computing Machinery); (USA); 33:7

    File Description: Medium: X; Size: Pages: 52-68

  20. 20

    Source: Constraints. 18:535-578

    File Description: application/pdf