Search Results - mathematical login-login and constraint programming

Refine Results
  1. 1
  2. 2
  3. 3

    Source: Semantics, Logics & Calculi; 2016, p191-213, 23p

  4. 4
  5. 5
  6. 6

    Source: Language & Automata Theory & Applications 9th International Conference, LATA 2015, Nice, France, March 2-6, 2015, Proceedings; 2015, p3-24, 22p

  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Source: 9945 (First Edition 2009-09-15): Information Technology - Portable Operating System Interface (POSIX) Operating System Interface (POSIX); 1/ 1/2009, pc1-c3830, 3830p

  12. 12

    Source: 1003.1-2008 (Revision of 1003.1-2004): IEEE Standard for Information Technology- Portable Operating System Interface (POSIX) Base Specifications, Issue 7; 1/ 1/2008, pc1-c3826, 3826p

  13. 13

    Source: 1003.1, 2004 Edition. The Open Group Technical Standard. Base Specifications, Issue 6. Includes 1003.1-2001, 1003.1-2001/Cor 1-2002 & 1003.1-2001/C: IEEE Standard for Information Technology - Portable Operating System Interface (POSIX). Rationale; 1/ 1/2004, p01, 1136p

  14. 14

    Source: IEEE Std 1003.1, 2004 Edition The Open Group Technical Standard. Base Specifications, Issue 6. Includes IEEE Std 1003.1-2001, IEEE Std 1003.1-2001/Cor 1-2002 & IEEE Std 1003.1-2001/Cor 2-2004. Shell; 1/1/2004, p1-3874, 3874p

  15. 15

    Source: 1003.1-2001. Shell & Utilities, Issue 6: Standard for Information Technology - Portable Operating System Interface (POSIX) Shell & Utilities, Issue 6; 1/ 1/2001, pi-1090, 1122p

  16. 16
  17. 17
  18. 18
  19. 19
  20. 20