6
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Foundations and Practice of Security 

      Constraint Answer Set Solving

      other
      , ,
      Springer Berlin Heidelberg

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Author and book information

          Book Chapter
          2009
          : 235-249
          10.1007/978-3-642-02846-5_22
          fbfa098c-536e-4cd6-994b-e2e6e762391b
          History

          Comments

          Comment on this book

          Book chapters

          Similar content2,096

          Cited by19