-
1
-
-
84957668700
-
Secrecy by typing in security protocols
-
Proc. 3rd International Symposium on Theoretical Aspects of Computer Software (TACS97), Springer
-
M. Abadi. Secrecy by typing in security protocols. In Proc. 3rd International Symposium on Theoretical Aspects of Computer Software (TACS97), volume 1281 of Lecture Notes in Computer Science (LNCS), pages 611-638. Springer, 1997.
-
(1997)
Lecture Notes in Computer Science (LNCS)
, vol.1281
, pp. 611-638
-
-
Abadi, M.1
-
2
-
-
0001772130
-
Secrecy by typing in security protocols
-
M. Abadi. Secrecy by typing in security protocols. Journal of the ACM (JACM), 46(5):749-786, 1999.
-
(1999)
Journal of the ACM (JACM)
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
6
-
-
50449105335
-
-
Clément-Juglar, orig. 1943: À La Recherche d'une Discipline Économique
-
M.F.C. Allais. Traité d'économie pure. Clément- Juglar, 1971. orig. 1943: À La Recherche d'une Discipline Économique.
-
(1971)
Traité D'économie Pure
-
-
Allais, M.F.C.1
-
7
-
-
4444239267
-
On name generation and set-based analysis in dolev-yao model
-
INRIA
-
R.M. Amadio and W. Charatonik. On name generation and set-based analysis in dolev-yao model. Research Report 4379, INRIA, 2002.
-
(2002)
Research Report
, vol.4379
-
-
Amadio, R.M.1
Charatonik, W.2
-
9
-
-
35048879871
-
The essence of constraint propagation
-
K.R. Apt. The essence of constraint propagation. CWI Quarterly, 11(2-3):215-248, 1998.
-
(1998)
CWI Quarterly
, vol.11
, Issue.2-3
, pp. 215-248
-
-
Apt, K.R.1
-
10
-
-
0001751689
-
The essence of Constraint Propagation
-
K.R. Apt. The essence of Constraint Propagation. Theoretical Computer Science, 221(1-2):179-210, 1999.
-
(1999)
Theoretical Computer Science
, vol.221
, Issue.1-2
, pp. 179-210
-
-
Apt, K.R.1
-
11
-
-
84957371655
-
The Rough Guide to Constraint Propagation (corrected version)
-
Proc. 5th International Conference on Principles and Practice of Constraint Programming (CP99), Springer, invited lecture
-
K.R. Apt. The Rough Guide to Constraint Propagation (corrected version). In Proc. 5th International Conference on Principles and Practice of Constraint Programming (CP99), volume 1713 of Lecture Notes in Computer Science (LNCS), pages 1-23. Springer, 1999. invited lecture.
-
(1999)
Lecture Notes in Computer Science (LNCS)
, vol.1713
, pp. 1-23
-
-
Apt, K.R.1
-
13
-
-
0004065895
-
Rfc2702: Requirements for traffic engineering over mpls
-
Network Working Group
-
D. Awduche, J. Malcolm, J. Agogbua, M. O'Dell, and J. McManus. Rfc2702: Requirements for traffic engineering over mpls. Technical report, Network Working Group, 1999.
-
(1999)
Technical Report
-
-
Awduche, D.1
Malcolm, J.2
Agogbua, J.3
O'Dell, M.4
McManus, J.5
-
15
-
-
17244371611
-
Refining abstract state machine specifications of the steam boiler control to well documented executable code
-
Formal Methods for Industrial Applications: The Steam-Boiler Case Study, Springer
-
C. Beierle, E. Börger, I. Durdanivich, U. Glässer, and E. Riccobene. Refining abstract state machine specifications of the steam boiler control to well documented executable code. In Formal Methods for Industrial Applications: The Steam-Boiler Case Study, volume 1165 of Lecture Notes in Computer Science (LNCS), pages 52-78. Springer, 1995.
-
(1995)
Lecture Notes in Computer Science (LNCS)
, vol.1165
, pp. 52-78
-
-
Beierle, C.1
Börger, E.2
Durdanivich, I.3
Glässer, U.4
Riccobene, E.5
-
16
-
-
0012639813
-
-
PhD thesis, Research Report 493, Computer Laboratory, University of Cambridge
-
G. Bella. Inductive Verification of Cryptographic Protocols. PhD thesis, Research Report 493, Computer Laboratory, University of Cambridge, 2000.
-
(2000)
Inductive Verification of Cryptographic Protocols
-
-
Bella, G.1
-
18
-
-
84948414101
-
Soft constraints for security protocol analysis: Confidentiality
-
Proc. 3nd International Symposium on Practical Aspects of Declarative Languages (PADL'01), Springer
-
G. Bella and S. Bistarelli. Soft constraints for security protocol analysis: Confidentiality. In Proc. 3nd International Symposium on Practical Aspects of Declarative Languages (PADL'01), volume 1990 of Lecture Notes in Computer Science (LNCS), pages 108-122. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science (LNCS)
, vol.1990
, pp. 108-122
-
-
Bella, G.1
Bistarelli, S.2
-
19
-
-
35048872309
-
Confidentiality levels and deliberate/indeliberate protocol attacks
-
Lecture Notes in Computer Science (LNCS). Springer, To appear
-
G. Bella and S. Bistarelli. Confidentiality levels and deliberate/indeliberate protocol attacks. In Proc. 10th International Cambridge Security Protocol Workshop, Lecture Notes in Computer Science (LNCS). Springer, 2002. To appear.
-
(2002)
Proc. 10th International Cambridge Security Protocol Workshop
-
-
Bella, G.1
Bistarelli, S.2
-
20
-
-
35048872309
-
Confidentiality levels and deliberate/indeliberate protocol attacks
-
Lecture Notes in Computer Science (LNCS). Springer, Forthcoming
-
G. Bella and S. Bistarelli. Confidentiality levels and deliberate/indeliberate protocol attacks. In Proc. 10th Cambridge International Security Protocol Workshop (CISPW2002), Lecture Notes in Computer Science (LNCS). Springer, 2002. Forthcoming.
-
(2002)
Proc. 10th Cambridge International Security Protocol Workshop (CISPW2002)
-
-
Bella, G.1
Bistarelli, S.2
-
21
-
-
0037250327
-
Verifying the SET Registration Protocols
-
G. Bella, F. Massacci, and L.C. Paulson. Verifying the SET Registration Protocols. IEEE Journal of Selected Areas in Communications, 1(21):77-87, 2003.
-
(2003)
IEEE Journal of Selected Areas in Communications
, vol.1
, Issue.21
, pp. 77-87
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
-
22
-
-
22444455879
-
Kerberos version iv: Inductive analysis of the secrecy goals
-
J.-J Quisquater, Y. Desware, C. Meadows, and D. Gollmann, editors, Proc. European Symposium on Research in Computer Security (ESORICS98), SV
-
G. Bella and L.C. Paulson. Kerberos version iv: Inductive analysis of the secrecy goals. In J.-J Quisquater, Y. Desware, C. Meadows, and D. Gollmann, editors, Proc. European Symposium on Research in Computer Security (ESORICS98), volume 1485 of Lecture Notes in Computer Science (LNCS), pages 361-375. SV, 1998.
-
(1998)
Lecture Notes in Computer Science (LNCS)
, vol.1485
, pp. 361-375
-
-
Bella, G.1
Paulson, L.C.2
-
29
-
-
0028336331
-
Arc-consistency and arc-consistency again
-
C. Bessière. Arc-consistency and arc-consistency again. Artificial Intelligence, 65(1):179-190, 1994.
-
(1994)
Artificial Intelligence
, vol.65
, Issue.1
, pp. 179-190
-
-
Bessière, C.1
-
31
-
-
0041884691
-
-
Master's thesis, Dipartimento di Informatica, Università di Pisa, Italy, In Italian
-
S. Bistarelli. Programmazione con vincoli pesati e ottimizzazione. Master's thesis, Dipartimento di Informatica, Università di Pisa, Italy, 1994. In Italian.
-
(1994)
Programmazione con Vincoli Pesati e Ottimizzazione
-
-
Bistarelli, S.1
-
33
-
-
35048889882
-
Abstracting soft constraints
-
Proc. Cyprus ERCIM/COMPULOG workshop, Springer
-
S. Bistarelli, P. Codognet, Y. Georget, and F. Rossi. Abstracting soft constraints. In Proc. Cyprus ERCIM/COMPULOG workshop, volume 1865 of Lecture Notes in Artificial Intelligence (LNAI), pages 108-133. Springer, 2000.
-
(2000)
Lecture Notes in Artificial Intelligence (LNAI)
, vol.1865
, pp. 108-133
-
-
Bistarelli, S.1
Codognet, P.2
Georget, Y.3
Rossi, F.4
-
34
-
-
84948416791
-
Labeling and partial local consistency for soft constraint programming
-
Proc. 2nd International Workshop on Practical Aspects of Declarative Languages (PADL'00), Springer
-
S. Bistarelli, P. Codognet, Y. Georget, and F. Rossi. Labeling and partial local consistency for soft constraint programming. In Proc. 2nd International Workshop on Practical Aspects of Declarative Languages (PADL'00), volume 1753 of Lecture. Notes in Computer Science (LNCS), pages 230-248. Springer, 2000.
-
(2000)
Lecture. Notes in Computer Science (LNCS)
, vol.1753
, pp. 230-248
-
-
Bistarelli, S.1
Codognet, P.2
Georget, Y.3
Rossi, F.4
-
35
-
-
84942889171
-
An abstraction framework for soft constraint
-
Proc. Symposium on Abstraction, Reformulation and Approximation (SARA2000), Springer
-
S. Bistarelli, P. Codognet, and F. Rossi. An abstraction framework for soft constraint. In Proc. Symposium on Abstraction, Reformulation and Approximation (SARA2000), volume 1864 of Lecture, Notes in Artificial Intelligence (LNAI), pages 71-86. Springer, 2000.
-
(2000)
Lecture, Notes in Artificial Intelligence (LNAI)
, vol.1864
, pp. 71-86
-
-
Bistarelli, S.1
Codognet, P.2
Rossi, F.3
-
36
-
-
0036680316
-
Abstracting soft constraints: Framework, properties, examples
-
S. Bistarelli, P. Codognet, and F. Rossi. Abstracting soft constraints: Framework, properties, examples. Artificial Intelligence, 139(2):175-211, 2002.
-
(2002)
Artificial Intelligence
, vol.139
, Issue.2
, pp. 175-211
-
-
Bistarelli, S.1
Codognet, P.2
Rossi, F.3
-
37
-
-
84957034298
-
Interchangeability in soft csps
-
Proc. 8th International Conference on Principles and Practice of Constraint Programming (CP2002), Springer
-
S. Bistarelli, B. Faltings, and N. Neagu. Interchangeability in soft csps. In Proc. 8th International Conference on Principles and Practice of Constraint Programming (CP2002), volume 2470 of Lecture Notes in Computer Science (LNCS). Springer, 2002.
-
(2002)
Lecture Notes in Computer Science (LNCS)
, vol.2470
-
-
Bistarelli, S.1
Faltings, B.2
Neagu, N.3
-
38
-
-
84947772501
-
Semiring-based CSPs and valued CSPs: Basic properties and comparison
-
Over-Constrained Systems, Springer
-
S. Bistarelli, H. Fargier, U. Montanari, F. Rossi, T. Schiex, and G. Verfaillie. Semiring-based CSPs and valued CSPs: Basic properties and comparison. In Over-Constrained Systems, volume 1106 of Lecture Notes in Computer Science (LNCS), pages 111-150. Springer, 1996.
-
(1996)
Lecture Notes in Computer Science (LNCS)
, vol.1106
, pp. 111-150
-
-
Bistarelli, S.1
Fargier, H.2
Montanari, U.3
Rossi, F.4
Schiex, T.5
Verfaillie, G.6
-
39
-
-
0003369786
-
Semiring-based CSPs and Valued CSPs: Frameworks, properties, and comparison
-
S. Bistarelli, H. Fargier, U. Montanari, F. Rossi, T. Schiex, and G. Verfaillie. Semiring-based CSPs and Valued CSPs: Frameworks, properties, and comparison. CONSTRAINTS, 4(3):199-240, 1999.
-
(1999)
CONSTRAINTS
, vol.4
, Issue.3
, pp. 199-240
-
-
Bistarelli, S.1
Fargier, H.2
Montanari, U.3
Rossi, F.4
Schiex, T.5
Verfaillie, G.6
-
42
-
-
0036038693
-
Soft constraint propagation and solving in chr
-
ACM
-
S. Bistarelli, T. Fruewirth, M. Marte, and F. Rossi. Soft constraint propagation and solving in chr. In Proc. ACM Symposium on Applied Computing (SAC), pages 1-5. ACM, 2002.
-
(2002)
Proc. ACM Symposium on Applied Computing (SAC)
, pp. 1-5
-
-
Bistarelli, S.1
Fruewirth, T.2
Marte, M.3
Rossi, F.4
-
43
-
-
84945896852
-
Constraint propagation for soft constraint satisfaction problems: Generalization and termination conditions
-
Proc. 6th International Conference on Principles and Practice of Constraint Programming (CP2000), Springer
-
S. Bistarelli, R. Gennari, and F. Rossi. Constraint propagation for soft constraint satisfaction problems: Generalization and termination conditions. In Proc. 6th International Conference on Principles and Practice of Constraint Programming (CP2000), volume 1894 of Lecture Notes in Computer Science (LNCS), pages 83-97. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science (LNCS)
, vol.1894
, pp. 83-97
-
-
Bistarelli, S.1
Gennari, R.2
Rossi, F.3
-
44
-
-
0037284793
-
General properties and termination conditions for soft constraint propagation
-
S. Bistarelli, R. Gennari, and F. Rossi. General properties and termination conditions for soft constraint propagation. Constraints, 8(1):79-97, 2003.
-
(2003)
Constraints
, vol.8
, Issue.1
, pp. 79-97
-
-
Bistarelli, S.1
Gennari, R.2
Rossi, F.3
-
45
-
-
0002439512
-
Constraint Solving over Semirings
-
San Francisco, CA, USA, Morgan Kaufman
-
S. Bistarelli, U. Montanari, and F. Rossi. Constraint Solving over Semirings. In Proc. 14th International Joint Conference on Artificial Intelligence (IJCAI95), pages 624-630, San Francisco, CA, USA, 1995. Morgan Kaufman.
-
(1995)
Proc. 14th International Joint Conference on Artificial Intelligence (IJCAI95)
, pp. 624-630
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
46
-
-
84880660138
-
Semiring-based Constraint Logic Programming
-
San Francisco, CA, USA, Morgan Kaufman
-
S. Bistarelli, U. Montanari, and F. Rossi. Semiring-based Constraint Logic Programming. In Proc. 15th International Joint Conference on Artificial Intelligence (IJCAI97), pages 352-357, San Francisco, CA, USA, 1997. Morgan Kaufman.
-
(1997)
Proc. 15th International Joint Conference on Artificial Intelligence (IJCAI97)
, pp. 352-357
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
47
-
-
0031095278
-
Semiring-based Constraint Solving and Optimization
-
S. Bistarelli, U. Montanari, and F. Rossi. Semiring-based Constraint Solving and Optimization. Journal of the ACM (JACM), 44(2):201-236, 1997.
-
(1997)
Journal of the ACM (JACM)
, vol.44
, Issue.2
, pp. 201-236
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
50
-
-
0041405781
-
Semiring-based Constraint Logic Programming: Syntax and Semantics
-
S. Bistarelli, U. Montanari, and F. Rossi. Semiring-based Constraint Logic Programming: Syntax and Semantics. ACM Transactions on Programming Languages and System (TOPLAS), 23(1):1-29, 2001.
-
(2001)
ACM Transactions on Programming Languages and System (TOPLAS)
, vol.23
, Issue.1
, pp. 1-29
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
51
-
-
0036182777
-
Soft constraint logic programming and generalized shortest path problems
-
S. Bistarelli, U. Montanari, and F. Rossi. Soft constraint logic programming and generalized shortest path problems. Journal of Heuristics, 8(1):25-41, 2001.
-
(2001)
Journal of Heuristics
, vol.8
, Issue.1
, pp. 25-41
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
52
-
-
84948412454
-
Soft concurrent constraint programming
-
Lecture Notes in Computer Science (LNCS), Springer
-
S. Bistarelli, U. Montanari, and F. Rossi. Soft concurrent constraint programming. In Proc. 11th European Symposium on Programming (ESOP), Lecture Notes in Computer Science (LNCS), pages 53-67. Springer, 2002.
-
(2002)
Proc. 11th European Symposium on Programming (ESOP)
, pp. 53-67
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
55
-
-
7044247315
-
Interchangeability in soft csps
-
Recent Advances in Constraints, Proc. Joint ERCIM/CologNet International Workshop on Constraint Solving and Constraint Logic Programming, Cork, Ireland, June 19-21, 2002. Selected Papers, Springer
-
Stefano Bistarelli, Boi Faltings, and Nicoleta Neagu. Interchangeability in soft csps. In Recent Advances in Constraints, Proc. Joint ERCIM/CologNet International Workshop on Constraint Solving and Constraint Logic Programming, Cork, Ireland, June 19-21, 2002. Selected Papers, volume 2627 of Lecture Notes in Computer Science (LNCS). Springer, 2003.
-
(2003)
Lecture Notes in Computer Science (LNCS)
, vol.2627
-
-
Bistarelli, S.1
Faltings, B.2
Neagu, N.3
-
56
-
-
0012795926
-
Security analysis using flow logics
-
World Scientific
-
C. Bodei, P. Degano, F. Nielson, and H.R. Nielson. Security analysis using flow logics. In Current Trends in Theoretical Computer Science, pages 525-542. World Scientific, 2001.
-
(2001)
Current Trends in Theoretical Computer Science
, pp. 525-542
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
57
-
-
84937553676
-
Static analysis for secrecy and non-interference in networks of processes
-
Proc. 6th International Conference on Parallel Computing Technologies (PaCT 2001), Springer
-
C. Bodei, P. Degano, F. Nielson, and H.R. Nielson. Static analysis for secrecy and non-interference in networks of processes. In Proc. 6th International Conference on Parallel Computing Technologies (PaCT 2001), volume 2127 of Lecture Notes in Computer Science (LNCS), pages 27-41. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science (LNCS)
, vol.2127
, pp. 27-41
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
58
-
-
85030151043
-
A fully abstract model for concurrent constraint programming
-
Proc. Colloquium on Trees in Algebra and Programming (CAAP91), Springer
-
F.S. De Boer and C. Palamidessi. A fully abstract model for concurrent constraint programming. In Proc. Colloquium on Trees in Algebra and Programming (CAAP91), volume 493 of Lecture Notes in Computer Science (LNCS), pages 296-319. Springer, 1991.
-
(1991)
Lecture Notes in Computer Science (LNCS)
, vol.493
, pp. 296-319
-
-
De Boer, F.S.1
Palamidessi, C.2
-
60
-
-
84976722628
-
The programming language aspects of thinglab, a constraint oriented simulation laboratory
-
A. Borning. The programming language aspects of thinglab, a constraint oriented simulation laboratory. ACM Transaction on Programming Languages and Systems (TOPLAS), 3(4):353-387, 1981.
-
(1981)
ACM Transaction on Programming Languages and Systems (TOPLAS)
, vol.3
, Issue.4
, pp. 353-387
-
-
Borning, A.1
-
61
-
-
0000719690
-
Constraint hierachies
-
A. Borning, B. Freeman-Benson, and M. Wilson. Constraint hierachies. Lisp and Symbolic Computation, 5(3):223-270, 1992.
-
(1992)
Lisp and Symbolic Computation
, vol.5
, Issue.3
, pp. 223-270
-
-
Borning, A.1
Freeman-Benson, B.2
Wilson, M.3
-
62
-
-
0003105308
-
Constraint hierarchies and logic programming
-
G. Levi and M. Martelli, editors, MIT Press
-
A. Borning, M. Maher, A. Martindale, and M. Wilson. Constraint hierarchies and logic programming. In G. Levi and M. Martelli, editors, Proc. 6th International Conference on Logic Programming (ICLP89), pages 149-164. MIT Press, 1989.
-
(1989)
Proc. 6th International Conference on Logic Programming (ICLP89)
, pp. 149-164
-
-
Borning, A.1
Maher, M.2
Martindale, A.3
Wilson, M.4
-
63
-
-
4344632496
-
Distributed constrained agents for allocating service demands in multi-provider networks
-
Special Issue on Constraint-Based Problem Solving
-
M. Calisti and B. Faltings. Distributed constrained agents for allocating service demands in multi-provider networks,. Journal of the Italian Operational Research Society, XXIX(91), 2000. Special Issue on Constraint-Based Problem Solving.
-
(2000)
Journal of the Italian Operational Research Society
, vol.29
, Issue.91
-
-
Calisti, M.1
Faltings, B.2
-
64
-
-
0032671775
-
A metanotation for protocol analysis
-
IEEE Computer Society
-
I. Cervesato, N.A. Durgin, P. Lincoln, J.C. Mitchell, and A. Scedrov. A metanotation for protocol analysis. In Proc. 12th IEEE Computer Security Foundations Workshop (CSFW99), pages 55-69. IEEE Computer Society, 1999.
-
(1999)
Proc. 12th IEEE Computer Security Foundations Workshop (CSFW99)
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.A.2
Lincoln, P.3
Mitchell, J.C.4
Scedrov, A.5
-
70
-
-
35048864638
-
Stand allocation with constraint technologies at Chek Lap Kok international airport
-
London, UK
-
A.H.W. Chun, S.H.C. Chan, F.M.F. Tsang, and D.W.M. Yeung. Stand allocation with constraint technologies at Chek Lap Kok international airport. In Proc. 1st International Conference and Exhibition on The Practical Application of Constraint Technologies and Logic Programming (PACLP99), London, UK, 1999.
-
(1999)
Proc. 1st International Conference and Exhibition on the Practical Application of Constraint Technologies and Logic Programming (PACLP99)
-
-
Chun, A.H.W.1
Chan, S.H.C.2
Tsang, F.M.F.3
Yeung, D.W.M.4
-
71
-
-
0003639291
-
Rfc1102: Policy routing in internet protocols
-
Network Working Group
-
D. Clark. Rfc1102: Policy routing in internet protocols. Technical report, Network Working Group, 1989.
-
(1989)
Technical Report
-
-
Clark, D.1
-
73
-
-
35048845873
-
Gestion optimisee de ressources humaines pour l'audiovisuel
-
C. Collignon. Gestion optimisee de ressources humaines pour l'audiovisuel. In Proc. CHIP users' club 96, 1996.
-
(1996)
Proc. CHIP Users' Club 96
-
-
Collignon, C.1
-
74
-
-
35248897454
-
Tree automata with one memory, set constraints and ping-pong protocols
-
Proc. 28th Int. Coll. Automata, Languages, and Programming (ICALP'2001), Springer, To appear
-
H. Comon, V. Cortier, and J. Mitchell. Tree automata with one memory, set constraints and ping-pong protocols. In Proc. 28th Int. Coll. Automata, Languages, and Programming (ICALP'2001), volume 2076 of Lecture Notes in Computer Science (LNCS), pages 682-693. Springer, 2001. To appear.
-
(2001)
Lecture Notes in Computer Science (LNCS)
, vol.2076
, pp. 682-693
-
-
Comon, H.1
Cortier, V.2
Mitchell, J.3
-
76
-
-
2342508189
-
Asynchronous iterative methods for solving a fixed point system of monotone equations in a complete lattice
-
Institut National Polytechnique de Grenoble
-
P. Cousot. Asynchronous iterative methods for solving a fixed point system of monotone equations in a complete lattice. Technical Report R.R.88, Institut National Polytechnique de Grenoble, 1977.
-
(1977)
Technical Report R.R.
, vol.88
-
-
Cousot, P.1
-
77
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
P. Cousot and R. Cousot. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proc. 4th ACM Symposium on Principles of Programming Languages (POPL77), pages 238-252, 1977.
-
(1977)
Proc. 4th ACM Symposium on Principles of Programming Languages (POPL77)
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
79
-
-
0000911801
-
Abstract interpretation and application to logic programming
-
P. Cousot and R. Cousot. Abstract interpretation and application to logic programming. Journal of Logic Programming, 13(2-3):103-179, 1992.
-
(1992)
Journal of Logic Programming
, vol.13
, Issue.2-3
, pp. 103-179
-
-
Cousot, P.1
Cousot, R.2
-
81
-
-
0004393405
-
From Concurrent Logic Programming to Concurrent Constraint Programming
-
Oxford University Press
-
F. de Boer and C. Palamidessi. From Concurrent Logic Programming to Concurrent Constraint Programming. In Advances in Logic Programming Theory, pages 55-113. Oxford University Press, 1994.
-
(1994)
Advances in Logic Programming Theory
, pp. 55-113
-
-
De Boer, F.1
Palamidessi, C.2
-
84
-
-
0001938067
-
Optimization in constraint networks
-
John Wiley & Sons Ltd.
-
R. Dechter, A. Dechter, and J. Pearl. Optimization in constraint networks. In Influence Diagrams, Belief Nets and Decision Analysis, pages 411-425. John Wiley & Sons Ltd., 1990.
-
(1990)
Influence Diagrams, Belief Nets and Decision Analysis
, pp. 411-425
-
-
Dechter, R.1
Dechter, A.2
Pearl, J.3
-
85
-
-
0041377554
-
Network-Based Heuristics for Constraint-Satisfaction Problems
-
Springer
-
R. Dechter and J. Pearl. Network-Based Heuristics for Constraint-Satisfaction Problems. In Search in Artificial Intelligence, pages 370-425. Springer, 1988.
-
(1988)
Search in Artificial Intelligence
, pp. 370-425
-
-
Dechter, R.1
Pearl, J.2
-
87
-
-
0016949746
-
A lattice model of secure information flow
-
D.E. Denning. A lattice model of secure information flow. Communications of the ACM (CACM), 19(5):236-242, 1976.
-
(1976)
Communications of the ACM (CACM)
, vol.19
, Issue.5
, pp. 236-242
-
-
Denning, D.E.1
-
90
-
-
0000418612
-
An appraisal of some shortest-paths algorithms
-
S.E. Dreyfus. An appraisal of some shortest-paths algorithms. Operation Research, 17:395-412, 1969.
-
(1969)
Operation Research
, vol.17
, pp. 395-412
-
-
Dreyfus, S.E.1
-
91
-
-
0027206949
-
The calculus of fuzzy restrictions as a basis for flexible constraint satisfaction
-
IEEE Computer Society
-
D. Dubois, H. Fargier, and H. Prade. The calculus of fuzzy restrictions as a basis for flexible constraint satisfaction. In Proc. IEEE International Conference on Fuzzy Systems, pages 1131-1136. IEEE Computer Society, 1993.
-
(1993)
Proc. IEEE International Conference on Fuzzy Systems
, pp. 1131-1136
-
-
Dubois, D.1
Fargier, H.2
Prade, H.3
-
92
-
-
35048834070
-
Application EPPER planification des ageents roulants
-
A. Dubos and A. Du Jeu. Application EPPER planification des ageents roulants. In Proc. CHIP users' club 96, 1996.
-
(1996)
Proc. CHIP Users' Club 96
-
-
Dubos, A.1
Du Jeu, A.2
-
94
-
-
0005844163
-
Synthesis of abstraction hierarchies for constraint satisfaction by clustering approximately equivalent objects
-
T. Ellman. Synthesis of abstraction hierarchies for constraint satisfaction by clustering approximately equivalent objects. In Proc. of International Conference on Machine Learning, pages 104-111, 1993.
-
(1993)
Proc. of International Conference on Machine Learning
, pp. 104-111
-
-
Ellman, T.1
-
95
-
-
0022693287
-
Quantitative deduction and its fixpoint theory
-
M.H. Van Emden. Quantitative deduction and its fixpoint theory. Journal of Logic Programming, 3(1):37-53, 1986.
-
(1986)
Journal of Logic Programming
, vol.3
, Issue.1
, pp. 37-53
-
-
Van Emden, M.H.1
-
96
-
-
85029518573
-
Uncertainty in constraint satisfaction problems: A probabilistic approach
-
Proc. European Conference on Symbolic and Qualitative Approaches to Reasoning and Uncertainty (ECSQARU), Springer
-
H. Fargier and J. Lang. Uncertainty in constraint satisfaction problems: a probabilistic approach. In Proc. European Conference on Symbolic and Qualitative Approaches to Reasoning and Uncertainty (ECSQARU), volume 747 of Lecture Notes in Computer Science (LNCS), pages 97-104. Springer, 1993.
-
(1993)
Lecture Notes in Computer Science (LNCS)
, vol.747
, pp. 97-104
-
-
Fargier, H.1
Lang, J.2
-
97
-
-
0009345118
-
REF-ARF: A system for solving problems stated as procedures
-
R.E. Fikes. REF-ARF: A system for solving problems stated as procedures. Artificial Intelligence, 1:27-120, 1970.
-
(1970)
Artificial Intelligence
, vol.1
, pp. 27-120
-
-
Fikes, R.E.1
-
98
-
-
44949277265
-
Bilattices and the semantics of logic programming
-
M. Fitting. Bilattices and the semantics of logic programming. Journal of Logic Programming, 11(1-2):91-116, 1981.
-
(1981)
Journal of Logic Programming
, vol.11
, Issue.1-2
, pp. 91-116
-
-
Fitting, M.1
-
100
-
-
0242369580
-
Constraint logic programming for the crew rostering problem
-
London, UK
-
F. Focacci, E. Lamma, P. Mello, and M. Milano. Constraint logic programming for the crew rostering problem. In Proc. 3rd International Conference on The Practical Application of Constraint Technology(PACT97), London, UK, 1997.
-
(1997)
Proc. 3rd International Conference on the Practical Application of Constraint Technology(PACT97)
-
-
Focacci, F.1
Lamma, E.2
Mello, P.3
Milano, M.4
-
102
-
-
84974597207
-
Non interference for the analysis of cryptographic protocols
-
Proc. 27th International Colloquium on Automata, Languages and Programming (ICALP00), Springer
-
R. Focardi, R. Gorrieri, and F. Martinelli. Non interference for the analysis of cryptographic protocols. In Proc. 27th International Colloquium on Automata, Languages and Programming (ICALP00), volume 1853 of Lecture Notes in Computer Science (LNCS), pages 354-372. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science (LNCS)
, vol.1853
, pp. 354-372
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
103
-
-
35048846369
-
-
Personal conversations, nov
-
S. Foley. Personal conversations, nov 2002.
-
(2002)
-
-
Foley, S.1
-
104
-
-
0018031196
-
Synthesizing constraint expressions
-
E.C. Freuder. Synthesizing constraint expressions. Communication of the ACM (CACM), 21(11):958-966, 1978.
-
(1978)
Communication of the ACM (CACM)
, vol.21
, Issue.11
, pp. 958-966
-
-
Freuder, E.C.1
-
105
-
-
0041508106
-
Backtrack-free and backtrack-bounded search
-
Springer
-
E.C. Freuder. Backtrack-free and backtrack-bounded search. In Search in Artificial Intelligence, pages 343-369. Springer, 1988.
-
(1988)
Search in Artificial Intelligence
, pp. 343-369
-
-
Freuder, E.C.1
-
106
-
-
84958062112
-
Eliminating interchangeable values in constraint satisfaction subproblems
-
P. Marcotte and S. Nguyen, editors
-
E.C. Freuder. Eliminating interchangeable values in constraint satisfaction subproblems. In P. Marcotte and S. Nguyen, editors, Proc. 10th National Conference on Artificial Intelligence (AAAI-91), pages 227-233, 1991.
-
(1991)
Proc. 10th National Conference on Artificial Intelligence (AAAI-91)
, pp. 227-233
-
-
Freuder, E.C.1
-
112
-
-
84957628788
-
Compiling semiring-based constraints with clp(fd,s)
-
Proc, 4th International Conference on Principles and Practice of Constraint Programming (CP98), Springer
-
Y. Georget and P. Codognet. Compiling semiring-based constraints with clp(fd,s). In Proc, 4th International Conference on Principles and Practice of Constraint Programming (CP98), volume 1520 of Lecture Notes in Computer Science (LNCS), pages 205-219. Springer, 1998.
-
(1998)
Lecture Notes in Computer Science (LNCS)
, vol.1520
, pp. 205-219
-
-
Georget, Y.1
Codognet, P.2
-
114
-
-
0346775510
-
A Generalized Semantics for Constraint Logic Programs
-
ICOT
-
R. Giacobazzi, S.K. Debray, and G. Levi. A Generalized Semantics for Constraint Logic Programs. In Proc. FGCS92, pages 581-591. ICOT, 1992.
-
(1992)
Proc. FGCS92
, pp. 581-591
-
-
Giacobazzi, R.1
Debray, S.K.2
Levi, G.3
-
116
-
-
0019623906
-
Dynamic programming as graph searching: An algebraic approach
-
S. Gnesi, A. Martelli, and U. Montanari. Dynamic programming as graph searching: an algebraic approach. Journal of the ACM (JACM), 28(5):737-751, 1981.
-
(1981)
Journal of the ACM (JACM)
, vol.28
, Issue.5
, pp. 737-751
-
-
Gnesi, S.1
Martelli, A.2
Montanari, U.3
-
118
-
-
0002017107
-
Evolving algebras 1993: Lipari guide
-
Oxford University Press
-
Y. Gurevich. Evolving algebras 1993: Lipari guide. In Specification and Validation Methods, pages 9-36. Oxford University Press, 1995.
-
(1995)
Specification and Validation Methods
, pp. 9-36
-
-
Gurevich, Y.1
-
119
-
-
0028400405
-
Decomposing Constraint Satisfaction Problems Using Database Techniques
-
M. Gyssens, P.G. Jeavons, and D.A. Cohen. Decomposing Constraint Satisfaction Problems Using Database Techniques. Artificial Intelligence, 66(1):57-89, 1994.
-
(1994)
Artificial Intelligence
, vol.66
, Issue.1
, pp. 57-89
-
-
Gyssens, M.1
Jeavons, P.G.2
Cohen, D.A.3
-
125
-
-
0003903607
-
Constraint logic programming
-
IBM T.J. Watson Research Center, Yorktown Heights
-
J. Jaffar and J.L. Lassez. Constraint logic programming. Technical report, IBM T.J. Watson Research Center, Yorktown Heights, 1986.
-
(1986)
Technical Report
-
-
Jaffar, J.1
Lassez, J.L.2
-
129
-
-
84949014862
-
Constraint programming and database query languages
-
Proc. 2nd International Symposium on Theoretical Aspects of Computer Software (TACS94), Springer
-
P.C. Kanellakis and D.Q. Goldin. Constraint programming and database query languages. In Proc. 2nd International Symposium on Theoretical Aspects of Computer Software (TACS94), volume 789 of Lecture Notes in Computer Science (LNCS), pages 66-77. Springer, 1994.
-
(1994)
Lecture Notes in Computer Science (LNCS)
, vol.789
, pp. 66-77
-
-
Kanellakis, P.C.1
Goldin, D.Q.2
-
130
-
-
0029359817
-
Constraint query languages
-
P.C. Kanellakis, G.M. Kuper, and P.Z. Revesz. Constraint query languages. Journal of Computer and System Science, 51(1):26-52, 1995.
-
(1995)
Journal of Computer and System Science
, vol.51
, Issue.1
, pp. 26-52
-
-
Kanellakis, P.C.1
Kuper, G.M.2
Revesz, P.Z.3
-
132
-
-
0002514541
-
Algorithms for constraint satisfaction problems: A survey
-
V. Kumar. Algorithms for constraint satisfaction problems: a survey. AI Magazine, 13(1):32-44, 1992.
-
(1992)
AI Magazine
, vol.13
, Issue.1
, pp. 32-44
-
-
Kumar, V.1
-
133
-
-
0002931606
-
A language and a program for stating and solving combinatorial problems
-
J-L. Lauriere. A language and a program for stating and solving combinatorial problems. Artifical Intelligence, 10:29-127, 1978.
-
(1978)
Artifical Intelligence
, vol.10
, pp. 29-127
-
-
Lauriere, J.-L.1
-
136
-
-
28144456308
-
An attack on the needham-schroeder public-key authentication protocol
-
G. Lowe. An attack on the needham-schroeder public-key authentication protocol. Information Processing Letters, 56(3):131-133, 1995.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
138
-
-
49449120803
-
Consistency in networks of relations
-
A.K. Mackworth. Consistency in networks of relations. Artificial Intelligence, 8(1):99-118, 1977.
-
(1977)
Artificial Intelligence
, vol.8
, Issue.1
, pp. 99-118
-
-
Mackworth, A.K.1
-
139
-
-
0000959937
-
Constraint satisfaction
-
John Wiley & Sons Ltd.
-
A.K. Mackworth. Constraint satisfaction. In Encyclopedia of AI (second edition), pages 285-293. John Wiley & Sons Ltd., 1992.
-
(1992)
Encyclopedia of AI (Second Edition)
, pp. 285-293
-
-
Mackworth, A.K.1
-
140
-
-
0021828305
-
The complexity of some polynomial network consistency algorithms for constraint satisfaction problems
-
A.K. Mackworth and E.C. Freuder. The complexity of some polynomial network consistency algorithms for constraint satisfaction problems. Artificial Intelligence, 25:65-74, 1985.
-
(1985)
Artificial Intelligence
, vol.25
, pp. 65-74
-
-
Mackworth, A.K.1
Freuder, E.C.2
-
142
-
-
5844331793
-
Nonserial dynamic programming: On the optimal strategy of variable elimination for the rectangular lattice
-
A. Martelli and U. Montanari. Nonserial dynamic programming: on the optimal strategy of variable elimination for the rectangular lattice. Journal of Mathematical Analysis and Application, 40:226-242, 1972.
-
(1972)
Journal of Mathematical Analysis and Application
, vol.40
, pp. 226-242
-
-
Martelli, A.1
Montanari, U.2
-
148
-
-
0030785869
-
Multi-valued logic programming semantics: An algebraic approach
-
B. Mobasher, D. Pigozzi, and G. Slutzki. Multi-valued logic programming semantics: An algebraic approach. Theoretical Computer Science, 171(1-2):77-109, 1997.
-
(1997)
Theoretical Computer Science
, vol.171
, Issue.1-2
, pp. 77-109
-
-
Mobasher, B.1
Pigozzi, D.2
Slutzki, G.3
-
149
-
-
35048873000
-
Fundamental properties and applications to picture processing, information sciences
-
Dept. of Computer Science, Carnegie Mellon University
-
U. Montanari. Fundamental properties and applications to picture processing, information sciences. Technical Report 71-1, Dept. of Computer Science, Carnegie Mellon University, 1971.
-
(1971)
Technical Report
, vol.71
, Issue.1
-
-
Montanari, U.1
-
150
-
-
0016050041
-
Networks of constraints: Fundamental properties and applications to picture processing
-
U. Montanari. Networks of constraints: Fundamental properties and applications to picture processing. Information Science, 7:95-132, 1974.
-
(1974)
Information Science
, vol.7
, pp. 95-132
-
-
Montanari, U.1
-
151
-
-
85013901244
-
An efficient algorithm for the solution of hierachical networks of constraints
-
Proc. 3rd International Workshop on Graph Grammars and their Application to Computer Science, Springer
-
U. Montanari and F. Rossi. An efficient algorithm for the solution of hierachical networks of constraints. In Proc. 3rd International Workshop on Graph Grammars and their Application to Computer Science, volume 291 of Lecture Notes in Computer Science (LNCS), pages 440-457. Springer, 1986.
-
(1986)
Lecture Notes in Computer Science (LNCS)
, vol.291
, pp. 440-457
-
-
Montanari, U.1
Rossi, F.2
-
152
-
-
0026120001
-
Constraint relaxation may be perfect
-
U. Montanari and F. Rossi. Constraint relaxation may be perfect. Artificial Intelligence, 48:143-170, 1991.
-
(1991)
Artificial Intelligence
, vol.48
, pp. 143-170
-
-
Montanari, U.1
Rossi, F.2
-
155
-
-
84956703557
-
Exploiting interchangeabilities for case adaptation
-
Lecture Notes in Computer Science (LNCS), Springer
-
N. Neagu and B. Faltings. Exploiting interchangeabilities for case adaptation. In International Conference on Case-Based Reasoning (ICCBR'02), Lecture Notes in Computer Science (LNCS), pages 422-436. Springer, 2001.
-
(2001)
International Conference on Case-Based Reasoning (ICCBR'02)
, pp. 422-436
-
-
Neagu, N.1
Faltings, B.2
-
157
-
-
84948956409
-
Set constraints: A pearl in research on constraints (invited tutorial)
-
Proc. Principles and Practice of Constraint Programming (CP97), Springer
-
L. Pacholski and A. Podelski. Set constraints: A pearl in research on constraints (invited tutorial). In Proc. Principles and Practice of Constraint Programming (CP97), volume 1330 of Lecture Notes in Computer Science (LNCS), pages 549-562. Springer, 1997.
-
(1997)
Lecture Notes in Computer Science (LNCS)
, vol.1330
, pp. 549-562
-
-
Pacholski, L.1
Podelski, A.2
-
158
-
-
8344256722
-
-
chapter 11. Shortest Path Algorithms in Transportation Models: Classical and Innovative Aspects, Kluwer
-
S. Pallottino and M.G. Scutellà. Equilibrium and Advanced Transportation Modelling, chapter 11. Shortest Path Algorithms in Transportation Models: Classical and Innovative Aspects, pages 245-281. Kluwer, 1998.
-
(1998)
Equilibrium and Advanced Transportation Modelling
, pp. 245-281
-
-
Pallottino, S.1
Scutellà, M.G.2
-
159
-
-
0003958372
-
-
Augustus M. Kelley, 1971. orig. in Italian
-
V. Pareto. Manual of Political Economy. Augustus M. Kelley, 1971. orig. (1906) in Italian.
-
(1906)
Manual of Political Economy
-
-
Pareto, V.1
-
160
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L.C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
161
-
-
0026154325
-
Using constraint logic programming techniques in container port planning
-
M. Perrett. Using constraint logic programming techniques in container port planning. ICL Technical Journal, pages 537-545, 1991.
-
(1991)
ICL Technical Journal
, pp. 537-545
-
-
Perrett, M.1
-
162
-
-
0003486721
-
Post-graduate lecture notes in advanced domain theory (incorporating the pisa lecture notes)
-
Dept. of Computer Science, Univ. of Edinburgh
-
G.D. Plotkin. Post-graduate lecture notes in advanced domain theory (incorporating the pisa lecture notes). Technical report, Dept. of Computer Science, Univ. of Edinburgh, 1981.
-
(1981)
Technical Report
-
-
Plotkin, G.D.1
-
165
-
-
0016968969
-
Scene labelling by relaxation operations
-
A. Rosenfeld, R.A. Hummel, and S.W. Zucker. Scene labelling by relaxation operations. IEEE Transactions on Systems, Man, and Cybernetics (T-SMC), 6(6):420-433, 1976.
-
(1976)
IEEE Transactions on Systems, Man, and Cybernetics (T-SMC)
, vol.6
, Issue.6
, pp. 420-433
-
-
Rosenfeld, A.1
Hummel, R.A.2
Zucker, S.W.3
-
166
-
-
84959052730
-
Redundant hidden variables in finite domain constraint problems
-
Constraint Processing, Springer
-
F. Rossi. Redundant hidden variables in finite domain constraint problems. In Constraint Processing, volume 923 of Lecture Notes in Computer Science (LNCS), pages 205-223. Springer, 1995.
-
(1995)
Lecture Notes in Computer Science (LNCS)
, vol.923
, pp. 205-223
-
-
Rossi, F.1
-
168
-
-
0013336137
-
Constraint satisfaction - A survey
-
Z. Ruttkay. Constraint satisfaction - a survey. CWI Quarterly, 11(2-3):163-214, 1998.
-
(1998)
CWI Quarterly
, vol.11
, Issue.2-3
, pp. 163-214
-
-
Ruttkay, Z.1
-
169
-
-
84948984086
-
Bounding the optimum of constraint optimization problems
-
G. Smolka, editor, Proc. 3rd International Conference on Principles and Practice of Constraint Programming (CP97), Springer
-
G. Verfaillie S. de Givry and T. Schiex. Bounding the optimum of constraint optimization problems. In G. Smolka, editor, Proc. 3rd International Conference on Principles and Practice of Constraint Programming (CP97), volume 1330 of Lecture Notes in Computer Science (LNCS), pages 405-419. Springer, 1997.
-
(1997)
Lecture Notes in Computer Science (LNCS)
, vol.1330
, pp. 405-419
-
-
Verfaillie, G.1
De Givry, S.2
Schiex, T.3
-
170
-
-
84948980924
-
Understanding and improving the mac algorithm
-
Proc. 3rd International Conference on Principles and Practice of Constraint Programming (CP97), Springer
-
D. Sabin and E.C. Freuder. Understanding and improving the mac algorithm. In Proc. 3rd International Conference on Principles and Practice of Constraint Programming (CP97), volume 1330 of Lecture Notes in Computer Science (LNCS), pages 167-181. Springer, 1997.
-
(1997)
Lecture Notes in Computer Science (LNCS)
, vol.1330
, pp. 167-181
-
-
Sabin, D.1
Freuder, E.C.2
-
173
-
-
0001553684
-
Possibilistic constraint satisfaction problems, or "how to handle soft constraints?"
-
Morgan Kaufmann
-
T. Schiex. Possibilistic constraint satisfaction problems, or "how to handle soft constraints?". In Proc. 8th Conference of Uncertainty in Artificial Intelligence (UAI92), pages 269-275. Morgan Kaufmann, 1992.
-
(1992)
Proc. 8th Conference of Uncertainty in Artificial Intelligence (UAI92)
, pp. 269-275
-
-
Schiex, T.1
-
174
-
-
0002582645
-
Valued Constraint Satisfaction Problems: Hard and Easy Problems
-
San Francisco, CA, USA, Morgan Kaufmann
-
T. Schiex, H. Fargier, and G. Verfaille. Valued Constraint Satisfaction Problems: Hard and Easy Problems. In Proc. 14th International Joint Conference on Artificial Intelligence (IJCAI95), pages 631-637, San Francisco, CA, USA, 1995. Morgan Kaufmann.
-
(1995)
Proc. 14th International Joint Conference on Artificial Intelligence (IJCAI95)
, pp. 631-637
-
-
Schiex, T.1
Fargier, H.2
Verfaille, G.3
-
178
-
-
0000196776
-
Valuation-based systems for discrete optimization
-
Elsevier Science
-
P. Shenoy. Valuation-based systems for discrete optimization. In Uncertainty in Artificial Intelligence. Elsevier Science, 1991.
-
(1991)
Uncertainty in Artificial Intelligence
-
-
Shenoy, P.1
-
179
-
-
0002231085
-
Valuation-based systems: A framework for managing uncertainty in expert systems
-
John Wiley & Sons Ltd.
-
P. Shenoy. Valuation-based systems: A framework for managing uncertainty in expert systems. In Fuzzy Logic for the Management of Uncertainty, pages 83-104. John Wiley & Sons Ltd., 1994.
-
(1994)
Fuzzy Logic for the Management of Uncertainty
, pp. 83-104
-
-
Shenoy, P.1
-
181
-
-
55849106116
-
Modelling producer/consumer constraints
-
Proc. 1st International Conference on Principles and Practice of Constraint Programming (CP95), Springer
-
H. Simonis and T. Cornelissens. Modelling producer/consumer constraints. In Proc. 1st International Conference on Principles and Practice of Constraint Programming (CP95), volume 976 of Lecture Notes in Computer Science (LNCS), pages 449-462. Springer, 1995.
-
(1995)
Lecture Notes in Computer Science (LNCS)
, vol.976
, pp. 449-462
-
-
Simonis, H.1
Cornelissens, T.2
-
183
-
-
0003156307
-
3000000 queens in less than one minute
-
R. Sosic and J. Gu. 3000000 queens in less than one minute. SIGART Bulletin, 2(3):22-24, 1991.
-
(1991)
SIGART Bulletin
, vol.2
, Issue.3
, pp. 22-24
-
-
Sosic, R.1
Gu, J.2
-
186
-
-
0019044566
-
CONSTRAINTS - A language for expressing almost-hierarchical descriptions
-
G.J. Sussman and G.L. Steele. CONSTRAINTS - a language for expressing almost-hierarchical descriptions. Artificial Intelligence, 14(1):1-39, 1980.
-
(1980)
Artificial Intelligence
, vol.14
, Issue.1
, pp. 1-39
-
-
Sussman, G.J.1
Steele, G.L.2
-
187
-
-
85059208150
-
Sketchpad: A man-machine graphical communication system
-
Proc. Spring Joint Computer Conference
-
I. Sutherland. Sketchpad: a man-machine graphical communication system. In Proc. Spring Joint Computer Conference, volume 23 of AFIPS, pages 329-346, 1963.
-
(1963)
AFIPS
, vol.23
, pp. 329-346
-
-
Sutherland, I.1
-
188
-
-
84972541021
-
A lattice-theoretical fixpoint theorem and its applications
-
A. Tarski. A lattice-theoretical fixpoint theorem and its applications. Pacific Journal of Mathematics, 5:285-309, 1955.
-
(1955)
Pacific Journal of Mathematics
, vol.5
, pp. 285-309
-
-
Tarski, A.1
-
190
-
-
0001737878
-
Practical applications of constraint programming
-
M. Wallace. Practical applications of constraint programming. Constraints, 1(1-2):139-168, 1996.
-
(1996)
Constraints
, vol.1
, Issue.1-2
, pp. 139-168
-
-
Wallace, M.1
-
193
-
-
0002680001
-
Understanding line drawings of scenes with shadows
-
McGraw-Hill
-
D.L. Waltz. Understanding line drawings of scenes with shadows. In The Psychology of Computer Vision, pages 19-91. McGraw-Hill, 1975.
-
(1975)
The Psychology of Computer Vision
, pp. 19-91
-
-
Waltz, D.L.1
-
194
-
-
0033325911
-
Compiling constraint satisfaction problems
-
R. Weigel and B. Faltings. Compiling constraint satisfaction problems. Artificial Intelligence, 115:257-289, 1999.
-
(1999)
Artificial Intelligence
, vol.115
, pp. 257-289
-
-
Weigel, R.1
Faltings, B.2
-
195
-
-
16244376268
-
Interchangeability for case adaptation in configuration problems
-
Madison, Wisconsin, USA, July AAAI Press
-
Rainer Weigel, Boi Faltings, and Marc Torrens. Interchangeability for case adaptation in configuration problems. In Workshop on Case-Based Reasoning Integrations (AAAI-98), volume WS-98-15, pages 166-171, Madison, Wisconsin, USA, July 1998. AAAI Press.
-
(1998)
Workshop on Case-Based Reasoning Integrations (AAAI-98)
, vol.WS-98-15
, pp. 166-171
-
-
Weigel, R.1
Faltings, B.2
Torrens, M.3
|