

Author: Galesi Nicola
Publisher: Springer Publishing Company
ISSN: 1432-4350
Source: Theory of Computing Systems, Vol.47, Iss.2, 2010-08, pp. : 491-506
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




By Li Shengjie
Set-Valued and Variational Analysis, Vol. 19, Iss. 4, 2011-12 ,pp. :


Chaos and Complexity Letters, Vol. , Iss. , 2016-04 ,pp. :


The Journal of Symbolic Logic, Vol. 6, Iss. 3, 1941-09 ,pp. :


A New Approach to Polynomial Identities
By Mostafa M.
The Ramanujan Journal, Vol. 8, Iss. 4, 2005-01 ,pp. :