

Author: Fin'ko O. A.
Publisher: MAIK Nauka/Interperiodica
ISSN: 0005-1179
Source: Automation and Remote Control, Vol.65, Iss.6, 2004-06, pp. : 871-892
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content








Tree-shellability of Boolean functions
By Takenaga Y. Nakajima K. Yajima S.
Theoretical Computer Science, Vol. 262, Iss. 1, 2001-07 ,pp. :


Horn functions and submodular Boolean functions
By Ekin O. Hammer P.L. Peled U.N.
Theoretical Computer Science, Vol. 175, Iss. 2, 1997-04 ,pp. :