Full Text Available

Note: Clicking the button above will open the full text document at the original institutional repository in a new window.

Guarded Second-Order Logic, Spanning Trees, and Network Flows

Saved in:
Bibliographic Details
Published in:Logical Methods in Computer Science
Format: Online Article RSS Article
Published: 2010
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1864030186491609092
collection WordPress RSS
FRELIP Feed Integration
container_title Logical Methods in Computer Science
description
discipline_display Engineering & Technology
discipline_facet Engineering & Technology
format Online Article
RSS Article
genre Journal Article
id rss_article:6571
institution FRELIP
journal_source_facet Logical Methods in Computer Science
publishDate 2010
publishDateSort 2010
record_format rss_article
spellingShingle Guarded Second-Order Logic, Spanning Trees, and Network Flows
Computer Science & Information Science
Computer Science & IT
Engineering & Technology
sub_discipline_display Computer Science & IT
sub_discipline_facet Computer Science & IT
subject_display Computer Science & Information Science
Computer Science & IT
Engineering & Technology
Computer Science & Information Science
Computer Science & IT
Engineering & Technology
subject_facet Computer Science & Information Science
Computer Science & IT
Engineering & Technology
title Guarded Second-Order Logic, Spanning Trees, and Network Flows
title_auth Guarded Second-Order Logic, Spanning Trees, and Network Flows
title_full Guarded Second-Order Logic, Spanning Trees, and Network Flows
title_fullStr Guarded Second-Order Logic, Spanning Trees, and Network Flows
title_full_unstemmed Guarded Second-Order Logic, Spanning Trees, and Network Flows
title_short Guarded Second-Order Logic, Spanning Trees, and Network Flows
title_sort guarded second-order logic, spanning trees, and network flows
topic Computer Science & Information Science
Computer Science & IT
Engineering & Technology
url https://doi.org/10.2168/LMCS-6(1:4)2010