From Horn Strong Backdoor Sets to Ordered Strong Backdoor Sets

Abstract

International audienc

    Similar works

    Full text

    thumbnail-image

    Available Versions

    Last time updated on 12/11/2016