共 50 条
- [42] BASIS GRAPHS OF GREEDOIDS AND 2-CONNECTIVITY MATHEMATICAL PROGRAMMING STUDY, 1985, 24 (OCT): : 158 - 165
- [46] THEOLOGY OF THE SCREAM - THE VIOLATOR AND THE VIOLATED IN THE BIBLICAL TRADITION ECUMENICAL REVIEW, 1993, 45 (03): : 328 - 336
- [47] A Robust Model for the Network Violator Interception Problem Arabian Journal for Science and Engineering, 2014, 39 : 6871 - 6881