Logo

A Quick and Gentle Guide to Constraint Logic Programming via ECLiPSe

Small book cover: A Quick and Gentle Guide to  Constraint Logic Programming via ECLiPSe

A Quick and Gentle Guide to Constraint Logic Programming via ECLiPSe
by


ISBN-13: 9788362652082
Number of pages: 454

Description:
The book is an introductory and down-to-earth presentation of Constraint Logic Programming (CLP), an exciting software paradigm, more and more popular for solving combinatorial as well as continuous constraint satisfaction problems and constraint optimization problems.

Home page url

Download or read it online for free here:
Download link
(6.9MB, PDF)

Similar books

Book cover: Handbook of Software Reliability EngineeringHandbook of Software Reliability Engineering
by - McGraw-Hill
From leading industrial/research experts, here is an insider's look at today's best practices for software reliability engineering. This is a guide for software developers, designers, project managers, high-level applications programmers, et al.
(4724 views)
Book cover: SOA Source BookSOA Source Book
- Van Haren Publishing
The SOA Source Book will help enterprise architects to use SOA effectively. It explains: What SOA is; How to evaluate SOA features in business terms; How to model SOA; How to use The Open Group Architecture Framework for SOA; SOA governance.
(6822 views)
Book cover: SOA eBook: Patterns, Mashups, Governance, Service Modeling, and MoreSOA eBook: Patterns, Mashups, Governance, Service Modeling, and More
- Pearson e ducation, Inc.
This volume is a collection of chapters from eight popular books, comprehensive tutorials that teach fundamental and advanced SOA design principles, supplemented with detailed case studies and technologies used to implement SOAs in the real world.
(2596 views)
Book cover: Introduction to Reverse Engineering SoftwareIntroduction to Reverse Engineering Software
by - UIUC
An introduction to reverse engineering software under both Linux and Windows. The author uses the Scientific Method to deduce specific behavior and to target, analyze, extract and modify specific operations of a program for interoperability purposes.
(9669 views)