Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,435,288 papers from all fields of science
Search
Sign In
Create Free Account
Backtracking
Known as:
Backtracking search
, Backtracking algorithm
, Backtrack
Expand
Backtracking is a general algorithm for finding all (or some) solutions to some computational problems, notably constraint satisfaction problems…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Alma-0
Backmarking
Beam stack search
Bottom-up parsing
Expand
Broader (1)
Operations research
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Incremental Dynamic Controllability Revisited
Mikael Nilsson
,
Jonas Kvarnström
,
P. Doherty
International Conference on Automated Planning…
2013
Corpus ID: 3102929
Simple Temporal Networks with Uncertainty (STNUs) allow the representation of temporal problems where some durations are…
Expand
2010
2010
A Framework for Efficient Fingerprint Identification Using a Minutiae Tree
Praveer Mansukhani
,
S. Tulyakov
,
V. Govindaraju
IEEE Systems Journal
2010
Corpus ID: 758693
Given the existence of large fingerprint databases, including distributed systems, the development of algorithms for performing…
Expand
2009
2009
Execution Strategies for PTIDES, a Programming Model for Distributed Embedded Systems
Jia Zou
,
Slobodan Matic
,
Edward A. Lee
,
T. Feng
,
P. Derler
15th IEEE Real-Time and Embedded Technology and…
2009
Corpus ID: 2865936
We define a family of execution policies for a programming model called PTIDES (Programming Temporally Integrated Distributed…
Expand
2004
2004
A symbolic Java virtual machine for test case generation
R. Müller
,
C. Lembeck
,
H. Kuchen
IASTED Conf. on Software Engineering
2004
Corpus ID: 2459781
Quality management is becoming a more and more important part of the software development process. As software testing is…
Expand
2004
2004
Pitfalls of aspectJ implementations of some of the gang-of-four design patterns
M. Monteiro
,
J. Fernandes
2004
Corpus ID: 18093618
PRODEP III - Medida 5 - Accao 5.3 - Eixo 3 - Formacao Avancada de Docentes do Ensino Superior; PPC-VM - POSI/CHS/47158/2002.
2004
2004
CARD: A Contact-based Architecture for Resource Discovery in Ad Hoc Networks
A. Helmy
,
S. Garg
,
Priyatham Pamu
,
Nitin Nahata
2004
Corpus ID: 61090707
∗ A. Helmy was supported by NSF CAREER Award 0134650. Abstract Traditional protocols for routing in ad hoc networks attempt to…
Expand
2003
2003
From race to citizenship: The indigenization debate in post-socialist Tanzania
R. Aminzade
2003
Corpus ID: 54012397
Neoliberal economic reforms in post-socialist Tanzania heightened racial as well as anti-foreign hostilities, while liberal…
Expand
1999
1999
Content based internet access to paper documents
M. Worring
,
A. Smeulders
International Journal on Document Analysis and…
1999
Corpus ID: 18770782
Abstract. When archives of paper documents are to be accessed via the Internet, the implicit hypertext structure of the original…
Expand
1995
1995
A Reactive Constraint Logic Programming Scheme
F. Fages
,
J. Fowler
,
T. Sola
International Conference on Logic Programming
1995
Corpus ID: 5055942
In this paper we present a constraint logic programming scheme for reactive systems. A formal framework is developed to deene the…
Expand
1986
1986
How Might Psychology Contribute to Reducing the Risk of Nuclear War
J. Blight
1986
Corpus ID: 10497843
Tour d'horizon des tentatives des psychologues dans le domaine de la reduction du risque de guerre nucleaire. Efforts tendus vers…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE