Exploiting Tractable Substructures in Intractable Networks

Open in new window