skip to main content
Skip header Section
Heuristics: intelligent search strategies for computer problem solvingMay 1984
  • Author:
  • Judea Pearl
Publisher:
  • Addison-Wesley Longman Publishing Co., Inc.
  • 75 Arlington Street, Suite 300 Boston, MA
  • United States
ISBN:978-0-201-05594-8
Published:01 May 1984
Pages:
382
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Li W (2024). Optimizing with Attractor: A Tutorial, ACM Computing Surveys, 56:9, (1-41), Online publication date: 31-Oct-2024.
  2. Orthey A, Akbar S and Toussaint M (2024). Multilevel motion planning, International Journal of Robotics Research, 43:1, (3-33), Online publication date: 1-Jan-2024.
  3. Teng X, Trajcevski G and Züfle A (2023). Searching semantically diverse paths, Distributed and Parallel Databases, 41:4, (603-638), Online publication date: 1-Dec-2023.
  4. Garcia-Piqueras M and Hernández-Orallo J (2023). Heuristic search of optimal machine teaching curricula, Machine Language, 112:10, (4049-4080), Online publication date: 1-Oct-2023.
  5. Orseau L, Hutter M and Lelis L Levin tree search with context models Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, (5622-5630)
  6. Wang T, Torralba A, Isola P and Zhang A Optimal goal-reaching reinforcement learning via quasimetric learning Proceedings of the 40th International Conference on Machine Learning, (36411-36430)
  7. Kreft R, Büchner C, Sievers S and Helmert M Computing domain abstractions for optimal classical planning with counterexample-guided abstraction refinement Proceedings of the Thirty-Third International Conference on Automated Planning and Scheduling, (221-226)
  8. Gnad D, Sievers S and Torralba Á Efficient evaluation of large abstractions for decoupled search Proceedings of the Thirty-Third International Conference on Automated Planning and Scheduling, (138-147)
  9. Huang C and Wang X (2023). A Bayesian Approach to the Design of Backhauling Topology for 5G IAB Networks, IEEE Transactions on Mobile Computing, 22:4, (1867-1879), Online publication date: 1-Apr-2023.
  10. Azizi I, Echihabi K and Palpanas T (2023). ELPIS: Graph-Based Similarity Search for Scalable Data Science, Proceedings of the VLDB Endowment, 16:6, (1548-1559), Online publication date: 1-Feb-2023.
  11. Cherif G, Leclercq E and Lefebvre D (2023). Scheduling of a class of partial routing FMS in uncertain environments with beam search, Journal of Intelligent Manufacturing, 34:2, (493-514), Online publication date: 1-Feb-2023.
  12. Henkell C, Abbenseth J and Toussaintl M An Optimal Algorithm to Solve the Combined Task Allocation and Path Finding Problem 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (4140-4146)
  13. Du W, Kim S, Salzman O and Likhachev M Escaping Local Minima in Search-Based Planning using Soft Duplicate Detection 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (2365-2371)
  14. Fomperosa J, Ibañez M, Stafford E and Bosque J Task Scheduler for Heterogeneous Data Centres Based on Deep Reinforcement Learning Parallel Processing and Applied Mathematics, (237-248)
  15. ACM
    Interview by Martin Ford Probabilistic and Causal Inference, (29-42)
  16. ACM
    Biography of Judea Pearl by Stuart J. Russell Probabilistic and Causal Inference, (1-10)
  17. ACM
    Ohsaka N and Matsuoka T Reconfiguration Problems on Submodular Functions Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining, (764-774)
  18. Popescu A, Polat-Erdeniz S, Felfernig A, Uta M, Atas M, Le V, Pilsl K, Enzelsberger M and Tran T (2022). An overview of machine learning techniques in constraint solving, Journal of Intelligent Information Systems, 58:1, (91-118), Online publication date: 1-Feb-2022.
  19. Mesquita A and Vasconcelos A (2022). Heuristics' Library for Enterprise Architecture and Portfolio Alignment, International Journal of Information Technology Project Management, 13:1, (1-23), Online publication date: 31-Jan-2022.
  20. Ren Z, Rathinam S and Choset H Loosely Synchronized Search for Multi-agent Path Finding with Asynchronous Actions 2021 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (9714-9719)
  21. Cherif G, Leclercq E and Lefebvre D Hybrid FMS scheduling using T-TPN and Beam Search in uncertain environments IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society, (405-410)
  22. Sakcak B, Bascetta L, Ferretti G and Prandini M (2019). Sampling-based optimal kinodynamic planning with motion primitives, Autonomous Robots, 43:7, (1715-1732), Online publication date: 1-Oct-2019.
  23. Ferraioli D and Ventre C Obvious Strategyproofness, Bounded Rationality and Approximation Algorithmic Game Theory, (77-91)
  24. Moraru I, Edelkamp S, Franco S and Martinez M Simplifying Automated Pattern Selection for Planning with Symbolic Pattern Databases KI 2019: Advances in Artificial Intelligence, (249-263)
  25. Frohner N and Raidl G Merging Quality Estimation for Binary Decision Diagrams with Binary Classifiers Machine Learning, Optimization, and Data Science, (445-457)
  26. Guo H and Barfoot T The Robust Canadian Traveler Problem Applied to Robot Routing 2019 International Conference on Robotics and Automation (ICRA), (5523-5529)
  27. Ferraioli D and Ventre C Obvious Strategyproofness, Bounded Rationality and Approximation Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, (1952-1954)
  28. Petrov M (2019). Low-Altitude Aircraft Routing, Journal of Computer and Systems Sciences International, 58:3, (467-473), Online publication date: 1-May-2019.
  29. Deligkas A, Mertzios G and Spirakis P (2019). Binary Search in Graphs Revisited, Algorithmica, 81:5, (1757-1780), Online publication date: 1-May-2019.
  30. ACM
    Zarnegar A, Jelinek H, Vamplew P and Stranieri A Integrating Biological Heuristics and Gene Expression Data for Gene Regulatory Network Inference Proceedings of the Australasian Computer Science Week Multiconference, (1-10)
  31. Holte R and Zilles S On the optimal efficiency of cost-algebraic A* Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence and Thirty-First Innovative Applications of Artificial Intelligence Conference and Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, (2288-2295)
  32. Choudhury S, Bhardwaj M, Arora S, Kapoor A, Ranade G, Scherer S and Dey D (2020). Data-driven planning via imitation learning, International Journal of Robotics Research, 37:13-14, (1632-1672), Online publication date: 1-Dec-2018.
  33. Ha S, Coros S, Alspach A, Bern J, Kim J and Yamane K (2018). Computational Design of Robotic Devices From High-Level Motion Specifications, IEEE Transactions on Robotics, 34:5, (1240-1251), Online publication date: 1-Oct-2018.
  34. Micelli P and Likhachev M FOCS: Planning by Fusion of Optimal Control & Search and its Application to Navigation 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (8082-8088)
  35. Marinescu R, Lee J, Dechter R and Ihler A (2019). AND/OR search for marginal MAP, Journal of Artificial Intelligence Research, 63:1, (875-921), Online publication date: 1-Sep-2018.
  36. Heusner M, Keller T and Helmert M Best-case and worst-case behavior of greedy best-first search Proceedings of the 27th International Joint Conference on Artificial Intelligence, (1463-1470)
  37. Lam W, Kask K, Larrosa J and Dechter R (2018). Subproblem ordering heuristics for AND/OR best-first search, Journal of Computer and System Sciences, 94:C, (41-62), Online publication date: 1-Jun-2018.
  38. ACM
    Liang J, Ajwani D, Nicholson P, Sala A and Parthasarathy S (2018). Prioritized Relationship Analysis in Heterogeneous Information Networks, ACM Transactions on Knowledge Discovery from Data, 12:3, (1-27), Online publication date: 27-Apr-2018.
  39. ACM
    Zhou B and Buyya R (2018). Augmentation Techniques for Mobile Cloud Computing, ACM Computing Surveys, 51:1, (1-38), Online publication date: 14-Apr-2018.
  40. ACM
    Fong S, Biuk-Aghai R and Millham R Swarm Search Methods in Weka for Data Mining Proceedings of the 2018 10th International Conference on Machine Learning and Computing, (122-127)
  41. Pai P, Hong L, Lin K and Gastaldo P (2018). Using Internet Search Trends and Historical Trading Data for Predicting Stock Markets by the Least Squares Support Vector Regression Model, Computational Intelligence and Neuroscience, 2018, Online publication date: 1-Jan-2018.
  42. ACM
    Kapadia M, Poulakos S, Gross M and Sumner R Computational narrative ACM SIGGRAPH 2017 Courses, (1-118)
  43. ACM
    Baier J, Daroch D, Reutter J and Vrgoč D Evaluating Navigational RDF Queries over the Web Proceedings of the 28th ACM Conference on Hypertext and Social Media, (165-174)
  44. Mena D, Quevedo J, Montas E and Coz J (2017). A heuristic in A* for inference in nonlinear Probabilistic Classifier Chains, Knowledge-Based Systems, 126:C, (78-90), Online publication date: 15-Jun-2017.
  45. Lei H, Xing K, Han L and Gao Z (2017). Hybrid heuristic search approach for deadlock-free scheduling of flexible manufacturing systems using Petri nets, Applied Soft Computing, 55:C, (413-423), Online publication date: 1-Jun-2017.
  46. Grauman K, Learned-Miller E, Torralba A and Zisserman A (2017). Guest Editorial, IEEE Transactions on Pattern Analysis and Machine Intelligence, 39:4, (625-626), Online publication date: 1-Apr-2017.
  47. Chin T, Purkait P, Eriksson A and Suter D (2017). Efficient Globally Optimal Consensus Maximisation with Tree Search, IEEE Transactions on Pattern Analysis and Machine Intelligence, 39:4, (758-772), Online publication date: 1-Apr-2017.
  48. ACM
    Sidler M, von Rohr C, Dornberger R and Hanne T Emotion Influenced Robotic Path Planning Proceedings of the 2017 International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, (130-136)
  49. Xu N, Peng S and Wang Z (2017). Verifying soundness of geodata web service composition based on Petri nets, Journal of Web Engineering, 16:1-2, (145-160), Online publication date: 1-Mar-2017.
  50. Flerova N, Marinescu R and Dechter R (2017). Weighted heuristic anytime search, Annals of Mathematics and Artificial Intelligence, 79:1-3, (77-128), Online publication date: 1-Mar-2017.
  51. Marinescu R, Lee J, Ihler A and Dechter R Anytime best+depth-first search for bounding marginal MAP Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, (3775-3782)
  52. Boden B, Günnemann S, Hoffmann H and Seidl T (2017). MiMAG, Knowledge and Information Systems, 50:2, (417-446), Online publication date: 1-Feb-2017.
  53. Tzalavra A, Dalakleidi K, Zacharaki E, Tsiaparas N, Constantinidis F, Paragios N and Nikita K Comparison of Multi-resolution Analysis Patterns for Texture Classification of Breast Tumors Based on DCE-MRI Machine Learning in Medical Imaging, (296-304)
  54. Lam W, Kask K, Dechter R and Larrosa J On the impact of subproblem orderings on anytime AND/OR best-first search for lower bounds Proceedings of the Twenty-second European Conference on Artificial Intelligence, (1567-1568)
  55. Larrosa J, Rollon E and Dechter R Limited discrepancy AND/OR search and its application to optimization tasks in graphical models Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (617-623)
  56. Hu X, Wang M, Leeson M, Di Paolo E and Liu H (2016). Deterministic agent-based path optimization by mimicking the spreading of ripples, Evolutionary Computation, 24:2, (319-346), Online publication date: 1-Jun-2016.
  57. Chandra Kruse L, Seidel S and Purao S Making Use of Design Principles Proceedings of the 11th International Conference on Tackling Society's Grand Challenges with Design Science - Volume 9661, (37-51)
  58. Aine S and Likhachev M (2016). Truncated incremental search, Artificial Intelligence, 234:C, (49-77), Online publication date: 1-May-2016.
  59. Dolinskaya I, Epelman M, Şişikoğlu Sir E and Smith R (2016). Parameter-Free Sampled Fictitious Play for Solving Deterministic Dynamic Programming Problems, Journal of Optimization Theory and Applications, 169:2, (631-655), Online publication date: 1-May-2016.
  60. Francesco N, Lettieri G, Santone A and Vaglini G (2016). Heuristic search for equivalence checking, Software and Systems Modeling (SoSyM), 15:2, (513-530), Online publication date: 1-May-2016.
  61. Berseth G, Kapadia M and Faloutsos P (2016). ACCLMesh, Computer Animation and Virtual Worlds, 27:3-4, (195-204), Online publication date: 1-May-2016.
  62. Liang J, Ajwani D, Nicholson P, Sala A and Parthasarathy S What Links Alice and Bob? Proceedings of the 25th International Conference on World Wide Web, (879-889)
  63. ACM
    Wagner D, Kaindl H, Dominka S and Dübner M Optimization of feature interactions for automotive combustion engines Proceedings of the 31st Annual ACM Symposium on Applied Computing, (1401-1406)
  64. Solovey K, Salzman O and Halperin D (2016). Finding a needle in an exponential haystack, International Journal of Robotics Research, 35:5, (501-513), Online publication date: 1-Apr-2016.
  65. Koval M, Pollard N and Srinivasa S (2016). Pre- and post-contact policy decomposition for planar contact manipulation under uncertainty, International Journal of Robotics Research, 35:1-3, (244-264), Online publication date: 1-Jan-2016.
  66. Aine S, Swaminathan S, Narayanan V, Hwang V and Likhachev M (2016). Multi-Heuristic A*, International Journal of Robotics Research, 35:1-3, (224-243), Online publication date: 1-Jan-2016.
  67. Zuo L, Guo Q, Xu X and Fu H (2015). A hierarchical path planning approach based on A* and least-squares policy iteration for mobile robots, Neurocomputing, 170:C, (257-266), Online publication date: 25-Dec-2015.
  68. Shekhar S and Khemani D Extending and Tuning Heuristics for a Partial Order Causal Link Planner Proceedings of the Third International Conference on Mining Intelligence and Knowledge Exploration - Volume 9468, (81-92)
  69. ACM
    Berseth G, Kapadia M and Faloutsos P ACCLMesh Proceedings of the 8th ACM SIGGRAPH Conference on Motion in Games, (97-102)
  70. Sangyol Yoon , Sung-Eui Yoon , Unghui Lee and Shim D (2015). Recursive Path Planning Using Reduced States for Car-Like Vehicles on Grid Maps, IEEE Transactions on Intelligent Transportation Systems, 16:5, (2797-2813), Online publication date: 1-Oct-2015.
  71. Mena D, Montañés E, Quevedo J and Del Coz J Using A* for inference in probabilistic classifier chains Proceedings of the 24th International Conference on Artificial Intelligence, (3707-3713)
  72. Zeng Y, Chen X, Cao X, Qin S, Cavazza M and Xiang Y Optimal route search with the coverage of users' preferences Proceedings of the 24th International Conference on Artificial Intelligence, (2118-2124)
  73. Phillips M, Narayanan V, Aine S and Likhachev M Efficient search with an ensemble of heuristics Proceedings of the 24th International Conference on Artificial Intelligence, (784-791)
  74. Oliveira R and Delgado K Capacitated vehicle routing system applying Monte Carlo methods Proceedings of the annual conference on Brazilian Symposium on Information Systems: Information Systems: A Computer Socio-Technical Perspective - Volume 1, (1-8)
  75. Mencía C, Sierra M, Salido M, Escamilla J and Varela R (2015). Solving the job shop scheduling problem with operators by depth-first heuristic search enhanced with global pruning rules, AI Communications, 28:2, (365-381), Online publication date: 1-Apr-2015.
  76. Sangyol Yoon and Shim D (2015). SLPA $^{\ast}$: Shape-Aware Lifelong Planning A $^{\ast}$ for Differential Wheeled Vehicles, IEEE Transactions on Intelligent Transportation Systems, 16:2, (730-740), Online publication date: 1-Apr-2015.
  77. ACM
    Kapadia M, Falk J, Zünd F, Marti M, Sumner R and Gross M Computer-assisted authoring of interactive narratives Proceedings of the 19th Symposium on Interactive 3D Graphics and Games, (85-92)
  78. Wang P, Sanin C and Szczerbicki E (2015). Evolutionary algorithm and decisional DNA for multiple travelling salesman problem, Neurocomputing, 150:PA, (50-57), Online publication date: 20-Feb-2015.
  79. Hernandez E, Carreras M and Ridao P (2015). A comparison of homotopic path planning algorithms for robotic applications, Robotics and Autonomous Systems, 64:C, (44-58), Online publication date: 1-Feb-2015.
  80. (2015). Subdimensional expansion for multirobot path planning, Artificial Intelligence, 219:C, (1-24), Online publication date: 1-Feb-2015.
  81. Cohen B, Chitta S and Likhachev M Single- and dual-arm motion planning with heuristic search Proceedings of the Twenty-Fourth International Conferenc on International Conference on Automated Planning and Scheduling, (519-522)
  82. Heusner M, Wehrle M, Pommerening F and Helmert M Under-approximation refinement for classical planning Proceedings of the Twenty-Fourth International Conferenc on International Conference on Automated Planning and Scheduling, (365-369)
  83. Ábrahám E, Becker B, Dehnert C, Jansen N, Katoen J and Wimmer R Counterexample Generation for Discrete-Time Markov Models Advanced Lectures of the 14th International School on Formal Methods for Executable Software Models - Volume 8483, (65-121)
  84. Huang B, Jiang R and Zhang G Heuristic Search for Scheduling Flexible Manufacturing Systems Using Multiple Heuristic Functions Proceedings, Part I, of the 27th International Conference on Modern Advances in Applied Intelligence - Volume 8481, (178-187)
  85. ACM
    Francesco N, Lettieri G, Santone A and Vaglini G (2014). GreASE, ACM Transactions on Software Engineering and Methodology, 23:3, (1-26), Online publication date: 1-May-2014.
  86. Nash A and Koenig S (2013). Any‐Angle Path Planning, AI Magazine, 34:4, (85-107), Online publication date: 1-Dec-2013.
  87. ACM
    Tang L, Zheng Y, Yuan J, Han J, Leung A, Peng W and Porta T (2014). A framework of traveling companion discovery on trajectory data streams, ACM Transactions on Intelligent Systems and Technology, 5:1, (1-34), Online publication date: 1-Dec-2013.
  88. Soares De Lima E, Feijó B, Furtado A, Diniz Junqueira Barbosa S, Pozzer C and Ciarlini A Non-branching Interactive Comics Proceedings of the 10th International Conference on Advances in Computer Entertainment - Volume 8253, (230-245)
  89. Ghannem A, Boussaidi G and Kessentini M Model Refactoring Using Interactive Genetic Algorithm Proceedings of the 5th International Symposium on Search Based Software Engineering - Volume 8084, (96-110)
  90. Helgason H, Thórisson K, Nivel E and Wang P Predictive heuristics for decision-making in real-world environments Proceedings of the 6th international conference on Artificial General Intelligence, (50-59)
  91. ACM
    Kapadia M, Beacco A, Garcia F, Reddy V, Pelechano N and Badler N Multi-domain real-time planning in dynamic environments Proceedings of the 12th ACM SIGGRAPH/Eurographics Symposium on Computer Animation, (115-124)
  92. ACM
    Viana W and Moro M FriendRouter Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, (1281-1282)
  93. Sanchez L, Moisan S and Rigault J Metrics on feature models to optimize configuration adaptation at run time Proceedings of the 1st International Workshop on Combining Modelling and Search-Based Software Engineering, (39-44)
  94. Trevizan F and Veloso M Finding objects through stochastic shortest path problems Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, (547-554)
  95. Lelis L, Zilles S and Holte R (2013). Predicting the size of IDA*'s search tree, Artificial Intelligence, 196, (53-76), Online publication date: 1-Mar-2013.
  96. Althöfer I Remarks on history and presence of game tree search and research Information Theory, Combinatorics, and Search Theory, (677-693)
  97. Murthy K, P. D and Deshpande P Improving recall of regular expressions for information extraction Proceedings of the 13th international conference on Web Information Systems Engineering, (455-467)
  98. Mirrokni V, Thain N and Vetta A A Theoretical Examination of Practical Game Playing Proceedings of the 5th International Symposium on Algorithmic Game Theory - Volume 7615, (251-262)
  99. dos Santos L, Gonzales Clua E and Bernardini F A parallel fipa architecture based on GPU for games and real time simulations Proceedings of the 11th international conference on Entertainment Computing, (306-317)
  100. Saffidine A Minimal proof search for modal logic k model checking Proceedings of the 13th European conference on Logics in Artificial Intelligence, (346-358)
  101. Wehrle M and Kupferschmid S Mcta Proceedings of the 10th international conference on Formal Modeling and Analysis of Timed Systems, (252-266)
  102. Narang A, Srivastava A, Jain R and Shyamasundar R Dynamic distributed scheduling algorithm for state space search Proceedings of the 18th international conference on Parallel Processing, (141-154)
  103. Yuan C and Malone B An improved admissible heuristic for learning optimal Bayesian networks Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence, (924-933)
  104. ACM
    Boden B, Günnemann S, Hoffmann H and Seidl T Mining coherent subgraphs in multi-layer graphs with edge labels Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, (1258-1266)
  105. ACM
    McClymont K, Walker D and Dupenois M The lay of the land Proceedings of the 14th annual conference companion on Genetic and evolutionary computation, (425-432)
  106. Sadhukhan S and Mandal S (2012). Improving Quality of Experience of Subscribers through Post Deployment Network Planning in UMTS Cellular Networks, International Journal of Business Data Communications and Networking, 8:3, (1-27), Online publication date: 1-Jul-2012.
  107. Trevizan F and Veloso M Short-sighted stochastic shortest path problems Proceedings of the Twenty-Second International Conference on International Conference on Automated Planning and Scheduling, (288-296)
  108. Thayer J, Stern R, Felner A and Ruml W Faster bounded-cost search using inadmissible estimates Proceedings of the Twenty-Second International Conference on International Conference on Automated Planning and Scheduling, (270-278)
  109. Sun X, Uras T, Koenig S and Yeoh W Incremental ARA* Proceedings of the Twenty-Second International Conference on International Conference on Automated Planning and Scheduling, (243-251)
  110. Karpas E and Domshlak C Optimal search with inadmissible heuristics Proceedings of the Twenty-Second International Conference on International Conference on Automated Planning and Scheduling, (92-100)
  111. Tamir D, King C and McKenney M Improving the performance of constructive multi-start search using record-keeping Proceedings of the 25th international conference on Industrial Engineering and Other Applications of Applied Intelligent Systems: advanced research in applied artificial intelligence, (176-186)
  112. Hernández C, Baier J, Uras T and Koenig S Time-bounded adaptive A* Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (997-1006)
  113. Burns E and Ruml W Iterative-Deepening Search with On-Line Tree Size Prediction Revised Selected Papers of the 6th International Conference on Learning and Intelligent Optimization - Volume 7219, (1-15)
  114. Murguía-Romero M, Villalobos-Molina R, Méndez-Cruz R and Jiménez-Flores R Heuristic search of cut-off points for clinical parameters Proceedings of the 10th Mexican international conference on Advances in Artificial Intelligence - Volume Part I, (560-571)
  115. Salehi P, Khendek F, Hamou-Lhadj A and Toeroe M AMF configurations Proceedings of the 7th International Conference on Network and Services Management, (19-27)
  116. Stern R, Puzis R and Felner A Potential search Proceedings of the Twenty-First International Conference on International Conference on Automated Planning and Scheduling, (234-241)
  117. Karpas E, Katz M and Markovitch S When optimal is just not good enough Proceedings of the Twenty-First International Conference on International Conference on Automated Planning and Scheduling, (122-129)
  118. Oncina J and Vidal E Interactive structured output prediction Proceedings of the 5th Iberian conference on Pattern recognition and image analysis, (256-264)
  119. ACM
    Santone A Clone detection through process algebras and Java bytecode Proceedings of the 5th International Workshop on Software Clones, (73-74)
  120. He J, Purao S, Becker J and Strobhar D Service extraction from operator procedures in process industries Proceedings of the 6th international conference on Service-oriented perspectives in design science research, (335-349)
  121. Pardo P, Ferrando S, Onaindia E, Godo L and Dellunde P Cooperative dialogues for defeasible argumentation-based planning Proceedings of the 8th international conference on Argumentation in Multi-Agent Systems, (174-193)
  122. Pardo P, Pajares S, Onaindia E, Godo L and Dellunde P Multiagent argumentation for cooperative planning in DeLP-POP The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3, (971-978)
  123. Hernández C, Sun X, Koenig S and Meseguer P Tree Adaptive A* The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 1, (123-130)
  124. Murphy E, O'Neill M and Brabazon A Examining mutation landscapes in grammar based genetic programming Proceedings of the 14th European conference on Genetic programming, (130-141)
  125. Kupferschmid S and Wehrle M Abstractions and pattern databases Proceedings of the 17th international conference on Tools and algorithms for the construction and analysis of systems: part of the joint European conferences on theory and practice of software, (276-290)
  126. Wehrle M and Kupferschmid S Context-enhanced directed model checking Proceedings of the 17th international SPIN conference on Model checking software, (88-105)
  127. Takeuchi J and Tsujino H One-shot supervised reinforcement learning for multi-targeted tasks Proceedings of the 20th international conference on Artificial neural networks: Part II, (204-209)
  128. Rintanen J Heuristics for planning with SAT Proceedings of the 16th international conference on Principles and practice of constraint programming, (414-428)
  129. Aine S, Chakrabarti P and Kumar R Contract Search Proceedings of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence, (733-738)
  130. Souffriau W and Vansteenwegen P Tourist trip planning functionalities Proceedings of the 10th international conference on Current trends in web engineering, (474-485)
  131. ACM
    Chang J, Chao H and Chen J A dead end avoidance method for geographic forwarding in MANETs Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, (880-884)
  132. ACM
    Braziunas D and Boutilier C Assessing regret-based preference elicitation with the UTPREF recommendation system Proceedings of the 11th ACM conference on Electronic commerce, (219-228)
  133. Heilman M and Smith N Tree edit models for recognizing textual entailments, paraphrases, and answers to questions Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, (1011-1019)
  134. Montero M, Ruíz R, García-Torres M and Sarro L Feature selection applied to data from the Sloan digital sky survey Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part I, (611-620)
  135. Röger G and Helmert M The more, the merrier Proceedings of the Twentieth International Conference on International Conference on Automated Planning and Scheduling, (246-249)
  136. Mencía C, Sierra M and Varela R Partially informed depth-first search for the job shop problem Proceedings of the Twentieth International Conference on International Conference on Automated Planning and Scheduling, (113-120)
  137. Sun X, Yeoh W and Koenig S Generalized Fringe-Retrieving A* Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1, (1081-1088)
  138. Sun X, Yeoh W and Koenig S Moving target D* Lite Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1, (67-74)
  139. Tang Y, Norman T and Parsons S Computing argumentation in polynomial number of BDD operations Proceedings of the 7th international conference on Argumentation in Multi-Agent Systems, (268-285)
  140. ACM
    Aljazzar H, Kuntz M, Leitner-Fischer F and Leue S Directed and heuristic counterexample generation for probabilistic model checking Proceedings of the 2010 ICSE Workshop on Quantitative Stochastic Models in the Verification and Design of Software Systems, (25-32)
  141. ACM
    Coons K, Burckhardt S and Musuvathi M (2010). GAMBIT, ACM SIGPLAN Notices, 45:5, (15-24), Online publication date: 1-May-2010.
  142. Rimmel A and Teytaud F Multiple overlapping tiles for contextual monte carlo tree search Proceedings of the 2010 international conference on Applications of Evolutionary Computation - Volume Part I, (201-210)
  143. Lee-Johnson C and Carnegie D (2010). Mobile robot navigation modulated by artificial emotions, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 40:2, (469-480), Online publication date: 1-Apr-2010.
  144. Meilă M and Bao L (2010). An Exponential Model for Infinite Rankings, The Journal of Machine Learning Research, 11, (3481-3518), Online publication date: 1-Mar-2010.
  145. ACM
    Coons K, Burckhardt S and Musuvathi M GAMBIT Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, (15-24)
  146. Sadhukhan S, Mandal S, Bhaumik P and Saha D Post deployment planning of 3G cellular networks through dual homing of NodeBs Proceedings of the 11th international conference on Distributed computing and networking, (404-419)
  147. Lutu P and Engelbrecht A (2010). A decision rule-based method for feature selection in predictive data mining, Expert Systems with Applications: An International Journal, 37:1, (602-609), Online publication date: 1-Jan-2010.
  148. Marinescu R and Dechter R (2010). Evaluating the impact of AND/OR search on 0-1 integer linear programming, Constraints, 15:1, (29-63), Online publication date: 1-Jan-2010.
  149. Chakrabarti P and Aine S New Approaches to Design and Control of Time Limited Search Algorithms Proceedings of the 3rd International Conference on Pattern Recognition and Machine Intelligence, (1-6)
  150. Marinescu R and Dechter R (2009). Memory intensive AND/OR search for combinatorial optimization in graphical models, Artificial Intelligence, 173:16-17, (1492-1524), Online publication date: 1-Nov-2009.
  151. Marinescu R and Dechter R (2009). AND/OR Branch-and-Bound search for combinatorial optimization in graphical models, Artificial Intelligence, 173:16-17, (1457-1491), Online publication date: 1-Nov-2009.
  152. Brodt S, Bry F and Eisinger N Search for More Declarativity Proceedings of the 3rd International Conference on Web Reasoning and Rule Systems, (71-86)
  153. Du D, Simon D and Ergezer M Biogeography-based optimization combined with evolutionary strategy and immigration refusal Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics, (997-1002)
  154. Li X, Hong S and Fang K A heuristic routing protocol for wireless sensor networks in home automation Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (3597-3604)
  155. Kerber M Heuristics for resolution in propositional logic Proceedings of the 32nd annual German conference on Advances in artificial intelligence, (656-663)
  156. Wu C, Chen P, Han Y and Kuo M (2009). Maximum-likelihood priority-first search decodable codes for combined channel estimation and error correction, IEEE Transactions on Information Theory, 55:9, (4191-4203), Online publication date: 1-Sep-2009.
  157. Zhang Z, Sturtevant N, Holte R, Schaeffer J and Felner A A* search with inconsistent heuristics Proceedings of the 21st International Joint Conference on Artificial Intelligence, (634-639)
  158. Sun X, Yeoh W and Koenig S Efficient incremental search for moving target search Proceedings of the 21st International Joint Conference on Artificial Intelligence, (615-620)
  159. Lin L, Wu T, Porway J and Xu Z (2009). A stochastic graph grammar for compositional object representation and recognition, Pattern Recognition, 42:7, (1297-1307), Online publication date: 1-Jul-2009.
  160. ACM
    Lund W and Ringger E Improving optical character recognition through efficient multiple system alignment Proceedings of the 9th ACM/IEEE-CS joint conference on Digital libraries, (231-240)
  161. ACM
    Rodriguez G, Beivide R, Minkenberg C, Labarta J and Valero M Exploring pattern-aware routing in generalized fat tree networks Proceedings of the 23rd international conference on Supercomputing, (276-285)
  162. Sun X, Yeoh W, Chen P and Koenig S Simple optimization techniques for A*-based search Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (931-936)
  163. Sun X, Yeoh W and Koenig S Dynamic fringe-saving A* Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (891-898)
  164. Sadhukhan S, Mandai S, Biswas S, Bhaumik P and Saha D Post-deployment tuning of UMTS cellular networks through dual-homing of RNCs Proceedings of the First international conference on COMmunication Systems And NETworks, (532-541)
  165. Meuleau N, Benazera E, Brafman R, Hansen E and Mausam (2009). A heuristic search approach to planning with continuous resources in stochastic domains, Journal of Artificial Intelligence Research, 34:1, (27-59), Online publication date: 1-Jan-2009.
  166. Wang K and Botea A Fast and memory-efficient multi-agent pathfinding Proceedings of the Eighteenth International Conference on International Conference on Automated Planning and Scheduling, (380-387)
  167. Thayer J and Ruml W Faster than weighted A* Proceedings of the Eighteenth International Conference on International Conference on Automated Planning and Scheduling, (355-362)
  168. Katz M and Domshlak C Structural patterns heuristics via fork decomposition Proceedings of the Eighteenth International Conference on International Conference on Automated Planning and Scheduling, (182-189)
  169. Katz M and Domshlak C Optimal additive composition of abstraction-based admissible heuristics Proceedings of the Eighteenth International Conference on International Conference on Automated Planning and Scheduling, (174-181)
  170. Likhachev M, Ferguson D, Gordon G, Stentz A and Thrun S (2008). Anytime search in dynamic graphs, Artificial Intelligence, 172:14, (1613-1643), Online publication date: 1-Sep-2008.
  171. George B and Shekhar S SP-TAG Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, (1-7)
  172. Helmert M, Haslum P and Hoffmann J Explicit-state abstraction Proceedings of the 23rd national conference on Artificial intelligence - Volume 3, (1547-1550)
  173. Helmert M and Röger G How good is almost perfect? Proceedings of the 23rd national conference on Artificial intelligence - Volume 2, (944-949)
  174. Likhachev M and Stentz A R* search Proceedings of the 23rd national conference on Artificial intelligence - Volume 1, (344-350)
  175. Sun X, Koenig S and Yeoh W Generalized Adaptive A* Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 1, (469-476)
  176. ACM
    So K Enforcing long-path timing closure for FPGA routing with path searches on clamped lexicographic spirals Proceedings of the 16th international ACM/SIGDA symposium on Field programmable gate arrays, (24-34)
  177. Jensen R, Veloso M and Bryant R (2008). State-set branching, Artificial Intelligence, 172:2-3, (103-139), Online publication date: 1-Feb-2008.
  178. Mirkis V and Domshlak C Cost-sharing approximations for h+ Proceedings of the Seventeenth International Conference on International Conference on Automated Planning and Scheduling, (240-247)
  179. Domshlak C and Hoffmann J (2007). Probabilistic planning via heuristic forward search and weighted model counting, Journal of Artificial Intelligence Research, 30:1, (565-620), Online publication date: 1-Sep-2007.
  180. Xu L, Zhang L and Chen Y Real-time navigation for a mobile robot based on the autonomous behavior agent Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III, (69-80)
  181. ACM
    Safonova A and Hodgins J Construction and optimal search of interpolated motion graphs ACM SIGGRAPH 2007 papers, (106-es)
  182. ACM
    Safonova A and Hodgins J (2007). Construction and optimal search of interpolated motion graphs, ACM Transactions on Graphics, 26:3, (106-es), Online publication date: 29-Jul-2007.
  183. Huang X, Jensen C, Lu H and Šaltenis S S-GRID Proceedings of the 10th international conference on Advances in spatial and temporal databases, (93-111)
  184. ACM
    Stern D, Herbrich R and Graepel T Learning to solve game trees Proceedings of the 24th international conference on Machine learning, (839-846)
  185. Tyugu E Algorithms and Architectures of Artificial Intelligence Proceedings of the 2007 conference on Algorithms and Architectures of Artificial Intelligence, (1-171)
  186. Park S, Kang J and Kim W A framework for ontology based rule acquisition from web documents Proceedings of the 1st international conference on Web reasoning and rule systems, (229-238)
  187. ACM
    Koenig S, Likhachev M and Sun X Speeding up moving-target search Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems, (1-8)
  188. Felzenszwalb P and McAllester D (2007). The generalized A* architecture, Journal of Artificial Intelligence Research, 29:1, (153-190), Online publication date: 1-May-2007.
  189. Tomašević V, Bojanić S and Nieto-Taladriz O (2007). Finding an internal state of RC4 stream cipher, Information Sciences: an International Journal, 177:7, (1715-1727), Online publication date: 1-Apr-2007.
  190. Kupferschmid S, Dräger K, Hoffmann J, Finkbeiner B, Dierks H, Podelski A and Behrmann G UPPAAL/DMC Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems, (679-682)
  191. REED C, WALTON D and MACAGNO F (2007). Argument diagramming in logic, law and artificial intelligence, The Knowledge Engineering Review, 22:1, (87-109), Online publication date: 1-Mar-2007.
  192. Borenstein Y and Poli R Decomposition of fitness functions in random heuristic search Proceedings of the 9th international conference on Foundations of genetic algorithms, (123-137)
  193. Sun X and Koenig S The fringe-saving A* search algorithm Proceedings of the 20th international joint conference on Artifical intelligence, (2391-2397)
  194. Sun X, Druzdzel M and Yuan C Dynamic weighting A* search-based MAP algorithm for Bayesian networks Proceedings of the 20th international joint conference on Artifical intelligence, (2385-2390)
  195. Perny P, Spanjaard O and Storme L State space search for risk-averse agents Proceedings of the 20th international joint conference on Artifical intelligence, (2353-2358)
  196. Bekkerman R, Zilberstein S and Allan J Web page clustering using heuristic search in the web graph Proceedings of the 20th international joint conference on Artifical intelligence, (2280-2285)
  197. Aine S, Chakrabarti P and Kumar R AWA*-a window constrained anytime heuristic search algorithm Proceedings of the 20th international joint conference on Artifical intelligence, (2250-2255)
  198. Hansen E and Zhou R (2007). Anytime heuristic search, Journal of Artificial Intelligence Research, 28:1, (267-297), Online publication date: 1-Jan-2007.
  199. Gradara S, Santone A and Villani M (2006). DELFIN+, Journal of Computer and System Sciences, 72:8, (1397-1412), Online publication date: 1-Dec-2006.
  200. Fu L, Sun D and Rilett L (2006). Heuristic shortest path algorithms for transportation applications, Computers and Operations Research, 33:11, (3324-3343), Online publication date: 1-Nov-2006.
  201. Aljazzar H and Leue S Extended directed search for probabilistic timed reachability Proceedings of the 4th international conference on Formal Modeling and Analysis of Timed Systems, (33-51)
  202. Lim Y and Lee W Properties of forward pruning in game-tree search proceedings of the 21st national conference on Artificial intelligence - Volume 2, (1020-1025)
  203. Dudek-Dyduch E and Dyduch T Learning algorithms for scheduling using knowledge based model Proceedings of the 8th international conference on Artificial Intelligence and Soft Computing, (1091-1100)
  204. Koenig S and Likhachev M A new principle for incremental heuristic search Proceedings of the Sixteenth International Conference on International Conference on Automated Planning and Scheduling, (402-405)
  205. Hélouët L, Hénin T and Chevrier C Automating scenario merging Proceedings of the 5th international conference on System Analysis and Modeling: language Profiles, (64-81)
  206. Marinescu R and Dechter R AND/OR branch-and-bound search for pure 0/1 integer linear programming problems Proceedings of the Third international conference on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, (152-166)
  207. Kupferschmid S and Helmert M A skat player based on Monte-Carlo simulation Proceedings of the 5th international conference on Computers and games, (135-147)
  208. ACM
    Koenig S and Likhachev M Real-time adaptive A* Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, (281-288)
  209. Zhu S and Mumford D (2006). A stochastic grammar of images, Foundations and Trends® in Computer Graphics and Vision, 2:4, (259-362), Online publication date: 29-Jan-2006.
  210. Haslum P (2006). Improving heuristics through relaxed search, Journal of Artificial Intelligence Research, 25:1, (233-267), Online publication date: 1-Jan-2006.
  211. Sadikov A, Bratko I and Kononenko I (2005). Bias and pathology in minimax search, Theoretical Computer Science, 349:2, (268-281), Online publication date: 14-Dec-2005.
  212. Sánchez-Nielsen E and Hernández-Tejera M Heuristic algorithms for fast and accurate tracking of moving objects in unrestricted environments Proceedings of the First international conference on Brain, Vision, and Artificial Intelligence, (507-516)
  213. Aljazzar H, Hermanns H and Leue S Counterexamples for timed probabilistic reachability Proceedings of the Third international conference on Formal Modeling and Analysis of Timed Systems, (177-195)
  214. Sánchez-Nielsen E and Hernández-Tejera M Heuristic algorithm for computing fast template motion in video streams Proceedings of the 7th international conference on Advanced Concepts for Intelligent Vision Systems, (547-554)
  215. Payer U and Kraxberger S Polymorphic code detection with GA optimized markov models Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security, (210-219)
  216. Badr G and Oommen B Enhancing trie-based syntactic pattern recognition using AI heuristic search strategies Proceedings of the Third international conference on Advances in Pattern Recognition - Volume Part I, (1-17)
  217. Lu Q, George B and Shekhar S Capacity constrained routing algorithms for evacuation planning Proceedings of the 9th international conference on Advances in Spatial and Temporal Databases, (291-307)
  218. Sánchez-Nielsen E and Hernández-Tejera M An heuristic search based approach for moving objects tracking Proceedings of the 19th international joint conference on Artificial intelligence, (1736-1737)
  219. Mausam , Benazera E, Brafman R, Meuleau N and Hansen E Planning with continuous resources in stochastic domains Proceedings of the 19th international joint conference on Artificial intelligence, (1244-1251)
  220. Furcy D and Koenig S Limited discrepancy beam search Proceedings of the 19th international joint conference on Artificial intelligence, (125-131)
  221. Likhachev M, Ferguson D, Gordon G, Stentz A and Thrun S Anytime dynamic A* Proceedings of the Fifteenth International Conference on International Conference on Automated Planning and Scheduling, (262-271)
  222. Likhachev M and Koenig S A generalized framework for Lifelong Planning A* search Proceedings of the Fifteenth International Conference on International Conference on Automated Planning and Scheduling, (99-108)
  223. Al-Ayyoub A (2005). Distributed Unidirectional and Bidirectional Heuristic Search, The Journal of Supercomputing, 32:3, (231-250), Online publication date: 1-Jun-2005.
  224. Ebendt R and Drechsler R Quasi-Exact BDD Minimization Using Relaxed Best-First Search Proceedings of the IEEE Computer Society Annual Symposium on VLSI: New Frontiers in VLSI Design, (59-64)
  225. Li K (2005). Design and analysis of asymptotically optimal randomized tree embedding algorithms in static networks, Performance Evaluation, 60:1-4, (141-163), Online publication date: 1-May-2005.
  226. Al-Ayyoub A (2005). Performance evaluation of parallel iterative deepening A* on clusters of workstations, Performance Evaluation, 60:1-4, (223-236), Online publication date: 1-May-2005.
  227. Li K Rapidly Mixing Random Walks on Hypercubes with Application to Dynamic Tree Evolution Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
  228. Ellman T and Giunchiglia F (2005). Introduction to the Special Volume on Reformulation, Artificial Intelligence, 162:1-2, (3-5), Online publication date: 1-Feb-2005.
  229. Thomas B and White C (2004). Anticipatory Route Selection, Transportation Science, 38:4, (473-487), Online publication date: 1-Nov-2004.
  230. Zamani R (2004). An Effective Near-Optimal State-Space Search Method, Artificial Intelligence Review, 22:1, (41-69), Online publication date: 1-Sep-2004.
  231. Yang X and Li C Secure XML publishing without information leakage in the presence of data inference Proceedings of the Thirtieth international conference on Very large data bases - Volume 30, (96-107)
  232. Li K (2004). Analysis of randomized load distribution for reproduction trees in linear arrays and rings, Theoretical Computer Science, 321:2-3, (195-214), Online publication date: 16-Aug-2004.
  233. Mould D and Horsch M An hierarchical terrain representation for approximately shortest paths Proceedings of the 8th Pacific Rim International Conference on Trends in Artificial Intelligence, (104-113)
  234. Koenig S A Comparison of Fast Search Methods for Real-Time Situated Agents Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 2, (864-871)
  235. Climer S and Zhang W A linear search strategy using bounds Proceedings of the Fourteenth International Conference on International Conference on Automated Planning and Scheduling, (132-141)
  236. Koenig S, Likhachev M, Liu Y and Furcy D (2004). Incremental heuristic search in AI, AI Magazine, 25:2, (99-112), Online publication date: 1-Jun-2004.
  237. Koenig S, Likhachev M, Liu Y and Furcy D (2004). Incremental Heuristic Search in AI, AI Magazine, 25:2, (99-112), Online publication date: 1-Jun-2004.
  238. Sen A, Bagchi A and Zhang W (2004). Average-case analysis of best-first search in two representative directed acyclic graphs, Artificial Intelligence, 155:1-2, (183-206), Online publication date: 1-May-2004.
  239. Koenig S, Likhachev M and Furcy D (2004). Lifelong planning A*, Artificial Intelligence, 155:1-2, (93-146), Online publication date: 1-May-2004.
  240. Sinanoglu O and Orailoglu A (2004). Fast and energy-frugal deterministic test through efficient compression and compaction techniques, Journal of Systems Architecture: the EUROMICRO Journal, 50:5, (257-266), Online publication date: 1-Apr-2004.
  241. Lorenz U and Monien B (2004). Error analysis in minimax trees, Theoretical Computer Science, 313:3, (485-498), Online publication date: 19-Feb-2004.
  242. Zhang W (2004). Phase transitions and backbones of the asymmetric traveling salesman problem, Journal of Artificial Intelligence Research, 21:1, (471-497), Online publication date: 1-Jan-2004.
  243. Zhang Z, Fan Y, Potkonjak M and Cong J Gradual Relaxation Techniques with Applications to Behavioral Synthesis Proceedings of the 2003 IEEE/ACM international conference on Computer-aided design
  244. Sierra-Santibáñez J (2003). Declarative Formalization of Reasoning Strategies, Annals of Mathematics and Artificial Intelligence, 39:1-2, (61-100), Online publication date: 1-Sep-2003.
  245. Koenig S, Tovey C and Smirnov Y (2003). Performance bounds for planning in unknown terrain, Artificial Intelligence, 147:1-2, (253-279), Online publication date: 1-Jul-2003.
  246. Shimbo M and Ishida T (2003). Controlling the learning process of real-time heuristic search, Artificial Intelligence, 146:1, (1-41), Online publication date: 1-May-2003.
  247. Nagel H Reflections on cognitive vision systems Proceedings of the 3rd international conference on Computer vision systems, (34-43)
  248. Nicosia G and Oriolo G (2003). An approximate A* algorithm and its application to the SCS problem, Theoretical Computer Science, 290:3, (2021-2029), Online publication date: 3-Jan-2003.
  249. Trovato K and Dorst L (2002). Differential A*, IEEE Transactions on Knowledge and Data Engineering, 14:6, (1218-1229), Online publication date: 1-Nov-2002.
  250. van Henten E, Hemming J, van Tuijl B, Kornet J, Meuleman J, Bontsema J and van Os E (2002). An Autonomous Robot for Harvesting Cucumbers in Greenhouses, Autonomous Robots, 13:3, (241-258), Online publication date: 1-Nov-2002.
  251. Nocera P, Linares G, Massonié D and Lefort L Phoneme Lattice Based A* Search Algorithm for Speech Recognition Proceedings of the 5th International Conference on Text, Speech and Dialogue, (301-308)
  252. Jung S and Pramanik S (2002). An Efficient Path Computation Model for Hierarchically Structured Topographical Road Maps, IEEE Transactions on Knowledge and Data Engineering, 14:5, (1029-1046), Online publication date: 1-Sep-2002.
  253. Ratschan S (2002). Search Heuristics for Box Decomposition Methods, Journal of Global Optimization, 24:1, (35-49), Online publication date: 1-Sep-2002.
  254. Perny P and Spanjaard O An axiomatic approach to robustness in search problems with multiple scenarios Proceedings of the Nineteenth conference on Uncertainty in Artificial Intelligence, (469-476)
  255. Sen A, Bagchi A and Zhang W An average-case analysis of graph search Eighteenth national conference on Artificial intelligence, (757-762)
  256. Perny P and Spanjaard O On preference-based search in state space graphs Eighteenth national conference on Artificial intelligence, (751-756)
  257. Jensen R, Bryant R and Veloso M SetA* Eighteenth national conference on Artificial intelligence, (668-673)
  258. Liu Y, Koenig S and Furcy D Speeding up the calculation of heuristics for heuristic search-based planning Eighteenth national conference on Artificial intelligence, (484-491)
  259. Koenig S and Likhachev M D*lite Eighteenth national conference on Artificial intelligence, (476-483)
  260. Laburthe F and Caseau Y (2002). SALSA, Constraints, 7:3/4, (255-288), Online publication date: 1-Jul-2002.
  261. Shoham Y and Toledo S (2002). Parallel randomized best-first minimax search, Artificial Intelligence, 137:1-2, (165-196), Online publication date: 1-May-2002.
  262. Koenig S, Furcy D and Bauer C Heuristic search-based replanning Proceedings of the Sixth International Conference on Artificial Intelligence Planning Systems, (294-301)
  263. Dechter R and Frost D (2002). Backjump-based backtracking for constraint satisfaction problems, Artificial Intelligence, 136:2, (147-188), Online publication date: 18-Apr-2002.
  264. Li K Performance Evaluation of a Random-Walk-Based Algorithm for Embedding Dynamically Evolving Trees in Butterflies Proceedings of the 16th International Parallel and Distributed Processing Symposium
  265. ACM
    Cavazza M, Charles F and Mead S Emergent situations in interactive storytelling Proceedings of the 2002 ACM symposium on Applied computing, (1080-1085)
  266. Dasgupta P, Chakrabarti P, Dey A, Ghose S and Bibel W (2002). Solving Constraint Optimization Problems from CLP-Style Specifications Using Heuristic Search Techniques, IEEE Transactions on Knowledge and Data Engineering, 14:2, (353-368), Online publication date: 1-Mar-2002.
  267. Zhang W Search techniques Handbook of data mining and knowledge discovery, (169-184)
  268. Koenig S (2001). Agent‐Centered Search, AI Magazine, 22:4, (109-131), Online publication date: 1-Dec-2001.
  269. Raphael C (2001). Coarse-to-Fine Dynamic Programming, IEEE Transactions on Pattern Analysis and Machine Intelligence, 23:12, (1379-1390), Online publication date: 1-Dec-2001.
  270. Liu J and Lee Y (2001). A Graph-Based Method for Face Identification from a Single 2D Line Drawing, IEEE Transactions on Pattern Analysis and Machine Intelligence, 23:10, (1106-1119), Online publication date: 1-Oct-2001.
  271. Koenig S, Szymanski B and Liu Y (2001). Efficient and inefficient ant coverage methods, Annals of Mathematics and Artificial Intelligence, 31:1-4, (41-76), Online publication date: 2-May-2001.
  272. Cavazza M (2000). Al in computer games, Virtual Reality, 5:4, (223-235), Online publication date: 1-Dec-2000.
  273. Loddo J and Di Cosmo R Playing logic programs with the alpha-beta algorithm Proceedings of the 7th international conference on Logic for programming and automated reasoning, (207-224)
  274. Caumanns J (2000). Bottom-Up Generation of Hypermedia Documents, Multimedia Tools and Applications, 12:2-3, (109-128), Online publication date: 1-Nov-2000.
  275. Levinson R and Weber R Chess Neighborhoods, Function Combination, and Reinforcement Learning Revised Papers from the Second International Conference on Computers and Games, (133-150)
  276. Grimbergen R Plausible Move Generation Using Move Merit Analysis with Cut-Off Thresholds in Shogi Revised Papers from the Second International Conference on Computers and Games, (315-332)
  277. Hori Y, Seki M, Grimbergen R, Maruyama T and Hoshino T A Shogi Processor with a Field Programmable Gate Array Revised Papers from the Second International Conference on Computers and Games, (297-314)
  278. ACM
    Warshaw L and Miranker D Rule-based query optimization, revisited Proceedings of the eighth international conference on Information and knowledge management, (267-275)
  279. Farreny H (1999). Completeness and Admissibility for General Heuristic Search Algorithms—A Theoretical Study, Journal of Heuristics, 5:3, (353-376), Online publication date: 1-Oct-1999.
  280. (1999). Optimizing Expert Systems, INFORMS Journal on Computing, 11:3, (278-291), Online publication date: 1-Aug-1999.
  281. (1999). Optimizing Expert Systems, INFORMS Journal on Computing, 11:3, (278-291), Online publication date: 1-Aug-1999.
  282. Kask K and Dechter R Mini-bucket heuristics for improved search Proceedings of the Fifteenth conference on Uncertainty in artificial intelligence, (314-323)
  283. ACM
    Lathrop R An anytime algorithm for gapped block protein threading with pair interactions Proceedings of the third annual international conference on Computational molecular biology, (238-249)
  284. Schaerf A (1999). A Survey of Automated Timetabling, Artificial Intelligence Review, 13:2, (87-127), Online publication date: 1-Apr-1999.
  285. Hsu F (1999). IBM's Deep Blue Chess Grandmaster Chips, IEEE Micro, 19:2, (70-81), Online publication date: 1-Mar-1999.
  286. Bonacina M A taxonomy of theorem-proving strategies Artificial intelligence today, (43-84)
  287. Grama A and Kumar V (1999). State of the Art in Parallel Search Techniques for Discrete Optimization Problems, IEEE Transactions on Knowledge and Data Engineering, 11:1, (28-35), Online publication date: 1-Jan-1999.
  288. ACM
    Karp R and Zhang Y (1998). On parallel evaluation of game trees, Journal of the ACM, 45:6, (1050-1075), Online publication date: 1-Nov-1998.
  289. Ishida T (1998). Real-Time Search for Autonomous Agents and Multiagent Systems, Autonomous Agents and Multi-Agent Systems, 1:2, (139-167), Online publication date: 1-Oct-1998.
  290. ACM
    Arbab F and Monfroy E (1998). Coordination of heterogeneous distributed cooperative constraint solving, ACM SIGAPP Applied Computing Review, 6:2, (4-17), Online publication date: 1-Sep-1998.
  291. A. Hearst M (1998). Information Integration, IEEE Intelligent Systems, 13:5, (12-24), Online publication date: 1-Sep-1998.
  292. Zhang W Flexible and approximate computation through state-space reduction Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence, (531-538)
  293. Sarkar S, Chakrabarti P and Ghose S (1998). A Framework for Learning in Search-Based Systems, IEEE Transactions on Knowledge and Data Engineering, 10:4, (563-575), Online publication date: 1-Jul-1998.
  294. Jing N, Huang Y and Rundensteiner E (1998). Hierarchical Encoded Path Views for Path Query Processing, IEEE Transactions on Knowledge and Data Engineering, 10:3, (409-432), Online publication date: 1-May-1998.
  295. ACM
    Li K Performance evaluation of probabilistic tree embedding in cube-connected cycles Proceedings of the 1998 ACM symposium on Applied Computing, (584-592)
  296. Preuß T, Syrbe J and König H Virtual Private Resources Proceedings of the 1st International Conference on Enterprise Distributed Object Computing, (216-226)
  297. Mookerjee V and Mannino M (1997). Sequential Decision Models for Expert System Optimization, IEEE Transactions on Knowledge and Data Engineering, 9:5, (675-687), Online publication date: 1-Sep-1997.
  298. Poore A and Robertson A (1997). A New Lagrangian Relaxation Based Algorithm for a Class ofMultidimensional Assignment Problems, Computational Optimization and Applications, 8:2, (129-150), Online publication date: 1-Sep-1997.
  299. Dechter R Mini-buckets Proceedings of the Fifteenth international joint conference on Artifical intelligence - Volume 2, (1297-1302)
  300. Dechter R and Rish I A scheme for approximating probabilistic inference Proceedings of the Thirteenth conference on Uncertainty in artificial intelligence, (132-141)
  301. Lee S, Ahn J, Lee S, Chung T and Seung H Toward the next generation public traffic information system using Internet Proceedings of the High-Performance Computing on the Information Superhighway, HPC-Asia '97
  302. ACM
    Li K On dynamic tree growing in hypercubes Proceedings of the 1997 ACM symposium on Applied computing, (496-503)
  303. Fraternali P and Paraboschi S (1997). Ordering and Selecting Production Rules for Constraint Maintenance, IEEE Transactions on Knowledge and Data Engineering, 9:1, (173-178), Online publication date: 1-Jan-1997.
  304. Kam A and Kopec G (1996). Document Image Decoding by Heuristic Search, IEEE Transactions on Pattern Analysis and Machine Intelligence, 18:9, (945-950), Online publication date: 1-Sep-1996.
  305. Kainz G and Kaindl H Dynamic improvements of heuristic evaluations during search Proceedings of the thirteenth national conference on Artificial intelligence - Volume 1, (311-317)
  306. Koenig S and Simmons R Easy and hard testbeds for real-time search algorithms Proceedings of the thirteenth national conference on Artificial intelligence - Volume 1, (279-285)
  307. Bhattacharya S and Hagchi A Searching game trees under memory constraints Proceedings of the thirteenth national conference on Artificial intelligence - Volume 1, (222-227)
  308. Mikler A, Honavar V and Wong J Analysis of utility-theoretic heuristics for intelligent adaptive network routing Proceedings of the thirteenth national conference on Artificial intelligence - Volume 1, (96-101)
  309. Ishida T (1996). Real-Time Bidirectional Search, IEEE Transactions on Pattern Analysis and Machine Intelligence, 18:6, (617-628), Online publication date: 1-Jun-1996.
  310. ACM
    Li K Maintenance of tree structured computations on parallel and distributed computer systems Proceedings of the 1996 ACM symposium on Applied Computing, (337-343)
  311. Kalai E Games, computers, and O.R. Proceedings of the seventh annual ACM-SIAM symposium on Discrete algorithms, (468-473)
  312. Dasgupta P, Sen A, Nandy S and Bhattacharya B Geometric bipartitioning problem and its applications to VLSI Proceedings of the 9th International Conference on VLSI Design: VLSI in Mobile Communication
  313. Jones E and Roydhouse A (1995). Intelligent Retrieval of Archived Meteorological Data, IEEE Expert: Intelligent Systems and Their Applications, 10:6, (50-57), Online publication date: 1-Dec-1995.
  314. Schweitzer H (1995). Occam Algorithms for Computing Visual Motion, IEEE Transactions on Pattern Analysis and Machine Intelligence, 17:11, (1033-1042), Online publication date: 1-Nov-1995.
  315. Wah B, Ieumwananonthachai A, Chu L and Aizawa A (1995). Genetics-Based Learning of New Heuristics, IEEE Transactions on Knowledge and Data Engineering, 7:5, (763-785), Online publication date: 1-Oct-1995.
  316. Koenig S and Simmons R Real-time search in non-deterministic domains Proceedings of the 14th international joint conference on Artificial intelligence - Volume 2, (1660-1667)
  317. Sasaki T, Chimura F and Tokoro M The trailblazer search with a hierarchical abstract map Proceedings of the 14th international joint conference on Artificial intelligence - Volume 1, (259-264)
  318. Bhattacharya S Experimenting with revisits in game tree search Proceedings of the 14th international joint conference on Artificial intelligence - Volume 1, (243-249)
  319. Ishida T and Korf R (1995). Moving-Target Search, IEEE Transactions on Pattern Analysis and Machine Intelligence, 17:6, (609-619), Online publication date: 1-Jun-1995.
  320. ACM
    Gudaitis M, Lamont G and Terzuoli A Multicriteria vehicle route-planning using parallel A * search Proceedings of the 1995 ACM symposium on Applied computing, (171-176)
  321. Chen P (1994). Heuristic sampling on DAGs, Algorithmica, 12:6, (458-475), Online publication date: 1-Dec-1994.
  322. Nieman D (1994). Issues in the Design and Control of Parallel Rule-Firing Production Systems, Journal of Parallel and Distributed Computing, 23:3, (338-363), Online publication date: 1-Dec-1994.
  323. Sohn A, Sato M, Sakai S, Kodama Y and Yamaguchi Y Nonnumeric search results on the EM-4 distributed-memory multiprocessor Proceedings of the 1994 ACM/IEEE conference on Supercomputing, (301-310)
  324. Karypis G and Kumar V (1994). Unstructured Tree Search on SIMD Parallel Computers, IEEE Transactions on Parallel and Distributed Systems, 5:10, (1057-1072), Online publication date: 1-Oct-1994.
  325. Teng S (1994). Functional inversion and communication complexity, Journal of Cryptology, 7:3, (153-170), Online publication date: 1-Sep-1994.
  326. Moriarty D and Miikkulainen R Evolving neural networks to focus minimax search Proceedings of the Twelfth AAAI National Conference on Artificial Intelligence, (1371-1377)
  327. Kaindl H and Khorsand A Memory-bounded bidirectional search Proceedings of the Twelfth AAAI National Conference on Artificial Intelligence, (1359-1364)
  328. Chimura F and Tokoro M The trailblazer search Proceedings of the Twelfth AAAI National Conference on Artificial Intelligence, (1347-1352)
  329. ACM
    Feldmann R, Mysliwiete P and Monien B Studying overheads in massively parallel MIN/MAX-tree evaluation Proceedings of the sixth annual ACM symposium on Parallel algorithms and architectures, (94-103)
  330. Pimentel S and Brem L Robust planning in uncertain environments Proceedings of the Tenth international conference on Uncertainty in artificial intelligence, (463-469)
  331. Dearden R and Boutilier C Integrating planning and execution in stochastic domains Proceedings of the Tenth international conference on Uncertainty in artificial intelligence, (162-169)
  332. Reinefeld A and Marsland T (1994). Enhanced Iterative-Deepening Search, IEEE Transactions on Pattern Analysis and Machine Intelligence, 16:7, (701-710), Online publication date: 1-Jul-1994.
  333. Kao M, Ma Y, Sipser M and Yin Y Optimal constructions of hybrid algorithms Proceedings of the fifth annual ACM-SIAM symposium on Discrete algorithms, (372-381)
  334. ACM
    Diderich C (1993). A bibliography on minimax trees, ACM SIGACT News, 24:4, (82-89), Online publication date: 1-Dec-1993.
  335. Weiss S, Spillinger I and Silberman G (1993). Architectural Improvements for a Data-Driven VLSI Processing Array, Journal of Parallel and Distributed Computing, 19:4, (308-322), Online publication date: 1-Dec-1993.
  336. Reinefeld A Complete solution of the eight-puzzle and the benefit of node ordering in IDA Proceedings of the 13th international joint conference on Artifical intelligence - Volume 1, (248-253)
  337. Koll A and Kaindl H Bidirectional best-first search with bounded error Proceedings of the 13th international joint conference on Artifical intelligence - Volume 1, (217-223)
  338. ACM
    Kriplani H, Najm F, Yang P and Hajj I Resolving signal correlations for estimating maximum currents in CMOS combinational circuits Proceedings of the 30th international Design Automation Conference, (384-388)
  339. ACM
    Grimm J, Lamont G and Terzuoli A A parallelized search strategy for solving a multicriteria aircraft routing problem Proceedings of the 1993 ACM/SIGAPP symposium on Applied computing: states of the art and practice, (570-577)
  340. Choi A and Ruschitzka M (1993). Managing Locality Sets, IEEE Transactions on Computers, 42:2, (190-204), Online publication date: 1-Feb-1993.
  341. Sohn A A Parallel Implementation of the Traveling Salesman Problem on a Sequent Symmetry Mulitprocessor Proceedings of the IFIP WG10.3. Working Conference on Architectures and Compilation Techniques for Fine and Medium Grain Parallelism, (273-280)
  342. Kao M, Reif J and Tate S Searching in an unknown environment Proceedings of the fourth annual ACM-SIAM symposium on Discrete algorithms, (441-447)
  343. Karypis G and Kumar V Unstructured tree search on SIMD parallel computers Proceedings of the 1992 ACM/IEEE conference on Supercomputing, (453-462)
  344. ten Berg A Flexible controlpath microarchitecture synthesis based on artificial intelligence Proceedings of the conference on European design automation, (112-117)
  345. Wah B (1992). Population-Based Learning, IEEE Transactions on Knowledge and Data Engineering, 4:5, (454-474), Online publication date: 1-Oct-1992.
  346. Schiex T Possibilistic constraint satisfaction problems or "How to handle soft constraints ?" Proceedings of the Eighth international conference on Uncertainty in artificial intelligence, (268-275)
  347. Ishida T Moving target search with intelligence Proceedings of the tenth national conference on Artificial intelligence, (525-532)
  348. Holmes P and Jungert E (1992). Symbolic and Geometric Connectivity Graph Methods for Route Planning in Digitized Maps, IEEE Transactions on Pattern Analysis and Machine Intelligence, 14:5, (549-565), Online publication date: 1-May-1992.
  349. ACM
    Liu H, Kershenbaum A and Van Slyke R Artificial intelligence applications to communication network design with bulk facilities Proceedings of the 1992 ACM annual conference on Communications, (345-350)
  350. ACM
    Lercher L and Kaindl H (1992). Problems, communications, and common sense, ACM SIGART Bulletin, 3:2, (15-19), Online publication date: 1-Apr-1992.
  351. Kaindl H, Shams R and Horacek H (1991). Minimax Search Algorithms With and Without Aspiration Windows, IEEE Transactions on Pattern Analysis and Machine Intelligence, 13:12, (1225-1235), Online publication date: 1-Dec-1991.
  352. Calistri‐Yeh R (1991). Classifying and Detecting Plan‐Based Misconceptions for Robust Plan Recognition, AI Magazine, 12:3, (34-35), Online publication date: 1-Sep-1991.
  353. Ishida T and Korf R Moving target search Proceedings of the 12th international joint conference on Artificial intelligence - Volume 1, (204-210)
  354. Fox J and Krause P Symbolic decision theory and autonomous systems Proceedings of the Seventh conference on Uncertainty in Artificial Intelligence, (103-110)
  355. ACM
    Rodohan D and Glover R (1991). An overview of the A architecture for optimisation problems in a logic programming environment, ACM SIGARCH Computer Architecture News, 19:4, (124-131), Online publication date: 1-Jul-1991.
  356. Saletore V and Kalé L Consistent linear speedups to a first solution in parallel state-space search Proceedings of the eighth National conference on Artificial intelligence - Volume 1, (227-233)
  357. ACM
    Weiss S, Spillinger I and Siberman G Architectural improvements for data-driven VLSI processing arrays Proceedings of the fourth international conference on Functional programming languages and computer architecture, (243-259)
  358. Sen A and Bagchi A Fast recursive formulations for best-first search that allow controlled use of memory Proceedings of the 11th international joint conference on Artificial intelligence - Volume 1, (297-302)
  359. Yoo H and Lafortune S (1989). An Intelligent Search Method for Query Optimization by Semijoins, IEEE Transactions on Knowledge and Data Engineering, 1:2, (226-237), Online publication date: 1-Jun-1989.
  360. (1988). Development of a Knowledge-Based Model Management System, Operations Research, 36:6, (849-863), Online publication date: 1-Dec-1988.
  361. Young M and Taylor R (1988). Combining Static Concurrency Analysis with Symbolic Execution, IEEE Transactions on Software Engineering, 14:10, (1499-1511), Online publication date: 1-Oct-1988.
  362. Yu C and Wah B (1988). Efficient Branch-and-Bound Algorithms on a Two-Level Memory System, IEEE Transactions on Software Engineering, 14:9, (1342-1356), Online publication date: 1-Sep-1988.
  363. Agrawal R and Jagadish H Efficient Search in Very Large Databases Proceedings of the 14th International Conference on Very Large Data Bases, (407-418)
  364. ACM
    Chakrabarti P, Ghose S and DeSarkar S Best first search in and/or graphs Proceedings of the 1988 ACM sixteenth annual conference on Computer science, (256-261)
  365. ACM
    Lin F, Chu P and Liu M (1987). Protocol verification using reachability analysis: the state space explosion problem and relief strategies, ACM SIGCOMM Computer Communication Review, 17:5, (126-135), Online publication date: 1-Oct-1987.
  366. ACM
    Lin F, Chu P and Liu M Protocol verification using reachability analysis: the state space explosion problem and relief strategies Proceedings of the ACM workshop on Frontiers in computer communications technology, (126-135)
  367. ACM
    Martin H and Seethoff T On optimal algorithms for solving bi-valued game trees Proceedings of the 15th annual conference on Computer Science, (254-260)
  368. ACM
    Sudkamp T and Shanahan R Analysis of heurisitc search models Proceedings of the 15th annual conference on Computer Science, (7-15)
  369. Li G and Wah B (1986). Coping with anomalies in parallel branch-and-bound algorithms, IEEE Transactions on Computers, 35:6, (568-573), Online publication date: 10-Jun-1986.
  370. ACM
    Wah B and Li G (1986). Survey on special purpose computer architectures for AI, ACM SIGART Bulletin:96, (28-46), Online publication date: 1-Apr-1986.
  371. ACM
    Martin H Polynomial evaluations of bi-valued game trees Proceedings of the 1986 ACM fourteenth annual conference on Computer science, (319-326)
  372. ACM
    Bagchi A and Sen A Heuristic search in general tree structures Proceedings of the 1986 ACM fourteenth annual conference on Computer science, (309-318)
  373. Motteler H and Kanal L The complexity of searching several classes of AND/OR graphs Proceedings of the 9th international joint conference on Artificial intelligence - Volume 2, (1083-1085)
  374. Fu J, Atanasov N, Topcu U and Pappas G Optimal temporal logic planning in probabilistic semantic maps 2016 IEEE International Conference on Robotics and Automation (ICRA), (3690-3697)
  375. Islam F, Narayanan V and Likhachev M A*-Connect: Bounded suboptimal bidirectional heuristic search 2016 IEEE International Conference on Robotics and Automation (ICRA), (2752-2758)
  376. Otte M, Silva W and Frew E Any-time path-planning: Time-varying wind field + moving obstacles 2016 IEEE International Conference on Robotics and Automation (ICRA), (2575-2582)
  377. Lin W, Luo J, Zhou J, Huang Y and Zhou M Scheduling and control of batch chemical processes with timed Petri nets 2016 IEEE International Conference on Automation Science and Engineering (CASE), (421-426)
  378. Hu X and Liao J Co-evolutionary path optimization by ripple-spreading algorithm 2016 IEEE Congress on Evolutionary Computation (CEC), (4535-4542)
Contributors
  • University of California, Los Angeles

Recommendations

Stanley Wertheimer

There is no generally accepted definition of the word heuristic; however, most interested parties agree that a heuristic is a rule-of-thumb, an educated g uess, the application of intuition or common sense, or inductive intelligence. S eventeenth and eighteenth century mathematicians used heuristics in place of est ablished theory in analysis (Fourier series, integration theory, differential eq uations). They were called theorems but were not proved or proved incorrectly - which gave those in the nineteenth century some cleaning up to do. Two points should be made: some of the greatest mathematicians postulated and used these unproved theorems; the theorems were usually correct. If mathematics had waited for its friend rigor before sallying forth, rigor's companion mortis would have kept progress to a minium for long periods of time. This is not to say that un tried half-baked ideas should be allowed to proliferate, but that informed exper ience-based ideas should be carefully used by practitioners while others try to provide theoretical justification. The author of the book under review is both practitioner and justifier. Physics, chemistry, and the biological sciences rely on the infusion of new unpr oven ideas for progress. Often, however, the experiments (if not of the Gedanke n kind) require large quantities of money and time. A sizeable computational co puter science problem also often requires new ideas; the basis for these ideas i s not physical experimentation, however, but analytic insight, as in mathematics , so cost is not so much of a question and work proceeds faster. The insight te nds to take the form of a heuristic method. One is not concerned with conceptua lization (e.g., the theory of relativity) as much as with solution (e.g., comput e a satellite's orbit); in this sense one would like to prove that the solution method will always yield the correct answers. However, as is the case in so man y computational problems, the solver must often be happy with a sufficiently goo d answer most of the time. In the classical applied science problems in the continuous world, the underlyin y structures to be solved are such things as linear and nonlinear systems and eq uations; the theoretical and numerical properties of such systems are usualy wel l understood due to long and continued effort. The structures underlying many hard computer science problems are trees and grap hs; solution of these problems often requires searching for a distinctive node o r path. Exhaustive search is theoretically possible but often practically impos sible. Problem solution becomes possible with the use of heuristics to guide th e way; even so, there is a chance that the problem will not be solved, or the so lution will only be close to optimal. Pearl has gathered together, for the firs t time, almost all that is current in solving search problems in computer scienc e using heuristics. Pearl give some well known examples of the kinds of problems which with the book is concerned: the 8-Queens problem; the 8-Puzzle; the Traveling Salesman proble m; the Counterfeit Coin problem. He also devotes the last third of the book to game-playing programs. The first two parts are: Problem Solving Strategies and the Nature of Heuristic Search (an introduction, typical problems, descriptive taxonomy of methods); and Performance Analysis of Heuristic Methods (mathematica l analysis of several heuristics). In the game-playing section Pearl applied he uristic search methods, analyzes them, and presents some experimental results. The mathematics involved is mostly probability theory. Important search methods discussed are hill-climbing, depth-first, backtracking, best-first, and hybrid methods is carefully laid out. (Pearl several times includes verbatim sections of his own papers, mostly written over the past five years.) An attempt is made at analyzing the way in which heuristic functions are discovered. There is a p articularly interesting discussion about look-ahead; why it might be theoretical ly unjustified but practically effective. In the game-playing sections Pearl co mpares pruning (a backtracking procedure), SSS* (a best-first search for an opti mal playing strategy), and SCOUT (a cautious test-before-evaluate strategy of hi s own). This book can be used by one wishing an introduction to the topic and a knowledg e of where the problems are as of publication, by graduate students (there are s ufficient and interesting problems at the end of each of the ten chapters), or b y rsearchers in the field, as a reference (there are eight pages in the bibliogr aphy, roughly 150 entries). Pearl has taken the work of others, notably Nils Ni lsson, as of the late 1970's, added what he and his colleagues at the UCLA Cogni tive Systems Laboratory has since done, and come up with an eminently readable b ook (the first on the subject) which is sure to be a standard reference for seve ral years.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.