{"_id":"h9kfhBn5yXTgEoToA","bibbaseid":"ruml-principledexploitationofheuristicinformation-2002","downloads":0,"creationDate":"2018-07-10T13:30:16.773Z","title":"Principled Exploitation of Heuristic Information.","author_short":["Ruml, W."],"year":2002,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/wheeler?items=1000","bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2011-06-30T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Ruml"],"firstnames":["Wheeler"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2c474a3c7519c5940305772c13272cf2c/dblp","booktitle":"SARA","crossref":"conf/sara/2002","editor":[{"propositions":[],"lastnames":["Koenig"],"firstnames":["Sven"],"suffixes":[]},{"propositions":[],"lastnames":["Holte"],"firstnames":["Robert","C."],"suffixes":[]}],"ee":"http://dx.doi.org/10.1007/3-540-45622-8_38","interhash":"a5b9b4dab7d7be76c88f5c5752125232","intrahash":"c474a3c7519c5940305772c13272cf2c","isbn":"3-540-43941-2","keywords":"dblp","pages":"345-346","publisher":"Springer","series":"Lecture Notes in Computer Science","timestamp":"2011-07-01T11:39:04.000+0200","title":"Principled Exploitation of Heuristic Information.","url":"http://dblp.uni-trier.de/db/conf/sara/sara2002.html#Ruml02","volume":"2371","year":"2002","bibtex":"@inproceedings{conf/sara/Ruml02,\n added-at = {2011-06-30T00:00:00.000+0200},\n author = {Ruml, Wheeler},\n biburl = {https://www.bibsonomy.org/bibtex/2c474a3c7519c5940305772c13272cf2c/dblp},\n booktitle = {SARA},\n crossref = {conf/sara/2002},\n editor = {Koenig, Sven and Holte, Robert C.},\n ee = {http://dx.doi.org/10.1007/3-540-45622-8_38},\n interhash = {a5b9b4dab7d7be76c88f5c5752125232},\n intrahash = {c474a3c7519c5940305772c13272cf2c},\n isbn = {3-540-43941-2},\n keywords = {dblp},\n pages = {345-346},\n publisher = {Springer},\n series = {Lecture Notes in Computer Science},\n timestamp = {2011-07-01T11:39:04.000+0200},\n title = {Principled Exploitation of Heuristic Information.},\n url = {http://dblp.uni-trier.de/db/conf/sara/sara2002.html#Ruml02},\n volume = 2371,\n year = 2002\n}\n\n","author_short":["Ruml, W."],"editor_short":["Koenig, S.","Holte, R. C."],"key":"conf/sara/Ruml02","id":"conf/sara/Ruml02","bibbaseid":"ruml-principledexploitationofheuristicinformation-2002","role":"author","urls":{"Link":"http://dx.doi.org/10.1007/3-540-45622-8_38","Paper":"http://dblp.uni-trier.de/db/conf/sara/sara2002.html#Ruml02"},"keyword":["dblp"],"downloads":0},"search_terms":["principled","exploitation","heuristic","information","ruml"],"keywords":["dblp"],"authorIDs":[],"dataSources":["9ByL5wSiKDQZu3sWd"]}