Search results for: Roland H. C. Yap
Lecture Notes in Computer Science > Coordination Models and Languages > Session 4. Concurrency > 191-210
Lecture Notes in Computer Science > Principles and Practice of Constraint Programming > Research Track Short Papers > 635-639
Lecture Notes in Computer Science > Principles and Practice of Constraint Programming > Research Track Short Papers > 640-645
Lecture Notes in Computer Science > Principles and Practice of Constraint Programming - CP 2005 > Full Papers > 182-195
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > System Call-Based Intrusion Detection > 146-164
Lecture Notes in Computer Science > Principles and Practice of Constraint Programming > Research Track Short Papers > 545-549
Lecture Notes in Computer Science > Principles and Practice of Constraint Programming — CP '95 > 222-239
Lecture Notes in Computer Science > Principles and Practice of Constraint Programming – CP 2007 > Full Research Papers > 332-347
Lecture Notes in Computer Science > Principles and Practice of Constraint Programming — CP98 > Invited Papers > 1-1
Lecture Notes in Computer Science > Principles and Practice of Constraint Programming – CP 2000 > Regular Papers > 470-483
Lecture Notes in Computer Science > Engineering Stochastic Local Search Algorithms. Designing, Implementing and Analyzing Effective Heuristics > The Importance of Being Careful > 16-30
Lecture Notes in Computer Science > Principles and Practice of Constraint Programming > Research Track Long Papers > 509-523
Lecture Notes in Computer Science > AI 2008: Advances in Artificial Intelligence > Constraints > 93-103
Lecture Notes in Computer Science > Principles and Practice of Constraint Programming — CP98 > Submitted Papers > 177-191
Lecture Notes in Computer Science > Logic Programming > Functional and Constraint Logic Programming > 102-116