Exploration/exploitation in CBR systems: A formal analysis uri icon