Roland H. C. Yap

Orcid: 0000-0002-1188-7474

Affiliations:
  • National University of Singapore (NUS)


According to our database1, Roland H. C. Yap authored at least 154 papers between 1987 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Real-time passenger bus routing problems with preferences and tradeoffs.
Ann. Math. Artif. Intell., June, 2023

A Comparison of SAT Encodings for Acyclicity of Directed Graphs.
Proceedings of the 26th International Conference on Theory and Applications of Satisfiability Testing, 2023

The Expressive Power of Ad-Hoc Constraints for Modelling CSPs.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Fast Converging Anytime Model Counting.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Applying Deep Reinforcement Learning to the HP Model for Protein Structure Prediction.
CoRR, 2022

CCDD: A Tractable Representation for Model Counting and Uniform Sampling.
CoRR, 2022

Hardening binaries against more memory errors.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

Extensible Virtual Call Integrity.
Proceedings of the Computer Security - ESORICS 2022, 2022

CNF Encodings of Binary Constraint Trees.
Proceedings of the 28th International Conference on Principles and Practice of Constraint Programming, 2022

RecIPE: Revisiting the Evaluation of Memory Error Defenses.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Encoding Multi-Valued Decision Diagram Constraints as Binary Constraint Trees.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
An Efficient Heuristic for Passenger Bus VRP with Preferences and Tradeoffs.
Proceedings of the Learning and Intelligent Optimization - 15th International Conference, 2021

The Power of Literal Equivalence in Model Counting.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Towards Certifying Trustworthy Machine Learning Systems.
Proceedings of the Trustworthy AI - Integrating Learning, Optimization and Reasoning, 2020

Bipartite Encoding: A New Binary Encoding for Solving Non-Binary CSPs.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

A Hybrid Dynamic Arity Search Heuristic for Constraint Programming.
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020

Generalized Arc Consistency Algorithms for Table Constraints: A Summary of Algorithmic Ideas.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Benchmarking Symbolic Execution Using Constraint Problems - Initial Results.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

Arc Consistency Revisited.
Proceedings of the Integration of Constraint Programming, Artificial Intelligence, and Operations Research, 2019

2018
Shape Neutral Analysis of Graph-based Data-structures.
Theory Pract. Log. Program., 2018

An Extended Low Fat Allocator API and Applications.
CoRR, 2018

EffectiveSan: type and memory error detection using dynamically typed C/C++.
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2018

Learning Robust Search Strategies Using a Bandit-Based Approach.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
RoppDroid: Robust permission re-delegation prevention in Android inter-component communication.
Comput. Secur., 2017

Analysing Trends in Computer Science Research: A Preliminary Study Using The Microsoft Academic Graph.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Stack Bounds Protection with Low Fat Pointers.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Correlation Heuristics for Constraint Programming.
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017

The Strong Link Graph for Enhancing Sybil Defenses.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Android Database Attacks Revisited.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Using Community Structure to Categorize Computer Science Conferences: Initial Results.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
Investigations on Rating Computer Sciences Conferences: An Experiment with the Microsoft Academic Graph Dataset.
Proceedings of the 25th International Conference on World Wide Web, 2016

Optimizing Simple Tabular Reduction with a Bitwise Representation.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

The Problem of Categorizing Conferences in Computer Science.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2016

Inferring the Detection Logic and Evaluating the Effectiveness of Android Anti-Virus Apps.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Heap bounds protection with low fat pointers.
Proceedings of the 25th International Conference on Compiler Construction, 2016

Detecting Malware Through Anti-analysis Signals - A Preliminary Study.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Improving the lower bound of simple tabular reduction.
Constraints An Int. J., 2015

STR3: A path-optimal filtering algorithm for table constraints.
Artif. Intell., 2015

Decomposition of the Factor Encoding for CSPs.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Simple and Practical Integrity Models for Binaries and Files.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Web-to-Application Injection Attacks on Android: Characterization and Detection.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Experiments on Rating Conferences with CORE and DBLP.
D Lib Mag., 2014

Relatedness measures between conferences in computer science: a preliminary study based on DBLP.
Proceedings of the 23rd International World Wide Web Conference, 2014

Understanding Complex Binary Loading Behaviors.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

Higher-Order Consistencies through GAC on Factor Variables.
Proceedings of the Principles and Practice of Constraint Programming, 2014

Tagged-MapReduce: A General Framework for Secure Computing with Mixed-Sensitivity Data on Hybrid Clouds.
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014

2013
Many-to-many interchangeable sets of values in CSPs.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

JNICodejail: native code isolation for Java programs.
Proceedings of the 2013 International Conference on Principles and Practices of Programming on the Java Platform: Virtual Machines, 2013

Optimizing STR Algorithms with Tuple Compression.
Proceedings of the Principles and Practice of Constraint Programming, 2013

Towards a general framework for secure MapReduce computation on hybrid clouds.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '13, 2013

2012
Stochastic Database Cracking: Towards Robust Adaptive Indexing in Main-Memory Column-Stores.
Proc. VLDB Endow., 2012

Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions.
Proceedings of the Computer Security - ESORICS 2012, 2012

A Path-Optimal GAC Algorithm for Table Constraints.
Proceedings of the ECAI 2012, 2012

Experiments with Malware Visualization.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

Space-Time Tradeoffs for the Regular Constraint.
Proceedings of the Principles and Practice of Constraint Programming, 2012

Revisiting link privacy in social networks.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Solving functional constraints by variable substitution.
Theory Pract. Log. Program., 2011

Enhancing host security using external environment sensors.
Int. J. Inf. Sec., 2011

Trusted Principal-Hosted Certificate Revocation.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

A MapReduce-Based Maximum-Flow Algorithm for Large Small-World Network Graphs.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Quantifying the Effects of More Timely Certificate Revocation on Lightweight Mobile Devices.
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011

Partial Social Network Disclosure and Crawlers.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Towards a binary integrity system for windows.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
An MDD-based generalized arc consistency algorithm for positive and negative table constraints and some global constraints.
Constraints An Int. J., 2010

The Problem of Usable Binary Authentication.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Visualizing windows system traces.
Proceedings of the ACM 2010 Symposium on Software Visualization, 2010

Routing in the Watts and Strogatz Small World Networks Revisited.
Proceedings of the Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2010

Comprehending module dependencies and sharing.
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

Local Search in Histogram Construction.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

2009
Wiki credibility enhancement.
Proceedings of the 2009 International Symposium on Wikis, 2009

A Hierarchy of Tractable Subclasses for SAT and Counting SAT Problems.
Proceedings of the 11th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2009

An Usability Study of Continuous Biometrics Authentication.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

Fast and effective histogram construction.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Small World Networks as (Semi)-Structured Overlay Networks.
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008

Security Issues in Small World Network Routing.
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008

Extending BAN Logic for Reasoning with Modern PKI-Based Protocols.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

A Lightweight Binary Authentication System for Windows.
Proceedings of the Trust Management II, 2008

Efficient Algorithms for Functional Constraints.
Proceedings of the Logic Programming, 24th International Conference, 2008

An Elimination Algorithm for Functional Constraints.
Proceedings of the Principles and Practice of Constraint Programming, 2008

Engineering Stochastic Local Search for the Low Autocorrelation Binary Sequence Problem.
Proceedings of the Principles and Practice of Constraint Programming, 2008

Search Space Reduction for Constraint Optimization Problems.
Proceedings of the Principles and Practice of Constraint Programming, 2008

Maintaining Generalized Arc Consistency on Ad Hoc r-Ary Constraints.
Proceedings of the Principles and Practice of Constraint Programming, 2008

A Refutation Approach to Neighborhood Interchangeability in CSPs.
Proceedings of the AI 2008: Advances in Artificial Intelligence, 2008

2007
Approximate Satisfiability Counting.
Proceedings of the Ninth International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2007

Designing and Tuning SLS Through Animation and Graphics: An Extended Walk-Through.
Proceedings of the Engineering Stochastic Local Search Algorithms. Designing, 2007

Self Management for Large-Scale Distributed Systems: An Overview of the SELFMAN Project.
Proceedings of the Formal Methods for Components and Objects, 6th International Symposium, 2007

An Integrated White+Black Box Approach for Designing and Tuning Stochastic Local Search.
Proceedings of the Principles and Practice of Constraint Programming, 2007

Generalized Committed Choice.
Proceedings of the Coordination Models and Languages, 9th International Conference, 2007

Search Space Reduction and Russian Doll Search.
Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, 2007

2006
Set Intersection and Consistency in Constraint Networks.
J. Artif. Intell. Res., 2006

Applying Ad-hoc Global Constraints with the case Constraint to Still-Life.
Constraints An Int. J., 2006

Viz: a visual analysis suite for explaining local search behavior.
Proceedings of the 19th Annual ACM Symposium on User Interface Software and Technology, 2006

WinResMon: A Tool for Discovering Software Dependencies, Configuration, and Requirements in Microsoft Windows.
Proceedings of the 20th Conference on Systems Administration (LISA 2006), 2006

Robust Controllability of Temporal Constraint Networks under Uncertainty.
Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), 2006

Towards "Propagation = Logic + Control".
Proceedings of the Logic Programming, 22nd International Conference, 2006

Indexing for Dynamic Abstract Regions.
Proceedings of the 22nd International Conference on Data Engineering, 2006

Visualization for Analyzing Trajectory-Based Metaheuristic Search Algorithms.
Proceedings of the ECAI 2006, 17th European Conference on Artificial Intelligence, August 29, 2006

Maintaining Generalized Arc Consistency on Ad-Hoc n-Ary Boolean Constraints.
Proceedings of the ECAI 2006, 17th European Conference on Artificial Intelligence, August 29, 2006

Extracting Microstructure in Binary Constraint Networks.
Proceedings of the Recent Advances in Constraints, 2006

2005
An optimal coarse-grained arc consistency algorithm.
Artif. Intell., 2005

Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

Coordination of Many Agents.
Proceedings of the Logic Programming, 21st International Conference, 2005

Ad-hoc Global Constraints for Life.
Proceedings of the Principles and Practice of Constraint Programming, 2005

A User-level Framework for Auditing and Monitoring.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

Constrained Decision Diagrams.
Proceedings of the Proceedings, 2005

2004
Book review: Constraint Processing by Rina Dechter, Morgan Kaufmann Publishers, 2003, ISBN 1-55860-890-7.
Theory Pract. Log. Program., 2004

Solving Hierarchical Constraints over Finite Domains with Local Search.
Ann. Math. Artif. Intell., 2004

Symbolic Execution of Behavioral Requirements.
Proceedings of the Practical Aspects of Declarative Languages, 6th International Symposium, 2004

A Machine-Oriented Vulnerability Database for Automated Vulnerability Detection and Processing.
Proceedings of the 18th Conference on Systems Administration (LISA 2004), 2004

Scalable Distributed Depth-First Search with Greedy Work Stealing.
Proceedings of the 16th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2004), 2004

2003
Erratum: P. van Beek and R. Dechter's theorem on constraint looseness and local consistency.
J. ACM, 2003

Hardware Implementations of Real-Time Reconfigurable WSAT Variants.
Proceedings of the Field Programmable Logic and Application, 13th International Conference, 2003

2002
5th Asian Computing Science Conference - Preface.
Int. J. Found. Comput. Sci., 2002

Implementing CSAT Local Search on FPGAs.
Proceedings of the Field-Programmable Logic and Applications, 2002

Incrementally Solving Functional Constraints.
Proceedings of the Eighteenth National Conference on Artificial Intelligence and Fourteenth Conference on Innovative Applications of Artificial Intelligence, July 28, 2002

Consistency and Set Intersection.
Proceedings of the Eighteenth National Conference on Artificial Intelligence and Fourteenth Conference on Innovative Applications of Artificial Intelligence, July 28, 2002

2001
Parametric Sequence Alignment with Constraints.
Constraints An Int. J., 2001

Introduction to the Special Issue on Bioinformatics.
Constraints An Int. J., 2001

Automatic Information Extraction from Web Pages.
Proceedings of the SIGIR 2001: Proceedings of the 24th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2001

Reactive Web Agents with Open Constraint Programming.
Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems, 2001

Making AC-3 an Optimal Algorithm.
Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence, 2001

One Flip per Clock Cycle.
Proceedings of the Principles and Practice of Constraint Programming, 2001

2000
Concurrent Programming Made Easy.
Proceedings of the 6th International Conference on Engineering of Complex Computer Systems (ICECCS 2000), 2000

Arc Consistency on <i>n</i>-ary Monotonic and Linear Constraints.
Proceedings of the Principles and Practice of Constraint Programming, 2000

Instruction Scheduling with Timing Constraints on a Single RISC Processor with 0/1 Latencies.
Proceedings of the Principles and Practice of Constraint Programming, 2000

Solving Hierarchical Constraints over Finite Domains.
Proceedings of the International Symposium on Artificial Intelligence and Mathematics, 2000

A Fast Algorithm for Scheduling Instructions with Deadline Constraints on RISC Processors.
Proceedings of the 2000 International Conference on Parallel Architectures and Compilation Techniques (PACT'00), 2000

1999
Finding Fair Allocations for the Coalition Problem with Constraints.
Proceedings of the Logic Programming: The 1999 International Conference, Las Cruces, New Mexico, USA, November 29, 1999

Functional Elimination and 0/1/All Constraints.
Proceedings of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, 1999

1998
Optimizing Compilation of CLP(R).
ACM Trans. Program. Lang. Syst., 1998

Towards Early Projection in CLP(R).
Proceedings of the 1998 Joint International Conference and Symposium on Logic Programming, 1998

Open Constraint Programming.
Proceedings of the Principles and Practice of Constraint Programming, 1998

Early Projection in CLP(R).
Proceedings of the Principles and Practice of Constraint Programming, 1998

1997
Meta-Programming in CLP(R).
J. Log. Program., 1997

Constraint Programming 2000: A Position Paper.
Constraints An Int. J., 1997

Forward and Backward Chaining in Constraint Programming (Abstract).
Proceedings of the Logic Programming and Nonmonotonic Reasoning, 1997

1996
Constraint Programming 2000.
ACM Comput. Surv., 1996

Effectiveness of Optimizing Compilation for CLP(R).
Proceedings of the Logic Programming, 1996

1995
Workshop Report: Constraint languages/systems and their use in problem modelling.
Knowl. Eng. Rev., 1995

Linear Equation Solving for Constraint Logic Programming.
Proceedings of the Logic Programming, 1995

An Optimizing Compiler for CLP(R).
Proceedings of the Principles and Practice of Constraint Programming, 1995

1994
Beyond Finite Domains.
Proceedings of the Principles and Practice of Constraint Programming, 1994

1993
Projecting CLP (R) Constraints.
New Gener. Comput., 1993

Redundancy of Variables in CLP (R).
Proceedings of the Logic Programming, 1993

1992
The CLP(R) Language and System.
ACM Trans. Program. Lang. Syst., 1992

An Abstract Machine for CLP(R).
Proceedings of the ACM SIGPLAN'92 Conference on Programming Language Design and Implementation (PLDI), 1992

Output in CLP.
Proceedings of the International Conference on Fifth Generation Computer Systems. FGCS 1992, 1992

1991
A Methodology for Managing Hard Constraints in CLP Systems.
Proceedings of the ACM SIGPLAN'91 Conference on Programming Language Design and Implementation (PLDI), 1991

Restriction Site Mapping in CLP(R).
Proceedings of the Logic Programming, 1991

The CLP(R) language and system: an overview.
Proceedings of the Compcon Spring '91, San Francisco, 1991

1989
On Meta-Programming in CLR(R).
Proceedings of the Logic Programming, 1989

1987
Constraint Logic Programming and Option Trading.
IEEE Expert, 1987


  Loading...