Search

Your search keyword '"Yap, Roland"' showing total 414 results

Search Constraints

Start Over You searched for: Author "Yap, Roland" Remove constraint Author: "Yap, Roland"
414 results on '"Yap, Roland"'

Search Results

1. Fuzzing the PHP Interpreter via Dataflow Fusion

2. Fully Randomized Pointers

3. Fast Converging Anytime Model Counting

4. Applying Deep Reinforcement Learning to the HP Model for Protein Structure Prediction

5. CCDD: A Tractable Representation for Model Counting and Uniform Sampling

8. Benchmarking Symbolic Execution Using Constraint Problems -- Initial Results

9. Extensible Virtual Call Integrity

11. Learning Robust Search Strategies Using a Bandit-Based Approach

12. Correlation Heuristics for Constraint Programming

13. Shape Neutral Analysis of Graph-based Data-structures

14. An Extended Low Fat Allocator API and Applications

15. EffectiveSan: Type and Memory Error Detection using Dynamically Typed C/C++

16. An Efficient Heuristic for Passenger Bus VRP with Preferences and Tradeoffs

17. Towards Certifying Trustworthy Machine Learning Systems

19. Arc Consistency Revisited

22. Stochastic Database Cracking: Towards Robust Adaptive Indexing in Main-Memory Column-Stores

23. Solving Functional Constraints by Variable Substitution

24. Towards 'Propagation = Logic + Control'

26. The Problem of Categorizing Conferences in Computer Science

27. Detecting Malware Through Anti-analysis Signals - A Preliminary Study

30. Simple and Practical Integrity Models for Binaries and Files

31. Web-to-Application Injection Attacks on Android: Characterization and Detection

34. A Comparison of SAT Encodings for Acyclicity of Directed Graphs

35. Improving Conflict Analysis in MIP Solvers by Pseudo-Boolean Reasoning

36. Higher-Order Consistencies through GAC on Factor Variables

38. Optimizing STR Algorithms with Tuple Compression

39. Experiments with Malware Visualization

40. Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer

41. Space-Time Tradeoffs for the Regular Constraint

42. Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions

45. Enhancing Host Security Using External Environment Sensors

46. An Usability Study of Continuous Biometrics Authentication

48. Self Management for Large-Scale Distributed Systems: An Overview of the SELFMAN Project

49. Efficient Algorithms for Functional Constraints

Catalog

Books, media, physical & digital resources