Browsing by Author YAP HOCK CHUAN,ROLAND

Select a letter below to browse by last name or type
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Showing results 5 to 24 of 79 < previous   next >
Issue DateTitleAuthor(s)
2008A refutation approach to neighborhood interchangeability in CSPsLikitvivatanavong, C. ; Yap, R.H.C. 
2005A user-level framework for auditing and monitoringWu, Y. ; Yap, R.H.C. 
2005Ad-hoc global constraints for lifeCheng, K.C.K.; Yap, R.H.C. 
2008An elimination algorithm for functional constraintsZhang, Y.; Yap, R.H.C. ; Li, C.; Marisetti, S.
2007An integrated white+black box approach for designing and tuning stochastic local searchHalim, S. ; Yap, R.H.C. ; Lau, H.C.
2010An MDD-based generalized arc consistency algorithm for positive and negative table constraints and some global constraintsCheng, K.C.K.; Yap, R.H.C. 
2005An optimal coarse-grained arc consistency algorithmBessière, C.; Régin, J.-C.; Yap, R.H.C. ; Zhang, Y.
2009An usability study of continuous biometrics authenticationKwang, G.; Yap, R.H.C. ; Sim, T. ; Ramnath, R. 
2006Applying Ad-hoc global constraints with the case constraint to still-lifeCheng, K.C.K.; Yap, R.H.C. 
2007Approximate satisfiability countingAndrei, Ş.; Yap, R.H.C. ; Manolache, G.; Felea, V.
2001Automatic information extraction from web pagesRahardjo, B.; Yap, R.H.C. 
2012Codejail: Application-transparent isolation of libraries with tight program interactionsWu, Y.; Sathyanarayan, S.; Yap, R.H.C. ; Liang, Z. 
2010Comprehending module dependencies and sharingWu, Y. ; Yap, R.H.C. ; Ramnath, R. 
2000Concurrent programming made easyRamirez, Rafael ; Santosa, Andrew E. ; Yap, Roland H.C. 
2002Consistency and set intersectionZhang, Y. ; Yap, R.H.C. 
2005Constrained decision diagramsCheng, K.C.K.; Yap, R.H.C. 
1997Constraint Programming 2000: A Position PaperJaffar, J. ; Yap, R.H.C. 
2005Coordination of many agentsJaffar, J. ; Yap, R.H.C. ; Zhu, K.Q. 
2007Designing and tuning SLS through animation and graphics: An extended walk-throughHalim, S. ; Yap, R.H.C. 
2012Detecting and preventing ActiveX API-misuse vulnerabilities in internet explorerDai, T.; Sathyanarayan, S.; Yap, R.H.C. ; Liang, Z.