论文发表

38.

Victor Chen, Elena Grigorescu and Ronald De Wolf. Efficient and Error-Correcting Data Structures for Membership and Polynomial Eva. The 27th International Symposium on Theoretical Aspects of Computer Science (STACS 2010), pp. 203-214, March 4-6, 2010, Nancy, France.  

37.

Maurice Jansen. Weakening Assumptions for Deterministic Subexponential Time Non-Singular Matrix. The 27th International Symposium on Theoretical Aspects of Computer Science (STACS 2010), pp. 465-476, March 4-6, 2010, Nancy, France.  

36.

Hongyi Yao, Raymond W.Yeung. Zero-Error Multichannel Source Coding. 2010 IEEE Information Theory Workshop on Information Theory (ITW 2010, Cairo), January 6-8, Cairo, Egypt.  

35.

Qiang Sheng Hua, Yuexuan Wang,Dongxiao Yu; Francis C.M. Lau. Dynamic Programming Based Algorithms for Set Multicover and Multiset Multicover. Theoretical Computer Science, Vol. 411,Issues 26-28, pp. 2467-2474,2010.  

34.

Matei David, Periklis A. Papakonstantinou. Trade-off Lower Bounds for Stack Machines. The 25th IEEE Conference on Computational Complexity (CCC 2010), pp.163-171, June 9-11, 2010, Cambridge, Massachusetts, USA.  

33.

John Steinberger. Stam's collision resistance conjecture. The 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2010), pp. 597-615, May 30-June 3, 2010, French Riviera.  

32.

Jooyoung Lee, John Steinberger. Multi-property-preserving domain extension using polynomial-based modes of opera. The 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2010), pp.573-596, May 30-June 3, 2010, French Riviera.  

31.

Andrew C. Yao, Moti Yung, and Yunlei Zhao. Concurrent Knowledge Extraction in the Public-Key Model. The 37th International Colloquium on Automata, Languages and Programming (ICALP 2010), pp.702-714, July 5-10, 2010, Bordeaux, France.  

30.

Andrew C. Yao and Yunlei Zhao. Deniable Internet Key Exchange. The 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), pp.329-348, June 22-25, 2010, Beijing, China.  

29.

Zhiqiang Zhang, Yaoyun Shi. On the parity complexity measures of Boolean functions. Theoretical Computer Science, Vol. 411,Issues 26-28,pp.2612-2618,2010.  

28.

Anke van Zuylen. Multiplying Pessimistic Estimators: Deterministic Approximation of Max TSP and M. The 16th Annual International Computing and Combinatorics Conference (COCOON 2010), pp. 60-69, July 19-21, 2010, Nha Trang, Vietnam.  

27.

Maurice Jansen and Jayalal Sarma M.N.. Balancing Bounded Treewidth Circuits. The 5th International Computer Science Symposium in Russia (CSR 2010), pp. 228-239, June 16-20, 2010, Kazan, Russia.  

26.

Frans Schalekamp, Michael Yu and Anke van Zuylen. Clustering with or without the Approximation. The 16th Annual International Computing and Combinatorics Conference (COCOON 2010), pp. 70-79, July 19-21, 2010, Nha Trang, Vietnam.  

25.

Elad Verbin, Qin Zhang. The Limits of Buffering: A Tight Lower Bound for Dynamic Membership in the Exter. The 42th ACM Symposium on Theory of Computing (STOC 2010), pp.447-456, June 5-8,2010, Cambridge, Massachusetts, USA.  

24.

Henry Lin. A STRUCTURED WIKIPEDIA FOR MATHEMATICS. The 5th International Conference on Software and Data Technologies (ICSOFT 2010), pp. 279-284, July 22-24, 2010, Athens, Greece.  

23.

Changcun Ma, Donghyun Kim, Yuexuan Wang, Wei Wang, Nassim Sohaee and Weili Wu. Hardness of k-Vertex Connected Subgraph Augmentation Problem. Journal of Combinatorial Optimization (JOCO), Volume 20, Number 3, pp. 249-258, 2010.  

22.

Jun Guo, YuexuanWang, Suogang Gao, Jiangchen Yu, WeiliWu. Constructing error-correcting pooling designs with symplectic space. Journal of Combinatorial Optimization (JOCO), Volume 20, Number 4, pp. 413-421, 2010.  

21.

Hongyi Yao and Sidharth Jaggi and Minghua Chen. Network Coding Tomography for Network Failures. The 29th IEEE Conference on Computer Communications (IEEE INFOCOM 2010), March 14-19,2010, San Diego, CA, USA.