论文发表

97.

Shenghao Yang. Superposition Coding for Linear Operator Channels over Finite Fields. 2012 IEEE Information Theory Workshop, ITW 2012, p 502-506, 2012.  

96.

QiangSheng Hua, Haisheng Tan, Yuexuan Wang, Hongxing Li, Dongxiao Yu, Francis C.M. Lau, Chuan Wu. Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks. Proceedings of the 2012 International Symposium on Pervasive Systems, Algorithms, and Networks, I-SPAN 2012, p 9-16, 2012.  

95.

Zi Cai, Congjun Wu, and U. Schollwock. Confinement: A real-time visualization. PHYSICAL REVIEW B vol.85,7,075102,FEB 2 2012.  

94.

DongLing Deng, Chunfeng Wu, JingLing Chen, ShiJian Gu, Sixia Yu, and C. H. Oh. Bell nonlocality in conventional and topological quantum phase transitions. Physical Review A ,vol.86,3 ,032305,SEP 7 2012.  

93.

Yao, A.C.C. Quantum Computing: A Great Science in the Making. Theory and Applications of Models of Computation. Proceedings 9th Annual Conference, TAMC 2012.  

92.

Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary, and Huaxiong Wang. NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 7293, p 353-371, 2012.  

91.

Wei Li, Dequan Zheng, Tiejun Zhao, Mengda Yang. An effective approach to pedestrian detection in thermal imagery. Proceedings - International Conference on Natural Computation, p 325-329, 2012.  

90.

Liqun Liu, Dequan Zheng, Tiejun Zhao, Mengda Yang. Interpersonal trust relationship model in restricted domain of literary works. Proceedings, 2012 IEEE International Conference on Computer Science and Automation Engineering, v 3, p 132-136, 2012.  

89.

PengJun Wan, Dechang Chen, Guojun Dai, Zhu Wang and Frances Yao. Maximizing Capacity with Power Control under Physical Interference Model in Duplex Mode. Proceedings - IEEE INFOCOM, p 415-423, 2012.  

88.

Yu Yu, Xiangxue Li and Haifeng Qian. Two-Source Extractors for Leaky Sources. 2012 IEEE Information Theory Workshop, ITW 2012, p 452-456, 2012.  

87.

Sun Wujian, Dai Weiguo, Zhang Lei, Liu Yang. Delay-Optimal Channel Selection Method for Wireless Cognitive Networks. Proceedings of the 2012 2nd International Conference on Instrumentation and Measurement, Computer, Communication and Control, IMCCC 2012, p 1142-1146, 2012.  

86.

Sun Wujian, Dai Weiguo, Zhang Lei, Liu Yang, Li Ou. Efficiency-Accuracy Trade-off for Spectrum Sensing in Cognitive Network. Proceedings of the 2012 2nd International Conference on Instrumentation and Measurement, Computer, Communication and Control, IMCCC 2012, p 1136-1141, 2012.  

85.

Yihan Gao. A Probabilistic Approach to Time Delay Estimation. Proceedings - 2012 6th International Conference on New Trends in Information Science, Service Science and Data Mining (NISS, ICMIA and NASNIT), ISSDM 2012, p 617-620, 2012.  

84.

Haisheng Tan; Tiancheng Lou; Wang, A.Y.; Yongcai Wang; Lau, F.C.M.. Average Interference Minimization Under the Protocol Model in Wireless Sensor Networks. Journal of Interconnection Networks, v 13, n 1-2, March-June 2012.  

83.

DanWei Zhang, Li-Bin Fu, Z. D. Wang, and Shi-Liang Zhu. Josephson dynamics of a spin-orbit-coupled Bose-Einstein condensate in a double-well potential. Physical Review A - Atomic, Molecular, and Optical Physics, vol.85, n.4, April 11, 2012.  

82.

Guocai Liu, Ningning Hao, Shi-Liang Zhu, and W. M. Liu. Topological superfluid transition induced by a periodically driven optical lattice. Physical Review A - Atomic, Molecular, and Optical Physics, vol.86, n.1, July 25, 2012.  

81.

Hongwei Dub, Qiang Ye, Jiaofei Zhong, Yuexuan Wang, Wonjun Lee, Haesun Park. Polynomial-time approximation scheme for minimum connected dominating set under routing cost constraint in wireless sensor networks. Theoretical Computer Science, v 447, p 38-43, August 17, 2012.  

80.

Honglei Zhuang, Jie Tang, Wenbin Tang, Tiancheng Lou, Alvin Chin, Xia Wang. Actively learning to infer social ties. Special Issue: Selected Papers from ECML PKDD 2011,Data Mining and Knowledge Discovery, vol.25, n.2, pp.270-297, September 2012,.