Publications

204.

Siyu Yue, Jiong Chen, Yuantao Gu, Chenye Wu, Yiyu Shi. Dual-pricing Policy for Controller-side Strategies in Demand Side Management. 2011 IEEE Second International Conference on Smart Grid Communications (IEEE SmartGridComm 2011), pp. 357-362, October 17- 20, 2011, Brussels, Belgium.  

203.

Chenye Wu, Hamed Mohsenian-Rad, Jianwei Huang. Communication Requirements to Provide Ancillary Services in Vehicle-to-Grid Powe. Chapter of “Smart Grid Communications and Networking”, Cambridge University Press, 2011.  

202.

L.-M. Duan. Quantum correlation between distant diamonds. Science, Vol. 334, 1213-1214, 2011-12-2.  

201.

Eric Chitambar, Carl A. Miller, Yaoyun Shi. Deciding Unitary Equivalence Between Matrix Polynomials and Sets of Bipartite Qu. Quantum Information and Computation, Vol. 11, No. 9&10, pp. 813-819, 2011.  

200.

Yaoyun Shi, Xiaodi Wu. Epsilon-net method for optimizations over separable states. The 15th workshop on Quantum Information Processing (QIP 2012), December 12-16, 2011, Montreal, Quebec, Canada.  

199.

Shengyu Zhang. On the Power of Lower Bound Methods for One-Way Quantum Communication Complexity. The 38th International Colloquium on Automata, Languages and Programming (ICALP 2011), pp. 49-60, July 4-8, 2011, Zürich, Switzerland.  

198.

Yang-hao Chan, Yong-jian Han, Luming Duan. Tensor network simulation of phase diagram of frustrated J1-J2 Heisenberg model. Physical Review B, Vol.84, 224407, 2011.  

197.

Qiang-Sheng Hua, Yuexuan Wang, Dongxiao Yu, Haisheng Tan. Minimum Latency Links Scheduling for Arbitrary Directed Acyclic Networks under P. Journal of Interconnection Networks, Vol. 12, Nos. 1&2, pp. 85-107, 2011.  

196.

Christophe Tartary, Huaxiong Wang, San Ling. Authentication of Digital Streams. IEEE Transactions on Information Theory, Vol. 57, No. 9, pp. 6285-6306 , September 2011.  

195.

Yun Zhang, Christophe Tartary, Huaxiong Wang. An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theor. The 16th Australasian Conference on Information Security and Privacy (ACISP 2011), pp. 259-275, July 11-13, 2011, Melbourne, Australia.  

194.

Christophe Tartary, Huaxiong Wang, Yun Zhang. An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme. International Journal of Foundations of Computer Science, Vol. 22, No. 6, pp. 1395-1416, September 2011.  

193.

Xiaohui Bei, Wei Chen, Shang-Hua Teng, Jialin Zhang, Jiajie Zhu. Bounded Budget Betweenness Centrality Game for Strategic Network Formations. Theoretical Computer Science, 412(52): 7147-7168, 2011.  

192.

Jing He, Hongyu Liang, Guang Yang. Reversing Longest Previous Factor Tables is Hard. The 12th International Symposium on Algorithms and Data Structures (WADS 2011), pp. 488-499, 15-17 August 2011, Brooklyn, NY, USA.  

191.

Joshua Brody and David Woodruff. Streaming Algorithms with One-Sided Estimation. The 15th International Workshop on Randomization and Computation (Random 2011), pp. 436-447, Aug. 17-19, 2011, Princeton University, USA.  

190.

Tengyu Ma, Xiaoming Sun, Huacheng Yu. A New Variation of Hat Guessing Games. The 17th Annual International Computing and Combinatorics Conference (COCOON 2011), pp. 616-626, August 14-16, 2011, Dallas, Texas, USA.  

189.

Pavel Hrubes, Iddo Tzameret. Short proofs for the determinant identities. Electronic Colloquium in Computational Complexity (ECCC), TR11-174, December 30, 2011.  

188.

Jing He, Hongyu Liang, Hao Yuan. Controlling Infection by Blocking Nodes and Links Simultaneously. The 7th Workshop on Internet & Network Economics (WINE 2011), pp. 206-217, December 11-14, 2011, Singapore.  

187.

Zi Cai, Lu-Ming Duan, Congjun Wu. Phase-Sensitive Detection for Unconventional Bose-Einstein Condensations. Phys. Rev. A 86, 051601(R).