- 118. Yuexuan Wang, Yongcai Wang, Xiao Qi, Liwen Xu. OPAIMS:Open Architecture Precision Agriculture Information Monitoring System. 2009 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems (CASES 2009), pp. 233-239, Oct. 11-16, 2009, Grenoble, France.
- 117. Constantinos Daskalakis, Richard M. Karp, Elchanan Mossel, Samantha Riesenfeld, and Elad Verbin. Sorting and Selection in Posets. The 20th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2009), pp. 392-401, January 4-6, 2009, New York, New York.
- 116. Xiaohui Bei, Wei Chen, Shang-Hua Teng, Jialin Zhang, Jiajie Zhu. Bounded Budget Betweenness Centrality Game for Strategic Network Formations. The 17th Annual European Symposium on Algorithms (ESA 2009), pp. 227-238, September 7-9, 2009, Copenhagen, Denmark.
- 115. Jing Xiao, Tiancheng Lou, Tao Jiang. An Efficient Algorithm for Haplotype Inference on Pedigrees with a Small Number. The 17th Annual European Symposium on Algorithms (ESA 2009), pp.392-405, September 7-9, 2009, Copenhagen, Denmark.
- 114. Andrej Bogdanov ,Youming Qiao. On the Security of Goldreich's One-Way Function. The 13th International Workshop on Randomization and Computation (RANDOM 2009), pp. 392-405, August 21-23,2009, UC Berkeley, USA.
- 113. Victor Chen. A Hypergraph Dictatorship Test with Perfect Completeness. The 13th International Workshop on Randomization and Computation (RANDOM 2009), pp. 448-461, August 21-23, 2009, UC Berkeley, USA.
- 112. Abhinav Kumar, Satyanarayana V. Lokam, Vijay M. Patankar, Jayalal Sarma M. N. Using Elimination Theory to construct Rigid Matrices. The 29th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2009), pp. 299-310, December 15-17, 2009, IIT Kanpur, India.
- 111. Hongyi Yao, Elad Verbin. Network Coding is Highly Non-Approximable. The 47th Annual Allerton Conference (Allerton 2009), pp. 209-213, Sept.30-Oct. 2, 2009, Illinois, USA.
- 110. Jialin Zhang, Wei Chen. Implementing uniform reliable broadcast with binary consensus in systems with fa. Information Processing Letters, 110(1),pp.13-19, 2009.
- 109. Christophe Tartary. Ensuring Authentication of Digital Information using Cryptographic Accumulators. The 8th International Conference on Cryptology And Network Security (CANS 2009), pp. 315-333, December 12-14, 2009 Kanazawa, Ishikawa, Japan.
- 108. Chenguang Zhu, Weizhu Chen, Zeyuan Allen Zhu, Gang Wang, Dong Wang, Zheng Chen. A General Magnitude-Preserving Boosting Algorithm for Search Ranking. The 18th ACM Conference on Information and Knowledge Management (CIKM 2009), pp. 817-825, November 2-6, 2009, Hong Kong.
- 107. Ming Zhou, Long Jiang, and Jing He. Generating Chinese Couplets and Quatrain Using a Statistical Approach. The 23rd Pacific Asia Conference on Language, Information and Computation (PACLIC 2009), pp.43-52, Dec. 3-5, 2009, Hong Kong, China.
- 106. Jing He, Hongyu Liang. An approximation algorithm for word-replacement using a bi-gram language model. The 1st IEEE Youth Conference on Information, Computing and Telecommunications (YC-ICT’09), pp. 27-30, Sep. 20-21, 2009, Beijing, China.
- 105. Bin Ma and Hongyi Yao. Seed Optimization for i.i.d Similarities Is No Easier than Optimal Golomb Ruler. Information Processing Letters, Vol.109,Issue 19,pp.1120-1124,2009.
- 104. Yang Ye,Yu Liu, Chi Wang, Dapeng Lv, Jianhua Feng. Decomposition:Privacy Preservation for Multiple Sensitive Attributes. The 14th International Conference on Database Systems for Advanced Applications (DASFAA 2009), pp. 486-490, April 21-23, 2009, Brisbane, Australia.
- 103. Yuchen Zhang, Xiaoming Sun. The antimagicness of the Cartesian product of graphs. Theoretical Computer Science, Vol.410, pp.727-735, 2009.
- 102. Xi Chen, Li-Sha Huang, Shang-Hua Teng. Market equilibria with hybrid linear-Leontief utilities. Theoretical Computer Science, Vol.410, pp.1573-1580, 2009.
- 101. Jin-Yi Cai, Vinay Choudhary, Pinyan Lu. On the Theory of Matchgate Computations. Theory of Computing Systems, Vol.45, pp.108-132, 2009.