Lan Liu, Xi Chen, Jing Xiao and Tao Jiang. Complexity and Approximation of the Minimum Recombination Haplotype Configuratio. Theoretical Computer Science, Vol. 378, Issue 3, pp. 316-330, 2007.
Jie Yin, Junwei Cao, Yuexuan Wang, Lianchen Liu, and Cheng Wu. Scheduling remote access to scientific instruments in cyberinfrastructure for ed. The 7th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), pp. 426-436, May 14-17, 2007, Rio de Janeiro, Brazil.
Jie Yin, Yuexuan Wang, Cheng Wu. An approach to build accessible grid service. The 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), pp. 423-428, July 30 - August 1, 2007, Qingdao, China.
Jie Yin, Yuexuan Wang, Cheng Wu. A fuzzy scheduling method in equipment grid. The 6th International Conference on Machine Learning and Cybernetics (ICMCL 2007), pp. 3099-3103, Aug. 19-22, 2007, Hong Kong.
Yongxi Cheng. Generating Combinations by Three Basic Operations. Journal of Computer Science and Technology,, Vol. 22(6), pp. 909-913, 2007.
Xi Chen and Shang-Hua Teng. Paths Beyond Local Search: A Tight Bound for Randomized Fixed-Point Computation. The 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), pp. 124-134, October 20-23, 2007, Providence, Rhode Island.
Yongxi Cheng and Ding-Zhu Du. Efficient Constructions of Disjunct Matrices with Applications to DNA Library Sc. Journal of Computational Biology, Vol. 14, No. 9, pp. 1208-1216, 2007.
C. Tartary, H. Wang and J. Pieprzyk. An hybrid approach for efficient multicast stream authentication over unsecured channels. The 1st International Conference on Provable Security (ProvSec 2007), pp. 17-34, November 1-2, 2007, Wollongong, Australia.
Christophe Tartary, Josef Pieprzyk and Huaxiong Wang. Verifiable Multi-Secret Sharing Schemes for Multiple Threshold Access Structures. The 3rd SKLOIS Conference on Information Security and Cryptology (INSCRYPT 2007),pp. 167-181, August 31 - September 5, 2007, Xining, Qinghai province, China.
Jing Zhang, Xi Chen, Ming Li. Computing exact p-value for structured motif. The 18th Annual Symposium on Combinatorial Pattern Matching (CPM 2007), pp. 162-172, July 9-11, 2007, London, Ontario, Canada.
Rui Wang, Francis C.M. Lau and Yingchao Zhao. Hamiltonicity of regular graphs and blocks of consecutive ones in symmetric matr. Discrete Applied Mathematics, Vol. 155, pp. 2312-2320, 2007.
Xiaoming Sun. Block Sensitivity of Weakly Symmetric Functions. Theoretical Computer Science, Vol. 384, pp. 87-91, 2007.
Wei Chen, Jialin Zhang, Yu Chen. Failure Detectors and Extended Paxos for k-Set Agreement. The 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC’07), pp. 69-76, December 17-19, 2007, Melbourne, Victoria, Australia.
Ke Xu, Yuexuan Wang, Cheng Wu. Formal verification technique for grid service chain model and its application. Science in China Series F: Information Sciences, vol.50, no.1, pp. 1-20, 2007.