Jin-Yi Cai, Vinay Choudhary and Pinyan Lu. On the Theory of Matchgate Computations. The 22nd Annual IEEE Conference on Computational Complexity (CCC 2007), pp. 305-318, June 13-16, 2007, San Diego, California, USA.
Yingchao Zhao and Shang-Hua Teng. Combinatorial and Spectral Aspects of Nearest Neighbor Graphs in Doubling Dimens. The 4th International Conference on Theory and Applications of Models of Computation (TAMC 2007), pp. 554-565, May 22-25, 2007, Shanghai, China.
Jin-Yi Cai and Pinyan Lu. Holographic Algorithms: The Power of Dimensionality Resolved. The 34th International Colloquium on Automata, Languages and Programming (ICALP 2007), pp. 631-642, July 9-13, 2007, Wroclaw, Poland.
Jin-Yi Cai and Pinyan Lu. On Block-wise Symmetric Signatures for Matchgates. The 16th International Symposium on Fundamentals of Computation Theory (FCT 2007), pp. 187-198, August 27-30, 2007, Budapest, Hungary.
Yongxi Cheng, Xi Chen, and Yiqun L. Yin. On Searching a Table Consistent with Division Poset. Theoretical Computer Science, Vol. 370, pp. 240-253, 2007.
Yongxi Cheng. Lattice grids and Prisms are Antimagic. Theoretical Computer Science,, Vol. 374, pp. 66-73, 2007.
Wei Chen, Jialin Zhang, Yu Chen, Xuezheng Liu. Weakening Failure Detectors for k-Set Agreement via the Partition Approach. The 21st International Symposium on Distributed Computing (DISC 2007), pp. 123-138, September 24-26, 2007, Lemesos, Cyprus.
Myung-Ah Park, Chen Wang, James Willson, My Thai, Weili Wu, Andras Farago. A dominating and absorbent set in a wireless ad-hoc network with different trans. The 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2007), pp. 22-31, September 9-14, 2007, Montreal, QC, Canada.
Chen Wang, My Thai, Yingshu Li, Feng Wang, Weili Wu. Minimum Coverage Breach and Maximum Network Lifetime in Wireless Sensor Networks. IEEE Globecom -ieee Global Telecommunications Conference (IEEE GLOBECOM 2007), pp. 1118-1123, November 26-30, 2007, Washington, DC, USA.
Lan Liu, Xi Chen, Jing Xiao and Tao Jiang. Complexity and Approximation of the Minimum Recombination Haplotype Configuratio. Theoretical Computer Science, Vol. 378, Issue 3, pp. 316-330, 2007.
Jie Yin, Junwei Cao, Yuexuan Wang, Lianchen Liu, and Cheng Wu. Scheduling remote access to scientific instruments in cyberinfrastructure for ed. The 7th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), pp. 426-436, May 14-17, 2007, Rio de Janeiro, Brazil.
Jie Yin, Yuexuan Wang, Cheng Wu. An approach to build accessible grid service. The 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), pp. 423-428, July 30 - August 1, 2007, Qingdao, China.
Jie Yin, Yuexuan Wang, Cheng Wu. A fuzzy scheduling method in equipment grid. The 6th International Conference on Machine Learning and Cybernetics (ICMCL 2007), pp. 3099-3103, Aug. 19-22, 2007, Hong Kong.
Yongxi Cheng. Generating Combinations by Three Basic Operations. Journal of Computer Science and Technology,, Vol. 22(6), pp. 909-913, 2007.
Xi Chen and Shang-Hua Teng. Paths Beyond Local Search: A Tight Bound for Randomized Fixed-Point Computation. The 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), pp. 124-134, October 20-23, 2007, Providence, Rhode Island.
Yongxi Cheng and Ding-Zhu Du. Efficient Constructions of Disjunct Matrices with Applications to DNA Library Sc. Journal of Computational Biology, Vol. 14, No. 9, pp. 1208-1216, 2007.
C. Tartary, H. Wang and J. Pieprzyk. An hybrid approach for efficient multicast stream authentication over unsecured channels. The 1st International Conference on Provable Security (ProvSec 2007), pp. 17-34, November 1-2, 2007, Wollongong, Australia.
Christophe Tartary, Josef Pieprzyk and Huaxiong Wang. Verifiable Multi-Secret Sharing Schemes for Multiple Threshold Access Structures. The 3rd SKLOIS Conference on Information Security and Cryptology (INSCRYPT 2007),pp. 167-181, August 31 - September 5, 2007, Xining, Qinghai province, China.