Publications

Publications 2014

Time:2014-06-25  Source:KLMM

1.      Rongquan Feng, Zhenhua Gu, Zilong Wang, Hongfeng Wu, Kai Zhou .On the Construction of Finite Oscillator Dictionary.Communications in Algebra, vol.42 Iss. 8, 2014: 3427-3437.

2.      Zhenhua Gu, Zhe-XianWan, Kai Zhou. Subconstituents of unitary graphs over finite fields. Linear and Multilinear Algebra, vol. 62, Iss 7, 2014: 925-937.

3.      Baofeng Wu, Zhuojun Liu, Qingfang Jin, Xiaoming Zhang. A Note on Two Classes of Boolean Functions with Optimal Algebraic Immunity. Journal of Systems Science and Complexity 27:785-794,2014.

4.      Fusheng Leng, Banghe Li. Small slopes of Newton polygon of L-function. Journal of Number Theory.

5.      Zhenya Yan. Localized analytical solutions and parameters analysis in the nonlinear dispersive Gross-Pitaevskii mean-field GP(m, n) model with space-modulated nonlinearity and potential. Stud. Appl. Math. Volume 132, Issue 3, pages 266–284, April 2014.

6.      Shaoshi Chen, Michael F. Singer. On the Summability of Bivariate Rational Functions. Journal of Algebra, 409(2):320–343, 2014.

7.      Shaoshi Chen , Frederic Chyzak, Ruyong Feng, Guofeng Fu, Ziming Li. On the Existence of Telescopers for Mixed Hypergoemetric Terms. Accepted by Journal of Symbolic Computation.

8.      A.Wang, Z. Zhang. Repair locality with multiple erasure tolerance. accepted by IEEE Transactions on Information Theory, 2014.

9.      J. Guo, D.-M. Yan, X. Jia, and X. Zhang. Efficient Maximal Poisson Disk Sampling and Remeshing on Surfaces. Accepted by Computers & Graphics, special issue of Shape Modeling International (SMI) Conference, 2014.

10.    X. Jia. Role of moving planes and moving spheres of Cyclides. Computer Aided Geometric Design, 57(3), 31, 168–181, 2014.

11.    R. Goldman, S. Mann and X. Jia. Computing perspective projections in 3-dimensions using rotors in the homogeneous and conformal models of Clifford algebra. Advances in Applied Clifford Algebras, 24, 465–491, 2014.

12.    Yang Han. Recollements and Hochschild theory. J. Algebra 397 (2014), 535-547.

13.    Yang Han. A bimodule approach to the strong no loop conjecture. Accepted by J. Pure Appl. Algebra.

14.    Yupeng Jiang, Yingpu Deng. Exact covering systems in number fields. The Quarterly Journal of Mathematics, Vol.65 No.1 pp. 211-223 (2014).

15.    Yupeng Jiang, Yingpu Deng. Strong pseudoprimes to the first eight prime bases. Mathematics of Computation, Vol. 83 No. 290 pp. 2915-2924 (2014).

16.    J.S. Cheng and X.S. Gao. Multiplicity-preserving triangular set decomposition of two polynomials. J Syst Sci Complex, 27(6), 2014.

17.   J.S. Cheng, Kai Jin. A Generic Position Based Method for Real Root Isolation of Zero-Dimensional Polynomial Systems. Journal of Symbolic Computation, accepted.

18.    Shaoshi Chen, Ruyong Feng, Ziming Li, Michael F. Singer. Parallel Telescoping and Parameterized Picard-Vessiot Theory. Proceedings of ISSAC'14, pp. 99–106, ACM Press, 2014.

19.    Shaoshi Chen, Manuel Kauers, Christoph Koutschan. A Generalized Apagodu-Zeilberger Algorithm. Proceedings of ISSAC'14, pp. 107–114, ACM Press, 2014.

20.    Hongbo Li, Changpeng Shao, Lei Huang and Yue Liu. Reduction among Bracket Polynomials. Proceedings of ISSAC'14, ACM Press, 2014.

21.    D.-M. Yan, J. Guo, X. Jia, X. Zhang and P. Wonka. Blue-noise remeshing with farthest point optimization. Eurographics Symposium on Geometry Processing, 33(5), 167–176, 2014.

22.    A.Wang, Z. Zhang. Repair locality from a combinatorial perspective. Proc. IEEE Int. Symp. Inf. Theory (ISIT), Hawaii, 2014, pp.1972–1976.

23.    Gengran Hu, Yanbin Pan, Feng Zhang. Solving Random Subset Sum Problem by l p -norm SVP Oracle. In Proc. of PKC 2014-17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Springer, LNCS 8383, 2014, pp 399-410.

24.    Feng xiutao, Zhang Fan. Cryptanalysis on the authenticated cipher Sablier. NSS 2014, LNCS 8792, pp.198-208, 2014.

25.    Yanbin Pan, Yingpu Deng. A new attack against the Selvi-Vivek-Rangan deterministic identity based signature scheme from ACISP 2012. In: W. Susilo and Y. Mu (Eds.): ACISP 2014, LNCS 8544, pp. 148–161(2014).

相关附件
相关文档