default search action
Jing Kong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Nannan Xie, Chuanxue Zhang, Qizhao Yuan, Jing Kong, Xiaoqiang Di:
IoV-BCFL: An intrusion detection method for IoV based on blockchain and federated learning. Ad Hoc Networks 163: 103590 (2024) - [j21]Jing Kong, Zhouwang Yang:
Recurrent event query decoder for document-level event extraction. Eng. Appl. Artif. Intell. 133: 108533 (2024) - [j20]Jing Kong, Zhouwang Yang:
Event representation via contrastive learning with prototype based hard negative sampling. Neurocomputing 600: 128047 (2024) - 2023
- [j19]Min Liu, Lue Chen, Nianchuan Jian, Peng Guo, Jing Kong, Mei Wang, Qianqian Han, Jinsong Ping, Mengjie Wu:
Preliminary Estimations of Mars Atmospheric and Ionospheric Profiles from Tianwen-1 Radio Occultation One-Way, Two-Way, and Three-Way Observations. Remote. Sens. 15(23): 5506 (2023) - [j18]Xiaoyang Zuo, Zhengyi Yang, Jing Kong, Zejun Han, Jianxin Zhang, Xiangwei Meng, Shuyan Hao, Lili Wu, Simeng Wu, Jiurong Liu, Zhou Wang, Fenglong Wang:
Imbedding Pd Nanoparticles into Porous In2O3 Structure for Enhanced Low-Concentration Methane Sensing. Sensors 23(3): 1163 (2023) - 2022
- [c15]Joseph Kelly, Jing Kong, Georg M. Goerg:
Predictive State Propensity Subclassification (PSPS): A causal inference algorithm for data-driven propensity score stratification. CLeaR 2022: 352-372 - 2021
- [j17]Jia Wang, Yu Zhang, Kaichang Di, Ming Chen, Jianfeng Duan, Jing Kong, Jianfeng Xie, Zhaoqin Liu, Wenhui Wan, Zhifei Rong, Bin Liu, Man Peng, Yexin Wang:
Localization of the Chang'e-5 Lander Using Radio-Tracking and Image-Based Methods. Remote. Sens. 13(4): 590 (2021) - 2020
- [j16]Dan Li, Jianqian Chao, Jing Kong, Gui Cao, Mengru Lv, Man Zhang:
The efficiency analysis and spatial implications of health information technology: A regional exploratory study in China. Health Informatics J. 26(3): 1700-1713 (2020)
2010 – 2019
- 2019
- [j15]Jing Kong, Xi Chen:
Dynamic optimization of batch free radical polymerization with conditional modeling formulation through the adaptive smoothing strategy. Comput. Chem. Eng. 120: 15-29 (2019) - [j14]Yifeng Wang, Yuanbo Guo, Tao Li, Jing Kong:
小样本下未知内部威胁检测的方法研究 (Method for Unknown Insider Threat Detection with Small Samples). 计算机科学 46(11A): 496-501 (2019) - 2013
- [j13]Xianghua Ying, Kun Peng, Yongbo Hou, Sheng Guan, Jing Kong, Hongbin Zha:
Self-Calibration of Catadioptric Camera with Two Planar Mirrors from Silhouettes. IEEE Trans. Pattern Anal. Mach. Intell. 35(5): 1206-1220 (2013) - [j12]Allen Hsu, Han Wang, Yong Cheol Shin, Benjamin Mailly, Xu Zhang, Lili Yu, Yumeng Shi, Yi Hsien Lee, Madan Dubey, Ki Kang Kim, Jing Kong, Tomás Palacios:
Large-Area 2-D Electronics: Materials, Technology, and Devices. Proc. IEEE 101(7): 1638-1652 (2013) - [c14]Songtao Pu, Jing Kong, Xianghua Ying, Hongbin Zha:
Automatic Object Cosegmentation in Sparse Multiview Images. ACPR 2013: 902-906 - [c13]Xianghua Ying, Lulu Hou, Yongbo Hou, Jing Kong, Hongbin Zha:
Canonicalized central absolute moment for edge-based color constancy. ICIP 2013: 2260-2263 - 2012
- [c12]Jing Kong, Xianghua Ying, Songtao Pu, Yongbo Hou, Sheng Guan, Ganwen Wang, Hongbin Zha:
Camera Calibration Using Vertical Lines. ACCV Workshops (1) 2012: 218-229 - [c11]Xianghua Ying, Li Yang, Jing Kong, Yongbo Hou, Sheng Guan, Hongbin Zha:
Direct least square fitting of ellipsoids. ICPR 2012: 3228-3231 - 2011
- [c10]Li Yang, Xianghua Ying, Lulu Hou, Jing Kong, Hongbin Zha:
Camera Resectioning from Image Edges with the L∞-Norm Using Linear Programming. BMVC 2011: 1-11
2000 – 2009
- 2009
- [j11]Jing Kong, Yaokun Wu:
On economical set representations of graphs. Discret. Math. Theor. Comput. Sci. 11(2): 71-96 (2009) - [j10]Taeg Sang Cho, Kyeong-Jae Lee, Jing Kong, Anantha P. Chandrakasan:
A 32-µW 1.83-kS/s Carbon Nanotube Chemical Sensor System. IEEE J. Solid State Circuits 44(2): 659-669 (2009) - 2008
- [c9]Taeg Sang Cho, Kyeong-Jae Lee, Jing Kong, Anantha P. Chandrakasan:
The design of a low power carbon nanotube chemical sensor system. DAC 2008: 84-89 - 2007
- [j9]Jing Kong, Yaokun Wu:
Recognizing edge clique graphs among interval graphs and probe interval graphs. Appl. Math. Lett. 20(9): 1000-1004 (2007) - [j8]Jing Kong:
Computation with carbon nanotube devices. Commun. ACM 50(9): 40-42 (2007) - [j7]Jing Kong:
Ontology Learning for Chinese Information Organization and Knowledge Discovery in Ethnology and Anthropology. Data Sci. J. 6: 500-510 (2007) - [j6]Jing Kong, Xiangshi Ren, Keizo Shinomori:
Investigating the Influence of Colors on the Performance of Pointing Tasks for Human Interface Design. IEICE Trans. Inf. Syst. 90-D(2): 500-508 (2007) - [j5]Jing Kong, Xiangshi Ren:
The Optimal Calculation Method to Determine the Effective Target Width for the Application of Fitts' Law. IEICE Trans. Inf. Syst. 90-D(4): 753-758 (2007) - [c8]Marek Freindorf, Matthew D. Jones, Yihan Shao, Jing Kong, Thomas R. Furlani:
Large-Scale QM/MM Calculations of Electronic Excitations in Yellow Protein: Toward Petascale Level of Protein Calculations. BIBE 2007: 614-619 - [c7]Taeg Sang Cho, Kyeong-Jae Lee, Jing Kong, Anantha P. Chandrakasan:
A Low Power Carbon Nanotube Chemical Sensor System. CICC 2007: 181-184 - [c6]Jun Huang, Yuebin Bai, Zhiyuan Zhang, Jing Kong, Depei Qian:
Service Forest: Enabling Dynamic Service Composition in Mobile Ad Hoc Networks. IPC 2007: 174-177 - 2006
- [j4]Jing Kong, Xiangshi Ren:
Calculation of Effective Target Width and Its Effects on Pointing Tasks. Inf. Media Technol. 1(2): 1057-1059 (2006) - [c5]Marek Freindorf, Yihan Shao, Jing Kong, Thomas R. Furlani:
Combined QM/MM Studies of Binding Effect of Cytochrome P450cam to Putidaredoxin. BIOCOMP 2006: 391-398 - 2005
- [j3]Marek Freindorf, Yihan Shao, Thomas R. Furlani, Jing Kong:
Lennard-Jones parameters for the combined QM/MM method using the B3LYP/6-31G*/AMBER potential. J. Comput. Chem. 26(12): 1270-1278 (2005) - [c4]Jing Kong, Xiangshi Ren:
Comparison of Effiective Target Width Calculation Methods for Pointing Task. CIT 2005: 530-534 - 2004
- [j2]Shumin Zhai, Jing Kong, Xiangshi Ren:
Speed-accuracy tradeoff in Fitts' law tasks-on the equivalency of actual and nominal pointing precision. Int. J. Hum. Comput. Stud. 61(6): 823-856 (2004) - [c3]Xiangshi Ren, Jing Kong, Xing-Qi Jiang, Zhen Liu, Dongfeng Cai:
A New Model for Different Speed and Accuracy Requirements in Pointing Tasks. CIT 2004: 86-93 - [c2]Xiangshi Ren, Jing Kong, Taishi Kato:
A Study of the Size of Pen-Input Character Boxes for PDAs. CIT 2004: 115-122 - 2003
- [c1]Xiangshi Ren, Kinya Tamura, Jing Kong, Shumin Zhai:
Candidate Display Styles in Japanese Input. INTERACT 2003 - 2000
- [j1]Jing Kong, Christopher A. White, Anna I. Krylov, David Sherrill, Ross D. Adamson, Thomas R. Furlani, Michael S. Lee, Aaron M. Lee, Steven R. Gwaltney, Terry R. Adams, Christian Ochsenfeld, Andrew T. B. Gilbert, Gary S. Kedziora, Vitaly A. Rassolov, David R. Maurice, Nikhil Nair, Yihan Shao, Nicholas A. Besley, Paul E. Maslen, Jeremy P. Dombroski, Holger Daschel, Weimin Zhang, Prakashan P. Korambath, Jon Baker, Edward F. C. Byrd, Troy A. Van Voorhis, Manabu Oumi, So Hirata, Chao-Ping Hsu, Naoto Ishikawa, Jan Florián, Arieh Warshel, Benny G. Johnson, Peter M. W. Gill, Martin Head-Gordon, John A. Pople:
Q-Chem 2.0: a high-performance ab initio electronic structure program package. J. Comput. Chem. 21(16): 1532-1548 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint