Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Li
    Last name: Gong
    DBLP: 46/6786
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 94 of 94  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Song Gao 0001, Krzysztof Janowicz, Daniel R. Montello, Yingjie Hu, Jiue-An Yang, Grant McKenzie, Yiting Ju, Li Gong, Benjamin Adams, Bo Yan.
    A data-synthesis-driven method for detecting and extracting vague cognitive regions.
    International Journal of Geographical Information Science 2017, Volume 31 (0) 2017
    Conference paper
    Fanqi Zeng, Li Gong, Jing Liu, Jiang Zhang, Qinghua Chen, Ruyue Xin.
    Interactive Levy Flight in Interest Space.
    CoRR 2017, Volume 0 (0) 2017
    Conference paper
    Ziqian Xu, Wen Zeng, Jiayu Sun, Wei Chen 0032, Ruzhi Zhang, Zunyuan Yang, Zunwei Yao, Lei Wang 0058, Li Song, Yushu Chen, Yu Zhang 0017, Chunhua Wang, Li Gong, Bing Wu, Tinghua Wang, Jie Zheng, Fabao Gao.
    The quantification of blood-brain barrier disruption using dynamic contrast-enhanced magnetic resonance imaging in aging rhesus monkeys with spontaneous type 2 diabetes mellitus.
    NeuroImage 2017, Volume 158 (0) 2017
    Journal article
    Xi Liu, Chaogui Kang, Li Gong, Yu Liu.
    Incorporating spatial interaction patterns in classifying and understanding urban land use.
    International Journal of Geographical Information Science 2016, Volume 30 (0) 2016
    Conference paper
    Marianna Apidianaki, Li Gong.
    LIMSI: Translations as Source of Indirect Supervision for Multilingual All-Words Sense Disambiguation and Entity Linking.
    Proceedings of the 9th International Workshop on Semantic Evaluation, SemEval@NAACL-HLT 2015, Denver, Colorado, USA, June 4-5, 2015 2015 (0) 2015
    Conference paper
    Grant McKenzie, Krzysztof Janowicz, Song Gao 0001, Li Gong.
    How where is when? On the regional variability and resolution of geosocial temporal signatures for points of interest.
    Computers, Environment and Urban Systems 2015, Volume 54 (0) 2015
    Conference paper
    Jin Tian, Fei Gao, Xiankun Sun, Li Gong.
    An Efficient Column-Major Ordering Format for Finite Element Analysis.
    Seventh International Joint Conference on Computational Sciences and Optimization, CSO 2014, Beijing, China, July 4-6, 2014 2014 (0) 2014
    Conference paper
    Jin Tian, Fei Wu, Guohui Zeng, Li Gong.
    A Modified Storage Format for Accelerating SPMV.
    Seventh International Joint Conference on Computational Sciences and Optimization, CSO 2014, Beijing, China, July 4-6, 2014 2014 (0) 2014
    Conference paper
    Nicolas Pécheux, Li Gong, Quoc-Khanh Do, Benjamin Marie, Yulia Ivanishcheva, Alexandre Allauzen, Thomas Lavergne, Jan Niehues, Aurélien Max, François Yvon.
    LIMSI $@$ WMT'14 Medical Translation Task.
    Proceedings of the Ninth Workshop on Statistical Machine Translation, WMT@ACL 2014, June 26-27, 2014, Baltimore, Maryland, USA 2014 (0) 2014
    Conference paper
    Li Gong, Aurélien Max, François Yvon.
    (Much) Faster Construction of SMT Phrase Tables from Large-scale Parallel Corpora (Construction (très) rapide de tables de traduction à partir de grands bi-textes) [in French].
    Traitement Automatique des Langues Naturelles, TALN 2014, Marseille, France, 1-4 Juillet 2014, Démonstrations 2014 (0) 2014
    Conference paper
    Li Gong, Aurélien Max, François Yvon.
    Towards a More Efficient Development of Statistical Machine Translation Systems (Vers un développement plus efficace des systèmes de traduction statistique : un peu de vert dans un monde de BLEU) [in French].
    Traitement Automatique des Langues Naturelles, TALN 2014, Marseille, France, 1-4 Juillet 2014, articles courts 2014 (0) 2014
    Journal article
    Xi Liu, Li Gong, Yongxi Gong, Yu Liu.
    Revealing daily travel patterns and city structure with taxi trip data.
    CoRR 2013, Volume 0 (0) 2013
    Conference paper
    Jin Tian, Guohui Zeng, Fei Wu 0006, Rui Zou, Li Gong.
    The Creation of Knowledge Innovation System.
    Sixth International Conference on Business Intelligence and Financial Engineering, BIFE 2013, Hangzhou, China, November 14-16, 2013 2013 (0) 2013
    Conference paper
    Jin Tian, Fei Wu 0006, Rui Zou, Guohui Zeng, Li Gong.
    The Storage Formats for Accelerating SMVP on a GPU.
    Sixth International Conference on Business Intelligence and Financial Engineering, BIFE 2013, Hangzhou, China, November 14-16, 2013 2013 (0) 2013
    Conference paper
    Li Gong, Jin Tian.
    Model for Renegotiation in Infrastructure Projects with Government Guarantee.
    Fifth International Conference on Business Intelligence and Financial Engineering, BIFE 2012, Lanzhou, Gansu, China, August 18-21, 2012 2012 (0) 2012
    Conference paper
    Jin Tian, Li Gong.
    Novel Pre-treatment for Inhomogeneous Dielectric Media in Finite Element Analysis.
    Fifth International Joint Conference on Computational Sciences and Optimization, CSO 2012, Harbin, Heilongjiang, China, June 23-26, 2012 2012 (0) 2012
    Conference paper
    Li Gong, Aurélien Max, François Yvon.
    Towards contextual adaptation for any-text translation.
    2012 International Workshop on Spoken Language Translation, IWSLT 2012, Hong Kong, December 6-7, 2012 2012 (0) 2012
    Journal article
    Fabio Rinaldi, Simon Clematide, Yael Garten, Michelle Whirl Carrillo, Li Gong, Joan M. Hebert, Katrin Sangkuhl, Caroline F. Thorn, Teri E. Klein, Russ B. Altman.
    Using ODIN for a PharmGKB revalidation experiment.
    Database 2012, Volume 2012 (0) 2012
    Conference paper
    Hai Son Le, Thomas Lavergne, Alexandre Allauzen, Marianna Apidianaki, Li Gong, Aurélien Max, Artem Sokolov, Guillaume Wisniewski, François Yvon.
    LIMSI @ WMT12.
    Proceedings of the Seventh Workshop on Statistical Machine Translation, WMT@NAACL-HLT 2012, June 7-8, 2012, Montréal, Canada 2012 (0) 2012
    Conference paper
    Guangri Jin, Li Gong, Hiroshi Furukawa.
    Automatic Transmission Period Setting for Intermittent Periodic Transmission in Wireless Backhaul.
    Digital Information and Communication Technology and Its Applications - International Conference, DICTAP 2011, Dijon, France, June 21-23, 2011. Proceedings, Part I 2011 (0) 2011
    Conference paper
    Min-Sun Kim, Li Gong, Nicole Saito, Kimberly Nishigaya, Marjorie Cabico, Pascale Lafontaine.
    The Role of Self-Construal on Preferred Communication Styles with Humanoid Robots.
    I. J. Humanoid Robotics 2011, Volume 8 (0) 2011
    Conference paper
    Guang Ma, Li Gong, Kuikui Chen, Wanbei Bai.
    One Kind of Brand-New Experimental Teaching Idea and Assessment Methods on Basic Geology in Network Environment.
    Advances in Computer Science, Environment, Ecoinformatics, and Education - International Conference, CSEE 2011, Wuhan, China, August 21-22, 2011, Proceedings, Part III 2011 (0) 2011
    Conference paper
    Li Gong.
    Java Security Architecture Revisited.
    ACM Queue 2011, Volume 9 (0) 2011
    Conference paper
    Li Gong.
    Java security architecture revisited.
    Commun. ACM 2011, Volume 54 (0) 2011
    Journal article
    Guoxing Zhang, Ju'e Guo, Guorong Chai, Li Gong, Xuejun Wang.
    Using jump-diffusion modeling for valuing real options in infrastructure projects.
    Frontiers of Computer Science in China 2010, Volume 4 (0) 2010
    Conference paper
    Li Gong.
    Java Security: A Ten Year Retrospective.
    Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, 7-11 December 2009 2009 (0) 2009
    Conference paper
    Min-Sun Kim, Jennifer Sur, Li Gong.
    Humans and humanoid social robots in communication contexts.
    AI Soc. 2009, Volume 24 (0) 2009
    Journal article
    Li Gong.
    How social is social responses to computers? The function of the degree of anthropomorphism in computer representations.
    Computers in Human Behavior 2008, Volume 24 (0) 2008
    Journal article
    Li Gong.
    The boundary of racial prejudice: Comparing preferences for computer-synthesized White, Black, and robot characters.
    Computers in Human Behavior 2008, Volume 24 (0) 2008
    Conference paper
    Jiayu Wu, Hongguang Cheng, Ayan Zeng, Fanghua Hao, Dan Wang, Li Gong.
    Landscape Change and its Simulation using GIS, Landscape Ecology and the Markov Model.
    IEEE International Geoscience Remote Sensing Symposium, IGARSS 2008, July 8-11, 2008, Boston, Massachusetts, USA, Proceedings 2008 (0) 2008
    Conference paper
    Dan Wang, Hongguang Cheng, Fanghua Hao, Ayan Zeng, Jiayu Wu, Li Gong.
    Dynamic Simulation on the Spatio-Temporal Patterns of Land use in the Area of Continued Hydropower Station Construction in the Upper Reach of Yellow River.
    IEEE International Geoscience Remote Sensing Symposium, IGARSS 2008, July 8-11, 2008, Boston, Massachusetts, USA, Proceedings 2008 (0) 2008
    Conference paper
    Tina Hernandez-Boussard, Michelle Whirl Carrillo, Joan M. Hebert, Li Gong, Ryan Owen, Mei Gong, Winston Gor, Feng Liu, Chuong Truong, Ryan Whaley, Mark Woon, Tina Zhou, Russ B. Altman, Teri E. Klein.
    The pharmacogenetics and pharmacogenomics knowledge base: accentuating the knowledge.
    Nucleic Acids Research 2008, Volume 36 (0) 2008
    Conference paper
    Li Gong.
    Is happy better than sad even if they are both non-adaptive? Effects of emotional expressions of talking-head interface agents.
    International Journal of Man-Machine Studies 2007, Volume 65 (0) 2007
    Conference paper
    Simon S. Y. Shim, Li Gong, Aviel D. Rubin, Linley Gwennap.
    Guest Editors' Introduction: Securing the High-Speed Internet.
    IEEE Computer 2004, Volume 37 (0) 2004
    Conference paper
    Li Gong.
    It's China(town).
    IEEE Internet Computing 2004, Volume 8 (0) 2004
    Journal article
    Li Gong, Joshua D. Guttman, Peter Y. A. Ryan, Steve A. Schneider.
    Guest editorial overview.
    IEEE Journal on Selected Areas in Communications 2003, Volume 21 (0) 2003
    Journal article
    Li Gong, Jennifer Lai.
    To Mix or Not to Mix Synthetic Speech and Human Speech? Contrasting Impact on Judge-Rated Task Performance versus Self-Rated Performance and Attitudinal Responses.
    I. J. Speech Technology 2003, Volume 6 (0) 2003
    Conference paper
    Li Gong.
    Is Cross-Platform Security Possible?
    Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings 2003 (0) 2003
    Conference paper
    Li Gong.
    Human and Humanoid Don't Match: Consistency Preference and Impact on Users' Trust.
    Human-Computer Interaction INTERACT '03: IFIP TC13 International Conference on Human-Computer Interaction, 1st-5th September 2003, Zurich, Switzerland 2003 (0) 2003
    Conference paper
    Li Gong.
    A New Column for a New Year.
    IEEE Internet Computing 2003, Volume 7 (0) 2003
    Conference paper
    Li Gong.
    Why Cross-Platform Security.
    IEEE Internet Computing 2003, Volume 7 (0) 2003
    Conference paper
    Li Gong.
    Tutorial: Peer to Peer Networks in Action.
    IEEE Distributed Systems Online 2002, Volume 3 (0) 2002
    Conference paper
    Li Gong.
    Guest Editor's Introduction: Peer-to-Peer Networks in Action.
    IEEE Internet Computing 2002, Volume 6 (0) 2002
    Conference paper
    Li Gong, Jennifer Lai.
    Shall we mix synthetic speech and human speech?: impact on users' performance, perception, and attitude.
    CHI 2001 (0) 2001
    Conference paper
    Li Gong.
    A Software Architecture for Open Service Gateways.
    IEEE Internet Computing 2001, Volume 5 (0) 2001
    Conference paper
    Li Gong.
    Industry Report: JXTA: A Network Programming Environment.
    IEEE Internet Computing 2001, Volume 5 (0) 2001
    Conference paper
    Li Gong.
    Developing Security Systems in the Real World.
    ECOOP 2000 - Object-Oriented Programming, 14th European Conference, Sophia Antipolis and Cannes, France, June 12-16, 2000, Proceedings 2000 (0) 2000
    Conference paper
    Clifford Nass, Li Gong.
    Speech interfaces from an evolutionary perspective.
    Commun. ACM 2000, Volume 43 (0) 2000
    Conference paper
    Li Gong, Ravi S. Sandhu.
    Guest Editors' Introduction: What Makes Security Technologies Relevant?
    IEEE Internet Computing 2000, Volume 4 (0) 2000
    Conference paper
    Clifford Nass, Li Gong.
    Maximized Modality or constrained consistency?
    Auditory-Visual Speech Processing, AVSP '99, Santa Cruz, CA, USA, August 7-10, 1999 1999 (0) 1999
    Conference paper
    Charlie Lai, Li Gong, Larry Koved, Anthony J. Nadalin, Roland Schemers.
    User Authentication and Authorization in the Java(tm) Platform.
    15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA 1999 (0) 1999
    Conference paper
    Li Gong, Satya Dodda.
    Security Assurance Efforts in Engineering Java 2 SE (JDK 1.2).
    4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 17-19 November 1999, Washington, D.C, USA, Proceedings 1999 (0) 1999
    Conference paper
    Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell.
    Panel Introduction: The Security Impact of Distributed Computing Technologies.
    CSFW 1998 (0) 1998
    Conference paper
    Dirk Balfanz, Li Gong.
    Experience with Secure Multi-Processing in Java.
    ICDCS 1998 (0) 1998
    Conference paper
    Li Gong, Roland Schemers.
    Signing, Sealing, and Guarding Java Objects.
    Mobile Agents and Security 1998 (0) 1998
    Conference paper
    Li Gong, Roland Schemers.
    Implementing Protection Domains in the Java
    Proceedings of the Network and Distributed System Security Symposium, NDSS 1998, San Diego, California, USA 1998 (0) 1998
    Conference paper
    Li Gong.
    Secure Java Class Loading.
    IEEE Internet Computing 1998, Volume 2 (0) 1998
    Conference paper
    Li Gong.
    Java security: present and near future.
    IEEE Micro 1997, Volume 17 (0) 1997
    Conference paper
    Li Gong.
    New security architectural directions for Java.
    Proceedings IEEE COMPCON 97, San Jose, California, USA, February 23-26, 1997, Digest of Papers 1997 (0) 1997
    Conference paper
    Mark Moriconi, Xiaolei Qian, Robert A. Riemenschneider, Li Gong.
    Secure Software Architectures.
    1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA 1997 (0) 1997
    Conference paper
    Marvin Schaefer, Sylvan Pinsky, Drew Dean, Li Gong, Jim Roskind, Barbara Fox.
    Ensuring Assurance in Mobile Computing.
    1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA 1997 (0) 1997
    Conference paper
    Li Gong, Marianne Mueller, Hemma Prafullchandra, Roland Schemers.
    Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2.
    USENIX Symposium on Internet Technologies and Systems 1997 (0) 1997
    Conference paper
    Li Gong.
    Enclaves: Enabling Secure Collaboration Over the Internet.
    IEEE Journal on Selected Areas in Communications 1997, Volume 15 (0) 1997
    Conference paper
    James P. Anderson, Sheila Brand, Li Gong, Thomas Haigh, Steven B. Lipner, Teresa F. Lunt, Ruth Nelson, William Neugent, Hilarie K. Orman, Marcus J. Ranum, Roger R. Schell, Eugene H. Spafford.
    Firewalls: An Expert Roundtable.
    IEEE Software 1997, Volume 14 (0) 1997
    Conference paper
    Iskender Agi, Li Gong.
    An Empirical Study of Secure MPEG Video Transmissions.
    1996 Symposium on Network and Distributed System Security, (S)NDSS '96, San Diego, CA, February 22-23, 1996 1996 (0) 1996
    Conference paper
    Simon N. Foley, Li Gong, Xiaolei Qian.
    A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification.
    1996 IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, USA 1996 (0) 1996
    Conference paper
    Robert H. Deng, Li Gong, Aurel A. Lazar, Weiguo Wang.
    Practical Protocols for Certified Electronic Mail.
    J. Network Syst. Manage. 1996, Volume 4 (0) 1996
    Conference paper
    Li Gong, Xiaolei Qian.
    Computational Issues in Secure Interoperation.
    IEEE Trans. Software Eng. 1996, Volume 22 (0) 1996
    Conference paper
    Li Gong.
    Optimal authentication protocols resistant to password guessing attacks.
    The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland 1995 (0) 1995
    Conference paper
    Michael K. Reiter, Li Gong.
    Securing Causal Relationships in Distributed Systems.
    Comput. J. 1995, Volume 38 (0) 1995
    Conference paper
    Li Gong.
    Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations.
    Distributed Computing 1995, Volume 9 (0) 1995
    Conference paper
    Li Gong.
    Collisionful Keyed Hash Functions with Selectable Collisions.
    Inf. Process. Lett. 1995, Volume 55 (0) 1995
    Conference paper
    Li Gong, Xiaolei Qian.
    Enriching the Expressive Power of Security Labels.
    IEEE Trans. Knowl. Data Eng. 1995, Volume 7 (0) 1995
    Conference paper
    Li Gong, Nachum Shacham.
    Multicast security and its extension to a mobile environment.
    Wireless Networks 1995, Volume 1 (0) 1995
    Conference paper
    Li Gong, Xiaolei Qian.
    The complexity and composability of secure interoperation.
    1994 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 16-18, 1994 1994 (0) 1994
    Conference paper
    Li Gong, Nachum Shacham.
    Elements of trusted multicasting.
    1994 International Conference on Network Protocols, ICNP 1994, Boston, MA, USA, October 25-28, 1994, Proceedings 1994 (0) 1994
    Conference paper
    Li Gong.
    New Protocols for Third-Party-Based Authentication and Secure Broadcast.
    ACM Conference on Computer and Communications Security 1994 (0) 1994
    Conference paper
    Michael K. Reiter, Li Gong.
    Preventing denial and forgery of causal relationships in distributed systems.
    1993 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993 1993 (0) 1993
    Conference paper
    Li Gong.
    Lower Bounds on Messages and Rounds for Network Authentication Protocols.
    ACM Conference on Computer and Communications Security 1993 (0) 1993
    Conference paper
    Li Gong.
    A Variation on the Themes of Message Freshness and Replay or, the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols.
    CSFW 1993 (0) 1993
    Conference paper
    Li Gong.
    Increasing Availability and Security of an Authentication Service.
    IEEE Journal on Selected Areas in Communications 1993, Volume 11 (0) 1993
    Conference paper
    Li Gong, T. Mark A. Lomas, Roger M. Needham, Jerome H. Saltzer.
    Protecting Poorly Chosen Secrets from Guessing Attacks.
    IEEE Journal on Selected Areas in Communications 1993, Volume 11 (0) 1993
    Conference paper
    Michael K. Reiter, Kenneth P. Birman, Li Gong.
    Integrating security in a group oriented distributed system.
    1992 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992 1992 (0) 1992
    Conference paper
    John A. Bull, Li Gong, Karen R. Sollins.
    Towards Security in an Open Systems Federation.
    Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings 1992 (0) 1992
    Conference paper
    Li Gong.
    A Security Risk of Depending on Synchronized Clocks.
    Operating Systems Review 1992, Volume 26 (0) 1992
    Conference paper
    Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong.
    Logics for Cryptographic Protocols - Virtues and Limitations.
    CSFW 1991 (0) 1991
    Conference paper
    Li Gong.
    Handling Infeasible Specifications fo Cryptographic Protocols.
    CSFW 1991 (0) 1991
    Conference paper
    Li Gong.
    Verifiable-Text Attacks in Cryptographic Protocols.
    INFOCOM 1990 (0) 1990
    Conference paper
    Li Gong, Roger M. Needham, Raphael Yahalom.
    Reasoning about Belief in Cryptographic Protocols.
    IEEE Symposium on Security and Privacy 1990 (0) 1990
    Conference paper
    Li Gong, D. J. Wheeler.
    A Matrix Key-Distribution Scheme.
    J. Cryptology 1990, Volume 2 (0) 1990
    Conference paper
    Li Gong.
    Securely Replicating Authentication Services.
    ICDCS 1989 (0) 1989
    Conference paper
    Li Gong.
    A Secure Identity-Based Capability System.
    IEEE Symposium on Security and Privacy 1989 (0) 1989
    Conference paper
    Li Gong.
    On Security in Capability-Based Systems.
    Operating Systems Review 1989, Volume 23 (0) 1989
    Conference paper
    T. Mark A. Lomas, Li Gong, Jerome H. Saltzer, Roger M. Needham.
    Reducing Risks from Poorly Chosen Keys.
    SOSP 1989 (0) 1989
    Show item 1 to 94 of 94  

    Your query returned 94 matches in the database.