default search action
Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006
- Robert L. Popp, John Yen:
Emergent Information Technologies and Enabling Policies for Counter-Terrorism. Wiley-IEEE Press 2006, ISBN 978-0-471-77615-4 - Robert L. Popp, David Allen, Claudio Cioffi-Revilla:
Utilizing Information and Social Science Technology to Understand and Counter the Twenty-First Century Strategic Threat 1. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - Krishna R. Pattipati, Peter Willett, Jefferey Allanach, Haiying Tu, Satnam Singh:
Hidden Markov Models and Bayesian Networks for Counter-Terrorism. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - Mark Lazaroff, David Snowden:
Anticipatory Models for Counter-Terrorism. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - J. Brian Sharkey, Doyle Weishar, John W. Lockwood, Ron Loui, Richard Rohwer, John Byrnes, Krishna R. Pattipati, Stephen G. Eick, David Cousins, Michael Nicoletti:
Information Processing at Very High Speed Data Ingestion Rates. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - Reda A. Ammar, Steven A. Demurjian, Ian R. Greenshields, Krishna R. Pattipati, Sanguthevar Rajasekaran:
Analysis of Heterogeneous Data in Ultrahigh Dimensions. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - Jennifer Golbeck, Aaron Mannes, James A. Hendler:
Semantic Web Technologies for Terrorist Network Analysis. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - Nazli Choucri, Stuart E. Madnick, Michael D. Siegel:
Improving National and Homeland Security Through Context Knowledge Representation and Reasoning Technologies. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - Jeff Jonas, John Karat:
Anonymized Semantic Directories and a Privacy-Enhancing Architecture for Enterprise Discovery. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - Brian P. Kettler, Gary Edwards, Mark Hoffman:
Facilitating Information Sharing Across Intelligence Community Boundaries Using Knowledge Management and Semantic Web Technologies. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - Paul A. Kogut, Yui Leung, Kathleen Ryan, Linda Gohari, Mieczyslaw M. Kokar, Jerzy Letkowski:
Applying Semantic Web Reasoning to Counter-Terrorism. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - Clifford Behrens, Hyong Sop Shim, Devasis Bassu:
Schemer: Consensus-Based Knowledge Validation and Collaboration Services for Virtual Teams of Intelligence Experts. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - Shuang Sun, Xiaocong Fan, John Yen:
Sharing Intelligence Using Information Supply Chains. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - Michael D. McNeese, Isaac Brewer, Rashaad E. T. Jones, Erik S. Connors:
Supporting Knowledge Management In Emergency Crisis Management Domains: Envisioned Designs for Collaborative Work. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - Janusz Marecki, Nathan Schurr, Milind Tambe:
Agent-Based Simulations for Disaster Rescue Using the DEFACTO Coordination System. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - Douglas W. Oard:
Transcending the Tower of Babel: Supporting Access to Multilingual Information with Cross-Language Information Retrieval. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - Aaron B. Frank, Desmond Saunders-Newton:
Journey from Analysis to Inquiry: Technology and Transformation of Counter-Terrorism Analysis. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - Seth Greenblatt, Thayne Coffman, Sherry Marcus:
Behavioral Network Analysis for Terrorist Detection. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - Tom Mifflin, Chris Boner, Greg Godfrey, Michael Greenblatt:
Detecting Terrorist Activities in the Twenty-First Century: A Theory of Detection for Transactional Networks. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - David B. Skillicorn:
Social Network Analysis Via Matrix Decompositions. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - Legal Standards for Data Mining. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006
- Paul Rosenzweig:
Privacy and Consequences: Legal and Policy Structures for Implementing New Counter-Terrorism Technologies and Protecting Civil Liberty. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006 - Kim A. Taipale:
Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties. Emergent Information Technologies and Enabling Policies for Counter-Terrorism 2006
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.