default search action
AAAI Spring Symposium 2005 - AI Technologies for Homeland Security: Stanford University, CA, USA
- AI Technologies for Homeland Security, Papers from the 2005 AAAI Spring Symposium, Technical Report SS-05-01, Stanford, California, USA, March 21-23, 2005. AAAI 2005
- John Yen, Robert L. Popp:
Organizing Committee.
Regular Papers
Team Coordination
- John Phelps, Valerie Guralnik:
COORDINATORs: TAEMS Modeling and Interfacing for First Response. 1-8 - Nathan Schurr, Janusz Marecki, Milind Tambe, Paul Scerri, Nikhil Kasinadhuni, John P. Lewis:
The Future of Disaster Response: Humans Working with Multiagent Teams using DEFACTO. 9-16 - Xiaocong Fan, Shuang Sun, John Yen:
On Shared Situation Awareness for Supporting Human Decision-Making Teams. 17-24
Intelligent Analysis Tools
- Anna L. Buczak, Benjamin Grooters, Paul Kogut, Eren Manavoglu, C. Lee Giles:
Recommender Systems for Intelligence Analysts. 25-31 - Larry Birnbaum, Kenneth D. Forbus, Earl J. Wagner, James Baker, Michael Witbrock:
Analogy, Intelligent IR, and Knowledge Integration for Intelligence Analysis. 32-37 - Hyong Sop Shim, Clifford Behrens, Devasis Bassu:
Middleware Platform for Recruiting and Proactively Managing Virtual Panels of Intelligence Experts. 38-45 - Steven A. Harp, Johnathan Gohde, Thomas Haigh, Mark S. Boddy:
Automated Vulnerability Analysis Using AI Planning. 46-53
Threat Network Analysis
- Connie Fournelle, Jorge Tierno:
Link Analysis Technologies for Differing Data Sources. 54-61 - Daniel McDonald, Hsinchun Chen, Robert P. Schumaker:
Transforming Open-Source Documents to Terror Networks: The Arizona TerrorNet. 62-69 - Joseph B. Kopena, Kris Malfettone, Evan Sultanik, Vincent A. Cicirello, Andrew Mroczkowski, Moshe Kam, Maxim Peysakhov, Gaurav Naik, William C. Regli:
Network Awareness and the Philadelphia Area Urban Wireless Network Testbed. 70-75
Knowledge Representations and Semantic Web
- Özgür Yilmazel, Svetlana Symonenko, Niranjan Balasubramanian, Elizabeth D. Liddy:
Improved Document Representation for Classification Tasks for the Intelligence Community. 76-82 - James A. Hendler:
Counter Intelligence and the Semantic Web. 83-85 - Mark A. Musen, Monica Crubézy, Martin J. O'Connor, David L. Buckeridge:
Knowledge-Based Syndromic Surveillance for Bioterrorism. 86-90 - Marc Barthelemy, Edmond Chow, Tina Eliassi-Rad:
Knowledge Representation Issues in Semantic Graphs for Relationship Detection. 91-98
Homeland Security Applications
- Kenneth S. Murray, John D. Lowrance, Douglas E. Appelt, Andres C. Rodriguez:
Fostering Collaboration with a Semantic Index over Textual Contributions. 99-106 - Jorge E. Tierno:
Performance Analysis and Prediction for Data Mining Systems. 107-110 - Jennifer L. Burke, Robin R. Murphy:
Using Mobile Robots as a Shared Visual Presence in USAR Environments. 111-116
Posters
Situation Tracking
- Christopher M. Boner:
Automated Detection of Terrorist Activities through Link Discovery within Massive Datasets. 117-119 - Boris A. Galitsky, Alexander Miller:
Determining Possible Criminal Behavior of Mobile Phone Users by Means of Analyzing the Location Tracking Data. 120-122
Threat Network Analysis
- Leona F. Fass:
Small Steps and Giant Leaps toward Homeland Security. 123-126 - William F. Lawless:
Homeland Security, Organizations, and Perturbations. 127-129
System Security
- Robert P. Goldman, Mark S. Boddy, Steven A. Harp, Tom Haigh:
Collaborative Filtering for Community Threats. 130-132 - Edoardo M. Airoldi, Bradley A. Malin, Latanya Sweeney:
Technologies to Defeat Fraudulent Schemes Related to Email Requests. 133-135
Privacy-Preserving
- Latanya Sweeney:
AI Technologies to Defeat Identity Theft Vulnerabilities. 136-138
Information Processing
- Paul Kogut, Kenneth Kisiel:
Cognitive Information Processing Challenges for Homeland Security. 139-140 - Valery A. Petrushin, Rayid Ghani, Anatole Gershman:
A Bayesian Framework for Robust Reasoning from Sensor Networks. 141-143 - Erik Larson, Todd Hughes:
Relational Recognition for Information Extraction in Free Text Documents. 144-146
Applications
- Richard B. Scherl, Michael Barnathan:
A High-Level Language for Homeland Security Response Plans. 147-148 - Chitta Baral, Michael Gelfond, Richard B. Scherl:
Answer Set Programming as the Basis for a Homeland Security QAS. 149-150 - Lili He, Ian R. Greenshields:
Empirical Determination of Lower Bounds on RP Embedding. 151-153 - Terry L. Janssen:
Towards Semantic Integration of Legacy Databases for Homeland Security. 154-156 - Li Ding, Pranam Kolari, Tim Finin, Anupam Joshi, Yun Peng, Yelena Yesha:
On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework. 157-160 - Latanya Sweeney, Ralph Gross:
Mining Images in Publicly-Available Cameras for Homeland Security. 161-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.