Sign in
AAAI Spring Symposium: AI Technologies for Homeland Security
2005
2005
2005
Keyphrases
Publications
2005
James A. Hendler
Counter Intelligence and the Semantic Web.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Erik Larson
,
Todd Hughes
Relational Recognition for Information Extraction in Free Text Documents.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Mark A. Musen
,
Monica Crubézy
,
Martin J. O'Connor
,
David L. Buckeridge
Knowledge-Based Syndromic Surveillance for Bioterrorism.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Richard B. Scherl
,
Michael Barnathan
A High-Level Language for Homeland Security Response Plans.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Robert P. Goldman
,
Mark S. Boddy
,
Steven A. Harp
,
Tom Haigh
Collaborative Filtering for Community Threats.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Jennifer L. Burke
,
Robin R. Murphy
Using Mobile Robots as a Shared Visual Presence in USAR Environments.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Marc Barthelemy
,
Edmond Chow
,
Tina Eliassi-Rad
Knowledge Representation Issues in Semantic Graphs for Relationship Detection.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Chitta Baral
,
Michael Gelfond
,
Richard B. Scherl
Answer Set Programming as the Basis for a Homeland Security QAS.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Anna L. Buczak
,
Benjamin Grooters
,
Paul Kogut
,
Eren Manavoglu
,
C. Lee Giles
Recommender Systems for Intelligence Analysts.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Daniel McDonald
,
Hsinchun Chen
,
Robert P. Schumaker
Transforming Open-Source Documents to Terror Networks: The Arizona TerrorNet.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Joseph B. Kopena
,
Kris Malfettone
,
Evan Sultanik
,
Vincent A. Cicirello
,
Andrew Mroczkowski
,
Moshe Kam
,
Maxim Peysakhov
,
Gaurav Naik
,
William C. Regli
Network Awareness and the Philadelphia Area Urban Wireless Network Testbed.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Boris A. Galitsky
,
Alexander Miller
Determining Possible Criminal Behavior of Mobile Phone Users by Means of Analyzing the Location Tracking Data.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
John Phelps
,
Valerie Guralnik
COORDINATORs: TAEMS Modeling and Interfacing for First Response.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Li Ding
,
Pranam Kolari
,
Tim Finin
,
Anupam Joshi
,
Yun Peng
,
Yelena Yesha
On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
AI Technologies for Homeland Security, Papers from the 2005 AAAI Spring Symposium, Technical Report SS-05-01, Stanford, California, USA, March 21-23, 2005
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Terry L. Janssen
Towards Semantic Integration of Legacy Databases for Homeland Security.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Latanya Sweeney
AI Technologies to Defeat Identity Theft Vulnerabilities.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Leona F. Fass
Small Steps and Giant Leaps toward Homeland Security.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Hyong Sop Shim
,
Clifford Behrens
,
Devasis Bassu
Middleware Platform for Recruiting and Proactively Managing Virtual Panels of Intelligence Experts.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Xiaocong Fan
,
Shuang Sun
,
John Yen
On Shared Situation Awareness for Supporting Human Decision-Making Teams.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
John Yen
,
Robert L. Popp
Organizing Committee.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Larry Birnbaum
,
Kenneth D. Forbus
,
Earl J. Wagner
,
James Baker
,
Michael J. Witbrock
Analogy, Intelligent IR, and Knowledge Integration for Intelligence Analysis.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Özgür Yilmazel
,
Svetlana Symonenko
,
Niranjan Balasubramanian
,
Elizabeth D. Liddy
Improved Document Representation for Classification Tasks for the Intelligence Community.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Paul Kogut
,
Kenneth Kisiel
Cognitive Information Processing Challenges for Homeland Security.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Kenneth S. Murray
,
John D. Lowrance
,
Douglas E. Appelt
,
Andres C. Rodriguez
Fostering Collaboration with a Semantic Index over Textual Contributions.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Latanya Sweeney
,
Ralph Gross
Mining Images in Publicly-Available Cameras for Homeland Security.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Valery A. Petrushin
,
Rayid Ghani
,
Anatole Gershman
A Bayesian Framework for Robust Reasoning from Sensor Networks.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Nathan Schurr
,
Janusz Marecki
,
Milind Tambe
,
Paul Scerri
,
Nikhil Kasinadhuni
,
John P. Lewis
The Future of Disaster Response: Humans Working with Multiagent Teams using DEFACTO.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Connie Fournelle
,
Jorge Tierno
Link Analysis Technologies for Differing Data Sources.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Steven A. Harp
,
Johnathan Gohde
,
Thomas Haigh
,
Mark S. Boddy
Automated Vulnerability Analysis Using AI Planning.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Jorge E. Tierno
Performance Analysis and Prediction for Data Mining Systems.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Lili He
,
Ian R. Greenshields
Empirical Determination of Lower Bounds on RP Embedding.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Christopher M. Boner
Automated Detection of Terrorist Activities through Link Discovery within Massive Datasets.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
Edoardo M. Airoldi
,
Bradley A. Malin
,
Latanya Sweeney
Technologies to Defeat Fraudulent Schemes Related to Email Requests.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)
William F. Lawless
Homeland Security, Organizations, and Perturbations.
AAAI Spring Symposium: AI Technologies for Homeland Security
(2005)