Emergent information technologies and enabling policies for counter-terrorism [[electronic resource] /] / edited by Robert L. Popp, John Yen |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley-Interscience |
Descrizione fisica | 1 online resource (486 p.) |
Disciplina |
363.3202854
363.3250285 |
Altri autori (Persone) |
PoppRobert L
YenJohn |
Collana | IEEE series on computational intelligence |
Soggetto topico |
Terrorism - United States - Prevention
Terrorism - Government policy - United States Terrorism - Technological innovations - United States Information technology - Government policy - United States |
ISBN |
1-280-65001-X
9786610650019 0-471-78656-X 0-471-78655-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Utilizing information and social science technology to understand and counter the twenty-first century strategic threat / Robert L. Popp, David Allen, and Claudio Cioffi-Revilla -- Hidden Markov models and Bayesian networks for counter-terrorism / Krishna Pattipati ... [et al.] -- Anticipatory models for counter-terrorism / Mark Lazaroff and David Snowden -- Information processing at very high speed data ingestion rates / J. Brian Sharkey ... [et al.] -- Analysis of heterogeneous data in ultrahigh dimensions / R.A. Ammar ... [et al.] -- Sematic web technologies for terrorist network analysis / Jennifer Golbeck, Aaron Mannes, and James Hendler -- Improving national and homeland security through context knowledge representation and reasoning technologies / Nazli Choucri, Stuart E. Madnick, and Michael D. Siegel -- Anonymized semantic directories and a privacy-enhancing architecture for enterprise discovery / Jeff Jonas and John Karat -- Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies / Brian Kettler, Gary Edwards, and Mark Hoffman -- Applying semantic web reasoning to counter-terrorism / Paul Kogut ... [et al.] -- Schemer : consensus-based knowledge validation and collaboration services for virtual teams of intelligence experts / Clifford Behrens, Hyong-Sop Shim, and Davaisis Bassu -- Sharing intelligence using information supply chains / Shuang Sun, Xiaocong Fan, and John Yen -- Supporting knowledge management in emergency crisis management domains : envisioned designs for collaborative work / Michael D. McNeese .. [et al.] -- Agent-based simulations for disaster rescue using the DEFACTO coordination system / Janusz Marecki, Nathan Schurr, and Milind Tambe -- Transcending the tower of Babel : supporting access to multilingual information with cross-language information retrieval / Douglas W. Oard -- Journey from analysis to inquiry : technology and transformation of counter-teorrorism analysis / Aaron B. Frank and Desmond Saunders-Newton -- Behavioral network analysis for terrorist detection / Seth A. Greenblatt, Thayne Coffman, and Sherry E. Marcus -- Detecting terrorist activities in the twenty-first century : a theory of detection for transactional networks / Tom Mifflin ... [et al.] -- Social network analysis via matrix decompositions / D.B. Skillicorn -- Legal standards for data mining / Fred H. Cate -- Privacy and consequences : legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty / Paul Rosenzweig -- Designing technical systems to support policy : enterprise architecture, policy appliances and civil liberties / K.A. Taipale. |
Record Nr. | UNINA-9910143414303321 |
Hoboken, N.J., : Wiley-Interscience | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Emergent information technologies and enabling policies for counter-terrorism [[electronic resource] /] / edited by Robert L. Popp, John Yen |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley-Interscience |
Descrizione fisica | 1 online resource (486 p.) |
Disciplina |
363.3202854
363.3250285 |
Altri autori (Persone) |
PoppRobert L
YenJohn |
Collana | IEEE series on computational intelligence |
Soggetto topico |
Terrorism - United States - Prevention
Terrorism - Government policy - United States Terrorism - Technological innovations - United States Information technology - Government policy - United States |
ISBN |
1-280-65001-X
9786610650019 0-471-78656-X 0-471-78655-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Utilizing information and social science technology to understand and counter the twenty-first century strategic threat / Robert L. Popp, David Allen, and Claudio Cioffi-Revilla -- Hidden Markov models and Bayesian networks for counter-terrorism / Krishna Pattipati ... [et al.] -- Anticipatory models for counter-terrorism / Mark Lazaroff and David Snowden -- Information processing at very high speed data ingestion rates / J. Brian Sharkey ... [et al.] -- Analysis of heterogeneous data in ultrahigh dimensions / R.A. Ammar ... [et al.] -- Sematic web technologies for terrorist network analysis / Jennifer Golbeck, Aaron Mannes, and James Hendler -- Improving national and homeland security through context knowledge representation and reasoning technologies / Nazli Choucri, Stuart E. Madnick, and Michael D. Siegel -- Anonymized semantic directories and a privacy-enhancing architecture for enterprise discovery / Jeff Jonas and John Karat -- Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies / Brian Kettler, Gary Edwards, and Mark Hoffman -- Applying semantic web reasoning to counter-terrorism / Paul Kogut ... [et al.] -- Schemer : consensus-based knowledge validation and collaboration services for virtual teams of intelligence experts / Clifford Behrens, Hyong-Sop Shim, and Davaisis Bassu -- Sharing intelligence using information supply chains / Shuang Sun, Xiaocong Fan, and John Yen -- Supporting knowledge management in emergency crisis management domains : envisioned designs for collaborative work / Michael D. McNeese .. [et al.] -- Agent-based simulations for disaster rescue using the DEFACTO coordination system / Janusz Marecki, Nathan Schurr, and Milind Tambe -- Transcending the tower of Babel : supporting access to multilingual information with cross-language information retrieval / Douglas W. Oard -- Journey from analysis to inquiry : technology and transformation of counter-teorrorism analysis / Aaron B. Frank and Desmond Saunders-Newton -- Behavioral network analysis for terrorist detection / Seth A. Greenblatt, Thayne Coffman, and Sherry E. Marcus -- Detecting terrorist activities in the twenty-first century : a theory of detection for transactional networks / Tom Mifflin ... [et al.] -- Social network analysis via matrix decompositions / D.B. Skillicorn -- Legal standards for data mining / Fred H. Cate -- Privacy and consequences : legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty / Paul Rosenzweig -- Designing technical systems to support policy : enterprise architecture, policy appliances and civil liberties / K.A. Taipale. |
Record Nr. | UNINA-9910830555803321 |
Hoboken, N.J., : Wiley-Interscience | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Emergent information technologies and enabling policies for counter-terrorism [[electronic resource] /] / edited by Robert L. Popp, John Yen |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley-Interscience |
Descrizione fisica | 1 online resource (486 p.) |
Disciplina |
363.3202854
363.3250285 |
Altri autori (Persone) |
PoppRobert L
YenJohn |
Collana | IEEE series on computational intelligence |
Soggetto topico |
Terrorism - United States - Prevention
Terrorism - Government policy - United States Terrorism - Technological innovations - United States Information technology - Government policy - United States |
ISBN |
1-280-65001-X
9786610650019 0-471-78656-X 0-471-78655-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Utilizing information and social science technology to understand and counter the twenty-first century strategic threat / Robert L. Popp, David Allen, and Claudio Cioffi-Revilla -- Hidden Markov models and Bayesian networks for counter-terrorism / Krishna Pattipati ... [et al.] -- Anticipatory models for counter-terrorism / Mark Lazaroff and David Snowden -- Information processing at very high speed data ingestion rates / J. Brian Sharkey ... [et al.] -- Analysis of heterogeneous data in ultrahigh dimensions / R.A. Ammar ... [et al.] -- Sematic web technologies for terrorist network analysis / Jennifer Golbeck, Aaron Mannes, and James Hendler -- Improving national and homeland security through context knowledge representation and reasoning technologies / Nazli Choucri, Stuart E. Madnick, and Michael D. Siegel -- Anonymized semantic directories and a privacy-enhancing architecture for enterprise discovery / Jeff Jonas and John Karat -- Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies / Brian Kettler, Gary Edwards, and Mark Hoffman -- Applying semantic web reasoning to counter-terrorism / Paul Kogut ... [et al.] -- Schemer : consensus-based knowledge validation and collaboration services for virtual teams of intelligence experts / Clifford Behrens, Hyong-Sop Shim, and Davaisis Bassu -- Sharing intelligence using information supply chains / Shuang Sun, Xiaocong Fan, and John Yen -- Supporting knowledge management in emergency crisis management domains : envisioned designs for collaborative work / Michael D. McNeese .. [et al.] -- Agent-based simulations for disaster rescue using the DEFACTO coordination system / Janusz Marecki, Nathan Schurr, and Milind Tambe -- Transcending the tower of Babel : supporting access to multilingual information with cross-language information retrieval / Douglas W. Oard -- Journey from analysis to inquiry : technology and transformation of counter-teorrorism analysis / Aaron B. Frank and Desmond Saunders-Newton -- Behavioral network analysis for terrorist detection / Seth A. Greenblatt, Thayne Coffman, and Sherry E. Marcus -- Detecting terrorist activities in the twenty-first century : a theory of detection for transactional networks / Tom Mifflin ... [et al.] -- Social network analysis via matrix decompositions / D.B. Skillicorn -- Legal standards for data mining / Fred H. Cate -- Privacy and consequences : legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty / Paul Rosenzweig -- Designing technical systems to support policy : enterprise architecture, policy appliances and civil liberties / K.A. Taipale. |
Record Nr. | UNINA-9910841070103321 |
Hoboken, N.J., : Wiley-Interscience | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|