


default search action
AAAI Spring Symposium 2005 - AI Technologies for Homeland Security: Stanford University, CA, USA
- AI Technologies for Homeland Security, Papers from the 2005 AAAI Spring Symposium, Technical Report SS-05-01, Stanford, California, USA, March 21-23, 2005. AAAI 2005

- John Yen, Robert L. Popp:

Organizing Committee.
Regular Papers
Team Coordination
- John Phelps, Valerie Guralnik:

COORDINATORs: TAEMS Modeling and Interfacing for First Response. 1-8 - Nathan Schurr, Janusz Marecki, Milind Tambe, Paul Scerri, Nikhil Kasinadhuni, John P. Lewis:

The Future of Disaster Response: Humans Working with Multiagent Teams using DEFACTO. 9-16 - Xiaocong Fan, Shuang Sun, John Yen:

On Shared Situation Awareness for Supporting Human Decision-Making Teams. 17-24
Intelligent Analysis Tools
- Anna L. Buczak, Benjamin Grooters, Paul Kogut, Eren Manavoglu, C. Lee Giles

:
Recommender Systems for Intelligence Analysts. 25-31 - Larry Birnbaum, Kenneth D. Forbus, Earl J. Wagner, James Baker, Michael Witbrock:

Analogy, Intelligent IR, and Knowledge Integration for Intelligence Analysis. 32-37 - Hyong Sop Shim, Clifford Behrens, Devasis Bassu:

Middleware Platform for Recruiting and Proactively Managing Virtual Panels of Intelligence Experts. 38-45 - Steven A. Harp, Johnathan Gohde, Thomas Haigh, Mark S. Boddy:

Automated Vulnerability Analysis Using AI Planning. 46-53
Threat Network Analysis
- Connie Fournelle, Jorge Tierno:

Link Analysis Technologies for Differing Data Sources. 54-61 - Daniel McDonald, Hsinchun Chen, Robert P. Schumaker:

Transforming Open-Source Documents to Terror Networks: The Arizona TerrorNet. 62-69 - Joseph B. Kopena, Kris Malfettone, Evan Sultanik, Vincent A. Cicirello, Andrew Mroczkowski, Moshe Kam, Maxim Peysakhov, Gaurav Naik, William C. Regli:

Network Awareness and the Philadelphia Area Urban Wireless Network Testbed. 70-75
Knowledge Representations and Semantic Web
- Özgür Yilmazel, Svetlana Symonenko, Niranjan Balasubramanian, Elizabeth D. Liddy:

Improved Document Representation for Classification Tasks for the Intelligence Community. 76-82 - James A. Hendler:

Counter Intelligence and the Semantic Web. 83-85 - Mark A. Musen, Monica Crubézy, Martin J. O'Connor, David L. Buckeridge:

Knowledge-Based Syndromic Surveillance for Bioterrorism. 86-90 - Marc Barthelemy, Edmond Chow, Tina Eliassi-Rad:

Knowledge Representation Issues in Semantic Graphs for Relationship Detection. 91-98
Homeland Security Applications
- Kenneth S. Murray, John D. Lowrance, Douglas E. Appelt, Andres C. Rodriguez:

Fostering Collaboration with a Semantic Index over Textual Contributions. 99-106 - Jorge E. Tierno:

Performance Analysis and Prediction for Data Mining Systems. 107-110 - Jennifer L. Burke, Robin R. Murphy:

Using Mobile Robots as a Shared Visual Presence in USAR Environments. 111-116
Posters
Situation Tracking
- Christopher M. Boner:

Automated Detection of Terrorist Activities through Link Discovery within Massive Datasets. 117-119 - Boris A. Galitsky, Alexander Miller:

Determining Possible Criminal Behavior of Mobile Phone Users by Means of Analyzing the Location Tracking Data. 120-122
Threat Network Analysis
- Leona F. Fass:

Small Steps and Giant Leaps toward Homeland Security. 123-126 - William F. Lawless:

Homeland Security, Organizations, and Perturbations. 127-129
System Security
- Robert P. Goldman, Mark S. Boddy, Steven A. Harp, Tom Haigh:

Collaborative Filtering for Community Threats. 130-132 - Edoardo M. Airoldi, Bradley A. Malin, Latanya Sweeney:

Technologies to Defeat Fraudulent Schemes Related to Email Requests. 133-135
Privacy-Preserving
- Latanya Sweeney:

AI Technologies to Defeat Identity Theft Vulnerabilities. 136-138
Information Processing
- Paul Kogut, Kenneth Kisiel:

Cognitive Information Processing Challenges for Homeland Security. 139-140 - Valery A. Petrushin, Rayid Ghani, Anatole Gershman:

A Bayesian Framework for Robust Reasoning from Sensor Networks. 141-143 - Erik Larson, Todd Hughes:

Relational Recognition for Information Extraction in Free Text Documents. 144-146
Applications
- Richard B. Scherl, Michael Barnathan:

A High-Level Language for Homeland Security Response Plans. 147-148 - Chitta Baral, Michael Gelfond

, Richard B. Scherl:
Answer Set Programming as the Basis for a Homeland Security QAS. 149-150 - Lili He, Ian R. Greenshields:

Empirical Determination of Lower Bounds on RP Embedding. 151-153 - Terry L. Janssen:

Towards Semantic Integration of Legacy Databases for Homeland Security. 154-156 - Li Ding, Pranam Kolari, Tim Finin, Anupam Joshi, Yun Peng, Yelena Yesha:

On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework. 157-160 - Latanya Sweeney, Ralph Gross:

Mining Images in Publicly-Available Cameras for Homeland Security. 161-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














