1. ISI 2003:
Tucson,
AZ,
USA
Hsinchun Chen, Richard Miranda, Daniel Dajun Zeng, Chris C. Demchak, Jennifer Schroeder, Therani Madhusudan (Eds.):
Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings.
Lecture Notes in Computer Science 2665 Springer 2003, ISBN 3-540-40189-X BibTeX
Part I:
Full Papers
Data Management and Mining
Deception Detection
Analytical Techniques
Visualization
Knowledge Management and Adoption
Collaborative Systems and Methodologies
- T. S. Raghu, Ram Ramesh, Andrew B. Whinston:
Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework.
249-265
Electronic Edition (Springer LINK) BibTeX
- J. Leon Zhao, Henry H. Bi, Hsinchun Chen:
Collaborative Workflow Management for Interagency Crime Analysis.
266-280
Electronic Edition (Springer LINK) BibTeX
- Daniel Dajun Zeng, Hsinchun Chen, Damien Daspit, Fu Shan, Suresh Nandiraju, Michael Chau, Chienting Lin:
COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement.
281-295
Electronic Edition (Springer LINK) BibTeX
Monitoring and Surveillance
Part II:
Short Papers
Data Management and Mining
- Hillol Kargupta, Kun Liu, Jessica Ryan:
Privacy Sensitive Distributed Data Mining from Multi-party Data.
336-342
Electronic Edition (Springer LINK) BibTeX
- Pablo Ariel Duboué, Kathleen McKeown, Vasileios Hatzivassiloglou:
PROGENIE: Biographical Descriptions for Intelligence Analysis.
343-345
Electronic Edition (Springer LINK) BibTeX
- Joachim Hammer, William J. O'Brien, Mark S. Schmalz:
Scalable Knowledge Extraction from Legacy Sources with SEEK.
346-349
Electronic Edition (Springer LINK) BibTeX
- Sachin S. Kajarekar, M. Kemal Sönmez, Luciana Ferrer, Venkata Gadde, Anand Venkataraman, Elizabeth Shriberg, Andreas Stolcke, Harry Bratt:
"TalkPrinting": Improving Speaker Recognition by Modeling Stylistic Features.
350-354
Electronic Edition (Springer LINK) BibTeX
- D. V. Sreenath, William I. Grosky, Farshad Fotouhi:
Emergent Semantics from Users' Browsing Paths.
355-357
Electronic Edition (Springer LINK) BibTeX
Deception Detection
Methodologies and Applications
Part III:
Extended Abstracts for Posters
Data Management and Mining
Security Informatics
Copyright © Sat May 16 23:25:36 2009
by Michael Ley (ley@uni-trier.de)