dblp.uni-trier.dewww.uni-trier.de

Siddharth Kaza

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
21EESiddharth Kaza, Hsinchun Chen: Effect of Inventor Status on Intra-Organizational Innovation Evolution. HICSS 2009: 1-10
20EEDaning Hu, Siddharth Kaza, Hsinchun Chen: Identifying significant facilitators of dark network evolution. JASIST 60(4): 655-665 (2009)
2008
19EESiddharth Kaza, Hsinchun Chen: Suspect Vehicle Identification for Border Safety. Intelligence and Security Informatics 2008: 305-318
18EEByron Marshall, Hsinchun Chen, Siddharth Kaza: Using importance flooding to identify interesting networks of criminal activity. JASIST 59(13): 2099-2114 (2008)
2007
17EESiddharth Kaza, Daning Hu, Homa Atabakhsh, Hsinchun Chen: Predicting criminal relationships using multivariate survival analysis. DG.O 2007: 290-291
16EEG. Alan Wang, Siddharth Kaza, Shailesh Joshi, Kris Chang, Chunju Tseng, Homa Atabakhsh, Hsinchun Chen: The Arizona IDMatcher: developing an identity matching tool for law enforcement. DG.O 2007: 304-305
15EEG. Alan Wang, Siddharth Kaza, Shailesh Joshi, Kris Chang, Homa Atabakhsh, Hsinchun Chen: The Arizona IDMatcher: A Probabilistic Identity Matching System. ISI 2007: 229-235
14EESiddharth Kaza, Daning Hu, Hsinchun Chen: Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators. ISI 2007: 40-46
13EESiddharth Kaza, Yuan Wang, Hsinchun Chen: Enhancing border security: Mutual information analysis to identify suspect vehicles. Decision Support Systems 43(1): 199-210 (2007)
2006
12EESiddharth Kaza, Yuan Wang, Hsinchun Chen: Target vehicle identification for border safety with modified mutual information. DG.O 2006: 410-411
11EEHsinchun Chen, Homa Atabakhsh, Alan Gang Wang, Siddharth Kaza, Chunju Tseng, Yuan Wang, Shailesh Joshi, Tim Petersen, Chuck Violette: COPLINK center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. DG.O 2006: 49-50
10EESiddharth Kaza, Yuan Wang, Hsinchun Chen: Suspect Vehicle Identification for Border Safety with Modified Mutual Information. ISI 2006: 308-318
2005
9EEHsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron Marshall, Siddharth Kaza, Shauna Eggers, Hemanth Gowda, Ankit Shah, Tim Petersen, Chuck Violette: Visualization in law enforcement. CHI Extended Abstracts 2005: 1268-1271
8EEHsinchun Chen, Homa Atabakhsh, Jennifer Jie Xu, Alan Gang Wang, Byron Marshall, Siddharth Kaza, Chunju Tseng, Shauna Eggers, Hemanth Gowda, Tim Petersen, Chuck Violette: Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. DG.O 2005: 112-113
7EEHsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron Marshall, Siddharth Kaza, Shauna Eggers, Hemanth Gowda, Ankit Shah, Tim Petersen, Chuck Violette: Visualization in law enforcement. DG.O 2005: 229-230
6EEHsinchun Chen, Homa Atabakhsh, Siddharth Kaza, Byron Marshall, Jennifer Jie Xu, G. Alan Wang, Tim Petersen, Chuck Violette: BorderSafe: cross-jurisdictional information sharing, analysis, and visualization. DG.O 2005: 241-242
5EESiddharth Kaza, Jennifer Jie Xu, Byron Marshall, Hsinchun Chen: Topological analysis of criminal activity networks in multiple jurisdictions. DG.O 2005: 251-252
4EESiddharth Kaza, Byron Marshall, Jennifer Jie Xu, Alan Gang Wang, Hemanth Gowda, Homa Atabakhsh, Tim Petersen, Chuck Violette, Hsinchun Chen: BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization. ISI 2005: 669-670
2004
3EEByron Marshall, Siddharth Kaza, Jennifer Jie Xu, Homa Atabakhsh, Tim Petersen, Chuck Violette, Hsinchun Chen: Cross-Jurisdictional Activity Networks to Support Criminal Investigations. DG.O 2004
2 Jennifer Jie Xu, Byron Marshall, Siddharth Kaza, Hsinchun Chen: Analyzing and Visualizing Criminal Network Dynamics: A Case Study. ISI 2004: 359-377
2003
1 Siddharth Kaza, Jayaram Murthy, Gongzhu Hu: Identification of Deliberately Doctored Text Documents Using The Frequency Keyword Chain (FKC) Model. IRI 2003: 398-405

Coauthor Index

1Homa Atabakhsh [3] [4] [6] [7] [8] [9] [11] [15] [16] [17]
2Kris Chang [15] [16]
3Hsinchun Chen [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21]
4Shauna Eggers [7] [8] [9]
5Hemanth Gowda [4] [7] [8] [9]
6Daning Hu [14] [17] [20]
7Gongzhu Hu [1]
8Shailesh Joshi [11] [15] [16]
9Byron Marshall [2] [3] [4] [5] [6] [7] [8] [9] [18]
10Jayaram Murthy [1]
11Tim Petersen [3] [4] [6] [7] [8] [9] [11]
12Ankit Shah [7] [9]
13Chunju Tseng [7] [8] [9] [11] [16]
14Chuck Violette [3] [4] [6] [7] [8] [9] [11]
15Alan Gang Wang [4] [8] [11]
16G. Alan Wang [6] [15] [16]
17Yuan Wang [10] [11] [12] [13]
18Jennifer Jie Xu [2] [3] [4] [5] [6] [8]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)