Catalogue de la bibliothèque

Mon panier

Emergent information technologies and enabling policies for counter-terrorism / edited by Robert L. Popp, John Yen.

Localisation

Sécurité publique Canada, Bibliothèque

Ressource

Livres et rapports

Cote

HV 6431 E487 2006

Auteurs

Publié

Bibliographie

Includes bibliographical references and index.

Description

xv, 468 p. : ill. ; 26 cm.

Résumé

The papers in this volume examine the homeland security capabilities of emerging technologies, in order to enhance the reader's understanding of the public policy and privacy issues, related to various technologies. It provides a rigorous examination and offers several entirely new concepts, innovative technologies, and corresponding enabling policies for defending against terrorism in the post-Cold War era.

Sujet

Contenu

1. Utilizing information and social science technology to understand and counter the twenty-first century strategic threat / Robert L. Popp, David Allen, and Claudio Cioffi-Revilla. -- 2. Hidden markov models and bayesian networks for counter-terrorism / Krishna Pattipati and others. -- 3. Anticipatory models for counter-terrorism / Mark Lazaroff and David Snowden. -- 4. Information processing at very high speed data ingestion rates / J. Brian Sharkey and others -- 5. Analysis of heterogeneous data in ultrahigh dimensions / R. A. Ammar and others. -- 6. Semantic web technologies for terrorist network analysis / Jennifer Golbeck, Aaron Mannes, and James Hendler. -- 7. Improving national and homeland security through context knowledge representation and reasoning technologies / Nazli Choucri, Stuart E. Madnick, and Michael D. Siegel. -- 8. Anonymized semantic directories and a privacy-enhancing architecture for enterprise discovery / Jeff Jonas and John Karat. -- 9. Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies / Brian Kettler, Gary Edwards, and Mark Hoffman. -- 10. Applying semantic web reasoning to counter-terrorism / Paul Kogutand and others. -- 11. Schemer: consensus-based knowledge validation and collaboration services for virtual teams of intelligence experts / Clifford Behrens, Hyong-Sop Shim, and Devaisis Bassu. -- 12. Sharing intelligence using information supply chains / Shuang Sun, Xiaocong Fan, and John Yen. -- 13. Supporting knowledge management in emergency crisis management domains: envisioned designs for collaborative work / Michael D. McNeese and others. -- 14. Agent-based simulations for disaster rescue using the DEFACTO Coordination System / Janusz Marecki, Nathan Schurr, and Milind Tambe. -- 15. Transcending the tower of babel: supporting access to multilingual Information with cross-language information retrieval / Douglas W. Oard. -- 16. Journey from analysis to inquiry: technology and transformation of counter-terrorism analysis / Aaron B. Frank and Desmond Saunders-Newton. -- 17. Behavioral network analysis for terrorist detection / Seth A. Greenblatt, Thayne Coffman, and Sherry E. Marcus. -- 18. Detecting terrorist activities in the twenty-first century: a theory of detection for transactional networks / Tom Mifflin, Chris Boner, Greg Godfrey, and Michael Greenblatt. -- 19. Social network analysis via matrix decompositions / D. B. Skillicorn. -- 20. Legal standards for data mining / Fred H. Cate. -- 21. Privacy and consequences: legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty / Paul Rosenzweig. -- 22. Designing technical systems to support policy: enterprise architecture, policy appliances, and civil liberties / K. A. Taipale.

Collection

IEEE series on computational intelligence

Items

 #CoteStatutLocalisation
1HV 6431 E487 2006DisponiblePS-Circ
Date de modification :