-
1
-
-
0012254042
-
The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects
-
M. Sparrow, "The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects," Social Networks, vol. 13, pp. 251-274, 1991.
-
(1991)
Social Networks
, vol.13
, pp. 251-274
-
-
Sparrow, M.1
-
2
-
-
33947228099
-
Break Detection Systems
-
W. Kloesgen and J. Zytkow, eds, pp, Oxford Univ. Press
-
T. Senator and H. Goldberg, "Break Detection Systems," Handbook of Knowledge Discovery and Data Mining, W. Kloesgen and J. Zytkow, eds., pp. 863-873, Oxford Univ. Press, 2002.
-
(2002)
Handbook of Knowledge Discovery and Data Mining
, pp. 863-873
-
-
Senator, T.1
Goldberg, H.2
-
3
-
-
12244289092
-
Information Awareness: A Prospective Technical Assessment
-
D. Jensen, M. Rattigan, and H. Blau, "Information Awareness: A Prospective Technical Assessment," Proc. Ninth ACM SIGKDD Int'l Conf Knowledge Discovery and Data Mining (KDD '03), pp. 378-387, 2003.
-
(2003)
Proc. Ninth ACM SIGKDD Int'l Conf Knowledge Discovery and Data Mining (KDD '03)
, pp. 378-387
-
-
Jensen, D.1
Rattigan, M.2
Blau, H.3
-
4
-
-
33745765244
-
Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis
-
J. Wang, F. Wang, and D. Zeng, "Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis," Proc. Workshop Intelligence and Security Informatics (WISI '06), vol. 3917, pp. 181-182, 2006.
-
(2006)
Proc. Workshop Intelligence and Security Informatics (WISI '06)
, vol.3917
, pp. 181-182
-
-
Wang, J.1
Wang, F.2
Zeng, D.3
-
5
-
-
0038401985
-
Mapping Networks of Terrorist Cells
-
V. Krebs, "Mapping Networks of Terrorist Cells," Connections, vol. 24, no. 3, pp. 43-52, 2001.
-
(2001)
Connections
, vol.24
, Issue.3
, pp. 43-52
-
-
Krebs, V.1
-
6
-
-
24944475288
-
Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network
-
P. Kantor et al, ed, pp, Springer
-
J. Qin, J. Xu, D. Hu, M. Sageman, and H. Chen, "Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network," Intelligence and Security Informatics, P. Kantor et al., ed., pp. 287-304, Springer, 2005.
-
(2005)
Intelligence and Security Informatics
, pp. 287-304
-
-
Qin, J.1
Xu, J.2
Hu, D.3
Sageman, M.4
Chen, H.5
-
7
-
-
85046981212
-
Total Information Overload
-
editorial, Mar
-
"Total Information Overload," Scientific Am., editorial, Mar. 2003.
-
(2003)
Scientific Am
-
-
-
9
-
-
0008324040
-
Non-Well-Founded Set Theory and the Circular Semantics of Semantic Networks
-
E. Yfantis, ed, pp, Kluwer
-
R. Hill, "Non-Well-Founded Set Theory and the Circular Semantics of Semantic Networks," Intelligent Systems: Third Golden West International Conference: Edited and Selected Papers, E. Yfantis, ed., pp. 375-386, Kluwer, 1995.
-
(1995)
Intelligent Systems: Third Golden West International Conference: Edited and Selected Papers
, pp. 375-386
-
-
Hill, R.1
-
10
-
-
46649085080
-
Modeling, Finding, and Explaining Abnormal Instances in Multi-Relational Networks,
-
PhD dissertation, Dept. of Computer Science, Univ. of Southern California
-
S. Lin, "Modeling, Finding, and Explaining Abnormal Instances in Multi-Relational Networks," PhD dissertation, Dept. of Computer Science, Univ. of Southern California, 2006.
-
(2006)
-
-
Lin, S.1
-
11
-
-
0039845384
-
Efficient Algorithms for Mining Outliers from Large Data Sets
-
S. Ramaswamy, R. Rastogi, and K. Shim, "Efficient Algorithms for Mining Outliers from Large Data Sets," Proc. ACM SIGMOD '00, pp. 427-438, 2000.
-
(2000)
Proc. ACM SIGMOD '00
, pp. 427-438
-
-
Ramaswamy, S.1
Rastogi, R.2
Shim, K.3
-
14
-
-
1642486686
-
The PageRank Citation Ranking: Bringing Order to the Web
-
98, pp
-
L. Page, S. Brin, R. Motwani, and T. Winograd, "The PageRank Citation Ranking: Bringing Order to the Web," Proc. Seventh Int'l World Wide Web Conf. (WWW '98), pp. 161-172, 1998.
-
(1998)
Proc. Seventh Int'l World Wide Web Conf. (WWW
, pp. 161-172
-
-
Page, L.1
Brin, S.2
Motwani, R.3
Winograd, T.4
-
15
-
-
4243148480
-
Authoritative Sources in a Hyperlinked Environment
-
J. Kleinberg, "Authoritative Sources in a Hyperlinked Environment," J. ACM, vol. 46, no. 5, pp. 604-632, 1999.
-
(1999)
J. ACM
, vol.46
, Issue.5
, pp. 604-632
-
-
Kleinberg, J.1
-
17
-
-
23744454242
-
A Cluster Algorithm for Graphs,
-
Technical Report INS-R0010, Nat'l Research Inst. for Math. and Computer Science, Amsterdam, The Netherlands
-
S. Dongen, "A Cluster Algorithm for Graphs," Technical Report INS-R0010, Nat'l Research Inst. for Math. and Computer Science, Amsterdam, The Netherlands, 2000.
-
(2000)
-
-
Dongen, S.1
-
18
-
-
9444291267
-
The KOJAK Group Finder: Connecting the Dots via Integrated Knowledge-Based and Statistical Reasoning
-
J. Adibi, H. Chalupsky, E. Melz, and A. Valente, "The KOJAK Group Finder: Connecting the Dots via Integrated Knowledge-Based and Statistical Reasoning," Proc. 16th Innovative Applications of Artificial Intelligence Conf. (IAAI '04), pp. 800-807, 2004.
-
(2004)
Proc. 16th Innovative Applications of Artificial Intelligence Conf. (IAAI '04)
, pp. 800-807
-
-
Adibi, J.1
Chalupsky, H.2
Melz, E.3
Valente, A.4
-
19
-
-
46649116982
-
-
S. Lin, Generating Natural Language Descriptions for Paths in the Semantic Network, final project report, Dept. of Linguistics, Univ. of Southern California, 2006.
-
S. Lin, "Generating Natural Language Descriptions for Paths in the Semantic Network," final project report, Dept. of Linguistics, Univ. of Southern California, 2006.
-
-
-
-
20
-
-
4243116398
-
Countering Terrorism through Information Technology
-
R. Popp, "Countering Terrorism through Information Technology," Comm. ACM, vol. 47, no. 3, pp. 36-43, 2004.
-
(2004)
Comm. ACM
, vol.47
, Issue.3
, pp. 36-43
-
-
Popp, R.1
-
21
-
-
27344452368
-
Artificial Intelligence for Homeland Security
-
H. Chen and F. Wang, "Artificial Intelligence for Homeland Security," IEEE Intelligent Systems, vol. 20, no. 5, pp. 12-16, 2005.
-
(2005)
IEEE Intelligent Systems
, vol.20
, Issue.5
, pp. 12-16
-
-
Chen, H.1
Wang, F.2
-
22
-
-
20344376408
-
Criminal Network Analysis and Visualization
-
J. Xu and H. Chen, "Criminal Network Analysis and Visualization," Comm. ACM, vol. 48, no. 6, pp. 101-107, 2005.
-
(2005)
Comm. ACM
, vol.48
, Issue.6
, pp. 101-107
-
-
Xu, J.1
Chen, H.2
-
23
-
-
28844486779
-
Intelligence and Security Informatics for National Security: A Knowledge Discovery Perspective
-
H. Chen and J. Xu, "Intelligence and Security Informatics for National Security: A Knowledge Discovery Perspective," Ann. Rev. of Information Science and Technology, vol. 40, pp. 229-289, 2006.
-
(2006)
Ann. Rev. of Information Science and Technology
, vol.40
, pp. 229-289
-
-
Chen, H.1
Xu, J.2
-
24
-
-
84898969742
-
Link Prediction in Relational Data
-
B. Taskar, M.-F. Wong, P. Abbeel, and D. Koller, "Link Prediction in Relational Data," Advances Neural Information Processing Systems - Proc. 17th Ann. Conf Neural Information Processing Systems (NIPS '03), 2004.
-
(2004)
Advances Neural Information Processing Systems - Proc. 17th Ann. Conf Neural Information Processing Systems (NIPS '03)
-
-
Taskar, B.1
Wong, M.-F.2
Abbeel, P.3
Koller, D.4
-
30
-
-
9444219998
-
Using Unsupervised Link Discovery Methods to Find Interesting Facts and Connections in a Bibliography Dataset
-
Dec
-
S. Lin and H. Chalupsky, "Using Unsupervised Link Discovery Methods to Find Interesting Facts and Connections in a Bibliography Dataset," SIGKDD Explorations, vol. 5, no. 2, pp. 173-178, Dec. 2003.
-
(2003)
SIGKDD Explorations
, vol.5
, Issue.2
, pp. 173-178
-
-
Lin, S.1
Chalupsky, H.2
-
31
-
-
26944444029
-
Data Mining in a Nutshell
-
S. Dzeroski and N. Lavrac, eds. pp, Springer
-
S. Dzeroski, "Data Mining in a Nutshell," Relational Data Mining, S. Dzeroski and N. Lavrac, eds. pp. 1-27, Springer, 2001.
-
(2001)
Relational Data Mining
, pp. 1-27
-
-
Dzeroski, S.1
-
33
-
-
84880847368
-
Outlier Detection Using Default Logic
-
F. Angiulli, R. Ben-Eliyahu-Zohary, and L. Palopoli, "Outlier Detection Using Default Logic," Proc. 18th Int'l Joint Conf. Artificial intelligence (IJCAI '03), pp. 833-838, 2003.
-
(2003)
Proc. 18th Int'l Joint Conf. Artificial intelligence (IJCAI '03)
, pp. 833-838
-
-
Angiulli, F.1
Ben-Eliyahu-Zohary, R.2
Palopoli, L.3
-
34
-
-
0034832530
-
Confirmation-Guided Discovery of First-Order Rules with Tertius
-
P. Flach and N. Lachiche, "Confirmation-Guided Discovery of First-Order Rules with Tertius," Machine Learning, vol. 42, nos. 1-2, pp. 61-95, 2001.
-
(2001)
Machine Learning
, vol.42
, Issue.1-2
, pp. 61-95
-
-
Flach, P.1
Lachiche, N.2
-
36
-
-
0002192370
-
Explora: A Multipattern and Multistrategy Discovery Assistant
-
U. Fayyad et al, ed, pp, AAAI/MIT Press
-
W. Klosgen, "Explora: A Multipattern and Multistrategy Discovery Assistant," Advances in Knowledge Discovery and Data Mining, U. Fayyad et al., ed., pp. 249-271, AAAI/MIT Press, 1996.
-
(1996)
Advances in Knowledge Discovery and Data Mining
, pp. 249-271
-
-
Klosgen, W.1
-
38
-
-
7044231011
-
Explanation-Oriented Association Mining Using a Combination of Unsupervised and Super-vised Learning Algorithms
-
Y. Yao, Y. Zhao, and R. Maguire, "Explanation-Oriented Association Mining Using a Combination of Unsupervised and Super-vised Learning Algorithms," Proc. Canadian Conf. Artificial intelligence, pp. 527-531, 2003.
-
(2003)
Proc. Canadian Conf. Artificial intelligence
, pp. 527-531
-
-
Yao, Y.1
Zhao, Y.2
Maguire, R.3
-
39
-
-
8344259850
-
Explanation Oriented Association Mining Using Rough Set Theory
-
Y. Yao, Y. Zhao, and R. Maguire, "Explanation Oriented Association Mining Using Rough Set Theory," Proc. Ninth Int'l Conf Rough Sets, Fuzzy Sets, Data Mining, and Granular-Soft Computing (RSFDGrC '03), pp. 165-172, 2003.
-
(2003)
Proc. Ninth Int'l Conf Rough Sets, Fuzzy Sets, Data Mining, and Granular-Soft Computing (RSFDGrC '03)
, pp. 165-172
-
-
Yao, Y.1
Zhao, Y.2
Maguire, R.3
|