-
1
-
-
11244253079
-
Detecting, Tracking and Counteracting Terrorist Networks via Hidden Markov Models
-
Allanach 2004, Big Sky, MT, March
-
[Allanach 2004] J. Allanach, H. Tu, S. Singh, K. Pattipati and P. Willett, "Detecting, Tracking and Counteracting Terrorist Networks via Hidden Markov Models," IEEE Aerospace Conference, Big Sky, MT, March 2004.
-
(2004)
IEEE Aerospace Conference
-
-
Allanach, J.1
Tu, H.2
Singh, S.3
Pattipati, K.4
Willett, P.5
-
2
-
-
26944464961
-
Generating artificial corpora for plan recognition
-
Blaylock05, Liliana Ardissono, Paul Brna, and Antonija Mitrovic, editors, User Modeling, number in, Springer, Edinburgh, July 24-29
-
[Blaylock05] N. Blaylock and James Allen, "Generating artificial corpora for plan recognition," in Liliana Ardissono, Paul Brna, and Antonija Mitrovic, editors, User Modeling 2005, number 3538 in Lecture Notes in Artificial Intelligence, pages 179-188. Springer, Edinburgh, July 24-29 2005.
-
(2005)
Lecture Notes in Artificial Intelligence
, vol.3538
, pp. 179-188
-
-
Blaylock, N.1
Allen, J.2
-
3
-
-
0032632354
-
An algorithm that learns what's in a name
-
Bikel 1999
-
[Bikel 1999] D. M. Bikel, R. L. Schwartz, and R. M. Weischedel. 1999. An algorithm that learns what's in a name. Machine Learning, vol. 34, no. 1-3.
-
(1999)
Machine Learning
, vol.34
, Issue.1-3
-
-
Bikel, D.M.1
Schwartz, R.L.2
Weischedel, R.M.3
-
4
-
-
44349126877
-
Automatic Information Extraction
-
Boschee 2005, McLean, VA, 2-4 May
-
[Boschee 2005] E. Boschee, R. Weischedel and A. Zamanian, Automatic Information Extraction, Proceedings of the 2005 International Conference on Intelligence Analysis, McLean, VA, 2-4 May 2005.
-
(2005)
Proceedings of the 2005 International Conference on Intelligence Analysis
-
-
Boschee, E.1
Weischedel, R.2
Zamanian, A.3
-
6
-
-
45549095333
-
Speaker Verification using Support Vector Machines and High-Level Features
-
Campbell07, Sept
-
[Campbell07] W. M. Campbell, J. P. Campbell, T. P. Gleason, D. A. Reynolds, and W. Shen, "Speaker Verification using Support Vector Machines and High-Level Features," IEEE Trans. Audio, Speech and Language Processing, Sept. 2007, vol. 15, no. 7, pp. 2085-2094.
-
(2007)
IEEE Trans. Audio, Speech and Language Processing
, vol.15
, Issue.7
, pp. 2085-2094
-
-
Campbell, W.M.1
Campbell, J.P.2
Gleason, T.P.3
Reynolds, D.A.4
Shen, W.5
-
7
-
-
70349087604
-
-
[Carley 2007] Carley, Kathleen. Destabilizing Terrorist Networks, Proceedings of the 8th International Command and Control Research and Technology Symposium, conference held at the National Defense War College, Washington DC. Evidence Based Research, Track 3, Electronic Publication.
-
[Carley 2007] Carley, Kathleen. "Destabilizing Terrorist Networks, "Proceedings of the 8th International Command and Control Research and Technology Symposium, conference held at the National Defense War College, Washington DC. Evidence Based Research, Track 3, Electronic Publication.
-
-
-
-
8
-
-
58249091502
-
ORA User's Guide 2008. Carnegie Mellon University, School of Computer Science, Institute for Software Research
-
Carley 2008, Technical Report CMU-ISR-08-125
-
[Carley 2008] Carley, Kathleen & Columbus, Dave & DeReno, Matt & Reminga, Jeffrey & Moon, Il-Chul. (2008). ORA User's Guide 2008. Carnegie Mellon University, School of Computer Science, Institute for Software Research, Technical Report CMU-ISR-08-125
-
(2008)
-
-
Carley, K.1
Columbus, D.2
DeReno, M.3
Reminga, J.4
Moon, I.-C.5
-
9
-
-
70349128029
-
-
[Chakrabarti 2004] D. Chakrabarti, Y. Zhan, and C. Faloutsos. R-mat: A recursive model for graph mining. In SDM, 2004.
-
[Chakrabarti 2004] D. Chakrabarti, Y. Zhan, and C. Faloutsos. R-mat: A recursive model for graph mining. In SDM, 2004.
-
-
-
-
10
-
-
11244303741
-
Dynamic Classification of Groups Through Social Network Analysis and HMMs
-
Coffman 2004
-
[Coffman 2004] Thayne R. Coffman, Sherry E. Marcus, Dynamic Classification of Groups Through Social Network Analysis and HMMs, 2004 IEEE Aerospace Conference Proceedings.
-
(2004)
IEEE Aerospace Conference Proceedings
-
-
Coffman, T.R.1
Marcus, S.E.2
-
13
-
-
70349132539
-
-
[Diesner 2005] Diesner, Jana & Carley, Kathleen. (2005). Exploration of Communication Networks from the Enron Email Corpus. Proceedings of the Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining 2005, pp. 3-14. Newport Beach, CA, April 21-23, 2005., 3-14.
-
[Diesner 2005] Diesner, Jana & Carley, Kathleen. (2005). Exploration of Communication Networks from the Enron Email Corpus. Proceedings of the Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining 2005, pp. 3-14. Newport Beach, CA, April 21-23, 2005., 3-14.
-
-
-
-
14
-
-
85026954488
-
The Automatic Content Extraction (ACE) Program Tasks, Data, and Evaluation
-
Doddington 2004
-
[Doddington 2004] G. Doddington, A. Mitchell, M. Pryzbocki, L. Ramshaw, S. Strassel, R. Weischedel, The Automatic Content Extraction (ACE) Program Tasks, Data, and Evaluation, Proceeding of LREC 2004 Conference on Language resources and Evaluation
-
Proceeding of LREC 2004 Conference on Language resources and Evaluation
-
-
Doddington, G.1
Mitchell, A.2
Pryzbocki, M.3
Ramshaw, L.4
Strassel, S.5
Weischedel, R.6
-
15
-
-
70349140820
-
Who's Calling? Deriving Organization Structure from Communication Records
-
Gerdes07, ed. Alexander Kott
-
[Gerdes07] D. A. Gerdes, C. Glymour, and J. Ramsey, "Who's Calling? Deriving Organization Structure from Communication Records," in Information Warfare and Organizational Decision Making, ed. Alexander Kott, 2007.
-
(2007)
Information Warfare and Organizational Decision Making
-
-
Gerdes, D.A.1
Glymour, C.2
Ramsey, J.3
-
18
-
-
70349143722
-
-
[Jakarta 2004 Wikipedia], 2004 Australian Embassy Bombing,http://en.wikipedia.org/wiki/2004-Australian-embassy-bombing.
-
[Jakarta 2004 Wikipedia], "2004 Australian Embassy Bombing,"http://en.wikipedia.org/wiki/2004-Australian-embassy-bombing. "
-
-
-
-
19
-
-
70349122907
-
-
November 2007
-
[Jensen 2007] Proximity 4.3 QGraph Guide, November 2007, http://kdl.cs.umass.edu/proximity/documentation/QGraphGuide.pdf.
-
(2007)
Proximity 4.3 QGraph Guide
-
-
Jensen1
-
20
-
-
33749014952
-
Nine Cautionary Tales
-
Kumagi06] J. Kumagi, ed, Sept
-
[Kumagi06] J. Kumagi, ed., "Nine Cautionary Tales," IEEE Spectrum, Sept. 2006, pp. 36-45.
-
(2006)
IEEE Spectrum
, pp. 36-45
-
-
-
21
-
-
38049146447
-
-
[McCallum 2007] Joint Group and Topic Discovery from Relations and Text. Andrew McCallum, Xuerui Wang and Natasha Mohanty, Statistical Network Analysis: Models, Issues and New Directions, Lecture Notes in Computer Science 4503, pp. 28-44, (Book chapter), 2007
-
[McCallum 2007] Joint Group and Topic Discovery from Relations and Text. Andrew McCallum, Xuerui Wang and Natasha Mohanty, Statistical Network Analysis: Models, Issues and New Directions, Lecture Notes in Computer Science 4503, pp. 28-44, (Book chapter), 2007
-
-
-
-
22
-
-
33947664999
-
Relational Dependency Networks
-
Neville 2007, March
-
[Neville 2007] Neville, J. and D. Jensen, Relational Dependency Networks. Journal of Machine Learning Research. 8 (March, 2007): 653-692. http://jmlr.csail.mit.edu/papers/volume8/neville07a/neville07a.pdf
-
(2007)
Journal of Machine Learning Research
, vol.8
, pp. 653-692
-
-
Neville, J.1
Jensen, D.2
-
23
-
-
33745012299
-
Modularity and community structure in networks
-
Newman 2006
-
[Newman 2006] M. E. J. Newman (2006). "Modularity and community structure in networks". Proc. Natl. Acad. Sci. USA 103: 8577-8582
-
(2006)
Proc. Natl. Acad. Sci. USA
, vol.103
, pp. 8577-8582
-
-
Newman, M.E.J.1
-
24
-
-
70349118935
-
Automatic Content Extraction
-
[NIST08] "Automatic Content Extraction: 2008 Evaluation Plan," http://www.nist.gov/speech/tests/ace.
-
(2008)
Evaluation Plan
-
-
-
26
-
-
70349102400
-
-
[Popp 2006] R. Popp and J. Yen (editors): Emergent Information Technologies and Enabling Policies for Counter-Terrorism (in this comprehensive reference see especially chapter 2, Hidden Markov Models and Bayesian Networks for Counter-Terrorism by K. Pattipati, et. al.), IEEE Press, 2006
-
[Popp 2006] R. Popp and J. Yen (editors): Emergent Information Technologies and Enabling Policies for Counter-Terrorism (in this comprehensive reference see especially chapter 2, Hidden Markov Models and Bayesian Networks for Counter-Terrorism by K. Pattipati, et. al.), IEEE Press, 2006
-
-
-
-
27
-
-
33751519336
-
Collaborative Tools for Counter-Terrorism Analysis
-
Popp 2005, Big Sky, MT, March
-
[Popp 2005] R. Popp, K. Pattipati, P. Willett, D. Serfaty, W. Stacy, K. Carley, J. Allanach, H. Tu and S. Singh, "Collaborative Tools for Counter-Terrorism Analysis," IEEE Aerospace Conference, Big Sky, MT, March 2005.
-
(2005)
IEEE Aerospace Conference
-
-
Popp, R.1
Pattipati, K.2
Willett, P.3
Serfaty, D.4
Stacy, W.5
Carley, K.6
Allanach, J.7
Tu, H.8
Singh, S.9
-
28
-
-
84889371790
-
-
Pattipati 2006, R. Popp and J. Yen (editors) Emergent Information Technologies and Enabling Policies for Counter Terrorism, Wiley-IEEE Press, May
-
[Pattipati 2006] K. R. Pattipati, P.K. Willett, J. Allanach, H. Tu and S. Singh, "Hidden Markov Models and Bayesian Networks for Counter-terrorism," R. Popp and J. Yen (editors) Emergent Information Technologies and Enabling Policies for Counter Terrorism, Wiley-IEEE Press, May 2006, pp. 27-50.
-
(2006)
Hidden Markov Models and Bayesian Networks for Counter-terrorism
, pp. 27-50
-
-
Pattipati, K.R.1
Willett, P.K.2
Allanach, J.3
Tu, H.4
Singh, S.5
-
29
-
-
46649106463
-
Games and Terrorism: Recent Developments
-
Sandler08, Sep
-
[Sandler08] Todd Sandler and Kevin Siqueira, "Games and Terrorism: Recent Developments," Simulation & Gaming, Sep 2003; vol. 34: pp. 319-337.
-
(2003)
Simulation & Gaming
, vol.34
, pp. 319-337
-
-
Sandler, T.1
Siqueira, K.2
-
30
-
-
34548142205
-
An Advanced System for Modeling Asymmetric Threats
-
Singh06, Man, and Cybernetics, October
-
[Singh06] S. Singh, W. Donat, J. Lu, K. Pattipati, and P. Willett, "An Advanced System for Modeling Asymmetric Threats," IEEE International Conference on Systems, Man, and Cybernetics, October 2006.
-
(2006)
IEEE International Conference on Systems
-
-
Singh, S.1
Donat, W.2
Lu, J.3
Pattipati, K.4
Willett, P.5
|