Sold Out
Book Categories |
Ch. 1 | Utilizing information and social science technology to understand and counter the twenty-first century strategic threat | 1 |
Ch. 2 | Hidden Markov models and Bayesian networks for counter-terrorism | 27 |
Ch. 3 | Anticipatory models for counter-terrorism | 51 |
Ch. 4 | Information processing at very high speed data ingestion rates | |
Ch. 5 | Analysis of heterogeneous data in ultrahigh dimensions | 105 |
Ch. 6 | Semantic Web technologies for terrorist network analysis | 125 |
Ch. 7 | Improving national and homeland security through context knowledge representation and reasoning technologies | 139 |
Ch. 8 | Anonymized semantic directories and a privacy-enhancing architecture for enterprise discovery | 165 |
Ch. 9 | Facilitating information sharing across intelligence community boundaries using knowledge management and semantic Web technologies | 175 |
Ch. 10 | Applying semantic Web reasoning to counter-terrorism | 197 |
Ch. 11 | Schemer : consensus-based knowledge validation and collaboration services for virtual teams of intelligence experts | 209 |
Ch. 12 | Sharing intelligence using information supply chains | 231 |
Ch. 13 | Supporting knowledge management in emergency crisis management domains : envisioned designs for collaborative work | 255 |
Ch. 14 | Agent-based simulations for disaster rescue using the DEFACTO coordination system | 281 |
Ch. 15 | Transcending the Tower of Babel : supporting access to multilingual information with cross-language information retrieval | 299 |
Ch. 16 | Journey from analysis to inquiry : technology and transformation of counter-terrorism analysis | 315 |
Ch. 17 | Behavioral network analysis for terrorist detection | 331 |
Ch. 18 | Detecting terrorist activities in the twenty-first century : a theory of detection for transactional networks | 349 |
Ch. 19 | Social network analysis via matrix decompositions | 367 |
Ch. 20 | Legal standards for data mining | 393 |
Ch. 21 | Privacy and consequences : legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty | 421 |
Ch. 22 | Designing technical systems to support policy : enterprise architecture, policy appliances, and civil liberties | 439 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionEmergent Information Technolog
X
This Item is in Your InventoryEmergent Information Technolog
X
You must be logged in to review the productsX
X
X
Add Emergent Information Technolog, Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, connecting the dots has become the watchword for using information and intelligence to p, Emergent Information Technolog to the inventory that you are selling on WonderClubX
X
Add Emergent Information Technolog, Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, connecting the dots has become the watchword for using information and intelligence to p, Emergent Information Technolog to your collection on WonderClub |