Matches in Library of Congress for { <http://lccn.loc.gov/2006299648> ?p ?o. }
Showing items 1 to 29 of
29
with 100 items per page.
- 2006299648 contributor B10498805.
- 2006299648 created "c2006.".
- 2006299648 date "2006".
- 2006299648 date "c2006.".
- 2006299648 dateCopyrighted "c2006.".
- 2006299648 description "Includes bibliographical references and index.".
- 2006299648 description "Utilizing information and social science technology to understand and counter the twenty-first century strategic threat / Robert L. Popp, David Allen, and Claudio Cioffi-Revilla -- Hidden Markov models and Bayesian networks for counter-terrorism / Krishna Pattipati ... [et al.] -- Anticipatory models for counter-terrorism / Mark Lazaroff and David Snowden -- Information processing at very high speed data ingestion rates / J. Brian Sharkey ... [et al.] -- Analysis of heterogeneous data in ultrahigh dimensions / R.A. Ammar ... [et al.] -- Sematic web technologies for terrorist network analysis / Jennifer Golbeck, Aaron Mannes, and James Hendler -- Improving national and homeland security through context knowledge representation and reasoning technologies / Nazli Choucri, Stuart E. Madnick, and Michael D. Siegel -- Anonymized semantic directories and a privacy-enhancing architecture for enterprise discovery / Jeff Jonas and John Karat -- Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies / Brian Kettler, Gary Edwards, and Mark Hoffman -- Applying semantic web reasoning to counter-terrorism / Paul Kogut ... [et al.] -- Schemer : consensus-based knowledge validation and collaboration services for virtual teams of intelligence experts / Clifford Behrens, Hyong-Sop Shim, and Davaisis Bassu -- Sharing intelligence using information supply chains / Shuang Sun, Xiaocong Fan, and John Yen -- Supporting knowledge management in emergency crisis management domains : envisioned designs for collaborative work / Michael D. McNeese .. [et al.] -- Agent-based simulations for disaster rescue using the DEFACTO coordination system / Janusz Marecki, Nathan Schurr, and Milind Tambe -- Transcending the tower of Babel : supporting access to multilingual information with cross-language information retrieval / Douglas W. Oard -- Journey from analysis to inquiry : technology and transformation of counter-teorrorism analysis / Aaron B. Frank and Desmond Saunders-Newton -- Behavioral network analysis for terrorist detection / Seth A. Greenblatt, Thayne Coffman, and Sherry E. Marcus -- Detecting terrorist activities in the twenty-first century : a theory of detection for transactional networks / Tom Mifflin ... [et al.] -- Social network analysis via matrix decompositions / D.B. Skillicorn -- Legal standards for data mining / Fred H. Cate -- Privacy and consequences : legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty / Paul Rosenzweig -- Designing technical systems to support policy : enterprise architecture, policy appliances and civil liberties / K.A. Taipale.".
- 2006299648 extent "xv, 468 p. :".
- 2006299648 identifier "0471776157".
- 2006299648 identifier "9780471776154".
- 2006299648 identifier 2006299648-d.html.
- 2006299648 identifier 2006299648-b.html.
- 2006299648 identifier 2006299648.html.
- 2006299648 isPartOf "IEEE series on computational intelligence.".
- 2006299648 issued "2006".
- 2006299648 issued "c2006.".
- 2006299648 language "eng".
- 2006299648 publisher "Hoboken, N.J. : Wiley-Interscience ; Chichester : John Wiley [distributor],".
- 2006299648 spatial "United States".
- 2006299648 spatial "United States.".
- 2006299648 subject "363.3202854 22".
- 2006299648 subject "HV6431 .E487 2006".
- 2006299648 subject "Information technology Government policy United States.".
- 2006299648 subject "Terrorism Government policy United States.".
- 2006299648 subject "Terrorism Technological innovations United States.".
- 2006299648 subject "Terrorism United States Prevention.".
- 2006299648 tableOfContents "Utilizing information and social science technology to understand and counter the twenty-first century strategic threat / Robert L. Popp, David Allen, and Claudio Cioffi-Revilla -- Hidden Markov models and Bayesian networks for counter-terrorism / Krishna Pattipati ... [et al.] -- Anticipatory models for counter-terrorism / Mark Lazaroff and David Snowden -- Information processing at very high speed data ingestion rates / J. Brian Sharkey ... [et al.] -- Analysis of heterogeneous data in ultrahigh dimensions / R.A. Ammar ... [et al.] -- Sematic web technologies for terrorist network analysis / Jennifer Golbeck, Aaron Mannes, and James Hendler -- Improving national and homeland security through context knowledge representation and reasoning technologies / Nazli Choucri, Stuart E. Madnick, and Michael D. Siegel -- Anonymized semantic directories and a privacy-enhancing architecture for enterprise discovery / Jeff Jonas and John Karat -- Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies / Brian Kettler, Gary Edwards, and Mark Hoffman -- Applying semantic web reasoning to counter-terrorism / Paul Kogut ... [et al.] -- Schemer : consensus-based knowledge validation and collaboration services for virtual teams of intelligence experts / Clifford Behrens, Hyong-Sop Shim, and Davaisis Bassu -- Sharing intelligence using information supply chains / Shuang Sun, Xiaocong Fan, and John Yen -- Supporting knowledge management in emergency crisis management domains : envisioned designs for collaborative work / Michael D. McNeese .. [et al.] -- Agent-based simulations for disaster rescue using the DEFACTO coordination system / Janusz Marecki, Nathan Schurr, and Milind Tambe -- Transcending the tower of Babel : supporting access to multilingual information with cross-language information retrieval / Douglas W. Oard -- Journey from analysis to inquiry : technology and transformation of counter-teorrorism analysis / Aaron B. Frank and Desmond Saunders-Newton -- Behavioral network analysis for terrorist detection / Seth A. Greenblatt, Thayne Coffman, and Sherry E. Marcus -- Detecting terrorist activities in the twenty-first century : a theory of detection for transactional networks / Tom Mifflin ... [et al.] -- Social network analysis via matrix decompositions / D.B. Skillicorn -- Legal standards for data mining / Fred H. Cate -- Privacy and consequences : legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty / Paul Rosenzweig -- Designing technical systems to support policy : enterprise architecture, policy appliances and civil liberties / K.A. Taipale.".
- 2006299648 title "Emergent information technologies and enabling policies for counter-terrorism / edited by Robert L. Popp, John Yen.".
- 2006299648 type "text".