Search Results

There are 38017 results for: content related to: Transcending the Tower of Babel: Supporting Access to Multilingual Information with Cross-Language Information Retrieval

  1. You have free access to this content
    Frontmatter

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    Robert L. Popp, John Yen, Pages: i–xv, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.fmatter

  2. Anticipatory Models for Counter-Terrorism

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    Mark Lazaroff, David Snowden, Pages: 51–73, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.ch3

  3. Hidden Markov Models and Bayesian Networks for Counter-Terrorism

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    Krishna Pattipati, Peter Willett, Jeffrey Allanach, Haiying Tu, Satnam Singh, Pages: 27–50, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.ch2

  4. You have free access to this content
    Index

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    Robert L. Popp, John Yen, Pages: 459–465, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.index

  5. Schemer: Consensus-Based Knowledge Validation and Collaboration Services for Virtual Teams of Intelligence Experts

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    Clifford Behrens, Hyong-Sop Shim, Devaisis Bassu, Pages: 209–230, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.ch11

  6. Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    Robert L. Popp, John Yen, Pages: 439–457, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.ch22

  7. Social Network Analysis via Matrix Decompositions

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    Robert L. Popp, John Yen, Pages: 367–391, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.ch19

  8. Utilizing Information and Social Science Technology to Understand and Counter the Twenty-First Century Strategic Threat

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    Robert L. Popp, David Allen, Claudio Cioffi-Revilla, Pages: 1–25, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.ch1

  9. Analysis of Heterogeneous Data in Ultrahigh Dimensions

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    R. A. Ammar, S. A. Demurjian, I. R. Greenshields, K. Pattipati, S. Rajasekaran, Pages: 105–124, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.ch5

  10. Facilitating Information Sharing Across Intelligence Community Boundaries Using Knowledge Management and Semantic Web Technologies

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    Brian Kettler, Gary Edwards, Mark Hoffman, Pages: 175–195, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.ch9

  11. Applying Semantic Web Reasoning to Counter-Terrorism

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    Paul Kogut, Yui Leung, Kathleen M. Ryan, Linda Gohari, Mieczyslaw M. Kotar, Jerzy J. Letkowski, Pages: 197–208, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.ch10

  12. Privacy and Consequences: Legal and Policy Structures for Implementing New Counter-Terrorism Technologies and Protecting Civil Liberty

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    Robert L. Popp, John Yen, Pages: 421–438, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.ch21

  13. Agent-Based Simulations for Disaster Rescue Using the DEFACTO Coordination System

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    Janusz Marecki, Nathan Schurr, Milind Tambe, Pages: 281–297, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.ch14

  14. Detecting Terrorist Activities in the Twenty-First Century: A Theory of Detection for Transactional Networks

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    Tom Mifflin, Chris Boner, Greg Godfrey, Michael Greenblatt, Pages: 349–365, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.ch18

  15. Information Processing at Very High Speed Data Ingestion Rates

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    J. Brian Sharkey, D. Weishar, J. W. Lockwood, R. Loui, R. Rohwer, J. Byrnes, K. Pattipati, S. Eick, D. Cousins, M. Nicoletti, Pages: 75–104, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.ch4

  16. Anonymized Semantic Directories and a Privacy-Enhancing Architecture for Enterprise Discovery

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    Jeff Jonas, John Karat, Pages: 165–174, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.ch8

  17. Legal Standards for Data Mining

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    Robert L. Popp, John Yen, Pages: 393–420, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.ch20

  18. Behavioral Network Analysis for Terrorist Detection

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    Seth A. Greenblatt, Thayne Coffman, Sherry E. Marcus, Pages: 331–347, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.ch17

  19. Improving National and Homeland Security Through Context Knowledge Representation and Reasoning Technologies

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    Nazli Choucri, Stuart E. Madnick, Michael D. Siegel, Pages: 139–163, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.ch7

  20. Sharing Intelligence Using Information Supply Chains

    Emergent Information Technologies and Enabling Policies for Counter-Terrorism

    Shuang Sun, Xiaocong Fan, John Yen, Pages: 231–253, 2005

    Published Online : 7 OCT 2005, DOI: 10.1002/047178656X.ch12