咨询与建议

限定检索结果

文献类型

  • 11 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 13 篇 计算机科学与技术...
    • 6 篇 电气工程
    • 2 篇 信息与通信工程
    • 2 篇 土木工程
    • 2 篇 交通运输工程
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...

主题

  • 18 篇 intelligence and...
  • 3 篇 text classificat...
  • 3 篇 mining user gene...
  • 3 篇 mutual informati...
  • 2 篇 ontology mapping
  • 2 篇 homeland securit...
  • 2 篇 social network a...
  • 2 篇 border and trans...
  • 2 篇 public safety in...
  • 2 篇 infectious disea...
  • 2 篇 tumblr
  • 2 篇 machine learning
  • 2 篇 social computing
  • 2 篇 social media ana...
  • 1 篇 scale-free prope...
  • 1 篇 business intelli...
  • 1 篇 user technology ...
  • 1 篇 database develop...
  • 1 篇 information shar...
  • 1 篇 data privacy

机构

  • 6 篇 univ arizona dep...
  • 3 篇 abb corp res ban...
  • 2 篇 chinese acad sci...
  • 2 篇 univ arizona dep...
  • 1 篇 virginia tech bl...
  • 1 篇 univ arizona dep...
  • 1 篇 indraprasath ins...
  • 1 篇 fayetteville sta...
  • 1 篇 fayetteville sta...
  • 1 篇 stetson universi...
  • 1 篇 univ regina dept...
  • 1 篇 drexel univ coll...
  • 1 篇 university of ar...
  • 1 篇 chinese acad sci...
  • 1 篇 sarl new delhi
  • 1 篇 univ arizona dep...
  • 1 篇 iiit delhi new d...
  • 1 篇 indraprastha ins...
  • 1 篇 guangzhou univ c...
  • 1 篇 villanova univer...

作者

  • 5 篇 sureka ashish
  • 5 篇 agarwal swati
  • 4 篇 chen hsinchun
  • 3 篇 zeng d
  • 3 篇 wang fy
  • 3 篇 kaza siddharth
  • 2 篇 chen hc
  • 2 篇 wingyan chung
  • 1 篇 homa atabakhsh
  • 1 篇 ray villalobos
  • 1 篇 hsinchun chen
  • 1 篇 goyal vikram
  • 1 篇 yao yy
  • 1 篇 wang hui
  • 1 篇 edward carr
  • 1 篇 tian zhihong
  • 1 篇 siddharth kaza
  • 1 篇 hu paul jen-hwa
  • 1 篇 wang tao
  • 1 篇 wang j

语言

  • 18 篇 英文
检索条件"主题词=Intelligence and security informatics"
18 条 记 录,以下是11-20 订阅
排序:
intelligence and security informatics for homeland security: Information, communication, and transportation
收藏 引用
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 2004年 第4期5卷 329-341页
作者: Chen, HC Wang, FY Zeng, D Univ Arizona Dept Management Informat Syst Tucson AZ 85721 USA Chinese Acad Sci Key Lab Complex Syst & Intelligent Sci Beijing 100080 Peoples R China Univ Arizona Dept Syst & Ind Engn Tucson AZ 85721 USA
intelligence and security informatics (ISI) is an emerging field of study aimed at developing advanced information technologies, systems, algorithms, and databases for national- and homeland-security-related applicati... 详细信息
来源: 评论
intelligence and security informatics for homeland security: Information, communication, and transportation
Intelligence and security informatics for homeland security:...
收藏 引用
7th IEEE International Conference on Intelligent Transportation Systems
作者: Chen, HC Wang, FY Zeng, D Univ Arizona Dept Management Informat Syst Tucson AZ 85721 USA Chinese Acad Sci Key Lab Complex Syst & Intelligent Sci Beijing 100080 Peoples R China Univ Arizona Dept Syst & Ind Engn Tucson AZ 85721 USA
intelligence and security informatics (ISI) is an emerging field of study aimed at developing advanced information technologies, systems, algorithms, and databases for national- and homeland-security-related applicati... 详细信息
来源: 评论
Evaluating ontology mapping techniques: An experiment in public safety information sharing
收藏 引用
DECISION SUPPORT SYSTEMS 2008年 第4期45卷 714-728页
作者: Kaza, Siddharth Chen, Hsinchun Univ Arizona Dept Management Informat Syst Tucson AZ 85721 USA
The public safety community in the United States consists of thousands of local, state, and federal agencies, each with its own information system. In the past few years, there has been a thrust on the seamless intero... 详细信息
来源: 评论
Information sharing and privacy protection of terrorist or criminal social networks
Information sharing and privacy protection of terrorist or c...
收藏 引用
IEEE International Conference on intelligence and security informatics (ISI 2008)
作者: Yang, Christopher C. Drexel Univ Coll Informat Sci & Technol Philadelphia PA 19104 USA
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete terrorist or criminal social network an... 详细信息
来源: 评论
Evaluating ontology mapping techniques: An experiment in public safety information sharing
Evaluating ontology mapping techniques: An experiment in pub...
收藏 引用
15th Workshop on Information Technology and Systems (WITS 2005)
作者: Kaza, Siddharth Chen, Hsinchun Univ Arizona Dept Management Informat Syst Tucson AZ 85721 USA
The public safety community in the United States consists of thousands of local, state, and federal agencies, each with its own information system. In the past few years, there has been a thrust on the seamless intero... 详细信息
来源: 评论
Enhancing border security: Mutual information analysis to identify suspect vehicles
收藏 引用
DECISION SUPPORT SYSTEMS 2007年 第1期43卷 199-210页
作者: Kaza, Siddharth Wang, Yuan Chen, Hsinchun Univ Arizona Dept Management Informat Syst Eller Coll Management Tucson AZ 85721 USA Univ Arizona Dept Econ Eller Coll Management Tucson AZ 85721 USA
In recent years border safety has been identified as a critical part of homeland security. The Department of Homeland security searches vehicles entering the country for drugs and other contraband. Customs and Border ... 详细信息
来源: 评论
Predicting criminal relationships using multivariate survival analysis  07
Predicting criminal relationships using multivariate surviva...
收藏 引用
Proceedings of the 8th annual international conference on Digital government research: bridging disciplines & domains
作者: Siddharth Kaza Daning Hu Homa Atabakhsh Hsinchun Chen University of Arizona Tucson AZ
Criminal networks evolve over time with the formation and dissolution of links to survive control efforts by government authorities. Previous studies have shown that the link formation process in such networks is infl... 详细信息
来源: 评论
Rule plus exception strategies for security information analysis
收藏 引用
IEEE INTELLIGENT SYSTEMS 2005年 第5期20卷 52-57页
作者: Yao, YY Wang, FY Zeng, D Wang, J Univ Regina Dept Comp Sci Regina SK S4S 0A2 Canada Univ Arizona Dept Syst & Ind Engn Program Adv Res Complex Syst Tucson AZ 85721 USA Chinese Acad Sci Inst Automat Beijing 10080 Peoples R China Univ Arizona Dept Management Informat Syst Tucson AZ 85721 USA
Knowledge representation based on rule + exception strategies has strong cognitive roots and can play an important role in the design and implementation of intelligent information systems, including those motivated by... 详细信息
来源: 评论