The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase counter-terrorism (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2006 (42) 2007-2009 (19) 2010-2016 (15) 2018-2023 (16) 2024 (1)
Publication types (Num. hits)
article(28) book(1) incollection(22) inproceedings(42)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 46 occurrences of 42 keywords

Results
Found 93 publication records. Showing 93 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
116Krishna R. Pattipati, Peter Willett 0001, Jefferey Allanach, Haiying Tu, Satnam Singh Hidden Markov Models and Bayesian Networks for Counter-Terrorism. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
116Mark Lazaroff, David Snowden Anticipatory Models for Counter-Terrorism. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
116Paul A. Kogut, Yui Leung, Kathleen Ryan, Linda Gohari, Mieczyslaw M. Kokar, Jerzy Letkowski Applying Semantic Web Reasoning to Counter-Terrorism. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
116Aaron B. Frank, Desmond Saunders-Newton Journey from Analysis to Inquiry: Technology and Transformation of Counter-Terrorism Analysis. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
116Paul Rosenzweig Privacy and Consequences: Legal and Policy Structures for Implementing New Counter-Terrorism Technologies and Protecting Civil Liberty. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
105Avishag Gordon Homeland security literature in relation to terrorism publications: The source and the response. Search on Bibsonomy Scientometrics The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
97JinKyu Lee 0003, H. Raghav Rao Understanding Socio-Technical Environments for Acceptance of Inter-Agency Anti/Counter-Terrorism Information Sharing Systems. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
87Brian P. Kettler, Gary Edwards, Mark Hoffman Facilitating Information Sharing Across Intelligence Community Boundaries Using Knowledge Management and Semantic Web Technologies. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
87Jennifer Golbeck, Aaron Mannes, James A. Hendler Semantic Web Technologies for Terrorist Network Analysis. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
87 Legal Standards for Data Mining. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
87Janusz Marecki, Nathan Schurr, Milind Tambe Agent-Based Simulations for Disaster Rescue Using the DEFACTO Coordination System. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
87Reda A. Ammar, Steven A. Demurjian, Ian R. Greenshields, Krishna R. Pattipati, Sanguthevar Rajasekaran Analysis of Heterogeneous Data in Ultrahigh Dimensions. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
87Michael D. McNeese, Isaac Brewer, Rashaad E. T. Jones, Erik S. Connors Supporting Knowledge Management In Emergency Crisis Management Domains: Envisioned Designs for Collaborative Work. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
87Seth Greenblatt, Thayne Coffman, Sherry Marcus Behavioral Network Analysis for Terrorist Detection. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
87J. Brian Sharkey, Doyle Weishar, John W. Lockwood, Ron Loui, Richard Rohwer, John Byrnes, Krishna R. Pattipati, Stephen G. Eick, David Cousins, Michael Nicoletti Information Processing at Very High Speed Data Ingestion Rates. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
87Kim A. Taipale Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
87Shuang Sun, Xiaocong Fan, John Yen Sharing Intelligence Using Information Supply Chains. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
87Douglas W. Oard Transcending the Tower of Babel: Supporting Access to Multilingual Information with Cross-Language Information Retrieval. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
87Jeff Jonas, John Karat Anonymized Semantic Directories and a Privacy-Enhancing Architecture for Enterprise Discovery. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
87Tom Mifflin, Chris Boner, Greg Godfrey, Michael Greenblatt Detecting Terrorist Activities in the Twenty-First Century: A Theory of Detection for Transactional Networks. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
87Clifford Behrens, Hyong Sop Shim, Devasis Bassu Schemer: Consensus-Based Knowledge Validation and Collaboration Services for Virtual Teams of Intelligence Experts. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
87David B. Skillicorn Social Network Analysis Via Matrix Decompositions. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
87Nazli Choucri, Stuart E. Madnick, Michael D. Siegel Improving National and Homeland Security Through Context Knowledge Representation and Reasoning Technologies. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
87Robert L. Popp, David Allen, Claudio Cioffi-Revilla Utilizing Information and Social Science Technology to Understand and Counter the Twenty-First Century Strategic Threat 1. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
84JinKyu Lee 0003, H. Raghav Rao Exploring the causes and effects of inter-agency information sharing systems adoption in the anti/counter-terrorism and disaster management domains. Search on Bibsonomy DG.O The full citation details ... 2007 DBLP  BibTeX  RDF anti/counter-terrorism, information sharing, disaster management, inter-organizational systems
65H. Raghav Rao, JinKyu Lee 0003 Citizen centric analysis of anti/counter-terrorism e-government services. Search on Bibsonomy DG.O The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anti-/counter-terrorism (ACT), channel choice, source choice, e-government, user acceptance, public safety
49Hsinchun Chen Exploring Extremism and Terrorism on the Web: The Dark Web Project. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF terrorism informatics, dark web, intelligence and security informatics
48JinKyu Lee 0003, H. Raghav Rao Citizen centric analysis of anti/counter-terrorism e-government services. Search on Bibsonomy DG.O The full citation details ... 2007 DBLP  BibTeX  RDF
48Richard M. Adler A Dynamic Social Network Software Platform for Counter-Terrorism Decision Support. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
48Paul Andrew Watters e-Learning for policing, intelligence and counter-terrorism: Performance. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Don Radlauer Rational Choice Deterrence and Israeli Counter-Terrorism. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Chris Arney, Zachary Silvis, Matthew Thielen, Jeff Yao Modeling the Complexity of the Terrorism/Counter-Terrorism Struggle: Mathematics of the "Hearts and Minds". Search on Bibsonomy Int. J. Oper. Res. Inf. Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
47Alvin M. Saperstein Mathematical modeling of the interaction between terrorism and counter-terrorism and its policy implications. Search on Bibsonomy Complex. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47Robert J. Latino The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41JinKyu Lee 0003, H. Raghav Rao Perceived risks, counter-beliefs, and intentions to use anti-/counter-terrorism websites: An exploratory study of government-citizens online interactions in a turbulent environment. Search on Bibsonomy Decis. Support Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Mariusz Chmielewski, Andrzej Galka, Piotr Jarema, Kamil Krasowski, Artur Kosinski Semantic Knowledge Representation in Terrorist Threat Analysis for Crisis Management Systems. Search on Bibsonomy ICCCI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF counter-terrorism, GTD, ontology, GIS, decision support, crisis management
36Bhavani Thuraisingham Data Mining, National Security, Privacy and Civil Liberties. Search on Bibsonomy SIGKDD Explor. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF counter-terrorism, privacy constraints, privacy problem, privacy sensitive data mining, security constraints, data mining, privacy, World Wide Web, national security, inference problem, civil liberties
31Peter S. Probst Measuring Success in Countering Terrorism: Problems and Pitfalls. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Jaspal Kaur Saini, Divya Bansal Computational techniques to counter terrorism: a systematic survey. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
29Fahad Ali Khan, Gang Li, Anam Nawaz Khan, Qazi Waqas Khan, Myriam Hadjouni, Hela Elmannai AI-Driven Counter-Terrorism: Enhancing Global Security Through Advanced Predictive Analytics. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
29Marguerite Borelli Social media corporations as actors of counter-terrorism. Search on Bibsonomy New Media Soc. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
29Giuseppe Cascavilla, Damian A. Tamburri, Francesco Leotta, Massimo Mecella, Willem-Jan van den Heuvel Counter-terrorism in cyber-physical spaces: Best practices and technologies from the state of the art. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
29Giuseppe Cascavilla, Damian A. Tamburri, Francesco Leotta, Massimo Mecella, Willem-Jan van den Heuvel Counter-terrorism in cyber-physical spaces: Best practices and technologies from the state of the art. Search on Bibsonomy Inf. Softw. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
29Alicia Schmidt Virtual assets: compelling a new anti-money laundering and counter-terrorism financing regulatory model. Search on Bibsonomy Int. J. Law Inf. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
29Vadim Azhmyakov, Erik I. Verriest, Moisés E. Bonilla, Stefan Pickl Optimal control methodology for the Counter-Terrorism strategies: The relaxation based approach. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
29Sung-Chan Choi Counter-terrorism analysis using cooperative game theory. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
29Wenting Xue, Zeshui Xu, Xiao-Jun Zeng Solving matrix games based on Ambika method with hesitant fuzzy information and its application in the counter-terrorism issue. Search on Bibsonomy Appl. Intell. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
29Jiaqi Hou, Xin Li 0088, Rongchen Zhu, Chongqiang Zhu, Zeyu Wei, Chao Zhang A Neural Relation Extraction Model for Distant Supervision in Counter-Terrorism Scenario. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
29Antonio Badia Conceptual Models for Counter-Terrorism and Intelligence Knowledge Bases. Search on Bibsonomy ISI The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
29L. Bayón, Pedro Fortuny Ayuso 0001, P. J. García Nieto, J. M. Grau, M. M. Ruiz Optimal control of counter-terrorism tactics. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
29Téwodros W. Workneh Counter-terrorism in Ethiopia: manufacturing insecurity, monopolizing speech. Search on Bibsonomy Internet Policy Rev. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
29David García-Retuerta, Álvaro Bartolomé, Pablo Chamoso, Juan Manuel Corchado Counter-Terrorism Video Analysis Using Hash-Based Algorithms. Search on Bibsonomy Algorithms The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
29Yanfei Liu, Zhenhua Wang, Guangyu Zhang Application of Multi-domain Stereo Prevention and Control Technology in Counter-terrorism. Search on Bibsonomy ISI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
29Fawad Ali, Farhan Hassan Khan, Saba Bashir, Uzair Ahmad Counter Terrorism on Online Social Networks Using Web Mining Techniques. Search on Bibsonomy INTAP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
29Krisztina Huszti-Orban Internet intermediaries and counter-terrorism: Between self-regulation and outsourcing law enforcement1. Search on Bibsonomy CyCon The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
29Daniel Drewer, Jan Ellermann May the (well-balanced) force be with us! The launch of the European Counter Terrorism Centre (ECTC). Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Roger Clarke Privacy impact assessments as a control mechanism for Australian counter-terrorism initiatives. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Akash Anil, Sanasam Ranbir Singh, Ranjan Sarmah Personalised PageRank as a Method of Exploiting Heterogeneous Network for Counter Terrorism and Homeland Security. Search on Bibsonomy WI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Zi-Han Lin, Duoyong Sun, Bo Li 0030, Ze Li Game Analysis on the Counter-Terrorism Cooperation of Shanghai Cooperation Organization. Search on Bibsonomy EISIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29Xue Liu, Xiaojun Jing, Songlin Sun, Hai Huang 0001 A novel network based on TD-LTE for counter-terrorism emergency communication in urban area. Search on Bibsonomy CCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29Horst A. Eiselt, Joy Bhadury, Mark L. Burkey An optimization-based framework for modelling counter-terrorism strategies. Search on Bibsonomy OR Insight The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29Leslie Ball, Matthew J. Craven Automated Counter-Terrorism. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29Andrew J. Park, Herbert H. Tsang, Mengting Sun, Uwe Glässer An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligence. Search on Bibsonomy Secur. Informatics The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
29JinKyu Lee 0003, H. Raghav Rao Service source and channel choice in G2C service environments: a model comparison in the anti/counter-terrorism domain. Search on Bibsonomy Inf. Syst. J. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
29Joshua Sinai Research note: Concept to develop a software-based counter-terrorism campaign decision support tool. Search on Bibsonomy ISI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
29V. Alan Spiker, Joan Hall Johnston Using Behavioral Measures to Assess Counter-Terrorism Training in the Field. Search on Bibsonomy HCI (21) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Sam J. Dixon, Mark B. Dixon, John Elliott, Elizabeth Guest, Duncan J. Mullier A Neural Network for Counter-Terrorism. Search on Bibsonomy SGAI Conf. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Mark G. Stewart Risk-informed decision support for assessing the costs and benefits of counter-terrorism protective measures for infrastructure. Search on Bibsonomy Int. J. Crit. Infrastructure Prot. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
29Herbert H. Tsang, Andrew J. Park, Mengting Sun, Uwe Glässer GENIUS: A computational modeling framework for counter-terrorism planning and response. Search on Bibsonomy ISI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
29Kiyana Zolfaghar, Arash Barfar, Shahriar Mohammadi A framework for online counter terrorism. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Brandy Linn Maistros Robert L. Popp and John Yen, Editors, Emergent Information Technologies and Enabling Policies for Counter-Terrorism, John Wiley and Sons, New Jersey (2006) ISBN 978-0-471-78655-9. Search on Bibsonomy Inf. Process. Manag. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Gail Ridley, Jacky Hartnett, Wilumpa Jarern-Imakul Mapping Information Security Standards: A Counter-Terrorism Example. Search on Bibsonomy ECIS The full citation details ... 2008 DBLP  BibTeX  RDF
29Syed Ahsan IT enabled counter terrorism infrastructure: issues and challenges. Search on Bibsonomy Int. J. Electron. Secur. Digit. Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Philip Michael Romero An Immunological Approach to Counter-Terrorism and Infrastructure Defense Law in Electronic Domains. Search on Bibsonomy Int. J. Law Inf. Technol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Robert L. Popp, John Yen (eds.) Emergent Information Technologies and Enabling Policies for Counter-Terrorism Search on Bibsonomy 2006 DBLP  BibTeX  RDF
29Stuart Harvey Rubin, Wei Dai 0009 An Integrated Knowledge Management Environment: a Study of Counter Terrorism Technologies. Search on Bibsonomy J. Inf. Knowl. Manag. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Alexander Gutfraind, Aric A. Hagberg, Feng Pan 0005 Optimal Interdiction of Unreactive Markovian Evaders. Search on Bibsonomy CPAIOR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18James Cheng, Yiping Ke, Wilfred Ng, Jeffrey Xu Yu Context-Aware Object Connection Discovery in Large Graphs. Search on Bibsonomy ICDE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil R. Adam, Evimaria Terzi, Tyrone Grandison Efficient Privacy-Preserving Link Discovery. Search on Bibsonomy PAKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Privacy, Efficiency, Link Discovery
18Xiaoyun He, Basit Shafiq, Jaideep Vaidya, Nabil R. Adam Privacy-preserving link discovery. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy, link discovery
18Adam Perer, Ben Shneiderman Integrating statistics and visualization: case studies of gaining clarity during exploratory data analysis. Search on Bibsonomy CHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF evaluation, social networks, information visualization, case studies, statistics, exploratory data analysis
18Zeeshan-ul-hassan Usmani, Daniel Kirk Extreme Conditions for Intelligent Agents. Search on Bibsonomy Web Intelligence/IAT Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Paul K. Davis, Andreas Tolk Observations on new developments in composability and multi-resolution modeling. Search on Bibsonomy WSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Hong-Wei Sun, Kwok-Yan Lam, Ming Gu 0001, Jia-Guang Sun 0001 An Efficient Algorithm for Fingercode-Based Biometric Identification. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Biometric security, fingercode, vector quantization, fingerprint matching
18Tao Qian, Xiaokun Li, Bulent Ayhan, Roger Xu, Chiman Kwan, Tim Griffin Application of Support Vector Machines to Vapor Detection and Classification for Environmental Monitoring of Spacecraft. Search on Bibsonomy ISNN (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Shyam Varan Nath Crime Pattern Detection Using Data Mining. Search on Bibsonomy IAT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Crime-patterns, data mining, clustering, semi-supervised learning, k-means, law-enforcement
18William Eberle, Lawrence B. Holder Detecting Anomalies in Cargo Using Graph Properties. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Yael Shahar Connections in the World of International Terrorism. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Nilesh N. Dalvi, Pedro M. Domingos, Mausam, Sumit K. Sanghai, Deepak Verma Adversarial classification. Search on Bibsonomy KDD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF game theory, integer linear programming, naive Bayes, cost-sensitive learning, spam detection
18Satnam Singh, Jefferey Allanach, Haiying Tu, Krishna R. Pattipati, Peter Willett 0001 Stochastic modeling of a terrorist event via the ASAM system. Search on Bibsonomy SMC (6) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Bhavani Thuraisingham Dependable Computing for National Security. Search on Bibsonomy ISADS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Hillol Kargupta, Kun Liu 0001, Jessica Ryan Privacy Sensitive Distributed Data Mining from Multi-party Data. Search on Bibsonomy ISI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Mark Dombrowski, Jagmohan Bajaj, Paul D. Willson Video-rate Visible to LWIR Hyperspectral Imaging and Image Exploitation. Search on Bibsonomy AIPR The full citation details ... 2002 DBLP  DOI  BibTeX  RDF spectral, real-time, processing, correlation, visible, infrared, Hyperspectral-imaging
Displaying result #1 - #93 of 93 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license