• Skip to main content
  • Skip to primary sidebar
AAAI

AAAI

Association for the Advancement of Artificial Intelligence

    • AAAI

      AAAI

      Association for the Advancement of Artificial Intelligence

  • About AAAIAbout AAAI
    • AAAI Officers and Committees
    • AAAI Staff
    • Bylaws of AAAI
    • AAAI Awards
      • Fellows Program
      • Classic Paper Award
      • Dissertation Award
      • Distinguished Service Award
      • Allen Newell Award
      • Outstanding Paper Award
      • Award for Artificial Intelligence for the Benefit of Humanity
      • Feigenbaum Prize
      • Patrick Henry Winston Outstanding Educator Award
      • Engelmore Award
      • AAAI ISEF Awards
      • Senior Member Status
      • Conference Awards
    • AAAI Resources
    • AAAI Mailing Lists
    • Past AAAI Presidential Addresses
    • Presidential Panel on Long-Term AI Futures
    • Past AAAI Policy Reports
      • A Report to ARPA on Twenty-First Century Intelligent Systems
      • The Role of Intelligent Systems in the National Information Infrastructure
    • AAAI Logos
    • News
  • aaai-icon_ethics-diversity-line-yellowEthics & Diversity
  • Conference talk bubbleConferences & Symposia
    • AAAI Conference
    • AIES AAAI/ACM
    • AIIDE
    • IAAI
    • ICWSM
    • HCOMP
    • Spring Symposia
    • Summer Symposia
    • Fall Symposia
    • Code of Conduct for Conferences and Events
  • PublicationsPublications
    • AAAI Press
    • AI Magazine
    • Conference Proceedings
    • AAAI Publication Policies & Guidelines
    • Request to Reproduce Copyrighted Materials
  • aaai-icon_ai-magazine-line-yellowAI Magazine
    • Issues and Articles
    • Author Guidelines
    • Editorial Focus
  • MembershipMembership
    • Member Login
    • Developing Country List
    • AAAI Chapter Program

  • Career CenterCareer Center
  • aaai-icon_ai-topics-line-yellowAITopics
  • aaai-icon_contact-line-yellowContact

Home / Proceedings / Papers from the 2005 AAAI Spring Symposium /

AI Technologies for Homeland Security

Contents

  • Improved Document Representation for Classification Tasks for the Intelligence Community

    Ozgur Yilmazel, Svetlana Symonenko, Niranjan Balasubramanian, and Elizabeth D. Liddy

    PDF
  • Automated Vulnerability Analysis Using AI Planning

    Steven Harp, Johnathan Gohde, Thomas Haigh, and Mark Boddy

    PDF
  • Small Steps and Giant Leaps toward Homeland Security

    Leona F. Fass

    PDF
  • Shared Situation Awareness for Supporting Human Decision-Making Teams

    Xiaocong Fan, Shuang Sun, and John Yen

    PDF
  • Mining Images in Publicly-Available Cameras for Homeland Security

    Latanya Sweeney and Ralph Gross

    PDF
  • Technologies to Defeat Fraudulent Schemes Related to Email Requests

    Edoardo Airoldi, Bradley Malin, and Latanya Sweeney

    PDF
  • A High-Level Language for Homeland Security Response Plans

    Richard Scherl and Michael Barnathan

    PDF
  • Fostering Collaboration with a Semantic Index over Textual Contributions

    Kenneth Murray, John Lowrance, Douglas Appelt, and Andres Rodriguez

    PDF
  • Network Awareness and the Philadelphia Area Urban Wireless Network Testbed

    Joseph B. Kopena, Kris Malfettone, Evan Sultanik, Vincent A. Cicirello, Andrew Mroczkowski, Moshe Kam, Maxim Peysakhov, Gaurav Naik, and William C. Regli

    PDF
  • Determining Possible Criminal Behavior of Mobile Phone Users by Means of Analyzing the Location Tracking Data

    Boris Galitsky and Alexander Miller

    PDF
  • On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework

    Li Ding, Pranam Kolari, Tim Finin, Anupam Joshi, Yun Peng, and Yelena Yesha

    PDF
  • The Future of Disaster Response: Humans Working with Multiagent Teams using DEFACTO

    Nathan Schurr, Janusz Marecki, Milind Tambe, Paul Scerri, Nikhil Kasinadhuni, and J. P. Lewis

    PDF
  • Middleware Platform for Recruiting and Proactively Managing Virtual Panels of Intelligence Experts

    Hyong-Sop Shim, Clifford Behrens, and Devasis Bassu

    PDF
  • Contents

    John Yen and Robert Popp

    PDF
  • Knowledge Representation Issues in Semantic Graphs for Relationship Detection

    Marc Barthélemy, Edmond T. Chow, and Tina Eliassi-Rad

    PDF
  • COORDINATORs: TAEMS Modeling and Interfacing for First Response

    John Phelps and Valerie Guralnik

    PDF
  • Automated Detection of Terrorist Activities through Link Discovery within Massive Datasets

    Christopher M. Boner

    PDF
  • Analogy, Intelligent IR, and Knowledge Integration for Intelligence Analysis

    Larry Birnbaum, Kenneth D. Forbus, Earl Wagner, James Baker, and Michael Witbrock

    PDF
  • Towards Semantic Integration of Legacy Databases for Homeland Security

    Terry L. Janssen

    PDF
  • Recommender Systems for Intelligence Analysts

    Anna L. Buczak, Benjamin Grooters, Paul Kogut, Eren Manavoglu, and C. Lee Giles

    PDF
  • Organizing Committee

    John Yen and Robert Popp

    PDF
  • Transforming Open-Source Documents to Terror Networks: The Arizona TerrorNet

    Daniel M. McDonald, Hsinchun Chen, and Robert P. Schumaker

    PDF
  • Using Mobile Robots as a Shared Visual Presence in USAR Environments

    Jennifer L. Burke and Robin R. Murphy

    PDF
  • A Bayesian Framework for Robust Reasoning from Sensor Networks

    Valery A. Petrushin, Rayid Ghani, and Anatole V. Gershman

    PDF
  • Counter Intelligence and the Semantic Web

    James Hendler

    PDF
  • Cognitive Information Processing Challenges for Homeland Security

    Paul Kogut and Kenneth Kisiel

    PDF
  • Knowledge-Based Syndromic Surveillance for Bioterrorism

    Mark A. Musen, Monica Crubézy, Martin O'Connor, and David Buckeridge

    PDF
  • Homeland Security, Organizations, and Perturbations

    William F. Lawless

    PDF
  • Link Analysis Technologies for Differing Data Sources

    Connie Fournelle and Jorge Tierno

    PDF
  • Empirical Determination of Lower Bounds on RP Embedding

    Lili He and Ian R. Greenshields

    PDF
  • Answer Set Programming as the Basis for a Homeland Security QAS

    Chitta Baral, Michael Gelfond, and Richard Scherl

    PDF
  • Performance Analysis and Prediction for Data Mining Systems

    Jorge E. Tierno

    PDF
  • AI Technologies to Defeat Identity Theft Vulnerabilities

    Latanya Sweeney

    PDF
  • Collaborative Filtering for Community Threats

    Robert P. Goldman, Mark S. Boddy, Steven A. Harp, and Tom Haigh

    PDF
  • Relational Recognition for Information Extraction in Free Text Documents

    Erik J. Larson and Todd C. Hughes

    PDF

Primary Sidebar