Views
3 years ago

most recent - Artificial Intelligence Laboratory - University of Arizona

most recent - Artificial Intelligence Laboratory - University of Arizona

the Second Workshop,

the Second Workshop, BioSurveillance 2007, New Brunswick, NJ, May 2007, Lecture Notes in Computer Science (LNCS 4506), Springer-Verlag. 40. P. Hu, D. Zeng, H. Chen, C. Larson, and C. Tseng, “A Web-based System for Infectious Disease Data Integration and Sharing: Evaluating Outcome, Task Performance Efficiency, User Information Satisfaction, and Usability,” Intelligence and Security Informatics: Biosurveillance, Proceedings of the Second Workshop, BioSurveillance 2007, New Brunswick, NJ, May 2007, Lecture Notes in Computer Science (LNCS 4506), Springer-Verlag. 41. H. Lu, C. C. King, T. Wu, F. Shih, J. Hsiao, D. Zeng, and H. Chen, “Chinese Chief Complaint Classification for Syndromic Surveillance,” Intelligence and Security Informatics: Biosurveillance, Proceedings of the Second Workshop, BioSurveillance 2007, New Brunswick, NJ, May 2007, Lecture Notes in Computer Science (LNCS 4506), Springer-Verlag. 42. Y. Chen, C. Tseng, C. C. King, T. Wu, and H. Chen, “Incorporating Geographical Contacts into Social Network Analysis for Contact Tracing in Epidemiology: A Study on Taiwan SARS Data,” Intelligence and Security Informatics: Biosurveillance, Proceedings of the Second Workshop, BioSurveillance 2007, New Brunswick, NJ, May 2007, Lecture Notes in Computer Science (LNCS 4506), Springer-Verlag. 43. H. Lu, D. Zeng, and H. Chen, “Medical Ontology-enhanced Text Processing for Infectious Disease Informatics,” Proceedings of 2007 IEEE Intelligence and Security Informatics, ISI 2007, New Brunswick, NJ, May 2007. 44. T. Fu, A. Abbasi and H. Chen, “Interaction Coherence for Dark Web Forums,” Proceedings of 2007 IEEE Intelligence and Security Informatics, ISI 2007, New Brunswick, NJ, May 2007. 45. A. Abbasi and H. Chen, “Affect Intensity Analysis of Dark Web Forums,” Proceedings of 2007 IEEE Intelligence and Security Informatics, ISI 2007, New Brunswick, NJ, May 2007. 46. S. Kaza, D. Hu, and H. Chen, “Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators,” Proceedings of 2007 IEEE Intelligence and Security Informatics, ISI 2007, New Brunswick, NJ, May 2007. 47. G. Wang, S. Kaza, S. Joshi, K. Chang, C. Tseng, H. Atabakhsh, and H. Chen, “The Arizona IDMatcher: A Probabilistic Identity Matching System,” Proceedings of 2007 IEEE Intelligence and Security Informatics, ISI 2007, New Brunswick, NJ, May 2007. 48. S. Kaza, D. Hu, H. Atabakhsh, and H. Chen, “Predicting Criminal Relationships using Multivariate Survival Analysis,” Proceedings of the 8 TH Annual International Digital Government Research Conference, DG.O 2007, Philadelphia, Pennsylvania, May 2007. 49. G. Wang, S. Kaza, S. Joshi, K. Chang, C. Tseng, H. Atabakhsh, and H. Chen, “The Arizona IDMatcher: Developing an Identity Matching Tool for Law Enforcement,” Proceedings of the 8 TH Annual International Digital Government Research Conference, DG.O 2007, Philadelphia, Pennsylvania, May 2007. 50. H. Chen, “Exploring Extremism and Terrorism on the Web: The Dark Web Project,” Intelligence and Security Informatics, Proceedings the Pacific-Asia Workshop, PAISI 2007, Chengdu, China, April 2007, Lecture Notes in Computer Science (LNCS 4430), Springer-Verlag. 51. C. Yang, T. Ng, J. Wang, C. Wei, and H. Chen, “Analyzing and Visualizing Gray Web Forum Structure,” Intelligence and Security Informatics, Proceedings the Pacific-Asia Workshop, PAISI 2007, Chengdu, China, April 2007, Lecture Notes in Computer Science (LNCS 4430), Springer- Verlag. 52. B. Marshall and H. Chen, “Using Importance Flooding to Identify Interesting Networks of Criminal Activity,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 53. A. Abbasi and H. Chen, “Visualizing Authorship for Identification,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security 48

Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 54. P. Yan, D. Zeng, and H. Chen, “A Review of Public Health Syndromic Surveillance Systems,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 55. S. Kaza, Y. Wang, and H. Chen, “Suspect Vehicle Identification for Border Safety with Modified Mutual Information,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 56. J. Xu, H. Chen, Y. Zhou, and J. Qin, “On the Topology of the Dark Web of Terrorist groups,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 57. G. Wang, H. Chen, and H. Atabakhsh, “A Multi-layer Naïve Bayes Model for Approximate Identity Matching,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 58. J. Wang, T. Fu, H. Lin, and H. Chen, “A Framework for Exploring Gray Web Forums: Analysis of Forum-based Communications in Taiwan,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 59. J. Ma, D. Zeng, and H. Chen, “Spatial-temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 60. A. Salem, E. Reid, and H. Chen, “Content Analysis of Jihadi Extremist Groups’ Videos,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 61. Y. Zhou, J. Qin, G. Lai, E. Reid, and H. Chen, “Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 62. Y. Zhou, J. Qin, G. Lai, E. Reid, and H. Chen, “Unraveling International Terrorist Groups’ Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity,” Intelligence and Security Informatics, Proceedings of the International Worksop on Intelligence and Security Informatics, WISI 2006, Singapore, April 2006, Lecture Notes in Computer Science (LNCS 3917), Springer-Verlag. 63. H. Chen, “Digital Library Development in the Asia Pacific,” Digital Libraries: Implementing Strategies and Sharing Experiences, Proceedings of the 8 th International Conference on Asian Digital Libraries, ICADL 2005, Bangkok, Thailand, December 2005, Lecture Notes in Computer Science (LNCS 3815), Springer-Verlag. 64. K. Siddharth, T. Wang, H. Gowda,, and H. Chen, “Target Vehicle Identification for Border Safety Using Mutual Information,” Proceedings of the 8th IEEE International Conference on Intelligent Transportation Systems (ITSC 2005), Vienna, Austria, September 5-8, 2005. 65. W. Chang, D. Zeng,, and H. Chen, “Prospective Spatio-Temporal Data Analysis for Security Informatics,” Proceedings of the 8th IEEE International Conference on Intelligent Transportation Systems (ITSC 2005), Vienna, Austria, September 5-8, 2005. 49

here - Artificial Intelligence Laboratory - University of Arizona
Data, data everywhere - Artificial Intelligence Laboratory
Nathan Labhart Artificial Intelligence Laboratory University of Zurich ...
slides - Artificial Intelligence Laboratory
Recent Researches in Artificial Intelligence, Knowledge ... - Wseas.us
I-Plan - Artificial Intelligence Applications Institute - University of ...
Principium 3 - Artificial Intelligence Applications Institute - University ...
Recent CV - Artificial Intelligence Laboratory - University of Arizona
Introduction - Artificial Intelligence Laboratory - University of Arizona
here - Artificial Intelligence Laboratory - University of Arizona
View - Artificial Intelligence Laboratory - University of Arizona
Speaker Biosketches - Artificial Intelligence Laboratory - University ...
SpidersRUs - Artificial Intelligence Laboratory - University of Arizona
Nano Mapper - Artificial Intelligence Laboratory - University of Arizona
GA Handout - Artificial Intelligence Laboratory
Reynard - Artificial Intelligence Laboratory
Conference Schedule - Artificial Intelligence Laboratory - University ...
Web retrieval and mining - Artificial Intelligence Laboratory ...
Trends in nanotechnology patents - Artificial Intelligence Laboratory ...
Data Mining in Sports: - Artificial Intelligence Laboratory
Visualization in Law Enforcement - Artificial Intelligence Laboratory ...
Artificial Vision and Intelligent Systems Laboratory, Parma University ...
Biodefense Knowledge Center - Artificial Intelligence Laboratory
Notes - Artificial Intelligence Laboratory
beeStanbul - Artificial Intelligence and Robotics Laboratory
1 - Artificial Intelligence Laboratory
Robust stochastic parsing - Artificial Intelligence Laboratory - EPFL
Curriculum Vitae - Artificial Intelligence Laboratory - EPFL
OSS - Artificial Intelligence Laboratory - EPFL
Adaptive Heuristics - Artificial Intelligence Laboratory