Views
3 years ago

most recent - Artificial Intelligence Laboratory - University of Arizona

most recent - Artificial Intelligence Laboratory - University of Arizona

66. A. Abbasi and H.

66. A. Abbasi and H. Chen, “Applying Authorship Analysis to Arabic Web Content,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Georgia, May 2005, Lecture Notes in Computer Science (LNCS 3495), Springer-Verlag. 67. P. Hu, D. Zeng, H. Chen, C. Larson, W. Chang, and C. Tseng, “Evaluating an Infectious Disease Information Sharing and Analysis System,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Georgia, May 2005, Lecture Notes in Computer Science (LNCS 3495), Springer-Verlag. 68. J. Qin, J. Xu, D. Hu, M. Sageman, and H. Chen, “Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Georgia, May 2005, Lecture Notes in Computer Science (LNCS 3495), Springer-Verlag. 69. E. Reid and H. Chen, “Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutional Analysis,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Georgia, May 2005, Lecture Notes in Computer Science (LNCS 3495), Springer-Verlag. 70. A. G. Wang, H. Atabakhsh, T. Petersen, and H. Chen, “Discovering Identity Problems: A Case Study,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Georgia, May 2005, Lecture Notes in Computer Science (LNCS 3495), Springer-Verlag. 71. E. Reid, J. Qin, Y. Zhou, G. Lai, M. Sageman, G. Weimann, and H. Chen, “Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Georgia, May 2005, Lecture Notes in Computer Science (LNCS 3495), Springer-Verlag. 72. H. Chen, H. Atabakhsh, J. Xu, A. Gang, B. Marshall, S. Kaza, C. Tseng, S. Eggers, H. Gowda, T. Petersen, and C. Violette, “Intelligence and Security Informatics: A Crime Data Mining Approach to Developing BroderSafe Research,” Proceedings of the 6 th National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, May 2005. 73. H. Chen, H. Atabakhsh, S. Kaza, B. Marshall, J. Xu, A. Gang, T. Petersen, and C. Violette, “BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization,” Proceedings of the 6 th National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, May 2005. 74. S. Kaza, J. Xu, B. Marshall, and H. Chen, “Topological Analysis of Criminal Activity Networks in Multiple Jurisdictions,” Proceedings of the 6 th National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, May 2005. 75. H. Chen, D. Zeng, C. Tseng, C. Larson, M. Eidson, I. Gotham, C. Lynch, and P. Hu, “A National Center of Excellence for Infectious Disease Informatics,” Proceedings of the 6 th National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, May 2005. 76. D. Zeng, H. Chen, C. Tseng, C. Larson, M. Eidson, I. Gotham, C. Lynch, and M. Ascher, “BioPortal: An Integrated Infectious Disease Information Sharing and Analysis Environment,” Proceedings of the 6 th National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, May 2005. 77. H. Chen, D, H. Atabakhsh, C. Tseng, B. Marshall, S. Kaza, S. Eggers, H. Gowda, A. Shah, T. Petersen, and C. Violette “Visualization in Law Enforcement,” Proceedings of the 6 th National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, May 2005. 78. W. Chung, T. Elhourani, A. Bonilla, G. Lai, W. Xi, and H. Chen, “Supporting Information Seeking in Multinational Organizations: A Knowledge Portal Approach,” Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS-38), Big Island, Hawaii, January 3-6, 2005. 50

79. H. Chen, “Biomedical Informatics and Security Informatics Research in Digital Library,” Proceedings of the 7 th International Conference on Asian Digital Libraries, ICADL 2004, Shanghai, China, December 2004, Lecture Notes in Computer Science (LNCS 3334), Springer-Verlag. 80. M. Chau and H. Chen, “CMedPort: Using Content-Based and Link-Based Analysis in Building Vertical Search Engines,” Proceedings of the 7 th International Conference on Asian Digital Libraries, ICADL 2004, Shanghai, China, December 2004, Lecture Notes in Computer Science (LNCS 3334), Springer-Verlag. 81. Z. Huang, D. Zeng, and H. Chen, “A Unified Recommendation Framework Based on Probablistic Relational Models,” Proceedings of the 14th Annual Workshop on Information Technologies and Systems (WITS’04), Washington, DC, December, 2004. 82. B. Marshall, K. Siddharth, J. Xu, H. Atabakhsh, T. Peterson, C. Violette, and H. Chen, “Crossjurisdictional Criminal Activity Networks to Support Border and Transportation Security,” Proceedings of the 7th IEEE International Conference on Intelligent Transportation Systems (ITSC 2004), Washington, DC, October 3-6, 2004. 83. H. Chen, J. Qin, E. Reid, W. Chung, Y. Zhou, W. Xi, G. Lai, A. Bonillas, F. Wang, and M. Sageman “The Dark Web Portal: Collecting and Analyzing the Presence of Domestic and International Terrorist Groups in the Web,” Proceedings of the 7th IEEE International Conference on Intelligent Transportation Systems (ITSC 2004), Washington, DC, October 3-6, 2004. 84. D. Zeng, W. Chang, and H. Chen, “A Comparative Analysis of Spatio-Temporal Hotspot Analysis Techniques in Security Informatics,” Proceedings of the 7th IEEE International Conference on Intelligent Transportation Systems (ITSC 2004), Washington, DC, October 3-6, 2004. 85. Z. Huang, H. Chen, F. Guo, J. Xu, S. Wu, and W. H. Chen, “Visualizing the Expertise Space,” Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS-37), Big Island, Hawaii, January 3-6, 2004. 86. D. Zeng, H. Chen, C. Tseng, C. Larson, M. Eidson, I, Gotham, C. Lynch, and M. Ascher, “West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics,” Intelligence and Security Informatics, Proceedings of the Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, Arizona, June 2004, Lecture Notes in Computer Science (LNCS 3073), Springer- Verlag. 87. E. Reid, J. Qin, W. Chung, J. Xu, Y. Zhou, R. Schumaker, M. Sageman, and H. Chen, “Terrorism Knowledge Portal:: A Knowledge Discovery Approach to Addressing the Threat of Terrorism,” Intelligence and Security Informatics, Proceedings of the Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, Arizona, June 2004, Lecture Notes in Computer Science (LNCS 3073), Springer-Verlag. 88. J. Xu, B. Marshall, S. Kaza, and H. Chen, “Analyzing and Visualizing Criminal Network Dynamics: A Case Study,” Intelligence and Security Informatics, Proceedings of the Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, Arizona, June 2004, Lecture Notes in Computer Science (LNCS 3073), Springer-Verlag. 89. H. Atabakhsh, C. Larson, T. Petersen, C. Violette, and H. Chen, “Information Sharing and Collaboration Policies within Government Agencies,” Intelligence and Security Informatics, Proceedings of the Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, Arizona, June 2004, Lecture Notes in Computer Science (LNCS 3073), Springer-Verlag. 90. Y. Zhou, J. Qin, and H. Chen, “CMedPort: Intelligent Searching for Chinese Medical Information,” Proceedings of the 6 th International Conference on Asian Digital Libraries, ICADL 2003, Kuala Lumpur, Malaysia, December 2003, Lecture Notes in Computer Science (LNCS 2911), Springer- Verlag. 91. D. Zeng, H. Chen, C. Tseng, C. Larson, M. Eidson, I, Gotham, C. Lynch, and M. Ascher, “Towards a National Infectious Disease Information Infrastructure: A Case Study in West Nile Virus and Botulism,” Proceedings of the National Conference on Digital Government Research, DG.O 2004, Seattle, Washington, May 2004, Digital Government Research Center. 51

here - Artificial Intelligence Laboratory - University of Arizona
Data, data everywhere - Artificial Intelligence Laboratory
Nathan Labhart Artificial Intelligence Laboratory University of Zurich ...
slides - Artificial Intelligence Laboratory
Recent Researches in Artificial Intelligence, Knowledge ... - Wseas.us
Principium 3 - Artificial Intelligence Applications Institute - University ...
I-Plan - Artificial Intelligence Applications Institute - University of ...
Recent CV - Artificial Intelligence Laboratory - University of Arizona
Introduction - Artificial Intelligence Laboratory - University of Arizona
here - Artificial Intelligence Laboratory - University of Arizona
Speaker Biosketches - Artificial Intelligence Laboratory - University ...
View - Artificial Intelligence Laboratory - University of Arizona
SpidersRUs - Artificial Intelligence Laboratory - University of Arizona
Nano Mapper - Artificial Intelligence Laboratory - University of Arizona
GA Handout - Artificial Intelligence Laboratory
Reynard - Artificial Intelligence Laboratory
Conference Schedule - Artificial Intelligence Laboratory - University ...
Web retrieval and mining - Artificial Intelligence Laboratory ...
Trends in nanotechnology patents - Artificial Intelligence Laboratory ...
Data Mining in Sports: - Artificial Intelligence Laboratory
Biodefense Knowledge Center - Artificial Intelligence Laboratory
Artificial Vision and Intelligent Systems Laboratory, Parma University ...
Visualization in Law Enforcement - Artificial Intelligence Laboratory ...
Notes - Artificial Intelligence Laboratory
1 - Artificial Intelligence Laboratory
beeStanbul - Artificial Intelligence and Robotics Laboratory
Robust stochastic parsing - Artificial Intelligence Laboratory - EPFL
Curriculum Vitae - Artificial Intelligence Laboratory - EPFL
An Interdisciplinary Laboratory for Teaching Artificial Intelligence and
Is Artificial Neural Network Intelligent? - BSTU Laboratory of Artificial ...