Abstract is missing.
- Organizing CommitteeJohn Yen, Robert L. Popp. [doi]
- COORDINATORs: TAEMS Modeling and Interfacing for First ResponseJohn Phelps, Valerie Guralnik. 1-8 [doi]
- The Future of Disaster Response: Humans Working with Multiagent Teams using DEFACTONathan Schurr, Janusz Marecki, Milind Tambe, Paul Scerri, Nikhil Kasinadhuni, John P. Lewis. 9-16 [doi]
- On Shared Situation Awareness for Supporting Human Decision-Making TeamsXiaocong Fan, Shuang Sun, John Yen. 17-24 [doi]
- Recommender Systems for Intelligence AnalystsAnna L. Buczak, Benjamin Grooters, Paul Kogut, Eren Manavoglu, C. Lee Giles. 25-31 [doi]
- Analogy, Intelligent IR, and Knowledge Integration for Intelligence AnalysisLarry Birnbaum, Kenneth D. Forbus, Earl J. Wagner, James Baker, Michael Witbrock. 32-37 [doi]
- Middleware Platform for Recruiting and Proactively Managing Virtual Panels of Intelligence ExpertsHyong Sop Shim, Clifford Behrens, Devasis Bassu. 38-45 [doi]
- Automated Vulnerability Analysis Using AI PlanningSteven A. Harp, Johnathan Gohde, Thomas Haigh, Mark S. Boddy. 46-53 [doi]
- Link Analysis Technologies for Differing Data SourcesConnie Fournelle, Jorge Tierno. 54-61 [doi]
- Transforming Open-Source Documents to Terror Networks: The Arizona TerrorNetDaniel McDonald, Hsinchun Chen, Robert P. Schumaker. 62-69 [doi]
- Network Awareness and the Philadelphia Area Urban Wireless Network TestbedJoseph B. Kopena, Kris Malfettone, Evan Sultanik, Vincent A. Cicirello, Andrew Mroczkowski, Moshe Kam, Maxim Peysakhov, Gaurav Naik, William C. Regli. 70-75 [doi]
- Improved Document Representation for Classification Tasks for the Intelligence CommunityOzgur Yilmazel, Svetlana Symonenko, Niranjan Balasubramanian, Elizabeth D. Liddy. 76-82 [doi]
- Counter Intelligence and the Semantic WebJames A. Hendler. 83-85 [doi]
- Knowledge-Based Syndromic Surveillance for BioterrorismMark A. Musen, Monica Crubézy, Martin J. O'Connor, David L. Buckeridge. 86-90 [doi]
- Knowledge Representation Issues in Semantic Graphs for Relationship DetectionMarc Barthelemy, Edmond Chow, Tina Eliassi-Rad. 91-98 [doi]
- Fostering Collaboration with a Semantic Index over Textual ContributionsKenneth S. Murray, John D. Lowrance, Douglas E. Appelt, Andres C. Rodriguez. 99-106 [doi]
- Performance Analysis and Prediction for Data Mining SystemsJorge E. Tierno. 107-110 [doi]
- Using Mobile Robots as a Shared Visual Presence in USAR EnvironmentsJennifer L. Burke, Robin R. Murphy. 111-116 [doi]
- Automated Detection of Terrorist Activities through Link Discovery within Massive DatasetsChristopher M. Boner. 117-119 [doi]
- Determining Possible Criminal Behavior of Mobile Phone Users by Means of Analyzing the Location Tracking DataBoris Galitsky, Alexander Miller. 120-122 [doi]
- Small Steps and Giant Leaps toward Homeland SecurityLeona F. Fass. 123-126 [doi]
- Homeland Security, Organizations, and PerturbationsWilliam F. Lawless. 127-129 [doi]
- Collaborative Filtering for Community ThreatsRobert P. Goldman, Mark S. Boddy, Steven A. Harp, Tom Haigh. 130-132 [doi]
- Technologies to Defeat Fraudulent Schemes Related to Email RequestsEdoardo Airoldi, Bradley Malin, Latanya Sweeney. 133-135 [doi]
- AI Technologies to Defeat Identity Theft VulnerabilitiesLatanya Sweeney. 136-138 [doi]
- Cognitive Information Processing Challenges for Homeland SecurityPaul Kogut, Kenneth Kisiel. 139-140 [doi]
- A Bayesian Framework for Robust Reasoning from Sensor NetworksValery A. Petrushin, Rayid Ghani, Anatole Gershman. 141-143 [doi]
- Relational Recognition for Information Extraction in Free Text DocumentsErik Larson, Todd Hughes. 144-146 [doi]
- A High-Level Language for Homeland Security Response PlansRichard B. Scherl, Michael Barnathan. 147-148 [doi]
- Answer Set Programming as the Basis for a Homeland Security QASChitta Baral, Michael Gelfond, Richard B. Scherl. 149-150 [doi]
- Empirical Determination of Lower Bounds on RP EmbeddingLili He 0003, Ian R. Greenshields. 151-153 [doi]
- Towards Semantic Integration of Legacy Databases for Homeland SecurityTerry L. Janssen. 154-156 [doi]
- On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference FrameworkLi Ding, Pranam Kolari, Tim Finin, Anupam Joshi, Yun Peng, Yelena Yesha. 157-160 [doi]
- Mining Images in Publicly-Available Cameras for Homeland SecurityLatanya Sweeney, Ralph Gross. 161 [doi]