Computational Methods for Counterterrorism
Modern terrorist networks pose an unprecedented threat to international security. Their fluid and non-hierarchical structures, their religious and ideological motivations, and their predominantly non-territorial objectives all radically complicate the question of how to neutralize them. As governmen...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2009.
|
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- I Information Access
- On Searching in the #x201C;Real World#x201D;
- Signature-Based Retrieval of Scanned Documents Using Conditional Random Fields
- What Makes a Good Summary?
- A Prototype Search Toolkit
- II Text Analysis
- Unapparent Information Revelation: Text Mining for Counterterrorism
- Identification of Information
- Rich Language Analysis for Counterterrorism
- III Graphical Models
- Dicliques: Finding Needles in Haystacks
- Information Superiority via Formal Concept Analysis
- Reflexive Analysis of Groups
- Evaluating Self-Reflexion Analysis Using Repertory Grids
- IV Conflict Analysis
- Anticipating Terrorist Safe Havens from Instability Induced Conflict
- Applied Counterfactual Reasoning
- Adversarial Planning in Networks
- Gaming and Simulating Ethno-Political Conflicts.