Poetry Madness
 
 

Recently Viewed clear list


Q&A | February 27, 2014

Rene Denfeld: IMG Powell’s Q&A: Rene Denfeld



Describe your latest book. The Enchanted is a story narrated by a man on death row. The novel was inspired by my work as a death penalty... Continue »
  1. $18.19 Sale Hardcover add to wish list

    The Enchanted

    Rene Denfeld 9780062285508

spacer
Qualifying orders ship free.
$150.50
New Hardcover
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
25 Remote Warehouse Computers Reference- General

Computational Methods for Counterterrorism

by

Computational Methods for Counterterrorism Cover

 

Synopses & Reviews

Publisher Comments:

Modern terrorist networks pose an unprecedented threat to international security. Their fluid and non-hierarchical structures, their religious and ideological motivations, and their predominantly non-territorial objectives all radically complicate the question of how to neutralize them. As governments and militaries work to devise new policies and doctrines to combat terror, new technologies are desperately needed to make these efforts effective. This book collects a wide range of the most current computational research addressing critical issues for counterterrorism in a dynamic and complex threat environment: finding, summarizing, and evaluating relevant information from large and dynamic data stores; simulation and prediction of likely enemy actions and the effects of proposed counter-efforts; and producing actionable intelligence by finding meaningful patterns hidden in masses of noisy data items. The contributions are organized thematically into four sections. The first section concerns efforts to provide effective access to small amounts of relevant information buried in enormous amounts of diverse unstructured data. The second section discusses methods for the key problem of extracting meaningful information from digitized documents in various languages. The third section presents research on analyzing graphs and networks, offering new ways of discovering hidden structures in data and profiles of adversaries' goals and intentions. Finally, the fourth section of the book describes software systems that enable analysts to model, simulate, and predict the effects of real-world conflicts. The models and methods discussed in this book are invaluable reading for governmental decision-makers designing new policies to counter terrorist threats, for members of the military, intelligence, and law enforcement communities devising counterterrorism strategies based on new technologies, and for academic and industrial researchers devising more effective methods for knowledge discovery in complicated and diverse datasets.

Synopsis:

This book collects current computational research that addresses critical issues for countering terrorism, including finding relevant information from large, changing data stores and producing actionable intelligence by finding meaningful patterns.

About the Author

Shlomo Argamon is Associate Professor of Computer Science at the Illinois Institute of Technology, Chicago, IL, USA, since 2002. Prior to that, he had held academic positions at Bar-Ilan University, where he held a Fulbright Postdoctoral Fellowship (1994-96), and at the Jerusalem College of Technology. Dr. Argamon received his B.S. (1988) in Applied Mathematics from Carnegie-Mellon University, and his M.Phil. (1991) and Ph.D. (1994) in Computer Science from Yale University, where he was a Hertz Foundation Fellow. His current research interests lie mainly in the use of machine learning methods to aid in functional analysis of natural language, with particular focus on questions of style. During his career, Dr. Argamon has worked on a variety of problems in experimental machine learning, including robotic map-learning, theory revision, and natural language processing, and has published numerous research papers in these areas.

Table of Contents

Foreword, James A. Hendler Preface Part I: Information Access 1) On Searching in the "Real World" 2) Signature-Based Retrieval of Scanned Documents Using Conditional Random Fields 3) What Makes a Good Summary? 4) A Prototype Search Toolkit Part II: Text Analysis 5) Unapparent Information Revelation: Text Mining for Counterterrorism 6) Identification of Sensitive Unclassified Information 7) Rich Language Analysis for Counterterrorism Part III: Graphical Models 8) Dicliques: Finding Needles in Haysticks 9) Information Superiority via Formal Concept Analysis 10) Reflexive Analysis of Groups 11) Evaluating Self-Reflexion Analysis Using Repertory Grids Part IV: Conflict Analysis 12) Anticipating Terrorist Safe Havens from Instability Induced Conflict 13) Applied Counterfactual Reasoning 14) Adversarial Planning in Networks 15) Gaming and Simulating Ethno-Political Conflicts Index

Product Details

ISBN:
9783642011405
Author:
Argamon, Shlomo
Publisher:
Springer
Editor:
Newton, Howard
Editor:
Howard, Newton
Author:
Howard, Newton
Subject:
Database Management - Database Mining
Subject:
Networking/Security
Subject:
System Administration - Storage & Retrieval
Subject:
Artificial Intelligence
Subject:
Data mining
Subject:
Information retrieval
Subject:
text analyis
Subject:
Text Mining
Subject:
text search
Subject:
Data Mining and Knowledge Discovery
Subject:
Systems and Data Security
Subject:
Criminology
Subject:
Criminal justice.
Subject:
Document Preparation and Text Processing
Subject:
Information storage and retrieval.
Subject:
Computers and Society
Subject:
Computers-Reference - General
Subject:
Criminology / Criminal Justice
Copyright:
Edition Description:
Book
Publication Date:
20090714
Binding:
HARDCOVER
Language:
English
Illustrations:
Y
Pages:
324
Dimensions:
235 x 155 mm 708 gr

Related Subjects

Computers and Internet » Computers Reference » General
Computers and Internet » Internet » Information
Computers and Internet » Networking » Security » General

Computational Methods for Counterterrorism New Hardcover
0 stars - 0 reviews
$150.50 In Stock
Product details 324 pages Springer - English 9783642011405 Reviews:
"Synopsis" by , This book collects current computational research that addresses critical issues for countering terrorism, including finding relevant information from large, changing data stores and producing actionable intelligence by finding meaningful patterns.
spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.