Sciweavers

ISI
2006
Springer
14 years 13 days ago
Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects
Abstract. With recent advances in sensory and mobile computing technology, enormous amounts of data about moving objects are being collected. With such data, it becomes possible to...
Xiaolei Li, Jiawei Han, Sangkyum Kim
ISI
2006
Springer
14 years 13 days ago
Semantic Analytics Visualization
In this paper we present a new tool for semantic analytics through 3D visualization called "Semantic Analytics Visualization" (SAV). It has the capability for visualizing...
Leonidas Deligiannidis, Amit P. Sheth, Boanerges A...
ISI
2006
Springer
14 years 13 days ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
ISI
2006
Springer
14 years 13 days ago
Distributing the Cost of Securing a Transportation Infrastructure
We address the problem of fairly distributing the cost of system-wide improvements to the security of a transportation infrastructure over the beneficiaries. We present a framework...
Sudarshan S. Chawathe
ISI
2006
Springer
14 years 13 days ago
Suspect Vehicle Identification for Border Safety with Modified Mutual Information
The Department of Homeland Security monitors vehicles entering and leaving the country at land ports of entry. Some vehicles are targeted to search for drugs and other contraband. ...
Siddharth Kaza, Yuan Wang, Hsinchun Chen
ISI
2006
Springer
14 years 13 days ago
Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading
An intelligence analyst often needs to keep track of more facts than can be held in human memory. As a result, analysts use a notebook or evidence file to record facts learned so f...
Eric A. Bier, Edward W. Ishak, Ed Chi
ISI
2006
Springer
14 years 13 days ago
DrillSim: A Simulation Framework for Emergency Response Drills
Responding to natural or man-made disasters in a timely and effective manner can reduce deaths and injuries, contain or prevent secondary disasters, and reduce the resulting econom...
Vidhya Balasubramanian, Daniel Massaguer, Sharad M...
ISI
2006
Springer
14 years 13 days ago
Measures to Detect Word Substitution in Intercepted Communication
Abstract. Those who want to conceal the content of their communications can do so by replacing words that might trigger attention by other words or locutions that seem more ordinar...
SzeWang Fong, David B. Skillicorn, Dmitri Roussino...
ISI
2006
Springer
14 years 13 days ago
Personal Information Management (PIM) for Intelligence Analysis
The concept of Personal Information Management (PIM) is currently a hot topic of research. Some of the ideas being discussed under this topic have a long history, and they are rele...
Antonio Badia
ISI
2006
Springer
14 years 13 days ago
Collective Sampling and Analysis of High Order Tensors for Chatroom Communications
This work investigates the accuracy and efficiency tradeoffs between centralized and collective (distributed) algorithms for (i) sampling, and (ii) n-way data analysis techniques i...
Evrim Acar, Seyit Ahmet Çamtepe, Bülen...