Sciweavers

ISI
2006
Springer
13 years 11 months ago
Computational Modeling and Experimental Validation of Aviation Security Procedures
Security of civil aviation has become a major concern in recent years, leading to a variety of protective measures related to airport and aircraft security to be established by re...
Uwe Glässer, Sarah Rastkar, Mona Vajihollahi
ISI
2006
Springer
13 years 11 months ago
A Home Firewall Solution for Securing Smart Spaces
Pho Duc Giang, Hung Le Xuan, Yonil Zhung, Sungyoun...
ISI
2006
Springer
13 years 11 months ago
A First Look at Domestic and International Global Terrorism Events, 1970-1997
While the study of terrorism has expanded dramatically since the 1970s, most analyses are limited to qualitative case studies or quantitative analyses of international incidents on...
Laura Dugan, Gary LaFree, Heather Fogg
ISI
2006
Springer
13 years 11 months ago
Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects
Abstract. With recent advances in sensory and mobile computing technology, enormous amounts of data about moving objects are being collected. With such data, it becomes possible to...
Xiaolei Li, Jiawei Han, Sangkyum Kim
ISI
2006
Springer
13 years 11 months ago
Semantic Analytics Visualization
In this paper we present a new tool for semantic analytics through 3D visualization called "Semantic Analytics Visualization" (SAV). It has the capability for visualizing...
Leonidas Deligiannidis, Amit P. Sheth, Boanerges A...
ISI
2006
Springer
13 years 11 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
ISI
2006
Springer
13 years 11 months ago
Distributing the Cost of Securing a Transportation Infrastructure
We address the problem of fairly distributing the cost of system-wide improvements to the security of a transportation infrastructure over the beneficiaries. We present a framework...
Sudarshan S. Chawathe
ISI
2006
Springer
13 years 11 months ago
Suspect Vehicle Identification for Border Safety with Modified Mutual Information
The Department of Homeland Security monitors vehicles entering and leaving the country at land ports of entry. Some vehicles are targeted to search for drugs and other contraband. ...
Siddharth Kaza, Yuan Wang, Hsinchun Chen
ISI
2006
Springer
13 years 11 months ago
Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading
An intelligence analyst often needs to keep track of more facts than can be held in human memory. As a result, analysts use a notebook or evidence file to record facts learned so f...
Eric A. Bier, Edward W. Ishak, Ed Chi
ISI
2006
Springer
13 years 11 months ago
DrillSim: A Simulation Framework for Emergency Response Drills
Responding to natural or man-made disasters in a timely and effective manner can reduce deaths and injuries, contain or prevent secondary disasters, and reduce the resulting econom...
Vidhya Balasubramanian, Daniel Massaguer, Sharad M...