Cargando…

Computational Methods for Counterterrorism

Modern terrorist networks pose an unprecedented threat to international security. Their fluid and non-hierarchical structures, their religious and ideological motivations, and their predominantly non-territorial objectives all radically complicate the question of how to neutralize them. As governmen...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Argamon, Shlomo (Editor ), Howard, Newton (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • I Information Access
  • On Searching in the #x201C;Real World#x201D;
  • Signature-Based Retrieval of Scanned Documents Using Conditional Random Fields
  • What Makes a Good Summary?
  • A Prototype Search Toolkit
  • II Text Analysis
  • Unapparent Information Revelation: Text Mining for Counterterrorism
  • Identification of Information
  • Rich Language Analysis for Counterterrorism
  • III Graphical Models
  • Dicliques: Finding Needles in Haystacks
  • Information Superiority via Formal Concept Analysis
  • Reflexive Analysis of Groups
  • Evaluating Self-Reflexion Analysis Using Repertory Grids
  • IV Conflict Analysis
  • Anticipating Terrorist Safe Havens from Instability Induced Conflict
  • Applied Counterfactual Reasoning
  • Adversarial Planning in Networks
  • Gaming and Simulating Ethno-Political Conflicts.