Foreword | p. VII |
Preface | p. IX |
Information Access | |
On Searching in the "Real World" | p. 3 |
Signature-Based Retrieval of Scanned Documents Using Conditional Random Fields | p. 17 |
What Makes a Good Summary? | p. 33 |
A Prototype Search Toolkit | p. 51 |
Text Analysis | |
Unapparent Information Revelation: Text Mining for Counterterrorism | p. 67 |
Identification of Sensitive Unclassified Information | p. 89 |
Rich Language Analysis for Counterterrorism | p. 109 |
Graphical Models | |
Dicliques: Finding Needles in Haystacks | p. 123 |
Information Superiority via Formal Concept Analysis | p. 143 |
Reflexive Analysis of Groups | p. 173 |
Evaluating Self-Reflexion Analysis Using Repertory Grids | p. 211 |
Conflict Analysis | |
Anticipating Terrorist Safe Havens from Instability Induced Conflict | p. 229 |
Applied Counterfactual Reasoning | p. 249 |
Adversarial Planning in Networks | p. 263 |
Gaming and Simulating Ethno-Political Conflicts | p. 275 |
Index | p. 303 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.