rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783642011405

Computational Methods for Counterterrorism

by ;
  • ISBN13:

    9783642011405

  • ISBN10:

    3642011403

  • Format: Hardcover
  • Copyright: 2009-07-01
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $169.99
We're Sorry.
No Options Available at This Time.

Summary

Modern terrorist networks pose an unprecedented threat to international security. The question of how to neutralize that threat is complicated radically by their fluid, non-hierarchical structures, religious and ideological motivations, and predominantly non-territorial objectives. Governments and militaries are crafting new policies and doctrines to combat terror, but they desperately need new technologies to make these efforts effective. This book collects a wide range of the most current computational research that addresses critical issues for countering terrorism, including:Finding, summarizing, and evaluating relevant information from large and changing data stores;Simulating and predicting enemy acts and outcomes; andProducing actionable intelligence by finding meaningful patterns hidden in huge amounts of noisy data.The book's four sections describe current research on discovering relevant information buried in vast amounts of unstructured data; extracting meaningful information from digitized documents in multiple languages; analyzing graphs and networks to shed light on adversaries' goals and intentions; and developing software systems that enable analysts to model, simulate, and predict the effects of real-world conflicts. The research described in this book is invaluable reading for governmental decision-makers designing new policies to counter terrorist threats, for members of the military, intelligence, and law enforcement communities devising counterterrorism strategies, and for researchers developing more effective methods for knowledge discovery in complicated and diverse datasets.

Author Biography

Shlomo Argamon is Associate Professor of Computer Science at the Illinois Institute of Technology, Chicago, IL, USA, since 2002. Prior to that, he had held academic positions at Bar-Ilan University, where he held a Fulbright Postdoctoral Fellowship (1994-96), and at the Jerusalem College of Technology. Dr. Argamon received his B.S. (1988) in Applied Mathematics from Carnegie-Mellon University, and his M.Phil. (1991) and Ph.D. (1994) in Computer Science from Yale University, where he was a Hertz Foundation Fellow. His current research interests lie mainly in the use of machine learning methods to aid in functional analysis of natural language, with particular focus on questions of style. During his career, Dr. Argamon has worked on a variety of problems in experimental machine learning, including robotic map-learning, theory revision, and natural language processing, and has published numerous research papers in these areas.

Table of Contents

Forewordp. VII
Prefacep. IX
Information Access
On Searching in the "Real World"p. 3
Signature-Based Retrieval of Scanned Documents Using Conditional Random Fieldsp. 17
What Makes a Good Summary?p. 33
A Prototype Search Toolkitp. 51
Text Analysis
Unapparent Information Revelation: Text Mining for Counterterrorismp. 67
Identification of Sensitive Unclassified Informationp. 89
Rich Language Analysis for Counterterrorismp. 109
Graphical Models
Dicliques: Finding Needles in Haystacksp. 123
Information Superiority via Formal Concept Analysisp. 143
Reflexive Analysis of Groupsp. 173
Evaluating Self-Reflexion Analysis Using Repertory Gridsp. 211
Conflict Analysis
Anticipating Terrorist Safe Havens from Instability Induced Conflictp. 229
Applied Counterfactual Reasoningp. 249
Adversarial Planning in Networksp. 263
Gaming and Simulating Ethno-Political Conflictsp. 275
Indexp. 303
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program