|
Journals in DBLP
- James A. Hendler
A Letter from the Editor: Avoiding Rejection. [Citation Graph (0, 0)][DBLP] IEEE Intelligent Systems, 2005, v:20, n:5, pp:2-4 [Journal]
- Danna Voth
In the News. [Citation Graph (0, 0)][DBLP] IEEE Intelligent Systems, 2005, v:20, n:5, pp:6-9 [Journal]
- Sara Reese Hedberg
Robert Milne (1956-2005). [Citation Graph (0, 0)][DBLP] IEEE Intelligent Systems, 2005, v:20, n:5, pp:10-11 [Journal]
- Hsinchun Chen, Fei-Yue Wang
Guest Editors' Introduction: Artificial Intelligence for Homeland Security. [Citation Graph (0, 0)][DBLP] IEEE Intelligent Systems, 2005, v:20, n:5, pp:12-16 [Journal]
- Joseph Kopena, Evan Sultanik, Gaurav Naik, Iris Howley, Maxim Peysakhov, Vincent A. Cicirello, Moshe Kam, William C. Regli
Service-Based Computing on Manets: Enabling Dynamic Interoperability of First Responders. [Citation Graph (0, 0)][DBLP] IEEE Intelligent Systems, 2005, v:20, n:5, pp:17-25 [Journal]
- Monica Crubézy, Martin J. O'Connor, David L. Buckeridge, Zachary Pincus, Mark A. Musen
Ontology-Centered Syndromic Surveillance for Bioterrorism. [Citation Graph (0, 0)][DBLP] IEEE Intelligent Systems, 2005, v:20, n:5, pp:26-35 [Journal]
- Thomas O. Meservy, Matthew L. Jensen, John Kruse, Douglas P. Twitchell, Judee K. Burgoon, Dimitris N. Metaxas, Jay F. Nunamaker Jr.
Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior. [Citation Graph (0, 0)][DBLP] IEEE Intelligent Systems, 2005, v:20, n:5, pp:36-43 [Journal]
- Yilu Zhou, Edna Reid, Jialun Qin, Hsinchun Chen, Guanpi Lai
US Domestic Extremist Groups on the Web: Link and Content Analysis. [Citation Graph (0, 0)][DBLP] IEEE Intelligent Systems, 2005, v:20, n:5, pp:44-51 [Journal]
- Yiyu Yao, Fei-Yue Wang, Jue Wang, Daniel Dajun Zeng
Rule + Exception Strategies for Security Information Analysis. [Citation Graph (0, 0)][DBLP] IEEE Intelligent Systems, 2005, v:20, n:5, pp:52-57 [Journal]
- Mohan M. Trivedi, Tarak Gandhi, Kohsia S. Huang
Distributed Interactive Video Arrays for Event Capture and Enhanced Situational Awareness. [Citation Graph (0, 0)][DBLP] IEEE Intelligent Systems, 2005, v:20, n:5, pp:58-66 [Journal]
- Ahmed Abbasi, Hsinchun Chen
Applying Authorship Analysis to Extremist-Group Web Forum Messages. [Citation Graph (0, 0)][DBLP] IEEE Intelligent Systems, 2005, v:20, n:5, pp:67-75 [Journal]
- John Yen, Robert Popp, George Cybenko, Latanya Sweeney, Paul Rosenzweig
Homeland Security. [Citation Graph (0, 0)][DBLP] IEEE Intelligent Systems, 2005, v:20, n:5, pp:76-86 [Journal]
- Adam Souzis
Building a Semantic Wiki. [Citation Graph (0, 0)][DBLP] IEEE Intelligent Systems, 2005, v:20, n:5, pp:87-91 [Journal]
- Fei-Yue Wang
Agent-Based Control for Networked Traffic Management Systems. [Citation Graph (0, 0)][DBLP] IEEE Intelligent Systems, 2005, v:20, n:5, pp:92-96 [Journal]
|