Intelligence and security informatics : IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005 : proceedings / Paul Kantor ... [et al.] (eds.).
Material type: TextSeries: Lecture notes in computer science ; 3495Publication details: Berlin ; New York : Springer, c2005.Description: xviii, 674 p. : ill. ; 24 cmISBN:- 3540259996
- IEEE International Conference on Intelligence and Security Informatics
- ISI 2005
- QA76.76.E95 I86 2005
Item type | Current library | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|
Books | Library First Floor | QA76.76.E95 I86 2005 (Browse shelf(Opens below)) | 1 | Available | 11300 |
Browsing Library shelves, Shelving location: First Floor Close shelf browser (Hides shelf browser)
No cover image available | ||||||||
QA76.76.E95 .A85 2014 Intelligent information and database systems : 6th Asian Conference, ACIIDS 2014, Bangkok, Thailand, April 7-9, 2014 : proceedings / | QA76.76.E95 B47 1991 Expert Database Systems : A Gentle Introduction / | QA76.76.E95 B47 1991 Expert Database Systems : A Gentle Introduction / | QA76.76.E95 I86 2005 Intelligence and security informatics : IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005 : proceedings / | QA76.76.E95 .J37 1999 Introduction to expert systems / | QA76.76.E95 P23 2005 Artificial intelligence and intelligent systems / | QA76.76.E95 P23 2005 Artificial intelligence and intelligent systems / |
Includes bibliographical references and author index.
This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, held in Atlanta, GA, USA in May 2005.The 28 revised full papers, 34 revised short papers, and 32 poster abstracts presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on data and text mining, infrastructure protection and emergency response, information management and security education, deception detection and authorship analysis, monitoring and surveillance, and terrorism informatics.
There are no comments on this title.