0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (21)
  • R2,500 - R5,000 (20)
  • R5,000 - R10,000 (5)
  • -
Status
Brand

Showing 1 - 25 of 46 matches in All Departments

Smart Health - International Conference, ICSH 2018, Wuhan, China, July 1-3, 2018, Proceedings (Paperback, 1st ed. 2018):... Smart Health - International Conference, ICSH 2018, Wuhan, China, July 1-3, 2018, Proceedings (Paperback, 1st ed. 2018)
Hsinchun Chen, Qing Fang, Daniel Zeng, Jiang Wu
R1,582 Discovery Miles 15 820 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference for Smart Health, ICSH 2018, held in Wuhan, China, in July 2018.The 14 full papers and 21 short papers presented were carefully reviewed and selected from 49 submissions. They focus on studies on the principles, approaches, models, frameworks, new applications, and effects of using novel information technology to address healthcare problems and improve social welfare. The selected papers are organized into the following topics: smart hospital; online health community; mobile health; medical big data and healthcare machine learning; chronic disease management; and health informatics.

Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings... Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings (Paperback, 2015 ed.)
Michael Chau, G. Alan Wang, Hsinchun Chen
R1,302 Discovery Miles 13 020 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2015, held in Ho Chi Minh City, Vietnam, in May 2015 in conjunction with PAKDD 2015, the 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 8 revised full papers presented were carefully reviewed and selected from numerous submissions. Topics of the workshop are information sharing and big data analytics, infrastructure protection and emergency responses, cybercrime and terrorism informatics and analytics, as well as enterprise risk management, IS security and social media analytics. The papers present a significant view on regional data sets and case studies, including online social media and multimedia, fraud deception and text mining.

Mapping Nanotechnology Innovations and Knowledge - Global and Longitudinal Patent and Literature Analysis (Paperback, 2009... Mapping Nanotechnology Innovations and Knowledge - Global and Longitudinal Patent and Literature Analysis (Paperback, 2009 ed.)
Hsinchun Chen
R3,230 Discovery Miles 32 300 Ships in 10 - 15 working days

This book defines the application of Information Technology's systematic and automated knowledge mapping methodology to collect, analyze and report nanotechnology research on a global basis. The result of these analyses is be a systematic presentation of the state of the art of nanotechnology, which will include basic analysis, content analysis, and citation network analysis of comprehensive nanotechnology findings across technology domains, inventors, institutions, and countries.

Terrorism Informatics - Knowledge Management and Data Mining for Homeland Security (Paperback, 2008 ed.): Hsinchun Chen, Edna... Terrorism Informatics - Knowledge Management and Data Mining for Homeland Security (Paperback, 2008 ed.)
Hsinchun Chen, Edna Reid, Joshua Sinai, Andrew Silke, Boaz Ganor
R3,309 Discovery Miles 33 090 Ships in 10 - 15 working days

This book is nothing less than a complete and comprehensive survey of the state-of-the-art of terrorism informatics. It covers the application of advanced methodologies and information fusion and analysis. It also lays out techniques to acquire, integrate, process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The book details three major areas of terrorism research: prevention, detection, and established governmental responses to terrorism. It systematically examines the current and ongoing research, including recent case studies and application of terrorism informatics techniques. The coverage then presents the critical and relevant social/technical areas to terrorism research including social, privacy, data confidentiality, and legal challenges.

Smart Health - International Conference, ICSH 2014, Beijing, China, July 10-11, 2014. Proceedings (Paperback, 2014 ed.):... Smart Health - International Conference, ICSH 2014, Beijing, China, July 10-11, 2014. Proceedings (Paperback, 2014 ed.)
Xiaolong Zheng, Daniel Zeng, Hsinchun Chen, Yong Zhang, Chunxiao Xing, …
R1,542 Discovery Miles 15 420 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference for Smart Health, ICSH 2014, held in Beijing, China, in July 2014. The 21 papers presented together with 4 extended abstracts were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on information sharing, integrating and extraction; health data analysis and management; clinical and medical data mining; and clinical practice and medical monitoring.

Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings... Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings (Paperback, 2014 ed.)
Michael Chau, Hsinchun Chen, G. Alan Wang, Jau-Hwang Wang
R1,835 Discovery Miles 18 350 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2014, held in Tainan, Taiwan, in May 2014 in conjunction with PAKDD 2014, the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 7 revised full papers presented together with one short paper were carefully reviewed and selected from 10 submissions. The papers are organized in topical sections on regional data sets and case studies, cybercrime, information security engineering and text mining.

Dark Web - Exploring and Data Mining the Dark Side of the Web (Paperback, 2012): Hsinchun Chen Dark Web - Exploring and Data Mining the Dark Side of the Web (Paperback, 2012)
Hsinchun Chen
R4,543 Discovery Miles 45 430 Ships in 10 - 15 working days

The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups, including web sites, forums, chat rooms, blogs, social networking sites, videos, virtual world, etc. We have developed various multilingual data mining, text mining, and web mining techniques to perform link analysis, content analysis, web metrics (technical sophistication) analysis, sentiment analysis, authorship analysis, and video analysis in our research. The approaches and methods developed in this project contribute to advancing the field of Intelligence and Security Informatics (ISI). Such advances will help related stakeholders to perform terrorism research and facilitate international security and peace. This monograph aims to provide an overview of the Dark Web landscape, suggest a systematic, computational approach to understanding the problems, and illustrate with selected techniques, methods, and case studies developed by the University of Arizona AI Lab Dark Web team members. This work aims to provide an interdisciplinary and understandable monograph about Dark Web research along three dimensions: methodological issues in Dark Web research; database and computational techniques to support information collection and data mining; and legal, social, privacy, and data confidentiality challenges and approaches. It will bring useful knowledge to scientists, security professionals, counterterrorism experts, and policy makers. The monograph can also serve as a reference material or textbook in graduate level courses related to information security, information policy, information assurance, information systems, terrorism, and public policy.

Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings... Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings (Paperback, 2013 ed.)
G. Alan Wang, Xiaolong Zheng, Michael Chau, Hsinchun Chen
R1,429 Discovery Miles 14 290 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2013, held in Beijing, China, in August 2013 in conjunction with the International Joint Conference on Artificial Intelligence (IJCAI 2013). The 4 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on information sharing and data/text mining; terrorism informatics; network-based data analytics; and information access and security.

Infectious Disease Informatics and Biosurveillance (Paperback, 2011 ed.): Daniel Zeng, Hsinchun Chen, Carlos Castillo-Chavez,... Infectious Disease Informatics and Biosurveillance (Paperback, 2011 ed.)
Daniel Zeng, Hsinchun Chen, Carlos Castillo-Chavez, William B. Lober, Mark Thurmond
R7,363 Discovery Miles 73 630 Ships in 10 - 15 working days

This book on Infectious Disease Informatics (IDI) and biosurveillance is intended to provide an integrated view of the current state of the art, identify technical and policy challenges and opportunities, and promote cross-disciplinary research that takes advantage of novel methodology and what we have learned from innovative applications. This book also fills a systemic gap in the literature by emphasizing informatics driven perspectives (e.g., information system design, data standards, computational aspects of biosurveillance algorithms, and system evaluation). Finally, this book attempts to reach policy makers and practitioners through the clear and effective communication of recent research findings in the context of case studies in IDI and biosurveillance, providing "hands-on" in-depth opportunities to practitioners to increase their understanding of value, applicability, and limitations of technical solutions. This book collects the state of the art research and modern perspectives of distinguished individuals and research groups on cutting-edge IDI technical and policy research and its application in biosurveillance. The contributed chapters are grouped into three units. Unit I provides an overview of recent biosurveillance research while highlighting the relevant legal and policy structures in the context of IDI and biosurveillance ongoing activities. It also identifies IDI data sources while addressing information collection, sharing, and dissemination issues as well as ethical considerations. Unit II contains survey chapters on the types of surveillance methods used to analyze IDI data in the context of public health and bioterrorism. Specific computational techniques covered include: text mining, time series analysis, multiple data streams methods, ensembles of surveillance methods, spatial analysis and visualization, social network analysis, and agent-based simulation. Unit III examines IT and decision support for public health event response and bio-defense. Practical lessons learned in developing public health and biosurveillance systems, technology adoption, and syndromic surveillance for large events are discussed. The goal of this book is to provide an understandable interdisciplinary IDI and biosurveillance reference either used as a standalone textbook or reference for students, researchers, and practitioners in public health, veterinary medicine, biostatistics, information systems, computer science, and public administration and policy.

Sports Data Mining (Paperback, 2010 ed.): Robert P. Schumaker, Osama K. Solieman, Hsinchun Chen Sports Data Mining (Paperback, 2010 ed.)
Robert P. Schumaker, Osama K. Solieman, Hsinchun Chen
R2,912 Discovery Miles 29 120 Ships in 10 - 15 working days

Data mining is the process of extracting hidden patterns from data, and it's commonly used in business, bioinformatics, counter-terrorism, and, increasingly, in professional sports. First popularized in Michael Lewis' best-selling Moneyball: The Art of Winning An Unfair Game, it is has become an intrinsic part of all professional sports the world over, from baseball to cricket to soccer. While an industry has developed based on statistical analysis services for any given sport, or even for betting behavior analysis on these sports, no research-level book has considered the subject in any detail until now. Sports Data Mining brings together in one place the state of the art as it concerns an international array of sports: baseball, football, basketball, soccer, greyhound racing are all covered, and the authors (including Hsinchun Chen, one of the most esteemed and well-known experts in data mining in the world) present the latest research, developments, software available, and applications for each sport. They even examine the hidden patterns in gaming and wagering, along with the most common systems for wager analysis.

Infectious Disease Informatics - Syndromic Surveillance for Public Health and Bio-Defense (Paperback, 2010 ed.): Hsinchun Chen,... Infectious Disease Informatics - Syndromic Surveillance for Public Health and Bio-Defense (Paperback, 2010 ed.)
Hsinchun Chen, Daniel Zeng, Ping Yan
R5,249 Discovery Miles 52 490 Ships in 10 - 15 working days

Computer-based infectious disease surveillance systems are capable of real-time or near real-time detection of serious illnesses and potential bioterrorism agent exposures and represent a major step forward in disease surveillance. Infectious Disease Informatics: Syndromic Surveillance for Public Health and Bio-Defense is an in-depth monograph that analyzes and evaluates the outbreak modeling and detection capabilities of existing surveillance systems under a unified framework, and presents the first book-length coverage of the subject from an informatics-driven perspective. Individual chapters consider the state of the art, including the facilitation of data collection, sharing and transmission; a focus on various outbreak detection methods; data visualization and information dissemination issues; and system assessment and other policy issues. Eight chapters then report on several real-world case studies, summarizing and comparing eight syndromic surveillance systems, including those that have been adopted by many public health agencies (e.g., RODS and BioSense). The book concludes with a discussion of critical issues and challenges, with a look to future directions. This book is an excellent source of current information for researchers in public health and IT. Government public health officials and private-sector practitioners in both public health and IT will find the most up-to-date information available, and students from a variety of disciplines, including public health, biostatistics, information systems, computer science, and public administration and policy will get a comprehensive look at the concepts, techniques, and practices of syndromic surveillance.

Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011. Proceedings... Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011. Proceedings (Paperback, 2011 ed.)
Michael Chau, G. Alan Wang, Xiaolong Zheng, Hsinchun Chen, Daniel Zeng, …
R1,509 Discovery Miles 15 090 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2011, held in Beijing, China, in July 2011. The 8 revised full papers and the 5 short papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on terrorism informatics and crime analysis; intelligence analysis and knowledge discovery; information access and security; and infectious disease informatics.

Infectious Disease Informatics and Biosurveillance (Hardcover, 2011 Ed.): Daniel Zeng, Hsinchun Chen, Carlos Castillo-Chavez,... Infectious Disease Informatics and Biosurveillance (Hardcover, 2011 Ed.)
Daniel Zeng, Hsinchun Chen, Carlos Castillo-Chavez, William B. Lober, Mark Thurmond
R6,099 Discovery Miles 60 990 Ships in 10 - 15 working days

This book on Infectious Disease Informatics (IDI) and biosurveillance is intended to provide an integrated view of the current state of the art, identify technical and policy challenges and opportunities, and promote cross-disciplinary research that takes advantage of novel methodology and what we have learned from innovative applications. This book also fills a systemic gap in the literature by emphasizing informatics driven perspectives (e.g., information system design, data standards, computational aspects of biosurveillance algorithms, and system evaluation). Finally, this book attempts to reach policy makers and practitioners through the clear and effective communication of recent research findings in the context of case studies in IDI and biosurveillance, providing "hands-on" in-depth opportunities to practitioners to increase their understanding of value, applicability, and limitations of technical solutions. This book collects the state of the art research and modern perspectives of distinguished individuals and research groups on cutting-edge IDI technical and policy research and its application in biosurveillance. The contributed chapters are grouped into three units. Unit I provides an overview of recent biosurveillance research while highlighting the relevant legal and policy structures in the context of IDI and biosurveillance ongoing activities. It also identifies IDI data sources while addressing information collection, sharing, and dissemination issues as well as ethical considerations. Unit II contains survey chapters on the types of surveillance methods used to analyze IDI data in the context of public health and bioterrorism. Specific computational techniques covered include: text mining, time series analysis, multiple data streams methods, ensembles of surveillance methods, spatial analysis and visualization, social network analysis, and agent-based simulation. Unit III examines IT and decision support for public health event response and bio-defense. Practical lessons learned in developing public health and biosurveillance systems, technology adoption, and syndromic surveillance for large events are discussed. The goal of this book is to provide an understandable interdisciplinary IDI and biosurveillance reference either used as a standalone textbook or reference for students, researchers, and practitioners in public health, veterinary medicine, biostatistics, information systems, computer science, and public administration and policy.

Digital Government - E-Government Research, Case Studies, and Implementation (Paperback, Softcover reprint of hardcover 1st ed.... Digital Government - E-Government Research, Case Studies, and Implementation (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Hsinchun Chen, Lawrence Brandt, Valerie Gregg, Roland Traunmuller, Sharon Dawes, …
R3,623 Discovery Miles 36 230 Ships in 10 - 15 working days

At last, a right up-to-the-minute volume on a topic of huge national and international importance. As governments around the world battle voter apathy, the need for new and modernized methods of involvement in the polity is becoming acute. This work provides information on advanced research and case studies that survey the field of digital government. Successful applications in a variety of government settings are delineated, while the authors also analyse the implications for current and future policy-making. Each chapter has been prepared and carefully edited within a structured format by a known expert on the individual topic.

Intelligence and Security Informatics - Techniques and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008):... Intelligence and Security Informatics - Techniques and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Hsinchun Chen, Christopher C. Yang
R4,542 Discovery Miles 45 420 Ships in 10 - 15 working days

The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http: //www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, - formation technology consultant and practitioners to discuss their research and pr- tice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, - ber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, among others. In this book, we collect the work of the most active researchers in the area. Topics include data and text mining in terr- ism, information sharing, social network analysis, Web-based intelligence monitoring and analysis, crime data analysis, infrastructure protection, deception and intent det- tion and more. Scope and Organization The book is organized in four major areas. The first unit focuses on the terrorism - formatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The forth unit presents surveillance and emergency response

Sports Data Mining (Hardcover, 2010 Ed.): Robert P. Schumaker, Osama K. Solieman, Hsinchun Chen Sports Data Mining (Hardcover, 2010 Ed.)
Robert P. Schumaker, Osama K. Solieman, Hsinchun Chen
R2,944 Discovery Miles 29 440 Ships in 10 - 15 working days

Data mining is the process of extracting hidden patterns from data, and it's commonly used in business, bioinformatics, counter-terrorism, and, increasingly, in professional sports. First popularized in Michael Lewis' best-selling Moneyball: The Art of Winning An Unfair Game, it is has become an intrinsic part of all professional sports the world over, from baseball to cricket to soccer. While an industry has developed based on statistical analysis services for any given sport, or even for betting behavior analysis on these sports, no research-level book has considered the subject in any detail until now. Sports Data Mining brings together in one place the state of the art as it concerns an international array of sports: baseball, football, basketball, soccer, greyhound racing are all covered, and the authors (including Hsinchun Chen, one of the most esteemed and well-known experts in data mining in the world) present the latest research, developments, software available, and applications for each sport. They even examine the hidden patterns in gaming and wagering, along with the most common systems for wager analysis.

Infectious Disease Informatics - Syndromic Surveillance for Public Health and Bio-Defense (Hardcover, 2010 ed.): Hsinchun Chen,... Infectious Disease Informatics - Syndromic Surveillance for Public Health and Bio-Defense (Hardcover, 2010 ed.)
Hsinchun Chen, Daniel Zeng, Ping Yan
R5,899 Discovery Miles 58 990 Ships in 10 - 15 working days

Computer-based infectious disease surveillance systems are capable of real-time or near real-time detection of serious illnesses and potential bioterrorism agent exposures and represent a major step forward in disease surveillance. Infectious Disease Informatics: Syndromic Surveillance for Public Health and Bio-Defense is an in-depth monograph that analyzes and evaluates the outbreak modeling and detection capabilities of existing surveillance systems under a unified framework, and presents the first book-length coverage of the subject from an informatics-driven perspective. Individual chapters consider the state of the art, including the facilitation of data collection, sharing and transmission; a focus on various outbreak detection methods; data visualization and information dissemination issues; and system assessment and other policy issues. Eight chapters then report on several real-world case studies, summarizing and comparing eight syndromic surveillance systems, including those that have been adopted by many public health agencies (e.g., RODS and BioSense). The book concludes with a discussion of critical issues and challenges, with a look to future directions. This book is an excellent source of current information for researchers in public health and IT. Government public health officials and private-sector practitioners in both public health and IT will find the most up-to-date information available, and students from a variety of disciplines, including public health, biostatistics, information systems, computer science, and public administration and policy will get a comprehensive look at the concepts, techniques, and practices of syndromic surveillance.

Security Informatics (Paperback, 2010 ed.): Christopher C. Yang, Michael Chau, Jau-Hwang Wang, Hsinchun Chen Security Informatics (Paperback, 2010 ed.)
Christopher C. Yang, Michael Chau, Jau-Hwang Wang, Hsinchun Chen
R2,984 Discovery Miles 29 840 Ships in 10 - 15 working days

Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. ISI topics include ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, and other related topics. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners.

SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field; the volume will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics. The volume features high-quality contributions from worldwide leading experts across a variety of discipline domains. Each contribution follows a uniform structure and has undergone a thorough peer-review process.

Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings... Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings (Paperback, 2009 ed.)
Hsinchun Chen, Christopher C. Yang, Michael Chau, Shu-Hsing Li
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

Intelligence and Security Informatics (ISI) is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The annual IEEE International Conference series on ISI was started in 2003 and the first four meetings were held in the United States. In 2006, the Workshop on ISI (http: //isi. se. cuhk. edu. hk/2006/) was held in Singapore in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining, with over 100 contributors and participants from all over the world. PAISI 2007 (http: //isi. se. cuhk. edu. hk/2007/) was then held in Chengdu, China and PAISI 2008 (http: //isi. se. cuhk. edu. hk/2008/) was held in Taiwan. These ISI conferences have brought together academic researchers, law enforcement and intel- gence experts, information technology consultants and practitioners to discuss their research and practice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. We continued the stream of ISI conferences by organizing the 2009 Pacific Asia Workshop on ISI (PAISI 2009) in conjunction with the Pacific Asia Conference on Knowledge Disc- ery and Data Mining (PAKDD 200

Biosurveillance and Biosecurity - International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings... Biosurveillance and Biosecurity - International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings (Paperback, 2008 ed.)
Daniel Zeng, Hsinchun Chen, Henry Rolka, William B. Lober
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

The 2008 Biosurveillance and Biosecurity Workshop (BioSecure 2008) was built on the success of the two U. S. National Science Foundation-sponsored Biosurveillance Workshops. The inaugural 2006 workshop was hosted by the University of Arizona's NSF BioPortal Center. It attracted more than 35 participants from academic insti- tions, industry, and public health agencies, and achieved its objective of bringing together infectious disease informatics (IDI) researchers and practitioners to discuss selected topics directly relevant to data sharing and analysis for real-time animal and public health surveillance. The 2007 meeting was held in New Brunswick, New J- sey, co-located with the 2007 IEEE International Conference on Intelligence and - curity Informatics, and met with tremendous success. Researchers from a wide range of backgrounds, including biosecurity, epidemiology, statistics, applied mathematics, information systems, computer science and machine learning/data mining, contributed formal papers to the workshop and actively participated in the meeting along with practitioners from both government agencies and industry. More than 65 people - tended the one-day workshop, representing major research labs across multiple dis- plines, key industry players, and a range of government entities. BioSecure 2008 continued this workshop series aiming to achieve the following objectives: (a) review and examine various informatics approaches for health surve- lance and biosecurity from both technological and policy perspectives; and (b) discuss and compare various systems approaches and algorithms of relevance to biosurve- lance and biosecurity.

Intelligence and Security Informatics - IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June... Intelligence and Security Informatics - IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings (Paperback, 2008 ed.)
Christopher C. Yang, Hsinchun Chen, Michael Chau, Kuiyu Chang, Sheau-Dong Lang, …
R1,637 Discovery Miles 16 370 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008.

The 55 revised full papers presented were carefully reviewed and selected from the presentations at the workshops. The 21 papers of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) cover topics such as information retrieval and event detection, internet security and cybercrime, currency and data protection, cryptography, image and video analysis, privacy issues, social networks, modeling and visualization, and network intrusion detection. The Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) furnishes 10 papers about forensic information management, forensic technologies, and forensic principles and tools. The 24 papers of the Workshop on Social Computing (SOCO 2008) are organized in topical sections on social web and social information management, social networks and agent-based modeling, as well as social opinions, e-commerce, security and privacy considerations.

Intelligence and Security Informatics - Techniques and Applications (Hardcover, 2008 ed.): Hsinchun Chen, Christopher C. Yang Intelligence and Security Informatics - Techniques and Applications (Hardcover, 2008 ed.)
Hsinchun Chen, Christopher C. Yang
R4,781 Discovery Miles 47 810 Ships in 10 - 15 working days

The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http: //www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, - formation technology consultant and practitioners to discuss their research and pr- tice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, - ber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, among others. In this book, we collect the work of the most active researchers in the area. Topics include data and text mining in terr- ism, information sharing, social network analysis, Web-based intelligence monitoring and analysis, crime data analysis, infrastructure protection, deception and intent det- tion and more. Scope and Organization The book is organized in four major areas. The first unit focuses on the terrorism - formatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The forth unit presents surveillance and emergency response

Digital Government - E-Government Research, Case Studies, and Implementation (Hardcover, 2008 ed.): Hsinchun Chen, Lawrence... Digital Government - E-Government Research, Case Studies, and Implementation (Hardcover, 2008 ed.)
Hsinchun Chen, Lawrence Brandt, Valerie Gregg, Roland Traunmuller, Sharon Dawes, …
R3,457 Discovery Miles 34 570 Ships in 10 - 15 working days

At last, a right up-to-the-minute volume on a topic of huge national and international importance. As governments around the world battle voter apathy, the need for new and modernized methods of involvement in the polity is becoming acute. This work provides information on advanced research and case studies that survey the field of digital government. Successful applications in a variety of government settings are delineated, while the authors also analyse the implications for current and future policy-making. Each chapter has been prepared and carefully edited within a structured format by a known expert on the individual topic.

Intelligence and Security Informatics: Biosurveillance - Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May... Intelligence and Security Informatics: Biosurveillance - Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May 22, 2007, Proceedings (Paperback, 2007 ed.)
Daniel Zeng, Ivan Gotham, Ken Komatsu, Cecil Lynch, Mark Thurmond, …
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second NSF Workshop on Biosurveillance Systems and Case Studies, BioSurveillance 2007, held in New Brunswick, NJ, USA in May 2007, co-located with the 2007 IEEE International Conference on Intelligence and Security Informatics (ISI 2007).

The 17 revised full papers, 6 revised short papers presented together with 1 invited talk and 2 poster papers were carefully reviewed and selected for inclusion in the book. Bringing together infectious disease informatics (IDI) researchers and practitioners to discuss selected topics directly relevant to data sharing and analysis for real-time animal and public health surveillance, the workshop covers a wide range of backgrounds such as epidemiology, statistics, applied mathematics, information systems, computer science and machine learning/data mining.

Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San... Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. (Paperback, 2006 ed.)
Sharad Mehrotra, Daniel D. Zeng, Hsinchun Chen
R3,376 Discovery Miles 33 760 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006. Gathers 39 revised full papers, 30 revised short papers, and 56 extended poster abstracts, organized in topical sections including intelligence analysis and knowledge discovery; access control, privacy, and cyber trust; surveillance and emergency response; infrastructure protection and cyber security; terrorism informatics and countermeasures; surveillance, bioterrorism, and emergency response.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Russell Hobbs Freedom Cordless Dry Spra…
R1,199 R999 Discovery Miles 9 990
Shield Fresh 24 Gel Air Freshener…
R31 Discovery Miles 310
Faber-Castell Minibox 1 Hole Sharpener…
R10 Discovery Miles 100
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Joseph Joseph Index Mini (Graphite)
R642 Discovery Miles 6 420
Birds Of Greater Southern Africa
Keith Barnes, Terry Stevenson, … Paperback  (4)
R450 R299 Discovery Miles 2 990
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Shazam 2 - Fury Of The Gods
Zachary Levi, Helen Mirren, … DVD R189 Discovery Miles 1 890
Morbius
Jared Leto, Matt Smith, … DVD R179 Discovery Miles 1 790

 

Partners