Search

Your search keyword '"Merkle, Ralph C."' showing total 285 results

Search Constraints

Start Over You searched for: Author "Merkle, Ralph C." Remove constraint Author: "Merkle, Ralph C."
285 results on '"Merkle, Ralph C."'

Search Results

51. A Survey of Software Watermarking.

52. Thematic Indicators Derived from World News Reports.

53. A Novel Watermarking Algorithm Based on SVD and Zernike Moments.

54. How Question Answering Technology Helps to Locate Malevolent Online Content.

55. Information Supply Chain: A Unified Framework for Information-Sharing.

56. Evaluating an Infectious Disease Information Sharing and Analysis System.

57. Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites.

58. Some Marginal Learning Algorithms for Unsupervised Problems.

59. LSI-Based Taxonomy Generation: The Taxonomist System.

60. Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content.

61. Efficient Discovery of New Information in Large Text Databases.

62. Discovering Identity Problems: A Case Study.

63. Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms.

64. Testing a Rational Choice Model of Airline Hijackings.

65. Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis.

66. Measuring Success in Countering Terrorism: Problems and Pitfalls.

67. A Conceptual Model of Counterterrorist Operations.

68. Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network.

69. A New Conceptual Framework to Resolve Terrorism's Root Causes.

70. Selective Fusion for Speaker Verification in Surveillance.

71. Modeling and Multiway Analysis of Chatroom Tensors.

72. Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS).

73. Beyond Keyword Filtering for Message and Conversation Detection.

74. A Cognitive Model for Alert Correlation in a Distributed Environment.

75. Automatically Determining an Anonymous Author's Native Language.

76. Automatic Extraction of Deceptive Behavioral Cues from Video.

77. Applying Authorship Analysis to Arabic Web Content.

78. Integrating Private Databases for Data Analysis.

79. Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts.

80. Toward a Target-Specific Method of Threat Assessment.

81. Sensitivity Analysis of an Attack Containment Model.

82. Risk Management Using Behavior Based Bayesian Networks.

83. Multi-modal Biometrics with PKI Technologies for Border Control Applications.

84. Design Principles of Coordinated Multi-incident Emergency Response Systems.

85. Private Mining of Association Rules.

86. Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature.

87. Link Analysis Tools for Intelligence and Counterterrorism.

88. Event-Driven Document Selection for Terrorism Information Extraction.

89. Efficient Identification of Overlapping Communities.

90. Digging in the Details: A Case Study in Network Data Mining.

91. Collusion Set Detection Through Outlier Discovery.

95. Theoretical studies of a hydrogen abstraction tool for nanotechnology

Catalog

Books, media, physical & digital resources