An Algorithm for Subgraph Isomorphism
Journal of the ACM (JACM)
Information awareness: a prospective technical assessment
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
A Network Analysis Model for Disambiguation of Names in Lists
Computational & Mathematical Organization Theory
Designing irregular parallel algorithms with mutual exclusion and lock-free protocols
Journal of Parallel and Distributed Computing
POLESTAR: collaborative knowledge management and sensemaking tools for intelligence analysts
CIKM '06 Proceedings of the 15th ACM international conference on Information and knowledge management
Fast best-effort pattern matching in large attributed graphs
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Novel information discovery for intelligence and counterterrorism
Decision Support Systems
Supporting ontology-based semantic matching in RDBMS
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Investigative data mining and its application in counterterrorism
AIC'05 Proceedings of the 5th WSEAS International Conference on Applied Informatics and Communications
Using importance flooding to identify interesting networks of criminal activity
Journal of the American Society for Information Science and Technology
A Process Catalog for Workflow Generation
ISWC '08 Proceedings of the 7th International Conference on The Semantic Web
Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms
PAISI '09 Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics
Prediction of past unsolved terrorist attacks
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Practical algorithms for subgroup detection in covert networks
International Journal of Business Intelligence and Data Mining
Approximating betweenness centrality
WAW'07 Proceedings of the 5th international conference on Algorithms and models for the web-graph
Using active modeling in counterterrorism
Active conceptual modeling of learning
Using importance flooding to identify interesting networks of criminal activity
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Entity workspace: an evidence file that aids memory, inference, and reading
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Large-scale continuous subgraph queries on streams
Proceedings of the first annual workshop on High performance computing meets databases
Beyond keyword filtering for message and conversation detection
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Combined detection model for criminal network detection
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
Where do I start?: algorithmic strategies to guide intelligence analysts
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics
Storytelling in entity networks to support intelligence analysts
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
Inexact subgraph isomorphism in MapReduce
Journal of Parallel and Distributed Computing
Betweenness centrality: algorithms and implementations
Proceedings of the 18th ACM SIGPLAN symposium on Principles and practice of parallel programming
Hi-index | 0.00 |
Enhancing traditional algorithmic techniques for improved pattern analysis.