You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on Complex Sciences, COMPLEX 2012, held in Santa Fe, New Mexico, USA in December 2012. The 29 revised full papers presented were carefully reviewed and selected from various submissions. The papers cover aspects on foundations and analysis of complex systems, complex biological systems, complex social systems, complex engineering systems.
In recent years, online social networking has revolutionized interpersonal communication. The newer research on language analysis in social media has been increasingly focusing on the latter's impact on our daily lives, both on a personal and a professional level. Natural language processing (NLP) is one of the most promising avenues for social media data processing. It is a scientific challenge to develop powerful methods and algorithms that extract relevant information from a large volume of data coming from multiple sources and languages in various formats or in free form. This book will discuss the challenges in analyzing social media texts in contrast with traditional documents. Researc...
This book constitutes the refereed proceedings of the Third International Conference on Social Computing, Behavioral Modeling, and Prediction, SBP 2010, held in Bethseda, MD, USA, in March 2010. The 26 revised full papers and 23 revised poster papers presented together with 4 invited and keynote papers were carefully reviewed and selected from 78 initial submissions. The papers cover a wide range of interesting topics such as social network analysis, modeling, machine learning and data mining, social behaviors, public health, cultural aspects, effects and search.
This volume brings together a distinguished group of scholars working to address the puzzling durability of communist autocracies in Eastern Europe and Asia, which are the longest-lasting type of non-democratic regime to emerge after World War I. The volume conceptualizes the communist universe as consisting of the ten regimes in Eastern Europe and Mongolia that eventually collapsed in 1989–91, and the five regimes that survived the fall of the Berlin Wall: China, Vietnam, Laos, North Korea and Cuba. The essays offer a theoretical argument that emphasizes the importance of institutional adaptations as a foundation of communist resilience. In particular, the contributors focus on four adaptations: of the economy, of ideology, of the mechanisms for inclusion of potential rivals, and of the institutions of vertical and horizontal accountability. The volume argues that when regimes are no longer able to implement adaptive change, contingent leadership choices and contagion dynamics make collapse more likely.
The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the world The latest research on this subject is concisely presented within the book, with several figures to support the text. Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI)
Supply chain management contends with structures and processes for delivering goods and services to customers. It addresses the core functions of connected businesses to meet downstream demand. This innovative volume provides an authoritative and timely guide to the overarching issues that are ubiquitous throughout the supply chain. In particular, it addresses emerging issues that are applicable across supply chains--such as data science, financial flows, human capital, internet technologies, risk management, cyber security, and supply networks. With chapters from an international roster of leading scholars in the field, the Oxford Handbook of Supply Chain Management is a necessary resource for all students and researchers of the field as well as for forward-thinking practitioners.
This book reports on the latest advances in concepts and further development of principal component analysis (PCA), discussing in detail a number of open problems related to dimensional reduction techniques and their extensions. It brings together research findings, previously scattered throughout many scientific journal papers worldwide, and presents them in a methodologically unified form. Offering vital insights into the subject matter in self-contained chapters that balance the theory and concrete applications, and focusing on open problems, it is essential reading for all researchers and practitioners with an interest in PCA
The intelligence failures exposed by the events of 9/11 and the missing weapons of mass destruction in Iraq have made one thing perfectly clear: change is needed in how the U.S. intelligence community operates. Transforming U.S. Intelligence argues that transforming intelligence requires as much a look to the future as to the past and a focus more on the art and practice of intelligence rather than on its bureaucratic arrangements. In fact, while the recent restructuring, including the creation of the Department of Homeland Security, may solve some problems, it has also created new ones. The authors of this volume agree that transforming policies and practices will be the most effective way ...
None
Decision makers matching wits with an adversary want intelligence—good, relevant information to help them win. Intelligence can gain these advantages through directed research and analysis, agile collection, and the timely use of guile and theft. Counterintelligence is the art and practice of defeating these endeavors. Its purpose is the same as that of positive intelligence—to gain advantage—but it does so by exploiting, disrupting, denying, or manipulating the intelligence activities of others. The tools of counterintelligence include security systems, deception, and disguise: vaults, mirrors, and masks. In one indispensable volume, top practitioners and scholars in the field explain...