|
Schedule and Program
|
May 23, 2007
Wednesday
(Day One)
|
|
A |
B |
C |
|
7:00
am - 8:00 am |
Registration and Continental Breakfast |
8:00 am - 8:15 am |
Welcome
and Conference Opening |
|
8:15 am - 9:00 am |
Keynote
Address: Steven Nixon,
Deputy Associate Director of National
Intelligence for Science and Technology (DADNI/S&T),
Office of the
DNI, "Science and Technology in the
Intelligence Community" |
9:00
am - 10:00 am |
Track I Plenary Panel: Port Security and
Infrastructure Protection
Moderator: Jeffrey J. Milstein, Operations
Manager, Moran Agency, and Sr. Agent, Port
of NY/NJ
Panelists:
Beth Ann Rooney, Manager, Port Security,
Port Authority of NY/NJ
Steve Loevsky, General Manager, P&O Ports NA
and Manhattan Cruise Terminal
Capt. David L. Scott, Commander, USCG Sector
Delaware Bay
Peter Keyes, General Manager, Moran Towing,
Tug and Barge Company NY
Brendan T. Fitzpatrick, FBI/CGIS (Coast
Guard Investigative Service), JTTF (Joint
Terrorism Task Force) |
|
10:00
am - 10:30 am |
Break |
|
10:30 am - 12:00 pm |
Sessions
W1-I, W1-II, W1-III* |
|
Session
W1: 10:30 am - 12:00 pm |
W1-I:
Port Security and
Infrastructure Protection
Sequential Decision Making
Algorithms for Port of Entry Inspection:
Overcoming Computational Challenges (LP)
David Madigan, Sushil
Mittal and Fred Roberts
A
Bayesian-Enhanced Expert Methodology to
Assess Risk and Consequence of Future
Threats to Homeland Infrastructures (SP)
Michael
Smith, E. DeVere Henderson and William
Stryker
Using
Digital Chains of Custody on Constrained
Devices to Verify Evidence (LP)
Phillip
Bradford and Daniel Ray |
W1-II:
Emergency
Response Systems and Decision-Making
Approach for Discovering
and Handling Crisis in a Service-Oriented
Environment (LP)
Nabil Adam, Vandana Janeja,
Aabhas Paliwal, Basit Shafiq, Cedric
Ulmer, Volker Gersabeck, Anne Hardy,
Christof Bornhoevd and Joachim Schaper
A Quick Group Decision-making Process for
Emergency Response (LP)
Huizhang
Shen and Jidi Zhao
Architecture
for an Automatic Customized Warning
Dissemination (LP)
Mirko
Montanari, Sharad Mehrotra and Nalini
Venkatasubramanian |
W1-III:
Social Network Analysis in
Security Applications
Dynamic Social Network
Analysis of a Dark Network: Identifying
Significant Facilitators (LP)
Siddharth Kaza, Daning Hu
and Hsinchun Chen
A
Dynamic Social Network Software Platform
for Counter-Terrorism Decision Support
(LP)
Richard Adler
Terrorism and Crime Related Weblog Social
Network: Link, Content Analysis and
Information Visualization (SP)
Christopher Yang
and Tobun Ng
|
|
12:00 pm - 1:30 pm |
Lunch
|
|
1:30pm
to 2:30pm |
Track II Plenary Panel: Preparedness for and Response to
High-Consequence Events
Moderator: Paul J. Lioy, Ph.D. Professor and
Deputy Director of the Environmental and
Occupational Health Sciences Institute (EOHSI),
RWJMS & RU, NJ
Panelists:
David Prezant, Chief Medical Officer, FDNY
Office of Medical Affairs, NYC, NY
Jeffrey Laskin, Ph.D. Professor and Director
of the NIH CounterACT Center, RWJMS & EOHSI,
NJ
Paul Kalb, Ph.D. Head, Environmental
Research & Technology Division,
Environmental Services Department,
Brookhaven National Laboratory, NY
Panos Georgopoulos, Professor and Director
of the Computational Chemodymamics
Laboratory, EOHSI & RWJMS, NJ
Jonathan G. Herrmann, P.E., BCEE, Director,
National Homeland Security Research,
Environmental Protection Agency |
|
2:30
pm - 4:00 pm |
Sessions
W2-I, W2-II, W2-III* |
|
Session
W2:
2:30 Pm - 4:00 pm |
W2-I: Infrastructure Protection and
Cyber Security
Deployment of DNIDS in Social Networks
(LP)
Meytal Tubi,
Rami Puzis and Yuval Elovici
A Framework
for an Adaptive Intrusion Detection System
using Bayesian Network (LP)
Farah
Jemili, Montaceur Zaghdoud and Mohamed Ben
Ahmed
Classification of Attributes and Behavior
in Risk Management Using Bayesian Networks
(LP)
Ram Dantu,
Prakash Kolan and Robert Akl |
W2-II:
Emergency Response and Emerging
Applications
Fine-Grained Reputation-based Routing in
Wireless Ad Hoc Networks (SP)
Li Yang, Joseph
Kizza, Alma Cemerlic and Feiqiong Liu
Organizing Hot-Spot Police Patrol
Routes (LP)
Sudarshan S.
Chawathe
A Host Architecture For Automobile License
Plate Recognition (LP)
Matthew Hudnall,
David Brown, David Cordes, Randy Smith and
Allen Parrish |
W2-III:
Terrorism Informatics and Countermeasures
A Layered Dempster-Shafer Approach to
Scenario Construction and Analysis (LP)
Antonio
Sanfilippo, Bob Baddeley, Christian Posse
and Paul Whitney
Forecasting Terrorist Warfare:
Conventional to CBRN (SP)
Joshua Sinai
Real-time Correlation of Network Security
Alerts (LP)
Aifang Zhang
and Zhitang Li |
|
4:00
pm - 4:30 pm |
Break and set-up of Poster Session |
|
4:30
pm - 6:00 pm |
Sessions
W3-I, W3-II, W3-III* |
|
Session
W3:
4:30
pm - 6:00 pm |
W3-I:
Infrastructure Protection and Cyber
Security
Host Based Intrusion Detection using
Machine Learning (LP)
Robert Moskovitch, Ido Gus, Shay Pluderman,
Dima Stopel, Yisrael Parmet, Yuval Shahar
and Yuval Elovici
MCA2CM:
Multimedia Context-Aware Access Control
Model (LP)
Bechara Al
Bouna, Richard Chebir and Johel Miteran
Surface Transportation and
Cyber-Infrastructure: An Exploratory Study
(SP)
Sangmi Chai,
Raj Sharman, Smitha Patil, Shruta Satam,
Raghav Rao and Shambhu Upadhyaya
A Networking
Identity Authentication Scheme Combining
Fingerprint Coding and Identity Based
Encryption (SP)
Liang Li, Jie
Tian, Zhe Wu and Xin Yang |
W3-II:
Emergency Response Systems and
Applications
On-Demand
Information Portals for Disaster
Situations (LP)
Yiming Ma,
Dmitri Kalashnikov, Sharad Mehrotra,
Nalini Venkatasubramanian, Ram Hariharan,
Naveen Ashish and Jay Lickfett
Design and Implementation of a Middleware
for Sentient Spaces (SP)
Bijit Hore,
Hojjat Jafarpour, Ramesh Jain, Shengyue Ji,
Daniel Massaguer, Sharad Mehrotra, Nalini
Venkatasubramanian and Utz Westermann
DOTS:
Detection of Off-Topic Search via Result
Clustering (LP)
Nazli
Goharian and Alana Platt
|
W3-III: Deception Detection
and Identity Management
An Investigation of Heuristics of Human
Judgment in Detecting Deception and
Potential Implications in Countering
Social Engineering (LP)
Tiantian Qin
and Judee Burgoon
Categorization of Blogs through Similarity
Analysis (LP)
Hwan-Joon
Choi and Mukkai Krishnamoorthy
Security Event Management System Based
on Mobile Agent Technology (SP)
Wang Jing-Xin
Model Dynamic Propagation of Malicious
Information Fabricated by Terrorists on
the Internet (SP)
Zhengyou Xia |
|
6:00
pm - 7:20 pm |
Poster Session and Reception |
|
7:20 pm - 7:30 pm |
Awards ceremony |
|
|
|
May 24,
2007
Thursday (Day Two) |
|
|
A |
B |
C |
|
7:00
am - 8:00 am |
Registration and Continental Breakfast |
|
8:00am
- 8:15am |
Conference Announcements |
8:15 am - 9:00 am |
Keynote
Address: John O. Brennan,
President and CEO, The Analysis
Corporation, "Technology Analysis and
Policy in Countering Terrorism"
|
|
9:00am - 10:00am |
Track III Plenary Panel: Future
Directions in Terrorism & Counterterrorism
Informatics
Moderator: Bob Ross, Chief, Risk Sciences
Branch, Office of Special Programs,
Science and Technology Directorate, DHS
Panelists:
Richard Adler, President, DecisionPath,
Inc.
Leslie W. Kennedy, Dean, Rutgers School of
Criminal Justice, Rutgers University,
Newark, NJ
Major John Hunt,
Commanding
Officer, New Jersey State Police Homeland
Security Branch - Special Operations
Section
Joshua Sinai, Program Manager, Terrorism
and Counterterrorism Studies, The Analysis
Corporation
Captain
Cristopher Simmermon, Commanding Officer,
Marine Services Bureau, New Jersey State
Police Homeland Security Branch - Special
Operations Section
Michael Smith, Senior Master Sergeant,
USAF Reserves (Retired)
William Stryker, Chief, Office of
Intelligence Analysis, DHS |
|
10:00 am
- 10:30 am |
Break |
|
10:30
am - 12:00 pm |
Sessions
T1-I, T2-II, T1-III*
|
|
Session
T1:
10:30
am - 12:00 pm |
T1-I:
Infrastructure Protection and Sensor
Networks
A SOC Framework for ISP Federation and
Attack Forecast by Learning Propagation
Patterns (LP)
Keisuke
Takemori, Yutaka Miyake, Chie Ishida and
Iwao Sasase
Detection of Port and Network Scan Using
Time Independent Feature Set (LP)
Habib Ullah
Baig
Optimizing Sensor Placement for Intruder
Detection with Genetic Algorithms (SP)
Samuel Barrett
Social Behavior in a Team of Autonomous
Sensors (SP)
Yasuaki
Sakamoto and Jeffrey Nickerson |
T1-II:
Social Network Analysis and Knowledge
Discovery
SIGHTS: A Software System for Finding
Coalitions and Leaders in a Social Network
(LP)
Jeffrey Baumes,
Mark Goldberg, Mykola Hayvanovych, Stephen
Kelley, Malik Magdon-Ismail, Konstantin
Mertsalov and William Wallace
Media
Strategy (and its Absence) in Asymmetric
Conflict: The 2006 Israel-Lebanon War (SP)
Don Radlauer
An LDA-based Community Structure Discovery
Approach for Large-Scale Social Networks
(LP)
Haizheng Zhang,
Baojun Qiu, Lee Giles, Henry Foley and
John Yen
Privacy-Oriented
Electronic Surveys
(SP)
Justin
Zhan |
T1-III:
Enabling Knowledge Discovery Techniques
Detecting Anomalies in Graphs (LP)
David
Skillicorn
Addressing Accuracy Issues in Privacy
Preserving Data Mining through Matrix
Factorization (SP)
Jie
Wang, Jun Zhang and Weijun Zhong
Fast Fourier Transform Based Data
Perturbation Method for Privacy Protection
(SP)
Shuting Xu and
Shuhua Lai
Inferring Meaning and Intent of Discovered
Data Sources (SP)
Wayne L. Bethea,
R. Scott Cost, Paul A. Frank and Frank B.
Weiskopf |
|
12:00 pm
- 1:30 pm |
Lunch |
|
1:30
pm - 3:00 pm |
Sessions
T2-I, T2-II, T2-III*
|
|
Session
T2:
1:30
pm - 3:00 pm |
T2-I:
Identity Management and Cyber Security
The Arizona
IDMatcher: A Probabilistic Identity
Matching System (LP)
G. Alan
Wang, Siddharth Kaza, Shailesh Joshi, Kris
Chang, Homa Atabakhsh and Hsinchun Chen
Mining Higher-Order Association Rules from
Distributed Named Entity Databases (LP)
Shenzhi Li,
Christopher Janneck, Aditya Belapurkar,
Murat Ganiz, Xiaoning Yang, Mark Dilsizian,
Tianhao Wu, John Bright and William
Pottenger
Managing Security Threats and
Vulnerabilities for Small to Medium
Enterprises (SP)
Cyril Onwubiko
and Andrew Lenaghan
A Secure Email System Based on
Fingerprint Authentication Scheme (SP)
Zhe Wu, Jie
Tian, Liang Li and Xin Yang |
T2-II:
Geo-spatial Data Analysis and Text Mining
Geospatial Data Mining for National
Security: Land Cover Classification and
Semantic Grouping (LP)
Chuanjun Li, L. Khan, B. Thuraisingham, M. Husain, S. Chen and F. Qiu
Recursive algorithm of river and basin
data model based on composite design
pattern (LP)
Hyung Moo Kim and Jae Soo Yoo
Visualization of Events in a Spatially and
Multimedia Enriched Virtual Environment
(SP)
Leonidas
Deligiannidis, Farshad Hakimpour and Amit
Sheth
Making Sense of VAST Data (SP)
Summer Adams
and Ashok K. Goel
|
T2-III:
Terrorism Informatics and Countermeasures
Knowledge Reachback for WMD Events (LP)
Steven R.
Haynes and Jonathan A. Singel
Affect Intensity Analysis of Dark Web
Forums (LP)
Ahmed Abbasi
and Hsinchun Chen
On the
Communication Complexity of
Privacy-Preserving Information Sharing
(LP)
Nan Zhang |
|
3:00
pm - 4:30 pm |
Sessions
T3-I, T3-II, T3-III*
|
|
Session
T3:
3:00
pm - 4:30 pm |
T3-I: Link
Analysis and Text Mining
Semantically Ranked Graph Pattern Queries
for Link Analysis (LP)
Dawit Seid and
Sharad Mehrotra
An Efficient Algorithm for Content
Security Filtering Based on Double-Byte
(LP)
Yanping Zhao
and Wei Lu
FACT: Fast Algorithm for Categorizing Text
(LP)
Saket Mengle,
Nazli Goharian and Alana Platt
|
T3-II: Data Mining for Security Applications
Association Rule Mining for Suspicious
Email Detection: A Data Mining Approach
(LP)
Appavu
Balamurugan
Fast Private
Association Rule Mining by A Protocol for
Securely Sharing Distributed Data (LP)
Vladimir
Estivill-Castro and Ahmed HajYasien
Using Homomorphic Encryption and
Digital Envelope Techniques for Privacy
Preserving Collaborative Sequential
Pattern Mining (SP)
Justin Zhan
Connecting the Dots: Revealing the
Invisible Hand for Sharing Information
(SP)
David Sulek,
Howarth McClain and Virginia Ruebensaal
|
T3-III: Terrorism Informatics
Interaction
Coherence Analysis for Dark Web Forums
(LP)
Tianjun Fu, Ahmed Abbasi and Hsinchun Chen
A Bayesian, Nonlinear Particle Filtering
Approach for Tracking the State of
Terrorist Operations (LP)
Gregory Godfrey, Tuan Tran and John
Cunningham
A Combinatorial Approach to Measuring
Anonymity
Matthew Edman, Fikret Sivrikaya and Bulent
Yener |
|
4:30
pm - 5:00 pm |
Break |
|
5:00pm
- 6:00pm |
Closing Panel: The S&T Value of
Operational Field Experiments (OFEs)
Moderator: Paul Kantor, Director, Center for Interdisciplinary Studies in Information Privacy and Security, Rutgers University
Panelists:
Arthur H. Becker, Knowledge Discovery and Dissemination Program
Manager, Department of Defense.
Sid Dalal, Center for Discrete Mathematics and Theoretical Computer Science, (formerly Vice-President, Imaging & Services Technology Center, Xerox)
Harold Neal, New Jersey Office of Homeland Security and Preparedness
|
|
* Each session
period consists of three parallel sessions (I,
II, and III)
* Short papers (SP) are of 20 minutes
duration
* Long papers (LP) are of 25 minutes
duration
* The first presenter in each session is
asked to serve as that session's chair, unless otherwise arranged. |
|
Posters
Making Sense of VAST Data; Summer Adams, Ashok K. Goel
A Dynamic Social Network Software Platform for Counter-Terrorism Decision Support; Richard M. Adler
Text Extraction of Spatial and Temporal Information; Antonio Badia, Tulay Muezzinoglu, Jothi Ravishankar
Optimizing Sensor Placement for Intruder Detection with Genetic Algorithms; Samuel Barrett
Relationally Mapping XML Queries For Scalable XML Search; Rebecca Cathey; Steven M. Beitzel, Eric C. Jensen, David Grossman, Ophir Frieder
Profiling and Visualizing Cyber-criminal Activities: A General Framework; Wingyan Chung, G. Alan Wang
Fast Private Association Rule Mining by A Protocol for Securely Sharing Distributed Data; Vladdimir Estivill-Castro, Ahmed Hajyasien
A Bayesian, Nonlinear Particle Filtering Approach for Tracking the State of Terrorist Operations; Greg Godfrey
Detection of Off-Topic Search via Result Clustering; Nazli Goharian, Alana Platt
Short Query Sequences in Misuse Detection; Nazli Goharian, Alana Platt
Optimization of Multi-Attribute Tasks for Underwater Motion of Robotic Sensor Agents; Irina Goldman, Samuel Barrett, Jeffrey V. Nickerson
Knowledge Reachback for WMD Events; Steven Haynes, Jonathan Singel
Dependence Centrality: Identifying Dependence of Nodes in Terrorist Networs; David L. Hicks, Nasrullah Memon, Henrik Legind Larsen
A Framework for an Adaptive Intrusion Detection System using Bayesian Network, Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed
Periodicity and Application for a kind of n-dimensional Arnold-type Transformation; Wang Jizhi, Wang Yinglong, Wang Meiqin
Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks; Ming Lei, ZiJie Qi, Xiaoyan Hong, Susan V. Vrbsky
A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption; Liang Li, Wei-Qiang Jiang, Jie Tian, Yi-Xian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang, Justin Zhan
Emergency Management in Australia, New Zealand and Europe ? The 2006 EMANZE Survey; Andreas Meissner
FACT: Fast Algorithm for Categorizing Text; Saket Mengle, Nazli Goharian, Alana Platt
SIGHTS: A Software System for Finding Coalitions and Leaders in a Social Network; Konstantin Mertsalov, J. Baumes, M. Goldberg, M. Hayvanovych, S. Kelley, M. Magdon-Ismail, W. Wallace
Sequential Decision Making Algorithms for Port of Entry Inspection: Overcoming Computational Challenges; Sushil Mittal, David Madigan, Fred Roberts
Ontology Based Analysis of Violent Events; Pinar Oezden Wennerberg
Managing Security Threats and Vulnerabilities for Small and Medium Enterprises; Cyril Onwubiko, Andrew Lenaghan
Simulating Threats Propagation within the NSP Infrastructure; Rami Puzis, Meytal Tubi, Gil Tahan, Yuval Elovici
Social Behavior in a Team of Autonomous Sensors; Yasuaki Sakamoto, Jeffrey V. Nickerson
A Layered Dempster-Shafer Approach to Scenario Construction and Analysis; Antonio Sanfilippo, Bob Baddeley, Christian Posse, Paul Whitney
Environmental Impacts on Underwater Surveillance System in Estuary Areas; Hongyuan Shi, Dov Kruger, Jeffrey V. Nickerson
Detecting Anomalies in Graphs, David Skillicorn
A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns; Keisuke Takemori, Yutaka Miyake, Chie Ishida, Iwao Sasase
Distributed Web Police: A Peer-to-Peer Approach to Collaborative Copy Detection; Jenq-Haur Wang, Hung-Chi Chang
Addressing Accuracy Issues in Privacy Preserving Data Mining through Matrix Factorization; Jie Wang, Jun Zhang, Weijun Zhong
A Secure Email System Based on Fingerprint Authentication Scheme; Zhe Wu, Jie Tian, Liang Li, Cai-ping Jiang, Xin Yang
Importance of Information Collection and Dissemination for Evacuation Modeling and Management; Anil Yazici, Kaan Ozbay
Medical Ontology-Enhanced Text Processing for Infectious Disease Informatics; Daniel Zeng, Hsin-Min Lu, Hsinchun Chen
On the Communication Complexity of Privacy-Preserving Information Sharing Protocols; Nan Zhang
|
|
ISI
2007 Message
In the past
few years, intelligence and security
informatics (ISI) research, which is
concerned with the study of the development
and use of advanced information technologies
and systems for national and international
security-related applications, has
experienced tremendous growth and attracted
substantial interest from academic
researchers in related fields as well as
practitioners from both government agencies
and industry. The ISI community is maturing,
and a core set of research methodologies and
technical approaches has emerged and is
becoming the underpinning of ISI research.
The first two
meetings (ISI 2003 and ISI 2004) in the ISI
symposium and conference series were held in
Tucson, Arizona. With sponsorship by the
IEEE Intelligent Transportation Systems
Society, ISI 2005 was held in Atlanta,
Georgia. Building on the momentum of these
ISI meetings, we held ISI 2006 in San Diego,
California. In addition to the established
and emerging ISI technical research topics,
ISI 2006 continued a track on terrorism
informatics, which is a new stream of
terrorism research leveraging the latest
advances in social science methodologies,
and information technologies and tools.
This year, in
New Brunswick, New Jersey, hosted by Rutgers
University and several centers there, the
conference is pleased to return to its
originating focus which is to establish and
strengthen links between researchers and
practitioners. We have three main tracks
this year. Port security and infrastructure
protection is motivated by the central
location of New Jersey on major land and sea
traffic routes. Emergency response systems
and decision making is an issue of growing
importance which includes preparation not
only for threats initiated by groups or
individuals but also for response to natural
problems such as floods and epidemics. And,
since many threats in the modern world do
originate with the activities of terrorists,
we are continuing the track on terrorism and
countermeasures, in the recognition that the
best way to respond to terrorist attacks is
to prevent them from the outset.
Our keynote
address on the first day will be given by
Mr. Steve Nixon Deputy Director for Science
and Technology at the Office of the Director
of National Intelligence. The Terrorism
Informatics track provides the theme for the
keynote address on the second day by Mr.
John Brennan, formerly with the CIA. The
kick-off panel for the Port Security track
will feature presentations by terminal
managers and Coast Guard and Port Authority
experts. That for the Emergency Response
track will feature presentations by experts
from the New York City Fire Department, the
Environmental Protection Agency,
universities, and the private sector. The
panel for the Terrorism and
Counter-terrorism track will include experts
from DHS, criminal justice, and private
sector organizations dealing with
counter-terrorism. The program itself
features exciting sessions on: Port Security
and Infrastructure Protection; Emergency
Response Systems and Decision-Making;
Terrorism Informatics and Countermeasures;
Social Network Analysis in Security
Applications; Terrorism Informatics and
Countermeasures; Infrastructure Protection
and Cyber Security; Preparedness for and
Response to High-Consequence Events;
Deception Detection and Identity Management;
Infrastructure Protection and Sensor
Networks; Identity Management and Cyber
Security; Link Analysis and Text Mining and
Data Mining for Security Applications. We
close the workshop with an exciting Sponsors
Plenary Panel: The S&T Value of Operational
Field Experiments.
ISI 2007, to
be held at Rutgers University in New
Brunswick, New Jersey, is sponsored by IEEE
Intelligent Transportation Systems Society
with a technical co-sponsorship from the
IEEE Systems, Man, & Cybernetics Society.
Locally it is supported by the DIMACS Center
for Discrete Mathematics and Theoretical
Computer Science, the DIMACS-CAIT Laboratory
for Port Security (LPS), the Rutgers ISIPS
Center for Interdisciplinary Studies in
Information Privacy and Security, and the
Department of Homeland Security Center of
Excellence for Dynamic Data Analysis (DyDAn),
headquartered at DIMACS-Rutgers.
We wish to
express our gratitude to all members of the
ISI 2007 Program Committee and additional
reviewers who provided constructive review
comments, and especially the Program Chairs,
Tayfur Altiok, Benjamin Melamed Gheorghe
Muresan and Daniel Zeng. We would also like
to thank Feiyue Wang and Umit Ozguner of the
IEEE. We wish to thank Art Becker, Larry
Brandt, and Steve Dennis for their continued
support of the ISI series and other related
ISI research. Our special thanks go to Sarah
Donnelly and the DIMACS staff for local
support and the IEEE editorial and
production staff for their support of the
ISI conference series.
Program
Chairs:
Hsinchun Chen
Paul Kantor
Fred Roberts
|
|
|
|