Moving toward intent detection: A tool-based approach. Burgoon, J.&nbsp;K, Adkins, M., Kruse, J., Jensen, M.&nbsp;L., Deokar, A.&nbsp;V., Twitchell, D.&nbsp;P., Lu, S., Metaxas, D.&nbsp;N., Jr., J.&nbsp;F<nbsp>N., & Younger, R.&nbsp;E. In Proceedings of the 7th International IEEE Intelligent Transportation Systems Conference (ITSC &#39;04), 2004.
abstract   bibtex   
Safeguarding the homeland against deception and infiltration by adversaries who may be planning hostile actions poses one of the most daunting challenges in the 21st century. Achieving high information assurance is complicated not only by the speed, complexity, volume, and global reach of communications and information exchange that current information technologies now afford, but also by the fallibility of humans in detecting hostile intent. All too often, the people protecting our borders and public spaces are handicapped by untimely and incomplete information, overwhelming flows of people and materiel, and the limits of human vigilance. Moreover, the vulnerabilities posed by human agents are exacerbated by the very same technologies that enable amassing the glut of information to be sifted, analyzed, and synthesized.
@inproceedings{ Burgoon2004,
  author = {Judee K Burgoon and Mark Adkins and John Kruse and Matthew L. Jensen and Amit V. Deokar and Douglas P. Twitchell and Shan Lu and Dimitris N. Metaxas and Jay F Nunamaker Jr. and Robert E. Younger},
  title = {Moving toward intent detection: A tool-based approach},
  abstract = {Safeguarding the homeland against deception and infiltration by adversaries who may be planning hostile actions poses one of the most daunting challenges in the 21st century. Achieving high information assurance is complicated not only by the speed, complexity, volume, and global reach of communications and information exchange that current information technologies now afford, but also by the fallibility of humans in detecting hostile intent. All too often, the people protecting our borders and public spaces are handicapped by untimely and incomplete information, overwhelming flows of people and materiel, and the limits of human vigilance. Moreover, the vulnerabilities posed by human agents are exacerbated by the very same technologies that enable amassing the glut of information to be sifted, analyzed, and synthesized.},
  booktitle = {Proceedings of the 7th International IEEE Intelligent Transportation Systems Conference (ITSC &#39;04)},
  year = {2004}
}

Downloads: 0