Intelligence and Security Informatics IEEE International Conference

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications, through an integrated technological,

  • PDF / 11,594,719 Bytes
  • 692 Pages / 430 x 660 pts Page_size
  • 18 Downloads / 211 Views

DOWNLOAD

REPORT


Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos New York University, NY, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

3495

Paul Kantor Gheorghe Muresan Fred Roberts Daniel D. Zeng Fei-Yue Wang Hsinchun Chen Ralph C. Merkle (Eds.)

Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005 Atlanta, GA, USA, May 19-20, 2005 Proceedings

13

Volume Editors Paul Kantor Gheorghe Muresan Rutgers University School of Communication, Information and Library Studies 4 Huntington Street, New Brunswick, NJ 08901-1071, USA E-mail: {kantor,muresan}@scils.rutgers.edu Fred Roberts Rutgers University Department of Mathematics Center for Discrete Mathematics and Theoretical Computer Science 96 Frelinghuysen Road, Piscataway, NJ 08854-8018, USA E-mail: [email protected] Daniel D. Zeng Hsinchun Chen University of Arizona Department of Management Information Systems 1130 East Helen Street, Tucson, AZ 85721-0108, USA E-mail: {zeng,hchen}@eller.arizona.edu Fei-Yue Wang University of Arizona Department of Systems and Industrial Engineering 1127 East North Campus Drive, Tucson, AZ 85721-0020, USA E-mail: [email protected] Ralph C. Merkle Georgia Institute of Technology College of Computing, Georgia Tech Information Security Center 801 Atlantic Drive, Atlanta, GA 30332-0280, USA E-mail: [email protected] Library of Congress Control Number: 2005925606 CR Subject Classification (1998): H.4, H.3, C.2, H.2, D.4.6, K.4.1, K.5, K.6 ISSN ISBN-10 ISBN-13

0302-9743 3-540-25999-6 Springer Berlin Heidelberg New York 978-3-540-25999-2 Springer Berlin Heidelberg New York

This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springeronline.com © Springer-Verlag Berlin Heidelberg 2005 Printed in Germany Typesettin