<--- Back to Details
First PageDocument Content
Science / Crowdsourcing / Ushahidi / Web mapping / Open-source intelligence / Google Trends / Geographic information system / Human intelligence / Data analysis / National security / Intelligence / Data collection
Date: 2013-06-04 07:48:12
Science
Crowdsourcing
Ushahidi
Web mapping
Open-source intelligence
Google Trends
Geographic information system
Human intelligence
Data analysis
National security
Intelligence
Data collection

Detecting Emergent Conflicts through Web Mining and Visualization

Add to Reading List

Source URL: www.recordedfuture.com

Download Document from Source Website

File Size: 4,01 MB

Share Document on Facebook

Similar Documents

Computing / SIGCOMM / Computer science / ACM/IEEE Supercomputing Conference / Information and communications technology / Information-centric networking / Don Towsley

DR. ALBERTO DAINOTTI Assistant Research Scientist, Center for Applied Internet Data Analysis (CAIDA) San Diego Supercomputer Center, University of California San Diego http://www.caida.org/~alberto/ ---

DocID: 1xVLA - View Document

Internet architecture / Computing / Internet / Network architecture / Border Gateway Protocol / BGP hijacking / Route Views / Autonomous system / Routing / Router / Multihoming / Computer network

BGPStream: A Software Framework for Live and Historical BGP Data Analysis Chiara Orsini 1 , Alistair King1 , Danilo Giordano2 , Vasileios Giotsas1 , Alberto Dainotti1 1 CAIDA, UC San Diego 2

DocID: 1xVAn - View Document

ETH Domain / cole Polytechnique Fdrale de Lausanne / Education in Switzerland / Higher education

MyBion Our service uses nanopore DNA sequencing coupled with real-time data analysis to help infectious disease patients. We offer physicians a better way to reach

DocID: 1xUOj - View Document

AnyChart / Petroleum production / Computing / Wellsite information transfer standard markup language / Visualization / Data visualization / Application software / Communication design

AnyChartâ„¢ Data Visualization Solutions IDS Chooses AnyChart for Its Reporting and Analysis Systems Independent Data Services

DocID: 1xUb6 - View Document

Mathematics / Electromagnetism / Electric power / Electrical engineering / Power engineering / Power-flow study / Parameter / Variable

Automated Vulnerability Analysis of AC State Estimation under Constrained False Data Injection in Electric Power Systems Sicun Gao1 , Le Xie2 , Armando Solar-Lezama1 , Dimitrios Serpanos3 , and Howard Shrobe1 Abstract—

DocID: 1xU8c - View Document