National Academies Press: OpenBook
« Previous: Front Matter
Suggested Citation:"Contents." National Research Council. 2004. The Mathematical Sciences' Role in Homeland Security: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/10940.
×
Page 1
Suggested Citation:"Contents." National Research Council. 2004. The Mathematical Sciences' Role in Homeland Security: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/10940.
×
Page 2
Suggested Citation:"Contents." National Research Council. 2004. The Mathematical Sciences' Role in Homeland Security: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/10940.
×
Page 3
Suggested Citation:"Contents." National Research Council. 2004. The Mathematical Sciences' Role in Homeland Security: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/10940.
×
Page 4

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

THE MATHEMATICAL SCIENCES' ROLE IN HOMELAND SECURITY National Research Council Washington, D.C. April 26-27, 2002 Welcome and Overview of Sessions, Apri' 26 Peter Bickel, Chair, Board on Mathematical Sciences and Their Applications Department of Statistics, University of California at Berkeley Data Mining, Unsupervised Learning, and Pattern Recognition James Schatz, National Security Agency, Session Chair Introduction Jerry Friedman, Stanford University Role of Data Mining in Homeland Defense Diane Lambert, Bell Laboratories Statistical Detection from Communications Streams Rakesh Agrawal, IBM-Almaden Data Mining: Potentials and Challenges Review and Discussion Remarks, Donald McClure, Brown University Remarks, Werner Stuetzle, University of Washington

2 Detection and Epidemiology of Bioterrorist Attacks Claire Broome, Centers for Disease Control and Prevention, Session Chair Introduction Kenneth Kleinman, Harvard Medical School Ambulatory Anthrax Surveillance: An Implemented System, with Comments on Current Outstanding Needs Stephen Eubank, Los Alamos National Laboratory Mathematics of Epidemiological Simulations for Response Planning Sally Blower, University of California at Los Angeles Predicting the Unpredictable in an Age of Uncertainty Review and Discussion Remarks, Simon Levin, Princeton University Remarks, Arthur Reingold, University of California at Berkeley Image Analysis and Voice Recognition Roberta Lenczowski, Technical Directory (BethesdaJ, National Imagery and Mapping Agency, Session Chair Introduction Jitendra Malik, University of California at Berkeley Computational Vision Ronald Colfman, Yale University Mathematical Challenges for Real-Time Analysis of Imaging Data Larry Rabiner, A T& T Laboratories Challenges in Speech Recognition Review and Discussion Remarks, David McLaughlin, New York University Remarks, David Donoho, Stanford University 2

3 Opening Remarks and Discussion, Apri' 27 Communications and Computer Security Howard Schmidt, President's Critical Infrastructure Board, Session Chair Introduction Dorothy Denning, Georgetown University A Security Challenge: Return on Security Investment Kevi n McCu Hey, IBM Almaden Talk omitted at speaker's request David Wagner, University of California at Berkeley A Few Open Problems in Computer Security Review and Discussion Remarks, Andrew Odlyzko, University of Minnesota Remarks, Michael Freedman, Microsoft Research Remarks omitted at speaker's request Data Integration and Fusion Alexander Levis, U.S. Air Force, Session Chair Introduction Tod Levitt, JET, Inc. Reasoning About Rare Events Kathryn Las key, George Mason University Knowledge Representation and Inference for Multisource Fusion Valen Johnson, Los Alamos National Laboratory A Hierarchical Model for Estimating the Reliability of Complex Systems Review and Discussion 3

4 Remarks, Arthur Dempster, Harvard University Remarks, Alberta Grunbaum, University of California at Berkeley Funding for this workshop, its videotaping, and the resulting report was provided by the National Science Foundation, the Defense Advanced Research Projects Agency, Microsoft Corporation, the Office of Naval Research, the Air Force Office of Scientific Research, and the Army Research Office. The summaries of the presentations were derived from the transcripts by science writer Steven J. Marcus and BMSA staff. 4

Next: Welcome and Overview of Sessions, April 26 »
The Mathematical Sciences' Role in Homeland Security: Proceedings of a Workshop Get This Book
×
Buy Paperback | $147.00
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Mathematical sciences play a key role in many important areas of Homeland Security including data mining and image analysis and voice recognition for intelligence analysis, encryption and decryption for intelligence gathering and computer security, detection and epidemiology of bioterriost attacks to determine their scope, and data fusion to analyze information coming from simultaneously from several sources.

This report presents the results of a workshop focusing on mathematical methods and techniques for addressing these areas. The goal of the workshop is to help mathematical scientists and policy makers understand the connections between mathematical sciences research and these homeland security applications.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!