Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.
THE MATHEMATICAL SCIENCES' ROLE IN HOMELAND SECURITY National Research Council Washington, D.C. April 26-27, 2002 Welcome and Overview of Sessions, Apri' 26 Peter Bickel, Chair, Board on Mathematical Sciences and Their Applications Department of Statistics, University of California at Berkeley Data Mining, Unsupervised Learning, and Pattern Recognition James Schatz, National Security Agency, Session Chair Introduction Jerry Friedman, Stanford University Role of Data Mining in Homeland Defense Diane Lambert, Bell Laboratories Statistical Detection from Communications Streams Rakesh Agrawal, IBM-Almaden Data Mining: Potentials and Challenges Review and Discussion Remarks, Donald McClure, Brown University Remarks, Werner Stuetzle, University of Washington
2 Detection and Epidemiology of Bioterrorist Attacks Claire Broome, Centers for Disease Control and Prevention, Session Chair Introduction Kenneth Kleinman, Harvard Medical School Ambulatory Anthrax Surveillance: An Implemented System, with Comments on Current Outstanding Needs Stephen Eubank, Los Alamos National Laboratory Mathematics of Epidemiological Simulations for Response Planning Sally Blower, University of California at Los Angeles Predicting the Unpredictable in an Age of Uncertainty Review and Discussion Remarks, Simon Levin, Princeton University Remarks, Arthur Reingold, University of California at Berkeley Image Analysis and Voice Recognition Roberta Lenczowski, Technical Directory (BethesdaJ, National Imagery and Mapping Agency, Session Chair Introduction Jitendra Malik, University of California at Berkeley Computational Vision Ronald Colfman, Yale University Mathematical Challenges for Real-Time Analysis of Imaging Data Larry Rabiner, A T& T Laboratories Challenges in Speech Recognition Review and Discussion Remarks, David McLaughlin, New York University Remarks, David Donoho, Stanford University 2
3 Opening Remarks and Discussion, Apri' 27 Communications and Computer Security Howard Schmidt, President's Critical Infrastructure Board, Session Chair Introduction Dorothy Denning, Georgetown University A Security Challenge: Return on Security Investment Kevi n McCu Hey, IBM Almaden Talk omitted at speaker's request David Wagner, University of California at Berkeley A Few Open Problems in Computer Security Review and Discussion Remarks, Andrew Odlyzko, University of Minnesota Remarks, Michael Freedman, Microsoft Research Remarks omitted at speaker's request Data Integration and Fusion Alexander Levis, U.S. Air Force, Session Chair Introduction Tod Levitt, JET, Inc. Reasoning About Rare Events Kathryn Las key, George Mason University Knowledge Representation and Inference for Multisource Fusion Valen Johnson, Los Alamos National Laboratory A Hierarchical Model for Estimating the Reliability of Complex Systems Review and Discussion 3
4 Remarks, Arthur Dempster, Harvard University Remarks, Alberta Grunbaum, University of California at Berkeley Funding for this workshop, its videotaping, and the resulting report was provided by the National Science Foundation, the Defense Advanced Research Projects Agency, Microsoft Corporation, the Office of Naval Research, the Air Force Office of Scientific Research, and the Army Research Office. The summaries of the presentations were derived from the transcripts by science writer Steven J. Marcus and BMSA staff. 4