Software Supported Pattern Development in Intelligence Analysis

Intelligence professionals work with incomplete and noisy data. Their information needs are often hard to express, and almost impossible to get right the first time. This paper describes the GEM pattern language for encoding analysts' information needs in graphical patterns, and its use in the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Wolverto, Michael, Harrison, Ian, Lowrance, John, Rodriguez, Andres, Thomere, Jerome
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 10
container_issue
container_start_page 5
container_title
container_volume
creator Wolverto, Michael
Harrison, Ian
Lowrance, John
Rodriguez, Andres
Thomere, Jerome
description Intelligence professionals work with incomplete and noisy data. Their information needs are often hard to express, and almost impossible to get right the first time. This paper describes the GEM pattern language for encoding analysts' information needs in graphical patterns, and its use in the Link Analysis Workbench (LAW) system to find inexact matches to those patterns in large relational data sets. The LAW user typically interacts with the system through a cycle in which the user (1) creates an initial GEM pattern corresponding to his information need, (2) uses the LAW matcher to retrieve a collection of matching episodes in the data, (3) revises the pattern based on the shortcomings of the matches, and (4) repeats the process until the revised pattern is returning the right data. The pattern language and the system are designed to facilitate the user in quickly traversing this cycle
doi_str_mv 10.1109/CIHSPS.2006.313291
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4106212</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4106212</ieee_id><sourcerecordid>4106212</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-b0803492d67fa6b4defa4f3a7c2d193d446b4efddae581247b6c0850c3fd6a343</originalsourceid><addsrcrecordid>eNo1jtFKwzAYRiMiqLMvoDd5gdb8SZo0VzKmc4WBg-r1SJs_EunS0kZlb-9A_W4O5-bwEXILrABg5n5Vb5pdU3DGVCFAcANn5Bokl5JpWcI5yYyu_l2qS5LN8wc7TRhhQFyRh2bw6dtOSJvPcRymhI7ubEo4RfqIX9gP4wFjoiHSOibs-_COsUO6jLY_zmG-IRfe9jNmf1yQt_XT62qTb1-e69VymwfQZcpbVjEhDXdKe6ta6dBb6YXVHXdghDt9ayV65yyWFXCpW9WxqmSd8E5ZIcWC3P12AyLuxykc7HTcS2CKAxc_NWNLPg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Software Supported Pattern Development in Intelligence Analysis</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Wolverto, Michael ; Harrison, Ian ; Lowrance, John ; Rodriguez, Andres ; Thomere, Jerome</creator><creatorcontrib>Wolverto, Michael ; Harrison, Ian ; Lowrance, John ; Rodriguez, Andres ; Thomere, Jerome</creatorcontrib><description>Intelligence professionals work with incomplete and noisy data. Their information needs are often hard to express, and almost impossible to get right the first time. This paper describes the GEM pattern language for encoding analysts' information needs in graphical patterns, and its use in the Link Analysis Workbench (LAW) system to find inexact matches to those patterns in large relational data sets. The LAW user typically interacts with the system through a cycle in which the user (1) creates an initial GEM pattern corresponding to his information need, (2) uses the LAW matcher to retrieve a collection of matching episodes in the data, (3) revises the pattern based on the shortcomings of the matches, and (4) repeats the process until the revised pattern is returning the right data. The pattern language and the system are designed to facilitate the user in quickly traversing this cycle</description><identifier>ISBN: 9781424407446</identifier><identifier>ISBN: 1424407443</identifier><identifier>EISBN: 1424407451</identifier><identifier>EISBN: 9781424407453</identifier><identifier>DOI: 10.1109/CIHSPS.2006.313291</identifier><language>eng</language><publisher>IEEE</publisher><subject>Competitive intelligence ; Computational and artificial intelligence ; Computational intelligence ; Domestic safety ; Information analysis ; Pattern analysis ; Pattern matching ; Software safety ; Terrorism ; USA Councils</subject><ispartof>2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, 2006, p.5-10</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4106212$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,27904,54899</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4106212$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Wolverto, Michael</creatorcontrib><creatorcontrib>Harrison, Ian</creatorcontrib><creatorcontrib>Lowrance, John</creatorcontrib><creatorcontrib>Rodriguez, Andres</creatorcontrib><creatorcontrib>Thomere, Jerome</creatorcontrib><title>Software Supported Pattern Development in Intelligence Analysis</title><title>2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety</title><addtitle>CIHSPS</addtitle><description>Intelligence professionals work with incomplete and noisy data. Their information needs are often hard to express, and almost impossible to get right the first time. This paper describes the GEM pattern language for encoding analysts' information needs in graphical patterns, and its use in the Link Analysis Workbench (LAW) system to find inexact matches to those patterns in large relational data sets. The LAW user typically interacts with the system through a cycle in which the user (1) creates an initial GEM pattern corresponding to his information need, (2) uses the LAW matcher to retrieve a collection of matching episodes in the data, (3) revises the pattern based on the shortcomings of the matches, and (4) repeats the process until the revised pattern is returning the right data. The pattern language and the system are designed to facilitate the user in quickly traversing this cycle</description><subject>Competitive intelligence</subject><subject>Computational and artificial intelligence</subject><subject>Computational intelligence</subject><subject>Domestic safety</subject><subject>Information analysis</subject><subject>Pattern analysis</subject><subject>Pattern matching</subject><subject>Software safety</subject><subject>Terrorism</subject><subject>USA Councils</subject><isbn>9781424407446</isbn><isbn>1424407443</isbn><isbn>1424407451</isbn><isbn>9781424407453</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1jtFKwzAYRiMiqLMvoDd5gdb8SZo0VzKmc4WBg-r1SJs_EunS0kZlb-9A_W4O5-bwEXILrABg5n5Vb5pdU3DGVCFAcANn5Bokl5JpWcI5yYyu_l2qS5LN8wc7TRhhQFyRh2bw6dtOSJvPcRymhI7ubEo4RfqIX9gP4wFjoiHSOibs-_COsUO6jLY_zmG-IRfe9jNmf1yQt_XT62qTb1-e69VymwfQZcpbVjEhDXdKe6ta6dBb6YXVHXdghDt9ayV65yyWFXCpW9WxqmSd8E5ZIcWC3P12AyLuxykc7HTcS2CKAxc_NWNLPg</recordid><startdate>200610</startdate><enddate>200610</enddate><creator>Wolverto, Michael</creator><creator>Harrison, Ian</creator><creator>Lowrance, John</creator><creator>Rodriguez, Andres</creator><creator>Thomere, Jerome</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200610</creationdate><title>Software Supported Pattern Development in Intelligence Analysis</title><author>Wolverto, Michael ; Harrison, Ian ; Lowrance, John ; Rodriguez, Andres ; Thomere, Jerome</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-b0803492d67fa6b4defa4f3a7c2d193d446b4efddae581247b6c0850c3fd6a343</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Competitive intelligence</topic><topic>Computational and artificial intelligence</topic><topic>Computational intelligence</topic><topic>Domestic safety</topic><topic>Information analysis</topic><topic>Pattern analysis</topic><topic>Pattern matching</topic><topic>Software safety</topic><topic>Terrorism</topic><topic>USA Councils</topic><toplevel>online_resources</toplevel><creatorcontrib>Wolverto, Michael</creatorcontrib><creatorcontrib>Harrison, Ian</creatorcontrib><creatorcontrib>Lowrance, John</creatorcontrib><creatorcontrib>Rodriguez, Andres</creatorcontrib><creatorcontrib>Thomere, Jerome</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wolverto, Michael</au><au>Harrison, Ian</au><au>Lowrance, John</au><au>Rodriguez, Andres</au><au>Thomere, Jerome</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Software Supported Pattern Development in Intelligence Analysis</atitle><btitle>2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety</btitle><stitle>CIHSPS</stitle><date>2006-10</date><risdate>2006</risdate><spage>5</spage><epage>10</epage><pages>5-10</pages><isbn>9781424407446</isbn><isbn>1424407443</isbn><eisbn>1424407451</eisbn><eisbn>9781424407453</eisbn><abstract>Intelligence professionals work with incomplete and noisy data. Their information needs are often hard to express, and almost impossible to get right the first time. This paper describes the GEM pattern language for encoding analysts' information needs in graphical patterns, and its use in the Link Analysis Workbench (LAW) system to find inexact matches to those patterns in large relational data sets. The LAW user typically interacts with the system through a cycle in which the user (1) creates an initial GEM pattern corresponding to his information need, (2) uses the LAW matcher to retrieve a collection of matching episodes in the data, (3) revises the pattern based on the shortcomings of the matches, and (4) repeats the process until the revised pattern is returning the right data. The pattern language and the system are designed to facilitate the user in quickly traversing this cycle</abstract><pub>IEEE</pub><doi>10.1109/CIHSPS.2006.313291</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781424407446
ispartof 2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, 2006, p.5-10
issn
language eng
recordid cdi_ieee_primary_4106212
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Competitive intelligence
Computational and artificial intelligence
Computational intelligence
Domestic safety
Information analysis
Pattern analysis
Pattern matching
Software safety
Terrorism
USA Councils
title Software Supported Pattern Development in Intelligence Analysis
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T04%3A57%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Software%20Supported%20Pattern%20Development%20in%20Intelligence%20Analysis&rft.btitle=2006%20IEEE%20International%20Conference%20on%20Computational%20Intelligence%20for%20Homeland%20Security%20and%20Personal%20Safety&rft.au=Wolverto,%20Michael&rft.date=2006-10&rft.spage=5&rft.epage=10&rft.pages=5-10&rft.isbn=9781424407446&rft.isbn_list=1424407443&rft_id=info:doi/10.1109/CIHSPS.2006.313291&rft_dat=%3Cieee_6IE%3E4106212%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424407451&rft.eisbn_list=9781424407453&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4106212&rfr_iscdi=true