Software Supported Pattern Development in Intelligence Analysis
Intelligence professionals work with incomplete and noisy data. Their information needs are often hard to express, and almost impossible to get right the first time. This paper describes the GEM pattern language for encoding analysts' information needs in graphical patterns, and its use in the...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 10 |
---|---|
container_issue | |
container_start_page | 5 |
container_title | |
container_volume | |
creator | Wolverto, Michael Harrison, Ian Lowrance, John Rodriguez, Andres Thomere, Jerome |
description | Intelligence professionals work with incomplete and noisy data. Their information needs are often hard to express, and almost impossible to get right the first time. This paper describes the GEM pattern language for encoding analysts' information needs in graphical patterns, and its use in the Link Analysis Workbench (LAW) system to find inexact matches to those patterns in large relational data sets. The LAW user typically interacts with the system through a cycle in which the user (1) creates an initial GEM pattern corresponding to his information need, (2) uses the LAW matcher to retrieve a collection of matching episodes in the data, (3) revises the pattern based on the shortcomings of the matches, and (4) repeats the process until the revised pattern is returning the right data. The pattern language and the system are designed to facilitate the user in quickly traversing this cycle |
doi_str_mv | 10.1109/CIHSPS.2006.313291 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4106212</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4106212</ieee_id><sourcerecordid>4106212</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-b0803492d67fa6b4defa4f3a7c2d193d446b4efddae581247b6c0850c3fd6a343</originalsourceid><addsrcrecordid>eNo1jtFKwzAYRiMiqLMvoDd5gdb8SZo0VzKmc4WBg-r1SJs_EunS0kZlb-9A_W4O5-bwEXILrABg5n5Vb5pdU3DGVCFAcANn5Bokl5JpWcI5yYyu_l2qS5LN8wc7TRhhQFyRh2bw6dtOSJvPcRymhI7ubEo4RfqIX9gP4wFjoiHSOibs-_COsUO6jLY_zmG-IRfe9jNmf1yQt_XT62qTb1-e69VymwfQZcpbVjEhDXdKe6ta6dBb6YXVHXdghDt9ayV65yyWFXCpW9WxqmSd8E5ZIcWC3P12AyLuxykc7HTcS2CKAxc_NWNLPg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Software Supported Pattern Development in Intelligence Analysis</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Wolverto, Michael ; Harrison, Ian ; Lowrance, John ; Rodriguez, Andres ; Thomere, Jerome</creator><creatorcontrib>Wolverto, Michael ; Harrison, Ian ; Lowrance, John ; Rodriguez, Andres ; Thomere, Jerome</creatorcontrib><description>Intelligence professionals work with incomplete and noisy data. Their information needs are often hard to express, and almost impossible to get right the first time. This paper describes the GEM pattern language for encoding analysts' information needs in graphical patterns, and its use in the Link Analysis Workbench (LAW) system to find inexact matches to those patterns in large relational data sets. The LAW user typically interacts with the system through a cycle in which the user (1) creates an initial GEM pattern corresponding to his information need, (2) uses the LAW matcher to retrieve a collection of matching episodes in the data, (3) revises the pattern based on the shortcomings of the matches, and (4) repeats the process until the revised pattern is returning the right data. The pattern language and the system are designed to facilitate the user in quickly traversing this cycle</description><identifier>ISBN: 9781424407446</identifier><identifier>ISBN: 1424407443</identifier><identifier>EISBN: 1424407451</identifier><identifier>EISBN: 9781424407453</identifier><identifier>DOI: 10.1109/CIHSPS.2006.313291</identifier><language>eng</language><publisher>IEEE</publisher><subject>Competitive intelligence ; Computational and artificial intelligence ; Computational intelligence ; Domestic safety ; Information analysis ; Pattern analysis ; Pattern matching ; Software safety ; Terrorism ; USA Councils</subject><ispartof>2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, 2006, p.5-10</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4106212$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,27904,54899</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4106212$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Wolverto, Michael</creatorcontrib><creatorcontrib>Harrison, Ian</creatorcontrib><creatorcontrib>Lowrance, John</creatorcontrib><creatorcontrib>Rodriguez, Andres</creatorcontrib><creatorcontrib>Thomere, Jerome</creatorcontrib><title>Software Supported Pattern Development in Intelligence Analysis</title><title>2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety</title><addtitle>CIHSPS</addtitle><description>Intelligence professionals work with incomplete and noisy data. Their information needs are often hard to express, and almost impossible to get right the first time. This paper describes the GEM pattern language for encoding analysts' information needs in graphical patterns, and its use in the Link Analysis Workbench (LAW) system to find inexact matches to those patterns in large relational data sets. The LAW user typically interacts with the system through a cycle in which the user (1) creates an initial GEM pattern corresponding to his information need, (2) uses the LAW matcher to retrieve a collection of matching episodes in the data, (3) revises the pattern based on the shortcomings of the matches, and (4) repeats the process until the revised pattern is returning the right data. The pattern language and the system are designed to facilitate the user in quickly traversing this cycle</description><subject>Competitive intelligence</subject><subject>Computational and artificial intelligence</subject><subject>Computational intelligence</subject><subject>Domestic safety</subject><subject>Information analysis</subject><subject>Pattern analysis</subject><subject>Pattern matching</subject><subject>Software safety</subject><subject>Terrorism</subject><subject>USA Councils</subject><isbn>9781424407446</isbn><isbn>1424407443</isbn><isbn>1424407451</isbn><isbn>9781424407453</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1jtFKwzAYRiMiqLMvoDd5gdb8SZo0VzKmc4WBg-r1SJs_EunS0kZlb-9A_W4O5-bwEXILrABg5n5Vb5pdU3DGVCFAcANn5Bokl5JpWcI5yYyu_l2qS5LN8wc7TRhhQFyRh2bw6dtOSJvPcRymhI7ubEo4RfqIX9gP4wFjoiHSOibs-_COsUO6jLY_zmG-IRfe9jNmf1yQt_XT62qTb1-e69VymwfQZcpbVjEhDXdKe6ta6dBb6YXVHXdghDt9ayV65yyWFXCpW9WxqmSd8E5ZIcWC3P12AyLuxykc7HTcS2CKAxc_NWNLPg</recordid><startdate>200610</startdate><enddate>200610</enddate><creator>Wolverto, Michael</creator><creator>Harrison, Ian</creator><creator>Lowrance, John</creator><creator>Rodriguez, Andres</creator><creator>Thomere, Jerome</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200610</creationdate><title>Software Supported Pattern Development in Intelligence Analysis</title><author>Wolverto, Michael ; Harrison, Ian ; Lowrance, John ; Rodriguez, Andres ; Thomere, Jerome</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-b0803492d67fa6b4defa4f3a7c2d193d446b4efddae581247b6c0850c3fd6a343</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Competitive intelligence</topic><topic>Computational and artificial intelligence</topic><topic>Computational intelligence</topic><topic>Domestic safety</topic><topic>Information analysis</topic><topic>Pattern analysis</topic><topic>Pattern matching</topic><topic>Software safety</topic><topic>Terrorism</topic><topic>USA Councils</topic><toplevel>online_resources</toplevel><creatorcontrib>Wolverto, Michael</creatorcontrib><creatorcontrib>Harrison, Ian</creatorcontrib><creatorcontrib>Lowrance, John</creatorcontrib><creatorcontrib>Rodriguez, Andres</creatorcontrib><creatorcontrib>Thomere, Jerome</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wolverto, Michael</au><au>Harrison, Ian</au><au>Lowrance, John</au><au>Rodriguez, Andres</au><au>Thomere, Jerome</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Software Supported Pattern Development in Intelligence Analysis</atitle><btitle>2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety</btitle><stitle>CIHSPS</stitle><date>2006-10</date><risdate>2006</risdate><spage>5</spage><epage>10</epage><pages>5-10</pages><isbn>9781424407446</isbn><isbn>1424407443</isbn><eisbn>1424407451</eisbn><eisbn>9781424407453</eisbn><abstract>Intelligence professionals work with incomplete and noisy data. Their information needs are often hard to express, and almost impossible to get right the first time. This paper describes the GEM pattern language for encoding analysts' information needs in graphical patterns, and its use in the Link Analysis Workbench (LAW) system to find inexact matches to those patterns in large relational data sets. The LAW user typically interacts with the system through a cycle in which the user (1) creates an initial GEM pattern corresponding to his information need, (2) uses the LAW matcher to retrieve a collection of matching episodes in the data, (3) revises the pattern based on the shortcomings of the matches, and (4) repeats the process until the revised pattern is returning the right data. The pattern language and the system are designed to facilitate the user in quickly traversing this cycle</abstract><pub>IEEE</pub><doi>10.1109/CIHSPS.2006.313291</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781424407446 |
ispartof | 2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, 2006, p.5-10 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4106212 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Competitive intelligence Computational and artificial intelligence Computational intelligence Domestic safety Information analysis Pattern analysis Pattern matching Software safety Terrorism USA Councils |
title | Software Supported Pattern Development in Intelligence Analysis |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T04%3A57%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Software%20Supported%20Pattern%20Development%20in%20Intelligence%20Analysis&rft.btitle=2006%20IEEE%20International%20Conference%20on%20Computational%20Intelligence%20for%20Homeland%20Security%20and%20Personal%20Safety&rft.au=Wolverto,%20Michael&rft.date=2006-10&rft.spage=5&rft.epage=10&rft.pages=5-10&rft.isbn=9781424407446&rft.isbn_list=1424407443&rft_id=info:doi/10.1109/CIHSPS.2006.313291&rft_dat=%3Cieee_6IE%3E4106212%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424407451&rft.eisbn_list=9781424407453&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4106212&rfr_iscdi=true |