Mathematical sciences play a key role in many important areas of Homeland Security including data mining and image analysis and voice recognition for intelligence analysis, encryption and decryption for intelligence gathering and computer security, detection and epidemiology of bioterriost attacks to determine their scope, and data fusion to analyze information coming from simultaneously from several sources.
This report presents the results of a workshop focusing on mathematical methods and techniques for addressing these areas. The goal of the workshop is to help mathematical scientists and policy makers understand the connections between mathematical sciences research and these homeland security applications.
- FRONT MATTER
- CONTENTS
- Welcome and Overview of Sessions, April 26
- Peter Bickel
“Opening Remarks,” April 26
- Data Mining, Unsupervised Learning, and Pattern Recognition
- James Schatz
”Introduction by Session Chair”
- Jerry Friedman
“Role of Data Mining in Homeland Defense”
- Diane Lambert
“Statistical Detection from Communications Streams”
- Rakesh Agrawal
“Data Mining: Potentials and Challenges”
- Donald McClure
“Remarks on Data Mining, Unsupervised Learning, and Pattern Recognition”
- Werner Stuetzle
“Remarks on Data Mining, Unsupervised Learning, and Pattern Recognition”
- Detection and Epidemiology of Bioterrorist Attacks
- Claire Broome
“Introduction by Session Chair”
- Kenneth Kleinman
“Ambulatory Anthrax Surveillance: An Implemented System, with Comments on
Current Outstanding Needs”
- Stephen Eubank
“Mathematics of Epidemiological Simulations for Response Planning”
- Sally Blower
“Predicting the Unpredictable in an Age of Uncertainty”
- Simon Levin
“Remarks on Detection and Epidemiology of Bioterrorist Attacks”
- Arthur Reingold
“Remarks on Detection and Epidemiology of Bioterrorist Attacks”
- Image Analysis and Voice Recognition
- Roberta Lenczowski
“Introduction by Session Chair”
- Jitendra Malik
“Computational Vision”
- Ronald Coifman
“Mathematical Challenges for Real-Time Analysis of Imaging Data”
- Larry Rabiner
“Challenges in Speech Recognition”
- David McLaughlin
“Remarks on Image Analysis and Voice Recognition”
- David Donoho
“Remarks on Image Analysis and Voice Recognition”
- Opening Remarks and Discussion, April 27
- Communications and Computer Security
- Howard Schmidt
“Introduction by Session Chair”
- Dorothy Denning
“A Security Challenge: Return on Security Investment”
- Kevin McCurley (Talk omitted at speaker's request)
- David Wagner
“A Few Open Problems in Computer Security”
- Andrew Odlyzko
“Remarks on Communications and Computer Security”
- Michael Freedman
(Remarks omitted at speaker's request)
- Data Integration and Fusion
- Alexander Levis
“Introduction by Session Chair”
- Tod Levitt
“Reasoning About Rare Events”
- Kathryn Laskey
“Knowledge Representation and Inference for Multisource Fusion”
- Valen Johnson
“A Hierarchical Model for Estimating the Reliability of Complex Systems”
- Arthur Dempster
“Remarks on Data Integration and Fusion”
- Alberto Grunbaum
”Remarks on Data Integration and Fusion”
- Business Week Article: Enlisting Math to Defend the Homeland by Stephen H. Wildstrom
- Mathematical Sciences in Homeland Security Links