TY - BOOK AU - Ladner,Roy AU - Petry,Fred TI - Net-centric approaches to intelligence and national security SN - 0387242953 (alk. paper) AV - UG479 .N48 2005 U1 - 327.12/0285 22 PY - 2005/// CY - New York PB - Springer KW - Artificial intelligence KW - Military applications KW - Expert systems (Computer science) KW - National security N1 - Includes bibliographical references and index; 1; Ontologies for the semantic Web; Vipin Menon, Roy Ladner and Fred Petry --; 2; Web services overview for net-centric operations; Elizabeth Warner, Uday Katikaneni, Roy Ladner and Kevin Shaw --; 3; Metadata concepts to support a net-centric data environment; Kenneth Laskey --; 4; Distributed geospatial intelligence integration and inter-operability through the GIDB portal system; John Sample and Frank McCreedy --; 5; Analyzing intelligence data; Christopher Westphal --; 6; Linking military systems with simulations and intelligent agents through Web services; Ranjeev Mittu --; 7; A multi-agent architecture for distributed domain-specific information integration; Shahram Rahimi, Norm Carver and Fred Petry --; 8; Natural environment data services in distributed modeling and simulation; Joseph Collins and Christopher Scannell N2 - "Net-Centric Approaches to Intelligence and National Security considers the web architectures and recent developments that make net-centric approaches for intelligence and national security possible. The development of net-centric approaches for intelligence, national and homeland security applications has become a major concern in many areas such as defense intelligence and national and international law enforcement agencies, especially since the terrorist attacks of 9/11." "Net-Centric Approaches to Intelligence and National Security presents developments in information integration and recent advances in web services including the concept of the semantic web. Discovery analysis and management of web-available data pose a number of interesting challenges for research in web-based management systems. Intelligent agents and data mining are among the techniques employed. A number of specific systems that are net-centric based in various areas of military applications, intelligence and law enforcements are presented utilizing one or more of such techniques." "Net-Centric Approaches to Intelligence and National Security is designed for a professional audience of researchers and practitioners in industry. This volume is also suitable for graduate-level students in computer science."--BOOK JACKET ER -