Special Event: Command, Control, and Interoperability Center for Advanced Data Analysis (CCICADA)-Research Retreat

October 16 - 17, 2010
University of Southern California, Los Angeles

Organizers:
Ed Hovy, CCICADA/USC, hovy at isi.edu
Jack Jarmon, CCICADA/DIMACS, jjarmon at dimacs.rutgers.edu
Bill Pottenger, CCICADA/Rutgers, billp at dimacs.rutgers.edu
Fred Roberts, CCICADA/DIMACS, froberts at dimacs.rutgers.edu
Dan Roth, CCICADA/University of Illinois at Urbana-Champaign, danr at uiuc.edu
Presented under the auspices of the The Homeland Security Center for Command, Control, and Interoperability Center for Advanced Data Analysis (CCICADA).
Saturday, October 16, 2010

 8:30 -  9:00  Opening:
               Joe Kielman, Department of Homeland Security
               Fred Roberts, CCICADA/DIMACS
    
 9:00  - 9:30  Invited talk 1:
               Milind Tambe
               CREATE Center, University of Southern California

 9:30 - 10:15  Session 1 - Graphs

               An Algorithm for Partitioning the Nodes of a Graph
               Earl Barnes, Morgan State University

               Detecting Novel Discrepancies in
               Highly Dynamic Information Networks
               Nishchal Devanur, Rutgers University 

               Fully Dynamic Connectivity in a Streaming Model
               Matthew Oster, Rutgers University

10:15 - 10:35  Break

10:35 - 11:05  Invited talk 2:
               Al Wallace, Rensselaer Polytechnic Institute

11:05 - 12:00  Session 2 - Viz, Detection

               A penalized regression approach in detection of
               nuclear materials in the shipments to the U.S.
               Xueying Chen, Rutgers University

               Virtual Worlds and Human Behavior: A case study in health risks
               Ashley Denegre, Rutgers University

               Weave (WEb based Analysis and Visualization Environment)
               Curran Kelleher, U Mass, Lowell

               Linking Textual Content to Location to Provide Geospatial Intelligence
               Craig Knoblock, Geosemble Technologies 

               Anomaly Detection in IP networks using Optimal Monitoring Interval Length
               Andrew Rodriguez, Rutgers University

12:00 -  1:00  Lunch

 1:00 -  1:30  Invited talk 3: Dan Roth, University of Illinois at Urbana-Champaign

 1:30 -  2:45  Session 3 - NLP

               Continuous monitoring of events from twitter and news articles
               Congxing Cai, USC/ISI

               Exploiting Thread Structures to Improve Smoothing of
               Language Models for Forum Post Retrieval
               Huizhong Duan, University of Illinois at Urbana-Champaign 

               Identifying Relevant Literature on Chemical Terrorism using Machine Learning
               Lila Ghemri, TSU

               Higher Order Latent Dirichlet Allocation
               Nir Grinberg, Rutgers

               Can you believe what you read?: Trustworthiness of Online Content
               V.G.Vinod Vydiswaran, University of Illinois at Urbana-Champaign 

 2:45 -  3:05  Break

 3:05 -  3:35  Invited talk 4:
               Nina Fefferman, Rutgers University

 3:35 -  3:45  Poster Highlights
               Machine learning methods for cybersecurity
               Eugene Fink, CMU

               Optimal Evacuation and Resource Routing for Crisis Situations in Urban Centers
               Brad Greening, Rutgers University

               Visual Analytics Science and Technology (VAST)
               Shawn Konecni, University of Massachusetts Lowell

               Using what we know about biomechanics to explore the nonlinear dynamics of iris deformation
               Scott Kulp, Rutgers University

               Applications of Confluent Graph Visualization Engine to Data Analysis and Information Extraction
               Sam Tannouri and Ahlam Tannouri, Morgan State University

               Discovering Connections between and within DHS Centers of Excellence
               Hao Wang, USC Information Sciences Institute 

               Shape-free detection of hazard materials and its application to counter-terrorism 
               Guoping Zhang, Morgan State University

 3:45 -  4:30  Poster/demo session

 4:30 -  5:00  General discussion

 5:30          Dinner at ISI

 7:00          Closing


Sunday, October 17, 2010

 8:30 -  8:45  Opening Remarks

 8:45  - 9:00  A Renewal Theory Approach to Anomaly
               Detection in Communication Networks
               Brian Thompson, Rutgers University

 9:00 - 10:00  Breakout (Discussion Groups)
               
               1. Simulating and measuring a crisis event on a campus		
               2. Detecting and handling a computer security break-in on a campus		
               3. Automatically identifying the most appropriate topics that characterize a person's research

10:00 - 10:20  Break

10:20 - 10:50  Regroup and report findings 		

10:50 - 11:20  Discussion

11:20 - 11:30  Wrap-up

11:30          Go home		


Previous: Participation
Next: Registration
Workshop Index
CCICADA Homepage

Document last modified on October 13, 2010.