Today's National and Interstate border control agencies are flooded with alerts generated fro... more Today's National and Interstate border control agencies are flooded with alerts generated from various monitoring devices. There is an urgent need to uncover potential threats to effectively respond to an event. In this paper, we propose a Semantic Threat Mining approach, to discover threats using the spatio-temporal and semantic relationships among events and data. We represent the potentially dangerous collusion
DG.O (Inter)National Conference on Digital Government Research, 2002
Today, many government agencies provide tremendous amount of information and services via the Web... more Today, many government agencies provide tremendous amount of information and services via the Web, often overwhelming the citizens. Personalization and customization in delivering in- formation and government services remains as a major challenge. In this paper, we present a novel approach for dynamically composing workflows to delivering customized government services to citizens. Such a system is especially important in a
Eine Verletzung von Knochen löst eine nachfolgende Reparaturreaktion aus. Im Defektbereich vorhan... more Eine Verletzung von Knochen löst eine nachfolgende Reparaturreaktion aus. Im Defektbereich vorhandene Zellen werden aktiviert und können so verstärkt auf lokale und systemische Botenstoffe reagieren, die durch die Nekrose von Zellen während der ...
Hawaii International Conference on System Sciences, 1998
The model of electronic commerce envisions the ability to send large quantities of business trans... more The model of electronic commerce envisions the ability to send large quantities of business transactions electronically to a large number of sometimes anonymous parties. The EDI standards ANSI X12 and EDIFACT provide a framework for formatting a given EDI message, called an EDI transaction. Although the EDI paradigm provides an obvious improvement over the paper world, it suffers from several
Proceedings of the 6th annual ACM international workshop on Web information and data management - WIDM '04, 2004
... Clickstream-based CF (CCF), a kind of item-based CF [11], has received much attention as a wa... more ... Clickstream-based CF (CCF), a kind of item-based CF [11], has received much attention as a way of doing collaborative filtering Web personalization because user data is ... The active session window is the portion of a user's active session used by a model for prediction. ...
2009 IEEE Conference on Technologies for Homeland Security, 2009
... A case study of decision support enabled by UICDS describes how geospatial predictiveanalytic... more ... A case study of decision support enabled by UICDS describes how geospatial predictiveanalytics utilizes UICDS information sources to anticipate potential natural, technological, and terrorist events and effectively allocate resources to counter them. ...
Today's National and Interstate border control agencies are flooded with alerts generated fro... more Today's National and Interstate border control agencies are flooded with alerts generated from various monitoring devices. There is an urgent need to uncover potential threats to effectively respond to an event. In this paper, we propose a Semantic Threat Mining approach, to discover threats using the spatio-temporal and semantic relationships among events and data. We represent the potentially dangerous collusion
DG.O (Inter)National Conference on Digital Government Research, 2002
Today, many government agencies provide tremendous amount of information and services via the Web... more Today, many government agencies provide tremendous amount of information and services via the Web, often overwhelming the citizens. Personalization and customization in delivering in- formation and government services remains as a major challenge. In this paper, we present a novel approach for dynamically composing workflows to delivering customized government services to citizens. Such a system is especially important in a
Eine Verletzung von Knochen löst eine nachfolgende Reparaturreaktion aus. Im Defektbereich vorhan... more Eine Verletzung von Knochen löst eine nachfolgende Reparaturreaktion aus. Im Defektbereich vorhandene Zellen werden aktiviert und können so verstärkt auf lokale und systemische Botenstoffe reagieren, die durch die Nekrose von Zellen während der ...
Hawaii International Conference on System Sciences, 1998
The model of electronic commerce envisions the ability to send large quantities of business trans... more The model of electronic commerce envisions the ability to send large quantities of business transactions electronically to a large number of sometimes anonymous parties. The EDI standards ANSI X12 and EDIFACT provide a framework for formatting a given EDI message, called an EDI transaction. Although the EDI paradigm provides an obvious improvement over the paper world, it suffers from several
Proceedings of the 6th annual ACM international workshop on Web information and data management - WIDM '04, 2004
... Clickstream-based CF (CCF), a kind of item-based CF [11], has received much attention as a wa... more ... Clickstream-based CF (CCF), a kind of item-based CF [11], has received much attention as a way of doing collaborative filtering Web personalization because user data is ... The active session window is the portion of a user's active session used by a model for prediction. ...
2009 IEEE Conference on Technologies for Homeland Security, 2009
... A case study of decision support enabled by UICDS describes how geospatial predictiveanalytic... more ... A case study of decision support enabled by UICDS describes how geospatial predictiveanalytics utilizes UICDS information sources to anticipate potential natural, technological, and terrorist events and effectively allocate resources to counter them. ...
Uploads
Papers by Nabil Adam