Publications

Export 61 results:
Sort by: Author [ Title  (Asc)] Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
[bernica2013analysis] Bernica, T. W., V. E. Guarino, A. J. Han, L. F. Hennet, M. A. Mitchell, M. Gerber, and D. Brown, "Analysis and Prediction of Insurgent Influence for US Military Strategy", 2013 IEEE Systems and Information Engineering Design Symposium: IEEE, 2013.  Download: final.pdf (437.07 KB)
[hopkins2010analysis] Hopkins, R., N. Raymond, S. White, and S. DeLong, "The Analysis of Conventional Prompt Global Strike Alternatives", IEEE Systems and Information Engineering Design Symposium, University of Virginia, 2010.
[speegle2003applying] Speegle, C., and S. DeLong, "Applying the Systems Methodology in the Design of the USMA Intelligent Power Plant", IEEE Systems and Information Engineering Design Symposium, 2003.
AlBoni, M., and M. Gerber, "Area-Specific Crime Prediction Models", The 2016 IEEE International Conference Machine Learning and Applications, California, USA, IEEE, In Press.  Download: Area-Specific Crime Prediction Models.pdf (947.49 KB)
[hergenroeder2014automated] Hergenroeder, K., T. Carroll, A. Chen, C. Iurillo, P. Kim, Z. Terner, M. Gerber, and D. Brown, "Automated prediction of adverse post-surgical outcomes", Systems and Information Engineering Design Symposium (SIEDS), 2014: IEEE, 2014.
[wang2012automatic] Wang, X., M. Gerber, and D. Brown, "Automatic Crime Prediction Using Events Extracted from Twitter Posts", Social Computing, Behavioral - Cultural Modeling and Prediction, vol. 7227: Springer Berlin / Heidelberg, pp. 231-238, 2012.  Download: sbp2012_wgb.pdf (437.42 KB)
[scanlon2014automatic] Scanlon, J., and M. Gerber, "Automatic Detection of Cyber-Recruitment by Violent Extremists", Security Informatics, vol. 3, issue 1, pp. 1-10, 12/2014.
[gerber2012automatic] Gerber, M., D. Brown, and J. Harrison, "Automatic Formalization of Clinical Practice Guidelines", Proceedings of the AAAI Fall Symposium on Information Retrieval and Knowledge Discovery in Biomedical Text, 2012.  Download: irkd_gerber.pdf (184.59 KB); irkd_gerber.pptx (408.71 KB)
[menon2014automatic] Menon, A., F. Farmer, T. Whalen, B. Hua, K. Najib, and M. Gerber, "Automatic identification of alcohol-related promotions on Twitter and prediction of promotion spread", Systems and Information Engineering Design Symposium (SIEDS), 2014: IEEE, 2014.
AlBoni, M., and M. Gerber, "Automatic Optimization of Localized Kernel Density Estimation For Hotspot Policing", The 2016 IEEE International Conference Machine Learning and Applications, California, USA, IEEE, In Press.  Download: LKDE - Paper.pdf (914.86 KB)
[gerber2013automatic] Gerber, M., and L. Tang, "Automatic Quality Control of Transportation Reports using Statistical Language Processing", IEEE Transactions on Intelligent Transportation Systems, vol. 14, issue 4, pp. 1681-1689, 12/2013.
C
[huddleston2008changing] Huddleston, S., J. Fox, and G. Learmonth, "Changing Knives into Spoons: Examining the Oil-Spot Methodology of Fighting an Insurgency Using Hybrid Agent-Based Modeling", Proceedings of the 2008 IEEE Systems and Information Engineering Design Symposium, 2008.
[zhang2013comparison] Zhang, Y., S. Huddleston, D. Brown, and G. Learmonth, "A Comparison of Evaluation Methods for Police Patrol District Designs", Winter Simulation Conference, Washington, DC, 12/2013.  Download: zhang2013comparison.pdf (859.87 KB)
Lovelace, D., E. Lesnowicz, C. Michel, and E. Teague, "Comparison of Ground-based Fire Support Capabilities of the Marine Expeditionary Unit", Scythe - Proceedings and Bulletin of the International Data Farming Community, issue 2, pp. 32, 07/2007.
[wang2007crime] Wang, X., D. Brown, and J. Conklin, "Crime Incident Association with Consideration of Narrative Information", Proceedings of the IEEE Systems and Information Engineering Design Symposium, 2007.
D
[burk2004data] Burk, R., and S. DeLong, "Data Collection for the ABET Self-Study and Beyond", Assessment Processes VI Symposium, 2004.
[geffre2009determining] Geffre, J., R. F. Deckro, and S. A. Knighton, "Determining Critical Members of Layered Operational Terrorist Networks", The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, vol. 6, no. 2, pp. 97-109, 2009.
E
[teague2012evaluating] Teague, E., T. Warner, and D. Brown, "Evaluating infrastructure resource allocation in support of regional stability", International Journal of System of Systems Engineering, vol. 3, issue 2, pp. 154, 06/2012. Abstract
F
[kewly2008federated] Kewley, R., J. Cook, N. Goerger, D. Henderson, and E. Teague, "Federated simulations for systems of systems integration", Simulation Conference, 2008. WSC 2008. Winter, 2008.
[gerber2015forecasting] Gerber, M., and J. Scanlon, "Forecasting Violent Extremist Cyber-Recruitment", IEEE Transactions on Information Forensics and Security, vol. 10, issue 11, pp. 2461-2470, 2015.
G
[huddleston2013geographic] Huddleston, S., M. Gerber, and D. Brown, "Geographic Profiling of Criminal Groups for Military Cordon and Search", Social Computing, Behavioral-Cultural Modeling and Prediction, Charlottesville, VA, Springer-Verlag Berlin, Heidelberg, 2013.  Download: 10.1007-978-3-642-37210-0_55.pdf (990.04 KB)
I
[kruger2015identifying] Kruger, C., and M. Gerber, "Identifying Correlates of Homicide Rates in Michoacan, Mexico", Social Computing, Behavioral-Cultural Modeling, and Prediction: Springer, 2015.
[fox2012investigating] Fox, J., S. Huddleston, M. Gerber, and D. Brown, "Investigating a Bayesian Hierarchical Framework for Feature-Space Modeling of Criminal Site-Selection Problems", Proceedings of the 23rd Midwest Artificial Intelligence and Cognitive Science Conference, pp. 185--192, 2012.
L
[geffre2007layered] Geffre, J., A Layered Social and Operational Network Analysis, : Air Force Institute of Technology, 2007.
M
[huddleston2012mapping] Huddleston, S., J. Fox, and D. Brown, "Mapping Gang Spheres of Influence", Crime Mapping: A Journal of Research and Practice, vol. 4, issue 2, pp. 39-67, 12/2012.  Download: 
[zhang2007michigan] Zhang, C., M. Gerber, T. Baldwin, S. Emelander, J. Chai, and R. Jin, "Michigan State University at the 2007 TREC ciQA Task", Proceedings of the Sixteenth Text Retrieval Conference, Gaithersburg, Maryland, November, 2007.
[alboni2015model] AlBoni, M., K. Q. Zhou, H. Wang, and M. Gerber, "Model Adaptation for Personalized Opinion Analysis", The 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing, Beijing, China, Association for Computational Linguistics, 07/2015.
[delong2003modeling] DeLong, S., E. Tollefson, and R. Burk, Modeling of HEL Weapons in Army Combat Simulations, : Operations Research Center of Excellence, 2003.
P
[comfort2011parallel] Comfort, J. R., T. Warner, E. P. Vargo, and E. J. Bass, "Parallel coordinates plotting as a method in process control hazard identification", IEEE Systems and Information Engineering Design Symposium, 2011.
[zhang2012police] Zhang, Y., and D. Brown, "Police Patrol District Design Using Agent-Based Simulation and GIS", International Conference on Intelligence and Security Informatics: IEEE Press, 2012.
[zhang2013police] Zhang, Y., and D. Brown, "Police Patrol Districting Method and Simulation Evaluation Using Agent-Based Model & GIS", Security Informatics, vol. 2, issue 13, pp. 1-13, 03/2013. Abstract  Download: zhang2013police.pdf (1.69 MB)
[gerber2014predicting] Gerber, M., "Predicting Crime using Twitter and Kernel Density Estimation", Decision Support Systems (Elsevier), vol. 61, pp. 115-125, 2014.  Download: manuscript_gerber.pdf (440.22 KB)
[alboni2016predicting] AlBoni, M., and M. Gerber, "Predicting Crime with Routine Activity Patterns Inferred from Social Media", The 2016 International Conference on Systems, Man, and Cybernetics, Budapest, Hungary, IEEE, 2016.  Download: Crime Prediction using Social Media a Routine Activity Approach.pdf (552.79 KB); Presentation.pdf (1.52 MB)
[abelt2015predicting] Abelt, J., D. Browning, C. Dyer, M. Haines, J. Ross, P. Still, and M. Gerber, "Predicting Likelihood of Enrollment Among Applicants to the UVa Undergraduate Program", 2015 IEEE Systems and Information Engineering Design Symposium, 2015.
R
[vedomske2013random] Vedomske, M., D. Brown, and J. Harrison, "Random Forests on Ubiquitous Data for Heart Failure 30-Day Readmissions Prediction", 12th International Conference on Machine Learning and Applications (ICMLA), Miami, Florida, IEEE, 12/2013.
S
[vedomske2013scalable] Vedomske, M., M. Gerber, D. Brown, and J. Harrison, "Scalable and Locally Applicable Measures of Treatment Variation that Use Hospital Billing Data", 12th International Conference on Machine Learning and Appli- cations (ICMLA): IEEE Press, 12/2013.
[xiong2016sensus] Xiong, H., Y. Huang, L. Barnes, and M. Gerber, "Sensus: A Cross-Platform, General-Purpose System for Mobile Crowdsensing in Human-Subject Studies", ACM International Joint Conference on Pervasive and Ubiquitous Computing, Heidelberg, Germany, ACM, In Press.
[zhang2014simulation] Zhang, Y., and D. Brown, "Simulation Optimization of Police Patrol District Design Using an Adjusted Simulated Annealing Approach", 2014 Spring Simulation Multi-Conference, Symposium on Theory of Modeling & Simulation - DEVS Integrative M&S Symposium, Tampa, Florida, Curran Associates, 04/2014.  Download: zhang2013sa.pdf (2.23 MB)
[zhang2014rsm] Zhang, Y., and D. Brown, "Simulation Optimization of Police Patrol Districting Plans Using Response Surfaces", SIMULATION: Transactions of The Society for Modeling and Simulation International, vol. 90, issue 6, pp. 687 - 705, 06/2014.
[wang2011spatio] Wang, X., and D. Brown, "The Spatio-Temporal Generalized Additive Model for Criminal Incidents", Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2011.
[wang2012spatio] Wang, X., and D. Brown, "The Spatio-Temporal Modeling for Criminal Incidents", Security Informatics, vol. 1, 02/2012.
[wang2012aspatio] Wang, X., D. Brown, and M. Gerber, "Spatio-Temporal Modeling of Criminal Incidents Using Geographic, Demographic, and Twitter-derived Information", International Conference on Intelligence and Security Informatics: IEEE Press, 2012.  Download: ISI2012_WBG.pdf (886.96 KB)
[huddleston2007statistical] Huddleston, S., and et al, "Statistical Models for Target Detection in Infrared Imagery", Automatic Target Recognition XVII, Proceedings of the SPIE, 2007.
[huddleston2008statistical] Huddleston, S., The Statistical Threat Assessment, : University of Virginia, 2008.
[huddleston2009statistical] Huddleston, S., and D. Brown, "A Statistical Threat Assessment", IEEE Transactions on Systems, Man, and Cybernetics Part A – Systems and Humans, vol. 39, no. 6, 2009.
T
U
[huddleston2013using] Huddleston, S., and D. Brown, "Using Discrete Event Simulation to Evaluate Time Series Forecasting Methods for Security Applications", Winter Simulation Conference, Washington, D.C., 12/2013.  Download: 245.pdf (1.58 MB)
[wang2015using] Wang, M., and M. Gerber, "Using Twitter for Next-Place Prediction, with an Application to Crime Prediction", IEEE Symposium Series on Computational Intelligence, Cape Town, South Africa, 2015.
W