Page: 1... 3 4 5 6 7 8 9 10 11... 48
121 |
Using Question-Answering Techniques to Implement a Knowledge-Driven Argument Mining Approach - Workshop on argument mining
|
|
|
|
In: Proceedings of the 4th Workshop on Argument Mining ; Conference on Empirical Methods in Natural Language Processing (EMNLP 2017) ; https://hal.archives-ouvertes.fr/hal-02640996 ; Conference on Empirical Methods in Natural Language Processing (EMNLP 2017), Sep 2017, Copenhague, Denmark. pp.85-90 (2017)
|
|
BASE
|
|
Show details
|
|
122 |
Mining Incoherent Requirements in Technical Specifications
|
|
|
|
In: NLDB 2017: Natural Language Processing and Information Systems ; 22nd International conference on Applications of Natural Language Processing to Information Systems (NLDB 2017) ; https://hal.archives-ouvertes.fr/hal-02603907 ; 22nd International conference on Applications of Natural Language Processing to Information Systems (NLDB 2017), Jun 2017, Liège, Belgium. pp.71-83 (2017)
|
|
BASE
|
|
Show details
|
|
123 |
SOUKHRIA: Towards an Irony Detection System for Arabic in Social Media
|
|
|
|
In: 3rd International Conference on Arabic Computational Linguistics ; https://hal.archives-ouvertes.fr/hal-01686504 ; 3rd International Conference on Arabic Computational Linguistics, Nov 2017, Dubaï, United Arab Emirates. pp.161 - 168, ⟨10.1016/j.procs.2017.10.105⟩ (2017)
|
|
BASE
|
|
Show details
|
|
128 |
Unclassified Report of Investigation on Allegations Relating to USCENTCOM Intelligence Products
|
|
|
|
Abstract:
The Department of Defense Office of Inspector General (DoD OIG) initiated this investigation to address allegations that senior intelligence officials Major General (MG) Steven Grove, U.S. Army, Director of Intelligence (J2), U.S. Central Command (USCENTCOM); Mr. Gregory Ryckman, Senior Executive Service (SES), Vice Director of Intelligence (VJ2), USCENTCOM; and Mr. William E. Buddy Rizzio, Defense Intelligence Senior Leader (DISL), Joint Intelligence Center, USCENTCOM (JICCENT), falsified, distorted, suppressed, or delayed intelligence products. The allegations, in essence, were that the intelligence was altered or suppressed to present a more optimistic portrayal of the success of USCENTCOMs efforts to degrade and destroy the Islamic State of Iraq and the Levant (ISIL) (the counter-ISIL campaign). To investigate these allegations, we assembled a multi-disciplinary team of DoD OIG employees, including administrative investigators, intelligence analysts, Defense Criminal Investigative Service (DCIS) digital forensics specialists, auditors, attorneys, and statisticians. Much of the information involved in this investigation was classified at the SECRET level. However, we also considered information at other classification levels. We prepared a report with the full results of our investigation, classified at the SECRET level. That report is more than 500 pages long, and provides a comprehensive description of the witness testimony, documentary evidence, and analysis that led to our conclusions. We have provided that classified report to the relevant organizations in the DoD, including USCENTCOM, the Under Secretary of Defense for Intelligence (USD(I)), and the Defense Intelligence Agency (DIA). We have also provided the classified report to the Office of the Director of National Intelligence (ODNI) as well as congressional committees with jurisdiction over the DoD or the Intelligence Community, including the Senate Armed Services Committee.
|
|
Keyword:
Administration and Management; allegations; ccj2(USCENTCOM Intelligence Directorate); falsification; intelligence analysis; intelligence collection; intelligence community (united states); intelligence cycle; j2(Intelligence Directorate of a Joint Staff); jiccent(Joint Intelligence Center USCENTCOM); management personnel; Military Intelligence; military personnel; statistical analysis; suppression; united states central command
|
|
URL: http://www.dtic.mil/docs/citations/AD1025805 http://oai.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=AD1025805
|
|
BASE
|
|
Hide details
|
|
130 |
From Tactical to Strategic Deception Detection: Application of Psychological Synthesis
|
|
|
|
In: Journal of Strategic Security (2017)
|
|
BASE
|
|
Show details
|
|
131 |
The Intelligence Dilemma: Proximity and Politicization–Analysis of External Influences
|
|
|
|
In: Journal of Strategic Security (2017)
|
|
BASE
|
|
Show details
|
|
132 |
Análisis y propuesta de Actividades y ejercicios que fomentan las Inteligencias Múltiples en una Unidad Didáctica
|
|
|
|
BASE
|
|
Show details
|
|
133 |
Assessing the accuracy of perceptions of intelligence based on heritable facial features
|
|
|
|
BASE
|
|
Show details
|
|
134 |
Novel symbolic and machine-learning approaches for text-based and multimodal sentiment analysis
|
|
|
|
BASE
|
|
Show details
|
|
135 |
Implicazioni etiche dell'analisi di contenuti, emozioni e interazioni nei social media
|
|
|
|
BASE
|
|
Show details
|
|
136 |
The Relation between Intelligence and Adaptive Behavior: A Meta-Analysis
|
|
|
|
BASE
|
|
Show details
|
|
137 |
Assessing the accuracy of perceptions of intelligence based on heritable facial features
|
|
|
|
BASE
|
|
Show details
|
|
138 |
Cognitive artificial intelligence – a complexity based machine learning approach for advanced cyber threats
|
|
Siddiqui, Sana. - : ACM (IWSPA), 2017. : IEEE (IJCNN), 2017. : Springer, 2017. : IEEE (ICCI*CC), 2017
|
|
BASE
|
|
Show details
|
|
140 |
Key Discovery for Numerical Data: Application to Oenological Practices
|
|
|
|
In: 22th International Conference on Graph-Based Representation and Reasoning ; ICCS: International Conference on Conceptual Structures ; https://hal.archives-ouvertes.fr/hal-01837440 ; ICCS: International Conference on Conceptual Structures, Jul 2016, Annecy, France. pp.222-236, ⟨10.1007/978-3-319-40985-6_17⟩ ; https://www.irit.fr/ICCS2016/ (2016)
|
|
BASE
|
|
Show details
|
|
Page: 1... 3 4 5 6 7 8 9 10 11... 48
|
|