DIMACS Workshop on Applications of Order Theory to Homeland Defense and Computer Security

September 28 - 29, 2004
DIMACS Center, CoRE Building, Rutgers University

Jonathan Farley, Massachusetts Institute of Technology
Anthony A. Harkin, Harvard University, harkin@deas.harvard.edu
Mel Janowitz, DIMACS / Rutgers University, melj@dimacs.rutgers.edu
Stefan Schmidt, Physical Science Laboratory, schmidt@psl.nmsu.edu
DIMACS Working Group on Applications of Order Theory to Homeland Defense and Computer Security participation by invitation only.


Tuesday, September 28, 2004

 8:15 -  9:00 Breakfast and Registration - CoRE Bldg., 4th Floor

 9:00 -  9:15 Welcoming Remarks
              Fred Roberts, DIMACS Director and Mel Janowitz, DIMACS Associate Director

 9:20 -  9:50 Winning the Shadow War: A Mathematical Method for Analyzing the Effectiveness
              of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making)
              Jonathan Farley, MIT

10:00 - 10:45 Rounding up the Usual Suspects: Insights from Order Theory 
              Gordon T. Woo, Risk Management Solutions

10:45 - 11:10 Break

11:10 - 11:55 Dynamic Network Analysis for Homeland Defense: Destabilizing Terror Networks
              Kathleen Carley, Carnegie Mellon University

12:00 - 12:45 Detecting Terrorist Cells: The Hierarchical Formation of Networks
              Steven J. Brams, Michael A. Jones, and D. Marc Kilgour, NYU 

12:45 -  2:00 Lunch - DIMACS Lounge, 4th Floor

 2:00 -  2:45 Order Theory and Security
              Mike Mislove, Tulane University

 2:50 -  3:30 Boolean Model of Metachoice: An Analysis of Terrorists' Decision Making
              Vladimir Lefebvre, University of California at Irvine
 3:35 -  4:00 Homeland Security Institute: Overview and Issues for the DIMACS Workshop
              Gary Nelson, Planner and Systems Engineer, Homeland Security Institute

 4:00 -  4:30 Break

 4:45         Van back to the hotel

 5:30         Reception at Four Points Sheraton Hotel - Piscataway 

 6:30pm       Banquet at Four Points Sheraton Hotel - Piscataway 

Wednesday, September 29, 2004
 8:15 -  9:00 Breakfast and Registration - CoRE Bldg., 4th Floor

 9:00 -  9:45 Cryptographic Techniques to Enforce an Information Flow Policy
              Jason Crampton, University of London

 9:50 - 10:15 Agent-based Modeling of Multi-resolutional Factors in 
              Terrorist Recruitment
              Don Birx, Physical Science Laboratory

10:15 - 10:45 Break

10:45 - 11:05 An Institute for Mathematical Methods in Counter-Terrorism: 
              A new model for North-South cooperation 
              Ronald Young, The University of the West Indies

11:10 - 11:55 Understanding Meadow's Safe Flow Policy as the Bridging Entailment 
              Relation between Formal Concept Analysis and Scott Information Systems
              GQ Zhang, Case Western Reserve University             

12:00 -  1:30 Lunch

 1:30 -  1:55 Mathematicians at RAND: Then and Now
              Paul Dreyer, RAND Corporation

 2:00 -  2:45 Order Theoretical Knowledge Discovery
              Cliff Joslyn, Los Alamos National Laboratory

 2:50 -  3:20 Break 
 3:20 -  4:05 Link Discovery via a Mutual Information Model: From Graphs to Ordered Lists
              (with an Illustration Concerning Russian Contract Killing)
              Jafar Adibi, University of Southern California

 4:10 -  4:50 From Prediction to Reflexive Control:
              Simulating the Penetration of Our Borders by Terrorists
              Stefan Schmidt, New Mexico State University & Phoenix Mathematical Systems Modeling, Inc. and
              Xenia Kramer, New Mexico State University

 4:50 -  5:00 Closing Remarks

Previous: Participation
Next: Registration
Workshop Index
DIMACS Homepage
Contacting the Center
Document last modified on September 27, 2004.