Conference Papers


Coulter, L., D. Stow, S. Kumar, S. Dua, B. Loveless, G. Fraley, C. Lippitt, and V. Shrivastava. 2012b. Automated co-registration of multitemporal airborne frame images for near real-time change detection. Proceedings of the ASPRS 2012 Annual Conference, Sacramento, CA, March 19-23, 2012.

Coulter, L., D. Stow, Y.H. Tsai, C. Chavis, C. Lippitt, G. Fraley, and R. McCreight. 2012d. A new Paradigm for Persistent Wide Area Surveillance. Proceedings of the IEEE International Conference on Homeland Security Technologies, November 13-15, 2012, Waltham, MA.

D.C. Elkins, A. C., Derrick, D. C., Gariup, M. (2012). The Voice and Eye Gaze Behavior of an Imposter: Automated Interviewing and Detection for Rapid Screening at the Border. European Chapter of the Association for Computational Linguistics (EACL), Apr 23-27, 2012, Avignon, France.

Derrick, D. C., de Vreede, G. J. (2012). Automated transactional leadership in ad-hoc, virtual teams. Group Decision and Negotiation Conference, May 21-24, 2012, Recife, Brazil.

Derrick, D. C., de Vreede, G. J., Read, A. S. (2012). SPECIES agents for automated facilitation of mass collaboration. Group Decision and Negotiation Conference, May 21-24, 2012, Recife, Brazil.

Elkins, A. C., Derrick, D. C., Burgoon, J. K., & Nunamaker Jr, J. F. (2012). Predicting Users? Perceived Trust in Embodied Conversational Agents Using Vocal Dynamics. Hawai?i International Conference on System Sciences (HICSS), Jan 4-7, 2012, Maui, HI.

Jenkins, J. L., Proudfoot, J. G., & Durcikova, A. (2012). Determinants and Impediments of Password Reuse on Deceptive Websites in Jensen, M., Meservy, T., Burgoon, J., and Nunamaker, J., Report of the HICSS-45 Rapid Screening Technologies, Deception Detection and Credibility Assessment Symposium, January 2012.

Jun He, Robert A. Norwood, Mahmoud Fallahi, and Nasser Peyghambarian, "Solar-powered ad-hoc wireless sensor network for border surveillance", Proc. SPIE 8377, 83770T (2012).

Kaza, S., Lu, H.-M., Zeng, D., and Chen. H. (2012). "Using Burst Detection Techniques to Identify Suspicious Vehicular Traffic at Border Crossings," Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics (ISI), Wasington, D.C., June.

Mayra Sacanamboy, Bojan Cukic and Vittorio Cortellessa, "Performance and Risk Analysis for Border Management Applications: a model-driven approach and a perspective view", Workshop on Innovation in Border Control, Odense, Denmark, 2012.