Learn More
Every day, hundreds of thousands of people pass through airport security checkpoints, border crossing stations, or other security screening measures. Security professionals must sift through countless interactions and ferret out high-risk individuals who represent a danger to other citizens. During each interaction, the security professional must decide(More)
Complex environmental and ecological problems require collaborative, interdisciplinary efforts. A common approach to integrating disciplinary perspectives on these problems is to develop simulation models in which the linkages between system components are explicitly represented. There is, however, little guidance in the literature on how such models(More)
Behavioral indicators of deception and behavioral state are extremely difficult for humans to analyze. Blob analysis, a method for analyzing the movement of the head and hands based on the identification of skin color is presented. This method is validated with numerous skin tones. A proof-of-concept study is presented that uses blob analysis to explore(More)
Research was conducted on the application of GroupWriter, to support the development, editing, sharing, and modification of government documents. One of the major advantages of using GroupWriter is the support of collaborative writing and the manipulation of documents in a manner unconstrained by time and place. At this time various groups from government(More)
The U.S. military is in the midst of a transformation. While business leaders moved quickly to put computing power in the hands of individuals, the military establishment has been less responsive. Network Centric Warfare is a current U.S. Navy initiative to leverage the power of the computer to restructure forces from the bottom up. Instead of a strict(More)
Past research in deception detection at the University of Arizona has guided the investigation of intent detection. A theoretical foundation and model for the analysis of intent detection is proposed. Available test beds for intent analysis are discussed and two proof-ofconcept studies exploring nonverbal communication within the context of deception(More)