2009 IEEE Conference on Technologies for Homeland Security 2009
DOI: 10.1109/ths.2009.5168041
|View full text |Cite
|
Sign up to set email alerts
|

Potential IED threat system (PITS)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2009
2009
2012
2012

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…A variety of methods have been used for assessing likelihoods of IEDs at a location (Fong and Zhuang [8]; Li, Bramsen, and Alonso [9]; Parunak, Sauter, and Crossman [11]). Poisson models can work well, but the base rate will vary considerably with the terrain.…”
Section: Prior Probabilities For Emplacementmentioning
confidence: 99%
“…A variety of methods have been used for assessing likelihoods of IEDs at a location (Fong and Zhuang [8]; Li, Bramsen, and Alonso [9]; Parunak, Sauter, and Crossman [11]). Poisson models can work well, but the base rate will vary considerably with the terrain.…”
Section: Prior Probabilities For Emplacementmentioning
confidence: 99%
“…The PITS++ system is based on its predecessor PITS system [4], which computes these influence maps based on purely geographical features such as the (x,y) location of the map. Our goal is to enhance the influence map by adding non-geographical features such as time or income level in the area of the attacks.…”
Section: Figure 1: Pits++ Viewer Showing the Training (Cyan) And Testmentioning
confidence: 99%
“…The PITS++ tool is built on our previous work on PITS [4]. Note that the main difference between the two systems is that PITS++ incorporates a CBR mechanism into the original PITS system.…”
Section: Pits++: Function Value Estimation Predictionmentioning
confidence: 99%
See 1 more Smart Citation