Law enforcement agents at the local, state, and Federal levels have informed us of backlogs of computer-related crime cases ranging from 18 months to three years. The primary caus...
Philip Craiger, Lucille Ponte, Carrie Morgan Whitc...
In recent years, mathematical, statistical and computer science methods have found extensive application in developing new procedures for crime investigation, prosecution and the ...
Abstract. Motivated by three applications which are under investigation at the Honeywell Research Laboratory in Minneapolis, we introduce a class of large scale control problems. I...
Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the util...
The U.S. Capitol Police (USCP) are responsible for protecting the Capitol Hill complex encompassing the Senate and House office buildings and the Capitol building. Currently, the ...
Frank Armour, Stephen H. Kaisler, Jim Getter, Doug...