Back to Results
First PageMeta Content
Ethology / Interpersonal communication / Interpersonal deception theory / Judee K. Burgoon / Lie / Information manipulation theory / Behavior / Deception / Communication theory


1_1 - Derrick Meservy Burgoon Nunamaker - Experimental Agent for Detecting Deceipt v2.pdf
Add to Reading List

Document Date: 2012-01-02 15:23:45


Open Document

File Size: 3,94 MB

Share Result on Facebook

City

Omaha / /

Company

Sun Microsystems / Natalya Bazarova Intelligent Automation Inc. / Pearson / MySql / Judee K. Burgoon / /

Country

United States / /

Currency

USD / /

/

Facility

Rachel Boochever Cornell University / Fort Hays State University / Credibility Assessment Symposium Matthew Jensen University of Oklahoma Thomas Meservy University / John Carlson University of Arizona / Judee K. Burgoon University of Arizona / Alexandra Durcikova University of Arizona / University of Oklahoma / Immigration University of Arizona University of Arizona Rapid Screening Technologies / Data Structure Analysis Using Theme Ryan Schuetzler University of Arizona BREAK / Elyse Golob University of Arizona / Jay F. Nunamaker Rutgers University / Suomala Jyrki Laurea University of Applied Sciences Rapid Screening Technologies / Katherine Kelley University of Oklahoma / Iowa State University / University of Arizona / Jay F. Nunamaker University of Oklahoma / University of Memphis / The University of Memphis / Norah Dunbar University of Arizona / The University of Arizona / Jay Nunamaker University of Arizona / Maja Pantic Imperial College / The University of Nebraska / University of Arizona Session / University of London BREAK / Southern Utah University / Jay Nunamaker University of Nebraska‐Omaha / /

IndustryTerm

script protocol / online deception / federal law enforcement / social networking sites / web browsers / communication technologies / on-line system / online forums / later processing / transportation hubs / software agent / law enforcement scenarios / classification algorithm / web site system / chatbot technology / credibility-related technologies / server processing speed / classification algorithms / real-time script protocol / deception detection technologies / /

Movie

English as a second language / /

MusicGroup

Flow / /

OperatingSystem

Windows 2003 Server / /

Organization

University of Oklahoma / Southern Utah University / Rutgers University / Detecting Identity Deception Koskenlaakso Tarja / Pesu Liisa / Knuuttila Juha and Suomala Jyrki Laurea University / Iowa State University / Defense Academy for Credibility Assessment / University of London BREAK / Baylor University / Border Security and Immigration Jay Nunamaker DHS Center of Excellence for Border Security / Cornell University / University of Arizona University / University of Arizona Session / Internal Review Board / Maja Pantic Imperial College / Memphis Judee Burgoon DHS Center of Excellence for Border Security / University of Nebraska / National Science Foundation Center for Identification Technology Research / Tracking Deception Detection Ryan Schuetzler University / University of Memphis / University of British Columbia / Data Structure Analysis Using Theme Ryan Schuetzler University of Arizona BREAK / Fort Hays State University / /

Person

Nathan W. Twyman / David Markowitz / Jay F. Nunamaker / Jr. / Jeffrey L. Jenkins / Aaron Elkins / Rebecca Morrow / Norah E. Dunbar / Joey George / Matthew L. Jensen / Michael T. Woodworth / Jeff Hancock / Justin Scott / Kevin C. Moffitt / Nikolas Marcou / Mary B. Burns / Jay Nunamaker / Roger Xu / Thomas O. Meservy / Douglas Derrick / Lindsey Harvell / Jeffrey G. Proudfoot / /

Position

Queen / /

Product

Apache / /

ProgrammingLanguage

XML schema / XML / Flow Java / /

ProvinceOrState

Nebraska / British Columbia / Hawaii / Utah / Oklahoma / Arizona / /

Region

southeastern United States / Southern Utah / southwestern United States / /

Technology

ADAM / XML / three algorithms / deception detection technologies / ADAM system / selected three algorithms / real-time script protocol / classification algorithm / credibility-related technologies / laser / chatbot technology / communication technologies / Eye‐Tracking Technology / artificial intelligence / java / Rapid Screening Technologies / classification algorithms / script protocol / GUI / /

URL

http /

SocialTag