Thursday, September 28

9:00am-9:30am	Reception

9:30am-9:35am	Welcoming Remarks

9:40am-10:15am 	Crime, Punishment and Organization Structure 
 		Heski Bar-Isaac, New York University 

10:15am-10:25am Break

10:25am-11:00am	A Review of Statistical Models for Networks, with a Focus on Imputation
		Stanley Wasserman, Indiana University 

11:00am-11:10am Break

11:10am-11:55am	Small World Constraints on Terrorism Planning
		Gordon Woo, Risk Management Solutions 

11:55am-1:00pm 	Catered Lunch

1:00pm-1:35pm	Universal Patterns Underlying Ongoing Wars and Terrorism
		Michael Spagat, University of London, United Kingdom 

1:35pm-1:45pm 	Break

1:45pm-2:20pm 	A Brinkmanship Game Theory Model of Terrorism
		Francois Melese and Diana Angelis, Naval Postgraduate School 

2:20pm-2:30pm 	Break

2:30pm-3:05pm 	Terrorist Signaling and the Value of Intelligence
		Daniel G. Arce, Rhodes College 

3:05pm-3:25pm 	Snack Break

3:25pm-4:00pm 	Optimum Thresholds of Sensors for Container Inspection Systems
		Hao Zhang, Christina Schroepfer, E. A. Elsayed and Fred Roberts, Rutgers University 

4:00pm-4:10pm 	Break

4:10pm-4:45pm 	Improving the Risk-Scoring Algorithm of Marine Cargo Containers
		Richard Hoshino, Canada Border Services Agency 

4:45pm-4:55pm 	Break

4:55pm-5:30pm 	The Use of System Decomposition and Dynamic Modeling to Examine the Growth and Formation of a Terrorist Organization
		Captain Jason E. Bartolomei, Massachusetts Institute of Technology 

5:30pm-5:40pm 	Break

5:40pm-6:00pm 	Mathematics of Reaction-Diffusion Processes in Society
		Stephen Eubank, Virginia Tech 

Friday, September 29

9:00am-9:15am	Reception and Welcoming Remarks

9:15am-9:35am	Informing the US National Security Policy-Making Process:   The Role of Scientists and Technical Experts
		Benn Tannenbaum, American Association for the Advancement of Science

9:40am-10:10am 	Modeling Psychosocial Effects of Terror or Natural Disasters for Response Preparation
		Amy W. Ding, University of Illinois

10:10am-10:20am Break

10:20am-10:50am A Systems Analysis of the A. Q. Khan Network
 		Captain William Skimmyhorn, United States Military Academy 

10:50am-11:00am	Break

11:00am-11:30am Large Scale Optimization Model for Optimizing Container Inspection
		Endre Boros, Rutgers University 

11:30am-1:45pm 	Go out to Lunch + Networking

1:45pm-2:15pm 	Emerging Algebraic Combinatorial Intelligence Analysis Models and Methods for Countering Terrorism
		Joseph S. Oliveira, Pacific Northwest National Laboratory 

2:15pm-2:25pm 	Break

2:25pm-2:55pm 	Order Theoretical Analysis of Social Hierarchies
		Cliff Joslyn, Los Alamos National Laboratory 

2:25pm-2:35pm 	Break

2:35pm-2:55pm 	Mathematically Modeling Terrorist Cells: Examining the Strength of Structures of Small Sizes
		Lauren McGough, Quincy, Massachusetts 

2:55pm-3:05pm 	Break

3:05pm-3:35pm 	Detecting Hidden Hierarchy of Non-Hierarchical Terrorist Networks
		Nasrullah Memon, Software Intelligence Security Research Center, Aalborg University Esbjerg, Denmark 

3:35pm-3:45pm	Break

3:45pm-4:15pm 	Cascading Dynamics in Networks with Community Structure
		Aram Galstyan and Paul R. Cohen, University of Southern California 

4:15pm-4:35pm 	Snack Break

4:35pm-5:05pm 	Collapse of States and Sub-state Societies
  		William Basener, Rochester Institute of Technology 

5:05pm-5:15pm 	Break

5:15pm-5:30pm 	Models of Rumor Transmission over Random and Small World Networks
		Deana B. Olles, Rochester Institute of Technology 

5:30pm-5:35pm 	Break

5:35pm-5:50pm 	Modeling the Flow of Traffic to Relief Stations after a Terrorist Attack
		Matthew Heman, Rochester Institute of Technology 

Saturday, September 30

9:00am-9:15am	Reception and Welcoming Remarks

9:15am-9:40am 	Using Simulation and Interactive Software to Introduce Schoolchildren to the Mathematical Modeling of Bioterror Attacks
		James M. Rubillo, Executive Director, National Council of Teachers of Mathematics 

9:40am-9:50am 	Break

9:50am-10:25am 	Discovery and Diffusion of Knowledge in an Endogenous Social Network
 		Myong-Hun Chang, Cleveland State University 

10:25am-10:35am Break

10:35am-11:20am Allocating Resources to Defend against Terrorist Attacks with Private Information about Vulnerability
		Robert Powell, University of California, Berkeley 

11:20am-11:30am	Break

11:30am-12:05pm Organizational Warfare: Analyzing and Preventing Asymmetric Threats
		Katya Drozdova, New York University & Hoover Institution, Stanford University 

12:05pm-2:00pm 	Go out to Lunch + Networking

2:00pm-2:35pm 	A Hybrid KR&R/ Information Theoretic Model for Relationship Simplification
		Jafar Adibi, University of Southern California 

2:35pm-2:45pm	Break

2:45pm-3:10pm 	Building the Perfect Terrorist Cell
		Jonathan David Farley, Stanford University 

3:10pm-3:20pm	Snack Break

3:20pm-3:55pm 	Detection of Threat Activity across Domains 
		James Ferry, Metron, Inc. 

3:55pm-4:05pm 	Break

4:05pm-4:40pm 	Connecting Dots to Locate and Intercept Terrorist Operations and Operatives
		Martin J. Dudziak, TETRAD Technologies Group, Inc. 

4:40pm-4:50pm 	Break

4:50pm-5:05pm 	The Cost and Impact of International Terrorism on the Economies of the United States and the European Union: 2001-2004
		Inga Grote, Rochester Institute of Technology 

5:05pm-5:15pm 	Break

5:15pm-5:50pm 	Gangs, Graphs, and Polynomials
		Vladimir Lefebvre, School of Social Sciences, University of California at Irvine