Thursday, September 20 (SAU, Clark A)

9:00am-9:30am	Reception

9:30am-9:40am	Welcoming Remarks
                Don Boyd, Vice President for Research, RIT

9:40am-10:15am  The Enemy of my Enemy is my Friend: The Dynamics of Friendship and Hatred
                Tibor Antal, Harvard University

10:15am-10:30am Break

10:30am-11:05am	Modeling Strategic Interactions in Counterterrorist Operations
		Jonathan Caulkins, Carnegie Mellon University

11:05am-11:20am Break

11:20am-11:55am	How to Organize Crime
		Mariagiovanna Baccara, New York University

12:00pm-1:00pm  Lunch

1:00pm-1:35pm 	Counter-Terrorism Reasoning About Rare Events
		Tod Levitt, Information Extraction & Transport, Inc. 

1:35pm-1:50pm 	Break

1:50pm-2:25pm 	Predictability of Extreme Events with Applications to Surges of 
                Mass Violence and Terrorism
		Vladimir Keilis-Borok, University of California, Los Angeles

2:25pm-2:40pm 	Break

2:40pm-3:15pm 	Terror Networks & Business Networks
                Valdis Krebs,

3:15pm-3:30pm	Break

3:30pm-4:30pm 	Keynote Talk in Fireside Lounge
		Intelligence Constraints on Terrorist Conspiracies
		Gordon Woo, Risk Management Solutions, London        

4:30pm-5:30pm 	Reception in Fireside Lounge

Friday, September 21 (SAU, Clark A)

8:30am-9:00am   Reception and Welcoming Remarks

9:00am-9:35am	Introduction to the NIAID Centers for Radiation Bioterror and Their Ongoing Research
                Paul Okunieff, University of Rochester

9:35am-9:45am   Break

9:45am-10:20am	The Influence of Secrecy and Coordination & Control on the Structure 
                of Covert Networks
		Roy Lindelauf, Royal Dutch Defense Academy			

10:20am-10:30am Break

10:30am-11:05am Optimal Placement of Suicide Bomber Detectors
                Rajan Batta, SUNY Buffalo

11:05am-11:15am Break

11:15am-11:50am Analysis of Electric Scalp Potential and Functional Magnetic Resonance Imaging
                Data Relevant to the Detection of Deception
                Michael Schillaci, University of South Carolina

11:50am-1:00pm  Lunch

1:00pm-1:35pm 	The CARA Cultural Reasoning Architecture
                V.S. Subrahmanian, University of Maryland, College Park

1:35pm-1:45pm 	Break

1:45pm-2:20pm 	Characterization of Cyber Attacks through Variable Length Markov Models
                Shanchieh Yang, Rochester Institute of Technology

2:20pm-2:30pm 	Break

2:30pm-3:05pm 	Toward Impact Assessment Automation for Multi-Stage Cyber Attacks
                Moises Sudit, State University of New York at Buffalo

3:05pm-3:40pm	Snack Break

3:40pm-4:15pm 	Eating the Elephant! Critical Infrastructure Protection: Context & Process
		Colonel Bruce Beebe, University of Washington

4:15pm-4:25pm 	Break

4:25pm-5:00pm 	Unintentional Introductions of Alien Species and their Impacts on 
                Homeland Security: A Trade-Theoretic Analysis
		Amitrajeet Batabyal, Rochester Institute of Technology

Saturday, September 22 (SAU, Clark A)

9:00am-9:30am	Reception and Welcoming Remarks

9:30am-10:05am 	(Hyper)Spectral Remote Sensing for Detection of Point Targets and Man-Made
                Activity in Large Area Search Applications
                David Messinger, Rochester Institute of Technology

10:05am-10:20am Break

10:20am-10:55am Topological Anomaly Detection in Large Data Sets
                William Basener, Rochester Institute of Technology

10:55am-11:10am Break

11:10am-11:45am Towards a Detection Theory for Intelligence Applications
                Aaron Phillips, Metron, Inc.

11:45am-1:00pm  Lunch 	

1:00pm-1:35pm 	Finding Terrorist Cells in Large Social Networks
                David Longo, Rochester Institute of Technology

1:35pm-1:45pm 	Break

1:45pm-2:20pm 	The Structure and Application of Generalized Social Networks:
                Rings, Ribbons, and Families
                Deana Olles, Rochester Institute of Technology

2:20pm-2:30pm 	Break

2:30pm-3:05pm 	Network Theory and Ordered Set Theory Used for Addressing Crime in Jamaica and Haiti
                Kevin Blake, Ministry of National Security, Jamaica

3:05pm-3:20pm 	Snack Break

3:20pm-3:55pm 	Optimal Discovery of Factors in Relational Data via a Novel Method
                for Matrix Decomposition
                Radim Belohlavek and Vilem Vychodil, SUNY Binghamton

3:55pm-4:05pm 	Break

4:05pm-4:40pm 	Combinatorial Analysis of Binary Relations, Posets and Lattices
                George Markowsky, University of Maine