I work in the
School of Computing
I am also an Adjunct Professor in the Mathematics and Computer Science Department of the Royal Military College.
My blog on adversarial knowledge discovery.
RIP Ralph Stanton, 1923-2010, my Ph.D. supervisor, details here.
What I'm working on ... and as a word cloud:
"Next year the number of [US] federally mandated categories of illness and injury for which hospitals may claim reimbursement will rise from 18,000 to 140,000. There are nine codes relating to injuries caused by parrots, and three relating to burns from flaming water-skis" Economist, Feb 18th 2012.
We haven't the money, so we've got to think -- Ernest Rutherford.
Latent structure is master of visible structure -- Heraclitus c500 B.C, evidently the father of data mining.
The Feynman Problem Solving Algorithm:
1) Write down the problem.
2) Think very hard.
3) Write down the solution.
(In my experience, in North America Step 2 tends to be skipped. In Australia, curiously, it's often Step 3.)
My recent book, Understanding High-Dimensional Spaces has been published by Springer. (Print, Online)
I was awarded the 2009 IEEE Intelligent Transportation Systems Society and IEEE Systems, Man and Cybernetics Society Technical Committee on Homeland Security Technical Achievement Award for outstanding and sustained technical contributions to the field of Intelligence and Security Informatics.
My recent book: Knowledge Discovery for Counterterrorism and Law Enforcement is available from Taylor and Francis and Amazon
My research is focused on adversarial knowledge discovery, building inductive models from data in settings where the interests of modellers and those being modelled are not aligned. This includes counterterrorism, law enforcement,and fraud; but also increasingly areas such as customer relationship modelling. I work with some TLAs and even some FLAs.
Although the datasets I work with tend to be intricate rather than large, some of what I do could be called "Big Data analytics".
I am on the Steering Committee of the IEEE International Conference on Intelligence and Security Informatics, 2007-- .
I am on the Steering Committee of the SIAM International Conference on Data Mining, 2007-- .
I am on the Program Committees of all of the usual data mining conferences and workshops, and also those related to security informatics.
I am an Associate Editor or on the Editorial Board of IEEE Intelligent Systems, Computational Intelligence, Journal of Universal Computer Science, Computational and Mathematical Organizational Theory, Springer Security Informatics, and Statistical Analysis and Data Mining.
I supervise theses in topics in adversarial knowledge discovery, focusing on textual data and graph/relational data. I work with colleagues in Politics (radicalization, borders, political speech), Business (financial fraud), and Psychology (deception) so there are possibilities in interdisciplinary research in these directions as well.
My funding levels do not allow me to supervise international students unless they have funding from their own countries; this applies to summer students, graduate students, and postdocs. I am happy to consider students applying via CALDO or the Saudi Bureau.
My current graduate students:
Some of my recent graduate students:
Mind mapping, a nice way to organise material when you don't already know how it fits together. It's useful for preparing drafts of theses and papers.
Talking about your research.
Teaching and Learning
In the 2015-2016 academic year I am teaching:
It is unlikely that CISC333 will be offered in 2016-2017, so I am willing to admit second-year students who have a B+ average, who have taken CISC102 (instead of CISC203), who are taking CISC203 concurrently, and who may not yet have taken a stats course, AT YOUR OWN RISK.
If you meet these rules, please send a request and an unofficial transcript directly to David Lamb (dalamb@cs).
If you want to take the course as CMPE333 and you meet the same conditions (appropriately mapped to FEAS) then you need a prerequisite waiver. Again please send a request and unofficial transcript to David Lamb.
If you have a course conflict, I will not routinely admit you to the course. If you want to make a special case, you can try but I will also need to see an unofficial transcript.
If you would like to take the course and you almost meet these conditions, discuss it with me but the answer is almost certainly no.
I also supervise students in CISC499 -- topics for 2014-2015 are here (stay tuned for updates for 2015).
Here is some material on effective learning:
I am interested in hypermedia-based education.
Here are some of the interesting pathways via doctoral supervisors (there's more than one because some people had two supervisors; for example, Brauer was supervised by both Schur and Schmidt, and Dirichlet was supervised jointly by Poisson and Fourier, who were both students of Lagrange):
Skillicorn - Stanton - Brauer - Schur - Frobenius - Weierstrass - Guderman - Gauss
Skillicorn - Stanton - Brauer - Schmidt - Hilbert - Lindemann - Klein - Lipschitz - Dirichlet - Poisson/Fourier - Lagrange - Euler - Bernoulli
Up to School of Computing
Up to Queen's University