Results 1 - 10
of
312
Sensor networks: Evolution, opportunities, and challenges
- PROCEEDINGS OF THE IEEE
, 2003
"... Wireless microsensor networks have been identified as one of the most important technologies for the 21st century. This paper traces the history of research in sensor networks over the past three decades, including two important programs of the Defense Advanced Research Projects Agency (DARPA) spann ..."
Abstract
-
Cited by 655 (1 self)
- Add to MetaCart
Wireless microsensor networks have been identified as one of the most important technologies for the 21st century. This paper traces the history of research in sensor networks over the past three decades, including two important programs of the Defense Advanced Research Projects Agency (DARPA) spanning this period: the Distributed Sensor Networks (DSN) and the Sensor
Strategy and War: The Strategic Theory of John Boyd. Strategy and History Series
, 2007
"... The cover illustration depicts the comprehensive rendering of the OODA loop which ..."
Abstract
-
Cited by 51 (0 self)
- Add to MetaCart
The cover illustration depicts the comprehensive rendering of the OODA loop which
Network Robustness and Graph Topology
, 2004
"... Two important recent trends in military and civilian communications have been the increasing tendency to base operations around an internal network, and the increasing threats to communications infrastructure. This combination of factors makes it important to study the robustness of network topologi ..."
Abstract
-
Cited by 38 (5 self)
- Add to MetaCart
Two important recent trends in military and civilian communications have been the increasing tendency to base operations around an internal network, and the increasing threats to communications infrastructure. This combination of factors makes it important to study the robustness of network topologies. We use graph-theoretic concepts of connectivity to do this, and argue that node connectivity is the most useful such measure. We examine the relationship between node connectivity and network symmetry, and describe two conditions which robust networks should satisfy. To assist with the process of designing robust networks, we have developed a powerful network design and analysis tool called CAVALIER, which we briefly describe.
Massive Multiplayer Online Gaming: A Research Framework for Military Education and Training
, 2005
"... ..."
Effects-Based Operations: A Grand Challenge for the Analytical
- Community,” RAND, 1200 South Hayes
, 2001
"... Institute, a federally funded research and development center supported by the OSD, the Joint Staff, the unified commands, and the defense agencies under contract DASW01-95-C-0059, and in Project AIR FORCE, a federally funded research and development center sponsored by the United States Air Force u ..."
Abstract
-
Cited by 26 (4 self)
- Add to MetaCart
(Show Context)
Institute, a federally funded research and development center supported by the OSD, the Joint Staff, the unified commands, and the defense agencies under contract DASW01-95-C-0059, and in Project AIR FORCE, a federally funded research and development center sponsored by the United States Air Force under Contract F49642-01-C-0003. ISBN: 0-8330-3108-2 RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND ® is a registered trademark. RAND’s publications do not necessarily reflect the opinions or policies of its research sponsors.
Beyond Technical Interoperability – Introducing a Reference Model for Measures of Merit for Coalition Interoperability
- INTERNATIONAL COMMAND AND CONTROL RESEARCH AND TECHNOLOGY SYMPOSIUM
, 2003
"... Interoperability on the technical level is a hot topic since several decades. Despite the fact that several technical reference models to increase interoperability have been introduced, we are still waiting for working solutions. The reason may be, that interoperability is definitely not limited to ..."
Abstract
-
Cited by 25 (3 self)
- Add to MetaCart
Interoperability on the technical level is a hot topic since several decades. Despite the fact that several technical reference models to increase interoperability have been introduced, we are still waiting for working solutions. The reason may be, that interoperability is definitely not limited to the technical domain but is dependent on organizational aspects as well. To deal with these issues, they have to be perceived first. The recent CCRTS contributed to this very well. To overcome resulting questions, however, the influence must be captured in a reproducible way in form of measures of merit. Based on the experience in several international projects, the author developed a framework to deal with possible measures of merits to be used to deal with the various layers of semantic interoperability in coalition operations. The paper introduces this reference model, connects it to the recent discussions of measures of merits for C2 Assessment, and introduces some contributions to the discussions of measure for interoperability on various levels. Furthermore, some technical reference models will be mapped to this reference model to show that actual used legacy model results can be migrated, hence reused in this broader context.
Model-based Communication Networks and VIRT: Filtering Information by Value to Improve Collaborative Decision-Making 1
, 2005
"... Command-control and other distributed, collaborative systems should achieve the best possible results with resources available. We should measure these systems in terms of the quality of decisions made. Better decisions lead to better outcomes, because superior choices are made about what to do, wit ..."
Abstract
-
Cited by 22 (1 self)
- Add to MetaCart
(Show Context)
Command-control and other distributed, collaborative systems should achieve the best possible results with resources available. We should measure these systems in terms of the quality of decisions made. Better decisions lead to better outcomes, because superior choices are made about what to do, with what assets, where and when. Just as we measure manufacturing processes in terms of value added at each stage, we want each processing step in distributed collaborative operations to maximize the ratio of added value to cost. Both computerized agents and human personnel receive information from others, process it, and then produce additional information for others downstream in the operational processes. This paper shows that current architectures do not promote high productivity. Specifically, most current approaches encourage an increase in information supply and exchange per se, producing glut rather than value. This paper explains how we can significantly increase the productivity of each operator and the success of overall missions. The approach, called VIRT, treats collaborators as participants with shared models. These models determine which information is high value and for whom. The architecture gives priority to conveying high value information. Similarly, low value bits are filtered out, saving resources and optimizing value attained.
Applying Social Network Analysis Concepts to Military C4ISR Architectures
, 2002
"... We discuss the application of Social Network Analysis concepts to military C4ISR ..."
Abstract
-
Cited by 21 (1 self)
- Add to MetaCart
We discuss the application of Social Network Analysis concepts to military C4ISR
Remote Leadership
"... Technology has permeated the operations and structure of almost every organization in the world and has transformed the way we work in organizations. In this paper we review the impact of technological change in leadership and, more specifically, leadership in the CF. Our review proceeds in three ma ..."
Abstract
-
Cited by 19 (2 self)
- Add to MetaCart
(Show Context)
Technology has permeated the operations and structure of almost every organization in the world and has transformed the way we work in organizations. In this paper we review the impact of technological change in leadership and, more specifically, leadership in the CF. Our review proceeds in three major sections. First, we review the strategic environment with specific reference to the implications of emergent technology for forces operating in this environment. Second, we review the behavioral science literature focusing on the implications of technology for organizational behavior and, more specifically, organizational leadership. Finally, we integrate both reviews by making a series of recommendations for consideration by the CF as to how to deal with issues of remote leadership. The Strategic Environment The future security environment will be significantly more complex, fluid and dynamic than previously expected. It will consist of potential and emergent threats from both state and non-state belligerent groups. These groups will have access to similar types of communication and computing technologies that modern western militaries do,
Toward an Interoperable Dynamic Network Analysis Toolkit. Decision Support Systems.
, 2007
"... Abstract To facilitate the analysis of real and simulated data on groups, organizations and societies, tools and measures are needed that can handle relational or network data that is multi-mode, multi-link and multi-time period in which nodes and edges have attributes with possible data errors and ..."
Abstract
-
Cited by 16 (4 self)
- Add to MetaCart
(Show Context)
Abstract To facilitate the analysis of real and simulated data on groups, organizations and societies, tools and measures are needed that can handle relational or network data that is multi-mode, multi-link and multi-time period in which nodes and edges have attributes with possible data errors and missing data. The integrated CASOS dynamic network analysis toolkit described in this paper is an interoperable set of scalable software tools. These tools form a toolchain that facilitate the dynamic extraction, analysis, visualization and reasoning about key actors, hidden groups, vulnerabilities and changes in such data at varying levels of fidelity. We present these tools and illustrate their capabilities using data collected from a series of 368 texts on an organizational system interfaced with covert networks in the Middle East.