• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Network Centric Warfare: Developing and Leveraging Information Superiority, CCRP publication series, (2000)

by David Alberts
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 312
Next 10 →

Sensor networks: Evolution, opportunities, and challenges

by Chee-yee Chong, Srikanta P. Kumar - PROCEEDINGS OF THE IEEE , 2003
"... Wireless microsensor networks have been identified as one of the most important technologies for the 21st century. This paper traces the history of research in sensor networks over the past three decades, including two important programs of the Defense Advanced Research Projects Agency (DARPA) spann ..."
Abstract - Cited by 655 (1 self) - Add to MetaCart
Wireless microsensor networks have been identified as one of the most important technologies for the 21st century. This paper traces the history of research in sensor networks over the past three decades, including two important programs of the Defense Advanced Research Projects Agency (DARPA) spanning this period: the Distributed Sensor Networks (DSN) and the Sensor

Strategy and War: The Strategic Theory of John Boyd. Strategy and History Series

by Frans Osinga, Frans Osinga, Richard Dawkins, Henry Kissinger , 2007
"... The cover illustration depicts the comprehensive rendering of the OODA loop which ..."
Abstract - Cited by 51 (0 self) - Add to MetaCart
The cover illustration depicts the comprehensive rendering of the OODA loop which

Network Robustness and Graph Topology

by Anthony Dekker , Bernard Colbert , 2004
"... Two important recent trends in military and civilian communications have been the increasing tendency to base operations around an internal network, and the increasing threats to communications infrastructure. This combination of factors makes it important to study the robustness of network topologi ..."
Abstract - Cited by 38 (5 self) - Add to MetaCart
Two important recent trends in military and civilian communications have been the increasing tendency to base operations around an internal network, and the increasing threats to communications infrastructure. This combination of factors makes it important to study the robustness of network topologies. We use graph-theoretic concepts of connectivity to do this, and argue that node connectivity is the most useful such measure. We examine the relationship between node connectivity and network symmetry, and describe two conditions which robust networks should satisfy. To assist with the process of designing robust networks, we have developed a powerful network design and analysis tool called CAVALIER, which we briefly describe.

Massive Multiplayer Online Gaming: A Research Framework for Military Education and Training

by Curtis J. Bonk, Vanessa P. Dennen , 2005
"... ..."
Abstract - Cited by 29 (0 self) - Add to MetaCart
Abstract not found

Effects-Based Operations: A Grand Challenge for the Analytical

by Paul K. Davis, Cover Barbara, Angell Caslon - Community,” RAND, 1200 South Hayes , 2001
"... Institute, a federally funded research and development center supported by the OSD, the Joint Staff, the unified commands, and the defense agencies under contract DASW01-95-C-0059, and in Project AIR FORCE, a federally funded research and development center sponsored by the United States Air Force u ..."
Abstract - Cited by 26 (4 self) - Add to MetaCart
Institute, a federally funded research and development center supported by the OSD, the Joint Staff, the unified commands, and the defense agencies under contract DASW01-95-C-0059, and in Project AIR FORCE, a federally funded research and development center sponsored by the United States Air Force under Contract F49642-01-C-0003. ISBN: 0-8330-3108-2 RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND ® is a registered trademark. RAND’s publications do not necessarily reflect the opinions or policies of its research sponsors.
(Show Context)

Citation Context

... and action (OODA). 10 Example: Explicitly distinguish between the delay times assumed for traditional multilayered command-and-control systems and systems designed around network-centric principles (=-=Alberts, Garstka, and Stein, 1999-=-; National Research Council, 2000). Spinup Factors. Spinup factors can be used to adjust for the fact that people and units are often much less capable at the beginning of battle than they are after s...

Beyond Technical Interoperability – Introducing a Reference Model for Measures of Merit for Coalition Interoperability

by Andreas Tolk - INTERNATIONAL COMMAND AND CONTROL RESEARCH AND TECHNOLOGY SYMPOSIUM , 2003
"... Interoperability on the technical level is a hot topic since several decades. Despite the fact that several technical reference models to increase interoperability have been introduced, we are still waiting for working solutions. The reason may be, that interoperability is definitely not limited to ..."
Abstract - Cited by 25 (3 self) - Add to MetaCart
Interoperability on the technical level is a hot topic since several decades. Despite the fact that several technical reference models to increase interoperability have been introduced, we are still waiting for working solutions. The reason may be, that interoperability is definitely not limited to the technical domain but is dependent on organizational aspects as well. To deal with these issues, they have to be perceived first. The recent CCRTS contributed to this very well. To overcome resulting questions, however, the influence must be captured in a reproducible way in form of measures of merit. Based on the experience in several international projects, the author developed a framework to deal with possible measures of merits to be used to deal with the various layers of semantic interoperability in coalition operations. The paper introduces this reference model, connects it to the recent discussions of measures of merits for C2 Assessment, and introduces some contributions to the discussions of measure for interoperability on various levels. Furthermore, some technical reference models will be mapped to this reference model to show that actual used legacy model results can be migrated, hence reused in this broader context.

Model-based Communication Networks and VIRT: Filtering Information by Value to Improve Collaborative Decision-Making 1

by Rick Hayes-roth , 2005
"... Command-control and other distributed, collaborative systems should achieve the best possible results with resources available. We should measure these systems in terms of the quality of decisions made. Better decisions lead to better outcomes, because superior choices are made about what to do, wit ..."
Abstract - Cited by 22 (1 self) - Add to MetaCart
Command-control and other distributed, collaborative systems should achieve the best possible results with resources available. We should measure these systems in terms of the quality of decisions made. Better decisions lead to better outcomes, because superior choices are made about what to do, with what assets, where and when. Just as we measure manufacturing processes in terms of value added at each stage, we want each processing step in distributed collaborative operations to maximize the ratio of added value to cost. Both computerized agents and human personnel receive information from others, process it, and then produce additional information for others downstream in the operational processes. This paper shows that current architectures do not promote high productivity. Specifically, most current approaches encourage an increase in information supply and exchange per se, producing glut rather than value. This paper explains how we can significantly increase the productivity of each operator and the success of overall missions. The approach, called VIRT, treats collaborators as participants with shared models. These models determine which information is high value and for whom. The architecture gives priority to conveying high value information. Similarly, low value bits are filtered out, saving resources and optimizing value attained.
(Show Context)

Citation Context

...ers promptly. VIRT Improves Time-stressed Collaborative Decision-making DoD has committed to transform around concepts of Information Superiority (IS) and Network Centric Operations and Warfare (NCOW)=-=[6]-=-. FORCEnet, as an example, aims to provide the Navy the capabilities required to support agile, rapid, precise, effective and efficient planning and operations. In these new concepts, warfighters can ...

Applying Social Network Analysis Concepts to Military C4ISR Architectures

by Anthony Dekker , 2002
"... We discuss the application of Social Network Analysis concepts to military C4ISR ..."
Abstract - Cited by 21 (1 self) - Add to MetaCart
We discuss the application of Social Network Analysis concepts to military C4ISR

Remote Leadership

by E. Kevin Kelloway, Ph. D, Lcol Terrance Weatherbee
"... Technology has permeated the operations and structure of almost every organization in the world and has transformed the way we work in organizations. In this paper we review the impact of technological change in leadership and, more specifically, leadership in the CF. Our review proceeds in three ma ..."
Abstract - Cited by 19 (2 self) - Add to MetaCart
Technology has permeated the operations and structure of almost every organization in the world and has transformed the way we work in organizations. In this paper we review the impact of technological change in leadership and, more specifically, leadership in the CF. Our review proceeds in three major sections. First, we review the strategic environment with specific reference to the implications of emergent technology for forces operating in this environment. Second, we review the behavioral science literature focusing on the implications of technology for organizational behavior and, more specifically, organizational leadership. Finally, we integrate both reviews by making a series of recommendations for consideration by the CF as to how to deal with issues of remote leadership. The Strategic Environment The future security environment will be significantly more complex, fluid and dynamic than previously expected. It will consist of potential and emergent threats from both state and non-state belligerent groups. These groups will have access to similar types of communication and computing technologies that modern western militaries do,
(Show Context)

Citation Context

...9) where the actions of an individual at the tactical level can have strategic influence because of the capability of the strategic and operational decision makers observing the actions in real time (=-=Alberts et al, 2000-=-). 10sWithin the network-centric battlespace the obverse is also true and individuals at the strategic or operational levels have the potential capability to influence or control tactical elements. Wh...

Toward an Interoperable Dynamic Network Analysis Toolkit. Decision Support Systems.

by Kathleen M Carley , Jana Diesner , Jeffrey Reminga , Maksim Tsvetovat , 2007
"... Abstract To facilitate the analysis of real and simulated data on groups, organizations and societies, tools and measures are needed that can handle relational or network data that is multi-mode, multi-link and multi-time period in which nodes and edges have attributes with possible data errors and ..."
Abstract - Cited by 16 (4 self) - Add to MetaCart
Abstract To facilitate the analysis of real and simulated data on groups, organizations and societies, tools and measures are needed that can handle relational or network data that is multi-mode, multi-link and multi-time period in which nodes and edges have attributes with possible data errors and missing data. The integrated CASOS dynamic network analysis toolkit described in this paper is an interoperable set of scalable software tools. These tools form a toolchain that facilitate the dynamic extraction, analysis, visualization and reasoning about key actors, hidden groups, vulnerabilities and changes in such data at varying levels of fidelity. We present these tools and illustrate their capabilities using data collected from a series of 368 texts on an organizational system interfaced with covert networks in the Middle East.
(Show Context)

Citation Context

...more effective than the first one. In this paper, to illustrate the value of MADN simulations, we will use the DyNet model. DyNet is a complex system simulation model in which the social and knowledge networks co-evolve as agents interact, communicate, and engage in tasks. The respective tool captures the variability in human and organizational factors of groups under diverse socio-technical and cultural conditions. DyNet places the constructural model [8,6,31] in an information awareness context and enables analysts to explore alternative destabilization strategies and information operations [1] under varying levels of information availability. From an interoperability angle, the workflow between ORA and DyNet proceeds as follows: The analyst assesses the network and identifies alternative intervention strategies. In general, such interventions might be targeted misinformation, resource isolation or structure alteration. Then the same DyNetML file that was used as input for ORA is loaded into DyNet to initialize the system and the alternative intervention strategies. Next, a virtual experiment is run; the resultant evolved networks are stored in DyNetML and can then be read into ORA ...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University