The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Tactical networking environments demand reliable, robust, and efficient approaches to disseminating information that are tolerant to unreliable and bandwidth-constrained networks. This paper describes DisService, an Agile Computing approach to information dissemination that opportunistically discovers and exploits excess communications, storage, and processing capacity in a distributed network to...
Recent operations in Iraq and Afghanistan have confirmed that in order to achieve effective Network-Centric Operations (NCO), innovative enhancement to military decision-making is desired. Required are processes and computational models that support the decision-makers' experience while promoting high levels of shared situation awareness (SA)-not only in the context of the external operating environment,...
This research advances Cyber Situation Management by proposing methods for automated mapping of Cyber Assets to Missions and Users (Camus). To enable accurate and efficient cyber incident mission impact assessment, a Camus ontology that defines entities, relationships and attributes (ERAs) associated with them has been drafted. Methods for fusing data from multiple data sources have been developed...
In this paper we propose a novel medium access control (MAC) protocol that provides spectrum agile bandwidth allocation for cognitive radios. Our MAC protocol, called spectrum agile multiple access or simply SAMA, harnesses the frequency agility of cognitive radios in allocating fair and contention free bandwidth under a heterogeneous spectrum environment. SAMA accomplishes its bandwidth allocation...
A proper situation management system is one of the keys to success on the battlefield. It strongly relies on data collection, fusion and interpretation. Unmanned Aerial Vehicles (UAVs) are becoming a major collection platform, but there is almost no collaborative intelligence in these systems. We claim that a swarm of small UAVs connected together that could make cooperative decisions in an autonomous...
Warfighters in today's asymmetric engagements need access to mission-critical information no matter when and where it becomes available. Information Management Services (IMSs) based on publish-subscribe-query services have emerged as an important enabler of tactical information dominance in combined tactical and enterprise military situations. IMSs support information brokering and dissemination between...
Successful management of critical situations created by major natural and man-made activities requires monitoring, recognizing, and making sense of these activities in order to support decision makers in either preventing a crisis or acting effectively to mitigate its adverse impact. Context plays an important role in crisis management since it provides decision makers with important information about...
Potential solution to some problems related to forming, updating, and personalized distribution of company's level local operational picture (LOP) is suggested. Sensor networks, information collected by UAV-s and UGV-s, observations from reconnaissance parties, larger scale COP that sporadically become available are considered as sources of information. At the company's level LOP has to be made available...
Network centric warfare relies on the timely and reliable delivery of data to disparate cooperating nodes in tactical networking environments. Given the limited bandwidth available and the unreliability of network links, data often accumulates in application and/or network queues, resulting in increased latency in the delivery of the data. The Mockets communications library addresses this problem...
A common technique for improving throughput in low bandwidth networks is the use of header compression. While removing static protocol entries and synchronizing state information between a sender and receiver can reduce per-packet overhead, this is defeated by fixed sized TDMA MAC frames. Another optimisation technique is the use of packet aggregation, where multiple data packets are concatenated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.