The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: decision support; learning; threat situation modeling; human situational behavior; human performance; and agent-based situation awareness.
On behalf of the IEEE Communications Society we are pleased to welcome you to the 1st IEEE Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA 2011) in beautiful Miami.
Moving target indicator (MTI) analysts in the field are responsible for processing the increasing amounts of live streaming data. Analysts manually access unique data sources through a set of tools, and perform analysis on the available data. Operationally, analysts can only concentrate on small areas of interest and are subject to attentional blindness. Abnormalities in the periphery are often not...
Humans naturally reuse recalled knowledge to solve problems and this includes understanding the context i.e. the information that identifies or characterizes these problems. For problems in complex and dynamic environments, providing effective solutions by operators requires their understanding of the situation of the environment together with the context. Context-aware case-based reasoning (CBR)...
We say that a computer program augments the analyst if it can infer facts that are implicit in existing information, but that may be relatively difficult for a human to infer. Among a multitude of reasons, the analyst's task is difficult because (1) reported information to be analyzed and reasoned about often cannot be completely trusted (requiring verification attempts via further collection of information,...
Situation management requires means for describing various things, both situation states and developments. For this reason we turn to algebraic systems. We define time as a system, as well as systems that are time-dependent. We consider the application of the DST dialogue system as one possible way to reliably represent descriptions in the form of formulas.
We present a cognitive modeling framework called Neural Modeling Fields (NMF) and its application to situation learning and categorization. We discuss how this framework is related to the perceptual symbol systems theory of cognition (PSS). Essentially, the mathematical apparatus of NMF is a way to learn the frames and simulators described qualitatively by PSS. For the purposes of this work, a situation...
Situation awareness is provided through a cognitive process. To make reasonable decisions a cognitive system, which could be a human or machine, should be aware of available resources and capacity, current configuration and even some information about previous states. The paper provides a study of situation awareness mechanisms in cognitive Mobile Ad Hoc Networks (MANET), and applies Kohonen network...
Cyber attacks committed against networks and software assets (operating systems, applications, and data repositories) have profound impact both on ongoing and future missions that use IT services offered by the networks. The attacks by exploiting the vulnerabilities of the software assets can push their impact through the cyber terrain - the cyber dependency network of structural, spatial, functional...
We propose a Deception Robust Control (DRC) for orchestrating the cyber sensors and cyber effectors present in typical enterprise information network systems operating in the ever changing situations that arise in servicing their missions. The theory and exemplar of deception control of focus here-though motivated by conventional warfare-applies to any partial information asymmetric stochastic game,...
Cyber attacks remain elusive and are increasingly effective. Information security professionals regularly monitor network resources and cyber security websites with an interest in understanding how such threats expose their enterprise's vulnerabilities and dependencies. However, information must be persistently and purposefully examined from a multitude of resources in order to establish context and...
This paper describes computational models of situated work in complex, heterogeneous dynamic systems that include humans, physical systems, computer agents and regulatory requirements, using aviation as the domain being examined but highlighting modeling principles generalizable to other domains. Work is defined formally here as purposeful activity acting on, and responding to, the environment as...
This paper describes a methodology for incorporating human observations into a hard+soft information fusion process for counterinsurgency intelligence analysis. The goal of incorporating human observations into the information fusion process is important as it extends the ability of the fusion algorithms to associate and merge disparate pieces of information by allowing for information collected from...
In a tactical battlefield, ground- and air- based robotic assets can be useful, but there is currently no one role to coordinate the use of multiple robots in the U.S. Army. The current work outlines and models the duties of a robotics operator manager (ROM), which could serve this role, using a theory of dynamic decision-making, instance-based learning (IBL). A model of the ROM is created that is...
In security, the most relevant criminal and terrorist activities are often of high complexity: they involve several entities interacting sequentially and simultaneously over an extended time interval. In this paper, we present a powerful approach for complex activity recognition and analysis using graph representation and matching. It is based on the representation of activities in terms of objects,...
Smart environment is defined here as a number of devices that can share information and services independently of their physical location. Smart environments based on ubiquitous computing open new possibilities to various aspects of human activities. The paper proposes an approach to emergency situation response that benefits of the ubiquitous computing. The approach is based on utilizing role profiles...
Accurate situational assessment is key to any decision making especially crucial in military command and control, air traffic control, and complex system decision making. Endsley describes three dependent levels of situational awareness, (1) perception, (2) understanding, and (3) projection. This research is focused on Endsley's second-level situational awareness (understanding) as it applies to service-oriented...
An essential part in the construction of a mental picture of a situation is our ability to represent, assess and judge on the skill and competency level of a player, an agent, or any entity that makes decisions. Augmented with a suitable reasoning framework, this ability would allow us to diagnose the competency level of a player through real-time monitoring of their actions. The first key question...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.