Abstract:A wealth of sensor data is available to address the information needs of tactical Warfighters. However, this data resides in diverse, large, remote data stores. Delivering actionable information to the Warfighter requires discovering the relevant sources, retrieving relevant information, integrating… more
Abstract:As cyber attacks become increasingly and more effectively targeted, so must our cyber defenses become less"one size fits all."We need to develop active defenses that can adapt themselves to an attack in progress. This development will require not only improvements in our detection… more
Abstract:Cyber defenders must interact with a variety of diverse feeds and explore network information in many abstract contexts. Unfortunately, existing digital tools provide poor affordances for the perception and manipulation of critical metrics of network trustworthiness, unnecessarily complicating the… more
Abstract:ABSTRACT: Assured Cloud Computing is needed by US Cyber Command to implement the USAF vision of global vigilance, global reach, and global power. When an Air Force application runs in a third-party"gray"cloud, the trustworthiness of the application is of special concern because there is… more
Abstract:ABSTRACT: Although Partial Task Trainers PTTs have been shown to have a cost savings of 60 percent over training on actual systems, they routinely cost the government in manpower, maintenance, and upgrades. Furthermore, PTTs are often designed for general use, failing to address the individual… more
Abstract:ABSTRACT: In a growing number of current and near-future Air Force mission contexts, Head and Helmet Mounted Displays (HMDs) are providing critical information for pilots and warfighters. The recent availability of stereoscopic HMD technology provides an additional visual dimension to reduce… more
Abstract:ABSTRACT: Intelligence analysts across the Department of Defense identify and act on threats to national security. Their analyses must encompass both individuals and groups of potential interest, which analysts can identify by examining discourse in communications made by individuals through blogs,… more
Abstract:ABSTRACT: Real world uncertainties all but guarantee that execution will deviate from even carefully considered plans, and therefore any effective military command will assume that resources must be reallocated to achieve desired outcomes. Unfortunately, reallocation is typically a manual, reactive… more
Abstract:Effective detection, classification, and localization of submarine-launched torpedoes are critical to protect US naval forces operating in harm"s way. US Navy efforts to develop effective torpedo countermeasures have yielded mixed results, but improvements are on the horizon. However, the… more
Abstract:In the last decade, Marines have been challenged by an unconventional warfare environment where they are hunted by snipers and terrorists. To improve combat effectiveness, the USMC has implemented the Combat Hunter Program, focused on teaching Marines perceptual skills needed to become the hunter,… more
Abstract:Current countermeasure anti-torpedo (CAT) systems use explicit logic to direct intercepts resulting in an inability to adapt to the complexities of the stochastic marine environment. The CAT Learning Algorithm Workbench (CLAW) is an analytical research testbed capable of comparing the effectiveness… more
Abstract:Today"s Navy airborne mission platforms use computing systems that are stand-alone collections of hardware and software tied to specific programs and vendors. These stovepiped systems lack common data formats and cannot communicate with one another without substantial ad hoc interface… more
Abstract:Small unmanned aircraft systems (UAS) have become a critical part of Intelligence, Surveillance and Reconnaissance (ISR) missions, supplying valuable aerial imagery to ground forces. Unfortunately, operational ISR is compromised by the stringent size, weight, and power constraints of small UASs,… more
Abstract:The proliferation of computer-mediated communication (CMC) has changed the information landscape for international crisis and disaster response. Given the amount of crisis data generated, however, it is difficult for responders to identify mission-relevant, reliable information. Existing approaches… more
Abstract:Command and Control (C2) operators at Maritime Headquarters with Maritime Operations Centers (MHQ/MOC) working at the Operational Level of War need to maintain active lines of operations (LOOs), execute branch plans, and plan follow-on sequels. To support these activities, we propose to design and… more
Abstract:Although the adoption of Enterprise Resource Planning (ERP) systems has modernized and standardized business operations throughout the Navy, the resulting increase in operational data has created an enormously complex and cognitively challenging environment for decision-makers. To perform their jobs… more
Abstract:US military forces have encountered increasingly complex electromagnetic (EM) environments over the last two decades. This escalation complicates the task of rapidly and properly classifying emitters, which is critical to the safe, effective operation of combat platforms. Many large military… more
Abstract:The Navy is procuring small unmanned underwater vehicles (UUVs) to augment battlespace awareness in complex littoral environments, but these platforms require the development of navigation solutions that provide accurate localization at low size, weight, power, and cost (SWAP-C). To enable… more
Abstract:Small Unmanned Aerial Vehicles (UAVs) have become a critical part of Intelligence, Surveillance, and Reconnaissance (ISR) missions, but limitations in platform size, weight, and power (SWAP) and communication bandwidth prevent the potentially game-changing combination of high-resolution ISR and… more
Abstract:Throughout their history, Marines have been targeted, or hunted, by snipers, terrorists, and other adversaries. The USMC has implemented the Combat Hunter Program to better counter these threats by teaching Marines to be the hunter, rather than the hunted. Combat Hunter skills include establishing… more
Abstract:Despite technical advances to intelligence, surveillance, and reconnaissance (ISR) capabilities, intelligence analysts in the theater cannot achieve true multi-INT exploitation and cross-cueing due to the stove-piped nature of fielded ISR systems which limits effective collaboration among analysts.… more
Abstract:Social media is an increasingly important way for people to communicate, but interpreting the large and complex social networks that emerge from social media is challenging. A promising approach is to build synthetic networks based on realistic behaviors that mimic the form and structure of real… more
Abstract:Army aviation remains critical to the success of military operations, but as technology advances and enemies adapt, its traditional operational concepts must evolve for continued success. Aviators possess a level of situational awareness and tactical insight that makes them good candidates to… more
Abstract:Despite advances in collection technologies, US forces still rely on dangerous, close-range Soldier reporting to help identify threats. Similarly, advances in fusion technologies have not supplanted the need for human analysis of data to formulate actionable intelligence. To address these issues, we… more
Abstract:Recently, CTS Inc achieved near state of the art performance of diamond detectors in both single crystal and polycrystalline forms. In this proposal, we develop microwave plasma CVD deposition methods targeting commercially viable diamond detectors by addressing both detector performance and… more
There are several categories such as “By Agency”, “By Year”, “By State” etc.
Select a checkbox within a category to refine your search results.
Each of your selections is listed in the “Narrow Search Filters” bar. You can uncheck these selections to remove them.
Search for Either Criteria
When you select multiple values within a category, the results will include values that match either of the selections.
For example, selecting “2005” and “2007” in the “By Year” category will display results that include either 2005 OR 2007 in the results.
Narrowing the Search Results
You can refine your search results across categories. To narrow down your results, select multiple values across different categories. The results will only include values that match the selections across the categories.
For example, selecting “2005” in the “By Year” category and “NASA” in the “By Agency” category will only display the results that contain both “2005” AND “NASA” in the results.