Addressing Limitations of Tactical Networks by Estimating and Exploiting Information Quality and Information Value
|
|
- Geraldine Conley
- 5 years ago
- Views:
Transcription
1 Addressing Limitations of Tactical Networks by Estimating and Exploiting Information Quality and Information Value Niranjan Suri Senior Research Scientist Florida Institute for Human & Machine Cognition (IHMC) Visiting Scientist US Army Research Laboratory
2 Motivation Old Adage Getting the Right Information to the Right People at the Right Time Or put another way Getting Actionable Information to Soldiers at the Right Time Objective has not changed What has changed? Increased deployment of sensors (with increasing resolution, coverage, persistence) Increased access to open-source and social media data What has (unfortunately) not changed? Tactical networking environments still limited in terms of bandwidth, latency, reliability, stability, and connectivity
3 New Measures and Metrics Need to move away from the (mostly) current paradigm: Gather everything we can Shove what we gather into the network Live with what we get out of the network Quality of Information (QoI) and Value of Information (VoI) promise to be new metrics that can help QoI and VoI can be used to filter and prioritize transmitted information For example Do not transmit low quality information (exceptions?) Do not transmit information with little or no value Another benefit: filtering unnecessary information can reduce the cognitive workload on the Soldier
4 Panel Objectives Attempt to define QoI and VoI as metrics Some disagreement among researchers (which is healthy!) Discuss approaches to determine QoI and VoI Consider different types of information video, pictures, audio, sensor reports, tracks, documents, maps, etc. Discuss applications of these concepts to the DoD missions Consider different perspectives Analyst, Commander, Operator, others? How would we experiment with these concepts and measure improvements? Are there other metrics / measures worth including? For example Quality of Experience (QoE)?
5 Panelists (1) Lance Kaplan is a Scientist in the Networked Sensing and Fusion Branch, Sensors and Electron Devices Directorate (SEDD), at the US Army Research Laboratory (ARL). At ARL, Dr. Kaplan is serving as the Government Technical Area Lead for the Information Network Academic Research Center, which is a multi-institutional basic research program aimed at advancing fundamental understanding of information networks in conjunction with their interactions with social/cognitive and communication networks. Dr. Kaplan has published over 180 technical articles. His current research interests include signal and image processing, information/data fusion, resource management, and network science.
6 Panelists (2) Michael Kolodny has over 50 years of R&D engineering and management experience at The Army Research Laboratory (ARL) / Harry Diamond Laboratories. He retired in May 2009 and is currently serving as a Senior Technology Consultant for ARL. He has been very proactive in autonomous networked sensors and unattended ground sensor (UGS) activities within DoD. He founded and chaired the RDECOM UGS IPT and has been working actively with DoD in defining technology programs to support the Army and other DoD organization s autonomous sensing needs in various programs. Mr. Kolodny s most recent efforts have been focused on new technology concepts including interoperability of ISR assets. He founded the initial UGS Standards Working Group that has now been chartered by USD(I) and is chaired by DIA. Mr. Kolodny established and chairs the Conference on Ground/Air Multi-sensor Interoperability, Integration & Networking for Persistent ISR which is part of the annual SPIE DSS Symposium.
7 Panelists (3) Mark Linderman is a Principal Researcher in Information Management Technologies in the Air Force Research Laboratory Information Directorate where he leads the Information Management technology area. From , Dr. Linderman was the Technical Lead of the AFRL Information Directorate Joint Battlespace Infosphere (JBI) Program. The JBI program addresses a broad spectrum of information management challenges from access control, the role of metadata, dissemination, persistence and destruction of information. Dr. Linderman joined AFRL in 1994 after completing his M.Eng. and Ph.D. in electrical engineering from Cornell University. He holds a BSEE degree from the University of Delaware.
8 Panelists (4) Derya Cansever is the Chief Engineer of the Communication Networks and Networking Division at US Army CERDEC, where he conducts research in Tactical, Mission Aware and Software Defined Networks. Prior to CERDEC, Dr. Cansever worked at Johns Hopkins University Applied Physics Laboratory, AT&T Bell Labs, and GTE Laboratory. He taught courses on Data Communications and Network Security at Boston University and University of Massachusetts. He has a Ph.D. in Electrical and Computer Engineering from the University of Illinois at Urbana Champaign.
9 Panelists (5) Sastry Kompella received the Ph.D. degree in electrical and computer engineering from the Virginia Tech, Blacksburg, VA, in Currently, he is the Head of the Wireless Networks Research Section under the Information Technology Division, U.S. Naval Research Laboratory, Washington, DC. His research interests include various aspects of wireless networks, from mobile ad hoc to underwater acoustic networks, with specific focus toward the development of cognitive, cooperative network optimization techniques for efficient spectrum and other wireless resource allocations.
10 Panel Format Begin with each panelist presenting opening remarks (10-15 minutes) Open the floor for discussion Audience please make note of questions to ask the panel! Otherwise, I have to resort to my canned questions Potential Next Step (after Panel) Edited Book Provided there is sufficient interest! Combination of invited and peer-reviewed chapters If you are interested, please get in touch with me
11 Shameless Plug Paper on VoI in October IEEE Communications Magazine
12 Let s Get Started! Lance Kaplan Panel Members US Army Research Laboratory Michael Kolodny US Army Research Laboratory Mark Linderman US Air Force Research Laboratory Derya Cansever US Army CERDEC Sastry Kompella US Naval Research Laboratory Make note of your questions or them to me at nsuri@ihmc.us
13 Backup Slides
14 Value of Information Our approach Discretize information into Information Objects Determine value of information (for each IO) Use value estimation to prioritize and filter information Enable receiver and context-dependent delivery Maximize available network capacity Reduce operator data overload Question how to determine right / actionable information?
15 Defining Value of Information Many definitions in the literature for Value of Information Game Theory Price someone would pay for information before making a decision Information Value Theory Value obtained by a reduction in uncertainty / increase in profit Our definitions: Information Object (IO): A discrete piece of information (e.g., a picture, a sensor report, a document, a video clip, a track) Value of Information (VoI): A numerical value between 0 and 1 assigned to an IO VoI of 0 implies it is of no value VoI of 1 implies it is of maximal value VoI of an IO is relative to a recipient (e.g., a soldier) Different from Quality of Information (QoI), which is intrinsic to the IO 15
16 How is VoI Useful? Assumptions: Number of Information Objects (IOs) exceed network s ability to transport and deliver all of the information Delivering all of the IOs available overloads the soldier Determining the VoI for each IO allows us to sort the IOs in decreasing order by value Once sorted, algorithm can Send the most important IOs first, maximizing available network capacity If capacity is reduced, lower rated IOs are dynamically skipped Filter out IOs whose computed VoI is below a desirable threshold Reduce overload on soldier IO s delivered to applications such as ATAK 16
17 Value of Information (2) Question How to determine value of information? Abstract (working) definition information is of value if it causes the receiver to improve his/her situation awareness and/or course of action What is a (reasonably) computable approach to solving this question? Would need to take into account many factors Current mission, current activity, current location Mission Information Exchange Requirements (IER) Predicted location / activity in time (brings in temporal dimension) Type of information, source, pedigree, recency Quality of Information Vetting / validation of the information (sometimes, receiver dependent) Range of influence Information known a priori Receiver s preferences Receiver s social network and trust relationships I n f o r m a t i o n V a l u a t o r
18 Realization Proactive Dissemination Service (DSPro) Model mission (including routes, objectives, roles) Match available and incoming information against mission model Prioritize information dissemination based on relevance estimation Pre-stage information for edge users to increase availability Learn user preferences over time Realize a flexible push/pull architecture Operations Center Tactical Network Tactical Network Operations Center Tactical Network Information Valuator User 1 IO Information Valuator Analyst 1 User 1 User 3 Node Context 1 User 2 IO Node Context n IO Tactical Network User n Sensor Network IO Information Valuator IO Analyst 2 User n Sensor Network IO (a) From OC to Edge Network (a) From Edge Network to OC (c) At the Edge Network
19 Realization (2) Modeled Metadata Georeference / Spatial Extents Timestamp Expiration Time Source / Pedigree Type Classification Relevant Missions Priority Source Reliability Information Content User Context Initial representation includes: Identity Location Mission Name Task / Role Projected Path(s) Relevant Distance By Type of Object Selection Threshold Weights for Ranking VoI (d w d )+(t w t )+(e d : distance from the route / position t : expected time of use e : expiration time i : importance l : learned preference w : corresponding weight factor w e )+(i w Preference Importance i Proximity ) ( l wl Validity Time to Use ) 19
20 Enhancements Range of Influence History of Previously Delivered Information and Change Delta Account for Value Added by new Information Object Object Size
21 Range of Influence Estimate the Range of Influence of Tracks based on type (MIL2525 standard symbol) Configurable policy specifies range of influence for different symbol patterns Policies can depend on attributes such as Friendly, unknown, enemy Type of entity airborne, ground, sea
22 History and Change Delta Matchmaking History used in conjunction with distance to compute relevance of subsequent updates: A track that moves 100 m, but is 1 km away, is assigned a higher relevance than a track that moves 100 m, but is 10 km away. Object Metadata Node Context Area of Relevance Mil STD 2552 Type Client-Assigned Importance... Node Path Node Location Node Mission Node Role... Matchmaker Matchmaking History
23 Object Size Multiple Smaller Objects Vs Fewer Big Objects? Prioritization by Relevance/Object size ratio Filtering of undeliverable data Multiple Tracks ~ 15 KB Object Metadata Area of Relevance Mil STD 2552 Type Client-Assigned Importance... Node Context Node Path Node Location Node Mission Node Role... Network Topology Link capacity Link delay... Matchmaker Matchmaking History Single Image ~ 150 KB Scheduler
24 Initial Results (1) Scenario: Information Dissemination to the Tactical Edge SATCOM SATCOM SATCOM SATCOM MANET MANET MANET Tactical Operations Center Scenario includes dissemination of tracks and sensor reports to dismounted soldiers Soldiers can choose between three levels of selectivity Low (most inclusive), Medium, high (most selective)
25 Bandwidth Utilization (KB/sec) (Lower is Better) Initial Results (2) DSPro Performance Improvement SATCOM MANET Baseline Low - Naïve Low - DSPro Medium - Naïve Medium - DSPro High - Naïve High - DSPro Performance Improvement 26.85% to 45.39% (SATCOM) 31.16% to 64.86% (MANET) Increasing Information Selectivity ---> 25
26 Way Forward Mission based Collection Control the number and type of ISR assets deployed / tasked to support mission requirements Control Drive/steer ISR collection using existing, deployed assets, control what is gathered to support mission requirements as opposed to gathering everything Integrate C2 requirements of multiple missions Shaping of data: downsample imagery, audio, video, summarize documents Based on mission requirements and network state Prioritize based on type; e.g. type of traffic VoIP
27 Broader Context Agile Computing Middleware Realizes Many Protocols for Discovery, Transport, Dissemination, Information Management Building the OODA Loop for the Network Source code for Mockets, DisService, NetProxy has been released under open source GPLv3 license Application Application Agile Computing Middleware Mockets Group Manager (Discovery) AgServe Dissemination Service DSPro ACM Network Proxy UDP Serial Representing Commander s Intent Wired / Wireless Network
28 Interconnected Puzzle Value of Information Mission and Information Requirements Confidence Computation and Actuation Information Ranking and Filtering Wearable Computing and Quantified Self Data Shaping Mediating Between Multiple Information Systems Social Network Analysis / Mining Data Analyzers / Aggregators Moving Computation to Data Software Agents for Offloading Tasks Anomaly Detection Resource Coordination and Allocation Sensor Tasking Quality of Service and Prioritization Tactical Clouds Opportunistic Resource Exploitation Network Awareness Intelligent Dissemination Resource Discovery Tactical Communications Network
Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE)
Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE) Problem Definition Solution Approach Benefits to End User Talk Overview Metrics Summary of Results to Date Lessons Learned & Future Work
More informationContext Based Shared Understanding for Situation Awareness
Distribution Statement A: Approved for public release; distribution is unlimited. Context Based Shared Understanding for Situation Awareness June 9, 2004 David G. Cooper Lockheed Martin Advanced Technology
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete
More informationInformation, Decision, & Complex Networks AFOSR/RTC Overview
Information, Decision, & Complex Networks AFOSR/RTC Overview 06 MAR 2013 Integrity Service Excellence Robert J. Bonneau, Ph.D. Division Chief AFOSR/RTC Air Force Research Laboratory Report Documentation
More informationTREND REPORT. Ethernet, MPLS and SD-WAN: What Decision Makers Really Think
TREND REPORT Ethernet, MPLS and SD-WAN: What Decision Makers Really Think TABLE OF CONTENTS Introduction 3 CH. 1 What IT Pros Think of Ethernet 4 CH. 2 What IT Pros Think of MPLS 8 CH. 3 What IT Pros Think
More informationAn Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)
An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationThe Next-Gen ISR Conference brought to you by:
The Next-Gen ISR Conference brought to you by: www.ttcus.com @Techtrain Linkedin/Groups: Technology Training Corporation Solving Tomorrow s ISR Problems: Getting the Right Information to the Right People
More information8th International. Command and Control Research and Technology Symposium
Insertion of Embedded Infosphere Support Technologies Enabling Time Critical Target Prosecution 8th International Command and Control Research and Technology Symposium June 17-19, 2003 National Defense
More information4th Annual. Multi-INT Exploitation Summit
Defense Strategies Institute professional educational forum: 4th Annual Multi-INT Exploitation Summit ~Delivering Integrated Intelligence for Timely and Actionable Decision- Making~ July 18-19, 2018 Mary
More informationProviding Information Superiority to Small Tactical Units
Providing Information Superiority to Small Tactical Units Jeff Boleng, PhD Principal Member of the Technical Staff Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost Total Program Element - - 38.094-38.094 38.503 39.587 40.754 41.292 Continuing Continuing
More informationA Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things
A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things Tilman Wolf 1 and Anna Nagurney 2 1 Department of Electrical and Computer
More information4th Annual. Multi-INT Exploitation Summit
Defense Strategies Institute professional educational forum: 4th Annual Multi-INT Exploitation Summit ~Delivering Integrated Intelligence for Timely and Actionable Decision- Making~ July 18-19, 2018 Mary
More informationData and Decision Analytics
DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. Data and Decision Analytics DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. Data Analytics
More informationAutonomic Computing. Pablo Chacin
Autonomic Computing Pablo Chacin Acknowledgements Some Slides taken from Manish Parashar and Omer Rana presentations Agenda Fundamentals Definitions Objectives Alternative approaches Examples Research
More informationAir Force Research Laboratory
Air Force Research Laboratory Emerging Command, Control, and Communications Technologies for the 3 rd Offset and Future Operating Concept AFCEA Luncheon 22 September 2016 Dr. Paul Antonik, ST Chief Scientist,
More informationCyber Security CRA Overview
Cyber Security CRA Overview Patrick McDaniel (PM, PSU) & Edward Colbert (CAM, ARL) cra.psu.edu Approved for public release; distribution is unlimited. Cyber Security Collaborative Research Alliance A Collaborative
More informationOn Optimizing Command and Control Structures
On Optimizing Command and Control Structures 16th ICCRTS Gary F. Wheatley Best Paper Presentation Kevin Schultz, David Scheidt, {kevin.schultz, david.scheidt}@jhuapl.edu This work was funded in part by
More informationIEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING
IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
More informationNew Horizons. Dr. Bryant Wysocki Chief Engineer AFRL Information Directorate. 13 March 2017
New Horizons Dr. Bryant Wysocki Chief Engineer AFRL Information Directorate 13 March 2017 Air Force Research Laboratory 2 Information Technologies....Touch Every Other AFRL Directorate C 4+1 I Command,
More informationCloud Based IoT Application Provisioning (The Case of Wireless Sensor Applications)
Cloud Based IoT Application Provisioning (The Case of Wireless Sensor Applications) (ENCS 691K Chapter 7) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/
More informationTrust Harris for LTE. Critical Conditions Require Critical Response
Trust Harris for LTE Critical Conditions Require Critical Response Harris LTE Solution Harris LTE Solution Harris LTE Networks Critical Conditions Require Critical Response. Trust Harris for LTE. Public
More informationQuality of Service in US Air Force Information Management Systems
Quality of Service in US Air Force Information Management Systems Co-hosted by: Dr. Joseph P. Loyall BBN Technologies Sponsored by: 12/11/2009 Material Approved for Public Release. Quality of Service is
More informationKeynote Speakers CyberC 2010
Keynote Speakers CyberC 2010 Keynote Speaker 1 Wireless Sensor Network Security: Overview and Future Perspective Prof. Anup Kumar University of Louisville, USA Wireless sensor networks have the potential
More informationSmart Ubiquitous Networks: Standardization and Challenges for Smartness of Networks
ITU Workshop on Standardization on IMT, M2M, IoT, Cloud Computing and SDN (Algiers, Algeria, 8 September 2013) Smart Ubiquitous Networks: Standardization and Challenges for Smartness of Networks Gyu Myoung
More informationSpace and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)
Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) SSC Atlantic is part of the Naval Research & Development Establishment (NR&DE) Information Warfare Research Project
More informationCloud-based Open Architecture Approach for Common Enterprise Ground Services
Cloud-based Open Architecture Approach for Common Enterprise Ground Services GSAW Conference Feb. 29-March 3, 2016 2016 by Booz Allen Hamilton. Published by The Aerospace Corporation with permission. Agenda
More informationToward a Standard Rule Language for Semantic Integration of the DoD Enterprise
1 W3C Workshop on Rule Languages for Interoperability Toward a Standard Rule Language for Semantic Integration of the DoD Enterprise A MITRE Sponsored Research Effort Suzette Stoutenburg 28 April 2005
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationCONVERTING SENSOR DATA TO TACTICAL INFORMATION
2011 NDIA GROUND VEHICLE SYSTEMS ENGINEERING AND TECHNOLOGY SYMPOSIUM VEHICLE ELECTRONICS AND ARCHITECTURE (VEA) MINI-SYMPOSIUM AUGUST 9-11 DEARBORN, MICHIGAN CONVERTING SENSOR DATA TO TACTICAL INFORMATION
More informationUAVs as Communications Routing Nodes in Network-Centric Warfare
UAVs as Communications Routing Nodes in Network-Centric Warfare AUVSI s Unmanned Systems 2003 Symposium & Exhibition July 15-17, 17, 2003 Baltimore Convention Center Peter Rigstad L-3 3 Communications
More informationCoalition Interoperability Ontology:
Coalition Interoperability Ontology: Sharing Situational Awareness with Allies and Agents Erik Chaum Naval Undersea Warfare Center, Division Newport, TTCP, Maritime Systems Group, TP1 US National Leader
More informationArchitecting for Resiliency Army s Common Operating Environment (COE) SERC
Architecting for Resiliency Army s Common Operating Environment (COE) SERC 5 October 2011 Mr. Terry Edwards Director, ASA(ALT) Office of the Chief Systems Engineer (OCSE) (703) 614-4540 terry.edwards@us.army.mil
More informationSecurity Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning
Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Sapna B Kulkarni,B.E,MTech (PhD) Associate Prof, Dept of CSE RYM Engg.college, Bellari VTU Belgaum Shainaj.B
More informationLimited-Bandwidth Plug-ins for DDS
May 2011 Limited-Bandwidth Plug-ins for DDS Integrating Applications over Low Bandwidth, Unreliable and Constrained Networks using RTI Data Distribution Service Edwin de Jong, Director of Product Management
More informationAn Introduction to the Intelligent IoT Integrator (I3)
An Introduction to the Intelligent IoT Integrator (I3) Bhaskar Krishnamachari Professor of Electrical Engineering & Computer Science Director, Center for Cyber-Physical Systems and the Internet of Things
More informationSRA A Strategic Research Agenda for Future Network Technologies
SRA A Strategic Research Agenda for Future Network Technologies Rahim Tafazolli,University of Surrey ETSI Future Network Technologies ARCHITECTURE 26th 27th Sep 2011 Sophia Antipolis, France Background
More informationJOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC)
JOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC) Cyber T&E Initiatives AJ Pathmanathan JMETC Deputy PM for Engineering NCR Technical Director November 14, 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior
More informationEmerging Wireless Networks: Challenges and Perspectives
Emerging Wireless Networks: Challenges and Perspectives 10:00 Welcome Giuseppe Araniti, Assistant Professor in Telecommunication, DIIES Dep., University Mediterranea of Reggio Calabria, Italy 10:20 Secure
More informationStavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987
413 Gates Hall +1 6073795409 Department of Computer Science Cornell University email: snikolaou@cs.cornell.edu URL: www.cs.cornell.edu/~snikolaou Ithaca, NY, 14853, USA Date of Birth: December, 1987 Education
More informationA Brief Introduction to CFINS
A Brief Introduction to CFINS Center for Intelligent and Networked Systems (CFINS) Department of Automation Tsinghua University Beijing 100084, China 6/30/2016 1 Outline Mission People Professors Students
More informationBeyond Web Services A network-centric approach to system design
1 Beyond Web Services A network-centric approach to system design David Crute Principal Architect Integrated Systems Division General Dynamics C4 Systems 2 Network Services Evolution Software Integration
More informationExecutive Summary. iii
Executive Summary Operational and tactical military environments are composed of mobile nodes and dynamic situations resulting in a high degree of uncertainty. Communication links are often based on adhoc
More informationOutline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2
CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,
More informationTowards a Formal Pedigree Ontology for Level-One Sensor Fusion
Towards a Formal Pedigree Ontology for Level-One Sensor Fusion Christopher J. Matheus David Tribble Referentia Systems, Inc. Mieczyslaw M. Kokar Northeaster University Marion Ceruti and Scott McGirr Space
More informationSOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience?
SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT When used
More informationQuality of Service (QoS) Enabled Dissemination of Managed Information Objects in a Publish-Subscribe-Query
Quality of Service (QoS) Enabled Dissemination of Managed Information Objects in a Publish-Subscribe-Query Information Broker Dr. Joe Loyall BBN Technologies The Boeing Company Florida Institute for Human
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationInterface Technology (MUSCIT) Program
Multi-UAV Supervisory Control Interface Technology (MUSCIT) Program April 2007 Kristen K. Liggett, Ph.D. System Control Interfaces Branch Warfighter Interface Division Human Effectiveness Directorate Air
More informationDEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS
DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS Todd Waskiewicz and Peter LaMonica Air Force Research Laboratory Information and Intelligence Exploitation Division {Todd.Waskiewicz,
More informationIEEE networking projects
IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified
More information<Insert Picture Here> Enterprise Data Management using Grid Technology
Enterprise Data using Grid Technology Kriangsak Tiawsirisup Sales Consulting Manager Oracle Corporation (Thailand) 3 Related Data Centre Trends. Service Oriented Architecture Flexibility
More informationNext Generation Communication Architectures and Technologies
Next Generation Communication Architectures and Technologies Special Session on: Requirements and Technologies for the Next Generation of Mobile Communications Presenter: Prof. Panagiotis Demestichas University
More informationDAISY Data Analysis and Information SecuritY Lab
DAISY Data Analysis and Information SecuritY Lab Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare Yingying (Jennifer) Chen Director of Data Analysis
More information5G Reimagined: New Business Models and Enhanced User Experiences
5G Reimagined: New Business Models and Enhanced User Experiences Panelists: Brian Daly Director, Core Network & Government/Regulatory Standards, AT&T Fred Kemmerer Senior Consultant, Strategic Options
More informationExadata Database Machine: 12c Administration Workshop Ed 2
Oracle University Contact Us: 800-260-690 Exadata Database Machine: 12c Administration Workshop Ed 2 Duration: 5 Days What you will learn This Exadata Database Machine: 12c Administration Workshop training
More informationCisco APIC Enterprise Module Simplifies Network Operations
Cisco APIC Enterprise Module Simplifies Network Operations October 2015 Prepared by: Zeus Kerravala Cisco APIC Enterprise Module Simplifies Network Operations by Zeus Kerravala October 2015 º º º º º º
More informationFuture Grid Initiative Technology Challenges in Designing the Future Grid to Enable Sustainable Energy Systems
Future Grid Initiative Technology Challenges in Designing the Future Grid to Enable Sustainable Energy Systems Vijay Vittal Director, Power Systems Engineering Research Center Ira A. Fulton Chair Professor,
More informationExadata Database Machine: 12c Administration Workshop Ed 2 Duration: 5 Days
Exadata Database Machine: 12c Administration Workshop Ed 2 Duration: 5 Days This Exadata Database Machine: 12c Administration Workshop introduces you to Oracle Exadata Database Machine. Explore the various
More informationTopology Control from Bottom to Top
Topology Control from Bottom to Top M. Steenstrup Stow Research L.L.C. Clemson University steenie@rcn.com This work was funded in part by DARPA and by ONR MURI. Report Documentation Page Form Approved
More informationExadata Database Machine: 12c Administration Workshop Ed 2
Oracle University Contact Us: 00 9714 390 9050 Exadata Database Machine: 12c Administration Workshop Ed 2 Duration: 5 Days What you will learn This Exadata Database Machine: 12c Administration Workshop
More informationCollaborative Next Generation Networking
CALL-FOR-PAPERS ACM/Springer Mobile Networks & Applications (MONET) http://link.springer.com/journal/11036 SPECIAL ISSUE ON Collaborative Next Generation Networking Overview: To catch up with the ever-increasing
More informationComputer-based Tracking Protocols: Improving Communication between Databases
Computer-based Tracking Protocols: Improving Communication between Databases Amol Deshpande Database Group Department of Computer Science University of Maryland Overview Food tracking and traceability
More informationUNCLASSIFIED UNCLASSIFIED
: February 6 Exhibit R, RDT&E Budget Item Justification: PB : Research,, Test & Evaluation, / BA 5: System & Demonstration (SDD) COST ($ in Millions) FY 5 FY 6 R Program Element (Number/Name) PE 65A /
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)
More informationFuture X Network. Sanjay Kamat Managing Partner, Bell Labs Consulting Nokia
Future X Network Sanjay Kamat Managing Partner, Bell Labs Consulting 1 2017 Nokia Nokia Bell Labs innovations have been changing the way we live for more than 90 years 2 2017 Nokia Nokia Internal Nokia
More informationThe Business of Security in the Cloud
The Business of Security in the Cloud Dr. Pamela Fusco Vice President Industry Solutions Solutionary Inc. CISSP, CISM, CHSIII, IAM, NSA/CSS Adjunct Faculty Promises Promises The promise of cloud computing
More informationROUTING PROJECT LIST
ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital
More informationThe University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree
Accreditation & Quality Assurance Center Curriculum for Doctorate Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Computer Science الدكتوراة في علم الحاسوب (Arabic).3
More informationHow To Reduce the IT Budget and Still Keep the Lights On
How To Reduce the IT Budget and Still Keep the Lights On By Charles Williams and John Carnegie CIOs are now more challenged than ever to demonstrate mature financial management disciplines, greater transparency,
More informationSECURITY MANAGEMENT FOR SE LINUX
AFRL-IF-RS-TR-2003-22 Final Technical Report February 2003 SECURITY MANAGEMENT FOR SE LINUX George Washington University Sponsored by Defense Advanced Research Projects Agency DARPA Order No. N624/00 APPROVED
More informationChoosing the Right Acceleration Solution
Choosing the Right Acceleration Solution In the previous piece in this series, What is Network Acceleration, we outlined the various techniques used to improve network performance. Now, we will discuss
More informationwww.grensregio.eu www.smarttooling.eu WIRELESS COMMUNICATION, LOCALIZATION (AND MORE) FOR ROBOTICS PROF. JEROEN HOEBEKE, PROF. BRUNO VOLCKAERT, PROF. PIETER SIMOENS (jeroen.hoebeke@ugent.be) GHENT UNIVERSITY
More informationData Sources for Cyber Security Research
Data Sources for Cyber Security Research Melissa Turcotte mturcotte@lanl.gov Advanced Research in Cyber Systems, Los Alamos National Laboratory 14 June 2018 Background Advanced Research in Cyber Systems,
More informationEvaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios
Contemporary Engineering Sciences, Vol. 7, 2014, no. 12, 559-567 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4436 Evaluation of Ad-hoc Routing Protocols with Different Mobility Models
More informationAPP-PHY Interactions in Wireless Networks
University of Minnesota September 29, 2009 APP-PHY Interactions in Wireless Networks Vince Poor (poor@princeton.edu) APP-PHY Interactions in Wireless Nets Wireless Networks: Layers Application (APP) Web
More informationDISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK
DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:
More informationSIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks
SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract
More informationNEXIUM THEATRE. Tactical networks for defence and security forces
w w w. t h a l e s g r o u p. c o m NEXIUM THEATRE Tactical networks for defence and security forces DEFENCE SECURITY B ased on its long experience and worldwide leadership in military communications and
More informationA look into the 3GPP future 2012 of 3GPP 5G
A look into the 3GPP future 2012 of 3GPP 5G Joerg Swetina (NEC) 3GPP SA1, onem2m 3GPP 2016 1 Use case areas of TR 22.891 SMARTER Massive MTC Vehicle / autonomous driving Industry Robot / Drone Game / Sports
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Oracle NoSQL Database and Oracle Relational Database - A Perfect Fit Dave Rubin Director NoSQL Database Development 2 The following is intended to outline our general product direction. It is intended
More informationIMPLEMENTING MOBILE AD HOC NETWORKING (MANET) OVER LEGACY TACTICAL RADIO LINKS. Presented at MILCOM 2007 October 29, 2007
IMPLEMENTING MOBILE AD HOC NETWORKING (MANET) OVER LEGACY TACTICAL RADIO LINKS Presented at MILCOM 27 October 29, 27 ABSTRACT Mobile Ad Hoc Networking (MANET) is a key technology enabler in the tactical
More informationMobile Ad Hoc Networks: Basic Concepts and Research Issues
Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full
More informationAn Architecture. What the MEC? for 5G
An Architecture What the MEC? for 5G What the MEC? An architecture for 5G As we stated in the first e-book in this series, the evolution from LTE to 5G will be the most profound transformation on the wireless
More informationUNCLASSIFIED. ADF Tactical Data Link Authority Ground Network Capability Assurance Services UNCLASSIFIED
UNCLASSIFIED MilCIS 2013 TDL Stream, Session 2.5a ADF Tactical Data Link Authority Ground Network Capability Assurance Services Mr. Josh Roth Ground Networks Manager joshua.roth1@defence.gov.au 02 626
More informationNetwork-Aware Resource Allocation in Distributed Clouds
Dissertation Research Summary Thesis Advisor: Asst. Prof. Dr. Tolga Ovatman Istanbul Technical University Department of Computer Engineering E-mail: aralat@itu.edu.tr April 4, 2016 Short Bio Research and
More informationComparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4
Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4 1 Research Scholar, Computer Science and Engineering, Lovely
More informationAn Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs
An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,
More informationUBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT
2018 Viasat White Paper August 27, 2018 UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT With Hybrid Adaptive Networking By Craig Miller Vice President, Chief Technical Officer
More informationEnd-to-end QoS negotiation in network federations
End-to-end QoS negotiation in network federations H. Pouyllau, R. Douville Avril, 2010 Outline Motivation for Network federations The problem of end-to-end SLA composition Scenario of composition and negotiation
More informationSYNERGISTIC WARFARE COMMUNICATION SOLUTIONS
SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS Tactical Communications & Networking Wireless / wired networks Full spectrum of tactical communications Tactical datalinks Radio ancillaries and accessories
More informationWeVe: When Smart Wearables Meet Intelligent Vehicles
WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet
More informationThe Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse
The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse Stephen Hunt OSD CAPE Joint Data Support (SAIC) Stephen.Hunt.ctr@osd.mil The DoD Office of Security Review has cleared this report
More informationExdata Database Machine: 12c Administration Workshop Ed 2
Exdata Database Machine: 12c Administration Workshop Ed 2 Duration 5 Days What you will learn This Exadata Database Machine: 12c Administration Workshop training introduces you to Oracle Exadata Database
More informationIntroduction to Distributed Systems
Introduction to Distributed Systems Distributed Systems Sistemi Distribuiti Andrea Omicini andrea.omicini@unibo.it Ingegneria Due Alma Mater Studiorum Università di Bologna a Cesena Academic Year 2011/2012
More informationProject: IEEE P Task Group for Wireless Smart Sensors
Project: IEEE P1451.5 Task Group for Wireless Smart Sensors Title: [Industrial Sensing Applications] Date Submitted: [23 Sep, 2002] Source: [Kenneth D. Cornett] Company: [Motorola, Inc.] Address: [8000
More information