Mason Archival Repository Service

Volgenau School of Engineering

Volgenau School of Engineering

 

Sub-communities within this community

Recent Submissions

  • Hamilton, Franz; Graham, Robert; Luu, Lydia; Peixoto, Nathalia (Public Library of Science, 2015-11-06)
    In vitro neuronal cultures have become a popular method with which to probe network-level neuronal dynamics and phenomena in controlled laboratory settings. One of the key dynamics of interest in these in vitro studies has ...
  • Kamath, Uday; De Jong, Kenneth; Shehu, Amarda (Public Library of Science, 2014-07-17)
    Background Many open problems in bioinformatics involve elucidating underlying functional signals in biological sequences. DNA sequences, in particular, are characterized by rich architectures in which functional signals ...
  • Eranki, Avinash; Cortes, Nelson; Ferenček3, Zrinka Gregurić; Siddhartha, Sikdar (Journal of Visualized Experiments, 2013-09)
    Ultrasound is an attractive modality for imaging muscle and tendon motion during dynamic tasks and can provide a complementary methodological approach for biomechanical studies in a clinical or laboratory setting. Towards ...
  • Powell, Walter A.; Laskey, Kathryn Blackmond; Adelman, Leonard; Johnson, Ryan; Dorgan, Shiloh; Hieb, Micheal; Braswell, Kenneth; Powers, Michael (2010-04-20)
    Geospatial Reasoning has been an essential aspect of military planning since the invention of cartography. Geospatial Digital Support Products (GDSPs) are ubiquitous within current military forces as well as civil and ...
  • Neema, Himanshu; Nine, H.; Hemingway, G.; Sztipanovits, J.; Karsai, G. (2009-10-06)
    Abstract-Virtual evaluation of complex command and control concepts demands the use of heterogeneous simulation environments. Development challenges include how to integrate multiple simulation platforms with varying ...
  • Lee, Hojun; Zeigler, Bernard (2009-10-05)
    This paper explores the Information Exchange Framework (IEF) concept of distributed data fusion sensor networks in Network-centric environment. It is used to build up integrative battlefield pictures through the Battle ...
  • Roberts, John (2009-09-29)
    The transition to Commander-centric network-enabled Command and Control (C2) is well underway within the US Army and Department of Defense (DOD). The foundation of this approach is an information superiority-enabled concept ...
  • Thomas, Alan; Turner, Thomas; Soderlund, Scott (2008)
    The Net-Centric Adapter for Legacy Systems (NCALS) is a software technology that makes legacy system data and services available in near real-time to the Global Information Grid (GIG). The intent of NCALS is to lower the ...
  • Curtin, Kevin M. (2009-09-15)
    This paper outlines a motivation for associating IED events (and other significant physical and human geographic features) with the road network, describes the use of methods known as linear referencing in order to do so, ...
  • Gunderson, C.R.; Raytheon, David Minton (2008)
    Coalition Warrior Interoperability Demonstration 2008 (CWID 08), Interoperability Trial (IT) #5.64 “Trusted Enterprise Service Bus” (T-ESB) demonstrates a potentially quantum improvement in the government procurement model ...
  • Powell, Walter A.; Laskey, Kathryn Blackmond; Adelman, Leonard; Johnson, Ryan; Altenau, Michael; Goldstein, Andrew; Visone, Daniel; Braswell, Kenneth (Proceeding of 14th International Command and Control Research and Technology Symposium, 2009-06)
    How does the underlying data affect the ability of warfighters to derive useful information and make decisions? The Army Topographic Engineering Center (TEC) and GMU endeavor to shed light on this question with the third ...
  • Laskey, Kathryn B. (North-Holland, 1989)
    In the canonical examples underlying Shafer-Dempster theory, beliefs over the hypotheses of interest are derived from a probability model for a set of auxiliary hypotheses. A belief function differs from a Bayesian probability ...
  • Wright, Edward J.; Laskey, Kathryn B. (2006-07)
    This paper presents a technical approach for fusing information from diverse sources. Fusion requires appropriate weighting of information based on the quality of the source of the information. A credibility model ...
  • Laskey, Kenneth J.; Costa, Paulo C. G.; Laskey, Kathryn B. (Information Extraction & Transport, Inc. (IET), 2006-11)
    The Semantic Web envisions effortless cooperation between humans and computers, seamless interoperability and information exchange among web applications, and rapid and accurate identification and invocation of appropriate ...
  • Costa, Paulo C. G.; Laskey, Kathryn B.; Laskey, Kenneth J. (Information Extraction & Transport, Inc. (IET), 2006-11)
    Service Oriented Architecture (SOA) is a key technology to support interoperability among data and processing resources. Semantic interoperability requires mapping between vocabularies of independently developed resources, a ...
  • Costa, Paulo C.G.; Laskey, Kathryn B. (IOS Press, 2006-11)
    Across a wide range of domains, there is an urgent need for a wellfounded approach to incorporating uncertain and incomplete knowledge into formal domain ontologies. Although this subject is receiving increasing ...
  • Costa, Paulo C. G.; Laskey, Kathryn B.; AlGhamdi, Ghazi (2006-07-30)
    Ontologies have become ubiquitous in current-generation information systems. An ontology is an explicit, formal representation of the entities and relationships that can exist in a domain of application. Following a ...
  • Hieb, Michael R.; Pullen, J. Mark (2006-05-05)
    Agents assist users with performing tasks in computer-based applications. The current practice of building an agent involves a developer programming it for each task it must perform, but agents constructed in this manner ...
  • AlGhamdi, Ghazi; Laskey, Kathryn B.; Wang, Xun; Barbará, Daniel; Shackelford, Thomas; Wright, Edward J.; Fitzgerald, Julie (2006-03-06)
    This paper presents an innovative use of human behavior models for detecting insider threats to information systems. While most work in information security concerns detecting and responding to intruders, violations of ...
  • AlGhamdi, Ghazi; Laskey, Kathryn B.; Wright, Edward J.; Barbará, Daniel; Chang, K.C. (2006-03-06)
    This paper tackles a key aspect of the information security problem: modeling the behavior of insider threats. The specific problem addressed by this paper is the identification of malicious insider behavior in trusted ...

View more