Mason Archival Repository Service

Browsing Center of Excellence in Command, Control, Communications, and Intelligence by Issue Date

Browsing Center of Excellence in Command, Control, Communications, and Intelligence by Issue Date

Sort by: Order: Results:

  • Laskey, Kathryn B. (North-Holland, 1989)
    In the canonical examples underlying Shafer-Dempster theory, beliefs over the hypotheses of interest are derived from a probability model for a set of auxiliary hypotheses. A belief function differs from a Bayesian probability ...
  • Costa, Paulo C. G.; Laskey, Kathryn B.; AlGhamdi, Ghazi; Barbará, Daniel; Shackelford, Thomas; Mirza, Sepideh; Revankar, Mehul (MITRE Corporation, 2005-05)
    This paper describes the Detection of Threat Behavior (DTB) project, a joint effort being conducted by George Mason University (GMU) and Information Extraction and Transport, Inc. (IET). DTB uses novel approaches for ...
  • Costa, Paulo C. G.; Laskey, Kathryn B.; Takikawa, Masami; Pool, Michael; Fung, Francis; Wright, Edward J. (CCRP Publications, 2005-06)
    Among the lessons learned from recent conflicts stands the dramatic change in the very way wars are fought. There are no more clear-cut enemies or allies; rules of engagement have become increasingly fuzzy; guerrilla and ...
  • Laskey, Kathryn B.; Costa, Paulo C. G. (AUAI Press, 2005-07)
    Intelligent systems in an open world must reason about many interacting entities related to each other in diverse ways and having uncertain features and relationships. Traditional probabilistic languages lack the expressive ...
  • Costa, Paulo C. G. (George Mason University, 2005-07-12)
    Uncertainty is ubiquitous. Any representation scheme intended to model real-world actions and processes must be able to cope with the effects of uncertain phenomena. A major shortcoming of existing Semantic Web technologies ...
  • Costa, Paulo C. G.; Laskey, Kathryn B.; Laskey, Kenneth J. (2005-11-07)
    This paper addresses a major weakness of current technologies for the Semantic Web, namely the lack of a principled means to represent and reason about uncertainty. This not only hinders the realization of the original ...
  • Hudson, Linwood D.; Ware, Bryan S.; Laskey, Kathryn B.; Mahoney, Suzanne M. (2005-11-18)
    Recent events underscore the need for effective tools for managing the risks posed by terrorists. Assessing the threat of terrorist attack requires combining information from multiple disparate sources, most of ...
  • Costa, Paulo C. G.; Laskey, Kathryn B. (2006-01-27)
    An introduction is provided to Multi-Entity Bayesian Networks (MEBN), a logic system that integrates First Order Logic (FOL) with Bayesian probability theory. MEBN extends ordinary Bayesian networks to allow representation ...
  • Laskey, Kathryn B. (2006-02-03)
    Uncertainty is a fundamental and irreducible aspect of our knowledge about the world. Probability is the most well-understood and widely applied logic for computational scientific reasoning under uncertainty. As theory and ...
  • Fung, Francis; Laskey, Kathryn B.; Pool, Michael; Takikawa, Masami; Wright, Edward J. (2006-02-06)
    Decision support and information fusion in complex domains requires reasoning about inherently uncertain properties of and relationships among varied and often unknown number of entities interacting in differing and often ...
  • AlGhamdi, Ghazi; Laskey, Kathryn B.; Wright, Edward J.; Barbará, Daniel; Chang, K.C. (2006-03-06)
    This paper tackles a key aspect of the information security problem: modeling the behavior of insider threats. The specific problem addressed by this paper is the identification of malicious insider behavior in trusted ...
  • AlGhamdi, Ghazi; Laskey, Kathryn B.; Wang, Xun; Barbará, Daniel; Shackelford, Thomas; Wright, Edward J.; Fitzgerald, Julie (2006-03-06)
    This paper presents an innovative use of human behavior models for detecting insider threats to information systems. While most work in information security concerns detecting and responding to intruders, violations of ...
  • Hieb, Michael R.; Pullen, J. Mark (2006-05-05)
    Agents assist users with performing tasks in computer-based applications. The current practice of building an agent involves a developer programming it for each task it must perform, but agents constructed in this manner ...
  • Wright, Edward J.; Laskey, Kathryn B. (2006-07)
    This paper presents a technical approach for fusing information from diverse sources. Fusion requires appropriate weighting of information based on the quality of the source of the information. A credibility model ...
  • Costa, Paulo C. G.; Laskey, Kathryn B.; AlGhamdi, Ghazi (2006-07-30)
    Ontologies have become ubiquitous in current-generation information systems. An ontology is an explicit, formal representation of the entities and relationships that can exist in a domain of application. Following a ...
  • Costa, Paulo C.G.; Laskey, Kathryn B. (IOS Press, 2006-11)
    Across a wide range of domains, there is an urgent need for a wellfounded approach to incorporating uncertain and incomplete knowledge into formal domain ontologies. Although this subject is receiving increasing ...
  • Costa, Paulo C. G.; Laskey, Kathryn B.; Laskey, Kenneth J. (Information Extraction & Transport, Inc. (IET), 2006-11)
    Service Oriented Architecture (SOA) is a key technology to support interoperability among data and processing resources. Semantic interoperability requires mapping between vocabularies of independently developed resources, a ...
  • Laskey, Kenneth J.; Costa, Paulo C. G.; Laskey, Kathryn B. (Information Extraction & Transport, Inc. (IET), 2006-11)
    The Semantic Web envisions effortless cooperation between humans and computers, seamless interoperability and information exchange among web applications, and rapid and accurate identification and invocation of appropriate ...
  • Gunderson, C.R.; Raytheon, David Minton (2008)
    Coalition Warrior Interoperability Demonstration 2008 (CWID 08), Interoperability Trial (IT) #5.64 “Trusted Enterprise Service Bus” (T-ESB) demonstrates a potentially quantum improvement in the government procurement model ...
  • Thomas, Alan; Turner, Thomas; Soderlund, Scott (2008)
    The Net-Centric Adapter for Legacy Systems (NCALS) is a software technology that makes legacy system data and services available in near real-time to the Global Information Grid (GIG). The intent of NCALS is to lower the ...

Search MARS


Advanced Search

Browse

My Account