Mason Archival Repository Service

Center of Excellence in Command, Control, Communications, and Intelligence

Center of Excellence in Command, Control, Communications, and Intelligence

 

The Center of Excellence in Command, Control, Communications, and Intelligence at George Mason University was established under the direction of Dr.Harry Van Trees in July 1989 in order to provide an intellectual base for the command , control, communications, and intelligence area. Dr.Mark Pullen, who became the Center's Director in 2005, has continued its emphasis on bringing academic expertise to the needs of the U.S. military and related government and commercial applications of information technology. The Center conducts a broad spectrum R&D and educational program in C4I. The program is accomplished by bringing together a multidisciplinary group consisting of academic faculty, research staff, and fellows in residence from industry and government.

Sub-communities within this community

Collections in this community

Recent Submissions

  • Powell, Walter A.; Laskey, Kathryn Blackmond; Adelman, Leonard; Johnson, Ryan; Dorgan, Shiloh; Hieb, Micheal; Braswell, Kenneth; Powers, Michael (2010-04-20)
    Geospatial Reasoning has been an essential aspect of military planning since the invention of cartography. Geospatial Digital Support Products (GDSPs) are ubiquitous within current military forces as well as civil and ...
  • Neema, Himanshu; Nine, H.; Hemingway, G.; Sztipanovits, J.; Karsai, G. (2009-10-06)
    Abstract-Virtual evaluation of complex command and control concepts demands the use of heterogeneous simulation environments. Development challenges include how to integrate multiple simulation platforms with varying ...
  • Lee, Hojun; Zeigler, Bernard (2009-10-05)
    This paper explores the Information Exchange Framework (IEF) concept of distributed data fusion sensor networks in Network-centric environment. It is used to build up integrative battlefield pictures through the Battle ...
  • Roberts, John (2009-09-29)
    The transition to Commander-centric network-enabled Command and Control (C2) is well underway within the US Army and Department of Defense (DOD). The foundation of this approach is an information superiority-enabled concept ...
  • Thomas, Alan; Turner, Thomas; Soderlund, Scott (2008)
    The Net-Centric Adapter for Legacy Systems (NCALS) is a software technology that makes legacy system data and services available in near real-time to the Global Information Grid (GIG). The intent of NCALS is to lower the ...
  • Curtin, Kevin M. (2009-09-15)
    This paper outlines a motivation for associating IED events (and other significant physical and human geographic features) with the road network, describes the use of methods known as linear referencing in order to do so, ...
  • Gunderson, C.R.; Raytheon, David Minton (2008)
    Coalition Warrior Interoperability Demonstration 2008 (CWID 08), Interoperability Trial (IT) #5.64 “Trusted Enterprise Service Bus” (T-ESB) demonstrates a potentially quantum improvement in the government procurement model ...
  • Powell, Walter A.; Laskey, Kathryn Blackmond; Adelman, Leonard; Johnson, Ryan; Altenau, Michael; Goldstein, Andrew; Visone, Daniel; Braswell, Kenneth (Proceeding of 14th International Command and Control Research and Technology Symposium, 2009-06)
    How does the underlying data affect the ability of warfighters to derive useful information and make decisions? The Army Topographic Engineering Center (TEC) and GMU endeavor to shed light on this question with the third ...
  • Laskey, Kathryn B. (North-Holland, 1989)
    In the canonical examples underlying Shafer-Dempster theory, beliefs over the hypotheses of interest are derived from a probability model for a set of auxiliary hypotheses. A belief function differs from a Bayesian probability ...
  • Wright, Edward J.; Laskey, Kathryn B. (2006-07)
    This paper presents a technical approach for fusing information from diverse sources. Fusion requires appropriate weighting of information based on the quality of the source of the information. A credibility model ...
  • Laskey, Kenneth J.; Costa, Paulo C. G.; Laskey, Kathryn B. (Information Extraction & Transport, Inc. (IET), 2006-11)
    The Semantic Web envisions effortless cooperation between humans and computers, seamless interoperability and information exchange among web applications, and rapid and accurate identification and invocation of appropriate ...
  • Costa, Paulo C. G.; Laskey, Kathryn B.; Laskey, Kenneth J. (Information Extraction & Transport, Inc. (IET), 2006-11)
    Service Oriented Architecture (SOA) is a key technology to support interoperability among data and processing resources. Semantic interoperability requires mapping between vocabularies of independently developed resources, a ...
  • Costa, Paulo C.G.; Laskey, Kathryn B. (IOS Press, 2006-11)
    Across a wide range of domains, there is an urgent need for a wellfounded approach to incorporating uncertain and incomplete knowledge into formal domain ontologies. Although this subject is receiving increasing ...
  • Costa, Paulo C. G.; Laskey, Kathryn B.; AlGhamdi, Ghazi (2006-07-30)
    Ontologies have become ubiquitous in current-generation information systems. An ontology is an explicit, formal representation of the entities and relationships that can exist in a domain of application. Following a ...
  • Hieb, Michael R.; Pullen, J. Mark (2006-05-05)
    Agents assist users with performing tasks in computer-based applications. The current practice of building an agent involves a developer programming it for each task it must perform, but agents constructed in this manner ...
  • AlGhamdi, Ghazi; Laskey, Kathryn B.; Wang, Xun; Barbará, Daniel; Shackelford, Thomas; Wright, Edward J.; Fitzgerald, Julie (2006-03-06)
    This paper presents an innovative use of human behavior models for detecting insider threats to information systems. While most work in information security concerns detecting and responding to intruders, violations of ...
  • AlGhamdi, Ghazi; Laskey, Kathryn B.; Wright, Edward J.; Barbará, Daniel; Chang, K.C. (2006-03-06)
    This paper tackles a key aspect of the information security problem: modeling the behavior of insider threats. The specific problem addressed by this paper is the identification of malicious insider behavior in trusted ...
  • Fung, Francis; Laskey, Kathryn B.; Pool, Michael; Takikawa, Masami; Wright, Edward J. (2006-02-06)
    Decision support and information fusion in complex domains requires reasoning about inherently uncertain properties of and relationships among varied and often unknown number of entities interacting in differing and often ...
  • Laskey, Kathryn B. (2006-02-03)
    Uncertainty is a fundamental and irreducible aspect of our knowledge about the world. Probability is the most well-understood and widely applied logic for computational scientific reasoning under uncertainty. As theory and ...
  • Costa, Paulo C. G.; Laskey, Kathryn B. (2006-01-27)
    An introduction is provided to Multi-Entity Bayesian Networks (MEBN), a logic system that integrates First Order Logic (FOL) with Bayesian probability theory. MEBN extends ordinary Bayesian networks to allow representation ...

View more