Learn More
location). While SA has been recognized in the information fusion and human factors literature, there still exist open questions regarding knowledge representation and reasoning methods to afford SA. For instance, while lots of data is collected over a region of interest, how does this information get presented to an attention constrained user? The(More)
A key challenge presented by the increasing volume and complexity of information collectable from battlespace situations is the development of intelligent applications able to automatically analyze the information and identify critical enemy activities in a timely manner. What makes this information fusion problem particularly difficult is the strong(More)
Situation assessment (SA) involves deriving relations among entities, e.g., the aggregation of object states (i.e. classification and location). While SA has been recognized in the information fusion and human factors literature, there still exist open questions regarding knowledge representation and reasoning methods to afford SA. For instance, while lots(More)
Doctrinally, Priority Intelligence Requirements (PIRs) represent information that the commander needs to know in order to make a decision or achieve a desired effect. Networked warfare provides the intelligence officer with access to multitudes of sensor outputs and reports, often from unfamiliar sources. Counterinsurgency requires evaluating information(More)
Enemy or Threat Courses of Action are produced during Intelligence Preparation of the Battlefield, during the Military Decision Making Process, and as part of the process of Situation Development. Due to the overwhelming amount of information involved in these processes and the limited time available to intelligence analysts, significant efforts are(More)
—This paper presents a tool ProNet, that is used to obtain the network trust based on incomplete provenance. We consider a multihop scenario where a set of source nodes observe an event and disseminate their observations as an information item through a multihop path to the command center. Nodes are assumed to embed their provenance details on the(More)
–Subsequent revisions to the JDL model modified definitions for model usefulness that stressed differentiation between fusion (estimation) and sensor management (control). Two diverging groups include one pressing for fusion automation (JDL revisions) and one advocating the role of the user (User-Fusion model). The center of debate is real-world delivery of(More)