Pontus Svenson

Learn More
Describing social positions and roles is an important topic within social network analysis. One approach is to compute a suitable equivalence relation on the nodes of the target network. One relation that is often used for this purpose is regular equivalence, or bisimulation, as it is known within the field of computer science. In this paper we consider a(More)
Lone wolf terrorists pose a large threat to modern society. The current ability to identify and stop these kinds of terrorists before they commit a terror act is limited since they are hard to detect using traditional methods. However, these individuals often make use of Internet to spread their beliefs and opinions, and to obtain information and knowledge(More)
In order to manage situations efficiently, commanders need to be aware of possible future events that might occur. They also need to be aware of the relative probabilities of different events, so that they know which events to take into account when making plans of their own. In this paper, we describe a concept prototype that was developed at FOI during(More)
Decision-makers and analysts need tools that help them make sense of the current situation. Information fusion can provide such tools. In this paper, we briefly describe the current capabilities of the Impactorium set of tools. Impactorium is a collection of software tools used to demonstrate information fusion capability, mainly for Operations Other Than(More)
Using T=0 Monte Carlo and simulated annealing simulation, we study the energy relaxation of ferromagnetic Ising and Potts models on random graphs. In addition to the expected exponential decay to a zero energy ground state, a range of connectivities for which there is power law relaxation and freezing to a metastable state is found. For some connectivities(More)
One of the most unpredictable forms of terrorism acts are those committed by a single individual, a so-called "lone wolf terrorist". The most difficult part in detecting a lone wolf is that they can come in any size, shape, and ethnicity and represent any ideology. However, there are some characteristic similarities that many lone wolves share. In this(More)
The aim of maritime surveillance systems is to detect threats early enough to take appropriate actions. We present the results of a study on maritime domain awareness performed during the fall of 2008. We analyze an identified capability gap of worldwide surveillance in the maritime domain, and report from a user workshop addressing the identified gap. We(More)
Complex networks have recently emerged as an independent area of study. It has connections to random graph theory from mathematics as well as to social network analysis and recent work by physicists interested in understanding the behaviour of large, interacting networks. Network models are important for information fusion in two manners. First, the command(More)
We introduce a model for simulating the movement of semi-autonomous mobile units that exhibit swarm-based behaviour and collectively form a mobile ad-hoc communication network. The mobility model is used to study how the topological properties of the resulting communication network change over time. The connectivity graphs are determined by allowing each(More)