Learn More
This paper defines the agile enterprise as one which is able to both manage and apply knowledge effectively, and suggests that value from either capability is impeded if they are not in balance. It looks at the application of knowledge as requiring a change, and overviews a body of analytical work on change proficiency in business systems and processes. It(More)
  • Rick Dove
  • 2010
Current system security strategies are failing and cannot be fixed by security engineers alone. The reason for failure is evident: the attack community operates as an intelligent, multi-agent, self organizing, system-of-systems - with swarm intelligence, tight learning loops, fast evolution, and dedicated intent. Next generation security must engage in true(More)
  • Rick Dove
  • 2011
The security gap is widening as adversarial communities of all kinds employ more sophisticated techniques and broaden their targets of opportunity. These adversarial communities are structured as self organized proactive collaborators in tight learning loops driving rapid innovation -- preying upon systems protected by wait and see strategies. In this paper(More)
OBJECTIVE To examine difficulties in sedation management in the critically ill patient and explore how a semi automated sedation controller can improve agitation control. To present recent work on measurements of agitation, dynamic systems modelling and control of patient agitation response. DATA SOURCES Articles and peer-reviewed studies identified(More)
Agile software development processes of various kinds have been proposed and put into practice. Generally they are specific-approach oriented at the operational-characteristic level. Ten underlying principles for agile systems were identified by examining over a hundred various non-software systems that exhibit agility. This paper outlines and discusses the(More)
Highly adaptable (agile) production systems and business practices are enabled by an engineering design which facilitates the reconfiguration and reuse of common modules across a scalable framework. Examples of agile fixtures, machines, cells, assembly lines, plants, and production organizations are presented; and a common set of ten underlying design(More)
  • Rick Dove
  • 2011
Anomaly detection promises to find elements of abnormality in a field of data. Computational barriers constrain anomaly detection to sparse subsets of total anomaly space. Barriers manifest in three ways — conserving both pattern memory capacity and pattern matching cycle time, while closing off scalability. The research reported here has discovered(More)
As used by current researchers, the term quorum sensing (QS) denotes a means for a group of independent agents to reach common decision, and then to take collective action. Although the independence of each of the agents leads to the strength of the collective action, this independence also leads to a non-deterministic outcome, since a quorum may not be(More)