Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 37

Full-Text Articles in Computer Engineering

A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami Jan 2024

A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami

VMASC Publications

Named Data Network (NDN) is proposed for the Internet as an information-centric architecture. Content storing in the router’s cache plays a significant role in NDN. When a router’s cache becomes full, a cache replacement policy determines which content should be discarded for the new content storage. This paper proposes a new cache replacement policy called Discard of Fast Retrievable Content (DFRC). In DFRC, the retrieval time of the content is evaluated using the FIB table information, and the content with less retrieval time receives more discard priority. An impact weight is also used to involve both the grade of retrieval …


An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas Jan 2023

An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas

School of Cybersecurity Faculty Publications

Consumer Internet of Things (CIoT) manufacturers seek customer feedback to enhance their products and services, creating a smart ecosystem, like a smart home. Due to security and privacy concerns, blockchain-based federated learning (BCFL) ecosystems can let CIoT manufacturers update their machine learning (ML) models using end-user data. Federated learning (FL) uses privacy-preserving ML techniques to forecast customers' needs and consumption habits, and blockchain replaces the centralized aggregator to safeguard the ecosystem. However, blockchain technology (BCT) struggles with scalability and quick ledger expansion. In BCFL, local model generation and secure aggregation are other issues. This research introduces a novel architecture, emphasizing …


Agile Research - Getting Beyond The Buzzword, Trupti Narayan Rane Jan 2022

Agile Research - Getting Beyond The Buzzword, Trupti Narayan Rane

Engineering Management & Systems Engineering Faculty Publications

"Oh yeah, we're an Agile shop, we gave up Waterfall years ago." - product owners, managers, or could be anyone else. You will seldom have a conversation with a product or software development team member without the agile buzzword thrown at you at the drop of a hat. It would not be an oversell to say that Agile software development has been adopted at a large scale across several big and small organizations. Clearly, Agile is an ideology that is working, which made me explore more on its applicability in research. As someone who has been in the Information Technology …


Simulation For Cybersecurity: State Of The Art And Future Directions, Hamdi Kavak, Jose J. Padilla, Daniele Vernon-Bido, Saikou Y. Diallo, Ross Gore, Sachin Shetty Jan 2021

Simulation For Cybersecurity: State Of The Art And Future Directions, Hamdi Kavak, Jose J. Padilla, Daniele Vernon-Bido, Saikou Y. Diallo, Ross Gore, Sachin Shetty

VMASC Publications

In this article, we provide an introduction to simulation for cybersecurity and focus on three themes: (1) an overview of the cybersecurity domain; (2) a summary of notable simulation research efforts for cybersecurity; and (3) a proposed way forward on how simulations could broaden cybersecurity efforts. The overview of cybersecurity provides readers with a foundational perspective of cybersecurity in the light of targets, threats, and preventive measures. The simulation research section details the current role that simulation plays in cybersecurity, which mainly falls on representative environment building; test, evaluate, and explore; training and exercises; risk analysis and assessment; and humans …


Modeling And Simulation Of Cascading Failures In Transportation Systems During Hurricane Evacuations, Yuan Zhu, Kaan Ozbay, Hong Yang, Fan Zuo, Di Sha Jan 2021

Modeling And Simulation Of Cascading Failures In Transportation Systems During Hurricane Evacuations, Yuan Zhu, Kaan Ozbay, Hong Yang, Fan Zuo, Di Sha

Computational Modeling & Simulation Engineering Faculty Publications

Effective and timely evacuation is critical in alleviating the impact of hurricanes. As such, evacuation models are often sought to support the preparedness of evacuations. One important task in the modeling process is to evaluate exogenous factors that cause transportation system capacity loss during evacuation. Typical factors include direct damage to the roadway network due to storm surge and cascading impacts because of other facilities failures. For example, power outage can lead to signal failure and subway suspension. This paper aims to develop a macroscopic simulation-based approach to study the capacity loss of the roadway network in evacuation due to …


Hidden Markov Model And Cyber Deception For The Prevention Of Adversarial Lateral Movement, Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua Jan 2021

Hidden Markov Model And Cyber Deception For The Prevention Of Adversarial Lateral Movement, Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua

Computational Modeling & Simulation Engineering Faculty Publications

Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted nation-states and their associated entities, including private and corporate sectors. Cyber deception has emerged as a defense approach to secure our cyber infrastructure from APTs. Practical deployment of cyber deception relies on defenders' ability to place decoy nodes along the APT path optimally. This paper presents a cyber deception approach focused on predicting the most likely sequence of attack paths and deploying decoy nodes along the predicted path. Our proposed approach combines reactive (graph analysis) and proactive (cyber deception technology) defense to thwart the adversaries' lateral movement. The …


Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla Jan 2020

Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla

VMASC Publications

Blockchain promises to provide a distributed and decentralized means of trust among untrusted users. However, in recent years, a shift from decentrality to centrality has been observed in the most accepted Blockchain system, i.e., Bitcoin. This shift has motivated researchers to identify the cause of decentrality, quantify decentrality and analyze the impact of decentrality. In this work, we take a holistic approach to identify and quantify decentrality in Blockchain based systems. First, we identify the emergence of centrality in three layers of Blockchain based systems, namely governance layer, network layer and storage layer. Then, we quantify decentrality in these layers …


Implementing Asynchronous Linear Solvers Using Non-Uniform Distributions, Erik Jensen, Evan C. Coleman, Masha Sosonkina Jan 2020

Implementing Asynchronous Linear Solvers Using Non-Uniform Distributions, Erik Jensen, Evan C. Coleman, Masha Sosonkina

Computational Modeling & Simulation Engineering Faculty Publications

Asynchronous iterative methods present a mechanism to improve the performance of algorithms for highly parallel computational platforms by removing the overhead associated with synchronization among computing elements. This paper considers a class of asynchronous iterative linear system solvers that employ randomization to determine the component update orders, specifically focusing on the effects of drawing the order from non-uniform distributions. Results from shared-memory experiments with a two-dimensional finite-difference discrete Laplacian problem show that using distributions favoring the selection of components with a larger contribution to the residual may lead to faster convergence than selecting uniformly. Multiple implementations of the randomized asynchronous …


A Reliable Data Provenance And Privacy Preservation Architecture For Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu Jan 2018

A Reliable Data Provenance And Privacy Preservation Architecture For Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu

VMASC Publications

Cyber-physical systems (CPS) including power systems, transportation, industrial control systems, etc. support both advanced control and communications among system components. Frequent data operations could introduce random failures and malicious attacks or even bring down the whole system. The dependency on a central authority increases the risk of single point of failure. To establish an immutable data provenance scheme for CPS, the authors adopt blockchain and propose a decentralized architecture to assure data integrity. In business-driven CPS, end users are required to share their personal information with multiple third parties. To prevent data leakage and preserve user privacy, the authors isolate …


Stability And Sensitivity Measures For Solutions In Complex, Intelligent, Adaptive And Autonomous Systems, Andreas Tolk Jan 2016

Stability And Sensitivity Measures For Solutions In Complex, Intelligent, Adaptive And Autonomous Systems, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

Simulation has become a pivotal tool for the design, analysis, and control of complex, intelligent, adaptive and autonomous systems and its components. However, due to the nature of these systems, traditional evaluation practices are often not sufficient. As the components follow adaptive rules, the cumulative events often exploit bifurcation enabling events, leading to clusters of solutions that do not follow the usual rules for standard distributed events. When using simulation for design, analysis, and control of such systems, the evaluation needs to be richer, applying bifurcation and cluster analysis to understand the distribution, applying factor analysis to understand the important …


Engineering Analytics: Research Into The Governance Structure Needed To Integrate The Dominant Design Methodologies, Teddy Steven Cotter Jan 2015

Engineering Analytics: Research Into The Governance Structure Needed To Integrate The Dominant Design Methodologies, Teddy Steven Cotter

Engineering Management & Systems Engineering Faculty Publications

In the ASEM-IAC 2014, Cotter (2014) explored the current state of engineering design, identified the dominate approaches to engineering design, discussed potential contributions from the new field of data analytics to engineering design, and proposed an Engineering Analytics framework that integrates the dominate engineering design approaches and data analytics within a human-intelligence/machine-intelligence (HI-MI) design architecture. This paper reports research applying ontological engineering to integrate the dominate engineering design methodologies into a systemic engineering design decision governance architecture.


Improving C2 Effectiveness Based On Robust Connectivity, S. Deller, A. Tolk, G. Rabadi, S. Bowling Jan 2014

Improving C2 Effectiveness Based On Robust Connectivity, S. Deller, A. Tolk, G. Rabadi, S. Bowling

Computational Modeling & Simulation Engineering Faculty Publications

This chapter describes an approach to develop an improved metric for network effectiveness through the use of Cares' (2005) Information Age Combat Model (IACM) as a context for combat (or competition) between networked forces. The IACM highlights the inadequacy of commonly used quantifiable metrics with regards to comparing networks that differ only by the placement of a few links. An agent-based simulation is used to investigate the potential value of the Perron-Frobenius Eigenvalue (λPFE) as an indicator of network effectiveness. The results validate this assumption. Another measurement is proven to be equally important, namely the robustness of a …


The Value Of Modeling And Simulation Standards, Andrew J. Collins, David Meyr, Solomon Sherfey, Andreas Tolk, Mikel Petty Jan 2012

The Value Of Modeling And Simulation Standards, Andrew J. Collins, David Meyr, Solomon Sherfey, Andreas Tolk, Mikel Petty

VMASC Publications

In the current economic climate, there is a requirement to justify all government spending by demonstrating the added-value that the expenditure gives. Modeling and Simulation (M&S) community is not exempted from this rule. This paper focuses on attempts to value standards and demonstrates that even though a myriad of different standards exist in the United States today, no one has "cracked the nut" on determining their value. This does not mean that standards are without value. The paper highlights their importance to our society and human development as a whole. Thus if we cannot give a value to M&S standards, …


Executable Architecture Research At Old Dominion University, Andreas Tolk, Johnny J. Garcia, Edwin A. Shuman Jan 2011

Executable Architecture Research At Old Dominion University, Andreas Tolk, Johnny J. Garcia, Edwin A. Shuman

Computational Modeling & Simulation Engineering Faculty Publications

Executable Architectures allow the evaluation of system architectures not only regarding their static, but also their dynamic behavior. However, the systems engineering community do not agree on a common formal specification of executable architectures. To close this gap and identify necessary elements of an executable architecture, a modeling language, and a modeling formalism is topic of ongoing PhD research. In addition, systems are generally defined and applied in an operational context to provide capabilities and enable missions. To maximize the benefits of executable architectures, a second PhD effort introduces the idea of creating an executable context in addition to the …


Enhancing Simulation Composability And Interoperability Using Conceptual/Semantic/Ontological Models, Andreas Tolk, John A. Miller Jan 2011

Enhancing Simulation Composability And Interoperability Using Conceptual/Semantic/Ontological Models, Andreas Tolk, John A. Miller

Computational Modeling & Simulation Engineering Faculty Publications

(First paragraph) Two emerging trends in Modeling and Simulation (M&S) are beginning to dovetail in a potentially highly productive manner, namely conceptual modeling and semantic modeling. Conceptual modeling has existed for several decades, but its importance has risen to the forefront in the last decade (Taylor and Robinson, 2006; Robinson, 2007). Also, during the last decade, progress on the Semantic Web has begun to influence M&S, with the development of general modeling ontologies (Miller et al, 2004), as well as ontologies for modeling particular domains (Durak, 2006). An ontology, which is a formal specification of a conceptualization (Gruber et al, …


Do We Need M&S Science?, Jose J. Padilla, Saikou Y. Diallo, Andreas Tolk Jan 2011

Do We Need M&S Science?, Jose J. Padilla, Saikou Y. Diallo, Andreas Tolk

VMASC Publications

No abstract provided.


Software Reuse For Modeling And Simulation, Emily Andrew, Charles D. Turnitsa, Andreas Tolk Jan 2011

Software Reuse For Modeling And Simulation, Emily Andrew, Charles D. Turnitsa, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

In Modeling and Simulation, as a distinct area of software engineering, there is much interest in being able to reuse software components. However, the practice of simulation development and maintenance is different from software engineering because of several factors. In this paper, a brief overview of the foundations of interoperability, and how they apply to the reuse of model based software is explored, as well as examination of current practices to include M&S software repositories. Some recommendations, based on research at the Virginia Modeling Analysis and Simulation Center (VMASC) and practice at the Raytheon Company Network Centric Services, are made.


Nato Human View Architecture And Human Networks, Holly A. H. Handley, Nancy P. Houston Mar 2010

Nato Human View Architecture And Human Networks, Holly A. H. Handley, Nancy P. Houston

Engineering Management & Systems Engineering Faculty Publications

The NATO Human View is a system architectural viewpoint that focuses on the human as part of a system. Its purpose is to capture the human requirements and to inform on how the human impacts the system design. The viewpoint contains seven static models that include different aspects of the human element, such as roles, tasks, constraints, training and metrics. It also includes a Human Dynamics component to perform simulations of the human system under design. One of the static models, termed Human Networks, focuses on the human-to-human communication patterns that occur as a result of ad hoc or deliberate …


Using Simulation Systems For Decision Support, Andreas Tolk Jan 2010

Using Simulation Systems For Decision Support, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

This chapter describes the use of simulation systems for decision support in support of real operations, which is the most challenging application domain in the discipline of modeling and simulation. To this end, the systems must be integrated as services into the operational infrastructure. To support discovery, selection, and composition of services, they need to be annotated regarding technical, syntactic, semantic, pragmatic, dynamic, and conceptual categories. The systems themselves must be complete and validated. The data must be obtainable, preferably via common protocols shared with the operational infrastructure. Agents and automated forces must produce situation adequate behavior. If these requirements …


Conceptual Requirements For Command And Control Languages, Andreas Tolk, Curtis L. Blais, Saikou Y. Diallo, Charles Turnitsa Jan 2009

Conceptual Requirements For Command And Control Languages, Andreas Tolk, Curtis L. Blais, Saikou Y. Diallo, Charles Turnitsa

Computational Modeling & Simulation Engineering Faculty Publications

The current Coalition Battle Management Language initiative (C-BML) will define a language to unambiguously exchange command and control information between systems. This paper introduces a categorization that may be used to guide the process of developing C-BML effectively by enumerating the conceptual requirements the authors have identified in model-based data engineering and process engineering based studies in various domains.

First, it is important to distinguish if application of the language will support the planning, execution, or observation phase of command and control. While C-BML already distinguishes between tasking and reporting, planning is a category with different requirements.

Second, the language …


Harmonizing Bml Approaches: Grammars And Data Models For A Bml Standard, Dietmar Kunde, Thomas Orichel, Andreas Tolk, Ulrich Schade, Michael R. Hieb Jan 2009

Harmonizing Bml Approaches: Grammars And Data Models For A Bml Standard, Dietmar Kunde, Thomas Orichel, Andreas Tolk, Ulrich Schade, Michael R. Hieb

Computational Modeling & Simulation Engineering Faculty Publications

Battle Management Language (BML) is being developed as an open standard that unambiguously formalizes and specifies Command and Control information, including orders and reports built upon precise representations of tasks. BML is a language specification, based on doctrine and consistent with Coalition standards. The goal of BML is to enable and improve the interoperability in the C2 area, especially by enabling also the military communication with simulation systems and future robotic forces.

Although the need for BML is well documented, a SISO standard has still not been achieved. At present, there are two recommended approaches focusing on different aspects. In …


Utilizing Strategic Project Management Processes And The Nato Code Of Best Practice To Improve Management Of Experimentation Events, Andreas Tolk, Rafael E. Landaeta, Robert H. Kewley, Thomas T. Litwin Jan 2009

Utilizing Strategic Project Management Processes And The Nato Code Of Best Practice To Improve Management Of Experimentation Events, Andreas Tolk, Rafael E. Landaeta, Robert H. Kewley, Thomas T. Litwin

Computational Modeling & Simulation Engineering Faculty Publications

Systems engineering and project management are two core engineering management processes supported by core quantitative disciplines within engineering management problems. Traditional approaches to systems engineering focus on a single system being engineered and managed (i.e., project managed), while challenges addressing composition of systems of systems and the reuse of systems for new solutions require a strategic management approach that promote a process flow in which the outputs of one project (e.g., deliverables, knowledge, work documents) are captured for the benefit of other projects within and outside the project-based organization. Two other core processes of engineering management are therefore critical to …


Exploring Primitives Of Meaning In Support Of Interoperability, Charles D. Turnitsa, Andreas Tolk, Robert Kewley Jan 2009

Exploring Primitives Of Meaning In Support Of Interoperability, Charles D. Turnitsa, Andreas Tolk, Robert Kewley

Computational Modeling & Simulation Engineering Faculty Publications

Semantic mismatch between systems is due, in part, to the grouping together of terms who have defined meaning in different levels of granularity, and which are composed together into different groupings by distinct systems. It has been proposed that making use of elemental concepts (referred to here as primitives of meaning) can assist in interoperability, but seeking to define all terms at a level of granularity equal to or greater than that of all involved systems.

By decomposing a system’s groups of composed terms into primitives of meaning, the building blocks that can be reassembled into the compositions required by …


An Extended Interoperability Framework For Joint Composability, Andreas Tolk, Charles D. Turnitsa Jan 2009

An Extended Interoperability Framework For Joint Composability, Andreas Tolk, Charles D. Turnitsa

Computational Modeling & Simulation Engineering Faculty Publications

Interoperation of systems is defined by the aspects of integratability, interoperability, and composability. It is therefore needed, to address all levels of interoperation - from conceptual models via implemented systems to the supported infrastructure - accordingly in an interoperation framework.

Several candidates are available and provide valuable part solution. This paper evaluates the Base Object Models (BOMs), Discrete Event Simulation Specifications (DEVS), Unified Language Model (UML) artifacts as used within the Test and Training Enabling Architecture (TENA), the Object-Process Methodology (OPM), and Conceptual Graphs (CG) regarding their contribution.

Using the Levels of Conceptual Interoperability Model (LCIM), an extended interoperability framework …


Applying Model-Based Data Engineering To Evaluate The Alignment Of Information Modeled Within Jc3iedm, Msdl, And Matrex-Fom, Anil Ustun, Andreas Tolk, Saikou Diallo Jan 2009

Applying Model-Based Data Engineering To Evaluate The Alignment Of Information Modeled Within Jc3iedm, Msdl, And Matrex-Fom, Anil Ustun, Andreas Tolk, Saikou Diallo

Computational Modeling & Simulation Engineering Faculty Publications

The need for a common representation of entities and their relations to support the easier composition and federation of independently developed solutions in support of the user has been identified and addressed in several papers presented during recent simulation interoperability workshop. One of the underlying assumptions is that standards derived from the same conceptual domain can easily be converted into each others, as they deal with the same concepts. In a project conducted for the U.S. Army’s Program Executive Office (PEO) Soldier, three of such solutions for military operations (with focus on the land forces) were utilized to capture the …


C2 Domain Ontology Within Our Lifetime, Leslie Winters, Andreas Tolk Jan 2009

C2 Domain Ontology Within Our Lifetime, Leslie Winters, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

Agile Command and Control (C2) requires agile information sharing with an increasingly wide variety of military and non-military partners. While current net-centric approaches may improve information sharing within a particular niche of C2, they do not support information sharing across the larger C2 domain. Although not a silver bullet, the development and application of a C2 domain ontology to improve C2 data and service integration appears to be increasingly realistic. In fact, there are several examples of successful ontology applications in domains such as medicine, biology, and engineering, and the new discipline of Applied Ontology is emerging. C2 data, architecture, …


Community-Of-Interest (Coi) Model-Based Languages Enabling Composable Net-Centric Services, Andreas Tolk, Saikou Y. Diallo Jan 2008

Community-Of-Interest (Coi) Model-Based Languages Enabling Composable Net-Centric Services, Andreas Tolk, Saikou Y. Diallo

Computational Modeling & Simulation Engineering Faculty Publications

Net-centric services shall be designed to collaborate with other services used within the supported Community of Interest (COI). This requires that such services not only be integratable on the technical level and interoperable on the implementation level, but also that they are composable in the sense that they are semantically and pragmatically consistent and able to exchange information in a consistent and unambiguous way.

In order to support Command-and-Control with Composable Net-centric Services, the human-machine interoperation must be supported as well as the machine-machine interoperation. This paper shows that techniques of computer linguistic can support the human-machine interface by structuring …


Filling The Ontology Space For Coalition Battle Management Language, Charles Turnitsa, Curtis Blais, Andreas Tolk Jan 2007

Filling The Ontology Space For Coalition Battle Management Language, Charles Turnitsa, Curtis Blais, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

The Coalition Battle Management Language is a language for representing and exchanging plans, orders, and reports across live, constructive and robotic forces in multi-service, multi-national and multi-organizational operations. Standardization efforts in the Simulation Interoperability Standards Organization seek to define this language through three parallel activities: (1) specify a sufficient data model to unambiguously define a set of orders using the Joint Command, Control, and Consultation Information Exchange Data Model (JC3IEDM) as a starting point; (2) develop a formal grammar (lexicon and production rules) to formalize the definition of orders, requests, and reports; (3) develop a formal battle management ontology to …


A Tabu Search Algorithm To Minimize The Makespan For The Unrelated Parallel Machines Scheduling Problem With Setup Times, Magdy Helal, Ghaith Rabadi, Ameer Al-Salem Jan 2006

A Tabu Search Algorithm To Minimize The Makespan For The Unrelated Parallel Machines Scheduling Problem With Setup Times, Magdy Helal, Ghaith Rabadi, Ameer Al-Salem

Engineering Management & Systems Engineering Faculty Publications

In this paper we propose a tabu search implementation to solve the unrelated parallel machines scheduling problem with sequence- and machine- dependent setup times to minimize the schedules makespan. The problem is NP-hard and finding an optimal solution efficiently is unlikely. Therefore, heuristic techniques are more appropriate to find near-optimal solutions. The proposed tabu search algorithm uses two phases of perturbation schemes: the intra-machine perturbation, which optimizes the sequence of jobs on the machines, and the inter-machine perturbation, which balances the assignment of the jobs to the machines. We compare the proposed algorithm to an existing one that addressed the …


Coalition Battle Management Language (C-Bml) Study Group Final Report, Major Kevin Galvin, Mike Hieb, Andreas Tolk, Charles Turnitsa, Curtis Blais, James Montgomery Dec 2005

Coalition Battle Management Language (C-Bml) Study Group Final Report, Major Kevin Galvin, Mike Hieb, Andreas Tolk, Charles Turnitsa, Curtis Blais, James Montgomery

Computational Modeling & Simulation Engineering Faculty Publications

Interoperability across Modeling and Simulation (M&S) and Command and Control (C2) systems continues to be a significant problem for today's warfighters. M&S is well-established in military training, but it can be a valuable asset for planning and mission rehearsal if M&S and C2 systems were able to exchange information, plans, and orders more effectively. To better support the warfighter with M&S based capabilities, an open standards-based framework is needed that establishes operational and technical coherence between C2 and M&S systems.