KEYWORDS: Distributed interactive simulations, Computer simulations, Information security, Network security, Computer architecture, Computer security, Data communications, Computing systems, Local area networks, Standards development
Distributed Mission Operations (DMO) is essentially a type of networked training that pulls in participants from all the
armed services and, increasingly, allies to permit them to "game" and rehearse highly complex campaigns, using a mix
of local, distant, and virtual players. The United States Air Force Research Laboratory (AFRL) is pursuing Science and
Technology (S&T) solutions to address technical challenges associated with distributed communications and
information management as DMO continues to progressively scale up the number, diversity, and geographic dispersal of
participants in training and rehearsal exercises.
KEYWORDS: Data modeling, Defense technologies, Systems modeling, Analytical research, Situational awareness sensors, Space operations, Defense and security, Decision support systems, Intelligence systems, Computer security
Semantic technology is becoming an increasingly viable solution to interoperability problems that arise as
user communities seek to interact within and across information spaces such as those that ride on the
Global Information Grid (GIG).1 Semantically-aware cross-domain information transformation and service
mediation capabilities can be used to improve interactions between diverse Communities of Interest (COIs)
and the software applications that service them.2 This paper is not so much about the details of the
technology itself, but is intended rather to focus on the operational domains in which interoperability
problems and needs exist for the warfighter that are likely to benefit from the application of semantic
technologies. It attempts to unveil military application areas against which technological solutions could be
developed by academia, industry, and other technology experts to forge a path toward semantic
interoperability and, ultimately, information superiority.3 It then provides an overview of on-going and
possible future areas of semantic technology research and development being pursued by the Air Force
Research Laboratory's Information Directorate (AFRL/IF) located in Rome, NY.
KEYWORDS: Electronic filtering, Data modeling, Prototyping, Systems modeling, Samarium, Standards development, Data processing, Visual process modeling, Defense and security, Space operations
In this paper, we propose the Composition Modeling Framework (CMF) as a standards-based information
engineering methodology that tackles existing and emerging Department of Defense (DoD) interoperability
problems using a bottom-up approach. We introduce CMF capabilities within the context of an
information space composed of repositories and a catalog that enables consumers' and producers'
information requirements to be met. This information space supports dynamic and unscripted interaction
among various producers and consumers, but its power as an information management tool is best
harnessed when its participants share common goals operating in unison as a Community of Interest (COI).
We present the CMF as one approach for representing the structure, meaning and abstract implementation
of the underlying information space that services a COI and its participants. In addition to facilitating intra-
COI interoperability, we demonstrate how CMF concepts can be used to construct cross-domain interoperability solutions by supporting inter-COI communication and understanding.
KEYWORDS: Environmental management, Logic, Knowledge management, Space operations, Data processing, Defense and security, Information fusion, Data modeling, Web services, Control systems
The Department of Defense is making significant investments to construct systems, built upon web services and their supporting technologies, that strive to achieve the goals of net-centricity. While these technologies address several of the traditional stumbling blocks to integration and interoperability, they leave issues of information management largely unaddressed. Indeed, the broad availability of these systems exacerbates, rather than reduces, stresses on our information management capabilities. This paper discusses the enterprise-level information management infrastructure objectives for providing net-centric military capabilities and more fundamental technical challenges derived from them.
Information management draws upon many disciplines including the collection of information needs, acquisition of information, information assessment, dissemination of information, and control of a managed information space. This paper introduces the general notions of information management in the large and the facet of information management known as manipulation, and provides an in-depth discussion of an advanced technology prototype implementation for the management of lightweight applications known as “fuselets” that perform value-added information processing functions over the managed information space. A fuselet is a light-weight, special-purpose Joint Battlespace Infosphere (JBI) client that provides value-added functions for information processing that are under the control of the JBI platform services. The information processing functions take existing information objects within the JBI information space as input and manipulate them in a specified manner to produce new information objects. Information manipulations performed by fuselets typically satisfy the recurring information needs that are found to be common across multiple Communities of Interest (COIs), but are also often customized or developed from scratch to satisfy the immediate needs of a specific COI or information consumer for which there is no other readily available solution. This paper will discuss the overall fuselet system architecture and a developmental prototype that establishes an operational framework for fuselet execution and management.
Conference Committee Involvement (1)
Defense Transformation and Net-Centric Systems 2011
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.