Sciweavers

676 search results - page 2 / 136
» Ubiquitous command and control
Sort
View
HCI
2007
13 years 6 months ago
Models of Command and Control
This paper reports on five different models of command and control. Four different models are reviewed: a process model, a contextual control model, a decision ladder model and a ...
Neville A. Stanton, Guy H. Walker, Daniel P. Jenki...
JDCTA
2008
74views more  JDCTA 2008»
13 years 5 months ago
Processing Logical Access Control Command in Computer System
Access control includes physical and logical access control. Physical access control protects the damage, theft and losing of assess. In this paper, we propose the method to prote...
Tsang-Yean Lee, Huey-Ming Lee, Wuu-Yee Chen, Heng-...
CSFW
1995
IEEE
13 years 8 months ago
Implementation of a discretionary access control model for script-based systems
Powerful applications can be implemented using command scripts. A command script is a program written by one user, called a writer, and made available to another user, called the ...
Trent Jaeger, Atul Prakash
WSC
2001
13 years 6 months ago
An agent architecture for implementing command and control in military simulations
In models of military operations it is important to include the Command and Control (C2) process in order to achieve a realistic simulation of a military force's behaviour an...
Colin R. Mason, James Moffat
WSC
2004
13 years 6 months ago
Agent - Based Model of Auftragstaktik: Self Organization in Command and Control of Future Combat Forces
Agent-based modeling is a framework that allows the analysis of distributed command-by-influence using mission-type orders known for over a century as Auftragstaktik in German Arm...
Robert H. Kewley