Share Email Print

Proceedings of SPIE Volume 8405

Defense Transformation and Net-Centric Systems 2012
Editor(s): Raja Suresh
Format Member Price Non-Member Price
Softcover $105.00 * $105.00 *

*Available as a photocopy reprint only. Allow two weeks reprinting time plus standard delivery time. No discounts or returns apply.

Volume Details

Volume Number: 8405
Date Published: 14 May 2012
Softcover: 18 papers (182) pages
ISBN: 9780819490834

Table of Contents
show all abstracts | hide all abstracts
Frontmatter: Volume 8405
Author(s): Proceedings of SPIE
Show Abstract
Defining and using open architecture levels
Author(s): M. A. Cramer; A. W. Morrison; B. Cordes; J. R. Stack
Show Abstract
Models and algorithms for determining inter-unit network demand
Author(s): Jeffrey P. Ridder; Samuel W. Brett; Craig M. Burris; Jimmie G. McEver; Jack E. O'Donnel; David T. Signori; Heather W. Schoenborn
Show Abstract
A flexible tool for scenario analysis of network demand
Author(s): Jack E. O'Donnel; Ayanah S. George; Danielle M. Wynn; Samuel W. Brett; Jeffrey P. Ridder; David T. Signori; Heather W. Schoenborn
Show Abstract
The Ozone Widget Framework: towards modularity of C2 human interfaces
Author(s): David Benjamin Hellar; Laurian C. Vega
Show Abstract
Military clouds: utilization of cloud computing systems at the battlefield
Author(s): Sarıkürk Süleyman; Karaca Volkan; Kocaman İbrahim; Şirzai Ahmet
Show Abstract
Overcoming the challenges of secure mobile applications for network-centric, data-sensitive applications
Author(s): Bassam Farroha; Deborah Farroha
Show Abstract
Securing services in the cloud: an investigation of the threats and the mitigations
Author(s): Bassam S. Farroha; Deborah L. Farroha
Show Abstract
A framework for developing reliable corporate services in an agile environment
Author(s): Deborah Farroha; Bassam Farroha
Show Abstract
Modeling socio-cultural processes in network-centric environments
Author(s): Eunice E. Santos; Eugene Santos; John Korah; Riya George; Qi Gu; Keumjoo Kim; Deqing Li; Jacob Russell; Suresh Subramanian
Show Abstract
Protection without detection: a threat mitigation technique
Author(s): Joshua White; Joseph R. McCoy; Paul Ratazzi
Show Abstract
Dynamic routing control in heterogeneous tactical networks with multiple traffic priorities
Author(s): Mariusz A. Fecko; Larry Wong; Jaewong Kang; Andrzej Cichocki; Vikram Kaul; Sunil Samtani
Show Abstract
Proactive and adaptive reconfiguration for reliable communication in tactical networks
Author(s): Hui Zeng; Kyung Joon Kwak; Julia Deng; Bo Fu; Yang Xiao; John Jeski
Show Abstract
Addressing security, collaboration, and usability with tactical edge mobile devices and strategic cloud-based systems
Author(s): Christopher J. Graham
Show Abstract
A decision and utility theory construct for dynamic spectrum access systems
Author(s): Todd W. Martin; Kuo-Chu Chang
Show Abstract
Information dissemination in disadvantaged wireless communications using a data dissemination service and content data network
Author(s): Matthew Gillen; Joseph Loyall; Karen Zita Haigh; Robert Walsh; Craig Partridge; Gregory Lauer; Timothy Strayer
Show Abstract
Advanced thermal management technologies for defense electronics
Author(s): Kristen P. Bloschock; Avram Bar-Cohen
Show Abstract
Wide area persistent surveillance with no gimbal
Author(s): Geoffrey Egnal
Show Abstract
Kestrel: force protection and Intelligence, Surveillance, and Reconnaissance (ISR) persistent surveillance on aerostats
Author(s): David R. Luber; John E. Marion; David Fields
Show Abstract

© SPIE. Terms of Use
Back to Top