Marion G Ceruti

Marion G Ceruti
  • Ph.D., Physical Chemistry
  • Researcher at Navy's Space and Naval Warfare Systems Center Pacific

About

139
Publications
68,641
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
886
Citations
Current institution
Navy's Space and Naval Warfare Systems Center Pacific
Current position
  • Researcher
Additional affiliations
June 1979 - May 2011
United States Navy
Position
  • Researcher
September 1973 - June 1979
University of California, Los Angeles
Position
  • Post-Graduate Research Chemist and Fellow

Publications

Publications (139)
Patent
Full-text available
A system includes a controller, a Hall-effect sensor and transceiver connected to the controller, and a flux-producint element having a plurality of magnetic flux lines emanating therefrom. The system may be secured to or contained within a wearable glove. The flux-producing element may be coupled to an object separate from the wearable glove. The...
Conference Paper
Full-text available
The lifecycle management of Command and Control and Command, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) technologies depends on test data for research, development, testing, evaluation, maintenance, and sustainment. Creating the infrastructure necessary to support these activities is difficult and expensive. P...
Conference Paper
Full-text available
Decision makers in command centers need better methods to deal with deceptive information before it influences and degrades the outcome of command decisions. Deception poses unique threats to coalitions that are less likely to occur with individual forces. Coalitions also offer diverse viewpoints and approaches to dealing with deception. Cognitive...
Conference Paper
Full-text available
Civil authorities and emergency managers need to collect, manage, analyze and display network and geographic information to understand better the connectivity of critical sectors of the community and their spatial relationships to physical attributes of geography and terrain, the built environment, critical infrastructures and key resources, and th...
Conference Paper
Full-text available
This paper describes the architecture and requirements of an integrated system that is needed to support command and control for the interoperability-capability focus area. The architecture is designed to enhance situational awareness during emergencies such as earthquakes, volcanic eruptions, wild fires, floods, tsunamis, mud slides, storms, torna...
Conference Paper
Full-text available
This paper describes the work of the W3C Decisions and Decision-making Incubator 1 , with the goal to identify requirements for a standard decision format, through a set of use cases, and to develop a first version of a potential standard format for representing decisions, fulfilling the requirements of the use cases and exploiting semantic web sta...
Conference Paper
Full-text available
This paper describes the work of the W3C Decisions and Decision-making Incubator1, with the goal to identify requirements for a standard decision format, through a set of use cases, and to develop a first version of a potential standard format for representing decisions, fulfilling the requirements of the use cases and exploiting semantic web stand...
Conference Paper
Full-text available
This paper describes the architecture and requirements of an integrated system that is needed to support the command-and-control requirements of the Department of Homeland Security during crisis prevention, disaster relief, and other critical operations. The architecture is based on emerging science and technology that has been under development in...
Conference Paper
Full-text available
This paper describes an analytical study of language, culture, cognition, and their contribution to concepts in an upper ontology to support asymmetric and irregular warfare for the U.S. Marine Corps. This ontology is designed to interact with decision-support applications for fighting the global war on terror. The long-term goal of this effort is...
Conference Paper
Full-text available
This position paper describes a vision of how Chemical Biological Radiological and Nuclear (CBRN) situation awareness and threat assessment can benefit from the use of Gesture-Directed Sensor-Information Fusion (GDSIF). It describes a concept of operations for the war fighter " s use of electronic wireless-communication gloves (eGloves) to communic...
Conference Paper
Full-text available
This paper describes design considerations for the implementation of a decision-support system based on a Common Decision Exchange Protocol (CDEP), which is an XML-, REST-based protocol for representing generic human decisions in a simple, interoperable format. The paper also describes characteristics of decisions that should be expressed using CDE...
Conference Paper
Full-text available
Research shows that an analytical solution of information velocity is intractable but metrics that support understanding the factors that affect information flow can be useful. This paper describes an agent-based model for information flow that explores physical analogs to the metric's causal measures. Interactions and exchanges are modeled as phys...
Conference Paper
Full-text available
This paper explains how to participate in Information- Technology (IT) standards organizations for employees of the Departments of Defense (DoD) and Homeland Security (DHS). When these commercial tools are acquired or developed for first responders or war fighter, these tools will interoperate with other tools and will meet the requirements if the...
Article
“Global Interoperability Using Semantics, Standards, Science and Technology” is a concept that is predicated on the assumption that the semantic integration, frameworks and standards that support information exchange, and advances in science and technology can enable information-systems interoperability for many diverse users. This paper recommends...
Conference Paper
Full-text available
This paper describes human-system software techniques to improve communications while wearing Mission-Oriented Protective Posture (MOPP) gear. Chemical Biological Defense (CBD) situation awareness and threat assessment can be enhanced using visual and multi-modal information representations and mission-context-appropriate user interfaces to manage...
Conference Paper
Full-text available
A wireless data glove was developed to control a Talon robot. Sensors mounted on the glove send signals to a processing unit, worn on the user???s forearm that translates hand postures into data. An RF transceiver, also mounted on the user, transmits the encoded signals representing the hand postures and dynamic gestures to the robot via RF link. C...
Conference Paper
Full-text available
Motivation – Share information; make better decisions. Research approach – Explore the use of XML code to document and transmit characteristics of decisions. Findings/Design – The paper recommends a CDEP. Research limitations/Implications – This work implies that we need an open-standard body similar to OMG in the object-oriented world. This would...
Conference Paper
Full-text available
The rapid flow of information through a command-and-control organization strengthens the agility of the command and increases the efficiency of the organization. Therefore, a metric is proposed for the speed of useful information as it flows in an organization, enterprise or command structure. Information is assumed to be useful if a member of the...
Conference Paper
Full-text available
This paper describes an agent-based model for exploring the effects of traditional supervisory merit-based promotions and hierarchical organizational structure on the flow of information. Each agent simulating a worker follows the same rules for handling information and promotion: Agents differ only in the breadth of information they consider impor...
Conference Paper
Full-text available
Military personnel need better ways to communicate in hostile, noisy, silence-mandated, and/or extreme environments. Typing on a keyboard is difficult and impractical while wearing comprehensive protective clothing. Wireless data gloves were researched and developed to transmit and receive ASCII code and other signals as hand gestures. Two categori...
Conference Paper
Full-text available
This position paper describes a vision of how Chemical Biological Radiological and Nuclear (CBRN) situation and threat assessment [1] can benefit from assimilating and fusing all-source data. Leveraging net-centric enterprise services can enable a distributed CBRN Common-Operating Picture (COP). Distributed processing using a Service-Orientated Arc...
Technical Report
Full-text available
Modeling and simulation, intelligent software agents, and other technologies can support network centric distributed tracking. These technologies came together in the Knowledge Management for Distributed Tracking (KMDT) research and development program to improve naval command, control, and decision support. The program’s approach is based on the u...
Conference Paper
Full-text available
Service-oriented architecture (SOA) ideally provides reliable access to a scalable, agile, and affordable computing environment. In the tactical military context its ultimate goals are greater situational awareness and enhanced operational capability through the efficient sharing of information. Component systems, such as networks and data sources,...
Conference Paper
Full-text available
The Mayan languages have been spoken for over 5,000 years. The language structure, syntax, and semantics of Mayan languages are rich and varied. This paper describes how to apply some principles of the Maya Hieroglyphic language to interactive command-and-control displays in decision-support system. It also suggests some preliminary elements of a t...
Conference Paper
Full-text available
New technology is needed to counter the growing threat of chemical, biological, radiological, nuclear, and explosive (CBRNE) terrorist attacks. Joint Department of Defense (DoD) CBRNE programs can support homeland-defense efforts in this area. This paper explains some DoD- developed technology involved in advancing and integrating hardware and soft...
Conference Paper
Full-text available
This paper presents concepts, features, and important considerations in the development of an iconic language for military command-and-control com- munications. It describes communities of interest in the Department of Defense and how iconic language as used in the various communities can differ. Various sections are focused on the components of th...
Conference Paper
Full-text available
The purpose of this investigative study is to develop a model for a system of systems to improve situation awareness and targeting through a real-time aerially deployed wireless sensor network. The main hypothesis of this work is that scalable, affordable, real-time wireless network can contribute to the common operating picture. This network can b...
Conference Paper
Full-text available
This paper presents concepts, content, status, applications and challenges of chat as used in the military context of secure net-centric command and control. It describes the importance of chat as it contributes to situation assessment and the common operating picture, which presents current collective knowledge of the battle space. The paper discu...
Conference Paper
Full-text available
Knowledge Management for Distributed Tracking is an ongoing research and development program to improve naval command, control, and decision support. The program's approach includes modeling and simulation, intelligent software agents, integrated-sensor ontology, and reusing methods from past projects. The software simulates a hypothetical scenario...
Conference Paper
Full-text available
The focus of this poster is on an analysis of the relationships between U.S. Department of Defense (DoD) networks and policy, including policy about technology acquisition and usage. Policy affects technology research, development, test, evaluation, transition and refresh. Specific network-related technology areas support military command, control,...
Article
Full-text available
This article explains some of the technology involved in advancing and integrating development of the ultra-sensitive Surface-Enhanced Raman Spectroscopy (SERS)-based hardware, the Knowledge Amplification by Structured Expert Randomization (KASER) anthrax detector, the Joint Warning and Reporting Network (JWARN) Component Interface Device (JCID)-on...
Article
This paper expands and consolidates the use of analogies in thermodynamics to explore concepts in the characterization of information systems. The analogy spans the range of information systems to include databases, knowledge bases and model bases. It includes but is not limited to pressure, expressiveness, temperature, tractability, degrees of ord...
Conference Paper
Full-text available
Knowledge Management for Distributed-Tracking (KMDT) is an ongoing research and development project to explore methods to improve military-information functions in the battle space, such as command, control, and decision sup-port. It features a scenario that shows how knowledge-management technologies, such as ontologies and intelligent agents can...
Chapter
Full-text available
A major problem in military command centers is the delivery of correct and complete information about events in the battle space to the commanders in a timely manner. Another problem is how to integrate heterogeneous sensor data to capture the concepts, assumptions, and intent of the data sources. The U.S. Navy is addressing this problem through FO...
Conference Paper
Full-text available
This paper describes how pedigree is used to support and enhance situation and threat assessment. It is based on the findings of the technology group of the Data Fusion Levels Two and Three Workshop sponsored by the Office of Naval Research held in Arlington, VA from 15-18 Nov. 2005. It identifies areas that need improvement in situation assessment...
Conference Paper
Full-text available
Knowledge management for distributed-tracking (KMDT) is a U.S. Naval research and development project to improve military-communications and information functions in the battle space. These functions include command, control, data fusion, and decision support. It features a scenario for modeling and simulation that shows how knowledge-management te...
Conference Paper
Full-text available
This paper describes Knowledge Management for Distributed-Tracking (KMDT), which is an ongoing research and development project to explore methods to improve military functions in the battle space, such as command, control, and decision support. It features a hypothetical use-case scenario that shows how knowledge-management technologies, such as o...
Article
Full-text available
This paper describes key concepts and applications of composable FORCEnet, which is the US Navy’s operational construct architectural framework for naval warfare in the information age. It describes the concepts and architecture, in several categories: 1) systems and general software engineering; 2) networks; 3) intelligent software; and 4) network...
Article
Full-text available
This paper describes key concepts and applications of composable FORCEnet, which is the US Navy’s operational construct architectural framework for naval warfare in the information age. It describes the concepts and architecture, in several categories: 1) systems and general software engineering; 2) networks; 3) intelligent software; and 4) network...
Article
Full-text available
This paper reports progress and practical experience in security-requirements engineering using the security center Knowledge Web (KWeb) as a case study. It describes the project, architecture, and the approach of the Spiral System Implementation Methodology (SSIM) in all three phases of development. The network-centric best practices, which are so...
Conference Paper
Full-text available
This paper describes the application and the approach to modeling and simulation for Knowledge Management for Distributed Tracking (KMDT). This is an ongoing research and development program to explore methods to improve command, control, and decision support functions in the battle space. The focus of the simulation effort is on a hypothetical sce...
Conference Paper
Knowledge Management for Distributed-Tracking (KMDT) is an ongoing research and development project to explore methods to improve military-information functions in the battle space, such as command, control, and decision support. It features a scenario that shows how knowledge-management technologies, such as ontologies and intelligent agents can b...
Conference Paper
Knowledge Management for Distributed-Tracking (KMDT) is an ongoing research and development project to explore methods to improve military-information functions in the battle space, such as command, control, and decision support. It features a scenario that shows how knowledge-management technologies, such as ontologies and intelligent agents can b...
Conference Paper
Knowledge Management for Distributed-Tracking (KMDT) is an ongoing research and development project to explore methods to improve military-information functions in the battle space, such as command, control, and decision support. It features a scenario that shows how knowledge-management technologies, such as ontologies and intelligent agents can b...
Article
This paper describes key concepts and applications of composable FORCEnet, which is the US Navy's operational construct architectural framework for naval warfare in the information age. It describes the concepts and architecture, in several categories: 1) systems and general'software engineering; 2) networks; 3) intelligent software; and 4) network...
Conference Paper
This paper reports progress and practical experience in security-requirements engineering using the security center Knowledge Web (KWeb) as a case study. It describes the project, architecture , and the approach of the Spiral System Implementation Methodology (SSIM). This engineering approach is an example of rapid prototyping in which the requirem...
Conference Paper
Full-text available
This paper reports progress and practical experience in security-requirements engineering using the security center Knowledge Web (KWeb) as a case study. It describes the project, architecture , and the approach of the Spiral System Implementation Methodology (SSIM). This engineering approach is an example of rapid prototyping in which the requirem...
Conference Paper
Full-text available
This paper describes key concepts of composable FORCEnet, which is the US Navy's operational construct architectural framework for naval warfare in the information age. It describes the concepts and architecture, in several categories: 1) systems and general software engineering; 2) networks ; 3) intelligent software; and 4) network security. The e...
Conference Paper
Full-text available
For Pt. 2 see ibid., (2004). For Pt.1 see ibid., p.170-175 (2002). This paper expands the use of analogies in thermodynamics to explore concepts in the characterization of information systems. The focus is on systems of liquid-liquid equilibrium and how they are similar to information-systems integration. New ideas, such as metrics, are introduced...
Conference Paper
Full-text available
In this paper, we explore the interdependent roles of computational intelligence, data mining, and machine learning. We explain how these three seemingly independent AI specialties are inextricably linked through the science of randomization and reuse. Computational intelligence is shown to imply soft computing, whose bounds are soft or fuzzy only...
Conference Paper
Full-text available
This paper describes the authors’ efforts to develop a pedigree ontology for level- one sensor fusion. This work was performed in the context of naval operations but the concepts employed are applicable to any domain involving sensor fusion. The ontology that has been developed is formally represented using OWL, the Web Ontology Language used in de...
Conference Paper
Full-text available
In this paper we discuss the need for real-time data mining for many applications in government and industry and describe resulting research issues. We also discuss dependability issues including incorporating security, integrity, timeliness and fault tolerance into data mining. Several different data mining outcomes are described with regard to th...
Conference Paper
Full-text available
This paper presents an approach to object-oriented programming (OOP) through software intelligent retrieval and reuse. OO development never has met the objectives for software reuse. Thus, a Uniform Modeling Language (UML) has arisen as a standard top-down way for describing component functions and properties. Components may be defined in any langu...
Article
This paper reports progress and practical experience in security-requirements engineering using the security center Knowledge Web (KWeb) as a case study. It describes the project, architec-ture, and the approach of the Spiral System Implementation Methodology (SSIM). This engineering approach is an example of rapid prototyping in which the requirem...
Conference Paper
Full-text available
This position paper presents concepts and applications of an ontology for level-one sensor fusion. It covers platforms, sensors, tangible entities as well as intangible entities, such as concepts. Relationships between entities are part of the ontology. Verbs as well as nouns are included. Concepts such as reasoning under uncertainty also are part...
Conference Paper
Full-text available
This position paper presents concepts and applications of an ontology for level-one sensor fusion. It covers platforms, sensors, tangible entities as well as intangible entities, such as concepts. Relationships between entities are part of the ontology. Verbs as well as nouns are included. Concepts such as reasoning under uncertainty also are part...
Article
This paper highlights some major trends and developments in knowledge management with particular emphasis on knowledge capturing and authoring, and how this technology can be combined with intelligent agents to produce advanced capabilities for command and control systems. Past trends, present accomplishments and future work in knowledge management...
Conference Paper
Full-text available
This paper presents current and future uses of adaptive and mobile intelligent agents to increase the dependability of FORCEnet by improving network-centric warfare in general, and the battlefield single integrated picture (SIP) in particular. In a dynamically changing environment, agents that monitor the battle space and facilitate knowledge manag...
Conference Paper
Full-text available
The use of Extensible Markup Language (XML) Schemas to structure data is examined for its potential to promote effective, self-organizing, application-independent and platform-independent information exchange systems. As data resources become increasingly numerous and voluminous, consistent information access and exchange will be achieved by applyi...
Conference Paper
Full-text available
This paper highlights some major trends and developments in knowledge management with particular emphasis on knowledge capturing and authoring, and how this technology can be combined with intelligent agents to produce advanced capabilities for command and control systems. Past trends, present accomplishments and future work in knowledge management...
Conference Paper
Full-text available
The use of Extensible Markup Language (XML) Schemas to structure data is examined for its potential to promote effective, self-organizing, application-independent and platform-independent information exchange systems. As data resources become increasingly numerous and voluminous, consistent information access and exchange will be achieved by applyi...
Conference Paper
Full-text available
This paper highlights some major challenges in information management, and how to overcome some of these problems. The paper explains the importance of effective information management. Other related topics covered here include standards and their commonality; legacy systems, data access and aggregation including data-access policy, system integrat...
Conference Paper
Full-text available
This paper expands the concept of "states of information" as analogous to states of matter. It introduces new ideas on the expressiveness of information systems and how information is organized in these systems. By taking advantage of the isomorphism that exists between states of matter and states of information, we can begin to understand new ways...
Conference Paper
Full-text available
Collaborative systems research, development, test and evaluation activities have grown steadily throughout the Space and Naval Warfare Systems Center-San Diego (SSC-SD) during the past decade , ranging from simple chat to virtual workspac-es. Concurrently, the evolving " mission focus " of the U.S. military, from full scale war (early 1980's) to co...
Article
Full-text available
This paper explores challenges facing information system professionals in the management of data and knowledge in the Department of Defense (DOD), particularly in the information systems utilized to support command, control, communications, computers, and intelligence (C<sup>4</sup> I). These information systems include operational tactical systems...
Conference Paper
Full-text available
The sensor web consists of millions of sensors con-nected together in an ad-hoc manner, collaborating with each other for sensor data acquisition, data fusion, data correlation, and taking action based on the find-ings. The military services deploy these systems of hete-rogeneous sensors to detect and classify platforms, in-cluding targets. The pap...
Conference Paper
Full-text available
This paper describes conceptual work in dynamic three-value logic (3VL) with a view toward applications in decentralized time-critical domains, such as a sensor field. The completeness and computability of 3VLs also are discussed, including an algorithm to illustrate the use of heuristics. The military services deploy systems of heterogeneous senso...
Conference Paper
Full-text available
This paper presents a report of an ongoing research project to test and evaluate temporal and other dependability properties of the battlefield single integrated picture (SIP). It explores modeling and simulations of information flows in the battlespace with a view toward enhancing the SIP. The main emphasis will be on level-one data fusion, i.e. d...
Chapter
Full-text available
This paper describes Disciple, a decision aid based on artificial intelligence techniques, that subject-matter experts can train and use when making decisions under stressful, complex, and constrained conditions. The tool was developed and used under the Defense Advanced Research Projects Agency’s High Performance Knowledge Base and Rapid Knowledge...
Conference Paper
Full-text available
A new type of qualitatively fuzzy expert system shell (i.e., KASER) is applied to a tutoring problem. The shell facilitates reasoning using domain-specific expert knowledge as well as commonsense qualitative knowledge. The shell accomplishes this through object-classed predicates and an associated novel inference engine. The KASER addresses the hig...
Conference Paper
Full-text available
This paper briefly captures the origins of automated data management from its inception to the present. It describes the significant advances that occurred in each decade since the 1930s through the 1990s. It also extends an eye toward the horizon in predictions of the future of this key technological area throughout the coming century. Finally, it...
Conference Paper
Full-text available
This paper presents research results of a project that produced a progressively dependable knowledge amplifier. A knowledge amplifier can acquire a virtual-rule space automatically that is exponentially larger than the actual, declared-rule space and with a decreasing non-zero likelihood of error. A Knowledge Amplifier by Systematic Expert Randomiz...
Chapter
Full-text available
This book chapter addresses the topic of knowledge discovery in heterogeneous environments. It begins with an overview of the knowledge-discovery process. Because of the importance of using clean, consistent data in the knowledge discovery process, the chapter focuses on the problems of data integration and cleansing by presenting a framework of se...
Conference Paper
Full-text available
This paper is an exercise in analogical reasoning. It introduces the concept of “states of information” as analogous to states of matter. It explores the differences in states of matter and the difficulties in their definitions with a view toward explaining the difficulty in defining the various states of information. By taking advantage of the iso...
Conference Paper
Full-text available
This paper describes Disciple, an Artificial Intelligence based decision aid which subject-matter experts can train and use when making decisions under stressful, complex, and constrained conditions. The tool was developed and used under the Defense Advanced Research Projects Agency's High Performance Knowledge Base and Rapid Knowledge Formation pr...
Article
Full-text available
This paper describes agent technology and the various ways in which it can be applied to command, control, communications and intelligence in general, and to net-work-centric warfare in particular. The paper provides a brief overview of agents, their properties, and their ad-vantages. It covers the concept of the current military trend, network-cen...
Article
Full-text available
This paper describes agent technology and the various ways in which it can be applied to command, control, communications and intelligence in general, and to net-work-centric warfare in particular. The paper provides a brief overview of agents, their properties, and their ad-vantages. It covers the concept of the current military trend, network-cen...
Chapter
Full-text available
This paper discusses issues facing information technology (IT) sys- tem developers for Navy ships. Its overall emphasis is on the man- agement of large volumes of tacti- cal information that a ship must collect and process during its mis- sions. Specifically, it describes a very ambitious notion of a future Navy Comprehensive Informa-
Chapter
Full-text available
This paper documents progress to date on a research project, the goal of which is wartime event prediction. The paper describes the operational concept, the data-mining environment, and the data-mining techniques that use Bayesian networks for classification. Key steps in the research plan are (1) implement machine learning, (2) test the trained ne...
Conference Paper
Full-text available
This position paper explores the challenging area of cognition among experts and suggests possible reasons why experts have difficulty explaining how they make decisions in complex and constrained environments. We propose a theory of expertise and decision making that we call the Pattern Management/Mental Reference Frame (PM/MRF) model. The main pr...
Conference Paper
Full-text available
This paper describes agent technology and the various ways in which it can be applied to command, control, communications and intelligence in general, and to network-centric warfare in particular. The paper provides a brief overview of agents, their properties, and their advantages. It covers the concept of the current military trend, network-centr...
Conference Paper
Full-text available
Whereas much of the previous work on data mining has focused on mining data in relational databases, we discuss mining objects. Object models are very popular for representing multimedia data, and therefore we need to mine object databases to extract useful information from the large quantities of multimedia data. We first describe the motivation f...
Conference Paper
Full-text available
This paper describes Proton-Exchange Membrane (PEM) fuel cells, their importance to military applications, and how their design can be enhanced using computational techniques. We extend the logic of plausible reasoning given by Collins and Michalski in two directions. First, it uses a context-free grammar for the operations of generalization and sp...
Conference Paper
Full-text available
Not Available
Conference Paper
This paper describes agent technology and the various ways in which it can be applied to command, control, communications and intelligence in general, and to network-centric warfare in particular. The paper provides a brief overview of agents, their properties, and their advantages. It covers the concept of the current military trend, network-centr...
Conference Paper
Full-text available
This paper addresses the knowledge-acquisition bottleneck. Most importantly, it suggests the design of a learning expert system, for which the probability of error in the induced rules decreases with scale. Third-generation expert systems derive from Rubin's work on randomness and symmetry. More precisely, the knowledge engineer provides novel know...
Conference Paper
Full-text available
This paper describes heuristics for identifying semantic conflicts in large, heterogeneous, distributed, and federated databases in which the combinatorics of comparisons become an issue. Data can be divided along several dimensions and the search space for conflicts can be narrowed considerably. The paper considers various search criteria, such as...
Conference Paper
Full-text available
This paper describes a research project, the goal of which is to provide complete, consistent, and extensible decision support to military commanders for command, control, communications, computers and intelligence (C4I) systems. In this project, we attempted to overcome the knowledge-acquisition bottleneck, which has been a major impediment to the...
Conference Paper
Full-text available
Enterprise-wide information sharing to timely and accurate data is the main requirement across a federation of multiple functional domains, that includes massive amounts of legacy data and modernized system data. Our interaction infrastructure supports WWW-based queries to information across the federation of domains. Traditional information manage...
Article
Full-text available
Many professional societies have featured poster sessions successfully in meetings and conferences for many years. Frequently, student presentations, when featured at professional technical meetings, are in the form of posters. Some authors are reluctant to select poster sessions as their first choice of presentation method. They are unfamiliar wit...
Conference Paper
Full-text available
This paper documents progress to date on a research project, the goal of which is wartime-event prediction. It describes the operational concept, the data-mining environment , and data-mining techniques that use Bayesian networks for classification. Key steps in the research plan are as follows: 1) implement machine learning; 2) test the trained ne...
Conference Paper
Full-text available
The paper documents progress to date on a research project, the goal of which is wartime event prediction. It describes the operational concept, the data mining environment, and data mining techniques that use Bayesian networks for classification. Key steps in the research plan are as follows: (1) implement machine learning; (2) test the trained ne...
Conference Paper
Full-text available
A method to mine relational databases for knowledge and generalizations is presented. The concept of a network of expert systems with a user in the loop to provide domain knowledge of features is discussed. The network of expert systems is important to solve the problems of a knowledge acquisition bottleneck. The example of battery design is descri...
Conference Paper
Full-text available
Artificial intelligence, including fuzzy logic, is applied to the diagnosis of glaucoma. Current methods and difficulties are reviewed and a diagnostic and prediction system is proposed. Validation of the developed software will involve data collected from the clinical evaluation of glaucoma patients, glaucoma-suspect patients and normal subjects....

Questions

Questions (5)

Network

Cited By