Rick Hayes-Roth's research while affiliated with Naval Postgraduate School and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (10)
Several scholars have suggested that honesty, honor, fairness and other traditional values play a vital role in making capitalism and democracy function (Fukuyama 1995; Zak 2008). Others have recognized that capitalism and democracy reward greed and reinforce antisocial manipulators (Hayes-Roth 2011a). Some believe that enterprises can reconstruct...
People making decisions require information about their options. Across a wide range of tasks, they receive information from diverse sources, such as the Web, print, radio and television. As the Internet Age progresses, each decision maker must increasingly assess the credibility of the author, the credibility of the evidence the author cites, and...
Data sharing is today's principal Information Technology challenge. All sectors—commercial, government, academic, and military—seek improved information exchange to achieve operational benefits, whether in the form of greater profits, improved situational awareness, intellectual advancement, or ability to respond to threats endangering respective i...
A Mandate to Share: The 9/11 Commission Report and related Presidential directives have highlighted the need to share information between different government agencies, military services, and international allies. With sponsorship from the Navy and the Office of the Secretary of Defense (OSD), NRL provided the technical leadership for the Comprehen...
Like the master puppet makers of the classic folk tales, artificial intelligence (AI) engineers have built some marvelous machines. The first 50 years of AI focused on programming computers to perform tasks that previously only humans could do tasks such as speech, driving, planning, problem solving and vacuuming. The principal challenges have been...
Artificial intelligence began with an enthusiastic embrace of newly available computing machinery and the basic question of what kinds of problems we could solve with it. The first 50 years focused on programming computers to perform tasks that previously only humans could do. Then, people began comparing machines to humans as problem solvers, and...
Command-control and other distributed, collaborative systems should achieve the best possible results with resources available. We should measure these systems in terms of the quality of decisions made. Better decisions lead to better outcomes, because superior choices are made about what to do, with what assets, where and when. Just as we measure...
Persistent ISR (PISR) systems are a potential game-changer for asymmetric warfare. Realizing this potential requires delivering actionable information when and where it is needed, while shielding decision-makers from information overload. This paper describes a methodology and prototype system for measuring the military value of Persistent ISR depl...
In this paper we introduce the architecture and functionality of a new 8 th layer that extends the well known 7-layer OSI model to implement adaptive networking by giving every critical node of a C4I network its own specialized Network Operation Center (NOC) capability. Emerging network-centric concepts such as FORCEnet and ubiquitous networking se...
Citations
... Nowadays, the boom of content in companies and in networks (e.g., big data) poses a challenge of business decision-making that requires the right information at the right time (Hayes-Roth, 2005), while the lack of capacity of effective KM in ECM systems in general is still an important issue for companies. They need to know where information and valuable knowledge is located in order to make use of it efficiently. ...
... But, if the system fails, the programmers would diagnose and debug the errors. They would determine what knowledge to add or modify, how to program it, and how to modify and rebalance the pre-existing programs to accommodate the new performance without harming the parts that already worked well (Hayes-Roth, 2006). Automation in adaptation, learning, and knowledge acquisition is very limited -a tiny fraction of the overall knowledge required, which the engineers mostly prepared manually. ...