Advanced search Help
Searching for terms: EXACT: "Chan, Kevin" in: author
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Network Science Experimentation Vision
"The success of military operations has been shown to depend upon the capabilities and performance of a heterogeneous collection of interdependent networks. This report outlines and discusses an experimentation vision that identifies and organizes a set of research activities and the experimentation ecosystem necessary to improve our understanding of these multi-genre composite networks."
U.S. Army Research Laboratory
Alberts, David; Kott, Alexander; Rivera, Brian . . .
2015-09
-
Coping with Degraded or Denied Environments in the C2 Approach Space
"The NATO Network Enabled Operations (NEC) C2 Maturity Model (N2C2M2) defines a number of command and control (C2) Approaches that correspond to various ways to accomplish C2 functions. These Approaches are defined by organizational the allocation of decision rights, patterns of interaction, and the distribution of information. Recent work in C2 theory has considered the differences in performance relative to the C2 Approach that is adopted. This work has investigated the idea that an optimal operating region of the C2 Approach Space can be identified for particular missions and circumstances, where optimal is a function of effectiveness, efficiency and agility. While circumstances that are characterized by the presence of degraded network conditions or hostile or extreme environments is of great interest, the performance of various c2 Approach options under these conditions have not been well studied. This paper focuses on the relative resilience of organizations as a function of their C2 Approach (a key component of agility). We explore the relationship between C2 Approach and performance under degraded information and communications environments using a set of six unique simulation experiments."
U.S. Army Research Laboratory
Bernier, François; Chan, Kevin; Alberts, David S. (David Stephen), 1942- . . .
2013-06
-
C2 Approaches: Looking for the 'Sweet Spot'
From the abstract: "The dimensions of the C2 [command and control] Approach Space identify the three key characteristics of a C2 Approach as the allocation of decision rights, the patterns of interaction, and the distribution of information. Advances in information-related technologies have changed the economics of information, resulting in the richer interactions between and among geographically dispersed entities and increased access to information. This has made more of the C2 Approach Space accessible. The seminal Network Centric Warfare literature asserts that to take full advantage of the opportunities afforded by communications and information technologies, C2 Approaches need to co-evolve. That is, there needs to be a balance achieved among the three C2 Approach dimensions. The NATO NEC [Network Enabled Capability] C2 Maturity Model depicts a set of increasingly network-enabled C2 Approaches along the diagonal of the C2 Approach Space. The placement of these C2 Approach options along this diagonal could be interpreted as representing instances of approach co-evolution. This paper uses data from simulation experiments to explore a set of the hypotheses that involve the relationship between specific regions of the C2 Approach Space and effectiveness and agility."
Command and Control Research Program (U.S.)
Manso, Marco; Chan, Kevin; Bernier, François . . .
2013?
-
Human Decision Making Performance in Degraded Network Video Conditions
"Future capabilities of battle command systems and networked systems will increase Soldier situational awareness by providing access to information from various networked assets. We conducted a series of experiments at the United States Army Research Laboratory in Adelphi, MD and at C4ISR [Capabilities/Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance] On-the-move (OTM) at Ft. Dix, NJ. Based on the quality of service of battle command systems, the Soldier will be able to complete his mission objectives with a varying degree of success. Our experiments study the ability of the Soldier to identify various details within a simulated unmanned vehicle sensor feed given a range of quality of service (QoS) (by varying specific network parameters). In addition to understanding these systems from a strictly technical perspective, we are also interested in the performance from a network science perspective. This involves the consideration of the communications, information, and social/cognitive networks and their influence on situational awareness in tactical environments. Specifically, we are interested in the relationship of the Soldier's performance, decision-making ability, and trust in the network in these environments. We identify trends in these metrics as a function of video QoS, which if characterized properly can be used to predict Soldier performance based on the QoS. Further characterization of these relationships may assist in the design of future battle command systems with the optimization of individual and collective Soldier mission performance."
U.S. Army Research Laboratory
Chan, Kevin S.; Ivanic, Natalie; Bowman, Elizabeth K.
2010-06
1