Advanced search Help
Searching for terms: EXACT: "Pearce, Paul" in: author
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Coping with Degraded or Denied Environments in the C2 Approach Space
"The NATO Network Enabled Operations (NEC) C2 Maturity Model (N2C2M2) defines a number of command and control (C2) Approaches that correspond to various ways to accomplish C2 functions. These Approaches are defined by organizational the allocation of decision rights, patterns of interaction, and the distribution of information. Recent work in C2 theory has considered the differences in performance relative to the C2 Approach that is adopted. This work has investigated the idea that an optimal operating region of the C2 Approach Space can be identified for particular missions and circumstances, where optimal is a function of effectiveness, efficiency and agility. While circumstances that are characterized by the presence of degraded network conditions or hostile or extreme environments is of great interest, the performance of various c2 Approach options under these conditions have not been well studied. This paper focuses on the relative resilience of organizations as a function of their C2 Approach (a key component of agility). We explore the relationship between C2 Approach and performance under degraded information and communications environments using a set of six unique simulation experiments."
U.S. Army Research Laboratory
Bernier, François; Chan, Kevin; Alberts, David S. (David Stephen), 1942- . . .
2013-06
-
Minimum Spanning Tree Approach to Identifying Collective Behavior and Inferring Intent for Combat Models
"The Defence Science and Technology Laboratory (Dstl) makes use of many models in order to represent military conflict. Most of these models are based upon a Cold War era opponent, and it is argued that there is a need to update these models in order to reflect the evolving structure of the UK armed forces needed to meet the current threats. Algorithms are presented which will allow the planning processes within military models to make more informed decisions. The approach uses a mathematical model to identify agents which may be working together as a group, and subsequently make inferences about their intent. This research is carried out within the context of a wider programme concerned with updating existing simulation models of conflict. Initial results are presented and the future development of the work is discussed. The Defence Science and Technology Laboratory (Dstl) is part of the UK Ministry of Defence (MoD) and routinely provides analytical support and advice to decision makers on policy, procurement and operational issues. In order to conduct studies of this nature, Dstl makes use of many models in order to represent military conflict. The term du jour in modern military operations is 'asymmetric warfare.' That is, warfare in which the weaker force uses unconventional weapons and tactics in order to try and neutralise a stronger opponent. As a result, UK and coalition forces are having to adapt their doctrine and Command and Control (C2) structure in order to remain effective against these new threats. Consequently, there is a need for military models to reflect this shift in battlespace paradigm."
Command and Control Research Program (U.S.)
Hossain, Aleem; Walmsley, Nick, 1960-; Pearce, Paul
1