Spelling suggestions: "subject:"netcentric computing."" "subject:"netcentrica computing.""
1 |
Literature survey on network concepts and measures to support research in network-centric operations /Olsson, Eric J. January 2003 (has links) (PDF)
Thesis (M.S. in Systems Technology)--Naval Postgraduate School, June 2003. / Thesis advisor(s): Dan C. Boger, William Kemple. Includes bibliographical references (p. 67-68). Also available online.
|
2 |
Automating non-functional design for net-centric real-time systems /Kazarian, Jason Paul, January 2007 (has links)
Thesis (M.S.)--University of Texas at Dallas, 2007. / Includes vita. Includes bibliographical references (leaves 67-73)
|
3 |
Network centric warfare and the principles of war /Senenko, Christopher M. January 1900 (has links)
Thesis (M.S. in Joint Campaign Planning and Strategy)--Joint Forces Staff College, Joint Advanced Warfighting School, 2007. / "05 April 2007." Vita. "National Defense Univ Norfolk VA"--DTIC cover. Includes bibliographical references (p. 58-61). Also available via the Internet.
|
4 |
Allowing the advantaged user in a network centric system to get through the disadvantaged interfaceBrandon, Lawrence. January 2009 (has links) (PDF)
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Goshorn, Rachel. "September 2009." Description based on title screen as viewed on November 05, 2009. Author(s) subject terms: Networks, Systems, Disadvantaged Interfaces, Network-Centric Systems, Mitigating disadvantaged interfaces Includes bibliographical references (p. ). Also available in print.
|
5 |
Network centric warfare and the principles of warSenenko, Christopher M. January 1900 (has links) (PDF)
Thesis (M.S. in Joint Campaign Planning and Strategy)--Joint Forces Staff College, Joint Advanced Warfighting School, 2007. / Title from title screen; viewed on July 9, 2007. "05 April 2007." Electronic version of original print document. Includes bibliographical references (p. 58-61).
|
6 |
Effective use of collaborative information technology to enhance group performanceO'Rourke, Julie, Gallaher, Patrick 09 1900 (has links)
Approved for public release; distribution is unlimited / This research was inspired by the need to create a universal net-centric environment to enable collaborative defense capabilities and deliver knowledge dominance to the DoD. Since superior information management and the use of collaborative IT technologies is fundamental to building intelligence capabilities, this study aims to contribute to the optimization of collaborative system use by military groups and organizations. The proposed research model illustrates and explains the direct relationships between collaborative IT competence and collaborative functionalities, which can be used not only to assess current technologies but also aid in requirements generation for designing the ideal collaborative tool suite. Central to the research model we introduce the concept of collaborative IT competence, defined as the effective use of collaborative functionalities, and explore its relationship to performance outcomes. Having pre-tested and validated the proposed research model by means of empirical data collection in the form of an end-user survey instrument we recommend further research be conducted on a Navy-wide scale to evaluate the 181 collaborative technology tools currently in use. End-user/warfighter insight will dramatically influence future CIT investment decisions by providing decision makers critical information regarding the pragmatic versus the advertised attributes of the application/tool suite. Additionally, this model is designed to provide the road map to the ideal combination of core functionalities and required collaborative IT competence. / Major, United States Marine Corps / Lieutenant Commander, United States Navy
|
7 |
Network-centric strategic-level deceptionErdie, Philip B. 09 1900 (has links)
Approved for public release; distribution is unlimited / This thesis explores strategic-level deception in the context of network-centric information operations. Advances in information technology and the global connectedness of communications networks have created new opportunities and challenges for conducting strategic and operational level deception campaigns with significant utilization of cyberspace. Planning and executing concurrent strategic-level deceptions among distributed participants and against multiple targets requires speed, flexibility, and situational awareness. This thesis begins with a historical account of twentieth century use of strategic-level deception, followed by a definition of network deception, considerations for achieving network based deception, and our proposed model of command structure for network-centric planning and execution of deception campaigns in the twenty-first century. / Captain, United States Marine Corps
|
8 |
A network-centric design for relationship-based rights managementRöscheisen, R. Martin. January 1900 (has links)
Thesis (Ph.D)--Stanford University, Computer Science Dept., 1997. / Title from digitized t.p. (viewed Aug. 7, 2001). "[Adminitrivia V1/Prg/19980518]."
|
9 |
Effective use of collaborative information technology to enhance group performance /Gallaher, Patrick. O'Rourke, Julie. January 2004 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, Sept. 2004. / Thesis advisor(s): Thomas Housel. Includes bibliographical references (p. 29-32). Also available online.
|
10 |
Trust and influence in the information age : operational requirements for network centric warfare /Blatt, Nicole Ilene. January 2004 (has links) (PDF)
Thesis (M.A. in Security Studies (Defense Decision-Making and Planning))--Naval Postgraduate School, Dec. 2004. / Thesis Advisor(s): Dorothy Denning, Scott Jasper. Includes bibliographical references (p. 93-96). Also available online.
|
Page generated in 0.0674 seconds