Agilely assigning sensing assets to mission tasks in a coalition context

A Preece, T Norman, G De Mel… - IEEE Intelligent …, 2012 - ieeexplore.ieee.org
When managing intelligence, surveillance, and reconnaissance (ISR) operations in a
coalition context, assigning available sensing assets to mission tasks can be challenging …

Cascading verification: an integrated method for domain-specific model checking

F Zervoudakis, DS Rosenblum, S Elbaum… - Proceedings of the …, 2013 - dl.acm.org
Model checking is an established method for verifying behavioral properties of system
models. But model checkers tend to support low-level modeling languages that require …

[PDF][PDF] Commitment-based privacy management in online social networks

N Kökciyan, P Yolum - … foundations of social computing at AAMAS, 2014 - researchgate.net
Systems need to preserve their users' privacy. In social software, such as online social
networks, preserving privacy is especially difficult since content is managed by more than …

[PDF][PDF] 一种两阶段多平台对地观测资源匹配方法

江建清, 伍国华, 朱晓敏 - 科学技术与工程, 2012 - stae.com.cn
式规则方法[+], 多A601D 方法[,], 合同网方法[)] 等等. 在资源能力评估方面, 如神经网络方法['],
基于效用函数方法[$] 等. 234F8C 采用值函数的线性凸组合来评估卫星和无人机资源对任务的 …

[PDF][PDF] Obfuscation of Semantic Data: Restricting the Spread of Sensitive Information.

F Cerutti, G de Mel, TJ Norman, N Oren… - Description …, 2014 - users.cs.cf.ac.uk
This paper investigates how to restrict the spread of sensitive information. This work is
situated in a military context, and provides a tractable method to decide what semantic …

Intent-based resource deployment in wireless sensor networks

G De Mel, T Pham, P Sullivan… - … , and Networking for …, 2012 - spiedigitallibrary.org
Information derived from sensor networks plays a crucial role in the success of many critical
tasks such as surveillance, and border monitoring. In order to derive the correct information …

Service-oriented reasoning architecture for resource-task assignment in sensor networks

G De Mel, F Bergamaschi, T Pham… - … , and Networking for …, 2011 - spiedigitallibrary.org
The net-centric ISR/ISTAR networks are expected to play a crucial role in the success of
critical tasks such as base perimeter protection, border patrol and so on. To accomplish …

A generic platform for ontological query answering

BPL da Silva, JF Baget, M Croitoru - International Conference on …, 2012 - Springer
The paper presents ALASKA, a multi-layered platform enabling to perform ontological
conjunctive query answering (OCQA) over heterogeneously-stored knowledge bases in a …

A hybrid reasoning mechanism for effective sensor selection for tasks

G De Mel, M Sensoy, W Vasconcelos… - … Applications of Artificial …, 2013 - Elsevier
In this paper, we present Ontological Logic Programming (OLP), a novel approach that
combines logic programming with ontological reasoning. OLP enables the use of ontological …

Principles of organizing the semantic ontology of programming

VN Kuchuganov, DR Kasimov… - 2017 Second Russia …, 2017 - ieeexplore.ieee.org
A promising way to improve the programming process is increasing the declarativeness of
programming, approximation to natural language on the base of accumulating and actively …