Track 1: C2 Concepts, Theory, and Policy
Abstract
Paper
Presentation
Updated
008 - WITHDRAWN
01/29/07
031 - KILLING AL QAEDA: The Destruction of Radical Islam Using SOFTWAR and AMOEBA
view
view
02/14/07
035 - Flexible Use of Limited Airspace
view
view
12/07/06
048 - Improving C4ISR between UK and US future land forces
view
view
02/08/07
055 - Aligning Transformational Change in Policy and Governance with Net-Centric Operations Technology
view
view
02/08/07
060 - Addressing the Practical Challenges of Fourth Generation Warfare
view
view
02/08/07
061 - Why is C4I Software Hard to Develop?
view
view
02/13/07
066 - Establishing Fair Principles of Cooperation for Multinational and Inter-Agency Operations
view
view
02/14/07
068 - Communications, C2-Entropy and Military Command
view
view
12/01/06
077 - Distributed Planning in a Mixed-Initiative Environment
view
view
12/01/06
084 - Air Doctrine: Using Networks to Promote Agility in the Planning Process
view
view
02/08/07
086 - Putting the science back in C2: What do the buzzwords really mean?
view
view
02/08/07
087 - Scientific and graphic design foundations for C2 information displays
view
view
02/08/07
099 - C2 and Trust in Cyber-Kinetic Operations
view
view
12/01/06
101 - Beyond PowerPoint Deep: a Concept of Operations for Implementing Net-Centric Warfare
view
view
02/08/07
106 - Information Communications Technology Support to Reconstruction and Development: Some Observations from Afghanistan
view
view
12/01/06
122 - Tactical Application of Gaming Technologies for Improved Battlespace Management
view
view
02/08/07
123 - Constraint processing for C2
view
view
12/01/06
126 - (Unintended) Effects Based Operations: Dealing with Secondary Effects
view
view
02/08/07
132 - MANAGING THE BATTLE RHYTHM
view
view
12/01/06
135 - Critical Decisions Approach to C2
view
view
02/08/07
136 - Cross-Domain Ontology Resolution in Net-Centric Command and Control
view
view
02/08/07
142 - Teaching Command and Control Systems at the United States Military Academy
view
view
02/08/07
149 - The Translation of JC3IEDM into an OWL Ontology
view
view
02/08/07
153 - WITHDRAWN
01/23/07
154 - WITHDRAWN
01/23/07
157 - On Regarding 21st Century C2 Systems and their Users as Fallible ePartners
view
view
12/01/06
159 - Communication, Cooperation, and Coordination Model for Process Improvement of C2 Projects
view
view
02/13/07
165 - Frameworks and Insights Characterizing Trends in Cyberspace and Cyberpower
view
view
12/01/06
176 - Teaching Network Science to Future Military Practitioners: Educating Network Analysis at the United States Military Academy
view
view
12/01/06
187 - My Teenager is a Future Warfighter? - Facing the Generational Challenges of a Net-centric Future
view
view
12/07/06
190 - COMMANDING AT THE EDGE OF CHAOS; THE REAL TRANSFORMATION TO ENABLE NETWORK WARFARE
view
view
12/01/06
197 - Mission Command needs the Adaptive Stance
view
view
12/05/06
198 - Operationalising Adaptive Campaigning
view
view
12/05/06
199 - WITHDRAWN
01/16/07
213 - Deductive Sensemaking Principles Using Personal Constructs of the Field Commanders
view
view
02/08/07
224 - A Multi-Level Model of Command and Control (C2)
view
view
12/07/06
233 - Next State Planning: A “Whole of Government” Approach For Planning and Executing Operational Campaigns
view
view
02/13/07
Return to Main Page