Topics
The 16th ICCRTS will be comprised of tracks on various topics. Each presentation will be given 30 minutes: 20 minutes to present, 5 minutes for questions and discussion, and 5 minutes to allow individuals to move to the next presentation of their choice. The Track Chairs will provide feedback to assist authors in finalizing their papers and presentations.
Topic 1: Concepts, Theory, and Policy
The changing nature of the missions being carried out has created a new reality. This reality demands that existing concepts, theories, and policies be revisited and discarded or adjusted, as necessary and new concepts, theory, and policy be developed.
Topic 2: Approaches and Organizations
This topic examines designing, analyzing, and implementing various approaches to focus and convergence (e.g., C2, management, governance).
Topic 3: Information and Knowledge Exploration
This topic will include detection, collection, and instrumentation—how to obtain new information and develop new knowledge.
Topic 4: Information and Knowledge Exploitation
This topic addresses discovery, access, sharing, and processing of existing and available information and knowledge.
Topic 5: Collaboration, Shared Awareness, and Decision Making
This topic includes the processes in the cognitive and social domains that enable working together effectively and efficiently.
Topic 6: Experimentation, Metrics, and Analysis
This topic includes experiments and analyses related to the application of concepts and approaches to focus and convergence. Experiments and analyses may focus on any aspect of command and control—networking, management or governance, information sharing, trust, shared awareness, shared understanding, decision-making, planning, execution, and assessment of ongoing operations. Civil-Military operations require that metrics and measurements be rethought. Metrics for agility, effects-based operations, networks, and networking are encouraged, as are measures of process, quality, and impact.
Topic 7: Modeling and Simulation
This topic encompasses models and simulations that represent emergent behaviors in C2.
Topic 8: Architectures, Technologies, and Tools
This topic includes discussions of the nature of architectures suitable for emerging concepts of operations and the infostructure necessary to support them.
Topic 9: Networks and Networking
This topic addresses social or socio-technical as well as communications and information networks and networking behaviors. Of particular interest are appropriate models of such networks and networks of networks. Also of interest is interoperability in the context of complex endeavors which require new (inter)organizational and process models that reflect the complexity of collective operations and behaviors, and the development and application of appropriate standards.
Topic 10: C2, Management, and Governance in Civil-Military Operations
This topic will be a vehicle for both scientists and operators to explain what is needed to adapt theory/science to handle real world complexity while ensuring the timely delivery of required capabilities. This forum should also be aggressive at seeking case studies from both scientists and operators that deal with pressing current shortfalls. This new track differs from others by focusing on new ways to conduct support for collective action to meet real world challenges. The results of experiments or lessons learned from past experience are both worthy issues that should be pursued separately. The track is flexible enough to allow for discussion about international and domestic security operations and public safety considerations without being constrained to any of these operations.
Topic 11: Cyberspace Management
This topic addresses the issues of managing the resources and capabilities that have become known as the domain of cyberspace. Of particular interest are issues relating to continuity of operations and ensuring freedom of action in cyberspace. Relevant areas of interest include efforts aimed at providing agile information and communication networks (infostructure) and countering cyberspace-related threats.