Paper
19 July 2004 Achieving battlespace awareness in network-centric warfare by integrating web and agent technologies
John M. McCormick, Peter M. Gerken, Kevin P. Barry, Brian Sidharta
Author Affiliations +
Abstract
Transformation of military information systems to a network-centric paradigm will remove traditional barriers to interoperability and enable dynamic access to information and analysis resources. The technical challenges of accomplishing network-centric warfare (NCW) require the engineering of agile distributed software components imbued with the ability to operate autonomously on behalf of human individuals, while maintaining system level integrity, security, and performance efficiency on a grand scale. In this paper, we will describe how agents provide a critical technology enabler for applying emerging commercial technologies, such as web services, into network-centric warfare problems. The objective of our research is developing and sharing battlespace awareness and understanding. Our agent information service manages information collection and dissemination/publishing activities on behalf of fusion services in an autonomous, yet controllable fashion. Agents improve the scalability and reliability at the system of systems level through dynamic selection and exploitation of web services based upon needs and capabilities.
© (2004) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
John M. McCormick, Peter M. Gerken, Kevin P. Barry, and Brian Sidharta "Achieving battlespace awareness in network-centric warfare by integrating web and agent technologies", Proc. SPIE 5441, Battlespace Digitization and Network-Centric Systems IV, (19 July 2004); https://doi.org/10.1117/12.543138
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Web services

Network centric warfare

Computer architecture

Databases

Prototyping

Network security

Information security

RELATED CONTENT


Back to Top