Methods of utilizing surveillance and reconnaissance assets to enable command and control schema analysis
Abstract
Recommendations
Problem structuring methods in military command and control
In an authorized military hierarchy organization, the procedure of problem solving must be co-ordinated with the tasks of planning, directing, and controlling. In most combat situations, problem solving knowledge is acquired from an expert (commander) ...
An agent architecture for implementing command and control in military simulations
WSC '01: Proceedings of the 33nd conference on Winter simulationIn models of military operations it is important to include the Command and Control (C2) process in order to achieve a realistic simulation of a military force's behaviour and effectiveness. Inspired by ideas from complexity theory we have developed a ...
Comments
Information & Contributors
Information
Published In
- Editors:
- L. Felipe Perrone,
- Barry G. Lawson,
- Jason Liu,
- Frederick P. Wieland,
- General Chair:
- David Nicol,
- Program Chair:
- Richard Fujimoto
Sponsors
- IIE: Institute of Industrial Engineers
- ASA: American Statistical Association
- IEICE ESS: Institute of Electronics, Information and Communication Engineers, Engineering Sciences Society
- IEEE-CS\DATC: The IEEE Computer Society
- SIGSIM: ACM Special Interest Group on Simulation and Modeling
- NIST: National Institute of Standards and Technology
- (SCS): The Society for Modeling and Simulation International
- INFORMS-CS: Institute for Operations Research and the Management Sciences-College on Simulation
Publisher
Winter Simulation Conference
Publication History
Check for updates
Qualifiers
- Article
Conference
- IIE
- ASA
- IEICE ESS
- IEEE-CS\DATC
- SIGSIM
- NIST
- (SCS)
- INFORMS-CS
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 58Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in