2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications 2007
DOI: 10.1109/cisda.2007.368140
|View full text |Cite
|
Sign up to set email alerts
|

Computationally Derived Models of Adversary Organizations

Abstract: An extension to the lattice algorithm for designing decision-making organizations subject to cultural constraints is presented. Hofstede dimensions have been used to incorporate cultural attributes in the design process in the form of constraints on the allowable interactions within the organization. An example is used to illustrate the approach.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Examples of agent-based computational models in support of political science reach back to McPhee's and Smith's 2 efforts to simulate voting systems, with Johnson 3 offering an excellent literature review of simulations in political science. Multidisciplinary and multi-model modeling and simulation have found uses in military applications as diverse as modeling terrorist and adversarial organizations 4,5 to US Air Force Operations Centers. 6,7 In the nuclear domain, researchers periodically turn to agent-based models (ABMs) 8 and often use statistical models, as discussed by Sawyer 9 and Li et al, 10 to monitor nuclear proliferation trends and make predictions, time influence nets (TINs), and colored Petri nets to model command and control organizations responsible for the use of nuclear weapons 11 and forecast the efficacy of effectsbased operations.…”
Section: Computational Modelingmentioning
confidence: 99%
“…Examples of agent-based computational models in support of political science reach back to McPhee's and Smith's 2 efforts to simulate voting systems, with Johnson 3 offering an excellent literature review of simulations in political science. Multidisciplinary and multi-model modeling and simulation have found uses in military applications as diverse as modeling terrorist and adversarial organizations 4,5 to US Air Force Operations Centers. 6,7 In the nuclear domain, researchers periodically turn to agent-based models (ABMs) 8 and often use statistical models, as discussed by Sawyer 9 and Li et al, 10 to monitor nuclear proliferation trends and make predictions, time influence nets (TINs), and colored Petri nets to model command and control organizations responsible for the use of nuclear weapons 11 and forecast the efficacy of effectsbased operations.…”
Section: Computational Modelingmentioning
confidence: 99%
“…6 and 7 can be mathematically described using a Petri net with interactions defined in Remy et al [12]. See Fig.8 from Kansal et al [13]. The individual DM nodes receive either a signal from the external environment or from another DM node.…”
Section: Architecturementioning
confidence: 99%
“…The RS stage then produces the output to the environment or to other organization members." [13].Using the theory outlined in Remy et al [12], CAESAR III uses the Lattice algorithm to generate feasible solutions that represent all possible architectures that meet a set of defined constraints. These solutions are represented as Ordinary Petri Nets.…”
Section: Architecturementioning
confidence: 99%