Infotech@Aerospace 2012 2012
DOI: 10.2514/6.2012-2546
|View full text |Cite
|
Sign up to set email alerts
|

Sensor Platform Management Strategies in a Multi-Threat Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…Various fusion methods have included optimization methods [41] and upstream data fusion [42]. Key issues raised for future systems are threats [43], communications [44], and partial observability [45]. To alleviate the reliance on a machine-only autonomous approach is to use automation with C2 visualization.…”
Section: Resource Managementmentioning
confidence: 99%
“…Various fusion methods have included optimization methods [41] and upstream data fusion [42]. Key issues raised for future systems are threats [43], communications [44], and partial observability [45]. To alleviate the reliance on a machine-only autonomous approach is to use automation with C2 visualization.…”
Section: Resource Managementmentioning
confidence: 99%
“…In a system of systems, a functional capability can be allocated to multiple physical entities with the functionality performed by each physical entity being executed according to the inputs (matter, energy, and information) that it receives from external entities and any local energy, matter, or information resident in the physical entity. Table 2, which is adapted from Mane and DeLaurentis (2012), shows an example possible allocations of missile tracking, assessment and evaluation, and sensor tasking functionality that complete the tracking loop in the functional C2BMC architecture presented in Figure 2 to physical architectures that have multiple sensors for collecting data and a single command and control (C2) node. In a centralized architecture, all functionality is allocated to a single C2 node, and none of the sensors is operationally independent of the C2 node.…”
Section: • Communication Protocols and Capacitiesmentioning
confidence: 99%