[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1102256.1102303acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
Article

Evolving agents for network centric warfare

Published: 25 June 2005 Publication History

Abstract

The advances in information technology largely influence our life style in various aspects. The changes in the underlying economics, information technology, business processes and organizations are affecting the very character of war and are leading to the fundamental shift from platform-centric warfare to network centric warfare (NCW), also known as network centric operation (NCO) [1]. Since its emergence in 1983 [10], the debate between proponents and opponents is hotly continuous. The proponents suggest that networked entities may produce information superiority, which in turn dramatically increases combat power. The theory that power is increasingly derived from information sharing, knowledge sharing and command speeding up has been supported by results of recent military operational experience [4]. The advantages of NCW have been recognized as:Small-size networked forces can perform missions effectively at a lower cost;

References

[1]
D. S. Alberts, J. J. Garstka, and F. P. Stein. Network centric warfare: Developing and leveraging information superiority (2nd edition). CCRP Publication Series, 1999.
[2]
M. Barlow and A. Easton. Crocadile - an open, extensible agent-based distillation engine. Information & Security, 8(1):17--51, 2002.
[3]
D. P. Galligan. Modelling shared siturational awareness using the mana model. Journal of Battlefield Technology, 7(3):35--40, 2004.
[4]
J. J. Garstka. Network-centric warfare offers warfighting advantage: Datalinks are the new weapon of the information age. Signal, 57:58--60, May 2003.
[5]
A. Ilachinski. Irreducible semi-autonomous adaptive combat (isaac): An artificial life approach to land combat. Research Memorandum CRM 97--61, Center for Naval Analyses, Alexandria, 1997.
[6]
A. Ilachinski. Artificial War: Multiagent-Based Simulation of Combat. World Scientific Publishing Company, Singapore, 2004.
[7]
A. I. Kaufman. Be careful what you wish for: The dangers of fighting with a network centric military. Journal of Battlefield Technology, November 2002.
[8]
M. K. Lauren. Modelling combat using fractals and the statistics of scaling systems. Military Operations research, 5(3):47--58, 2000.
[9]
J. H. Scherrer. Risks and vulnerabilities of network-centric forces: Insights from the science of complexity. Newport r.i., Naval War College, February 2003.
[10]
J.R. Wilson. Network-centric warfare 21st century. Military & Aerospace Electronics, January 2000.
[11]
A. Yang, H. A. Abbass, and R. Sarker. Landscape dynamics in multi-agent simulation combat systems. In Proceedings of 17th Joint Australian Conference on Artificial Intelligence, LNCS, Cairns, Australia, December 2004. Springer-Verlag. Accepted to appear.

Cited By

View all
  • (2022)Engineering Decentralized Enterprises: Emergent Mission Accomplishment Without Centralized Command and ControlProceedings of the 2021 Conference of The Computational Social Science Society of the Americas10.1007/978-3-030-96188-6_10(124-151)Online publication date: 29-Mar-2022
  • (2020)A Multi-agent architecture for modeling organizational planning against terrorist attacks in urban areas2020 International Multi-Conference on: “Organization of Knowledge and Advanced Technologies” (OCTA)10.1109/OCTA49274.2020.9151843(1-8)Online publication date: Feb-2020
  • (2015)Trusted Autonomy and Cognitive Cyber Symbiosis: Open ChallengesCognitive Computation10.1007/s12559-015-9365-58:3(385-408)Online publication date: 23-Dec-2015
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
GECCO '05: Proceedings of the 7th annual workshop on Genetic and evolutionary computation
June 2005
431 pages
ISBN:9781450378000
DOI:10.1145/1102256
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 June 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. complex adaptive systems
  2. multi-agent systems
  3. network theory

Qualifiers

  • Article

Conference

GECCO05
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,669 of 4,410 submissions, 38%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 11 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Engineering Decentralized Enterprises: Emergent Mission Accomplishment Without Centralized Command and ControlProceedings of the 2021 Conference of The Computational Social Science Society of the Americas10.1007/978-3-030-96188-6_10(124-151)Online publication date: 29-Mar-2022
  • (2020)A Multi-agent architecture for modeling organizational planning against terrorist attacks in urban areas2020 International Multi-Conference on: “Organization of Knowledge and Advanced Technologies” (OCTA)10.1109/OCTA49274.2020.9151843(1-8)Online publication date: Feb-2020
  • (2015)Trusted Autonomy and Cognitive Cyber Symbiosis: Open ChallengesCognitive Computation10.1007/s12559-015-9365-58:3(385-408)Online publication date: 23-Dec-2015
  • (2014)The Way ForwardComputational Red Teaming10.1007/978-3-319-08281-3_6(211-216)Online publication date: 6-Oct-2014
  • (2014)Big-Data-to-Decisions Red Teaming SystemsComputational Red Teaming10.1007/978-3-319-08281-3_3(105-158)Online publication date: 6-Oct-2014
  • (2014)The Art of Red TeamingComputational Red Teaming10.1007/978-3-319-08281-3_1(1-45)Online publication date: 6-Oct-2014
  • (2007)A Temporal Risk Assessment Framework for Planning A Future Force Structure2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications10.1109/CISDA.2007.368141(100-107)Online publication date: Apr-2007

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media