Cover image for Net-Centric Approaches to Intelligence and National Security
Net-Centric Approaches to Intelligence and National Security
Title:
Net-Centric Approaches to Intelligence and National Security
Author:
Ladner, Roy. editor.
ISBN:
9780387261768
Physical Description:
X, 178 p. online resource.
Contents:
Ontologies for the Semantic Web -- Web Services Overview for Net-Centric Operations -- Metadata Concepts to Support a Net-Centric Data Environment -- Distributed Geospatial Intelligence Integration and Interoperability Through the Gidb® Portal System -- Analyzing Intelligence Data -- Linking Military Systems with Simulations and Intelligent Agents Through Web Services to Support Courses of Action Analysis -- A Multi-Agent Architecture for Distributed Domain-Specific Information Integration -- Natural Environment Data Services in Distributed Modeling and Simulation.
Abstract:
Net-Centric Approaches to Intelligence and National Security considers the web architectures and recent developments that make net-centric approaches for intelligence and national security possible. The development of net-centric approaches for intelligence, national & homeland security applications has become a major concern in many areas such as defense intelligence and national and international law enforcement agencies, especially since the terrorist attacks of 9/11. Net-Centric Approaches to Intelligence and National Security presents developments in information integration and recent advances in web services including the concept of the semantic web. Discovery analysis and management of web-available data pose a number of interesting challenges for research in web-based management systems. Intelligent agents and data mining are among the techniques employed. A number of specific systems that are net-centric based in various areas of military applications, intelligence and law enforcements are presented utlilizing one or more of such techniques Net-Centric Approaches to Intelligence and National Security is designed for a professional audience of researchers and practitioners in industry. This volume is also suitable for graduate-level students in computer science. .
Added Corporate Author:
Holds: Copies: