![]() |
|||||
|
| Artificial Intelligence |
||
Scott Robbins |
||
Tom Bartee |
||
Bob Grabowski |
||
Bob Grabowski |
||
Dave DeBarr |
||
Jeff Colombe |
||
Lewis Loren |
||
Curtis Brown |
||
Qian Hu |
||
Walter Kuklinski |
||
| Biotechnology |
||
|
Olivia Peters |
|
|
Grace Hwang |
|
|
Lynn Cooper |
|
|
Lynette Hirschman |
|
|
Human Monoclonal Antibodies for Neutralization and Diagnosis of H5N1 |
Juan Arroyo |
|
Mojdeh Mohtashemi |
|
|
Pandemic Influenza: Containment and Countermeasures in Closed Environments |
Olivia Peters |
|
John Dileo |
|
| Communications and Network |
||
|
Jerry Shapiro |
|
|
John Stine |
|
|
Atmospheric Mitigation Techniques for Free-Space Optical Communication |
David Gervais |
|
Bill Horne |
|
|
Peter Weed |
|
|
Emaan Osman |
|
|
Robert C. Durst |
|
|
Kurt Sherman |
|
|
Emaan Osman |
|
|
Investigating Applications of Wireless Broadband for Airport Operations |
Izabela Gheorghisor |
|
Chris Niessen |
|
|
Randall Landry |
|
|
Source Separation and Equalization for Interference-Limited Communications |
Robert Taylor |
|
Bob Kimball |
|
| Computing and Software |
||
|
Lashon Booker |
|
|
Brian Sroka |
|
|
Ravi Athale |
|
|
Kathryn Lesh |
|
|
Predictable End-to-End Timeliness in Network Centric Warfare Systems |
Douglas Jensen |
|
Howard Kong |
|
|
Gerry Gilbert |
|
|
David Goldberg |
|
|
Steve Barry |
|
| Decision Support |
||
|
Anand Mundra |
|
|
Craig Wanke |
|
|
Edward Hahn |
|
|
Lindsley Boiney |
|
|
Collaborative Decision Making for Net-Centric Warfare in TIme-Critical Situations |
Brad Goodman |
|
Brant Cheikes |
|
|
Kathleen Gallagher |
|
|
Neal Rothleder |
|
|
Integrated Ops-Intel Team Sensemaking for Non-Traditional Warfare |
Frank Stech |
|
Scott Kell |
|
|
David Maroney |
|
|
Service Orchestration in the Ballistic Missile Defense System Context |
Alberto Andrade |
|
Erika Darling |
|
|
Lisa Harper |
|
|
Peter Firey |
|
| Electronics |
||
|
Kevin Skey |
|
|
Generic Transformational Scalable, Modular Affordable RF Transceiver ( Get SMART ) |
Perry Hamlyn |
|
Perry F. Hamlyn |
|
|
James Ellenbogen |
|
|
Janet Werth |
|
| Enterprise & Systems Architecture & Engineering (ESAE) |
||
|
Adapting Venture Capital Concepts to Enterprise System Acquisitions |
Renee Stevens |
|
Steven Sesar |
|
|
John Robinson |
|
|
Enterprise Dynamics: An Architecture-Based, Decision-Driven Approach |
Ken Hoffman |
|
Real Options Applications for Public Sector Investment and Acquisitions |
Felipe Moreno-Hines |
|
Alfred Anderegg |
|
|
Marc Halley |
|
|
John Dahlgren |
|
| Human Language |
||
|
Marc Vilain |
|
|
Lisa D. Harper |
|
|
John Henderson |
|
|
Clipper, TrIM, XTRIM, & OpenMT: MITRE Embedded Machine Translation Prototypes |
Rod Holland |
|
Marc Vilain |
|
|
Lisa Ferro |
|
|
Christopher Berube |
|
|
Linda Van Guilder |
|
|
Spatio-temporal Information Extraction and Reasoning from Natural Language |
Inderjeet Mani |
|
Sherri Condon |
|
| Information Assurance |
||
|
Ellen Powers |
|
|
Steve Barry |
|
|
Deb Bodeau |
|
|
Vipin Swarup |
|
|
Melissa Chase |
|
|
Rich Pietravalle |
|
|
Security Information Management for Enclave Networks (SIMEN) |
Rosalie McQuaid |
|
Cathy McCollum |
|
|
TRIDENT (Trust Research in Distributed & Emerging Network Technology |
Justin Sheehy |
|
Joshua Guttman |
|
|
Using Honeyclients for Detection and Response Against New Attacks |
Kathy Wang |
| Information Management |
||
|
Automated Web Service Discovery, Characterization and Cataloging |
Douglas Troester |
|
Dan Winkowski |
|
|
Content Extraction and Duplicate Analysis and Recognition (CEDAR) |
Susan Lubar |
|
Peter Mork |
|
|
Nathan Vuong |
|
|
Len Seligman |
|
|
Improving Trustworthiness of Enterprise Data for Decision Making |
David Becker |
|
Michele Smith |
|
|
Dave Anderson |
|
|
Doug Phair |
|
|
Don Landing |
|
|
SezHoo: Using Reputation to Increase the Trustworthiness of Information |
Mark Kramer |
|
Donna Cuomo |
|
|
Standard Rule Language for Enterprise Application Integration |
Suzette Stoutenburg |
|
Doug Phair |
|
| Investment Strategies and Operational Analysis |
||
|
Bob Fuller |
|
|
Jennifer Gentry |
|
|
Maximizing Benefit from Performance-Based Service Acquisition (PBSA) |
Audrey Taub |
| Modeling and Simulation |
||
|
Application of Cognitive Agents to NAS Models and Real-Time Simulations |
Steven Estes |
|
Jackie Kee |
|
|
Patti Liguori |
|
| Sensors and Environment |
||
|
Paul Bohne |
|
|
David Zasada |
|
|
Evaluating Behavioral Indicators for Maritime Domain Awareness |
Robert Kobee |
|
Lightweight Beacon System for UAS and Other Aviation Applications |
Robert Strain |
|
Samar Guharay |
|
|
Jeffrey Correia |
|
|
Alex C. Meng |
|
|
Sherry Olson |
|
|
Harry Sleeper |
|
|
Thom Bronez |
|
|
Gerald Gilbert |
|
| Social and Behavioral Sciences |
||
|
Cultural Semiotics for Counter Insurgency Operations & Intelligence |
Frank Stech |
|
Charles Worrell |
|
|
Investigating Intentions and Motivations Behind the Use of Chemical or Biological Weapons |
Marianne Abbott |
|
Lashon Booker |
|
|
Julia Hiland |
|
|
Jo Ann Brooks |
|
|
Dan Loehr |
|
| Other |
||
|
Gerard Eldering |
|
Last Updated: 03/09/2007 |
||
Solutions That Make a Difference.® |
|
|