Technical Papers - 2011
December 2011
Composable Operations Center
Aaron Griggs, Jeff Barron, Steve Jones, Kem Kaiyarath, Weber Lin, Dan Ostermiller, Josh O'Sullivan
On the Use of Shor States for the [7, 1, 3] Quantum Error Correcting Code
Yaakov S. Weinstein, Sidney Buchbinder
Vulnerability Assessment for Substation Automation Systems
Adam Hahn, Manimaran Govindarasu, Chen-Ching Liu
Electric Vehicle Charging Infrastructure Recommendations to Fairfax County
Matt Olson, Patrick Mahoney, Ken Hoffman, Brad Schoener
November 2011
New Results for Timing-Based Attestation
Xeno Kovah, Corey Kallenberg, Chris Weathers, Amy Herzog, Matthew Albin, John Butterworth
Minimum-Cost First-Push-Then-Pull Gossip Algorithm
Ali Saidi, Mojdeh Mohtashemi
The State of Security Automation Standards - 2011
Gerard T. McGuire
Patterns of Success in Systems Engineering -- Acquisition of IT-Intensive Government Systems
George Rebovich, Jr., Joseph K. DeRosa
September 2011
Linear Quantum Capacitance Scaling for Lanthanide and Actinide Atoms: Analysis of Two Differing Sets of Electron Affinity Predictions
William E. Bunting, James C. Ellenbogen
Resiliency Research Snapshot
Rich Pietravalle, Dan Lanz
KML Best Practices for Interoperability
Jason Mathews
August 2011
Portfolio Influences on Air Force Capabilities-Based Assessment and Capabilities-Based Planning Activities
Cheryl M. Strube, J.R. (Jeff) Loren
July 2011
Digital Policies for Patient Consents: The Thorny (and General) Technical Challenges
Arnon Rosenthal
Thoughts on Military Spectrum Relocation Strategy
Jonathon Cheah, Rich North
June 2011
Making Acquisition Measurable
Kevin Buck, Diane Hanf
May 2011
Discriminating Gender on Twitter
John Burger, John Henderson, George Kim, Guido Zarrella
Contact Recommendations from Aggegrated On-Line Activity
Abigail Gertner, Robert Gaimari, Justin Richer, Thomas Bartee
An Assessment of Pilots' Concurrent Use of Runway Entrance Lights and Surface Movement Control System Guidance System Stop Bars
Kathleen McGarry, Emily Stelzer
A Discussion on Electrically Small Antennas Loaded with High Permittivity and Permeability Materials
Steven R. Best
Using a Cockpit Display of Traffic Information with Indications and Alerts to Prevent Runway Incursions
Peter M. Moertl, Kathleen McGarry
An HLA-Based Approach to Quantify Achievable Performance for Tactical Edge Applications
Brian Rivera, John A. Tufarolo, Gary Comparetto, Vinay Lakshminarayan, Mohammad Mirhakkak, Ernest H. Page, Nancy Schult, David Yoo
The Relationship Between Human and Machine-Oriented Standards and the Impact to Enterprise Systems Engineering
David Mann, JoAnn Brooks, Joe DeRosa
"The Thing is... What is Our 'What'?"
Anne Warfield Rawls, David Mann
Research Challenge: The Next Generation Air Transportation System (NextGen)
Dr. Glenn Roberts
Model-Based Spectrum Management—Part 1: Modeling and Computation Manual
John A. Stine, Samuel Schmitz
April 2011
A Slot Allocation Algorithm for Survivability of Tactical TDMA Networks
Jack Shaio, Jessica R. Piper, Jon Barto
Measuring the Forecast Accuracy of Intelligence Products
Paul Lehner, Avra Michelson, Leonard Adelman
Independent URA Monitor for GPS IIIC
Ronald Braff, Brian Bian, Curtis A. Shively
Context-Sensitive Detection of Local Community Structure
L. Karl Branting
Applications of a Terminal Area Flight Path Library
James DeArmon, Anuja Mahashabde, William Baden, Peter Kuzminski
Human-in-the-Loop Simulations of Surface Trajectory-Based Operations
Emily K. Stelzer, Constance E. Morgan, Kathleen A. McGarry, Kathryn A. Klein, Karol Kerns
Improving Departure Taxi Time Predictions Using ASDE-X Surveillance Data
Amal Srivastava
Reliable Electronic Text: The Elusive Prerequisite for a Host of Human Language Technologies
Paul M. Herceg, Catherine N. Ball
A Comparative Study of PDF Generation Methods: Measuring Loss of Fidelity When Converting Arabic and Persian MS Word Files to PDF
Paul M. Herceg, Catherine N. Ball
March 2011
Determining Assertion Status for Medical Problems in Clinical Records
Cheryl Clark, John Aberdeen, Matt Coarr, David Tresner-Kirsch, Ben Wellner, Alexander Yeh, Lynette Hirschman
Dynamic Red Queen Explains Patterns in Fatal Insurgent Attacks
Neil Johnson, Spencer Carran, Joel Botner, Kyle Fontaine, Nathan Laxague, Philip Nuetzel, Jessica Turnley, Brian Tivnan
Adding to the Regulator's Toolbox: Integration and Extension of Two Leading Market Models
Brian F. Tivnan, Matthew T. K. Koehler, Matthew McMahon, Matthew Olson, Neal J. Rothleder, Rajani R. Shenoy
Handbook for Implementing Agile in Department of Defense Information Technology Acquisition
Carlton Northern, Dr. Kathleen Mayfield, Robert Benito, Michelle Casagni
February 2011
National Airspace System Security Cyber Architecture
James H. Williams, T.L. Signore
Using Inferred Probabilities to Measure the Accuracy of Imprecise Forecasts
Paul Lehner, Avra Michelson, Leonard Adelman, Anna Goodman
A Model-Based Analysis of Semi-Automated Data Discovery and Entry Using Automated Content Extraction
Ransom Winder, Craig Haimson, Jade Goldstein-Stewart, Justin Grossman
Programmable Nanowire Circuits for Nanoprocessors
Hao Yan, Hwan Sung Choe, SungWoo Nam, Yongjie Hu, Shamik Das, James F. Klemic, James C. Ellenbogen, Charles M. Lieber
Nanotechnology Enabled Hybrid Power System Suitable for Portable Telecommunications and Sensor Applications
Rebecca G. Willmott, Kurt Eisenbeiser, Carl A. Picconatto, James C. Ellenbogen
NCIC 2000 Image Compression Algorithms—Volume IV: Flat Live-Scan Searchprint Compressions
David J. Braunegg, Eric J. Donaldson, Richard D. Forkert, Margaret A. Lepley, Sherry L. Olson
January 2011
Network Management in Emergency Response: Articulation Practices of State-Level Managers Interweaving Up, Down and Sideways
JoAnn Brooks, Deb Bodeau, Jane Fedorowicz
Technical Paper Archives 
|