Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: symposium

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

359

A Framework for Enterprise Systems Engineering Processes

Publication
November 01, 2006
… Rebovich, and Robert S. Swarz, An Enterprise Systems Engineering Model, INCOSE International Symposium, 2006 [4] INCOSE, Systems Engineering Handbook, INCOSE-TP-2003-016-02, Version 2a, June … L., and Brian E. White, Engineering Enterprises Using Complex-System Engineering, INCOSE 2005 Symposium, Rochester, NY, 10-15 July 2005. [8] McCaughin, L. Keith and Joseph K. DeRosa, Process in Enterprise Systems Engineering, INCOSE 2006 Symposium, Orlando, FL, July 2006. [9] McMullen, William, Enterprise Architecting within …

Principles of Adaptive Space-Time-Polarization Cancellation of Broadband Interference

Publication
January 04, 2004
… in an Interference Environment,” Proc. IEEE 2000 Precision Location and Navigation Symposium, pp. 37-40,2000 (ISBN: 0-7803-5872-4, IEEE Cat. No. 00CH37062). 20. I. Gupta and A. … D. Blejer, “Mutual Coupling Analyses for Small GPS Adaptive Arrays,” IEEE SP-S International Symposium, Vol. 4, pp. 38-41, 2001. 22. E. Ngai, D. Blejer, T. Phuong, and J. Herd, “Anti-Jam Performance of Small GPS Polarimetric Arrays,” IEEE AP-S International Symposium, pp. 128-131, 2002. 23. I. Gupta, private communication at the Ohio State University, …

Strand Spaces: Why is a Security Protocol Correct?

Publication
March 01, 2000
… CECOM contract DAAB 07-96-C-E601. Copyright 1998 IEEE. Published in Proceedings, 1998 IEEE Symposium on Security and Privacy, 3-6 May 1998 in Oakland, California. an ideal cryptosystem. In … and M. R. Tuttle. A semantics for a logic of au- thentication. In Proceedings of the 10th ACM Symposium on Principles of Distributed Computing, pages 201–216, Au- gust 1991. [3] M. Burrows, … belief in cryptographic protocols. In D. Cooper and T. Lunt, editors, Proceedings 1990 IEEE Symposium on Research in Security and Privacy, pages 234–248. IEEE Computer So- ciety, May 1990. …

Sensor Data Analysis Framework Research Roadmap: Integrating Stream Processing and Persistent Data Retrieval

Publication
August 01, 2006
… SMTI and media streaming data and to describe outyear efforts. 1.3 Schedule Project Calendar Symposium Summary Brief due April, 3, 2006 Tech Symposium – McLean, VA April 27, 2006 Tech Symposium – Bedford, MA May 4, 2006 1 2 Research 2.1 Research Question How are sensor data …

Characterizing Intimate Mixtures of Materials in Hyperspectral Imagery with Albedo-based and Kernel-based Approaches

Publication
August 31, 2015
… linear mixture analysis of imaging spectrometry data,” Proceedings of the International Symposium on Spectral Sensing Research (ISSSR), San Diego, CA. (1994). [3] Rand R.S., “A … demixing to perform automated material identification.” Proceedings of the International Symposium on Spectral Sensing Research (ISSSR), Melbourne, Australia, (1995). [6] Rand R.S. and … squares abundance estimates,” Proceedings of the IEEE International Geoscience and Remote Symposium (IGARSS 2007), Barcelona, Spain, 4091-4044 (2007). [15] Broadwater J.B. and Banerjee …

Net-Centric Information Management

Publication
September 01, 2005
… Public Release; Distribution Unlimited Case #05-0800 In: 8th Int. C2 Research and Technology Symposium, McLean VA, 2005 (to appear) Net-Centric Information Management Dr. Scott Renner The … to Support Coalition Information Sharing Needs”, in Proc. 10th Int. C2 Research and Technology Symposium, McLean, VA, June 2005. [7] U.S. Air Force, Air Force Information and Data Management … Information Systems For Network-Centric Warfare”, in Proc. 8th Int. C2 Research and Technology Symposium, Washington, DC, June 2003. [9] Global Information Grid (GIG) Enterprise Services (GES) …

PLUS: Synthesizing Privacy, Lineage, Uncertainty and Security

Publication
May 01, 2009
… Press, 1995. [10] G. Kuper, F. Massacci, and N. Rassadko. Generalized xml security views. ACM symposium on Access control models and technologies (SACMAT), 2005 [11] J. Ledlie, C. Ng, and D. … for Level-One Sensor Fusion. In 10th International Command & Control Research and Technology Symposium, 2005. [14] M. Mutusuzaki, M. Theobald, A. De Keijzer, J. Widom, P. Agarawal, O. …

Could You Repeat the Question?

Publication
August 01, 2000
… Language Assessment and Evaluation in Natural Language Processing, Proceedings of a Symposium by ACL/IALL. University of Maryland, p. 47-54 Michaud, L.; and McCoy, K. 2000. … In Proceedings of the 13th Annual International Florida Artificial Intelligence Research Symposium , Orlando, Florida, p. 50-54, May 22-24, 2000. Moore, J. 1995. Participating In …

Quenching the Thirst for Human-Machine Teaming Guidance: Helping Military Systems Acquisition Leverage Cognitive Engineering Research

Publication
May 30, 2018
… autonomy for extended human-agent interaction in space applications. In AAAI 2004 Spring Symposium, 22-24. Hoff, K. A., & Bashir, M. (2015). Trust in Automation: Integrating Empirical … Being Transparent about Transparency: A Model for Human-Robot Interaction. In AAAI Spring Symposium Series. Militello, L. G., & Hutton, R. J. (1998). Applied cognitive task analysis …

Specifying Data Sharing Agreements

Publication
June 01, 2006
… 2000. [2] M. Hilty, D. Basin, and A. Pretschner. On obligations. In 10th European Symposium on Research in Computer Security (ESORICS 2005), volume 3679 of Lecture Notes in … semantics for SA style data flow diagram specification languages. In Proceedings of the ACM Symposium on Applied Computing (SAC), pages 526–532, 1999. [5] L. Seligman, A. Rosenthal, and J. …
  • First page
  • Previous page
  • …
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Current page 6
  • Page 7
  • Page 8
  • Page 9
  • Page 10
  • …
  • Next page
  • Last page
Displaying 51 - 60 of 359
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links