22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

236 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

an algorithm that bases on information that would be received from an external<br />

Network Monitoring Element.<br />

There has been proven that the proposed AAO model is semantically <strong>and</strong><br />

syntactically correct <strong>and</strong> consistent. Reasoning over it provides the possibility to<br />

support the adaptation actions decisions taking into account the user preferences<br />

deriving from his role <strong>and</strong> limitations of his terminal. The SWRL rules defined for<br />

AFRO strongly support the automatic process of defining the preferred actions.<br />

The proposed adaptation mechanism gives promising effects for low level<br />

comm<strong>and</strong>ers located at the battlefield, which can be supplied with information<br />

generally available on high comm<strong>and</strong> levels which, up to now, were very rarely<br />

distributed to tactical networks.<br />

References<br />

[1] J.A. Estefan, K. Laskey, F.G. McCabe, D. Thornton, Reference Architecture<br />

Foundation for Service Oriented Architecture, Version 1.0, OASIS Committee Draft<br />

02, 14 October 2009.<br />

[2] M. Booth, T. Buckman et al, NATO Network Enabled Feasibility Study Volume II:<br />

Detailed Report Covering a Strategy <strong>and</strong> Roadmap for Realizing an NNEC Networking<br />

<strong>and</strong> <strong>Information</strong> Infrastructure, version 2.0”, NATO C3 Agency, June 2005.<br />

[3] NATO Architecture Framework (NAF) version 3.0, June 2007.<br />

[4] NATO C3 System Interoperability Directive (NID), AC/322-D(2004)0001(INV)<br />

Annex C.<br />

[5] J. Busch, An investigation into deploying web services, TN – 1229, NC3A, December<br />

2007.<br />

[6] R. Faucher, R. Ladysz, D. Miller, S. Musman, S. Raparla, D. Smith, Guidance on<br />

Proxy Servers for the Tactical Edge, The MITRE Corporation, MITRE TECHNICAL<br />

REPORT no. 060175, September 2006.<br />

[7] M. Weiser, The computer for the 21st century, Scientific American, (1991), 265(3):<br />

94-104.<br />

[8] J.P. Sousa <strong>and</strong> D. Garlan, (2002). Aura: An architectural framework for user mobility<br />

in ubiquitous computing environments, In Proceedings of 3rd IEEE/IFIP Conference<br />

on Software Architecture.<br />

[9] P.F. Patel-Schneider, I. Horrocks, OWL Web Ontology Language Semantics <strong>and</strong><br />

Abstract Syntax Section 2. Abstract Syntax, http://www.w3.org/TR/owl-semantics/<br />

syntax.html<br />

[10] Strang et al., A context modelling survey, Workshop On Advanced Context<br />

Modelling, Reasoning And Management Associated With The Sixth International<br />

Conference On Ubiquitous Computing (Ubicomp4), Nottingham/UK.<br />

[11] I. Horrocks et al., SWRL: A Semantic Web Rule Language. Combining OWL <strong>and</strong><br />

RuleML, W3C Member Submission 21 May 2004, http://www.w3.org/Submission/<br />

SWRL/

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!