Leveraging network-centric strategic goals in capabilities

نویسندگان

چکیده

Abstract The vision of network-centric operations is to increase operational capabilities through networked collaboration. NATO and its member nations state this in strategic documents at a very high level abstraction. While suitable for giving an overall feel, current documentation renders the steps toward implementing those visions largely unsupported. We outline method that based on agile requirements engineering, converting high-level into whose forms lend themselves incremental implementation. illustrate use two cases deal with both technical capabilities. also show how enables one prioritise which develop first. conclude it necessary formulate implement some form explicit methodology span gap between effective implementation visions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Leveraging In-network Caching for Efficient Content Delivery in Content-centric Network

The recent proposal on content-centric network advocates the use of in-network caching to enhance content delivery in the Internet. In this paper, we proposed an in-network caching algorithm based on the concept of ego network betweenness centrality and compared its performance with Van Jacobson’s networking named content caching technique.

متن کامل

Business Capabilities Centric Enterprise Architecture

In the field of Enterprise Architecture, The Open Group Architecture Framework (TOGAF) is a well known framework, that links Business Architecture, Data Architecture, Application Architecture, Technology. A key concept within Business Architecture domain is Business Capabilities, that are delivered by Business Component (BC). A BC is a business unit that encompasses a coherent set of activities...

متن کامل

Leveraging commitments and goals in agent interaction

Modeling and regulating interactions among agents is a critical step in the development of Multiagent Systems (MASs). Some recent works assume a normative view, and suggest to model interaction protocols in terms of obligations. In this paper we propose to model interaction protocols in terms of goals and commitments, and show how such a formalization promotes a deliberative process inside the ...

متن کامل

Leveraging Smartphone Hardware Capabilities for Alternative Authentication

In this project, we explore two forms of user authentication, alternative to the alpha-numeric password, through utilization of various hardware components in a modern smartphone. These components act as input channels for biometric and geolocative data, which can be used to validate the identity of a user through gesture-based authentication (via the accelerometer and orientation sensor) and l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of military studies

سال: 2021

ISSN: ['2242-3524', '1799-3350']

DOI: https://doi.org/10.2478/jms-2021-0001