AbstractOur research focusses on improving the quality and accuracy of the common operating picture of a tactical scenario through the efficient allocation of bandwidth in the tactical data networks among self-interested actors, who may resort to strategic behaviour dictated by self-interest. We propose a two-stage bandwidth allocation mechanism based on modified strictly-proper scoring rules, whereby multiple agents can provide track data estimates of limited precisions and the centre does not have to rely on knowledge of the true state of the world when calculating payments. In particular, our work emphasizes the importance of applying robust optimization techniques to deal with the data uncertainty in the operating environment. We apply ...
Sensor networks are increasingly seen as a solution for a large number of environmental, security an...
A number of environmental factors commonly present in military and particularly tactical military co...
In this paper, we investigate the problem of designing a spectrum scanning strategy to detect an int...
AbstractOur research focusses on improving the quality and accuracy of the common operating picture ...
We consider a tactical data network with limited bandwidth, in which each agent is tracking objects ...
A mechanism is an institution such as an auction, voting protocol, or a market that defines the rule...
Tactical networks, networks designed to facilitate command and control capabilities for militaries, ...
Sensor networks are increasingly seen as a solution for a large number of environmental, security an...
Attackers ’ private information is one of the main issues in defensive resource allocation games in ...
Tactical networking environments present many challenges in terms of bandwidth, latency, reliability...
Network resources (such as bandwidth on a link) are not unlimited, and must be shared by all network...
This paper studies the interplay between a profit-maximizing network and a number of users competing...
Tactical networks may deal with unexpected conditions in both kinetic (an adversary) and digital (cy...
The age of information is a performance metric describing the freshness of updates, and is of partic...
This paper studies the interplay between a profit-maximizing network and a number of users competing...
Sensor networks are increasingly seen as a solution for a large number of environmental, security an...
A number of environmental factors commonly present in military and particularly tactical military co...
In this paper, we investigate the problem of designing a spectrum scanning strategy to detect an int...
AbstractOur research focusses on improving the quality and accuracy of the common operating picture ...
We consider a tactical data network with limited bandwidth, in which each agent is tracking objects ...
A mechanism is an institution such as an auction, voting protocol, or a market that defines the rule...
Tactical networks, networks designed to facilitate command and control capabilities for militaries, ...
Sensor networks are increasingly seen as a solution for a large number of environmental, security an...
Attackers ’ private information is one of the main issues in defensive resource allocation games in ...
Tactical networking environments present many challenges in terms of bandwidth, latency, reliability...
Network resources (such as bandwidth on a link) are not unlimited, and must be shared by all network...
This paper studies the interplay between a profit-maximizing network and a number of users competing...
Tactical networks may deal with unexpected conditions in both kinetic (an adversary) and digital (cy...
The age of information is a performance metric describing the freshness of updates, and is of partic...
This paper studies the interplay between a profit-maximizing network and a number of users competing...
Sensor networks are increasingly seen as a solution for a large number of environmental, security an...
A number of environmental factors commonly present in military and particularly tactical military co...
In this paper, we investigate the problem of designing a spectrum scanning strategy to detect an int...