We discuss an approach in which the virtual environment is semantically instrumented in order to allow for the tracking of and reasoning about open-ended learner activity therein.
This paper presents an approach to training in VEs that directly addresses these challenges and summarizes its application to a weapons maintenance task.
We discuss challenges in leveraging heterogeneous networking technologies to create resilient and flexible infrastructure for information collection and information dissemination in cyber-physical environments.
We design and implement a “what-if” analysis methodology using formal methods. Our methodology analyzes the impact of failures and changes in heterogeneous networks on QoS of flows.
Policy-Based Data Downgrading: Toward a Semantic Framework and Automated Tools to Balance Need-To-Protect and Need-To-Share Policies
We describe a new paradigm for articulating need-to-protect and need-to-share policies that shows promise for enabling automated derivation of the downgrading rulesets needed to comply with these policies in systems that share data.
We have developed a prototype tool for interactive music creation, called Constraint Muse, that uses monoidal soft constraints to ensure that a dynamically generated melody harmonizes with input from other sources.
We describe our novel ways of using SWRL and discuss its limitations as well as extensions to it that we found necessary or desirable.
The most comprehensive book on cognitive radio technologies – bringing together everything a wireless engineer needs to know in this important and growing field.
We describe a reasoner for OWL ontologies and SWRL policies used on cognitive radios to control dynamic spectrum access.