Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.

Slides:



Advertisements
Similar presentations
Welcome to Physics 432 Mr. Goznikar
Advertisements

Figure(s) Summary (breakout session name) Science Opportunity #1 Science Challenge/Opportunity –Describe an important open science question in your field.
Establishing Effective Partnerships Jayne Taylor (SHU) & David Broomby (TUOS)
Sunday, May 17, 2015 Page 1 Investigating “Hider” Theory New Horizons in Search Theory 4 th Workshop.
Leading Australian Curriculum: Science Day 2. Australian Curriculum CONSIDERATIONS FROM DAY 1 In your journal reflect on the following question: What.
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
Copyright  Alidade Consulting All Rights Reserved ADMINISTRATION Restrooms Business Center Food and Drink Problems? See Betty ROE Product?
Welcome to Quark Net 2011 Wayne State University Physics Department.
Hypotheses. Hypotheses are about applying theory to your research question A good research paper starts with a context that conceptualizes the problem,
Software engineering as a model of understanding for learning and problem solving Paul Gibson and Jackie O’Kelly Computer Science Department NUI, Maynooth.
Introduction A little history From theory to practice How models help Some issues with models Bringing models together Generalisation.
SC In UC July Cynthia Shelton A Scholarly Communication Symposium for UCLA Faculty The Big Event as a Strategy for Outreach and Action.
Interaction What cognitive science has to offer for research on appropriation and end-user development Antti Salovaara Ubiquitous.
MAKING MODERN LIVING POSSIBLE Exploring the future of wholesaling March 18-19, 2008.
© 2012 Common Core, Inc. All rights reserved. commoncore.org NYS COMMON CORE MATHEMATICS CURRICULUM A Story of Units Module 3 Content.
Innovative Strategies for Conducting Career Center Assessment Presented by Marian Higgins, Nicole Lechene & Penny Benton The University of Georgia.
Registration Management Committee 2014 RMC Workshop Feedback September 17, 2014 Jeff Long.
What is it? It is an applications driven course that is based upon the study of events that occur in small, or discrete, chunks. Discrete concepts are.
Engaging Families to participate in a family group conference Introduction of Presenters Introduction of Presenters Troy Tate, Dereasha Leaks, Sandra Taylor,
LSIS STEM Programme Science, Engineering and Mathematics support for Subject Learning Coaches Teaching and learning Welcome to the Mathematics Regional.
C HAPTER Social Networking Using LinkedIn 5 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
Session 4: Next steps.  As relationships develop, you will sense in due course the right time to begin to go a step further  Discuss these and other.
1 Region One ESC GEAR UP: Ready, Set, College! ©2011 Region One Education Service Center Welcome Back! Everyone check in outside?
Mathematics Leadership Support Network Presentation Provided Jointly by the P-12 Math and Science Outreach Division of PIMSER and the Kentucky Department.
Research in Computing สมชาย ประสิทธิ์จูตระกูล. Success Factors in Computing Research Research Computing Knowledge Scientific MethodAnalytical Skill Funding.
© Copyright 2014 James Shirley Management Consultants, Inc. All right reserved. (10/22/14) Slide 1 Welcome Effective Measurement and Respectful Reporting.
Putting Research to Work in K-8 Science Classrooms Ready, Set, SCIENCE.
About the Master class The Master Class is offered to experienced evaluators or those who have already attended several Clear Horizon courses, or other.
SCIENCE COMPANION, SESSION 3 INTRODUCTION TO THE ________________ MODULE [Your name here] January 24, 2011.
Copyright © 2011, SAS Institute Inc. All rights reserved. SAS ® Curriculum Pathways ® Ralph Moore
E-Science Projects and Security M. Angela Sasse & Mike Surridge.
Welcome! These workshops are called “Managing for Success.” But, what is success? While we’re waiting for everyone to arrive could you… Jot down what success.
CMPT 880/890 The Scientific Method. MOTD The scientific method is a valuable tool The SM is not the only way of doing science The SM fits into a larger.
WELCOME BACK TO CAMP!. Agenda Warm-Up for statistical and probabilistic thinking Norms for our PD Teaching through problem solving Break Lesson Study:
HISTORY OF INTERNET. THE BEGINNING OF THE INTERNET It will help in discussing the beginnings of the Internet to define what the Internet is. Now, you.
A centre of expertise in digital information management
2011 NJ Coordinators Meeting
The Global Forum on Technology and Innovation in Teaching and Leading 14 th -17 th April 2010.
Deconstructing Media Introduction. Anatomy of Media Media: any communication that is This includes messages from the Media Analysis: Five Core Concepts.
Purpose of a Literature Review Potential Research Sources Writing a Literature Review.
Laboratory System Improvement Program (insert name of state) Assessment Date.
1 Spring-Ford Area School District & Project Lead the Way STEM Education Program October 28, 2013.
PhUSE Computational Science Working Groups Solutions Through Collaboration.
An Information Age Combat Model Research Update Copyright , Alidade Consulting, All Rights Reserved Jeff Cares Alidade Incorporated Search Theory.
Dr. Joanne E. Nottingham AVOIDING MIXED MESSAGES A focus on the consequences of combining language tools and how to fix mixed messages.
Department of Mathematics and Science Office of Academics and Transformation Ms. Glenda Moton, CSS Millard Lightburn, Ph.D. Supervisor MDCPS Elementary.
Introduction to ScienceSection 1 Section 1: The Nature of Science Preview Key Ideas Bellringer How Science Takes Place The Branches of Science Scientific.
Tennessee Valley Chapter SPACE AND MISSILE DEFENSE WORKING GROUP 28 January 2016.
Tuesday, June 07, 2016 Page 1 Investigating “Hider” Theory New Horizons in Search Theory 4 th Workshop.
4:00 – 4:05pm Welcome and Introductions 4:05 – 4:20pm Ice Breaker 4:20-4:30 pm Norms 4:30 – 5:00pm Journaling 5:00 – 5:30 pm Enquiry activity stations.
Good Morning!. Information Seeking in an Electronic Environment Kathleen Weibel Simmons College/Atlantic Philanthropies Vietnamese Scholar Library Program.
Data Use for Gender-Aware Health Programming Welcome and Introductions.
Welcome to Grey Matters
Public Libraries and Access to Justice: Introduction
Karen Bartleson, President, IEEE Standards Association
Welcome Please put on your child’s nametag and read the clues they have written for you! Your challenge is to use the clues to find your child’s seat.
Formulating a research question
Proud to Present Good Morning & welcome to the 11th Annual VHVI Symposium Thank you all for coming today Our planning committee has put together an exciting.
Welcome to the CIM University
PhUSE Computational Science Working Groups
The method scientists use to find answers to questions
สมชาย ประสิทธิ์จูตระกูล
Geo-Needs An NSF funded project to explore barriers and opportunities for enhancing geoscience instruction at two-year colleges and minority-serving institutions.
What do Psychologists do?
TDW-11: 24-28th April 2017, Noumea, New Caledonia
The Activity of Philosophy
Welcome January 9th, 2019 WIFI Network: MSFTGUEST
Brussels, 22 May partnicipants 27 countries Brokerage events: morning session: first-hand information about Horizon 2020 Science with.
Karen Bartleson, President, IEEE Standards Association
Presentation transcript:

Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved

New Horizons in Search Theory 4 th Workshop INVESTIGATING ‘HIDER THEORY’ ©2004 Alidade Incorporated. All Rights Reserved

Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved Agenda Introduction Previous Workshops Abstract and Charge Schedule

Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved Introduction Newport Center for Information Age Warfare Sciences Santa Fe Institute/BiosGroup, Inc. Premise for Workshop Series –Search Theory, as understood by military researchers, had not fundamentally changed in many decades, although the platforms and operational concepts were under extraordinary transformation

New Horizons in Search Theory: From Abstraction to Application May 21-23, 2001 Newport, Rhode Island

Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved 2001: From Abstraction to Application Focus: –Bring the combinatoric optimization crowd and military search theorists together to see if they had anything in common Stu Kauffman, Jose Lobo, Bill MacReady Wayne Hughes, Brian McCue, Don DelBalzo Colloquium –Is Search Still Relevant?

New Horizons in Search Theory 2 nd International Workshop “Search Theory, Invented Now”

Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved 2002: Search Theory, Invented Now Focus: –Examine the changes in operational concepts, mathematical tools and platform technologies to see if we would invent the same Search Theory now as we did then Josh Epstein, Fred Glover, Rob Axtell Brian McCue, Ralph Klingbeil, Ray Hill Colloquium –Search Theory, Invented Now –Agent-based modeling approaches

New Horizons in Search Theory, 3 nd Workshop “NETWORKED SEARCHES AND SEARCHES IN NETWORKS”

Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved 2003: Networked Searches, Searches in Networks Focus: –Examine aspects of search using networks as well as aspects of search for information within networks. Dave Davis, Peter Dodd Brian McCue, Ray Christian, Ray Hill Colloquium –Search with Networks

Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved 2004: Investigating Hider Theory A ballistic missile submarine (SSBN) that does not want to be detected while on deterrence patrol A downed pilot in enemy-controlled territory who does not want to be found by the enemy but does want to be rescued An embezzler who does not want to be discovered for a long time An in-country terrorist waiting for orders or opportunity to strike within some time duration An encrypted electronic message that is perhaps buried within a benign or noise transmission A pollution event; hide who did it and perhaps blame someone else “Hider Theory” should shed light on what these examples have in common and what makes them different.

Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved Agenda Day 1 Morning Session –Welcome and Introduction: Jeff Cares –An Exploration of Zig-zagging, Brian McCue –Investigating Terrorist and Smuggling Games, Jim Taylor –Intro to Hider Theory, Ralph Klingbeil Lunch Afternoon Session –An Operational Perspective of Smuggling Tactics, CAPT Ivan Luke, USCG –An Operational Perspective of Submarine Evasion Operations, CDR Dale Sykora,USN –Breakout groups

Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved Agenda Day 2 Morning Session –Breakout Lunch Afternoon Session –Breakout –Report

Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved Remember Time is built into the schedule to ask and answer questions Workshops should work!

Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved Alidade Services