<--- Back to Details
First PageDocument Content
Military terminology / Military science / Interoperability / Conceptual interoperability / Military technology / Distributed computing architecture / Composability / High-level architecture / Simulation Interoperability Standards Organization / Modeling and simulation / Software engineering / Computing
Date: 2009-08-03 02:14:40
Military terminology
Military science
Interoperability
Conceptual interoperability
Military technology
Distributed computing architecture
Composability
High-level architecture
Simulation Interoperability Standards Organization
Modeling and simulation
Software engineering
Computing

Levels of Conceptual Interoperability Model: Roles and Application

Add to Reading List

Source URL: arxiv.org

Download Document from Source Website

File Size: 1,46 MB

Share Document on Facebook

Similar Documents

Universal Composability Proving the Correctness of Blockchain Protocols Abhiram Kothapalli

DocID: 1ulMc - View Document

On Schedulability and Time Composability of Data Aggregation Networks Fatemeh Saremi∗ , Praveen Jayachandran† , Forrest Iandola∗ , Md Yusuf Sarwar Uddin∗ , Tarek Abdelzaher∗ , and Aylin Yener‡ ∗ Department

DocID: 1tI07 - View Document

Probabilistic Termination and Composability of Cryptographic Protocols∗ Ran Cohen† Sandro Coretti‡

DocID: 1sJ44 - View Document

Computing / Computer hardware / Computer performance / Computer storage media / Non-volatile memory / Solid-state drive / Composability / Hyper-V / IOPS / Storage area network / Apache Hadoop / Direct memory access

Composable Architecture for Rack Scale Big Data Computing Chung-Sheng Li1, Hubertus Franke1, Colin Parris2, Bulent Abali1, Mukil Kesavan3, Victor Chang4 1. IBM Thomas J. Watson Research Center, Yorktown Heights, NY 1059

DocID: 1rqte - View Document

Cryptography / Secure multi-party computation / Secret sharing / Public-key cryptography / Universal composability / Communications protocol / Cryptographic protocol / Cartesian coordinate system / Transmission Control Protocol / Secure two-party computation

Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

DocID: 1rpD9 - View Document