skip to content

Llinas, James

Works: 31 works in 85 publications in 1 language and 1,204 library holdings
Genres: Handbooks and manuals  Conference papers and proceedings 
Roles: Editor, Other, Author
Classifications: TK5102.9, 681.2
Publication Timeline
Publications about James Llinas
Publications by James Llinas
Most widely held works by James Llinas
Handbook of multisensor data fusion by Martin E Liggins( Book )
29 editions published between 2001 and 2009 in English and held by 356 libraries worldwide
The Handbook of Multisensor Data Fusion provides a unique, comprehensive, and up-to-date resource for data fusion systems designers and researchers. Divided into five parts, its outstanding features include the following: A thorough introduction to data fusion terminology and models; Advanced techniques for data association, target tracking, and identification; Practical information on system development, including requirements analysis, systems engineering, algorithm selection, database design, human-computer interfaces, and performance assessment; Applications from the DoD, NASA, DARPA, and condition-based monitoring of complex machinery; Data fusion resources and Web sites (MOD)
Multisensor data fusion by Edward Waltz( Book )
11 editions published between 1990 and 2001 in English and held by 203 libraries worldwide
Context-Enhanced Information Fusion : Boosting Real-World Performance with Domain Knowledge by Lauro Snidaro( file )
4 editions published in 2016 in English and held by 35 libraries worldwide
This interdisciplinary text/reference reviews the fundamental theory and latest methods for including contextual information in fusion process design and implementation. Chapters are contributed by the foremost international experts, spanning numerous developments and applications. The book highlights high- and low-level information fusion problems, performance evaluation under highly demanding conditions, and design principles. A particular focus is placed on holistic approaches that integrate research from different communities, emphasizing the benefit of combining different techniques to overcome the limitations of a single perspective or approach. Topics and features: · Introduces the essential terminology and core elements in information fusion and context, conveyed with the support of the JDL/DFIG data fusion model · Presents key themes for context-enhanced information fusion, including topics derived from target tracking, decision support and threat assessment · Discusses design issues in developing context-aware fusion systems, proposing several architectures optimized for context access and discovery · Provides mathematical grounds for modeling the contextual influences in representative fusion problems, such as sensor quality assessment, target tracking, robotics, and text analysis · Describes the fusion of device-generated (hard) data with human-generated (soft) data · Reviews a diverse range of applications where the exploitation of contextual information in the fusion process boosts system performance This authoritative volume will be of great use to researchers, academics, and practitioners pursuing applications where information fusion offers a solution. The broad coverage will appeal to those involved in a variety of disciplines, from machine learning and data mining, to machine vision, decision support systems, and systems engineering. Dr. Lauro Snidaro is an Assistant Professor in the Department of Mathematics and Computer Science at the University of Udine, Italy. Dr. Jesús García is an Associate Professor in the Computer Science and Engineering Department at the Carlos III University of Madrid, Spain. Dr. James Llinas is an Emeritus Professor in the Department of Industrial and Systems Engineering, and in the Department of Electrical Engineering, at the State University of New York at Buffalo, NY, USA. Dr. Erik Blasch is a Principal Scientist at the Air Force Research Laboratory Information Directorate (AFRL/RIEA) in Rome, NY, USA. The editors and contributors have all been leading experts within the international society of information fusion (
International Symposium on Distributed Computing and Artificial Intelligence 2008 (DCAI 2008) by Juan Manuel Corchado( file )
4 editions published in 2009 in English and held by 29 libraries worldwide
The International Symposium on Distributed Computing and Artificial Intelligence is an annual forum that brings together ideas, projects, lessons, etc. associated with distributed computing, artificial intelligence and its applications in different themes. This meeting has been held at the University of Salamanca from the 22th to the 24th of October 2008. The technology transfer in this field is still a challenge and for that reason this type of contributions has been specially considered in this edition. This conference is the forum in which to present application of innovative techniques to complex problems. The artificial intelligence is changing our society. Its application in distributed environments, such as the Internet, electronic commerce, mobile communications, wireless devices, distributed computing, and so on is increasing and is becoming an element of high added value and economic potential, both industrial and research. These technologies are changing constantly as a result of the large research and technical effort being undertaken in both universities and businesses. The exchange of ideas between scientists and technicians from both academic and business areas is essential to facilitate the development of systems that meet the demands of today's society. This symposium has evolved from the Iberoamerican Symposium on Distributed Computing and continues to grow and prosper in its role as one of the premier conferences devoted to the quickly changing landscape of distributed computing, artificial intelligence and the application of AI to distributed systems. This year's technical program is extremely strong and diverse, with contributions in both established and evolving areas of research. Submitted papers came from over 16 different countries, representing a truly "wide area network" of research activity. The DCAI technical program includes 88 papers (74 long papers, 12 short papers and 2 doctoral consortium) selected from a submission pool of 142 papers, from 16 different countries
Next-generation analyst II : 6 May 2014, Baltimore, Maryland, United States ( Book )
3 editions published in 2014 in English and held by 5 libraries worldwide
Studies and Analyses of Vulnerabilities in Aided Adversarial Decision Making ( Book )
2 editions published in 1998 in English and held by 1 library worldwide
This report provides a preliminary examination of critical elements and processes involved in aided adversarial decision-making. The aid" in the analysis (i.e., an automated decision aid) focuses upon a generic data fusion processor that estimates situation and threat states based on multisensor/multisource-based data assessments. In that frame of reference, this report provides a characterization of: (1) the information dependencies in data fusion processing, (2) the information dependencies in selected human-processing models, (3) the vulnerabilities of that information to Offensive 1W attack, and (4) the processes of decision making. It also examines prototypical cultural and technological differences among hypothetical adversaries in order to identify the value" a given adversary might place on specific information, and investigates the general nature of adversarial engagements in the context of a dynamic, two-sided, game-theoretic process. The report recommends that two critical areas of research be continued: (1) the study and modeling of information dependencies, vulnerabilities, and notions of value in automated decision making processes, and (2) the better understanding and modeling of patterns of human trust in automation. A case study framework is recommended, and, if more than one case study is defined, then an examination of the potential reuse of knowledge about critical information dependencies and values may be conducted
Establishment of Center of Excellence in Multisource Information Fusion ( Book )
2 editions published in 2002 in English and held by 1 library worldwide
This Final Technical Report is a summary of the work conducted on the following research tasks: (1) Correlation Science, (2) Learning in Distributed Fusion Systems for Decision Making and (3) Information Sharing in Distributed Fusion Applications. The Correlation Science task has derived a new association scoring approach, JHSO, and compared its performance with four traditional association approaches. The JHSO yields the best association and estimation results for problems where an accurate report and track are being considered for association versus another less accurate track (e.g., from off-board). The other approaches are biased towards less accurate tracks since they do not consider the resultant state accuracy in their scoring for alternative associations. The Learning in Distributed Fusion Systems for Decision Making task addressed issues of cooperative group learning from examples in multi agent distributed system for decision making. An approach to both individual learning with decision integration and distributed learning utilizing the Dempster Shafer theory of evidence has been introduced. More research is needed to address fundamental issues of the problem of cooperative learning in problem solving systems such as utilization of a prior knowledge, incorporation of symbolic and numeric information, and convergence of the process. The Information Sharing in Distributed Fusion Applications task presented a model and testbed for situation assessment. Many parameters affecting information sharing and strategies for information sharing were considered but a few key parameters are still missing. A trade off of 15% detection rate for a 30% saving in communication was shown. Cost and other factors such as models of other agents need to be included in the testhed to make it more useful
Next-Generation Analyst IV 18-19 April 2016, Baltimore, Maryland, United States by Next-Generation Analyst( Book )
2 editions published in 2016 in English and held by 1 library worldwide
Foundational technologies for activity-based intelligence—a review of the literature by James Llinas( file )
1 edition published in 2014 in Undetermined and held by 1 library worldwide
Activity-based intelligence (ABI) is a discipline of intelligence where the analysis and subsequent collection are focused on the activity and transactions associated with an entity, a population or an area of interest. It is considered a new intelligence tradecraft. This report offers a survey of algorithmic-level literature that has been directly applied to ABI analysis. Areas considered include, ABI- and tactical intelligence-specific approaches, approaches for assessing stages of political unrest and societal radicalization and approaches explored in the field of ambient intelligence. Finally, recommendations of scientific techniques that have potential utility for ABI are offered
FUSION'99 -- The Second International Conference on Information Fusion, Volume 1 ( Book )
2 editions published in 1999 in English and held by 1 library worldwide
This report contains proceedings of the second international conference on information fusion. Various articles relating to information fusion are presented
Framework for AFFTC T&E of Information Fusion and Aerospace Vehicle Management Systems ( Book )
2 editions published in 2001 in English and held by 1 library worldwide
The research objective of this grant is to provide understanding about the nature of multi-platform and distributed data fusion and the influence that such methods might have on flight-testing of future multi-platform systems at major range facilities such as Edwards Air Force Base (the Air Force Flight Test Center, AFFTC). and also with a special focus on Electronic Warfare (EW) aspects and impacts. This report describes a basis and structure for both understanding and describing the Data Fusion-related issues and components of test operations in ways that are considered both technically correct from a Data Fusion viewpoint, and consistent from an architectural viewpoint. This instrument's purpose is to establish a consistent basis for contemplating and understanding any possible future test environment that involves Data Fusion processing concepts in order to cost-effectively define, design. implement, and maximally reuse test support components and data analysis capabilities at AFFTC; said otherwise, the bottom-line benefit of a Framework is affordability and efficiency in test operations and analyses. Our approach involves, for example, first determining the 'role' for Data Fusion, and ultimately determining the design of Data Fusion components and detailed elements. As for any systems-engineering process, an important first step is to determine also the boundaries of the processes and functions to be addressed: what is inside the boundary of consideration and what is not; the items inside the boundary are labeled the 'Black Box' components in this report. Also, important to the overall Framework definition is the process by which the Framework will be updated; we suggest formalized Configuration Control techniques as used for evolving software
FUSION'99 -- The Second International Conference on Information Fusion, Volume 2 ( Book )
2 editions published in 1999 in English and held by 1 library worldwide
This report contains proceedings of the second international conference on information fusion. Various articles relating to information fusion are presented
Studies and Analyses of Aided Adversarial Decision Making. Phase 2: Research on Human Trust in Automation ( Book )
2 editions published in 1998 in English and held by 1 library worldwide
This report describes the second phase of work conducted at the Center for Multi-source Information Fusion at the State University of New York at Buffalo. This work focused on Aided Adversarial Decision Making (AADM) in Information Warfare (IW) environments. Previous work examined informational dependencies and vulnerabilities in AADM to offensive IW operations. In particular, human trust in automated, information warfare environments was identified as a factor which may contribute to these vulnerabilities and dependencies. Given that offensive IW operations may interfere with automated, data-fusion based decision aids, it is necessary to understand how personnel may rely on or trust these aids when appropriate (e.g., when the information provided by the aids is sound), and recognize the need to seek other information (i.e., to "distrust' the aid) when the information system has been attacked. To address these questions, this report details background research in the areas of human trust in automated systems and sociological findings on human trust, details the development of an empirically-based scale to measure trust, provides a framework for investigating issues of human trust and its effect on performance in an AADM-IW environment, and describes the requirements for a laboratory designed to conduct these investigations
Next-generation analyst iii by Barbara D Broome( file )
1 edition published in 2015 in English and held by 0 libraries worldwide
Foundations for an Empirically Determined Scale of Trust in Automated Systems ( file )
1 edition published in 1998 in English and held by 0 libraries worldwide
One component in the successful use of automated systems is the extent to which people trust the automation to perform effectively. In order to understand the relationship between trust in computerized systems and the use of those systems, we need to be able to effectively measure trust. Although questionnaires regarding trust have been used in prior studies, these questionnaires were theoretically rather than empirically generated and did not distinguish between three potentially different types of trust: human-human trust, human-machine trust, and trust in general. A three-phased experiment, comprising a word elicitation study, a questionnaire study, and a paired comparison study was performed, in order to better understand similarities and differences in the concepts of trust and distrust, and between the different types of trust. Results indicated that trust and distrust can be considered opposites, rather than comprising different concepts. Components of trust, in terms of words related to trust, were similar across the three types of trust. Results obtained from a cluster analysis were used to identify 12 potential factors of trust between people and automated systems. These 12 factors were then used to develop a proposed scale to measure trust in automation
Next-Generation Analyst : 29-30 April 2013, Baltimore, Maryland, United States ( file )
2 editions published in 2013 in English and held by 0 libraries worldwide
Visualizing Non-Physical, Logical Constructs for Command Decision Support ( file )
1 edition published in 2004 in English and held by 0 libraries worldwide
Haptic Rendering Techniques for Non-Physical, Command Decision Support ( file )
1 edition published in 2004 in English and held by 0 libraries worldwide
The Role of Meta-Information in C2 Decision-Support Systems ( file )
1 edition published in 2006 in English and held by 0 libraries worldwide
Command and control (C2) in complex, dynamic, high-risk warfighting environments is clearly challenging, particularly because of the increasing complexity of available technology for processing and presenting information. Commanders need to understand and act on large volumes of information from a variety of sources and are particularly challenged by the need to reason about the qualifiers of that information, which we will refer to as meta-information (e.g., uncertainty, recency, pedigree). We have explored the role of meta-information in C2 using Cognitive Task Analysis (CTA) techniques to identify when and how, in current practice, human interaction with meta-information impacts decision-making, especially when that decision-making is supported by automation. Too often critical meta-information is not processed, ineffectively displayed, or not displayed at all in existing C2 decision support systems. The result of our analyses is a number of design recommendations for C2 decision-support systems and guidelines for identifying and recognizing the need for meta-information processing and display. In this paper, we present the results of our analyses and discuss their implications with respect to the design of human-system interfaces and the development of computational information processing methods
Service-Oriented Architectures, Network-Centric Warfare, and Agile, Self-Synchronized C2: Impacts to Data Fusion Process Design ( file )
1 edition published in 2006 in English and held by 0 libraries worldwide
One of the primary if not the central motivating rationale for Network-Centric Warfare (NCW) is that NCW provides an enabling mechanism for information sharing and shared understanding and awareness of military situations of interest, that in turn allows the realization of entirely new concepts of C2 that are advertised as providing greatly increased agility, speed of command, and synchronization in C2. In turn, the underlying enabling IT mechanism for NCW is the Service-Oriented Architecture (SOA) concept, within which all functional services, to include Data Fusion Services, will presumably operate. These attractive but as-yet-not-fully-defined concepts represent a challenge to the Data Fusion community in terms of understanding the implications of the evolving NCW, SOA, and new C2 concepts on the design of Data Fusion Services. Key to this understanding in particular is the need for a close dialog with the C2 research community on exactly what the information needs of new C2 concepts will be and how those needs can best be met by appropriately-designed Data Fusion Services. This talk will address each of these issues and argue for the need for both: (1) a multi-community approach to the architecting of effective and efficient SOA's, and (2) for new initiatives in distributed Data Fusion to address the specific technical challenges of NCW-specific Data Fusion Service design and implementation. (It should be noted that this paper is drawn largely from US literature and so presents a US-based viewpoint developed by the author; the paper does not represent any official US governmental views.) This brief paper is intended to sketch the topical areas that will be addressed in the associated Keynote speech
moreShow More Titles
fewerShow Fewer Titles
English (73)
Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.