skip to content

INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA

Overview
Works: 1,173 works in 1,270 publications in 1 language and 1,291 library holdings
Classifications: QA76.9.A25,
Publication Timeline
Key
Publications about INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA
Publications by INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA
Most widely held works by INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA
IDA paper by Va.> Institute for Defense Analyses <Alexandria( serial )
in Undetermined and held by 4 libraries worldwide
Inspection Costs for a Multilateral Chemical Weapons Convention; An Analytical Framework and Preliminary Estimates ( Book )
3 editions published in 1990 in English and held by 3 libraries worldwide
The draft Chemical Weapons Convention (CWC) now being negotiated at the forty-nation Conference on Disarmament is a complex disarmament convention to both eliminate chemical weapons and to deter further production. Achieving these goals will require an extensive verification regime involving a variety of inspections, visits, and extended on-site presence. Planning for such a regime requires an understanding of the level of effort that will be required and the costs that may be incurred. This paper examines the draft Convention, develops an analytical framework for costing the monitoring activities associated with the CWC, and provided preliminary cost estimates under a variety of assumptions
Missile, Bomb, and Projectile Fuze Subtier Assessment ( Book )
2 editions published in 1999 in English and held by 2 libraries worldwide
This briefing maps the U.S. industrial base for development and production of fuzes for bombs, missiles, and large caliber projectiles. The strengths and weaknesses of the firms are assessed. The current and future business base is compiled. Development trends are identified. Potential problems in maintaining competition among willing, competent contractors and suppliers are discussed
Double Negative Materials (DNM), Phenomena and Applications (CD-ROM) ( Book )
2 editions published in 2009 in English and held by 2 libraries worldwide
In this document we examine recent developments in double negative materials (DNM) or negative index of refraction materials (NIR) and consider their potential military applications. These materials are artificially engineered, composite structures that provide extraordinary responses to electromagnetic (EM) waves in general. These materials are important because they allow us to control light (or EM waves) in ways not previously possible. Because these metamaterials exhibit a unique ability to bend and focus light in ways no other conventional materials can, they hold great potential for enabling a number of innovative lens and antenna structures. Searching for smaller, lighter, and conformal components and devices for radar and communication applications, researchers have increasingly turned to these metamaterials. It is expected that research will lead to innovative designs in optical instrumentation, sub wavelength resolution, reduction of friction in MEMS, novel approaches to beam steering, novel approaches for integrating optics with semiconductor electronics and others. Many IDA projects could benefit from the knowledge obtained as a result of this study
SAGEN (SADMT (Strategic Defense Initiative Architecture Dataflow Modeling Technique) Generator) User's Guide Version. 1.5 ( Book )
3 editions published in 1988 in English and held by 2 libraries worldwide
IDA Paper P-2028 documents a tool that can facilitate the description of processes for the Strategic Defense System (SDS) and Battle Management/Command, Control and Communications (BM/C3) architectures. The process descriptions generated by this tool conform to the Strategic Defense Initiative (SDI) Architecture Dataflow Modeling Technique (SADMT)
Multiple access to a communication satellite with a hard-limiting repeater by J. M Aein( Book )
1 edition published in 1965 in English and held by 2 libraries worldwide
Contents: Multiple Access Modulation Techniques; Time-Division Multiple Access; Frequency-Division Multiple Access; Spread-Spectrum Multiple Access; Pulse-Address Multiple Access With Narrow-Band Pulses; Pulse-Address Multiple Access with Spread Spectrum Pulses; Network Timing; Signal Waveform Analysis; Probability Distributions
Courseware Portability by J. D Fletcher( Book )
2 editions published in 1992 in English and held by 1 library worldwide
Portability enables interactive courseware (ICW) and associated application programs to operate on computer-based systems other than the ones on which they are developed. It will increase sharing of ICW across a range of instructional settings within military Services, and across internationally allied military Services. The Department of Defense (DoD) has advocated and implemented a standard for ICW development employing a virtual device interface that currently incorporates specified commands organized into service groups for: (1) system management, (2) visual management, (3) videodisc control, and (4) XY-input devices. This approach, now specified in MIL-STD-1379D and DoD instruction 1322.20, provides for system-level courseware portability. Future work will expand the standard to: (1) encompass more varieties of ICW, (2) address portability at the device level, (3) address new technological opportunities, (4) better address graphics, (5) encompass more operating systems, and (6) progress from platform independence to authoring software independence. The DoD portability initiative will lower the per-unit costs of ICW, lower instructional system development costs, increase use of advanced instructional technology in military settings, and increase instructional efficiency in the military Services
Field Action Officer Roles in GCCS Development ( Book )
2 editions published in 1997 in English and held by 1 library worldwide
This document describes the purpose of the RID and the EPIP documents stemming from the acquisition approach taken to field the Global Command and Control System (GCCS). It briefly explains the evolutionary acquisition approach to GCCS, how GCCS requirements are determined, how each phase of development is planned via the EPIP, and how GCCS software is developed, tested, and fielded. The final section identifies responsibilities for the EPIP implementation
Environmental Restoration - Expedient Methods and Technologies: A User Guide with Case Studies ( Book )
2 editions published in 1998 in English and held by 1 library worldwide
This document collects information on potential methods and technologies that could be used to support environmental restoration projects undertaken by NATO Cooperation Partners (Partnership for Peace nations) in Central and Eastern Europe and the Former Soviet Union. The information is presented according to the type of pollution that is the object of remediation plans but is limited to pollution problems involving fuels, chlorinated solvents, and heavy metals. Case studies include descriptions of the problems to be solved, the methods used to resolve problems, relative successes, the anticipated cost and actual cost (if known), and technologies that are soon to become available. Also included are discussions of technical problems encountered and World Wide Web sites that may have added information. Risk assessment and risk based corrective actions are covered. Appendices include discussions of models and modeling, a guide to a hierarchy of preferred alternatives for each type of problem, and emerging technologies useful for former naval installations. One appendix includes short discussions of alternatives deemed not to be useful and why
Ultra-Wide SAR System Analysis ( Book )
2 editions published in 1998 in English and held by 1 library worldwide
This paper develops a methodology for analyzing the performance of ultra wide SAR systems that relaxes the approximations commonly carried over from narrow band/beam SAR analysis. The analysis is applied to system sensitivity and resolution calculations
Defense Science Study Group IV: Study Reports 1994-1995. Volume I ( Book )
2 editions published in 1996 in English and held by 1 library worldwide
The Defense Science Study Group (DSSG) is a program sponsored by the Defense Advanced Research Projects Agency (DARPA) and managed by the Institute for Defense Analyses (IDA). The purpose of the program is to expose some of the most talented young scientists and engineers from academia to issues and operations related to national security. Strengthening ties between the scientists and engineers and the national security community will provide the Government with a new source of technical advisors and informed critics. Individuals spend about 20 days per year for 2 years receiving briefings by distinguished speakers; visiting laboratories, intelligence organizations, and military, manufacturing, and industrial facilities; and conducting studies on defense-related topics. This report is a compilation of the studies prepared by the members (various topics)
A Methodology for Independent Assessment of Advanced Warfighting Experiments ( Book )
2 editions published in 1999 in English and held by 1 library worldwide
This document suggests an approach for defining independent assessments of the results of joint advanced warfighting experiments undertaken in support of Joint Vision 2010. The joint experiments are those pursued in development of innovative operational doctrine or operational concepts to be employed by a joint task force, a unified command, or similar organization. Independent assessments would have the goal of interpreting the operational potential of new warfighting concepts free of the biases of those who propose the capability or conduct the experiments. Since their use throughout the military establishment is not standard, this document first presents some reasonable definitions of the meanings of innovation, experimentation, and jointness as used in the context of joint operations and the Chairman of the Joint Chiefs of Staff's vision for future warfighting capabilities. Then, the document describes the nature of experiments, their purposes, and how they support development of advanced warfighting concepts that will be the focus of experimentation. Following that, a structure for an independent assessment or evaluation of an advanced warfighting concept, and a methodology for independently assessing the success or failure of experiments dealing with future warfighting concepts are developed
A Review of Study Panel Recommendations for Defense Modeling and Simulation (Computer Diskette) ( Book )
2 editions published in 1992 in English and held by 1 library worldwide
File characteristics: Text (17 files). Physical description: 1 computer diskette; 3 1/2 in., low density. System requirements: MacIntosh 6.0.7; Microsoft Word for Windows 4.00 B; MacDraw Pro 1.0, V1. This paper reviews the recommendations made by senior study panels, such as those of the Defense Science Board, the Army Science Board, and the General Accounting Office, concerning Defense modeling and simulation. A total of 179 recommendations were identified, made by 25 different study panels overa period of about 16 years. Overall they provide a foundation for the work of the Defense Modeling and Simulation (DMSO) Office which was established in 1991. In this review, each recommendation was categorized with regard to which DMSO General Objective, Functional (Application) Area, and Technical Objective it addresses. Each recommendation was also categorized with regard to what action (application, targeted research and development, technical improvement, modeling and simulation development, management improvement, and coordination) it advocates. Common themes found in the recommendations concern opportunities and needs for improved coordination, increased involvement and responsibility of higher management, more systematic and comprehensive planning, improved technology, improved technical quality, increased information sharing and feedback, broadened perspective, and new and extended opportunities for modeling and simulation, including increased application in system acquisition, test, and evaluation
Opportunities to Improve Diagnostics Performance Using Computer-Based Product Definition Models and Simulations ( Book )
2 editions published in 1998 in English and held by 1 library worldwide
This paper reports on analysis of opportunities for applying defense product definition models and simulations (M & S) that are based on computer-aided design, manufacturing, engineering, and test (CAx, representing CAD, CAM, CAE and CAT) capabilities to enhance diagnostics performance and lifecycle support affordability of defense systems. Opportunities for applying CAx-based product M & S were reviewed from four diagnostic domain perspectives: Development and use of diagnostic capabilities during design, application of integrated rated diagnostics in maintenance processes for fault detection and isolation, engineering analyses of critical problems and faults, and development and use of fault prediction and prognostic capabilities. Viable concepts for applying CAx-based M & S capabilities to improve integrated diagnostic element capabilities for each of these diagnostic domains were identified. During the analysis, the study team noted the application of CAx-based models and simulations to integrated diagnostics is an essential component of effective integrated rated product and process development (IPPD) strategies and DoD's simulation based acquisition SBA) initiative
Individualized Systems of Instruction by J. D Fletcher( Book )
2 editions published in 1992 in English and held by 1 library worldwide
The techniques and effectiveness of systems for adjusting the pace, content, sequence, and style of instruction to fit the needs of individual learners are briefly reviewed. These systems are all designed to function in group instructional settings. They may be separated into print-oriented approaches (programmed instruction, personalized system of instruction, audio-tutorial approach, and individually guided education) and computer-oriented approaches (individually prescribed instruction, adaptive learning environments model, program for learning in accordance with needs, the strands approach, optimization of instruction, and intelligent computer-assisted instruction). The primary task of these and similar systems is to replace the two standard deviations of achievement that may be lost by grouping students for instruction rather than providing a single teacher for each student in one-on-one, individualized instructional settings. Difficulty in accomplishing this task appears to lie primarily with the costs and increased workload that individualization requires. (Contains 43 references.) (Author/SLD)
Trends in Weapon System Operating and Support Costs by Timothy J Graves( Book )
3 editions published in 1997 in English and held by 1 library worldwide
In this period of diminishing Department of Defense (DoD) budgets, an increasing percentage of each budget goes to the operating and support (O & S) accounts. This slows modernization of weapons inventories and could cause the average age of weapon systems in use to rise, perhaps to unacceptable levels. To address this situation, decision makers must buy fewer or less expensive replacement systems and find ways to lower the O & S costs of existing and future systems. Concerned about the effect of shrinking modernization budgets, the Under Secretary of Defense for Acquisition and Technology recently asked the Service Acquisition Executives to look for acceptable ways to minimize O & S requirements for systems now under development. He also asked that a study be undertaken to determine if past efforts to reduce O & S costs have been effective. This study responds to that tasking
Ada Lexical Analyzer Generator ( file )
2 editions published in 1989 in English and held by 0 libraries worldwide
Ida Paper P-2108, Ada Lexical Analyzer Generator, documents the Ada Lexical Analyzer Generator program which will create a lexical analyzer or next- token procedure for use in a compiler, pretty printer, or other language processing programs. Lexical analyzers are produced from specifications of the patterns they must recognize. The notation for specifying patterns is essentially the same as that used in the Ada Language Reference Manual. The generator produces an Ada package that includes code to match the specified lexical patterns and returns the symbols it recognizes. Familiarity with compiler terminology and techniques is assumed in the technical sections of this document
The Accuracy of Independent Estimates of the Procurement Costs of Major Systems ( file )
1 edition published in 2005 in English and held by 0 libraries worldwide
This paper reports the results of an assessment of the accuracy of the independent estimates of procurement costs the Department of Defense uses in milestone reviews of major acquisition programs. IDA initially examined 63 major programs that received authorization to begin Engineering and Manufacturing Development during the years 1985 through 1998. The data needed to evaluate the accuracy of the independent procurement cost estimates could be located for only 25 of these programs. IDA found that the independent cost estimate was reasonably accurate for 18 of those 25 cases. In the remaining cases, the independent estimate was sometimes substantially too high and sometimes substantially too low
Report of Symposium: Applications of Advanced and Innovative Computational Methods to Defense Science and Engineering ( file )
1 edition published in 1994 in English and held by 0 libraries worldwide
This document summarizes a symposium whose purpose was to use more fully the talents of the alumni of the Defense Science Study Group (DSSG) to help ensure that DoD was benefiting to the fullest extent possible from the use of advanced computational methods in academic research. The participants were the alumni of the DSSG, other key academics, and members of the DoD and DOE. The alumni and other academics presented briefings on advanced and innovative ways that computers are being used in academic research, while the members of DoD and DOE presented briefings on their related research. The participants believe that the DoD should continue to reach out to the commercial world and to academia for expertise that could aid the DoD in finding the best ways to implement the use of parallel computing for applications related to scientific and engineering research. They agreed that new techniques of visualizing the results of many of the various applications discussed are needed. The document should help the DoD in continuing Its work with the commercial world and academia
Integrity-oriented control objectives : proposed revisions to the trusted computer system evaluation criteria (TCSEC), DOD 5200.28-STD by Terry Mayfield( file )
2 editions published in 1991 in English and held by 0 libraries worldwide
For many years, the security research community has focused on the confidentiality as security, an a solid analytical foundation for addressing confidentiality issues has evolved. Now it is recognized that integrity is at least as important as confidentiality in many computer systems; it is also apparent that integrity is not well understood. Control objectives, as they apply to automated information systems, express fundamental computer security requirements and serve as guidance to the development of more specific systems evaluation criteria. Within the department of defense, the control objectives contained in the Trusted Computer System Evaluation Criteria (TCSEC), DoD 5200. 28-STD, are of primary concern to the development of product evaluation criteria. The TCSEC's scope is currently confined to address only confidentiality protection of information. This document is intended to extend the scope of the TCSEC so that the control objectives, contained therein, will also address the protection of information and computing resource integrity. The document provides new and modified statements of control objective along with discussion and rationale for their inclusion or revision. The basis in Federal law and policy for the revised control objectives is discussed and a summary of each law and policy used in the derivation of the revisions is provided. The document is intended to be used as a strawman to foster further research and debate leading to a new standard for evaluation criteria that encompasses both integrity and confidentiality
 
moreShow More Titles
fewerShow Fewer Titles
Alternative Names
IDA
Languages
English (38)
Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.