Home
Statistics
Documents
Catalog
StratEdit
XSLTForms
DNAOS
About
Portal
Glossary
Contact [!?]
Documents
/
NITRD2012
/
Content
Table of Content
Visions
Vision [1]
Missions
Mission [1]
Values
Value [1] National Priorities
Value [2] Prosperity
Value [3] Quality of Life
Value [4] National Security
Value [5] National Defense
Value [6] Health
Value [7] Health Care
Value [8] Energy
Value [9] Environment
Value [10] Education
Value [11] Training
Value [12] Openness
Value [13] Transparency
Goals
1: WeCompute
1.1: Accessibility
1.1.1: Power Consumption
1.1.2: Language Barriers
1.1.3: Interoperability
1.1.4: Adjustable Systems
1.1.5: Performance
1.1.6: New Materials
1.1.7: Security and Privacy
1.2: Acceleration
1.2.1: Parallel Processing
1.2.2: Productivity
1.2.3: HEC Energy Demands
1.3: Network Infrastructure
1.3.1: Network Infrastructure
1.3.1.1: Core Areas
1.3.1.1.1: Foundations
1.3.1.1.2: Design
1.3.1.1.3: Management
1.3.1.1.4: Privacy and Security
1.3.1.2: Research Spectrum
1.3.1.2.1: Basic and Applied Research
1.3.1.2.2: Partnerships
1.3.1.2.3: Testbeds and Prototype Networks
1.4: Smart Planet
1.4.1: Systems Science
1.4.2: Management and Decision Support
1.4.3: Areas of Emphasis
1.4.3.1: Foundations
1.4.3.2: Supervisory Control
1.4.3.3: Principles, Metrics, and Standards
1.4.3.4: Design and Productivity Gap
1.4.3.5: Reasoning and Management
1.4.3.6: Autonomy, Human Interaction, and Authority
1.4.3.7: Open Systems
1.5: Software
1.5.1: Critical Systems
1.5.2: Software Design
1.5.3: Practices, Technologies, Tools, and Measurements
1.5.3.1: Foundational Principles
1.5.3.2: Architectures and Methods
1.5.3.3: Ultra-Large Systems
1.5.3.4: Programming
1.5.3.5: Interoperability and Usability
1.5.3.6: Repositories
1.5.3.7: Software Assurance
1.5.3.8: Parallel Programming
1.5.3.9: Intensive Applications
1.5.3.10: Metrics
1.5.3.11: User-Friendliness and Interactivity
1.6: Knowledge
1.7: Social Intelligence
1.7.1: Computers as Participants
1.7.1.1: Coordination, Collaboration, and Participation
1.7.1.2: Human-Computer Partnerships
1.7.1.3: Key Research
1.7.1.3.1: Machine Learning and AI
1.7.1.3.2: Immersion and 4-D Displays
1.7.1.3.3: Complex Systems
1.7.1.3.4: Computational Photography
1.7.1.3.5: Graphics and Visualization
1.7.1.3.6: Robotics
1.7.1.3.7: Speech Recognition, Natural Language, and Dialogue
1.7.1.3.8: Mechanization of Economic Theories
2: Trust & Confidence
2.1: Trustworthiness
2.1.1: System Hardening and Software Patching
2.1.2: Basic Research
2.1.3: Science of Security
2.1.3.1: Curricula and Training
2.2: Cyber Security
2.2.1: End-to-End Security
2.2.1.1: Myriad Advances
2.2.1.2: Proactive Approaches
2.2.1.2.1: Dynamic Security
2.2.1.2.2: Identity Management
2.2.1.2.3: Situational Awareness
2.2.1.2.4: Attack Attribution and Combat
2.2.1.2.5: Security Metrics
2.2.1.2.6: Education
2.2.1.2.7: Techniques
2.3: Systems
2.3.1: Integrated Design
2.3.2: Models
2.3.3: Fault Tolerance
2.3.3.1: Prediction
2.3.3.2: Recovery
2.3.3.3: Adaptation
2.3.4: Composition and Guarantees
2.3.5: Cyber-Physical Systems
2.3.6: Certification
2.3.7: Tool Chains
2.4: Information Assurance and Sharing
2.4.1: Advanced Architectures
2.4.2: Digital Information
2.4.2.1: Homomorphic Encryption
2.5: Security and Privacy
2.5.1: Design Conflicts
2.5.2: Monitoring and Mitigation Tools
3: Cyber Capable
3.1: Workforce
3.1.1: Education and Training
3.2: Education
3.2.1: Multi-Faceted Advances
3.2.2: IT Knowledge and Skills
3.3: Technologies
3.3.1: Human Learning
3.3.2: Learning Environments
3.3.3: Educators
sitemap
Copyright 1971-2012 01 COMMUNICATIONS INC. ALL RIGHTS RESERVED. - Powered by DNAOS
contact