Networked Searches & Searches in Networks:
New Horizons in Search Theory
April 27-28, 2004

Contents
Summary
Agenda
Artwork Gallery
Participants

Day 1
Introduction

An Exploration of Zig-Zagging

Hider Theory

Investigating Terrorist and Smuggling Games

An Operation Perspective of Submarine Evasion Operations

An Operation Perspective of Smuggling Tactics

Day 2
Breakout Sessions

Hiding Contraband (WMD)

ASW & Military Examples

Final Summary

Day Two: Breakout Groups

Group 1: Hiding Contraband (WMD)
Group 2: ASW & Military Examples

Jeff announced that the day would begin with breakout sessions with two groups, smugglers and ASW. He prompted everyone, “until you can begin to talk in detail about a process, you have to articulate and describe the operational context in which the process exists.” Before going into the breakouts he highlighted the following questions and factors that need to be considered in the discussions.


See enlargement

Operational Context

Describe the Operational Context

  1. General competitive context
  2. Forces, elements involved
  3. Environmental considerations

Operational Problem

Describe the specific Hider application

  1. Hide what?
  2. Hide where?
  3. Hide why?
  4. Hide when?

Major Process Elements

Hide How?

  1. What are the major factors that impact hider success?
  2. What are the relationships between these major factors?
  3. Are any of these substantially greater than the others?

Insights and Conclusions

copyright 2000-2004© Alidade Incorporated | 31 Bridge Street | Newport, Rhode Island 02840 | Tel: 401-367-0040 | Fax: 401-367-0044