<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>DEFENSE AND SECURITY STIDS 2011</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>The Mason Inn</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Online Proceedings</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>George Mason University Fairfax</institution>
          ,
          <addr-line>Virginia Campus 16 - 17</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2011</year>
      </pub-date>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Preface  </p>
      <p> 
 
The   6th   International   Conference   on   Semantic   Technologies   for   Intelligence,   Defense,  
and  Security  (STIDS  2011)  provides  a  forum  for  academia,  government  and  industry  to  
share   the   latest   research   on   semantic   technology   for   defense,   intelligence   and   security  
applications.  
 
Semantic   technology   is   a   fundamental   enabler   to   achieve   greater   flexibility,   precision,  
timeliness   and   automation   of   analysis   and   response   to   rapidly   evolving   threats.   This  
year  we  have  the  following  topics:  
•
•
•
•
•</p>
      <p>Creating  an  interoperable  suite  of  public-­‐domain  ontologies  relevant  to  
intelligence  analysis  covering  diverse  areas:    
Ontologies  and  reasoning  under  conditions  of  uncertainty  
Semantic  technology  and  ontological  issues  related  to:  
o Source  credibility  and  evidential  pedigree    
o Use  of  sensing  devices  including  security,  e.g.  global  
infrastructure  grid  (GIG),  
images  and  intelligence  collection  in  general    
Usability  issues  relating  to  semantic  technology  </p>
      <p>Best  practices  in  ontological  engineering  
 
 
Paulo  Costa  and  Kathryn  Laskey  
STIDS  2011  Chairs  
 
   </p>
    </sec>
    <sec id="sec-2">
      <title>Fairfax,  VA,  November  2011.  </title>
      <sec id="sec-2-1">
        <title>Name  </title>
        <p> </p>
      </sec>
      <sec id="sec-2-2">
        <title>Location  </title>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Paulo  Cesar  G.  Costa     George  Mason  University   Kathryn  Blackmond  Laskey     George  Mason  University  </title>
      <sec id="sec-3-1">
        <title>Affiliation  </title>
        <p>Ontology  Works  
George  Mason  University  
University  at  Buffalo  
George  Mason  University  
Knowledge  Based  Systems,  Inc.  
NCI,  Inc.  
University  of  Iowa  
SAIC  
George  Mason  University  
US  Department  of  Defense  
KaDSci,  Inc.  
NCOR  
MITRE  Corporation  
MITRE  Corporation  
Optech,  Inc.  
NCOR,  University  at  Buffalo  
George  Mason  University  
US  Department  of  Energy  
Old  Dominion  University  
Vistology,  Inc.  
George  Mason  University  
Data  Tactics  Corporation  (DTC)  has  been  developing  and  implementing  mission-­‐focused  
capabilities  to  the  Intelligence  Community  and  DOD  for  years;  providing  superior  service  
and   leading   innovation.    Whether   it   is   data   mining,   data   correlation,   data   retrieval,  
information   security   or   cloud   computing,   Data   Tactics   understands   the   challenges   that  
face   our   client-­‐base   and   our   peers   across   the   industry.    With   our   vast   knowledge,  
professional   expertise   and   dedication,   Data   Tactics   is   prepared   and   committed   to  
designing,   implementing   and   sustaining   customized   solutions   to   meet   the   customers’  
mission  requirements.  
 
Data   Tactics   Corporation   is   a   small   business   solely   focused   on   mission   –relevant  
solutions   that   bring   industry   recognized   experts   in   the   field   of   Specialized   Cloud  
Enterprise   Architecture,   Cyber   Security,   Geospatial   Engineering,   System   /   Software  
Development,   Data   /   System   Integration,   and   Operations   and   Maintenance   (O&amp;M)   /  
Sustainment  support.    We  measure  that  support  at  our  end-­‐user.    The  staff  is  qualified  to  
identify   report,   resolve   and   support   a   myriad   of   complex   data,   storage,   security   and  
system   problems.    Our   success   has   been   proven   time   and   again   at   traditional   sites   but  
also  in  tactical  forward  deployed  environments.  
 
Our  Mission  
•</p>
        <p>To  Design,  Develop,  Deliver  and  Manage  State-­‐of-­‐the-­‐Art  Technological  
Capabilities  for  Our  Client’s  Enterprise  that  Supports  Our  Client’s  Mission  
Objectives  
• To  See  Our  Performance  across  the  Service  Lifecycle  through  Our  Client’s  Lens.    
• Our  Work  Contributes  to  Our  Client’s  Success  because  we  Design,  Deliver  and  
Sustain  those  Services  to  Work  in  the  Client's  Environment,  by  Client’s  Personnel  
to  Achieve  Client  Success  
 
Vision  Statement  
•</p>
        <p>To  Establish  an  Enduring  Relationship  of  Trust  with  Our  Client  Based  Solely  on  
Our  Performance  
To  Deliver  a  Product  or  Service  that  becomes  Second-­‐Nature  to  Our  Client’s  
Personnel  and  a  Seamless  Part  of  Our  Client’s  Business  Operations      
To  Remain  a  Creative,  Disruptive  and  Leading  Research,  Development  and  Rapid  
Deployment  Institution  Where  Our  Shared  Intellect,  Hard  Work  and  Vanguard  for  
Our  Client’s  Trust  make  a  Positive  Difference  in  the  Lives  of  Our  Employees,  the  
Success  of  Our  Clients  and  the  Security  of  Our  Country    
•
•</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list />
  </back>
</article>