{"id":"https://openalex.org/W4317928099","doi":"https://doi.org/10.1109/milcom55135.2022.10017781","title":"Tactical Topology Optimization Methodology for Slice Aware and Reconfigurable Battlefield Networks","display_name":"Tactical Topology Optimization Methodology for Slice Aware and Reconfigurable Battlefield Networks","publication_year":2022,"publication_date":"2022-11-28","ids":{"openalex":"https://openalex.org/W4317928099","doi":"https://doi.org/10.1109/milcom55135.2022.10017781"},"language":"en","primary_location":{"id":"doi:10.1109/milcom55135.2022.10017781","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom55135.2022.10017781","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076911508","display_name":"Anthony Casta\u00f1ares","orcid":null},"institutions":[{"id":"https://openalex.org/I106965489","display_name":"United States Army Medical Command","ror":"https://ror.org/04vrzee53","country_code":"US","type":"funder","lineage":["https://openalex.org/I106965489","https://openalex.org/I1304082316","https://openalex.org/I1330347796"]},{"id":"https://openalex.org/I4210154437","display_name":"United States Army Futures Command","ror":"https://ror.org/0593xbv16","country_code":"US","type":"funder","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I4210154437"]},{"id":"https://openalex.org/I2802705668","display_name":"United States Army Combat Capabilities Development Command","ror":"https://ror.org/02rdkx920","country_code":"US","type":"other","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Anthony Castanares","raw_affiliation_strings":["US Army Futures Command, DEVCOM Analysis Center (FCDD-DAC),NM,USA","US Army Futures Command, DEVCOM Analysis Center (FCDD-DAC), NM, USA"],"affiliations":[{"raw_affiliation_string":"US Army Futures Command, DEVCOM Analysis Center (FCDD-DAC),NM,USA","institution_ids":["https://openalex.org/I106965489","https://openalex.org/I4210154437"]},{"raw_affiliation_string":"US Army Futures Command, DEVCOM Analysis Center (FCDD-DAC), NM, USA","institution_ids":["https://openalex.org/I2802705668"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065745202","display_name":"Deepak K. Tosh","orcid":"https://orcid.org/0000-0001-8492-1066"},"institutions":[{"id":"https://openalex.org/I164936912","display_name":"The University of Texas at El Paso","ror":"https://ror.org/04d5vba33","country_code":"US","type":"education","lineage":["https://openalex.org/I164936912"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Deepak K. Tosh","raw_affiliation_strings":["Science University of Texas at El Paso,Department of Comptuer,El Paso,Texas,USA","Department of Comptuer, Science University of Texas at El Paso, El Paso, Texas, USA"],"affiliations":[{"raw_affiliation_string":"Science University of Texas at El Paso,Department of Comptuer,El Paso,Texas,USA","institution_ids":["https://openalex.org/I164936912"]},{"raw_affiliation_string":"Department of Comptuer, Science University of Texas at El Paso, El Paso, Texas, USA","institution_ids":["https://openalex.org/I164936912"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076911508"],"corresponding_institution_ids":["https://openalex.org/I106965489","https://openalex.org/I2802705668","https://openalex.org/I4210154437"],"apc_list":null,"apc_paid":null,"fwci":0.4324,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.53601224,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"273","last_page":"278"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10829","display_name":"Interconnection Networks and Systems","score":0.9797999858856201,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7443971037864685},{"id":"https://openalex.org/keywords/network-centric-warfare","display_name":"Network-centric warfare","score":0.5221878886222839},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.5174880027770996},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4928124248981476},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.47293758392333984},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46760478615760803},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.4653523564338684},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4529794454574585},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16279152035713196}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7443971037864685},{"id":"https://openalex.org/C2781187084","wikidata":"https://www.wikidata.org/wiki/Q1140666","display_name":"Network-centric warfare","level":2,"score":0.5221878886222839},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.5174880027770996},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4928124248981476},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.47293758392333984},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46760478615760803},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.4653523564338684},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4529794454574585},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16279152035713196},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom55135.2022.10017781","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom55135.2022.10017781","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1993814189","https://openalex.org/W2074629033","https://openalex.org/W2959305142","https://openalex.org/W2981936514","https://openalex.org/W3046578612","https://openalex.org/W3130883911","https://openalex.org/W3135155484","https://openalex.org/W3213681967","https://openalex.org/W4200353184","https://openalex.org/W4205404429"],"related_works":["https://openalex.org/W2130966263","https://openalex.org/W1504006543","https://openalex.org/W2158265795","https://openalex.org/W1997415650","https://openalex.org/W1751052531","https://openalex.org/W1772332298","https://openalex.org/W2264247447","https://openalex.org/W2216923714","https://openalex.org/W1511185438","https://openalex.org/W2186194133"],"abstract_inverted_index":{"Current":[0],"and":[1,27,53,65,75,95,186,204,223,235,242],"next":[2],"generation":[3],"tactical":[4,32,47,151,175,199,240,266],"battlefield":[5,152],"networks":[6],"are":[7,86,105],"congested":[8],"with":[9,58,127],"an":[10,21,149,156],"overwhelming":[11],"number":[12,168],"of":[13,41,46,114,169,180,182,211,238],"network":[14,48,60,77,109,176,188,200,213,253],"devices":[15,89,104,170],"that":[16,125,130,226],"vie":[17],"for":[18,72,196],"bandwidth":[19],"in":[20,136,248],"effort":[22],"to":[23,35,37,81,90,92,101,107,123,146,165,172,193,216,231,245,260],"push":[24],"video,":[25],"voice,":[26],"encrypted":[28],"traffic":[29],"from":[30,110],"the":[31,39,93,108,137,161,167,178,218],"edge":[33],"back":[34],"commanders":[36],"support":[38],"execution":[40],"mission":[42],"objectives.":[43],"The":[44],"problem":[45,126,158],"over-saturation":[49],"is":[50,54,68,192,243],"real":[51],"[1],":[52],"only":[55],"getting":[56],"worse":[57],"projected":[59],"demands":[61],"by":[62,134],"2030":[63],"[2]":[64],"beyond.":[66],"There":[67],"a":[69,111,128,173,209],"critical":[70],"need":[71],"automated,":[73],"fast,":[74],"trustworthy":[76],"design":[78],"optimization":[79,157,201],"techniques":[80],"address":[82],"situations":[83],"where":[84,251],"there":[85],"too":[87],"many":[88],"add":[91],"network,":[94],"intelligent":[96],"trade-offs":[97],"must":[98],"be":[99,132,246],"made":[100],"determine":[102],"which":[103],"added":[106],"mission-centric":[112],"point":[113],"view.":[115],"In":[116],"this":[117,227,258],"paper":[118],"we":[119,207],"describe":[120],"our":[121,197],"contribution":[122],"solving":[124],"methodology":[129,259],"can":[131,255],"used":[133],"Warfighters":[135],"Joint":[138],"All":[139],"Domain":[140],"Command":[141],"&":[142],"Control":[143],"(JADC2)":[144],"construct":[145],"automatically":[147],"generate":[148,194],"optimized":[150],"network.":[153],"We":[154],"formulate":[155],"based":[159],"upon":[160],"fractional":[162],"knapsack":[163],"algorithm":[164],"maximize":[166],"associated":[171],"slice-aware":[174],"under":[177],"constraints":[179],"quality":[181],"service":[183],"(QoS)":[184],"requirements":[185],"available":[187],"bandwidth.":[189],"Our":[190,221],"goal":[191],"components":[195],"larger":[198],"framework":[202],"[3],":[203],"as":[205],"such":[206],"present":[208],"proof":[210],"optimal":[212],"resource":[214],"allocation":[215],"substantiate":[217],"algorithm's":[219],"correctness.":[220],"experiments":[222],"analysis":[224],"show":[225],"component":[228],"will":[229],"contribute":[230],"increased":[232],"resiliency,":[233],"robustness,":[234],"cyber":[236],"security":[237],"JADC2":[239],"networks,":[241],"designed":[244],"applied":[247],"use":[249],"cases":[250],"Warfighter":[252],"planners":[254],"easily":[256],"employ":[257],"quickly":[261],"design,":[262],"deploy,":[263],"or":[264],"reconfigure":[265],"networks.":[267]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
