Affiliation:
1. Air Force Research Laboratory Orlando, Fl 32828,
2. Air Force Research Laboratory Wright-Patterson AFB, OH 45433,
Abstract
The development of computer-generated synthetic environments, also calleddistributed virtual environments (DVEs), relies heavily upon computer-generated actors (CGAs) to provide accurate behaviors at reasonable cost so that the synthetic environments are useful, affordable, complex, and realistic. Unfortunately, the pace of synthetic environment development and the level of desired CGA performance continue to rise at a much faster rate than CGA capability improvements. This insatiable demand for realism in CGAs for synthetic environments arises from the growing understanding of the significant role that modeling and simulation can play in a variety of uses. These uses include training, analysis, procurement decisions, mission rehearsal, doctrine development, force-level and task-level training, information assurance, cyberwarfare, force structure analysis, sustainability analysis, life cycle costs analysis, material management, infrastructure analysis, and many other uses. In these and other uses of military synthetic environments, computergenerated actors play a central role because they have the potential to increase the realism of the environment while also reducing the cost of operating the environment. The progress made in addressing the technical challenges that must be overcome to realize effective and realistic CGAs for military simulation environments and the technical areas that should be the focus of future work are the subject of this series of papers, which surveys the technologies and progress made in the construction and use of CGAs. In this, the second installment of three papers in the series, we present a discussion of CGA software architectures and a discussion of approaches to human behavior modeling.
Subject
Computer Vision and Pattern Recognition,Human-Computer Interaction,Control and Systems Engineering,Software
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design;Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005;2005-03-28
2. A taxonomy and discussion of software attack technologies;Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005;2005-03-28