Performance Analysis of Decentralized Kalman Filters under Communication Constraints

The International Society of Information Fusion (ISIF) seeks to be the premier professional society and global information resource for multidisciplinary approaches for theoretical and applied INFORMATION FUSION technologies. Technical areas of interest include target tracking, detection theory, applications for information fusion methods, image fusion, fusion systems architectures and management issues, classification, learning, data mining, Bayesian and reasoning methods. Manuscripts are submitted at http://jaif.msubmit.net. If in doubt about the proper editorial area of a contribution, submit it under the unknown area. The Journal of Advances in Information Fusion (JAIF) has been in publication since the first issue in July 2006. A new issue of the journal is published every six months and posted on the web site of the International Society of Information Fusion (ISIF) at http://www.isif.org. Each issue typically features four to six original articles. Bringing each article to you involves many steps with posting of the final typeset manuscript on the ISIF web site. We are often asked by authors to estimate how long the review and production process takes in JAIF. However, no universal timeline exists for papers to go from manuscript submission to publication, and this is typically true for most journals. Some journals achieve a shorter timeline by reducing the peer review process. When a new manuscript is submitted to JAIF, it is automatically assigned to the Area Editor for the technical area selected by the corresponding author. The Area Editor assigns an Associate Editor under their area to handle the actual review process. Area Editors can also serve in the role of an Associate Editor. The Associate Editor uses the web-based system to assign three to four reviewers who have the appropriate technical background for evaluating the manuscript. This process often takes more time than one would anticipate because technical experts are busy and not always available to re-days to complete the review, and typically, the referees potential referees do not respond promptly to a request to review a manuscript. As a result of these issues, the Associate Editor has to seek new potential referees for the manuscript further delaying the review process. The referees' responses usually include detailed comments that are used by the authors to help improve the manuscript and a recommendation on publication of the manuscript. Based on these responses, the Associate Editor makes a decision to accept, reject, or conditionally-accept the manuscript after further revisions. This letter is produced within the …

[1]  Scott R. Harris What is a Journal Article? , 2014, How to Critique Journal Articles in the Social Sciences.

[2]  Hans Chalupsky,et al.  Scalable Group Detection via a Mutual Information Model , 2004 .

[3]  Aubrey B. Poore,et al.  A Lagrangian Relaxation Algorithm for Multidimensional Assignment Problems Arising from Multitarget Tracking , 1993, SIAM J. Optim..

[4]  Dan Raphaeli,et al.  Series expansions for the distribution of noncentral indefinite quadratic forms in complex normal variables , 1995 .

[5]  Markus Schlosser Lineare Schätzer zur multisensoriellen Objektverfolgung in verteilten, nichtlinearen Systemen , 2006 .

[6]  Kuo-Chu Chang,et al.  Evaluating a linear predictive algorithm for bandwidth conservation , 2000, IEEE Trans. Aerosp. Electron. Syst..

[7]  Abder Rezak Benaskeur,et al.  Fire control-based adaptation in data fusion applications , 2007, 2007 10th International Conference on Information Fusion.

[8]  Clayton T. Morrison,et al.  The Hats Information Fusion Challenge Problem , 2006, 2006 9th International Conference on Information Fusion.

[9]  Yaakov Bar-Shalom,et al.  Multitarget-Multisensor Tracking: Applications and Advances , 1992 .

[10]  Oliver E. Drummond,et al.  Performance metrics for multiple-sensor multiple-target tracking , 2000, SPIE Defense + Commercial Sensing.

[11]  Lawrence B. Holder,et al.  Graph-based Relational Learning with Application to Security , 2004, Fundam. Informaticae.

[12]  Peng Zhang,et al.  Optimal linear estimation fusion - part VI: sensor data compression , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.

[13]  Sensor Management for Tracking Interacting Targets , 2001 .

[14]  Jeffrey K. Uhlmann,et al.  General Decentralized Data Fusion With Covariance Intersection (CI) , 2001 .

[15]  R. Blahut Theory and practice of error control codes , 1983 .

[16]  Lucy Y. Pao,et al.  Controlling target estimate covariance in centralized multisensor systems , 1998, Proceedings of the 1998 American Control Conference. ACC (IEEE Cat. No.98CH36207).

[17]  A. Volgenant,et al.  A shortest augmenting path algorithm for dense and sparse linear assignment problems , 1987, Computing.

[18]  Brahim Chaib-draa,et al.  Coordinating Plans for Agents Performing AAW Hardkill and Softkill for Frigates , 2001 .

[19]  Foster J. Provost,et al.  A Brief Survey of Machine Learning Methods for Classification in Networked Data and an Application to Suspicion Scoring , 2006, SNA@ICML.

[20]  Abder Rezak Benaskeur,et al.  Argumentation-based Decision Support in Naval Command & Control , 2006 .

[21]  Lawrence B. Holder,et al.  Iterative Structure Discovery in Graph-Based Data , 2005, Int. J. Artif. Intell. Tools.

[22]  The Role of Higher-Order Constructs in the Inexact Matching of Semantic Graphs , 2005 .

[23]  Rob Allen GETTING THE ACT TOGETHER , 1992 .

[24]  Eloi Bosse,et al.  CASE_ATTI: An Algorithm-Level Testbed for Multi-Sensor Data Fusion , 1995 .

[25]  Bruce A. Chalmers Supporting Threat Response Management in a Tactical Naval Environment , 2003 .

[26]  Yunmin Zhu,et al.  Optimal linear estimation fusion. Part V. Relationships , 2002, Proceedings of the Fifth International Conference on Information Fusion. FUSION 2002. (IEEE Cat.No.02EX5997).

[27]  James Llinas,et al.  Revisiting the JDL Data Fusion Model II , 2004 .

[28]  Jorge E. Tierno Performance Analysis and Prediction for Data Mining Systems , 2005, AAAI Spring Symposium: AI Technologies for Homeland Security.

[29]  H. Todd Kauderer Air-Directed Surface-to-Air Missile study methodology , 2000 .

[30]  X. Rong Li Optimal linear estimation fusion-part VII: dynamic systems , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.

[31]  Dimitri P. Bertsekas,et al.  A forward/reverse auction algorithm for asymmetric assignment problems , 1992, Comput. Optim. Appl..

[32]  P. Cohen,et al.  Measuring Confidence Intervals in Link Discovery: A Bootstrap Approach , 2004 .

[33]  X. R. Li,et al.  Optimal Linear Estimation Fusion — Part IV : Optimality and Efficiency of Distributed Fusion , 2001 .

[34]  Zhi Tian,et al.  Performance evaluation of track fusion with information matrix filter , 2002 .

[35]  Jesse Davis,et al.  Using Bayesian Classifiers to Combine Rules , 2004 .

[36]  Abder Rezak Benaskeur,et al.  Impact of the Tactical Picture Quality on the Fire Control Radar Search-Lock-On Time , 2006 .

[37]  James P. Ferry XMAP: Track-to-Track Association with Metric, Feature, and Target-type Data , 2006, 2006 9th International Conference on Information Fusion.

[38]  Christof Paar,et al.  Comparison of arithmetic architectures for Reed-Solomon decoders in reconfigurable hardware , 1997, Proceedings. The 5th Annual IEEE Symposium on Field-Programmable Custom Computing Machines Cat. No.97TB100186).

[39]  S. Paradis,et al.  An architecture and a facility for the integration of all levels of data fusion , 2000, Proceedings of the Third International Conference on Information Fusion.

[40]  X. R. Li,et al.  Optimal Linear Estimation Fusion — Part III : Cross-Correlation of Local Estimation Errors , 2001 .

[41]  Peter Kropf,et al.  A Method to Optimize Ship Maneuvers for the Coordination of Hardkill and Softkill Weapons within a Frigate , 2002 .

[42]  Haym Hirsh,et al.  Learning to Predict Rare Events in Event Sequences , 1998, KDD.

[43]  Chongzhao Han,et al.  Optimal Linear Estimation Fusion — Part I : Unified Fusion Rules , 2001 .

[44]  Robert C. Schrag,et al.  Scoring Hypotheses from Threat Detection Technologies: Analogies to Machine Learning Evaluation , 2007 .

[45]  Foster Provost,et al.  A Simple Relational Classifier , 2003 .

[46]  Yakov Bar-Shalom,et al.  Multitarget-Multisensor Tracking: Principles and Techniques , 1995 .

[47]  S. Matwin,et al.  Data Mining For Prediction of Aircraft Component Replacement , 1999 .

[48]  Mark Levedahl An analysis of object designation performance using GNN and GNP correlation , 2004, SPIE Defense + Commercial Sensing.

[49]  Brian Gallagher,et al.  Matching Structure and Semantics: A Survey on Graph-Based Pattern Matching , 2006, AAAI Fall Symposium: Capturing and Using Patterns for Evidence Detection.

[50]  Neal A. Carlson Federated Filter for Distributed Navigation and Tracking Applications , 2002 .

[51]  J. P. BfflOF Computing the distribution of quadratic forms in normal variables , 2005 .

[52]  A. Benaskeur,et al.  Threat evaluation and weapons allocation in network-centric warfare , 2005, 2005 7th International Conference on Information Fusion.

[53]  Thia Kirubarajan,et al.  Estimation with Applications to Tracking and Navigation: Theory, Algorithms and Software , 2001 .

[54]  Martin O. Hofmann,et al.  Complexity and Performance Assessment for Data Fusion Systems , 1998 .

[55]  Rajat K. Saha Analytical evaluation of an ESM/radar track association algorithm , 1992, Defense, Security, and Sensing.

[56]  Robert C. Schrag,et al.  Scoring Alerts from Threat Detection Technologies , 2006, AAAI Fall Symposium: Capturing and Using Patterns for Evidence Detection.

[57]  Parag K. Lala,et al.  Fault tolerant and fault testable hardware design , 1985 .

[58]  Stelios C. A. Thomopoulos,et al.  Distributed Fusion Architectures and Algorithms for Target Tracking , 1997, Proc. IEEE.

[59]  Lawrence D. Stone,et al.  Track-to-track association and bias removal , 2002, SPIE Defense + Commercial Sensing.