Adamson, M., Samarina, V., Xu, X., Huynh, V., Kennedy, Q., Weiner, M., et al. The Impact of Brain Size on Pilot Performance Varies with Aviation Training and Years of Education, Journal of the International Neuropsychological Society, 16, 412-415, 2010.
Alderson, D. L., and J.C. Doyle. Contrasting Views of Complexity and Their Implications for Network-Centric Infrastructures, IEEE Transactions on Systems, Man, and Cybernetics-Part A, 40(4): 839-852, July 2010.
Atkinson, M.P. and L.M. Wein. An Overlapping Networks Approach to Resource Allocation for Domestic Counterterrorism, Studies of Conflict and Terrorism, 33, 618–651, 2010.
Betts, R., McCauley, M., and M. Walwanis. Assessing the Need for a Deployable Training System for the F/A-18 Hornet and Super Hornet, Interservice/Industry Training, Simulation & Education Conference 2010 Proceedings, Orlando, FL, Nov – Dec 2010.
Billie, J., Huber, M., Nestler, S., and G. Costa. Simulating Rare Baseball Events Using Monte Carlo Methods in Excel and R, Electronic Proceedings of the 22nd International Conference on Technology in Collegiate Mathematics, Chicago, IL, 11-14 March 2010.
Blais, C., Falby, J., and M. McCauley. Should S1000D be Required by the Department of Defense?, Technical Report NPS-MV-10-002, August 2010.
Bouwens, C. and T. Meyer. Data Social Network Analysis Methods for Identifying Emergent Behaviors in Agent-Based Models, 2010 Fall Simulation Interoperability Workshop, Orlando, FL, 20-24 September 2010.
Buttrey, S., O’Conner, P., O’Dea, A., and Q. Kennedy. An Evaluation of the Construct Validity of the Command Safety Assessment Survey, Technical Report NPS-OR-10-004, Naval Postgraduate School, Monterey, CA, May 2010.
Byers, K., Chung, T.H., and R.T. Johnson. Modeling and Analysis of Tactical Installation Protection Missions, Proceedings of the 2010 Winter Simulation Conference, 1347-1355, 2010.
Craparo, E. M. Constrained Node Placement in Mobile Backbone Networks, Proceedings of the 49th IEEE Conference on Decision and Control, Atlanta, GA, December 2010.
Chung, T. On Probabilistic Search Decisions Under Searcher Motion Constraints, Algorithmic Foundations of Robotics VIII: Selected Contributions of the Eighth International Workshop on the Algorithmic Foundations of Robotics, Chirikjian, G.S.; Choset, H.; Morales, M.; Murphey, T. (Eds.). Series: Springer Tracts in Advanced Robotics, 57, 501-516, 2010.
Dekker, S. W. A., Hummerdal, D. H., and K. Smith. Situation Awareness: Some Remaining Questions, Theoretical Issues in Ergonomics Science, 11, 131-135, 2010.
Dimitrov, N. B. and C.G. Plaxton. Competitive Weighted Matching in Transversal Matroids, Algorithmica, 1-16, September 2010.
Dimitrov, N. B. and L.A. Meyers. Mathematical Approaches to Infectious Disease Prediction and Control, TutORials in Operations Research, Hanover, MD: INFORMS, November 2010.
Dryer, D., Beach T., and G. Horne. Test Design and Analysis at the Naval Postgraduate School, The ITEA Journal, 31, 99-102, March 2010.
Esher, L.A., Hall, S., Hansen, J.A., Regnier, E.D., Sanchez, P.J., and D. Singham. Simulating Pirate Behavior to Exploit Environmental Information. In B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, editors, Proceedings of the 2010 Winter Simulation Conference. 1330-1335, 2010.
Esher, L.A., Lednicky, E., Miranda, S., Regnier, E.D., Sanchez, P.J., and S. Upton. Analyzing Forecasted Pirate Probabilities to Exploit Meteorological and Intelligence Parameters through Data Farming. Scythe Proceedings and Bulletin of the International Data Farming Community 9: 1-4, 2010.
Esher, L.A., Hall, S., Hansen, J., Regnier, E., Sanchez, P. and D. Singham. Anti-Piracy and Terror Reduction: Simulating Pirate Behavior to Exploit Environmental Information. Scythe Proceedings and Bulletin of the International Data Farming Community Scythe Proceedings and Bulletin of the International Data Farming Community 8: 50-53, 2010.
Ewing, P.L. Analytics in Afghanistan; Moving Away from the Anecdotal, Recommendation Paper for GEN S. McChrystal, ISAF Commander, Kabul, Afghanistan, 6 April 2010.
Fricker, R.D., Jr. Book review: Statistics and Data with R: An Applied Approach Through Examples by Yosef Cohen and Jeremiah Y. Cohen, The American Statistician, 64, 93-94, 2010.
Gaver, D. P. and Jacobs, P. A. Comment on “Reliability Growth Management and Statistical Methods for Discrete Use Systems” by J. B. Hall, P. M. Ellner, and A. Mosleh, Technometrics, 52, 289-391, 2010.
Gaver, D. P. and Jacobs, P. A., Failure Mode Removal as a Service Process, Proceedings 3rd International Conference on Accelerated Life Testing, ALT2010, Clermont-Ferrand, France, 19-21 May 2010.
Hamrick, T.A., Fricker, R.D., Jr., and G.G. Brown. Assessing What Distinguishes Highly Cited from Less-Cited Papers Published in Interfaces, Interfaces, 40, 454-464, 2010.
Horne, G. and T. Meyer. Data Farming and Defense Applications, Proceedings of the MODSIM World 2010 Conference, Hampton Roads, Virginia, October 2010.
Hughes, W. P. Clear Purpose, Comprehensive Execution--Raymond Ames Spruance, Chapter 5 in Hattendorf, J. B. and Elleman, B. A. Nineteen-Gun Salute: Case Studies of Operational, Strategic, and Diplomatic Naval Leadership during the 20th and Early 21st Centuries, Newport RI, Naval War College Press, 51-64, 2010.
Johnson, R.T. and D.C. Montgomery. Designing Experiments for Nonlinear Models - An Introduction, Quality and Reliability Engineering International, 26, 431-441, 2010.
Johnson, R.T., Montgomery, D.C., Jones, B., and P.A. Parker. Comparing Computer Experiments Using High Order Polynomial Metamodels, Journal of Quality Technology, 42(1), 86-102, 2010.
Källhammer, J.-E. and K. Smith. Bridging Laboratory and Field Studies. The VTTI Second International Symposium on Naturalistic Driving Research. Blacksburg, VA., August 2010.
Kaplan, E., Kress, M. and R. Szechtman. Confronting Entrenched Insurgents, Operations Research, 58, 29-341, 2010.
Kennedy, Q., Taylor, J. L., Reade, G., and J. Yesavage. Age and Expertise Effects in Aviation Decision Making and Flight Control in a Flight Simulator, Aviation, Space, and Environmental Medicine, 81, 489-497, 2010.
Kline, J.E. Maritime Security, Securing Freedom in the Global Commons, Stanford University Press, 67-82, 2010.
Lin, K.Y. and A.R. Washburn. The Effect of Decoys in IED Warfare. Technical Report NPS-OR-10-007, Naval Postgraduate School, Monterey, CA, 2010.
Lin, K.Y. Discrete-Time Martingales. Wiley Encyclopedia of Operations Research and Management Science, 2010.
Meyer, T. et al. Team 6: Utility of Distillation Modeling for Countering IEDs, The Scythe: the Bulletin and Proceedings of the International Data Farming Community, Issue 7, February 2010.
Meyer, T. et al. Team 6: Social Networks in Agent-based Models: Methods of Analysis, The Scythe: the Bulletin and Proceedings of the International Data Farming Community, Issue 8, June 2010.
Ruth, D.M. and R.A. Koyak. Applications of Assignment Algorithms to Nonparametric Tests for Homogeneity, Proceedings of the Section on Nonparametric Statistics, 2010 Joint Statistical Meetings, 2267–2278, 2010.
Koyak, R.A. Risk on Roads: A Modeling Approach. Part III: Application Development, white paper sponsored by the Joint IED Defeat Organization (JIEDDO) and the U.S. Marine Corps (USMC) Operations Analysis Division (OAD), September 2010.
O’Dea, A., O’Connor, P., Kennedy, Q., and S.E. Buttrey. A Review of the Safety Climate as it Relates to Naval Aviation, Technical Report, NPS-OR-10-002, Naval Postgraduate School, Monterey, CA, March 2010.
Oh, R., Sanchez, S., Lucas, T., Wan, H., and M. Nissen. Efficient Experimental Design Tools for Exploring Large Simulation Models, Computational & Mathematical Organization Theory, 15, 237-257, 2010.
Pasupathy, R., Szechtman, R. and E. Yücesan, Selecting Small Quantiles, Proceedings of the 2010 Winter Simulation Conference, 2762-2770, 2010.
Rockafellar, R.T., and J.O. Royset. On Buffered Failure Probability in Design and Optimization of Structures, Reliability Engineering & System Safety, 95, 499-510, 2010.
Roman, P.E., Dell, R.F., and J.D. Velasquez. Advanced Techniques in Web Data Preprocessing and Cleaning Chapter 2 from Advanced Techniques in Web Intelligence – 1, published by Springer, Berlin, Edited by Velasquez and Jain, 2010.
Royset, J.O., and H. Sato. Route Optimization for Multiple Searchers, Naval Research Logistics, 57, 701-717, 2010.
Rosén, E., Källhammer, J.-E., Eriksson, D., Nentwich, M., Fredriksson, R., and K. Smith. Pedestrian Injury Mitigation by Autonomous Braking. Accident Analysis and Prevention, 42, 1949-1957, 2010.
Sato, H., and J.O. Royset. Path Optimization for the Resource-Constrained Searcher, Naval Research Logistics, 57, 422-440, 2010.
Salmerón, J. and A. Apte. Stochastic Optimization for Natural Disaster Asset Prepositioning, Production and Operations Management, 19, 561-574, 2010.
Salmerón, J. and K. Wood. Final Report on JIEDDO Research Project Optimally Locating BETSS-C Surveillance Assets, Project Report, NPS-OR-10-010-PR, Naval Postgraduate School, Monterey, CA 2010.
Schruben, L.W., and D.I. Singham. Simulating Multivariate Time Series Using Flocking. In Proceedings of the 2010 Winter Simulation Conference, ed. B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, 1048-1054. Piscataway, NJ: Institute of Electrical and Electronics Engineers, 2010.
Shattuck, N.L., Shattuck, L. G., Tvaryanas, A.P., and P. Matsangas. Effects of Sleep on Training Effectiveness in Soldiers at Fort Leonard Wood, Missouri, Technical Report, NPS-OR-10-011, Naval Postgraduate School, Monterey, CA, 2010.
Shattuck, N.L., and A.P. Tvaryanas. Human Systems Integration Domain Trade-offs in Optimized Manning- The Task Effectiveness Tool. Technical Report, NPS-OR-10-00, Naval Postgraduate School, Monterey, CA, 2010.
Shearer, R. and B. Marvin. Recognizing Patterns of Nation-State Instability that Lead to Conflict. Military Operations Research. 15, 17-30, 2010.
Shen, H., Wan, H., and S.M. Sanchez. A Hybrid Method for Simulation Factor Screening, Naval Research Logistics, 57, 45-57, 2010.
Smith, K. and J.-E. Källhammer. Driver Acceptance of False Alarms to Simulated Encroachment. Human Factors, 52, 446-476, 2010.
Smith, K., Lindgren, I., and R. Granlund. Etiquette to Bridge Cultural Faultlines. In C. Hayes and C. Miller (Eds.), Human-computer etiquette: Understanding the impact of human culture and expectations on the use and effectiveness of computers and technology. Boca Raton, FL: Taylor and Francis Group, 2010.
Smith, K. Quantifying Active Safety System Performance at Pedestrian Detection, Proceedings of the 54th Annual Meeting of the Human Factors and Ergonomic Society. San Francisco, CA, 2038-2042, September 2010.
Washburn, A.R., Random Meetings at Sea, Technical Report, NPS-OR-10-001, Naval Postgraduate School, Monterey, CA, January 2010.
Washburn, A.R., A Multistatic Sonobuoy Theory, Technical Report, NPS-OR-10-005, Naval Postgraduate School, Monterey, CA, August 2010.
Washburn, A.R., The Effect of Decoys in IED Warfare, Technical Report, NPS-OR-10-007, Naval Postgraduate School, Monterey, CA, September 2010.
Washburn, A.R., Barrier Games, Military Operations Research, 15, 31-41, 2010.
Willinger, W., D. Alderson, and J.C. Doyle, “Mathematics and the Internet: A source of enormous confusion and great potential,” The Best Writing on Mathematics 2010, M. Pitici, Ed., Princeton University Press, Princeton, NJ, 2010.