Skip to Content
The DSIAC Team
DTIC STI Program
DTIC IAC Program
DTIC R&E Gateway
Active Technical Inquiries
Notable Technical Inquiries
Core Analysis Task Program
Notable Task Orders
Subject Matter Experts
Defense Systems Digest
Register for Event
Contains all of these words
Contains any of these words
Contains none of these words
You are here
- Any -
Conferences (With Fees)
DSIAC Journal Article
Models & Tools
Standards and Policies
Type of Content
December 3, 2019 | Source: GCN, https://gcn.com/, GCN Staff, 15 November 2019
Terahertz Laser to Power "T-ray" Vision and High-Bandwidth Communications
As the military, science agencies, and communications firms compete for scarce spectrum resources, researchers at Harvard, MIT, and the Army have developed a compact, room...
January 15, 2018 | Source: National Defense, nationaldefensemagazine.org, 28 November 2017, Hawk Carlisle
The Complexity of Multi-Domain Operations
For the U.S. military to maintain its status as the greatest fighting force in the world, it must continue to learn and understand the multi-domain battlespace and significantly...
Survivability and Vulnerability
January 1, 2018 | Source: Microwave Journal, microwavejournal.com, 10 November 2017, Asif Anwar
Countering the UAV Threat
The success of unmanned aerial vehicles (UAVs) in providing real-time information to military commanders has contributed to both mission effectiveness and protecting personnel...
July 17, 2017 | Source: DARPA Spectrum Collaboration Challenge, spectrumcollaborationchallenge.com, 2017
DARPA Spectrum Collaboration Challenge (SC2) & Battle of the ModRecs
Spectrum Collaboration Challenge (SC2) The DARPA Spectrum Collaboration Challenge is the first-of-its-kind collaborative machine-learning competition to overcome scarcity in the...
November 21, 2016 | Source: Military & Electronics Magazine, J.R. Wilson
Today’s Battle for Electromagnetic Spectrum Interoperability and Dominance
U.S. and allied military forces are working on new electronic warfare, cyber warfare, spectrum warfare, and information warfare systems to seize and hold control of communications...