Defense Advanced Research Projects AgencyTagged Content List

Harnessing Complexity

Systems comprising multiple and diverse interactions

Showing 24 results for Complexity + Programs RSS
The ultimate goal of the DARPA Accelerated Computation for Efficient Scientific Simulation (ACCESS) is to demonstrate new, specialized benchtop technology that can solve large problems in complex physical systems on the hour timescale, compared to existing methods that require full cluster-scale supercomputing resources and take weeks to months. The core principle of the program is to leverage advances in optics, MEMS, additive manufacturing, and other emerging technologies to develop new non-traditional hybrid analog and digital computational means.
The Agile Teams (A-Teams) program aims to discover, test, and demonstrate generalizable mathematical abstractions for the design of agile human-machine teams and to provide predictive insight into team performance.
System-of-Systems (SoS) architectures are increasingly central in managing defense, national security and urban infrastructure applications. However, it is difficult to model and currently impossible to systematically design such complex systems using existing tools, which has led to inferior performance, unexpected problems and weak resilience.
A rapidly increasing percentage of the world’s population is connected to the global information environment. At the same time, the information environment is enabling social interactions that are radically changing how and at what rate information spreads. Both nation-states and nonstate actors have increasingly drawn upon this global information environment to promote their beliefs and further related goals.
The Department of Defense (DoD) maintains information systems that depend on Commercial off-the-shelf (COTS) software, Government off-the-shelf (GOTS) software, and Free and open source (FOSS) software. Securing this diverse technology base requires highly skilled hackers who reason about the functionality of software and identify novel vulnerabilities.