Defense Advanced Research Projects AgencyTagged Content List

Analytics for Data at Massive Scales

Extracting information from large data sets

Showing 74 results for Analytics RSS
The Artificial Intelligence Research Associate (AIRA) program is part of a broad DAPRA initiative to develop and apply “Third Wave” AI technologies that are robust to sparse data and adversarial spoofing, and that incorporate domain-relevant knowledge through generative contextual and explanatory models.
The Automating Scientific Knowledge Extraction (ASKE) program aims to develop technology to automate some of the manual processes of scientific knowledge discovery, curation and application. ASKE is part of DARPA's Artificial Intelligence Exploration (AIE) program, a key component of the agency’s broader AI investment strategy aimed at ensuring the United States maintains an advantage in this critical and rapidly accelerating technology area.
Expanded global access to diverse means of communication is resulting in more information being produced in more languages more quickly than ever before. The volume of information encountered by DoD, the speed at which it arrives, and the diversity of languages and media through which it is communicated make identifying and acting on relevant information a serious challenge. At the same time, there is a need to communicate with non-English-speaking local populations of foreign countries, but it is at present costly and difficult for DoD to do so.
Over the last 15 years, the U.S. military has increasingly been called upon to face complex operational environments (OE) and diverse enemies. Such complex OEs require the actions of U.S. forces and host-nation or coalition partners to be based on a common holistic understanding of the OE (e.g., governments, population groups, security forces, and violent non-state actors) and, in particular, the causal dynamics that can manifest as unanticipated and often counter-intuitive outcomes.
Networks within the United States and abroad face increasingly broad-spectrum cyber threats from numerous actors and novel attack vectors. Malicious activity also crosscuts organizational boundaries, as nefarious actors use networks with less protection to pivot into networks containing key assets. Detection of these threats requires adjustments to network and host sensors at machine speed. Additionally, the data required to detect these threats may be distributed across devices and networks. In all of these cases, the threat actors are using technology to perpetrate their attacks and hide their activities and movement, both physical and virtual, inside DoD, commercial, and Internet Access Provider (IAP) networks.