2016
DOI: 10.1109/tdsc.2015.2427846
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Unspecified Emergencies for Controlled Information Sharing

Abstract: During emergency situations one of the key requirements to handle the crisis is information sharing among organizations involved in the emergency management. When emergency situations are well known, it is possible to specify a priori these situations and to plan the information sharing needs in advance. However, there are many situations where it is not possible to describe these emergencies and their information sharing requirements beforehand. Therefore, in this paper, we present a framework able to deal wi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 18 publications
0
6
0
1
Order By: Relevance
“…As a first task, it has to inquiry the Device register through an Oracle (Query DeviceRegister in the algorithm) in order to retrieve, for each n ∈ N , the list of devices able to carry out n, called Candidate Device List (CDL n in the algorithm) (lines . Once this information is retrieved, for each node n in N , Assigner has to evaluate each device in CDL n to select only those that satisfy the application search criteria (i.e., local, global and blacklist) specified in N app for n, say C a (lines [16][17][18][19][20][21][22][23][24][25]. As a first step, it checks whether the considered device D, aka its providers, is not included into the blacklist specified in C a (line 16).…”
Section: B Algorithmsmentioning
confidence: 99%
See 2 more Smart Citations
“…As a first task, it has to inquiry the Device register through an Oracle (Query DeviceRegister in the algorithm) in order to retrieve, for each n ∈ N , the list of devices able to carry out n, called Candidate Device List (CDL n in the algorithm) (lines . Once this information is retrieved, for each node n in N , Assigner has to evaluate each device in CDL n to select only those that satisfy the application search criteria (i.e., local, global and blacklist) specified in N app for n, say C a (lines [16][17][18][19][20][21][22][23][24][25]. As a first step, it checks whether the considered device D, aka its providers, is not included into the blacklist specified in C a (line 16).…”
Section: B Algorithmsmentioning
confidence: 99%
“…if A similar process is done to evaluate the global constraints contained in C a (lines [19][20][21][22][23][24][25]. If the considered device D satisfies both the global and local constraints, it is inserted into the Selected Device List (SDL n in the algorithm).…”
Section: B Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…A confiança do nó x em relação à competência do nó y (T Skill xy ) é computada pela verificação da similaridade da sua competência em relação a do médico, considerada pelo STEALTH a mais elevada em saúde e estabelecida a partir da taxonomia de competências (T ), baseada em [Carminati et al 2016] Por exemplo, considere que um nó x avalia a confiança sobre um nó y, T xy , cuja competência atribuída é de cuidador e ambos possuem um único interesse saúde. Empregando-se uma taxonomia de competências em saúde baseada em [Carminati et al 2016] e [Mohammad and Hirst 2012] xy = 1, o valor da confiança de x em y, T xy , será de 0,5.…”
Section: Medição Da Confiançaunclassified
“…This can be achieved by using a DC power transmission scheme, and installing a static reactive power compensation device in order to support the voltage [14], [15]. However, these measures often need to be completed in the initial stages of power grid planning and construction, and are frequently limited by funds, policy, geography and other factors [16]- [21]. Secondary system means usually involve increasing a system's damping.…”
Section: Introductionmentioning
confidence: 99%