{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:23:06Z","timestamp":1760170986866,"version":"3.40.3"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319289694"},{"type":"electronic","value":"9783319289717"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-28971-7_2","type":"book-chapter","created":{"date-parts":[[2016,5,25]],"date-time":"2016-05-25T00:53:14Z","timestamp":1464137594000},"page":"27-43","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Formalization of \u201cContext\u201d for Information Fusion"],"prefix":"10.1007","author":[{"given":"Galina L.","family":"Rogova","sequence":"first","affiliation":[]},{"given":"Alan N.","family":"Steinberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,26]]},"reference":[{"key":"2_CR1","volume-title":"Systems: Concepts, Methodologies and Applications","author":"B Wilson","year":"1984","unstructured":"B. Wilson, Systems: Concepts, Methodologies and Applications (Wiley, Chichester, 1984)"},{"issue":"4","key":"2_CR2","first-page":"45","volume":"40","author":"MH Zack","year":"1999","unstructured":"M.H. Zack, Managing codified knowledge. Sloan Manag. Rev. 40(4), 45\u201358 (1999)","journal-title":"Sloan Manag. Rev."},{"key":"2_CR3","unstructured":"J.R. Anderson, J.R. Language, Memory and Thought (Hillsdale, Erlbaum NJ, 1976)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"P. Br\u00e9zillon, J.-Ch. Pomerol, Misuse and nonuse of knowledge-based systems: the past experiences revisited, in Implementing Systems for Supporting Management Decisions, ed. by P. Humphreys, L. Bannon, A. McCosh, P. Migliarese, and J.-Ch. Pomerol (Chapman and Hall, London, 1996), pp. 44\u201360","DOI":"10.1007\/978-0-387-34967-1_4"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"A. Dey, Understanding and using context, Personal and Ubiquitous Computing, vol. 5(1) (Springer, London, 2001)","DOI":"10.1007\/s007790170019"},{"issue":"5","key":"2_CR6","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/65.313011","volume":"8","author":"B Schilit","year":"1994","unstructured":"B. Schilit, M. Theimer, Disseminating active map information to mobile hosts. IEEE Netw. 8(5), 22\u201332 (1994)","journal-title":"IEEE Netw."},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.inffus.2007.04.001","volume":"10","author":"K Sycara","year":"2009","unstructured":"K. Sycara, R. Glinton, B. Yu, J. Giampapa, S. Owens, M. Lewis, C. Grindle, An integrated approach to high-level information fusion. Inf. Fusion 10, 25\u201350 (2009)","journal-title":"Inf. Fusion"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"J. G\u00f3mez-Romero, M.A. Serrano, J. Garc\u00eda, J.M. Molina, G. Rogova, Context-based multi-level information fusion for harbor surveillance. Inf. Fusion 21, 173\u2013186 (2015)","DOI":"10.1016\/j.inffus.2014.01.011"},{"key":"2_CR9","unstructured":"J. Pascoe, Adding generic contextual capabilities to wearable computers, in Proceedings of 2nd International Symposium on Wearable Computers (1998), pp. 92\u201399"},{"issue":"2","key":"2_CR10","first-page":"105","volume":"6","author":"G Tiberghien","year":"1998","unstructured":"G. Tiberghien, Context and cognition: introduction. Cahier de Psychologie Cognitive 6(2), 105\u2013119 (1998)","journal-title":"Cahier de Psychologie Cognitive"},{"issue":"1","key":"2_CR11","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1017\/S0269888999141018","volume":"14","author":"P Brezzilon","year":"1999","unstructured":"P. Brezzilon, Context in problem solving: a survey. Knowl. Eng. Rev. 14(1), 47\u201380 (1999)","journal-title":"Knowl. Eng. Rev."},{"issue":"5","key":"2_CR12","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/65.313011","volume":"8","author":"B Schilit","year":"1994","unstructured":"B. Schilit, M. Theimer, Disseminating active map information to mobile hosts. IEEE Netw. 8(5), 22\u201332 (1994)","journal-title":"IEEE Netw."},{"key":"2_CR13","unstructured":"D. Salber, A.K. Dey, C.D. Abowd, The context toolkit: aiding the development of context-enabled applications, in The Proceedings of CHI\u201999 (1999), pp. 434\u2013441"},{"key":"2_CR14","unstructured":"L. Gong, Contextual modeling and applications, V1, in Proceedings of IEEE International Conference on SMC (2005)"},{"key":"2_CR15","unstructured":"A.N. Steinberg, G.L. Rogova, Situation and context in data fusion and natural language understanding, in Proceedings of Eleventh International Conference on Information Fusion (Cologne, 2008)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"J.-Ch. Pomerol, P. Br\u00e9zillon, About some relationships between knowledge and context, in CONTEXT\u201801 Proceedings of the Third International and Interdisciplinary Conference on Modeling and Using Context (Springer, London, 2001), pp. 461\u2013464","DOI":"10.1007\/3-540-44607-9_44"},{"key":"2_CR17","volume-title":"The Concept of Mind","author":"G Ryle","year":"1949","unstructured":"G. Ryle, The Concept of Mind (Barnes and Noble, New York, 1949)"},{"key":"2_CR18","unstructured":"T. Stang, C. Linnhoff-Popien, A context modeling survey, in First International Workshop on Advanced Context Modelling, Reasoning and Management (2004)"},{"issue":"2","key":"2_CR19","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.pmcj.2009.06.002","volume":"6","author":"C Bettini","year":"2010","unstructured":"C. Bettini, O. Brdiczka, K. Henricksen, J. Indulska, D. Nicklas, A. Ranganathan, D. Riboni, A survey of context modelling and reasoning techniques. Pervasive Mob. Comput. 6(2), 161\u2013180 (2010)","journal-title":"Pervasive Mob. Comput."},{"key":"2_CR20","unstructured":"J. McCarthy, Notes on formalizing context, in Proceedings of the Thirteenth International Joint Conference in Artificial Intelligence (Chambery, France, 1993), pp. 555\u2013560"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"B. Schilit, N. Adams, R. Want, Context-aware computing applications, in IEEE Workshop on Mobile Computing Systems and Applications (Santa Cruz, CA, 1994)","DOI":"10.1109\/WMCSA.1994.16"},{"key":"2_CR22","unstructured":"J. George, J.L. Crassidis, T. Singh, Threat assessment using context-based tracking in a maritime environment, in Proceedings of the 12th International Conference on Information Fusion (Fusion 2009) (Seattle, USA, 2009), pp. 187\u2013194"},{"key":"2_CR23","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.inffus.2007.01.004","volume":"10","author":"M Kokar","year":"2009","unstructured":"M. Kokar, C.J. Matheus, K. Baclawski, Ontology-based situation awareness. Inf. Fusion 10, 83\u201398 (2009)","journal-title":"Inf. Fusion"},{"key":"2_CR24","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.inffus.2008.05.006","volume":"10","author":"EG Little","year":"2009","unstructured":"E.G. Little, G. Rogova, Designing ontologies for higher level fusion. Inf. Fusion 10, 70\u201382 (2009)","journal-title":"Inf. Fusion"},{"key":"2_CR25","unstructured":"J. G\u00f3mez-Romero, F. Bobillo, M. Delgado, Context representation and reasoning with formal ontologies, in Proceedings of the Activity Context Representation Workshop in the 25th AAAI Conference (AAAI 2011) (San Francisco, USA, 2011)"},{"key":"2_CR26","unstructured":"F. Giunchiglia, Contextual reasoning, in Proceedings IJ CAI\u201993 Workshop on Using Knowledge in its Context (Chambery, France, 1993), pp. 39\u201349"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"M. Akman, M. Surav, The use of situation theory in context modeling. Comput. Intell. (1997)","DOI":"10.1111\/0824-7935.00046"},{"key":"2_CR28","unstructured":"J. Barwise, J. Perry, The situation underground, in Working Papers in Semantics, vol. 1 (Stanford University Press, 1980)"},{"key":"2_CR29","unstructured":"K. Devlin, Logic and Information (Press Syndicate of the University of Cambridge, 1991)"},{"key":"2_CR30","unstructured":"A.N. Steinberg, Foundations of situation and threat assessment, in Handbook of Multisensor Data Fusion, ed. by M. Liggins, D. Hall, J. Llinas, Chapter 26 (CRC Press, 2008)"},{"key":"2_CR31","unstructured":"T. Buchholz, A. Kupper, M. Schiffers, Quality of context information: what it is and why we need it, vol. 200, in Proceedings of the 10th International Workshop of the HP OpenView University Association (HPOVUA) (Hewlett-Packard OpenView University Association, Geneva, Switzerland, 2003)"},{"key":"2_CR32","unstructured":"M. Krause, I. Hochstatter, Challenges in modelling and using quality of context (QoC), in Mobility Aware Technologies and Applications. Lecture Notes in Computer Science, vol. 3744 (2005), pp. 324\u2013333"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"G. Rogova, E. Bosse, Information quality in information fusion, in Proceedings of FUSION\u20192010-13th Conference on Multisource Information Fusion (Edinburgh, Scotland, 2010)","DOI":"10.1109\/ICIF.2010.5711857"},{"key":"2_CR34","unstructured":"G. Rogova, V. Nimier, Reliability in information fusion: literature survey, in Proceedings of the FUSION\u20192004-7th Conference on Multisource-Information Fusion (2004)"},{"key":"2_CR35","unstructured":"J. Josephson, On the logical form of abduction, in AAAI Spring Symposium Series: Automated Abduction (1990), pp. 140\u2013144"},{"key":"2_CR36","volume-title":"The Stuff of Thought: Language as a Window into Human Nature","author":"S Pinker","year":"2007","unstructured":"S. Pinker, The Stuff of Thought: Language as a Window into Human Nature (Penguin Books, New York, 2007)"},{"key":"2_CR37","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226471013.001.0001","volume-title":"Women, Fire and Dangerous Things: What Categories Reveal about the Mind","author":"George Lakoff","year":"1987","unstructured":"George Lakoff, Women, Fire and Dangerous Things: What Categories Reveal about the Mind (University of Chicago Press, Chicago, 1987)"},{"key":"2_CR38","volume-title":"Philosophy in the Flesh","author":"G Lakoff","year":"2000","unstructured":"G. Lakoff, M. Johnson, Philosophy in the Flesh (MIT Press, Cambridge, MA, 2000)"},{"key":"2_CR39","unstructured":"L. Carroll, Through the Looking Glass and What Alice Found There (Digital Scanning, Inc., 2007)"},{"key":"2_CR40","unstructured":"H.P. Grice, Presupposition and conversational implicature, in Radical Pragmatics, ed. by P. Cole (Academic Press, 1981), p. 14"},{"key":"2_CR41","doi-asserted-by":"crossref","unstructured":"J.R. Searle, Speech Acts (Cambridge University Press, 1969)","DOI":"10.1017\/CBO9781139173438"},{"key":"2_CR42","unstructured":"J.L. Austin, How to do Things with Words (Oxford University Press, 1965), p. 12"},{"key":"2_CR43","unstructured":"A. Steinberg, J. Llinas, A. Bisantz, C. Stoneking, N. Morizio, Error characterization in human-generated reporting, in Proceedings of MSS National Symposium on Sensor and Data Fusion (McLean, VA, USA, 2007)"},{"key":"2_CR44","doi-asserted-by":"crossref","unstructured":"A.N. Steinberg, Reference and description in natural language, in SPIE Proceedings of Applications of Artificial Intelligence, vol. 937 (1988)","DOI":"10.1117\/12.947016"}],"container-title":["Advances in Computer Vision and Pattern Recognition","Context-Enhanced Information Fusion"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28971-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T16:24:31Z","timestamp":1558455871000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28971-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319289694","9783319289717"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28971-7_2","relation":{},"ISSN":["2191-6586","2191-6594"],"issn-type":[{"type":"print","value":"2191-6586"},{"type":"electronic","value":"2191-6594"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"26 May 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}