{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:25:53Z","timestamp":1742999153992,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642239625"},{"type":"electronic","value":"9783642239632"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23963-2_42","type":"book-chapter","created":{"date-parts":[[2011,10,5]],"date-time":"2011-10-05T21:29:02Z","timestamp":1317850142000},"page":"539-546","source":"Crossref","is-referenced-by-count":2,"title":["A Fuzzy-Based Approach to the Value of Information in Complex Military Environments"],"prefix":"10.1007","author":[{"given":"Timothy","family":"Hanratty","sequence":"first","affiliation":[]},{"suffix":"II","given":"Robert J.","family":"Hammell","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Heilman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA386374","volume-title":"Understanding Information Age Warfare","author":"D.S. Alberts","year":"2001","unstructured":"Alberts, D.S., Garstka, J.J., Hayes, R.E., Signori, D.T.: Understanding Information Age Warfare. CCRP, Washington (2001)"},{"key":"42_CR2","unstructured":"Flynn, M.T., et al.: Fixing Intel: A Blueprint for Making Intelligence relevant in Afghanistan, US Army (January 5, 2010)"},{"key":"42_CR3","unstructured":"James, J.: \u201cMilitary Data\u201d, presentation, Network Science Center, West Point (October 2010)"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Ahituv, N.: Assessing the value of information: Problems and approaches. Paper presented at the Proceedings of the Tenth International Conference on Information Systems, Boston, MA (1989)","DOI":"10.1145\/75034.75061"},{"issue":"5","key":"42_CR5","doi-asserted-by":"crossref","first-page":"119","DOI":"10.17705\/1jais.00032","volume":"4","author":"S. Rafaeli","year":"2003","unstructured":"Rafaeli, S., Raban, D.R.: Experimental investigation of the subjective value of information in trading. Journal of the Association for Information Systems\u00a04(5), 119\u2013139 (2003)","journal-title":"Journal of the Association for Information Systems"},{"key":"42_CR6","unstructured":"Anonymous, US Army Field Manual (FM) 3-0, Operations, US Army (June 2001)"},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Wilkins, D.E., et al.: Interactive Execution Monitoring of Agent Teams. Journal of Artificial Intelligence Research\u00a018 (March 2003)","DOI":"10.1613\/jair.1112"},{"key":"42_CR8","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"L.A. Zadeh","year":"1965","unstructured":"Zadeh, L.A.: Fuzzy sets. Information and Control\u00a08, 338\u2013353 (1965)","journal-title":"Information and Control"},{"key":"42_CR9","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TSMC.1973.5408575","volume":"3","author":"L.A. Zadeh","year":"1973","unstructured":"Zadeh, L.A.: Outline of a new approach to the analysis of complex systems and decision processes. IEEE Transactions on Systems, Man, and Cybernetics\u00a03, 28\u201344 (1973)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"42_CR10","first-page":"367","volume-title":"Fuzzy Sets and Applications","author":"L.A. Zadeh","year":"1987","unstructured":"Zadeh, L.A.: A theory of approximate reasoning. In: Yager, R., Orchinnikov, S., Tong, R., Nguyen, H. (eds.) Fuzzy Sets and Applications, pp. 367\u2013412. John Wiley & Sons, New York (1987)"},{"key":"42_CR11","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/0020-0255(75)90036-5","volume":"8","author":"L.A. Zadeh","year":"1975","unstructured":"Zadeh, L.A.: The Concept of a Linguistic Variable - I. Information Sciences\u00a08, 199\u2013249 (1975)","journal-title":"Information Sciences"},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Agrawal, P., Sarma, A., Ullman, J., Widom, J.: Foundations of Uncertain-Data Integration. In: Proceedings of the VLDB Endowment, vol.\u00a03(1-2), pp. 1080\u20131090 (September 2010)","DOI":"10.14778\/1920841.1920976"},{"key":"42_CR13","doi-asserted-by":"crossref","unstructured":"Magnani, M., Montesi, D.: A Survey on Uncertainty Management in Data Integration. Journal of Data and Information Quality\u00a02(1), 5:1\u20135:33 (2010)","DOI":"10.1145\/1805286.1805291"},{"key":"42_CR14","doi-asserted-by":"crossref","unstructured":"Helfert, M., Foley, O.: A Context Aware Information Quality Framework. In: Proceedings of the Fourth International Conference on Cooperation and Promotion of Information Resources in Science and Technology, pp. 187\u2013193 (November 2009)","DOI":"10.1109\/COINFO.2009.65"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Yu, B., Kallurkar, S., Vaidyanathan, G., Steiner, D.: Managing the Pedigree and Quality of Information in Dynamic Information Sharing Environments. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 1248\u20131250 (May 2007)","DOI":"10.1145\/1329125.1329376"},{"issue":"3","key":"42_CR16","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1109\/69.506705","volume":"8","author":"S. Parsons","year":"1996","unstructured":"Parsons, S.: Current Approaches to Handling Imperfect Information in Data and Knowledge Bases. IEEE Transactions on Knowledge and Data Engineering\u00a08(3), 353\u2013372 (1996)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"4","key":"42_CR17","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/07421222.1996.11518099","volume":"12","author":"R.Y. Wang","year":"1996","unstructured":"Wang, R.Y., Strong, D.: Beyond Accuracy. What Data Quality Means to Data Consumers. Journal of Management Information Systems\u00a012(4), 5\u201334 (1996)","journal-title":"Journal of Management Information Systems"},{"key":"42_CR18","volume-title":"Fuzzy Logic: Intelligence, Control, and Information","author":"J. Yen","year":"1999","unstructured":"Yen, J., Langari, R.: Fuzzy Logic: Intelligence, Control, and Information. Prentice Hall, Upper Saddle River (1999)"},{"key":"42_CR19","doi-asserted-by":"crossref","unstructured":"Liang, Y.: An Approximate Reasoning Model for Situation and Threat Assessment. In: Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, pp. 246\u2013250 (November 2007)","DOI":"10.1109\/FSKD.2007.146"},{"key":"42_CR20","unstructured":"Vincenti, G., Hammell II, R.J., Trajkovski, G.: Scouting for Imprecise Temporal Associations to Support Effectiveness of Drugs During Clinical Trials. In: Proceedings of the Annual Conference of the North American Fuzzy Information Processing Society (NAFIPS 2005), Ann Arbor, MI (June 22-25, 2005)"},{"key":"42_CR21","first-page":"1","volume-title":"Intelligent Systems in Operations: Models, Methods, and Applications","author":"A. Barnes","year":"2010","unstructured":"Barnes, A., Hammell II, R.J.: Employing Intelligent Decision Systems to Aid in Information Technology Project Status Decisions. In: Nag, B. (ed.) Intelligent Systems in Operations: Models, Methods, and Applications, pp. 1\u201326. IGI Global, Hershey (2010)"},{"key":"42_CR22","unstructured":"McQuighan, J., Hammell II, R.J.: Computational Intelligence for Project Scope. In: Proceedings of the 22nd Midwest Artificial Intelligence and Cognitive Science Conference, Cincinnati, OH, April 16-17, pp. 47\u201353 (2011)"},{"key":"42_CR23","doi-asserted-by":"crossref","unstructured":"Tolosa, J., Guadarrama, S.: Collecting Fuzzy Perceptions from Non-expert Users. In: Proceedings of the 19th IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2010), Barcelona, (Spain), pp. 1\u20138 (July 2010)","DOI":"10.1109\/FUZZY.2010.5584816"},{"key":"42_CR24","doi-asserted-by":"crossref","unstructured":"Cerruti, M., Das, S., Ashenfelter, A., Raven, G., Brooks, R., Sudit, M., Chen, G., Wright, E.: Pedigree Information for Enhanced Situation and Threat Assessment. In: Proceedings of the Ninth International Conference on Information Fusion, pp. 1\u20138 (July 2006)","DOI":"10.1109\/ICIF.2006.301797"}],"container-title":["Lecture Notes in Computer Science","Scalable Uncertainty Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23963-2_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,30]],"date-time":"2020-01-30T01:24:10Z","timestamp":1580347450000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23963-2_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642239625","9783642239632"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23963-2_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}