{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:59:07Z","timestamp":1729673947206,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/cisda.2015.7208636","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T21:41:42Z","timestamp":1440106902000},"page":"1-7","source":"Crossref","is-referenced-by-count":4,"title":["Integrating complementary\/contradictory information into fuzzy-based VoI determinations"],"prefix":"10.1109","author":[{"given":"Sheng","family":"Miao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Robert J.","family":"Hammell","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ziying","family":"Tang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Timothy","family":"Hanratty","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"John","family":"Dumer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"John","family":"Richardson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref33","first-page":"1","article-title":"A Technique for the Measurement of Attitudes","volume":"22","author":"likert","year":"1932"},{"key":"ref32","article-title":"Sailing the information ocean with awareness of currents: Discovery and application of source dependence","author":"berti-equille","year":"2009","journal-title":"CIDR"},{"key":"ref31","article-title":"Truth discovery and copying detection from source update history","author":"dong","year":"2009","journal-title":"Technical report AT&T Labs-Research"},{"key":"ref30","first-page":"83","article-title":"Probabilistic models to reconcile complex data from inaccurate data sources","author":"blanco","year":"2010","journal-title":"CAiSE"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2012.6250786"},{"key":"ref11","first-page":"173","article-title":"Knowledge Elicitation to Prototype the Value of Information","author":"hanratty","year":"2012","journal-title":"Proceedings of the 23rd Midwest Artificial Intelligence and Cognitive Sciences Conference (MAICS 2012)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.194"},{"key":"ref13","article-title":"Examining the Effects of the Value of Information on Intelligence Analyst Performance","author":"newcomb","year":"2012","journal-title":"Proceedings of the Conference on Information Systems Applied Research"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1456650.1456651"},{"key":"ref15","article-title":"Conflict handling strategies in an integrated information system","author":"bleiholder","year":"2006","journal-title":"Proc Int l Workshop on Information Integration on the Web"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/2.116885"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/375663.375744"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2001.914824"},{"key":"ref19","first-page":"1","article-title":"Semistructured data: The TSIMMIS experience","author":"hammer","year":"1997","journal-title":"6th East-European Conference on Advances in Databases and Information Systems (ADBIS)"},{"key":"ref28","article-title":"Corroborating answers from multiple web sources","author":"wu","year":"2007","journal-title":"Proceeding of WebDB"},{"article-title":"Fuzzy Logic: Intelligence, Control, and Information","year":"1999","author":"yen","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14778\/2168651.2168656"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1805286.1805291"},{"key":"ref6","first-page":"367","article-title":"A theory of approximate reasoning","author":"zadeh","year":"1987"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281309"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"journal-title":"North Atlantic Treaty Organizaiton (NATO) Standard Agreement 2022 (Edition 8) Annex","year":"0","key":"ref8"},{"journal-title":"US Army Field Manual (FM) 2&#x2013;22 3 Human Intelligence Collection Operations US Army","year":"2006","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2007.146"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(75)90036-5"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.21236\/ADA386374","article-title":"Understanding Information Age Warfare","author":"alberts","year":"2001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24599-5_12"},{"key":"ref22","article-title":"A heterogeneous reasoning and mediator system","author":"subrahmanian","year":"1995","journal-title":"Technical Report"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1031171.1031254"},{"key":"ref24","first-page":"1251","article-title":"Automatic data fusion with HumMer","author":"bilke","year":"2005","journal-title":"Proceedings of the International Conference on Very Large Databases (VLDB)"},{"key":"ref23","first-page":"51","article-title":"Multiplex, Fusionplex, and Autoplex - Three generations of information integration","volume":"4","author":"motro","year":"2004","journal-title":"SIGMOD 2004 Rec 33"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687690"},{"key":"ref25","first-page":"21","article-title":"Data fusion in three steps: Resolving schema, tuple, and value inconsistencies","volume":"29","author":"naumann","year":"2006","journal-title":"IEEE Data Eng Bull"}],"event":{"name":"2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","start":{"date-parts":[[2015,5,26]]},"location":"Verona, NY, USA","end":{"date-parts":[[2015,5,28]]}},"container-title":["2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7165058\/7208613\/07208636.pdf?arnumber=7208636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T17:00:48Z","timestamp":1567098048000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7208636\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/cisda.2015.7208636","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}