{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:36:16Z","timestamp":1758893776929,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/cts.2014.6867628","type":"proceedings-article","created":{"date-parts":[[2014,8,8]],"date-time":"2014-08-08T18:33:03Z","timestamp":1407522783000},"page":"574-581","source":"Crossref","is-referenced-by-count":2,"title":["VDL-based iconic co-annotation in crisis management"],"prefix":"10.1109","author":[{"given":"Xiaoyue","family":"Ma","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Sediri","sequence":"additional","affiliation":[]},{"given":"Nada","family":"Matta","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Cahier","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"TheNicIcon database of handwritten icons","author":"niels","year":"2008","journal-title":"Proc ICFHR 2008"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-8-16"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/VL.1993.269596"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/VISUAL.1990.146374"},{"key":"16","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1177\/001872088202400108","article-title":"Assessment of fire safety symbols","volume":"24","author":"collins","year":"1982","journal-title":"Human Factors"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/500286.500325"},{"key":"14","first-page":"177","article-title":"A case study of icon-scenario based animated menu's concept development","volume":"159","author":"lim","year":"2006","journal-title":"Proceedings of the 8th conference on Human-computer interaction with mobile devices and services"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02574-7_52"},{"key":"12","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1007\/978-3-540-73287-7_31","article-title":"Theimpact of different icon sets on the usability of a word processor","volume":"4559","author":"tanya","year":"2007","journal-title":"Lecture Notes in Computer Science"},{"key":"21","article-title":"Using icons as a means for semantic interoperability in emergency management","author":"peters","year":"2012","journal-title":"8th International Conference on Geographic Information for Disaster Management"},{"key":"20","first-page":"208","article-title":"A visual communication language for crisis management","volume":"12","author":"fitrianie","year":"2007","journal-title":"Int Journal of Intelligent Control and Systems (Special Issue of Distributed Intelligent Systems)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2012.54"},{"journal-title":"Semiology of Graphics Diagrams Networks Maps","year":"1983","author":"bertin","key":"23"},{"key":"24","first-page":"261","article-title":"Crisis clever, a system for supporting crisis managers","author":"sediri","year":"2013","journal-title":"Proceedings of ISCRAM"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/BF00133655"},{"key":"26","article-title":"Key reading in crisis management","author":"smith","year":"2005","journal-title":"System and Structures for Prevention and Recovery"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2012.38"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1201\/b11433-26"},{"key":"2","first-page":"184","article-title":"achieving system safety by resilience engineering","author":"hollnagel","year":"2006","journal-title":"2006 1st IET International Conference on System Safety IET"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/S0141-9382(03)00035-0"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1201\/b11433-25"},{"journal-title":"Signs Processes and Language Games Foundations for Ontology","year":"2006","author":"sowa","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2012.54"},{"key":"5","article-title":"L'e?valuation de la vulne?rabilite? a? la crise: Le cas des pre?fectures en france","volume":"16","author":"whybo","year":"2010","journal-title":"Te?lescope"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1201\/b11433-27"},{"key":"9","article-title":"Former apple designer kare testifies at samsung patent trial","author":"rosenblatt","year":"2012","journal-title":"Bloomberg Business Week"},{"key":"8","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1007\/BF01205518","article-title":"A comparison between maya hieroglyphs and computer icons","volume":"14","author":"honeywill","year":"1999","journal-title":"AI &Society"}],"event":{"name":"2014 International Conference on Collaboration Technologies and Systems (CTS)","start":{"date-parts":[[2014,5,19]]},"location":"Minneapolis, MN, USA","end":{"date-parts":[[2014,5,23]]}},"container-title":["2014 International Conference on Collaboration Technologies and Systems (CTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6857934\/6867522\/06867628.pdf?arnumber=6867628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T18:33:53Z","timestamp":1565721233000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6867628\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cts.2014.6867628","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}