{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:45:49Z","timestamp":1730227549095,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/icacci.2018.8554529","type":"proceedings-article","created":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T20:17:32Z","timestamp":1543868252000},"page":"156-162","source":"Crossref","is-referenced-by-count":1,"title":["Internet of Things applied to Asymmetric Operations"],"prefix":"10.1109","author":[{"given":"Vikas","family":"Sood","sequence":"first","affiliation":[]},{"given":"Lakshmish","family":"Nayak","sequence":"additional","affiliation":[]},{"given":"Malay","family":"Nema","sequence":"additional","affiliation":[]},{"given":"Rituraj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Manisha J","family":"Nene","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Toward energy efficient multistream collaborative compression in wireless sensor networks","author":"szalapski","year":"2014","journal-title":"10th IEEE International Conference on Collaborative Computing Networking Applications and Worksharing"},{"journal-title":"Model for collaborative and adaptive multimedia content delivery in collaborative m-learing environment","year":"0","author":"karadimce","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2014.257375"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2013.254076"},{"key":"ref31","article-title":"Distributed information fusion filter with intermittent observations","author":"kim","year":"2010","journal-title":"13th IEEE International Conference on Information Fusion IEEE"},{"key":"ref30","article-title":"Towards enabling probabilistic databases for participatory sensing","author":"hung","year":"2014","journal-title":"10th IEEE International Conference on Collaborative Computing Networking Applications and Worksharing"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2014.257322"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2011.5982155"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2014.257321"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2014.257337"},{"journal-title":"Mid-dleware for internet of things A survey","year":"0","author":"razzaque","key":"ref10"},{"journal-title":"An dynamic mixed type collaborative recommendation algorithm base on rss subscribing","year":"2011","author":"wu","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/857076.857078"},{"key":"ref12","article-title":"Scalable cloudsensor architecture for the internet of things","volume":"3","author":"xu","year":"2016","journal-title":"Internet of the Things"},{"journal-title":"Needs Analysis Or How Do You Capture Represent and Validate User Requirements in a Formal Manner\/Notation before Design","article-title":"Human Factors and Ergonomics and Consumer Product Design","year":"2011","key":"ref13"},{"journal-title":"Introduction to petri nets and reference nets","year":"2001","author":"kummer","key":"ref14"},{"key":"ref15","article-title":"Renew-user guide","volume":"2","author":"kummer","year":"2009","journal-title":"University of Hamburg Department for Informatics Theoretical Foundations Group Release 2 2"},{"key":"ref16","article-title":"Joint doctrine for military operations other than war","author":"staff","year":"1995","journal-title":"Tech Rep 3&#x2013;07"},{"journal-title":"Technical Report 93&#x2013;02","article-title":"Appendix e: The military in operations other than war","year":"0","key":"ref17"},{"journal-title":"The center for Advanced Command Concepts And Technology (ACT) Tech Rep","article-title":"Operations other than war(ootw): The technological dimension","year":"1995","key":"ref18"},{"journal-title":"G o I National Disaster Management Authority Ministry of Home Affairs","article-title":"National disaster management plan part-i, basic plan and framework","year":"2014","key":"ref19"},{"journal-title":"Theorizing information - from signs to sociomaterial practices","year":"2011","author":"boell","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2416657"},{"key":"ref27","article-title":"Building an information architecture checklist: Encouraging and enabling ia from infrastructure to the user interface architecture","author":"dawney","year":"2011","journal-title":"Journal of Information Architecture"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2312291"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref29","article-title":"A model of defensive information avoidance in information systems use","author":"neben","year":"2015","journal-title":"36th International Conference on Information Systems"},{"key":"ref5","article-title":"The internet of things for health care:a comprehensive survey","author":"islam","year":"2015","journal-title":"IEEE ACCESS Digital Object Identifier 10 1109\/ACCESS 2015 2437951"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2506258"},{"key":"ref2","article-title":"Internet of things (iot): A vision, architectural elements, and future directions","volume":"abs 1207 203","author":"gubbi","year":"2012","journal-title":"CoRR"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2013.2296516"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The internet of things: A survey","author":"atzori","year":"2010","journal-title":"Computer Networks"},{"journal-title":"G o I Ministry of Home Affairs","article-title":"National disaster management plan part-ii, disaster mitigation response and functions plan","year":"2015","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1162\/isec.2008.32.3.158"},{"journal-title":"G o I Ministry of Home Affairs","article-title":"National policy on disaster management","year":"2009","key":"ref21"},{"key":"ref24","article-title":"Warfighting and peace ops: Do real soldiers do mootw?","author":"rinaldo","year":"1997","journal-title":"Institute for National Strategic Studies National Defense University"},{"key":"ref23","article-title":"Guidebook on technologies for disaster preparedness and mitigatione","author":"sahu","year":"2009","journal-title":"Asian and Pacific Center for Transfer of Technology (APCTT) Tech Rep"},{"key":"ref26","article-title":"Attributes of information","author":"boell","year":"2010","journal-title":"Americas Conference on Information Systems (AMCIS)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.21236\/ADA406255"}],"event":{"name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2018,9,19]]},"location":"Bangalore","end":{"date-parts":[[2018,9,22]]}},"container-title":["2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536361\/8554361\/08554529.pdf?arnumber=8554529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T23:44:45Z","timestamp":1643240685000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554529\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/icacci.2018.8554529","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}