{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:47:19Z","timestamp":1729666039428,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578857","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:11:25Z","timestamp":1377724285000},"page":"352-357","source":"Crossref","is-referenced-by-count":0,"title":["The CommonGround visual paradigm for biosurveillance"],"prefix":"10.1109","author":[{"given":"Yarden","family":"Livnat","sequence":"first","affiliation":[]},{"given":"Elizabeth","family":"Jurrus","sequence":"additional","affiliation":[]},{"given":"Adi V.","family":"Gundlapalli","sequence":"additional","affiliation":[]},{"given":"Per","family":"Gestland","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195173321.001.0001"},{"key":"22","article-title":"CATCH\/IT: A data warehouse to support comprehensive assessment for tracking community health","author":"berndt","year":"1998","journal-title":"Proceedings of the AMIA Symposium"},{"journal-title":"Designing for Situation Awareness An Approach to User-Centered Design","year":"2009","author":"endsley","key":"17"},{"journal-title":"Design and Evaluation for Situation Awareness Enhancement In Human Factors Society Annual Meeting","year":"1988","author":"endsley","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495939"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/INFVIS.2005.1532134"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2011-000486"},{"journal-title":"Situation Awareness Tool for Global Argus In Visual Analytics Science and Technology 2007 VAST 2007","year":"2007","author":"choi","key":"14"},{"journal-title":"The Anthrax Letters A Bioterrorism Expert Investigates the Attacks That Shocked America","year":"2009","author":"cole","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.4103\/0975-1475.81283"},{"journal-title":"Pattern Classification and Scene Analysis","year":"2001","author":"duda","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1126\/science.333.6047.1214"},{"journal-title":"Automated Tag Clustering Improving Search and Exploration in the Tag Space","year":"2006","author":"begelman","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican1004-20"},{"journal-title":"Germ Watch Respiratory Virus Surveillance Salt Lake City Intermountain Healthcare 2009","year":"2010","author":"healthcare","key":"1"},{"key":"10","first-page":"5","article-title":"BioSense-A national initiative for early detection and quantification of public health emergencies","volume":"53","author":"loonsk","year":"2004","journal-title":"MMWR Morb Mortal Wkly Rep"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1002\/9780470131886","author":"lombardo","year":"2007","journal-title":"Disease Surveillance A Public Health Informatics Approach"},{"year":"0","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44853-5_24"},{"journal-title":"The Biowatch Program Detection of Bioterrorism","year":"2003","author":"shea","key":"4"},{"key":"9","article-title":"Development of a quick look pandemic influenza modeling and visualization tool","author":"brigantic","year":"2010","journal-title":"Proceedings of the 7th International ISCRAM Conference-Seattle"},{"key":"8","article-title":"Data, network, and application: Technical description of the Utah RODS Winter Olympic Biosurveillance System","author":"tsui","year":"2002","journal-title":"Proceedings of the AMIA Symposium"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578857.pdf?arnumber=6578857","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,17]],"date-time":"2024-05-17T11:24:05Z","timestamp":1715945045000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578857\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578857","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}