Decision making to support local emergency preparation, response, and recovery (English)
- New search for: Schneider, Jennifer
- New search for: Romanowski, Carol J.
- New search for: Stein, Kent
- New search for: Schneider, Jennifer
- New search for: Romanowski, Carol J.
- New search for: Stein, Kent
In:
2013 IEEE International Conference on Technologies for Homeland Security (HST)
;
498-503
;
2013
- Conference paper / Electronic Resource
-
Title:Decision making to support local emergency preparation, response, and recovery
-
Contributors:
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2013-11-01
-
Size:1311950 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Organizational committee| 2013
- 1
-
Plenary SpeakerGerstein, Daniel M. / Linskey, Daniel P. / Rice, L. Scott / Woodbury, Donald / Davidson, Bruce B. et al. | 2013
- 1
-
Author index| 2013
- 1
-
Welcome message from the conference chair| 2013
- 1
-
Thank you to our sponsors and exhibitors| 2013
- 1
-
Cyber security for service oriented architectures in a Web 2.0 world: An overview of SOA vulnerabilities in financial servicesMasood, Adnan et al. | 2013
- 1
-
Track chairs| 2013
- 1
-
Copyrite page| 2013
- 1
-
Table of contents| 2013
- 7
-
Intended effects of cyber resiliency techniques on adversary activitiesBodeau, Deborah / Graubart, Richard et al. | 2013
- 12
-
Towards a web tracking profiling algorithmHuba, William / Yuan, Bo / Pan, Yin / Mishra, Sumita et al. | 2013
- 18
-
A customized modeling and Simulation Tool for port and airport evacuation and recovery: An integrated tool for enhancing preparedness and responseBelella, Paul A. / Rooney, Bethann et al. | 2013
- 19
-
An algorithm to prioritize road network restoration after a regional eventFiondella, Lance et al. | 2013
- 26
-
Generic incident model for use in large-scale evacuation simulationsCollins, Andrew J. / Robinson, R. Michael / Jordan, Craig A. / Foytik, Peter / Ezell, Barry C. et al. | 2013
- 32
-
Interacting with trapped victims using robotsMurphy, Robin R. / Srinivasan, Vasant / Henkel, Zachary / Suarez, Jesus / Minson, Matthew / Straus, J C / Hempstead, Stanley / Valdez, Tim / Egawa, Shinichi et al. | 2013
- 38
-
Protecting our Nation's ports with the Port Security Risk Analysis and Resource Allocation System (PortSec 3.0)Orosz, Michael / Chen, Jennifer / Maya, Isaac / Salazar, Daniel / Chatterjee, Samrat / Wei, Dan et al. | 2013
- 43
-
Open border CONOPS simulationLemley, Sara / Sandoval, Juan / Sapankevych, Nicholas et al. | 2013
- 48
-
RIPTIDE: Learning violation prediction models from boarding activity dataChalupsky, Hans / Hovy, Eduard et al. | 2013
- 54
-
Methodological insights on restoring face photos of multinational passportsBourlai, T. / Clark, A. D. / Best-Rowden, L. S. et al. | 2013
- 61
-
Securing multimodal biometric data through watermarking and steganographyWhitelam, Cameron / Osia, Nnamdi / Bourlai, Thirimachos et al. | 2013
- 67
-
What is biometric information and how to measure it?Sutcu, Yagiz / Tabassi, Elham / Sencar, Husrev T. / Memon, Nasir et al. | 2013
- 73
-
CyberVis: Visualizing the potential impact of cyber attacks on the wider enterpriseCreese, Sadie / Goldsmith, Michael / Moffat, Nick / Happa, Jassim / Agrafiotis, Ioannis et al. | 2013
- 80
-
Towards a multiscale approach to cybersecurity modelingHogan, Emilie / Hui, Peter / Choudhury, Sutanay / Halappanavar, Mahantesh / Oler, Kiri / Joslyn, Cliff et al. | 2013
- 86
-
Detecting threatening insiders with lightweight media forensicsGarfinkel, Simson L. / Beebe, Nicole / Liu, Lishu / Maasberg, Michele et al. | 2013
- 93
-
Toward a comprehensive disclosure control framework for shared dataCoull, Scott E. / Kenneally, Erin et al. | 2013
- 99
-
Structural and functional vulnerability analysis for survivability of Smart Grid and SCADA network under severe emergencies and WMD attacksChopade, Pravin / Bikdash, Marwan et al. | 2013
- 106
-
National security and Emergency Preparedness communications: Next generation priority servicesNolan, David / Wainberg, Stan / Wullert, John R. / Ephrath, Arye R. et al. | 2013
- 113
-
Information management and decision support in critical infrastructure emergencies at the local levelRomanowski, Carol J. / Mishra, Sumita / Raj, Rajendra K. / Howles, Trudy / Schneider, Jennifer et al. | 2013
- 119
-
Resilience management through use of CERT-RMM & associated success storiesMehravari, Nader et al. | 2013
- 126
-
Development of dual leaky coaxial cable for intruder detection sensorTsujita, Wataru / Inomata, Kenji / Hirai, Takashi et al. | 2013
- 130
-
Geophysical and Operational System Performance Tool for the detection of clandestine tunnels: Enhancement and case studiesChristou, Carol / Crager, J. Casey / Kuklinski, Walter / Lebsack, Eliot / Masters, David / Munson, Mark / Shi, Weiqun et al. | 2013
- 136
-
Geo-pointing and threat location techniques for airborne border surveillanceStich, Eric J. et al. | 2013
- 141
-
Acoustic detection, tracking and classification of Low Flying AircraftSutin, Alexander / Salloum, Hady / Sedunov, Alexander / Sedunov, Nikolay et al. | 2013
- 147
-
A novel method for touch-less finger print authenticationRavi, Hareesh / Sivanath, Sabarish Kuduwa et al. | 2013
- 154
-
Touch panel with integrated fingerprint sensors based user identity managementFeng, Tao / Prakash, Varun / Shi, Weidong et al. | 2013
- 165
-
Point based features for contact-less palmprint imagesParihar, Anil Singh / Kumar, Amoiy / Verma, Om Prakash / Gupta, Ankita / Mukherjee, Prerana / Vatsa, Deepika et al. | 2013
- 171
-
A random-forest-based efficient comparative machine learning predictive DNA-codon metagenomics binning technique for WMD events & applicationsSaghir, Helal / Megherbi, Dalila B. et al. | 2013
- 178
-
Recognition, segmentation and retrieval of gang graffiti images on a mobile deviceParra, Albert / Zhao, Bin / Kim, Joonsoo / Delp, Edward J. et al. | 2013
- 189
-
SCUBA diver detection and classification in active and passive sonars — A unified approachSharma, Nabin S. / Yakubovskiy, Alexander M. / Zimmerman, Matthew J. et al. | 2013
- 195
-
Stevens Passive Acoustic system for surface and underwater threat detectionSutin, Alexander / Salloum, Hady / DeLorme, Michael / Sedunov, Nikolay / Sedunov, Alexander / Tsionskiy, Mikhail et al. | 2013
- 201
-
Bio-inspired topology control mechanism for autonomous underwater vehicles used in maritime surveillanceZou, Jianmin / Gundry, Stephen / Kusyk, Janusz / Sahin, Cem Safak / Uyar, M. Umit et al. | 2013
- 207
-
Rapid triage of diverse media devices: Boston marathon bombings: An operational case study of time critical responseMerlino, Andrew / Berg, Jared S. / Dahi, Bahram et al. | 2013
- 212
-
To change or not to change: That is the questionDancer, F. Chevonne Thomas / Skelton, Gordon W. et al. | 2013
- 217
-
Applying a Digital forensic readiness framework: Three case studiesMouhtaropoulos, Antonis / Dimotikalis, Panagiotis / Li, Chang-Tsun et al. | 2013
- 224
-
A model of certifier and accreditor risk calculation for multi-level systemsLoughry, Joe et al. | 2013
- 230
-
A dynamic capability maturity model for improving cyber securityAdler, Richard M. et al. | 2013
- 236
-
The CERT assessment tool: Increasing a security incident responder's ability to assess riskConnell, Anne / Waits, Todd et al. | 2013
- 241
-
Cerebro: A platform for collaborative incident response and investigationConnell, Anne / Palko, Tim / Yasar, Hasan et al. | 2013
- 246
-
Crisis management and social media: Assuring effective information governance for long term social sustainabilityBunker, Deborah / Ehnis, Christian / Seltsikas, Philip / Levine, Linda et al. | 2013
- 252
-
A Survivable Social NetworkIannucci, Bob / Cali, Jonida / Caney, Ryan / Kennedy, Stuart et al. | 2013
- 259
-
A community sensing framework for threat detection in metropolitan areaQian, Lijun / Fuller, John / Simpson, Cheslan et al. | 2013
- 265
-
Transform domain measure of enhancement — TDME — For security imaging applicationsSamani, Arash / Panetta, Karen / Agaian, Sos et al. | 2013
- 271
-
Fast dynamic video content explorationGallo, Nick / Thornton, Jason et al. | 2013
- 284
-
Camera field coverage estimation through common event sensingNaimark, Leonid / Shnidman, Nathan et al. | 2013
- 290
-
Effective threat detection for surveillanceGelernter, Judith et al. | 2013
- 297
-
Automated pollen identification system for forensic geo-historical location applicationsHwang, Grace M. / Riley, Kim C. / Christou, Carol T. / Jacyna, Garry M. / Woodard, Jeffrey P. / Ryan, Regina M. / Bush, Mark B. / Valencia, Bryan G. / McMichael, Crystal N. H. / Punyasena, Surangi W. et al. | 2013
- 304
-
Assessing performance and tradeoffs of bioforensic signature systemsWatkins, Daniel M. / Sego, Landon H. / Holmes, Aimee E. / Webb-Robertson, Bobbie-Jo M. / Whiten, Amanda M. / Wunschen, David S. / Kreuzer, Helen W. / Corley, Courtney D. / Tardiff, Mark F. et al. | 2013
- 310
-
Using dynamic risk estimation & social network analysis to detect money laundering evolutionMehmet, Murad / Wijesekera, Duminda et al. | 2013
- 316
-
Meeting lawful interception requirements for selected IP traffic offload and local IP access trafficCartmell, John et al. | 2013
- 322
-
Replay of malicious traffic in network testbedsHussain, Alefiya / Pradkin, Yuri / Heidemann, John et al. | 2013
- 328
-
Characterizing vulnerability to IP hijack attemptsGersch, Joseph / Massey, Dan et al. | 2013
- 334
-
Analyzing terror attacks using latent semantic indexingToure, Ibrahim / Gangopadhyay, Aryya et al. | 2013
- 338
-
Using transaction-level simulation to prepare for and recover from supply-chain disastersAxelrod, C. Warren et al. | 2013
- 344
-
Improved strategic decision making during disasters using a dual mode risk based three dimensional triage process — #25Cogliandro, John et al. | 2013
- 350
-
A roadmap for the adoption of unmanned systems into public safetyMurphy, Robin R. et al. | 2013
- 354
-
Field study identifying barriers and delays in data-to-decision with small unmanned aerial systemsDuncan, Brittany A. / Murphy, Robin R. et al. | 2013
- 360
-
Maritime detection of radiological/nuclear threats with hybrid imaging systemHutcheson, Anthony L. / Phlips, Bernard F. / Wulf, Eric A. / Mitchell, Lee J. / Johnson, W. Neil / Leas, Byron E. et al. | 2013
- 364
-
BIOSwimmer: Enabling technology for port securityConry, Michael / Keefe, Andrew / Ober, Willard / Rufo, Michael / Shane, David et al. | 2013
- 369
-
Maritime automated targets recognition algorithm test bed for high resolution ISAR imageryCross, Patrick L. et al. | 2013
- 375
-
User generic model for writer verification using multiband image scannerOkawa, Manabu / Yoshida, Kenichi et al. | 2013
- 381
-
Redeye Text Analysis Workbench: Actionable intelligence from non-actionable dataMcKenzie, Amber / Gillen, Rob / Logasa Bogen, Paul et al. | 2013
- 386
-
Multi-lingual author identification and linguistic feature extraction — A machine learning approachAlam, Hassan / Kumar, Aman et al. | 2013
- 390
-
An architecture for a resilient cloud computing infrastructureBaron, Joshua / Defrawy, Karim El / Nogin, Aleksey / Ostrovsky, Rafail et al. | 2013
- 396
-
Diversity in cloud systems through runtime and compile-time relocationKanter, Morgon / Taylor, Stephen et al. | 2013
- 403
-
Accountable cloudsGehani, Ashish / Ciocarlie, Gabriela F. / Shankar, Natarajan et al. | 2013
- 408
-
Simulation of emergency response operations for a static chemical spill within a building using an opportunistic resource utilization networkLilien, Leszek T. / Elbes, Mohammed W. / ben Othmane, Lotfi / Salih, Raed M. et al. | 2013
- 414
-
Developing a GIS based plume rose for industrial chemical incident preparedness and responseDas, Abhik Kumar / Debnath, Subhrajit / Asundi, Jai et al. | 2013
- 418
-
Protecting communities from chemical warfare agentsBeriwal, Madhu / Cochran, Barbara et al. | 2013
- 423
-
The muon portal project: A dedicated muon detector for the inspection of shipping containersBecciani, U. / Antonuccio, V. / Bandieramonte, M. / Belluomo, F. / Belluso, M. / Billotta, S. / Bonanno, D. L. / Bonanno, G. / Costa, A. / Fallica, G. et al. | 2013
- 429
-
Selective activation with all-laser-driven Thomson γ-raysSilano, J. / Karwowski, H. J. / Clarke, S. / Pozzi, S. / Banerjee, S. / Haden, D. / Golovin, G. / Chen, S. / Ghebregziabher, I. / Liu, C. et al. | 2013
- 435
-
The MAC-TMFD: Novel multi-armed Centrifugally Tensioned Metastable Fluid Detector (Gamma-Blind) — Neutron-alpha recoil spectrometerHume, N. / Webster, J. A. / Grimes, T. F. / Hagen, A. / Taleyarkhan, R. P. / Archambault, B. C. et al. | 2013
- 441
-
A new mobile biometric based upon usage contextBassu, Devasis / Cochinwala, Munir / Jain, Ashish et al. | 2013
- 447
-
Recent developments in voice biometrics: Robustness and high accuracyScheffer, Nicolas / Ferrer, Luciana / Lawson, Aaron / Lei, Yun / McLaren, Mitchell et al. | 2013
- 453
-
With vaulted voice verification my voice is my keyJohnson, R. C. / Boult, Terrance E. et al. | 2013
- 460
-
An architecture methodology for secure video conferencingLal, Reshma / Pappachan, Pradeep M. et al. | 2013
- 467
-
Analysis of data-leak hardware Trojans in AES cryptographic circuitsReece, Trey / Robinson, William H. et al. | 2013
- 473
-
A network-based approach to counterfeit detectionSathyanarayana, Supreeth / Robinson, William H. / Beyah, Raheem A. et al. | 2013
- 480
-
Anti-counterfeit Integrated Circuits using fuse and tamper-resistant time-stamp circuitryDesai, Avinash R. / Ganta, Dinesh / Hsiao, Michael S. / Nazhandali, Leyla / Wang, Chao / Hall, Simin et al. | 2013
- 486
-
Optimization of emergency response using higher order learning and clustering of 911 text messagesNelson, Christie / Pottenger, William M. et al. | 2013
- 492
-
Optimizing hauling vehicle mix for debris removal: A queueing theory approachBrooks, James D. / Mendonca, David et al. | 2013
- 498
-
Decision making to support local emergency preparation, response, and recoverySchneider, Jennifer / Romanowski, Carol J. / Stein, Kent et al. | 2013
- 504
-
Dynamic allocation of entities in closed queueing networks: An application to debris removalBrooks, James D. / Kar, Koushik / Mendonca, David et al. | 2013
- 511
-
Material characterization using a millimeter wave portal-based imaging system for security screeningAlvarez, Yuri / Las-Heras, Fernando / Gonzalez-Valdes, Borja / Martinez-Lorenzo, Jose Angel / Rappaport, Carey M. et al. | 2013
- 517
-
Automated object recognition and visualization techniques for muon tomography data analysisBandieramonte, Marilena / Delogu, Vincenzo Antonuccio / Becciani, Ugo / Costa, Alessandro / Massimino, Piero / Pistagna, Costantino / Riggi, Simone / Sciacca, Eva / Vitello, Fabio / Rocca, Paola La et al. | 2013
- 523
-
Nuisance alarm reduction using PVT: Land and maritime border securityDermody, G. / Ramsden, D. / Morgan, B. / Dallimore, M. / Brenker, K. et al. | 2013
- 529
-
Automated detection of anomalous shipping manifests to identify illicit tradeSanfilippo, Antonio / Chikkagoudar, Satish et al. | 2013
- 535
-
A framework of configurable multi-engine systems based on performance matrices for face recognitionHe, Hongmei / Guest, Richard M et al. | 2013
- 541
-
Analysis of the effects of image transformation, template selection, and partial information on face recognition with time-varying expressions for homeland security applicationsVoynichka, Iliana V. / Megherbi, Dalila B. et al. | 2013
- 547
-
Silhouette based gait recognition based on the area features using both model free and model based approachesKochhar, Arihant / Gupta, Divyesh / Hanmandlu, Madasu / Vasikarla, Shantaram et al. | 2013
- 552
-
3D face reconstruction and multimodal person identification from video captured using smartphone cameraRaghavendra, R. / Raja, Kiran B. / Pflug, Anika / Yang, Bian / Busch, Christoph et al. | 2013
- 558
-
Tools for understanding identityCreese, Sadie / Gibson-Robinson, Thomas / Goldsmith, Michael / Hodges, Duncan / Kim, Dee / Love, Oriana / Nurse, Jason R. C. / Pike, Bill / Scholtz, Jean et al. | 2013
- 564
-
Transitioning Linked Data accountable systems to the real world with identity, credential, and access management (ICAM) architecturesJacobi, Ian / Miao, Daniela / Waterman, K. Krasnow / Kagal, Lalana et al. | 2013
- 570
-
SAFE: A clean-slate architecture for secure systemsChiricescu, Silviu / DeHon, Andre / Demange, Delphine / Iyer, Suraj / Kliger, Aleksey / Morrisett, Greg / Pierce, Benjamin C. / Reubenstein, Howard / Smith, Jonathan M. / Sullivan, Gregory T. et al. | 2013
- 577
-
Towards a theory of autonomous reconstitution of compromised cyber-systemsRamuhalli, Pradeep / Halappanavar, Mahantesh / Coble, Jamie / Dixit, Mukul et al. | 2013
- 584
-
Priority capabilities in LTE supporting national security and emergency preparedness next generation network priority servicesTaylor, Carol-Lyn / Nolan, David / Wainberg, Stan et al. | 2013
- 589
-
The status and importance of robustness in the process of critical infrastructure resilience evaluationMartin, Hromada / Ludek, Lukas et al. | 2013
- 595
-
Autonomous and fault tolerant vehicular self deployment mechanisms in MANETsGundry, Stephen / Zou, Jianmin / Sahin, Cem Safak / Kusyk, Janusz / Uyar, M. Umit et al. | 2013
- 601
-
Muons scanner to detect radioactive source hidden in scrap metal containers: Mu-steel EU projectFurlan, M. / Rigoni, A. / Vanini, S. / Viesti, G. / Zumerle, G. / Bonomi, G. / Cambiaghi, D. / Dassa, L. / Donzella, A. / Subieta, M. et al. | 2013
- 607
-
Combined, solid-state molecular property and gamma spectrometers for CBRN&E detectionRogers, Ben / Malekos, Steven / Deal, Lee / Whitten, Ralph / Adams, Jesse et al. | 2013
- 613
-
Integration of Inertial Measurement data for improved localization and tracking of radiation sourcesCooper, Daniel A. / Ledoux, Robert J. / Kamieniecki, Krzysztof / Korbly, Stephen E. / Thompson, Jeffrey / Batcheler, James / Costales, James et al. | 2013
- 618
-
Utilization of advanced clutter suppression algorithms for improved spectroscopic portal capability against radionuclide threatsCosofret, Bogdan R. / Shokhirev, Kirill N. / Mulhall, Phillip A. / Payne, David / Harris, Bernard / Arsenault, Emily / Moro, Richard et al. | 2013
- 623
-
An assessment of the human performance of iris identificationGuest, Richard M / He, Hongmei / Stevenage, Sarah V / Neil, Greg J et al. | 2013
- 627
-
The effect of ethnicity, gender, eye color and wavelength on the biometric menagerieHoward, John J. / Etter, Delores et al. | 2013
- 633
-
Workload characteristics for iris matching algorithm: A case studyChang, Jed Kao-Tung / Hua, Fang / Torres, Gildo / Liu, Chen / Schuckers, Stephanie et al. | 2013
- 639
-
Application of pyramidal directional filters for biometric identification using conjunctival vasculature patternsTankasala, Sriram Pavan / Doynov, Plamen / Derakhshani, Reza et al. | 2013
- 645
-
Integrating physiological measurements with Avatars for effective identification technologiesMartin, Michael / Greff, Chris / Bourlai, Thirimachos / Cutlip, Robert G. / Pollina, Dean et al. | 2013
- 651
-
A unified authentication framework using finger nail plate biometricGarg, Shruti / Kumar, Amioy / Hanmandlu, Madasu / Vasikarla, Shantaram et al. | 2013
- 658
-
Person-of-interest detection system using cloud-supported computerized-eyewearWang, Xi / Zhao, Xi / Prakash, Varun / Gao, Zhimin / Feng, Tao / Gnawali, Omprakash / Shi, Weidong et al. | 2013
- 664
-
Utilizing automatic quality selection scheme for multi-modal biometric fusionHua, Fang / Johnson, Peter / Schuckers, Stephanie et al. | 2013
- 671
-
Performance of LaBr3(Ce) array detector system for non-destructive inspection of special nuclear material by using nuclear resonance fluorescenceOmer, Mohamed / Ohgaki, Hideaki / Negm, Hani / Daito, Izuru / Hori, Toshitada / Kii, Toshiteru / Zen, Heishun / Hajima, Ryoichi / Hayakawa, Takehito / Shizuma, Toshiyuki et al. | 2013
- 677
-
Design considerations for long-term remote photovoltaic-based power supply using non-planar photovoltaic surfacesShadmand, Mohammad B. / Balog, Robert S. et al. | 2013
- 683
-
A decision-theoretic approach to evaluate radiation detection algorithmsNobles, Mallory A. / Sego, Landon H. / Cooley, Scott K. / Gosink, Luke J. / Anderson, Richard M. / Hays, Spencer E. / Tardiff, Mark F. et al. | 2013
- 687
-
A study of collaborative distributed multi-goal & multi-agent-based systems for large Critical Key Infrastructures and Resources (CKIR) dynamic monitoring and surveillanceMegherbi, D. B. / Kim, Minsuk / Madera, Manual et al. | 2013
- 693
-
RSSI based range analysis of near-ground nodes in Wi-Fi crowded environmentsLuciani, Daniel P. / Davis, Almir et al. | 2013
- 698
-
Delivering diverse BGP data in real-time and through multi-format archivingOlschanowsky, Catherine / Weikum, M. Lawrence / Smith, Jason / Papadopoulos, Christos / Massey, Dan et al. | 2013
- 704
-
Static analysis of machine code for supply-chain risk managementAnderson, Paul / Loginov, Alexey et al. | 2013
- 710
-
A gold standard for assessing the coverage of static analyzersBush, Eric et al. | 2013
- 716
-
Reduced realistic attack plan surface for identification of prioritized attack goalsSmith, Jeffrey / Figueroa, Michael et al. | 2013
- 722
-
Unmanned aerial vehicle smart device ground control station cyber security threat modelMansfield, Katrina / Eveleigh, Timothy / Holzer, Thomas H. / Sarkani, Shahryar et al. | 2013
- 729
-
Modeling and characterization of GPS spoofingLarcom, Jonathan A. / Liu, Hong et al. | 2013
- 735
-
Secure techniques and methods for authenticating visually impaired mobile phone usersHaque, Md Munirul / Zawoad, Shams / Hasan, Ragib et al. | 2013
- 741
-
Modeling a secure supply chain integrity preservation systemKhan, Rasib / Haque, Md Munirul / Hasan, Ragib et al. | 2013
- 748
-
Cloud based passive building occupancy characterization for attack and disaster responseNyarko, Kofi / Wright-Brown, Cecelia et al. | 2013
- 754
-
Lessons from the past: Inaccurate credibility assessments made during crisis situationsLandrigan, Lauren C. / Wade, Jon P. / Milewski, Allen / Reagor, Barbara et al. | 2013
- 760
-
Social media in crisis events: Open networks and collaboration supporting disaster response and recoveryAkhgar, Babak / Fortune, Dave / Hayes, Richard E. / Guerra, Barbara / Manso, Marco et al. | 2013
- 766
-
A Precision Information Environment (PIE) for emergency responders: Providing collaborative manipulation, role-tailored visualization, and integrated access to heterogeneous dataKilgore, Ryan / Godwin, Alex / Davis, Amanda / Hogan, Chris et al. | 2013
- 772
-
Crowdsourcing, big data and homeland securityMarkowsky, George et al. | 2013
- 779
-
Emergency alerts to people on-the-go via terrestrial broadcasting: The M-EAS systemLuplow, Wayne / Kutzner, Jim et al. | 2013
- 784
-
Challenges of Small-Scale Safety and Thermal testing of improvised explosives: Results from the integrated data collection analysis (IDCA) program proficiency testReyes, Jose A. / Sandstrom, Mary M. / Brown, Geoffrey W. / Warner, Kirstin F. / Remmers, Daniel L. / Shelley, Timothy J. / Phillips, Jason J. / Hsu, Peter C. / Reynolds, John G. et al. | 2013
- 790
-
Designing public safety mobile applications for disconnected, interrupted, and low bandwidth communication environmentsErickson, Peter / Weinert, Andrew / Breimyer, Paul / Samperi, Matt / Huff, Jason / Parra, Carlos / Miller, Scarlett et al. | 2013
- 797
-
Enabling communications in disadvantage environments: An airborne remote communication (ARC) platformWeinert, Andrew / Erickson, Peter / Reis, Hilary / Breimyer, Paul / Hackett, Timothy / Samperi, Matt / Huff, Jason / Parra, Carlos / Stoekl, Erich / Zundritsch, Peter et al. | 2013