{"id":"https://openalex.org/W2153031180","doi":"https://doi.org/10.1109/cogsima.2012.6188368","title":"A microworld for investigating the effects of visualizing expanding search areas in naturalistic naval warfare tasks","display_name":"A microworld for investigating the effects of visualizing expanding search areas in naturalistic naval warfare tasks","publication_year":2012,"publication_date":"2012-03-01","ids":{"openalex":"https://openalex.org/W2153031180","doi":"https://doi.org/10.1109/cogsima.2012.6188368","mag":"2153031180"},"language":"en","primary_location":{"id":"doi:10.1109/cogsima.2012.6188368","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cogsima.2012.6188368","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067761989","display_name":"Christofer Waldenstr\u00f6m","orcid":null},"institutions":[{"id":"https://openalex.org/I101466613","display_name":"Swedish Defence University","ror":"https://ror.org/04mj8af82","country_code":"SE","type":"education","lineage":["https://openalex.org/I101466613"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Christofer Waldenstrom","raw_affiliation_strings":["Department of Computer and Systems Sciences, Swedish National Defense College, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Systems Sciences, Swedish National Defense College, Stockholm, Sweden","institution_ids":["https://openalex.org/I101466613"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5067761989"],"corresponding_institution_ids":["https://openalex.org/I101466613"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11599488,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"4","issue":null,"first_page":"146","last_page":"149"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13371","display_name":"Military Defense Systems Analysis","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13371","display_name":"Military Defense Systems Analysis","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12888","display_name":"Military Strategy and Technology","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.965499997138977,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7352797985076904},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.706861138343811},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.6717065572738647},{"id":"https://openalex.org/keywords/command-and-control","display_name":"Command and control","score":0.5352324843406677},{"id":"https://openalex.org/keywords/search-and-rescue","display_name":"Search and rescue","score":0.4267629384994507},{"id":"https://openalex.org/keywords/data-visualization","display_name":"Data visualization","score":0.4152945876121521},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3529238700866699},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.34280484914779663},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.32593005895614624},{"id":"https://openalex.org/keywords/simulation","display_name":"Simulation","score":0.3216060698032379},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3126353621482849},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18025219440460205},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1351824402809143}],"concepts":[{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7352797985076904},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.706861138343811},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.6717065572738647},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.5352324843406677},{"id":"https://openalex.org/C2775935494","wikidata":"https://www.wikidata.org/wiki/Q741964","display_name":"Search and rescue","level":3,"score":0.4267629384994507},{"id":"https://openalex.org/C172367668","wikidata":"https://www.wikidata.org/wiki/Q6504956","display_name":"Data visualization","level":3,"score":0.4152945876121521},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3529238700866699},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.34280484914779663},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.32593005895614624},{"id":"https://openalex.org/C44154836","wikidata":"https://www.wikidata.org/wiki/Q45045","display_name":"Simulation","level":1,"score":0.3216060698032379},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3126353621482849},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18025219440460205},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1351824402809143},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cogsima.2012.6188368","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cogsima.2012.6188368","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W264642080","https://openalex.org/W330732202","https://openalex.org/W1525278327","https://openalex.org/W1569338906","https://openalex.org/W1640106844","https://openalex.org/W1986776260","https://openalex.org/W1990203952","https://openalex.org/W1997480541","https://openalex.org/W2014075832","https://openalex.org/W2016682526","https://openalex.org/W2160832142","https://openalex.org/W3115078673"],"related_works":["https://openalex.org/W2013728941","https://openalex.org/W4225274103","https://openalex.org/W2579659702","https://openalex.org/W2154046714","https://openalex.org/W1965329638","https://openalex.org/W1574055964","https://openalex.org/W2923661510","https://openalex.org/W2189613078","https://openalex.org/W2586219255","https://openalex.org/W2547096368"],"abstract_inverted_index":{"Presents":[0],"an":[1,40,95],"microworld":[2,24,93],"for":[3],"investigating":[4],"the":[5,14,62,75,81,90,104,123,137,140,153,186],"effects":[6],"of":[7,16,74,148,171,185],"visualizing":[8],"expanding":[9,115,149,164],"search":[10,116,150,165],"areas":[11,117,131,151,166],"to":[12,58,99,121,135],"support":[13],"building":[15],"a":[17],"naval":[18,26],"force's":[19],"common":[20],"operational":[21,97,124,154],"picture.":[22],"The":[23,52,72,92,146,158],"simulates":[25],"warfare":[27],"operations,":[28],"and":[29,47,60,64,80,84,126,169],"in":[30,39],"it,":[31],"two":[32],"participants":[33,53],"can":[34,86,118,132],"play":[35],"against":[36],"each":[37,100],"other":[38],"operations":[41,76],"area":[42,77],"where":[43],"both":[44],"own":[45],"units":[46],"neutrals":[48],"may":[49],"be":[50,70,87,119,133],"present.":[51],"control":[54],"combat":[55],"vessels":[56],"used":[57,134],"locate":[59],"attack":[61],"enemy,":[63],"high":[65],"value":[66],"objects":[67],"that":[68,109],"should":[69],"protected.":[71],"map":[73],"is":[78,156],"configurable":[79],"units'":[82],"weapons":[83],"sensors":[85],"defined":[88],"by":[89,108],"experimenter.":[91],"displays":[94],"individual":[96],"picture":[98,155],"player":[101],"complied":[102],"from":[103,144],"sensor":[105],"information":[106],"provided":[107],"player's":[110],"units.":[111],"To":[112],"investigate":[113],"visualization,":[114],"added":[120],"enhance":[122],"picture,":[125],"algorithms":[127,161],"based":[128,162],"on":[129,163],"these":[130],"let":[136],"computer":[138],"help":[139],"participant":[141],"identify":[142],"enemies":[143],"neutrals.":[145],"integration":[147],"into":[152],"illustrated.":[157],"unit":[159],"classification":[160],"are":[167,175,179],"explained,":[168],"examples":[170],"how":[172],"they":[173],"work":[174],"presented.":[176],"Experimental":[177],"setups":[178],"presented":[180],"together":[181],"with":[182],"initial":[183],"evaluations":[184],"microworld.":[187]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
