{"id":"https://openalex.org/W2003335978","doi":"https://doi.org/10.1109/cts.2012.6261059","title":"Information propagation through a dependency network model","display_name":"Information propagation through a dependency network model","publication_year":2012,"publication_date":"2012-05-01","ids":{"openalex":"https://openalex.org/W2003335978","doi":"https://doi.org/10.1109/cts.2012.6261059","mag":"2003335978"},"language":"en","primary_location":{"id":"doi:10.1109/cts.2012.6261059","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cts.2012.6261059","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049185708","display_name":"Brian Drabble","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Brian Drabble","raw_affiliation_strings":["DMM Ventures, Inc., Yorktown, VA, USA","DMM Ventures, Inc., Yorktown, VA 23696, USA"],"affiliations":[{"raw_affiliation_string":"DMM Ventures, Inc., Yorktown, VA, USA","institution_ids":[]},{"raw_affiliation_string":"DMM Ventures, Inc., Yorktown, VA 23696, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5049185708"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":5.5355,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.95364696,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2","issue":null,"first_page":"266","last_page":"272"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10747","display_name":"Disaster Management and Resilience","score":0.9473999738693237,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10747","display_name":"Disaster Management and Resilience","score":0.9473999738693237,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11810","display_name":"Complex Systems and Decision Making","score":0.9172999858856201,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.753709077835083},{"id":"https://openalex.org/keywords/dependency","display_name":"Dependency (UML)","score":0.7463482618331909},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6552386283874512},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6160115599632263},{"id":"https://openalex.org/keywords/information-needs","display_name":"Information needs","score":0.5173379778862},{"id":"https://openalex.org/keywords/network-model","display_name":"Network model","score":0.508401095867157},{"id":"https://openalex.org/keywords/plan","display_name":"Plan (archaeology)","score":0.4264214336872101},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.36466753482818604},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3413226008415222},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.3224024176597595},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.24231857061386108},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17386645078659058},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17001959681510925},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.1305464804172516}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.753709077835083},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.7463482618331909},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6552386283874512},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6160115599632263},{"id":"https://openalex.org/C78999398","wikidata":"https://www.wikidata.org/wiki/Q2899888","display_name":"Information needs","level":2,"score":0.5173379778862},{"id":"https://openalex.org/C104122410","wikidata":"https://www.wikidata.org/wiki/Q1416406","display_name":"Network model","level":2,"score":0.508401095867157},{"id":"https://openalex.org/C2776505523","wikidata":"https://www.wikidata.org/wiki/Q4785468","display_name":"Plan (archaeology)","level":2,"score":0.4264214336872101},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.36466753482818604},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3413226008415222},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.3224024176597595},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.24231857061386108},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17386645078659058},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17001959681510925},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.1305464804172516},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cts.2012.6261059","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cts.2012.6261059","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2056569531","https://openalex.org/W3002575941"],"related_works":["https://openalex.org/W2067317451","https://openalex.org/W2154771632","https://openalex.org/W4211085505","https://openalex.org/W3122478268","https://openalex.org/W2084758217","https://openalex.org/W408804804","https://openalex.org/W4231021675","https://openalex.org/W3086365953","https://openalex.org/W2392215070","https://openalex.org/W2794948367"],"abstract_inverted_index":{"Central":[0],"to":[1,15,32,40,56,70,95,174,202,218,254],"any":[2],"collaboration":[3],"problem":[4],"are":[5,21,160,241],"the":[6,22,29,41,49,57,62,71,80,108,116,128,134,141,144,155,158,176,184,189,196,200,210,221,235,238,256,259],"twin":[7],"issues":[8],"of":[9,43,82,110,131,147,191,237,258,265],"firstly":[10],"understanding":[11],"what":[12,20,36,97,107],"information":[13,25,30,37,50,98,138,181],"needs":[14,31],"be":[16,68,104,114,216],"communicated":[17,55,105],"and":[18,51,60,73,88,106,140,152,168,180,261,263],"secondly":[19],"methods":[23],"or":[24,157,231],"conduits":[26,135,159],"through":[27,136],"which":[28,47,126,137,194],"pass.":[33],"For":[34],"example,":[35],"is":[38,53,252],"key":[39,177],"capabilities":[42],"an":[44],"insurgent":[45],"network,":[46],"has":[48],"how":[52,101],"it":[54,102,173],"others":[58],"within":[59,183],"without":[61],"network.":[63,185],"The":[64,162],"same":[65],"analysis":[66,187],"can":[67],"applied":[69],"FEMA":[72],"other":[74],"emergency":[75],"response":[76],"networks":[77],"established":[78],"in":[79,199],"aftermath":[81],"events":[83],"such":[84],"as":[85],"Hurricane":[86],"Katrina":[87],"9/11":[89],"where":[90],"there":[91],"was":[92,99],"a":[93,121,228,248],"need":[94],"understand":[96],"available,":[100],"could":[103],"effect":[109],"proposed":[111],"changes":[112,197],"would":[113],"across":[115],"networks.":[117],"This":[118,186],"paper":[119],"describes":[120],"dependency":[122,163],"based":[123],"network":[124,146,201],"model":[125,164],"allows":[127,188],"explicit":[129],"modeling":[130],"information/knowledge":[132],"content,":[133],"passes,":[139],"impact":[142],"on":[143],"inter-dependent":[145],"people,":[148],"organizations,":[149],"locations,":[150],"resources":[151,213],"concepts":[153],"if":[154],"content":[156,182],"modified.":[161],"handles":[165],"both":[166],"quantitative":[167],"qualitative":[169],"node":[170,229],"outputs":[171,230,236],"enabling":[172],"identify":[175,209],"dependent":[178,242],"nodes":[179,239],"development":[190],"Plan":[192,207],"Models":[193,208],"capture":[195],"required":[198],"bring":[203,219],"about":[204,220],"desired":[205,222],"effects.":[206],"mechanisms":[211],"and/or":[212],"that":[214],"should":[215],"used":[217,253],"effects":[223],"either":[224],"directly":[225],"by":[226,233],"affecting":[227,234],"indirectly":[232],"they":[240],"upon.":[243],"An":[244],"example":[245],"taken":[246],"from":[247],"counter":[249],"insurgency":[250],"scenario":[251],"illustrate":[255],"benefits":[257],"approach":[260],"range":[262],"scope":[264],"its":[266],"applicability.":[267]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
