2010 10th Annual International Conference on New Technologies of Distributed Systems (NOTERE) 2010
DOI: 10.1109/notere.2010.5536814
|View full text |Cite
|
Sign up to set email alerts
|

Risk characterization and prototyping

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…Risks in dangerous environments are usually solved technically through the use of sensors, ad hoc devices, and suitable software for empowering individuals’ lives. The related solutions available in the literature are based on sensors (and sensor networks), and various types of monitoring devices, among which are wearable devices and on service‐oriented approaches . In ambient intelligence , compatible enabling hardware is adopted, including fully optical networks, nano/micro electronics, sensors, radio frequency identification (RFID), software agents, affect computing, or brain–machine interfaces.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Risks in dangerous environments are usually solved technically through the use of sensors, ad hoc devices, and suitable software for empowering individuals’ lives. The related solutions available in the literature are based on sensors (and sensor networks), and various types of monitoring devices, among which are wearable devices and on service‐oriented approaches . In ambient intelligence , compatible enabling hardware is adopted, including fully optical networks, nano/micro electronics, sensors, radio frequency identification (RFID), software agents, affect computing, or brain–machine interfaces.…”
Section: Related Workmentioning
confidence: 99%
“…In our recent work , we have presented the key design issues, the approach, and an example prototype concerning our RMS. In this paper, we complete the view on our solution by introducing also an overall modeling approach and a discussion about the research questions connected to risk modeling and an evaluation of the approach based on the experience gathered through the prototype so far.…”
Section: Introductionmentioning
confidence: 99%
“…• Planning preventive strategies based on the results of the computation of the risk r according to the probabilistic model of risk presented in [17]. The output is a description of r which includes all the risk attributes that will be described in the following of the paper and constitute the Risk entity; computing the strategies to prevent the recognized risk r,…”
Section: An Introduction To Risk Computationmentioning
confidence: 99%
“…A Gaussian distribution for each risk source [17] allows modeling the maximal value in the origin of danger that has a inverse relationship with distance, meaning that it decreases when the distance increase and vice versa. The distribution of values around the means denotes how flat the curve is, namely, to which extent the danger continues to influence the risk value while the distance increases.…”
Section: An Introduction To Risk Computationmentioning
confidence: 99%