http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#Head
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8
http://www.nanopub.org/nschema#hasAssertion
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#assertion
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8
http://www.nanopub.org/nschema#hasProvenance
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#provenance
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8
http://www.nanopub.org/nschema#hasPublicationInfo
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#pubinfo
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.nanopub.org/nschema#Nanopublication
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#assertion
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#comment-8
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
https://github.com/LaraHack/linkflows_model/blob/master/Linkflows.ttl#ActionNeededComment
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#comment-8
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
https://github.com/LaraHack/linkflows_model/blob/master/Linkflows.ttl#ContentComment
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#comment-8
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
https://github.com/LaraHack/linkflows_model/blob/master/Linkflows.ttl#NegativeComment
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#comment-8
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
https://github.com/LaraHack/linkflows_model/blob/master/Linkflows.ttl#ReviewComment
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#comment-8
https://github.com/LaraHack/linkflows_model/blob/master/Linkflows.ttl#hasCommentText
The authors use computer vision mechanisms to exploit the camera network. It is stated that this is outside the scope of this paper, but they should be discussed (shortly) in this paper.
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#comment-8
https://github.com/LaraHack/linkflows_model/blob/master/Linkflows.ttl#hasImpact
3
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#comment-8
https://github.com/LaraHack/linkflows_model/blob/master/Linkflows.ttl#refersTo
http://purl.org/np/RAE04otO6dFur5i7-L2H4_SmSq7L80Y7kXAlkLvDyDfg0#paragraph
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#comment-8
https://github.com/LaraHack/linkflows_model/blob/master/Linkflows.ttl#refersTo
http://purl.org/np/RAddoAfDWi1XRY6UGp_7Kh8ft_2omnURtnGI3qZ3miiLI#paragraph
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#comment-8
https://github.com/LaraHack/linkflows_model/blob/master/Linkflows.ttl#refersTo
http://purl.org/np/RAzkKz6HWQqBjlfkoO7XrTQ7KJrYKj7FMhjcWx_MNL5Jc#paragraph
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#provenance
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#assertion
http://www.w3.org/ns/prov#hadPrimarySource
http://dx.doi.org/10.3233/SW-180298
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#assertion
http://www.w3.org/ns/prov#wasAttributedTo
https://orcid.org/0000-0001-9886-893X
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#pubinfo
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8
http://purl.org/dc/terms/created
2019-11-26T09:05:11+01:00
http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8
http://purl.org/pav/createdBy
https://orcid.org/0000-0002-7114-6459