http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#Head http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8 http://www.nanopub.org/nschema#hasAssertion http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#assertion http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8 http://www.nanopub.org/nschema#hasProvenance http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#provenance http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8 http://www.nanopub.org/nschema#hasPublicationInfo http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#pubinfo http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8 http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.nanopub.org/nschema#Nanopublication http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#assertion http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#comment-8 http://www.w3.org/1999/02/22-rdf-syntax-ns#type https://github.com/LaraHack/linkflows_model/blob/master/Linkflows.ttl#ActionNeededComment http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#comment-8 http://www.w3.org/1999/02/22-rdf-syntax-ns#type https://github.com/LaraHack/linkflows_model/blob/master/Linkflows.ttl#ContentComment http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#comment-8 http://www.w3.org/1999/02/22-rdf-syntax-ns#type https://github.com/LaraHack/linkflows_model/blob/master/Linkflows.ttl#NegativeComment http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#comment-8 http://www.w3.org/1999/02/22-rdf-syntax-ns#type https://github.com/LaraHack/linkflows_model/blob/master/Linkflows.ttl#ReviewComment http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#comment-8 https://github.com/LaraHack/linkflows_model/blob/master/Linkflows.ttl#hasCommentText The authors use computer vision mechanisms to exploit the camera network. It is stated that this is outside the scope of this paper, but they should be discussed (shortly) in this paper. http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#comment-8 https://github.com/LaraHack/linkflows_model/blob/master/Linkflows.ttl#hasImpact 3 http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#comment-8 https://github.com/LaraHack/linkflows_model/blob/master/Linkflows.ttl#refersTo http://purl.org/np/RAE04otO6dFur5i7-L2H4_SmSq7L80Y7kXAlkLvDyDfg0#paragraph http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#comment-8 https://github.com/LaraHack/linkflows_model/blob/master/Linkflows.ttl#refersTo http://purl.org/np/RAddoAfDWi1XRY6UGp_7Kh8ft_2omnURtnGI3qZ3miiLI#paragraph http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#comment-8 https://github.com/LaraHack/linkflows_model/blob/master/Linkflows.ttl#refersTo http://purl.org/np/RAzkKz6HWQqBjlfkoO7XrTQ7KJrYKj7FMhjcWx_MNL5Jc#paragraph http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#provenance http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#assertion http://www.w3.org/ns/prov#hadPrimarySource http://dx.doi.org/10.3233/SW-180298 http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#assertion http://www.w3.org/ns/prov#wasAttributedTo https://orcid.org/0000-0001-9886-893X http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8#pubinfo http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8 http://purl.org/dc/terms/created 2019-11-26T09:05:11+01:00 http://purl.org/np/RAh1WLC4pCBkmEuV4yec4yVU-T9HnpD_MRul5GXStEQo8 http://purl.org/pav/createdBy https://orcid.org/0000-0002-7114-6459