skip to main content
research-article
Free Access

Searching for Jim Gray: a technical overview

Published:01 July 2011Publication History
Skip Abstract Section

Abstract

The volunteer search for Jim Gray, lost at sea in 2007, highlights the challenges of computer-aided emergency response.

References

  1. Goldstein, J. and Rotich, J. Digitally Networked Technology in Kenya's 2007--2008 Post-Election Crisis. Technical Report 2008--2009. Berkman Center for Internet and Society at Harvard University, Cambridge, MA, Sept. 2008.Google ScholarGoogle Scholar
  2. Heinzelman, J. and Waters, C. Crowdsourcing Crisis Information in Disaster-Affected Haiti. Technical Report, Special Report 252. United States Institute of Peace, Washington, D.C., Oct. 2010.Google ScholarGoogle Scholar
  3. Hellerstein, J.M. and Tennenhouse, D.L. Searching for Jim Gray: A Technical Overview, Technical Report UCB/EECS-2010-142. EECS Department, University of California, Berkeley, Dec. 2010.Google ScholarGoogle Scholar
  4. Saade, E. Search survey for S/V Tenacious: Gulf of Farallones and approaches to San Francisco Bay. ACM SIGMOD Record 37, 2 (June 2008), 70--77. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. U.S. Coast Guard. Search and Rescue Optimal Planning System (SAROPS) 2009; http://www.uscg.mil/acquisition/international/sarops.aspGoogle ScholarGoogle Scholar

Index Terms

  1. Searching for Jim Gray: a technical overview

                    Recommendations

                    Comments

                    Login options

                    Check if you have access through your login credentials or your institution to get full access on this article.

                    Sign in

                    Full Access

                    • Published in

                      cover image Communications of the ACM
                      Communications of the ACM  Volume 54, Issue 7
                      July 2011
                      133 pages
                      ISSN:0001-0782
                      EISSN:1557-7317
                      DOI:10.1145/1965724
                      Issue’s Table of Contents

                      Copyright © 2011 ACM

                      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                      Publisher

                      Association for Computing Machinery

                      New York, NY, United States

                      Publication History

                      • Published: 1 July 2011

                      Permissions

                      Request permissions about this article.

                      Request Permissions

                      Check for updates

                      Qualifiers

                      • research-article
                      • Popular
                      • Refereed

                    PDF Format

                    View or Download as a PDF file.

                    PDF

                    eReader

                    View online with eReader.

                    eReader

                    HTML Format

                    View this article in HTML Format .

                    View HTML Format