{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T22:48:25Z","timestamp":1773269305419,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540360360","type":"print"},{"value":"9783540360377","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11790853_40","type":"book-chapter","created":{"date-parts":[[2006,7,12]],"date-time":"2006-07-12T08:22:02Z","timestamp":1152692522000},"page":"511-525","source":"Crossref","is-referenced-by-count":9,"title":["A Distance Measure for Determining Similarity Between Criminal Investigations"],"prefix":"10.1007","author":[{"given":"Tim K.","family":"Cocx","sequence":"first","affiliation":[]},{"given":"Walter A.","family":"Kosters","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","doi-asserted-by":"crossref","unstructured":"Adderley, R., Musgrove, P.B.: Data mining case study: Modeling the behavior of offenders who commit serious sexual assaults. In: KDD 2001: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, pp. 215\u2013220 (2001)","DOI":"10.1145\/502512.502541"},{"key":"40_CR2","unstructured":"Chau, M., Atabakhsh, H., Zeng, D., Chen, H.: Building an infrastructure for law enforcement information sharing and collaboration: Design issues and challenges. In: Proceedings of The National Conference on Digital Government Research (2001)"},{"key":"40_CR3","unstructured":"Chau, M., Xu, J., Chen, H.: Extracting meaningful entities from police narrative reports. In: Proceedings of The National Conference on Digital Government Research (2002)"},{"key":"40_CR4","unstructured":"Chen, H., Atabakhsh, H., Petersen, T., Schroeder, J., Buetow, T., Chaboya, L., O\u2019Toole, C., Chau, M., Cushna, T., Casey, D., Huang, Z.: COPLINK: Visualization for crime analysis. In: Proceedings of the The National Conference on Digital Government Research (2003)"},{"key":"40_CR5","volume-title":"Multidimensional Scaling","author":"M.L. Davison","year":"1983","unstructured":"Davison, M.L.: Multidimensional Scaling. John Wiley, New York (1983)"},{"key":"40_CR6","unstructured":"Goldberg, H.G., Wong, R.W.H.: Restructuring transactional data for link analysis in the FinCEN AI system. In: Papers from the AAAI Fall Symposium (1998)"},{"key":"40_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-48412-4_4","volume-title":"Advances in Intelligent Data Analysis","author":"W.A. Kosters","year":"1999","unstructured":"Kosters, W.A., Marchiori, E., Oerlemans, A.A.J.: Mining clusters with association rules. In: Hand, D.J., Kok, J.N., Berthold, M.R. (eds.) IDA 1999. LNCS, vol.\u00a01642, pp. 39\u201350. Springer, Heidelberg (1999)"},{"key":"40_CR8","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/978-3-7908-1779-9_4","volume-title":"E-Commerce and Intelligent Methods, Studies in Fuzziness and Soft Computing","author":"W.A. Kosters","year":"2002","unstructured":"Kosters, W.A., van Wezel, M.C.: Competitive neural networks for customer choice models. In: E-Commerce and Intelligent Methods, Studies in Fuzziness and Soft Computing, pp. 41\u201360. Physica-Verlag, Springer, Heidelberg (2002)"},{"key":"40_CR9","unstructured":"Kumar, N., de Beer, J., Vanthienen, J., Moens, M.-F.: Evaluation of intelligent exploitation tools for non-structured police information. In: Proceedings of the ICAIL 2005 Workshop on Data Mining, Information Extraction and Evidentiary Reasoning for Law Enforcement and Counter-terrorism (2005)"},{"key":"40_CR10","unstructured":"Oatley, G.C., Zeleznikow, J., Ewart, B.W.: Matching and predicting crimes. In: Proceedings of AI 2004, the Twenty-fourth SGAI International Conference on Knowledge Based Systems and Applications of Artificial Intelligence (2004)"},{"key":"40_CR11","unstructured":"Skillicorn, D.B.: Clusters within clusters: SVD and counterterrorism. In: Proceedings of the Workshop on Data Mining for Counter Terrorism and Security (2003)"},{"key":"40_CR12","unstructured":"SPSS\u00a0LexiQuest website, \n                    \n                      http:\/\/www.spss.com\/spssbi\/lexiquest\/"},{"issue":"1","key":"40_CR13","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.dss.2004.02.006","volume":"41","author":"Y. Xiang","year":"2005","unstructured":"Xiang, Y., Chau, M., Atabakhsh, H., Chen, H.: Visualizing criminal relationships: Comparison of a hyperbolic tree and a hierarchical list. Decision Support Systems\u00a041(1), 69\u201383 (2005)","journal-title":"Decision Support Systems"}],"container-title":["Lecture Notes in Computer Science","Advances in Data Mining. Applications in Medicine, Web Mining, Marketing, Image and Signal Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11790853_40.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:23:28Z","timestamp":1619508208000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11790853_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540360360","9783540360377"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11790853_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}