{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:07:39Z","timestamp":1759961259999},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401896"},{"type":"electronic","value":"9783540448532"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44853-5_13","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T04:01:31Z","timestamp":1196481691000},"page":"168-180","source":"Crossref","is-referenced-by-count":12,"title":["CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis"],"prefix":"10.1007","author":[{"given":"Jennifer","family":"Schroeder","sequence":"first","affiliation":[]},{"given":"Jennifer","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Hsinchun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,5,27]]},"reference":[{"issue":"5","key":"13_CR1","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1109\/72.286889","volume":"4","author":"M. Ali","year":"1993","unstructured":"Ali, M., Kamoun, F.: Neural networks for shortest path computation and routing in computer networks. IEEE Transactions on Neural Networks, Vol. 4, No. 5. (1993) 941\u2013953.","journal-title":"IEEE Transactions on Neural Networks"},{"issue":"17","key":"13_CR2","first-page":"17","volume":"38","author":"T. Anderson","year":"1994","unstructured":"Anderson, T., Arbetter, L., Benawides, A., Longmore-Etheridge, A.: Security works. Security Management, Vol. 38, No. 17. (1994) 17\u201320.","journal-title":"Security Management"},{"issue":"3","key":"13_CR3","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1145\/3166.3197","volume":"28","author":"D. C. Blair","year":"1985","unstructured":"Blair, D. C., Maron, M. E.: An evaluation of retrieval effectiveness for a full-text document-retrieval system. Communications of the ACM, Vol. 28, No. 3. (1985) 289\u2013299.","journal-title":"Communications of the ACM"},{"issue":"5","key":"13_CR4","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1109\/21.179830","volume":"22","author":"H. Chen","year":"1992","unstructured":"Chen, H., Lynch, K. J.: Automatic construction of networks of concepts characterizing document database. IEEE Transaction on Systems, Man and Cybernetics, Vol. 22, No. 5. (1992) 885\u2013902.","journal-title":"IEEE Transaction on Systems, Man and Cybernetics"},{"issue":"1","key":"13_CR5","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/602421.602441","volume":"46","author":"H. Chen","year":"2003","unstructured":"Chen, H., Zeng, D., Atabakhsh, H., Wyzga, W., Schroeder, J.: COPLINK: Managing law enforcement data and knowledge. Communications of the ACM, Vol. 46, No. 1. (2003) 28\u201334.","journal-title":"Communications of the ACM"},{"key":"13_CR6","first-page":"309","volume":"9","author":"G. Cooper","year":"1992","unstructured":"Cooper, G., Herskovits, E.: A Bayesian method for the induction of probabilistic networks from data. Machine Learning, Vol. 9. (1992) 309\u2013347.","journal-title":"Machine Learning"},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/BF01386390","volume":"1","author":"E. Dijkstra","year":"1959","unstructured":"Dijkstra, E.: A note on two problems in connection with graphs. Numerische Mathematik, Vol. 1. (1959) 269\u2013271.","journal-title":"Numerische Mathematik"},{"key":"13_CR8","volume-title":"Optimization Algorithms for Networks and Graphs","author":"J. Evans","year":"1992","unstructured":"Evans, J., Minieka, E.: Optimization Algorithms for Networks and Graphs, 2nd edn. Marcel Dekker, New York (1992).","edition":"2nd edn."},{"key":"13_CR9","unstructured":"Federal Bureau of Investigation: Uniform Crime Reporting Handbook: National Incident-Based Reporting System (NIBRS). Edition NCJ 152368. U.S. Department of Justice. Federal Bureau of Investigation (1992)."},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Friedman, N., Linial, M., Nachman, I., Pe\u2019er, D.: Using Bayesian networks to analyze expression data. In: Proceedings of the Forth Annual International Conference on Computational Molecular Biology (RECOMB00) (2000).","DOI":"10.1145\/332306.332355"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Fox, M. S., Smith, S.F.: ISIS: A knowledge-based system for factory scheduling. Expert Systems, Vol. 1, No. 1. (1984).","DOI":"10.1111\/j.1468-0394.1984.tb00424.x"},{"key":"13_CR12","unstructured":"Goldberg, H. G., Senator, T. E.: Restructuring databases for knowledge discovery by consolidation and link formation. In: Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis (1998)."},{"key":"13_CR13","unstructured":"Goldberg, H. G., Wong, R. W.H.: Restructuring transactional data for link analysis in the FinCEN AI system. In: Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis (1998)."},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Goyal, S. K. et al.: COMPASS: An expert system for telephone switch maintenance. Expert Systems. July 1985.","DOI":"10.1111\/j.1468-0394.1985.tb00461.x"},{"key":"13_CR15","unstructured":"Grady, N. W., Tufano, D. R., Flanery, R. E. Jr.: Immersive visualization for link analysis. In: Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis (1998)."},{"issue":"2","key":"13_CR16","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1177\/001872087501700206","volume":"17","author":"W. R. Harper","year":"1975","unstructured":"Harper, W. R., Harris, D. H.: The application of link analysis to police intelligence. Human Factors, Vol. 17, No. 2. (1975) 157\u2013164.","journal-title":"Human Factors"},{"key":"13_CR17","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/2.989927","volume":"35","author":"R. Hauck","year":"2002","unstructured":"Hauck, R., Atabakhsh, H., Onguasith, P., Gupta, H., Chen, H.: Using Coplink to analyze criminal-justice data. IEEE Computer, Vol. 35. (2002) 30\u201337.","journal-title":"IEEE Computer"},{"key":"13_CR18","unstructured":"Heckerman, D.: A tutorial on learning with Bayesian networks, Microsoft Research Report, MSR-TR-95-06, (1995)."},{"key":"13_CR19","unstructured":"Horn, R. D., Birdwell, J. D., Leedy, L. W.: Link discovery tool. In: Proceedings of the Counterdrug Technology Assessment Center and Counterdrug Technology Assessment Center\u2019s ONDCP\/CTAC International Symposium, Chicago, IL (1997)."},{"key":"13_CR20","unstructured":"Lee, R.: Automatic information extraction from documents: A tool for intelligence and law enforcement analysts. In: Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis (1998)."},{"key":"13_CR21","unstructured":"McAndrew, D.: The structural analysis of criminal networks. In: Canter D., Alison L. (eds.), The Social Psychology of Crime: Groups, Teams, and Networks, Offender Profiling Series, III, Aldershot, Dartmouth (1999)."},{"key":"13_CR22","unstructured":"National Archive of Criminal Justice Data. Uniform Crime Reporting Program Data [United States] Series. http:\/\/www.icpsr.umich.edu:8080\/NACJD-SERIES\/00057.xml"},{"key":"13_CR23","volume-title":"Computer-Based Medical Consultations: MYCIN","author":"E. H. Shortliffe","year":"1976","unstructured":"Shortliffe, E. H.: Computer-Based Medical Consultations: MYCIN. Elsevier, North-Holland (1976)."},{"key":"13_CR24","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0378-8733(91)90008-H","volume":"13","author":"M. K. Sparrow","year":"1991","unstructured":"Sparrow, M. K.: The application of network analysis to criminal intelligence: an assessment of the prospects. Social Networks, Vo. 13. (1991) 251\u2013274.","journal-title":"Social Networks"},{"issue":"11","key":"13_CR25","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1287\/mnsc.47.11.1457.10253","volume":"47","author":"S. Sarkar","year":"2001","unstructured":"Sarkar, S., Sriram, R. S.: Bayesian models for early warning of bank failures. Management Science, Vol. 47, No. 11. (2001) 1457\u20131475.","journal-title":"Management Science"},{"issue":"2","key":"13_CR26","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/17.6007","volume":"35","author":"E. Turban","year":"1988","unstructured":"Turban, E.: Review of expert systems technology. IEEE Transactions on Engineering Management, Vol. 35, No. 2. (1988) 71\u201381.","journal-title":"IEEE Transactions on Engineering Management"},{"key":"13_CR27","unstructured":"Xu, J., Chen, H.: Using shortest-path algorithms to identify criminal associations. In: Proceedings of the National Conference for Digital Government Research (dg.o 2002), Los Angeles, CA (2002)."}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44853-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T11:09:27Z","timestamp":1557054567000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44853-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401896","9783540448532"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/3-540-44853-5_13","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}