{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:50:38Z","timestamp":1759963838957},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401896"},{"type":"electronic","value":"9783540448532"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44853-5_2","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T04:01:31Z","timestamp":1196481691000},"page":"13-26","source":"Crossref","is-referenced-by-count":6,"title":["Criminal Incident Data Association Using the OLAP Technology"],"prefix":"10.1007","author":[{"given":"Song","family":"Lin","sequence":"first","affiliation":[]},{"given":"Donald E.","family":"Brown","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,5,27]]},"reference":[{"key":"2_CR1","first-page":"210","volume":"16","author":"A.B. Badiru","year":"1988","unstructured":"Badiru, A.B., Karasz, J.M. and Holloway, B.T., \u201cAREST: Armed Robbery Eidetic Suspect Typing Expert System\u201d, Journal of Police Science and Administration, 16, 210\u2013216 (1988)","journal-title":"Journal of Police Science and Administration"},{"key":"2_CR2","volume-title":"Patterns in Crimes","author":"P. J. Brantingham","year":"1984","unstructured":"Brantingham, P. J. and Brantingham, P. L., Patterns in Crimes, New York: Macmillan (1984)"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/S0167-9236(02)00064-7","volume":"34","author":"D.E. Brown","year":"2003","unstructured":"Brown D.E. and Hagen S.C., \u201cData Association Methods with Applications to Law Enforcement\u201d, Decision Support Systems, 34, 369\u2013378 (2003)","journal-title":"Decision Support Systems"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Brown, D. E., Liu, H. and Xue, Y., \u201cMining Preference from Spatial-temporal Data\u201d, Proc. of the First SIAM International Conference of Data Mining (2001)","DOI":"10.1137\/1.9781611972719.26"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Clarke, R.V. and Cornish, D.B., \u201cModeling Offender\u2019s Decisions: A Framework for Research and Policy\u201d, Crime Justice: An Annual Review of Research, Vol. 6, Ed. by Tonry, M. and Morris, N. University of Chicago Press (1985)","DOI":"10.1086\/449106"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Chaudhuri, S. and Dayal, U., \u201cAn Overview of Data Warehousing and OLAP Technology\u201d, ACM SIGMOD Record, 26 (1997)","DOI":"10.1145\/248603.248616"},{"key":"2_CR7","unstructured":"Dong, G., Han, J., Lam, J. Pei, J., and Wang, K., \u201cMining Multi-Dimensional Constrained Gradients in Data Cubes\u201d, Proc. of the 27 th VLDB Conference, Roma, Italy (2001)"},{"key":"2_CR8","unstructured":"Everitt, B. Cluster Analysis, John Wiley & Sons, Inc. (1993)"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1111\/j.1745-9125.1987.tb00825.x","volume":"25","author":"M. Felson","year":"1987","unstructured":"Felson, M., \u201cRoutine Activities and Crime Prevention in the Developing Metropolis\u201d, Criminology, 25, 911\u2013931 (1987)","journal-title":"Criminology"},{"key":"2_CR10","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/2.989927","volume":"35","author":"R. Hauck","year":"2002","unstructured":"Hauck, R., Atabakhsh, H., Onguasith, P., Gupta, H., and Chen, H., \u201cUsing Coplink to Analyse Criminal-Justice Data\u201d, IEEE Computer, 35, 30\u201337 (2002)","journal-title":"IEEE Computer"},{"key":"2_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identifications of Outliers","author":"D. Hawkins","year":"1980","unstructured":"Hawkins, D., Identifications of Outliers, Chapman and Hall, London, (1980)"},{"key":"2_CR12","volume-title":"Career Criminal Apprehesion Program: Annual Report","author":"R.O. Heck","year":"1991","unstructured":"Heck, R.O., Career Criminal Apprehesion Program: Annual Report (Sacramento, CA: Office of Criminal Justice Planning) (1991)"},{"key":"2_CR13","first-page":"27","volume":"55","author":"D. J. Icove","year":"1986","unstructured":"Icove, D. J., \u201cAutomated Crime Profiling\u201d, Law Enforcement Bulletin, 55, 27\u201330 (1986)","journal-title":"Law Enforcement Bulletin"},{"key":"2_CR14","unstructured":"Imielinski, T., Khachiyan, L., and Abdul-ghani, A., Cubegrades: \u201cGeneralizing association rules\u201d, Technical report, Dept. Computer Science, Rutgers Univ., Aug. (2000)"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Kaufman, L. and Rousseeuw, P. Finding Groups in Data, Wiley (1990)","DOI":"10.1002\/9780470316801"},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/34.990133","volume":"24","author":"P. Mitra","year":"2002","unstructured":"Mitra, P., Murthy, C.A., and Pal, S.K., \u201cUnsupervised Feature Selection Using Feature Similarity\u201d, IEEE Trans. On Pattern Analysis and Machine Intelligence, 24, 301\u2013312 (2002)","journal-title":"IEEE Trans. On Pattern Analysis and Machine Intelligence"},{"key":"2_CR17","volume-title":"Introduction to Modern Information Retrieval","author":"G. Salton","year":"1983","unstructured":"Salton, G. and McGill, M. Introduction to Modern Information Retrieval, McGraw-Hill Book Company, New York (1983)"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Sarawagi, S., Agrawal, R., and Megiddo. N., \u201cDiscovery-driven exploration of OLAP data cubes\u201d, Proc. of the Sixth Int\u2019l Conference on Extending Database Technology (EDBT), Valencia, Spain (1998)","DOI":"10.1007\/BFb0100984"},{"key":"2_CR19","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316849","volume-title":"Multivariate Density Estimation: Theory, Practice and Visualization","author":"D. Scott","year":"1992","unstructured":"Scott, D. Multivariate Density Estimation: Theory, Practice and Visualization, New York, NY: Wiley (1992)"},{"key":"2_CR20","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1080\/01621459.1926.10502161","volume":"21","author":"H.A. Sturges","year":"1926","unstructured":"Sturges, H.A., \u201cThe Choice of a Class Interval\u201d, Journal of American Statistician Association, 21, 65\u201366 (1926)","journal-title":"Journal of American Statistician Association"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44853-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T11:09:37Z","timestamp":1557054577000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44853-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401896","9783540448532"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-44853-5_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}