{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T06:19:29Z","timestamp":1762928369664,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319234847"},{"type":"electronic","value":"9783319234854"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23485-4_51","type":"book-chapter","created":{"date-parts":[[2015,8,24]],"date-time":"2015-08-24T16:07:15Z","timestamp":1440432435000},"page":"513-524","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Crime Prediction Using Regression and Resources Optimization"],"prefix":"10.1007","author":[{"given":"Bruno","family":"Cavadas","sequence":"first","affiliation":[]},{"given":"Paula","family":"Branco","sequence":"additional","affiliation":[]},{"given":"S\u00e9rgio","family":"Pereira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,25]]},"reference":[{"unstructured":"FBI, Crime in the United States 2013 (2014). http:\/\/www.fbi.gov\/about-us\/cjis\/ucr\/crime-in-the-u.s\/2013\/crime-in-the-u.s.-2013 (accessed: January 21, 2015)","key":"51_CR1"},{"unstructured":"Labor-Statistics, B.: United States Department of Labor - Bureau of Labor Statistics: Police and detectives (2012). http:\/\/www.bls.gov\/ooh\/protective-service\/police-and-detectives.htmtab-1 (accessed: January 21, 2015)","key":"51_CR2"},{"doi-asserted-by":"crossref","unstructured":"Nath, S.V.: Crime pattern detection using data mining. In: 2006 IEEE\/WIC\/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops, WI-IAT 2006 Workshops, pp. 41\u201344. IEEE (2006)","key":"51_CR3","DOI":"10.1109\/WI-IATW.2006.55"},{"doi-asserted-by":"crossref","unstructured":"Liu, X., Jian, C., Lu, C.-T.: A spatio-temporal-textual crime search engine. In: Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 528\u2013529. ACM (2010)","key":"51_CR4","DOI":"10.1145\/1869790.1869881"},{"doi-asserted-by":"crossref","unstructured":"Shah, S., Bao, F., Lu, C.-T., Chen, I.-R.: Crowdsafe: crowd sourcing of crime incidents and safe routing on mobile devices. In: Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 521\u2013524. ACM (2011)","key":"51_CR5","DOI":"10.1145\/2093973.2094064"},{"key":"51_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-29047-3_28","volume-title":"Social Computing, Behavioral - Cultural Modeling and Prediction","author":"X Wang","year":"2012","unstructured":"Wang, X., Gerber, M.S., Brown, D.E.: Automatic crime prediction using events extracted from twitter posts. In: Yang, S.J., Greenberg, A.M., Endsley, M. (eds.) SBP 2012. LNCS, vol. 7227, pp. 231\u2013238. Springer, Heidelberg (2012)"},{"issue":"3","key":"51_CR7","doi-asserted-by":"crossref","first-page":"4219","DOI":"10.17485\/ijst\/2013\/v6i3.6","volume":"6","author":"R Iqbal","year":"2013","unstructured":"Iqbal, R., Murad, M.A.A., Mustapha, A., Panahy, P.H.S., Khanahmadliravi, N.: An experimental study of classification algorithms for crime prediction. Indian Journal of Science and Technology 6(3), 4219\u20134225 (2013)","journal-title":"Indian Journal of Science and Technology"},{"issue":"9","key":"51_CR8","first-page":"361","volume":"7","author":"S Shojaee","year":"2013","unstructured":"Shojaee, S., Mustapha, A., Sidi, F., Jabar, M.A.: A study on classification learning algorithms to predict crime status. International Journal of Digital Content Technology and its Applications 7(9), 361\u2013369 (2013)","journal-title":"International Journal of Digital Content Technology and its Applications"},{"doi-asserted-by":"crossref","unstructured":"Buczak, A.L., Gifford, C.M.: Fuzzy association rule mining for community crime pattern discovery. In: ACM SIGKDD Workshop on Intelligence and Security Informatics, p. 2. ACM (2010)","key":"51_CR9","DOI":"10.1145\/1938606.1938608"},{"doi-asserted-by":"crossref","unstructured":"Redmond, M.A., Highley, T.: Empirical analysis of case-editing approaches for numeric prediction. In: Innovations in Computing Sciences and Software Engineering, pp. 79\u201384. Springer (2010)","key":"51_CR10","DOI":"10.1007\/978-90-481-9112-3_14"},{"issue":"2","key":"51_CR11","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1093\/forestscience\/49.2.331","volume":"49","author":"G Donovan","year":"2003","unstructured":"Donovan, G., Rideout, D.: An integer programming model to optimize resource allocation for wildfire containment. Forest Science 49(2), 331\u2013335 (2003)","journal-title":"Forest Science"},{"issue":"5","key":"51_CR12","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/MSP.2007.117","volume":"5","author":"J Caulkins","year":"2007","unstructured":"Caulkins, J., Hough, E., Mead, N., Osman, H.: Optimizing investments in security countermeasures: a practical tool for fixed budgets. IEEE Security & Privacy 5(5), 57\u201360 (2007)","journal-title":"IEEE Security & Privacy"},{"doi-asserted-by":"crossref","unstructured":"Mitchell, P.S.: Optimal selection of police patrol beats. The Journal of Criminal Law, Criminology, and Police Science, 577\u2013584 (1972)","key":"51_CR13","DOI":"10.2307\/1141814"},{"issue":"1","key":"51_CR14","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1287\/trsc.17.1.48","volume":"17","author":"M Daskin","year":"1983","unstructured":"Daskin, M.: A maximum expected covering location model: formulation, properties and heuristic solution. Transportation Science 17(1), 48\u201370 (1983)","journal-title":"Transportation Science"},{"doi-asserted-by":"crossref","unstructured":"Li, L., Jiang, Z., Duan, N., Dong, W., Hu, K., Sun, W.: Police patrol service optimization based on the spatial pattern of hotspots. 2011 IEEE International Conference on in Service Operations, Logistics, and Informatics, pp. 45\u201350. IEEE (2011)","key":"51_CR15","DOI":"10.1109\/SOLI.2011.5986526"},{"key":"51_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-642-40669-0_33","volume-title":"Progress in Artificial Intelligence","author":"L Torgo","year":"2013","unstructured":"Torgo, L., Ribeiro, R.P., Pfahringer, B., Branco, P.: SMOTE for regression. In: Reis, L.P., Correia, L., Cascalho, J. (eds.) EPIA 2013. LNCS, vol. 8154, pp. 378\u2013389. Springer, Heidelberg (2013)"},{"doi-asserted-by":"crossref","unstructured":"Torgo, L., Branco, P., Ribeiro, R.P., Pfahringer, B.: Resampling strategies for regression. Expert Systems (2014)","key":"51_CR17","DOI":"10.1111\/exsy.12081"},{"unstructured":"Ribeiro, R.P.: Utility-based Regression. PhD thesis, Dep. Computer Science, Faculty of Sciences - University of Porto (2011)","key":"51_CR18"},{"key":"51_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-642-04747-3_26","volume-title":"Discovery Science","author":"L Torgo","year":"2009","unstructured":"Torgo, L., Ribeiro, R.: Precision and recall for regression. In: Gama, J., Costa, V.S., Jorge, A.M., Brazdil, P.B. (eds.) DS 2009. LNCS, vol. 5808, pp. 332\u2013346. Springer, Heidelberg (2009)"},{"unstructured":"Milborrow, S.: earth: Multivariate Adaptive Regression Spline Models. Derived from mda:mars by Trevor Hastie and Rob Tibshirani (2012)","key":"51_CR20"},{"unstructured":"Dimitriadou, E., Hornik, K., Leisch, F., Meyer, D., Weingessel, A.: e1071: Misc Functions of the Department of Statistics (e1071), TU Wien (2011)","key":"51_CR21"},{"issue":"3","key":"51_CR22","first-page":"18","volume":"2","author":"A Liaw","year":"2002","unstructured":"Liaw, A., Wiener, M.: Classification and regression by randomforest. R News 2(3), 18\u201322 (2002)","journal-title":"R News"},{"unstructured":"U.S.C. Bureau, Population Estimates (2012). http:\/\/www.census.gov\/popest\/data\/index.html (accessed: January 23, 2015)","key":"51_CR23"}],"container-title":["Lecture Notes in Computer Science","Progress in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23485-4_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T18:20:21Z","timestamp":1718043621000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23485-4_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319234847","9783319234854"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23485-4_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"25 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}