{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T04:34:12Z","timestamp":1764304452412},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319457376"},{"type":"electronic","value":"9783319457383"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45738-3_4","type":"book-chapter","created":{"date-parts":[[2016,9,13]],"date-time":"2016-09-13T07:49:06Z","timestamp":1473752946000},"page":"51-67","source":"Crossref","is-referenced-by-count":4,"title":["Mining Network Hotspots with Holes: A Summary of Results"],"prefix":"10.1007","author":[{"given":"Emre","family":"Eftelioglu","sequence":"first","affiliation":[]},{"given":"Yan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xun","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Shashi","family":"Shekhar","sequence":"additional","affiliation":[]},{"given":"James M.","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Farah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,14]]},"reference":[{"issue":"2","key":"4_CR1","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1080\/15614263.2014.972618","volume":"16","author":"J Fitterer","year":"2015","unstructured":"Fitterer, J., Nelson, T., Nathoo, F.: Predictive crime mapping. Police Pract. Res. 16(2), 121\u2013135 (2015)","journal-title":"Police Pract. Res."},{"key":"4_CR2","volume-title":"Environmental Criminology","author":"P Brantingham","year":"1981","unstructured":"Brantingham, P., et al.: Environmental Criminology. SAGE, Beverly Hills (1981)"},{"key":"4_CR3","unstructured":"Kulldorff, M.: SaTScan user guide for version 9.0 (2011)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Eftelioglu, E., Tang, X., Shekhar, S.: Geographically robust hotspot detection: a summary of results. In: ICDM International Workshop on Spatial and Spatiotemporal Data Mining (SSTDM) (2015)","DOI":"10.1109\/ICDMW.2015.159"},{"issue":"22","key":"4_CR5","doi-asserted-by":"crossref","first-page":"3929","DOI":"10.1002\/sim.2490","volume":"25","author":"M Kulldorff","year":"2006","unstructured":"Kulldorff, M., et al.: An elliptic spatial scan statistic. Stat. Med. 25(22), 3929\u20133943 (2006)","journal-title":"Stat. Med."},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Tang, X., et al.: Elliptical hotspot detection: a summary of results. In: ACM SIGSPATIAL Workshops (2015)","DOI":"10.1145\/2835185.2835192"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Neill, D.B., et al.: A fast multi-resolution method for detection of significant spatial disease clusters. In: Advances in Neural Information Processing Systems (2003)","DOI":"10.1037\/e307182005-065"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Eftelioglu, E., et al.: Ring-shaped hotspot detection: a summary of results. In: IEEE International Conference on Data Mining, pp. 815\u2013820 (2014)","DOI":"10.1109\/ICDM.2014.13"},{"issue":"6","key":"4_CR9","doi-asserted-by":"crossref","first-page":"1134","DOI":"10.1080\/00045608.2014.958389","volume":"104","author":"TH Grubesic","year":"2014","unstructured":"Grubesic, T.H., Wei, R., Murray, A.T.: Spatial clustering overview and comparison: accuracy, sensitivity, and computational expense. Ann. Assoc. Am. Geogr. 104(6), 1134\u20131156 (2014)","journal-title":"Ann. Assoc. Am. Geogr."},{"key":"4_CR10","first-page":"115","volume":"2","author":"DJ Beavon","year":"1994","unstructured":"Beavon, D.J., Brantingham, P.L., Brantingham, P.J.: The influence of street networks on the patterning of property offenses. Crime Prev. Stud. 2, 115\u2013148 (1994)","journal-title":"Crime Prev. Stud."},{"issue":"1","key":"4_CR11","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s10940-013-9194-1","volume":"30","author":"J Law","year":"2014","unstructured":"Law, J., Quick, M., Chan, P.: Bayesian spatio-temporal modeling for analysing local patterns of crime over time at the small-area level. J. Quant. Criminol. 30(1), 57\u201378 (2014)","journal-title":"J. Quant. Criminol."},{"issue":"4","key":"4_CR12","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1111\/j.1467-9671.2006.01011.x","volume":"10","author":"A Okabe","year":"2006","unstructured":"Okabe, A., Okunuki, K.-I., Shiode, S.: The SANET toolbox: new methods for network spatial analysis. Trans. GIS 10(4), 535\u2013550 (2006)","journal-title":"Trans. GIS"},{"key":"4_CR13","doi-asserted-by":"crossref","DOI":"10.1002\/9781119967101","volume-title":"Spatial Analysis Along Networks: Statistical and Computational Methods","author":"A Okabe","year":"2012","unstructured":"Okabe, A., Sugihara, K.: Spatial Analysis Along Networks: Statistical and Computational Methods. Wiley, New York (2012)"},{"issue":"5","key":"4_CR14","doi-asserted-by":"crossref","first-page":"866","DOI":"10.1080\/13658816.2012.724175","volume":"27","author":"S Shiode","year":"2013","unstructured":"Shiode, S., Shiode, N.: Network-based space-time search-window technique for hotspot detection of street-level crime incidents. Int. J. Geogr. Inf. Sci. 27(5), 866\u2013882 (2013)","journal-title":"Int. J. Geogr. Inf. Sci."},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","first-page":"284","volume-title":"Geographic Information Science","author":"O Dev","year":"2014","unstructured":"Dev, O., et al.: Significant route discovery: a summary of results. In: Duckham, M., Pebesma, E., Stewart, K., Frank, A.U. (eds.) GIScience 2014. LNCS, vol. 8728, pp. 284\u2013300. Springer, Heidelberg (2014)"},{"issue":"12","key":"4_CR16","doi-asserted-by":"crossref","first-page":"1857","DOI":"10.1109\/TKDE.2010.212","volume":"23","author":"L Shi","year":"2011","unstructured":"Shi, L., Janeja, V.P.: Anomalous window discovery for linear intersecting paths. IEEE Trans. Knowl. Data Eng. 23(12), 1857\u20131871 (2011)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"6","key":"4_CR17","doi-asserted-by":"crossref","first-page":"1771","DOI":"10.1016\/j.csda.2011.11.001","volume":"56","author":"MA Costa","year":"2012","unstructured":"Costa, M.A., Assun\u00e7\u00e3o, R.M., Kulldorff, M.: Constrained spanning tree algorithms for irregularly-shaped spatial clustering. Comput. Stat. Data Anal. 56(6), 1771\u20131783 (2012)","journal-title":"Comput. Stat. Data Anal."},{"issue":"1","key":"4_CR18","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1111\/j.0016-7363.2005.00673.x","volume":"38","author":"N Levine","year":"2006","unstructured":"Levine, N.: Crime mapping and the crimestat program. Geogr. Anal. 38(1), 41\u201356 (2006)","journal-title":"Geogr. Anal."},{"key":"4_CR19","volume-title":"Topology","author":"K Kuratowski","year":"2014","unstructured":"Kuratowski, K.: Topology, vol. 1. Elsevier, Amsterdam (2014)"},{"key":"4_CR20","doi-asserted-by":"crossref","first-page":"1481","DOI":"10.1080\/03610929708831995","volume":"26","author":"M Kulldorff","year":"1997","unstructured":"Kulldorff, M.: A spatial scan statistic. Commun. Stat.-Theor. Methods 26, 1481\u20131496 (1997)","journal-title":"Commun. Stat.-Theor. Methods"},{"key":"4_CR21","volume-title":"Information Theory, Inference and Learning Algorithms","author":"DJ MacKay","year":"2003","unstructured":"MacKay, D.J.: Information Theory, Inference and Learning Algorithms. Cambridge University Press, Cambridge (2003)"},{"key":"4_CR22","unstructured":"Us census bureau tiger\/line shapefiles. http:\/\/www.census.gov\/geo\/maps-data\/data\/tiger-line.html . Accessed 9 Dec 2015"},{"key":"4_CR23","unstructured":"City of Chicago data portal. https:\/\/data.cityofchicago.org\/Public-Safety\/Crimes-2001-to-present\/ijzp-q8t2 . Accessed 01 Dec 2014"},{"key":"4_CR24","unstructured":"City of Oakland data portal. https:\/\/data.oaklandnet.com . Accessed 1 May 2016"},{"key":"4_CR25","unstructured":"Ester, M., et al.: A density-based algorithm for discovering clusters in large spatial databases with noise, pp. 226\u2013231. AAAI Press (1996)"},{"key":"4_CR26","doi-asserted-by":"crossref","first-page":"100","DOI":"10.2307\/2346830","volume":"28","author":"JA Hartigan","year":"1979","unstructured":"Hartigan, J.A., Wong, M.A.: Algorithm AS 136: a K-means clustering algorithm. Appl. Stat. 28, 100\u2013108 (1979)","journal-title":"Appl. Stat."},{"key":"4_CR27","doi-asserted-by":"crossref","first-page":"1464","DOI":"10.1109\/TKDE.2013.135","volume":"26","author":"D Oliver","year":"2014","unstructured":"Oliver, D., et al.: A k-main routes approach to spatial network activity summarization. IEEE Trans. Knowl. Data Eng. 26, 1464\u20131478 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"9","key":"4_CR28","doi-asserted-by":"crossref","first-page":"1367","DOI":"10.1080\/13658811003619143","volume":"24","author":"D Guo","year":"2010","unstructured":"Guo, D.: Local entropy map: a nonparametric approach to detecting spatially varying multivariate relationships. Int. J. Geogr. Inf. Sci. 24(9), 1367\u20131389 (2010)","journal-title":"Int. J. Geogr. Inf. Sci."},{"key":"4_CR29","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.landurbplan.2012.08.006","volume":"108","author":"MK Wolfe","year":"2012","unstructured":"Wolfe, M.K., Mennis, J.: Does vegetation encourage or suppress urban crime? Evidence from Philadelphia, PA. Landscape and Urban Planning 108, 112\u2013122 (2012)","journal-title":"Landscape and Urban Planning"},{"issue":"5","key":"4_CR30","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1177\/0042098013492232","volume":"51","author":"A Hirschfield","year":"2014","unstructured":"Hirschfield, A., Birkin, M., Brunsdon, C., Malleson, N., Newton, A.: How places influence crime: the impact of surrounding areas on neighbourhood burglary rates in a British city. Urban Stud. 51(5), 1057\u20131072 (2014)","journal-title":"Urban Stud."}],"container-title":["Lecture Notes in Computer Science","Geographic Information Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45738-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T08:26:35Z","timestamp":1568363195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45738-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319457376","9783319457383"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45738-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}