{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:02:00Z","timestamp":1725519720458},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540886358"},{"type":"electronic","value":"9783540886365"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88636-5_7","type":"book-chapter","created":{"date-parts":[[2008,10,16]],"date-time":"2008-10-16T22:19:04Z","timestamp":1224195544000},"page":"77-89","source":"Crossref","is-referenced-by-count":1,"title":["An Early Warning System for the Prediction of Criminal Careers"],"prefix":"10.1007","author":[{"given":"Tim K.","family":"Cocx","sequence":"first","affiliation":[]},{"given":"Walter A.","family":"Kosters","sequence":"additional","affiliation":[]},{"given":"Jeroen F. J.","family":"Laros","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","volume-title":"Encyclopedia of Measurement and Statistics","author":"H. Abdi","year":"2007","unstructured":"Abdi, H.: Signal detection theory. In: Salkind, N.J. (ed.) Encyclopedia of Measurement and Statistics. Sage, Thousand Oaks (2007)"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Adderley, R., Musgrove, P.B.: Data mining case study: Modeling the behavior of offenders who commit serious sexual assaults. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2001), New York, pp. 215\u2013220 (2001)","DOI":"10.1145\/502512.502541"},{"key":"7_CR3","volume-title":"Criminal Careers and \u201cCareer Criminals\u201d","author":"A. Blumstein","year":"1986","unstructured":"Blumstein, A., Cohen, J., Roth, J.A., Visher, C.A.: Criminal Careers and \u201cCareer Criminals\u201d. National Academies Press, Washington (1986)"},{"key":"7_CR4","unstructured":"Chau, M., Atabakhsh, H., Zeng, D., Chen, H.: Building an infrastructure for law enforcement information sharing and collaboration: Design issues and challenges. In: Proceedings of The National Conference on Digital Government Research (2001)"},{"key":"7_CR5","unstructured":"Chau, M., Xu, J., Chen, H.: Extracting meaningful entities from police narrative reports. In: Proceedings of The National Conference on Digital Government Research, pp. 1\u20135 (2002)"},{"key":"7_CR6","unstructured":"Chen, H., Atabakhsh, H., Petersen, T., Schroeder, J., Buetow, T., Chaboya, L., O\u2019Toole, C., Chau, M., Cushna, T., Casey, D., Huang, Z.: COPLINK: Visualization for crime analysis. In: Proceedings of The National Conference on Digital Government Research, pp. 1\u20136 (2003)"},{"key":"7_CR7","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/11790853_40","volume-title":"Advances in Data Mining. Applications in Medicine, Web Mining, Marketing, Image and Signal Mining","author":"T.K. Cocx","year":"2006","unstructured":"Cocx, T.K., Kosters, W.A.: A distance measure for determining similarity between criminal investigations. In: Perner, P. (ed.) ICDM 2006. LNCS (LNAI), vol.\u00a04065, pp. 511\u2013525. Springer, Heidelberg (2006)"},{"key":"7_CR8","unstructured":"Cocx, T.K., Kosters, W.A., Laros, J.F.J.: Enhancing the automated analysis of criminal careers. In: SIAM Workshop on Link Analysis, Counterterrorism, and Security 2008 (LACTS 2008) (2008)"},{"key":"7_CR9","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-540-68123-6_21","volume-title":"Foundations of Intelligent Systems","author":"T.K. Cocx","year":"2008","unstructured":"Cocx, T.K., Kosters, W.A., Laros, J.F.J.: Temporal extrapolation within a static clustering. In: An, A., Matwin, S., Ra\u015b, Z.W., \u015al\u0119zak, D. (eds.) Foundations of Intelligent Systems. LNCS (LNAI), vol.\u00a04994, pp. 189\u2013195. Springer, Heidelberg (2008)"},{"key":"7_CR10","volume-title":"Multidimensional Scaling","author":"M.L. Davison","year":"1983","unstructured":"Davison, M.L.: Multidimensional Scaling. John Wiley and Sons, New York (1983)"},{"key":"7_CR11","unstructured":"The FBI strategic plan (2004\u20132009), http:\/\/www.fbi.gov\/"},{"key":"7_CR12","unstructured":"Goldberg, H.G., Wong, R.W.H.: Restructuring transactional data for link analysis in the FinCEN AI system. In: Papers from the AAAI Fall Symposium, pp. 38\u201346 (1998)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Kosters, W.A., Laros, J.F.J.: Metrics for mining multisets. In: Proceedings of the Twenty-seventh SGAI International Conference on Artificial Intelligence SGAI 2007, pp. 293\u2013303 (2007)","DOI":"10.1007\/978-1-84800-094-0_22"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Oatley, G.C., Zeleznikow, J., Ewart, B.W.: Matching and predicting crimes. In: Proceedings of the Twenty-fourth SGAI International Conference on Knowledge Based Systems and Applications of Artificial Intelligence (SGAI 2004), pp. 19\u201332 (2004)","DOI":"10.1007\/1-84628-103-2_2"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Schermer, B.: Software Agents, Surveillance, and the Right to Privacy: A Legislative Framework for Agent-enabled Surveillance. PhD thesis, Leiden University (2007)","DOI":"10.5117\/9789087280215"},{"issue":"1","key":"7_CR16","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.dss.2004.02.006","volume":"41","author":"Y. Xiang","year":"2005","unstructured":"Xiang, Y., Chau, M., Atabakhsh, H., Chen, H.: Visualizing criminal relationships: Comparison of a hyperbolic tree and a hierarchical list. Decision Support Systems\u00a041(1), 69\u201383 (2005)","journal-title":"Decision Support Systems"}],"container-title":["Lecture Notes in Computer Science","MICAI 2008: Advances in Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88636-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T14:45:26Z","timestamp":1557845126000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88636-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540886358","9783540886365"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88636-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}