{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T05:33:27Z","timestamp":1770960807944,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2009,3,13]],"date-time":"2009-03-13T00:00:00Z","timestamp":1236902400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1007\/s10489-009-0173-z","type":"journal-article","created":{"date-parts":[[2009,3,12]],"date-time":"2009-03-12T21:53:01Z","timestamp":1236894781000},"page":"370-386","source":"Crossref","is-referenced-by-count":57,"title":["PutMode: prediction of uncertain trajectories in moving objects databases"],"prefix":"10.1007","volume":"33","author":[{"given":"Shaojie","family":"Qiao","sequence":"first","affiliation":[]},{"given":"Changjie","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Huidong","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Teng","family":"Long","sequence":"additional","affiliation":[]},{"given":"Shucheng","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Yungchang","family":"Ku","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Chau","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,3,13]]},"reference":[{"issue":"1","key":"173_CR1","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.dss.2004.02.006","volume":"41","author":"Y Xiang","year":"2005","unstructured":"Xiang Y, Chau M, Atabakhsh H, Chen H (2005) Visualizing criminal relationships: Comparison of a hyperbolic tree and a hierarchical list. Decis Support Syst 41(1):69\u201383","journal-title":"Decis Support Syst"},{"issue":"3","key":"173_CR2","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1016\/j.dss.2004.06.014","volume":"41","author":"JL Zhao","year":"2006","unstructured":"Zhao JL, Bi HH, Chen H, Zeng DD, Lin C, Chau M, Process-driven collaboration (2006) support for intra-agency crime analysis. Decis Support Syst 41(3):616\u2013633","journal-title":"Decis Support Syst"},{"issue":"1","key":"173_CR3","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.dss.2006.09.007","volume":"43","author":"S Kaza","year":"2007","unstructured":"Kaza S, Wang Y, Chen H (2007) Enhancing border security: Mutual information analysis to identify suspect vehicles. Decis Support Syst 43(1):199\u2013210","journal-title":"Decis Support Syst"},{"key":"173_CR4","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1007\/978-3-540-73499-4_50","volume-title":"MLDM\u201907: Proceedings of the 5th international conference on machine learning and data mining in pattern recognition","author":"M Morzy","year":"2007","unstructured":"Morzy M (2007) Mining frequent trajectories of moving objects for location prediction. In: MLDM\u201907: Proceedings of the 5th international conference on machine learning and data mining in pattern recognition. Lecture notes in computer science, vol 4571. Springer, Berlin, pp 667\u2013680"},{"issue":"6","key":"173_CR5","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1016\/j.dss.2007.12.008","volume":"45","author":"W Chang","year":"2008","unstructured":"Chang W, Zeng D, Chen H (2008) Visualizing criminal relationships: Comparison of a hyperbolic tree and a hierarchical list. Decis Support Syst 45(6):697\u2013713","journal-title":"Decis Support Syst"},{"key":"173_CR6","first-page":"233","volume-title":"EDBT\u201902: Proceedings of the 8th international conference on extending database technology","author":"G Trajcevski","year":"2002","unstructured":"Trajcevski G, Wolfson O, Zhang F, Chamberlain S (2002) The geometry of uncertainty in moving objects databases. In: EDBT\u201902: Proceedings of the 8th international conference on extending database technology. Springer, London, pp 233\u2013250"},{"issue":"3","key":"173_CR7","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1145\/1016028.1016030","volume":"29","author":"G Trajcevski","year":"2004","unstructured":"Trajcevski G, Wolfson O, Hinrichs K, Chamberlain S (2004) Managing uncertainty in moving objects databases. ACM Trans Database Syst 29(3):463\u2013507","journal-title":"ACM Trans Database Syst"},{"key":"173_CR8","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1145\/1007568.1007637","volume-title":"SIGMOD\u201904: Proceedings of the 2004 ACM SIGMOD international conference on management of data","author":"Y Tao","year":"2004","unstructured":"Tao Y, Faloutsos C, Papadias D, Liu B (2004) Prediction and indexing of moving objects with unknown motion patterns. In: SIGMOD\u201904: Proceedings of the 2004 ACM SIGMOD international conference on management of data. ACM, New York, pp 611\u2013622"},{"key":"173_CR9","first-page":"451","volume-title":"UAI\u201903: Proceedings of the 19th conference on uncertainty in artificial intelligence","author":"U Nodelman","year":"2003","unstructured":"Nodelman U, Shelton CR, Koller D (2003) Learning continuous time Bayesian networks. In: UAI\u201903: Proceedings of the 19th conference on uncertainty in artificial intelligence. Morgan Kaufmann, San Francisco, pp 451\u2013458"},{"key":"173_CR10","first-page":"378","volume-title":"UAI\u201902: Proceedings of the 18th conference in uncertainty in artificial intelligence","author":"U Nodelman","year":"2002","unstructured":"Nodelman U, Shelton C, Koller D (2002) Continuous time Bayesian networks. In: UAI\u201902: Proceedings of the 18th conference in uncertainty in artificial intelligence. Morgan Kaufmann, San Francisco, pp 378\u2013387"},{"key":"173_CR11","first-page":"346","volume-title":"SDM\u201906: Proceedings of the 6th SIAM international conference on data mining","author":"F Giannotti","year":"2006","unstructured":"Giannotti F, Nanni M, Pedreschi D (2006) Efficient mining of temporally annotated sequences. In: SDM\u201906: Proceedings of the 6th SIAM international conference on data mining. SIAM, Bethesda, pp 346\u2013357"},{"key":"173_CR12","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1145\/1281192.1281230","volume-title":"KDD\u201907: Proceedings of the 13th ACM SIGKDD international conference on knowledge discovery and data mining","author":"F Giannotti","year":"2007","unstructured":"Giannotti F, Nanni M, Pinelli F, Pedreschi D (2007) Trajectory pattern mining. In: KDD\u201907: Proceedings of the 13th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, San Jose, pp 330\u2013339"},{"key":"173_CR13","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1109\/MDM.2004.1263051","volume-title":"MDM\u201904: Proceedings of the 2004 IEEE international conference on mobile data management","author":"HMO Mokhtar","year":"2004","unstructured":"Mokhtar HMO, Su J (2004) Universal trajectory queries for moving object databases. In: MDM\u201904: Proceedings of the 2004 IEEE international conference on mobile data management. IEEE Computer Society, Los Alamitos, pp 133\u2013144"},{"key":"173_CR14","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1145\/1014052.1014080","volume-title":"KDD\u201904: Proceedings of the 10th ACM SIGKDD international conference on knowledge discovery and data mining","author":"N Mamoulis","year":"2004","unstructured":"Mamoulis N, Cao H, Kollios G, Hadjieleftheriou M, Tao Y, Cheung DW (2004) Mining, indexing, and querying historical spatiotemporal data. In: KDD\u201904: Proceedings of the 10th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, pp 236\u2013245"},{"key":"173_CR15","volume-title":"Elements of the theory of Markov processes and their applications","author":"AT Bharucha-Reid","year":"1960","unstructured":"Bharucha-Reid AT (1960) Elements of the theory of Markov processes and their applications. McGraw-Hill, New York"},{"key":"173_CR16","unstructured":"Pei J, Han J, Mortazavi-Asl B, Pinto H, Chen Q, Dayal U, Hsu M (2001) Prefixspan: Mining sequential patterns by prefix-projected growth. In: ICDE\u201901: Proceedings of the 17th international conference on data engineering, Washington, DC, USA, pp 215\u2013224"},{"key":"173_CR17","first-page":"1","volume-title":"SIGMOD\u201900: Proceedings of the 2000 ACM SIGMOD international conference on management of data","author":"J Han","year":"2000","unstructured":"Han J, Pei J, Yin Y (2000) Mining frequent patterns without candidate generation. In: SIGMOD\u201900: Proceedings of the 2000 ACM SIGMOD international conference on management of data. ACM, New York, pp 1\u201312"},{"key":"173_CR18","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1145\/1141277.1141413","volume-title":"SAC\u201906: Proceedings of the 2006 ACM symposium on applied computing","author":"F Giannotti","year":"2006","unstructured":"Giannotti F, Nanni M, Pedreschi D, Pinelli F (2006) Mining sequences with temporal annotations. In: SAC\u201906: Proceedings of the 2006 ACM symposium on applied computing. ACM, New York, pp 593\u2013597"},{"issue":"2","key":"173_CR19","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1145\/1059981.1059984","volume":"23","author":"JJ Xu","year":"2005","unstructured":"Xu JJ, Chen H (2005) Crimenet explorer: a framework for criminal network knowledge discovery. ACM Trans Inf Syst 23(2):201\u2013226","journal-title":"ACM Trans Inf Syst"},{"issue":"4","key":"173_CR20","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MC.2004.1297301","volume":"37","author":"H Chen","year":"2004","unstructured":"Chen H, Chung W, Xu JJ, Wang G, Qin Y, Chau M (2004) Crime data mining: A general framework and some examples. Computer 37(4):50\u201356","journal-title":"Computer"},{"key":"173_CR21","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/11734628_16","volume-title":"Proceedings of intelligence and security informatics: International workshop, WISI 2006","author":"S Qiao","year":"2006","unstructured":"Qiao S, Tang C, Peng J, Fan H, Xiang Y (2006) Vccm mining: Mining virtual community core members based on gene expression programming. In: Chen H, Wang FY, Yang CC, Chau DZM, Chang K (eds) Proceedings of intelligence and security informatics: International workshop, WISI 2006, 9 April 2006. Lecture notes in computer science, vol 3917. Springer, Berlin, pp 133\u2013138"},{"issue":"10","key":"173_CR22","doi-asserted-by":"crossref","first-page":"1795","DOI":"10.3724\/SP.J.1016.2008.01795","volume":"31","author":"S Qiao","year":"2008","unstructured":"Qiao S, Tang C, Peng J, Liu W, Wen F, Qiu J (2008) Mining key members of crime networks based on personality trait simulation email analysis system. Chin J Comput 31(10):1795\u20131803 (in Chinese)","journal-title":"Chin J Comput"},{"issue":"6","key":"173_CR23","first-page":"101","volume":"48","author":"JJ Xu","year":"2005","unstructured":"Xu JJ, Chen H (2005) Criminal network analysis and visualization. Commun ACM 48(6):101\u2013107","journal-title":"Commun ACM"},{"issue":"3","key":"173_CR24","first-page":"282","volume":"1","author":"S Qiao","year":"2007","unstructured":"Qiao S, Tang C, Cheng Y, Peng J, Wen F (2007) A new hierarchical clustering algorithm based on tree edit distance. J Comput Sci Front 1(3):282\u2013292 (in Chinese)","journal-title":"J Comput Sci Front"},{"key":"173_CR25","first-page":"226","volume-title":"KDD\u201996: Proceedings of the 2nd international conference on knowledge discovery and data mining","author":"M Ester","year":"1996","unstructured":"Ester M, Kriegel H-P, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD\u201996: Proceedings of the 2nd international conference on knowledge discovery and data mining. AAAI Press, Pitsburgh, pp 226\u2013231"},{"key":"173_CR26","first-page":"981","volume-title":"AAAI\u201905: Proceedings of the 20th national conference on artificial intelligence","author":"K Gopalratnam","year":"2005","unstructured":"Gopalratnam K, Kautz HA, Weld DS (2005) Extending continuous time Bayesian networks. In: AAAI\u201905: Proceedings of the 20th national conference on artificial intelligence. AAAI Press, Pittsburgh, pp 981\u2013986"},{"key":"173_CR27","volume-title":"The computer music tutorial","author":"C Roads","year":"1996","unstructured":"Roads C (1996) The computer music tutorial. MIT Press, Cambridge"},{"issue":"2","key":"173_CR28","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1023\/A:1015231126594","volume":"6","author":"T Brinkhoff","year":"2002","unstructured":"Brinkhoff T (2002) A framework for generating network-based moving objects. Geoinformatica 6(2):153\u2013180","journal-title":"Geoinformatica"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-009-0173-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-009-0173-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-009-0173-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T12:18:36Z","timestamp":1684930716000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-009-0173-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,13]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,12]]}},"alternative-id":["173"],"URL":"https:\/\/doi.org\/10.1007\/s10489-009-0173-z","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,3,13]]}}}