{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:35:36Z","timestamp":1754487336384},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,2,5]],"date-time":"2010-02-05T00:00:00Z","timestamp":1265328000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1007\/s10489-009-0208-5","type":"journal-article","created":{"date-parts":[[2010,2,4]],"date-time":"2010-02-04T19:06:49Z","timestamp":1265310409000},"page":"134-161","source":"Crossref","is-referenced-by-count":14,"title":["Compositional Bayesian modelling for computation of evidence collection strategies"],"prefix":"10.1007","volume":"35","author":[{"given":"Jeroen","family":"Keppens","sequence":"first","affiliation":[]},{"given":"Qiang","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Price","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,2,5]]},"reference":[{"key":"208_CR1","doi-asserted-by":"crossref","DOI":"10.1002\/0470011238","volume-title":"Statistics and the evaluation of evidence","author":"C Aitken","year":"2004","unstructured":"Aitken C, Taroni F (2004) Statistics and the evaluation of evidence. Wiley, New York"},{"issue":"3","key":"208_CR2","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/S0040-5809(03)00004-2","volume":"63","author":"C Aitken","year":"2003","unstructured":"Aitken C, Taroni F, Garbolino P (2003) A graphical model for the evaluation of cross-transfer evidence in DNA profiles. Theor Popul Biol 63(3):179\u2013190","journal-title":"Theor Popul Biol"},{"key":"208_CR3","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1093\/lpr\/mgm007","volume":"6","author":"F Bex","year":"2007","unstructured":"Bex F, van\u00a0den Braak S, van Oostendorp H, Prakken H, Verheij B, Vreeswijk G (2007) Sense-making software for crime investigation: how to combine stories and arguments? Law Probab Risk 6:145\u2013168","journal-title":"Law Probab Risk"},{"issue":"2\u20133","key":"208_CR4","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.forsciint.2005.09.008","volume":"157","author":"A Biedermann","year":"2006","unstructured":"Biedermann A, Taroni F (2006) Bayesian networks and probabilistic reasoning about scientific evidence when there is a lack of data. Forensic Sci Int 157(2\u20133):163\u2013167","journal-title":"Forensic Sci Int"},{"issue":"1","key":"208_CR5","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1080\/1360086032000063156","volume":"17","author":"M Bromby","year":"2003","unstructured":"Bromby M, MacMillan M, McKellar P (2003) A CommonKADS representation for a knowledge based system to evaluate eyewitness identification. Int Rev Law Comput Technol 17(1):99\u2013108","journal-title":"Int Rev Law Comput Technol"},{"issue":"3","key":"208_CR6","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/S0167-9236(02)00121-5","volume":"34","author":"H Chen","year":"2002","unstructured":"Chen H, Schroeder J, Hauck RV, Ridgeway L, Atabakhsh H, Gupta H, Boarman C, Rasmussen K, Clements AW (2002) COPLINK Connect: Information and knowledge management for law enforcement. Decis Support Syst 34(3):271\u2013285. Special Issue on Digital Government","journal-title":"Decis Support Syst"},{"key":"208_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-5149-2","volume-title":"Robust model-based fault diagnosis for dynamic systems","author":"J Chen","year":"1999","unstructured":"Chen J, Patton R (1999) Robust model-based fault diagnosis for dynamic systems. Kluwer Academic, Dordrecht"},{"issue":"6","key":"208_CR8","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1145\/58566.59297","volume":"4","author":"J Conklin","year":"1988","unstructured":"Conklin J, Begeman M (1988) gIBIS: a hypertext tool for exploratory policy discussion. ACM Trans Off Inf Syst 4(6):303\u2013331","journal-title":"ACM Trans Off Inf Syst"},{"key":"208_CR9","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/S1355-0306(98)72099-4","volume":"38","author":"R Cook","year":"1998","unstructured":"Cook R, Evett I, Jackson G, Jones P, Lambert J (1998) A model for case assessment and interpretation. Sci Justice 38:151\u2013156","journal-title":"Sci Justice"},{"key":"208_CR10","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/S1355-0306(99)72028-9","volume":"39","author":"R Cook","year":"1999","unstructured":"Cook R, Evett I, Jackson G, Jones P, Lambert J (1999) Case pre-assessment and review in a two-way transfer case. Sci Justice 39:103\u2013111","journal-title":"Sci Justice"},{"issue":"1","key":"208_CR11","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/S0378-3758(01)00209-9","volume":"105","author":"G Cooman de","year":"2002","unstructured":"de Cooman G (2002) Precision\u2014imprecision equivalence in a broad class of imprecise hierarchical uncertainty models. J Stat Plan Inference 105(1):175\u2013198","journal-title":"J Stat Plan Inference"},{"key":"208_CR12","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/0004-3702(86)90080-9","volume":"28","author":"J Kleer de","year":"1986","unstructured":"de Kleer J (1986) An assumption-based TMS. Artif Intell 28:127\u2013162","journal-title":"Artif Intell"},{"key":"208_CR13","volume-title":"Human-computer interaction","author":"A Dix","year":"2004","unstructured":"Dix A, Finlay J, Abowd G, Beale R (2004) Human-computer interaction, 3rd edn. Prentice Hall, New York","edition":"3"},{"key":"208_CR14","unstructured":"Dixon D (1999) Police investigative procedures. In: Walker, C., Starmer, K. (eds) Miscarriage of justice. A review of justice in error, pp\u00a065\u201382"},{"key":"208_CR15","unstructured":"Druzdzel M, Henrion M (1993) Efficient reasoning in qualitative probabilistic networks. In: Proceedings of the 11th conference on artificial intelligence, pp 548\u2013553"},{"key":"208_CR16","unstructured":"Dzemydiene D, Rudzkiene V (2000) Multiple regression analysis in crime pattern warehouse for decision support. In: Proceedings of the 13th international conference on database and expert systems applications, pp 249\u2013258"},{"key":"208_CR17","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/S1355-0306(00)71993-9","volume":"40","author":"I Evett","year":"2000","unstructured":"Evett I, Jackson G, Lambert J, McCrossan S (2000) The impact of the principles of evidence interpretation on the structure and content of statements. Sci Justice 40:233\u2013239","journal-title":"Sci Justice"},{"key":"208_CR18","doi-asserted-by":"crossref","DOI":"10.1515\/9781503620766","volume-title":"A theory of cognitive dissonance","author":"L Festinger","year":"1957","unstructured":"Festinger L (1957) A theory of cognitive dissonance. Row Peterson, Evanston"},{"key":"208_CR19","volume-title":"Model driven engineering and ontology development","author":"D Ga\u0161evi\u0107","year":"2009","unstructured":"Ga\u0161evi\u0107 D, Djuri\u0107 D, Deved\u017ei\u0107 V (2009) Model driven engineering and ontology development, 2nd edn. Springer, New York","edition":"2"},{"issue":"3\u20134","key":"208_CR20","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/S0020-0255(99)00089-4","volume":"121","author":"I Goodman","year":"1999","unstructured":"Goodman I, Nguyen H (1999) Probability updating using second order probabilities and conditional event algebra. Inf Sci 121(3\u20134):295\u2013347","journal-title":"Inf Sci"},{"key":"208_CR21","doi-asserted-by":"crossref","unstructured":"Halliwell J, Keppens J, Shen Q (2003) Linguistic Bayesian networks for reasoning with subjective probabilities in forensic statistics. In: Proceedings of the 9th international conference on artificial intelligence and law, pp 42\u201350","DOI":"10.1145\/1047788.1047795"},{"issue":"2","key":"208_CR22","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/s00500-008-0304-1","volume":"13","author":"J Halliwell","year":"2009","unstructured":"Halliwell J, Shen Q (2009) Linguistic probabilities: theory and applications. Soft Comput 13(2):169\u2013183","journal-title":"Soft Comput"},{"key":"208_CR23","volume-title":"Readings in model-based diagnosis","year":"1992","unstructured":"Hamscher W, Console L, de Kleer J (eds) (1992) Readings in model-based diagnosis. Morgan-Kaufmann, San Mateo"},{"key":"208_CR24","volume-title":"Principles of data mining","author":"D Hand","year":"2001","unstructured":"Hand D, Mannila H, Smyth P (2001) Principles of data mining. MIT Press, Cambridge"},{"issue":"3","key":"208_CR25","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/2.989927","volume":"35","author":"RV Hauck","year":"2002","unstructured":"Hauck RV, Atabakhsh H, Ongvasith P, Gupta H, Chen H (2002) Using Coplink to analyze criminal justice data. IEEE Comput 35(3):30\u201337","journal-title":"IEEE Comput"},{"key":"208_CR26","doi-asserted-by":"crossref","unstructured":"Hepler A, Dawid A, Leucari V (2007) Object-oriented graphical representations of complex patterns of evidence. Law Probab Risk 6(1\u20134)","DOI":"10.1093\/lpr\/mgm005"},{"key":"208_CR27","unstructured":"Irving B, Dunningham C (1993) Human factors in the quality control of CID investigations and a brief review of relevant police training. R Comm Crim Justice Res Stud 21"},{"key":"208_CR28","volume-title":"Forensic science","author":"A Jackson","year":"2008","unstructured":"Jackson A, Jackson J (2008) Forensic science, 2nd edn. Pearsons Education, Upper Saddle Revir","edition":"2"},{"issue":"1","key":"208_CR29","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/S1355-0306(04)71678-0","volume":"44","author":"A Jamieson","year":"2004","unstructured":"Jamieson A (2004) A rational approach to the principles and practice of crime scene investigation: I. Principles. Sci Justice 44(1): 3\u20137","journal-title":"Sci Justice"},{"key":"208_CR30","doi-asserted-by":"crossref","unstructured":"Kaza S, Wang Y, Chen H (2006) Suspect vehicle identification for border safety with modified mutual information. In: Proceedings of the IEEE international conference on intelligence and security informatics, pp 308\u2013318","DOI":"10.1007\/11760146_27"},{"key":"208_CR31","doi-asserted-by":"crossref","unstructured":"Keppens J (2007) Towards qualitative approaches to Bayesian evidential reasoning. In: Proceedings of the 11th international conference on artificial intelligence and law, pp 17\u201325","DOI":"10.1145\/1276318.1276322"},{"issue":"2","key":"208_CR32","doi-asserted-by":"crossref","first-page":"2003","DOI":"10.1016\/j.eswa.2005.07.011","volume":"30","author":"J Keppens","year":"2006","unstructured":"Keppens J, Schafer B (2006) Knowledge based crime scenario modelling. Expert Syst Appl 30(2):2003\u2013222","journal-title":"Expert Syst Appl"},{"key":"208_CR33","unstructured":"Keppens J, Shen Q (2004) Causality enabled compositional modelling of Bayesian networks. In: Proceedings of the 18th international workshop on qualitative reasoning about physical systems, pp 33\u201340"},{"key":"208_CR34","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1613\/jair.1335","volume":"21","author":"J Keppens","year":"2004","unstructured":"Keppens J, Shen Q (2004) Compositional model repositories via dynamic constraint satisfaction with order-of-magnitude preferences. J Artif Intell Res 21:499\u2013550","journal-title":"J Artif Intell Res"},{"key":"208_CR35","doi-asserted-by":"crossref","unstructured":"Keppens J, Shen Q, Schafer B (2005) Probabilistic abductive computation of evidence collection strategies in crime investigation. In: Proceedings of the 10th international conference on artificial intelligence and law, pp 215\u2013224","DOI":"10.1145\/1165485.1165520"},{"key":"208_CR36","doi-asserted-by":"crossref","unstructured":"Keppens J, Zeleznikow J (2003) A model based reasoning approach for generating plausible crime scenarios from evidence. In: Proceedings of the 9th international conference on artificial intelligence and law, pp 51\u201359","DOI":"10.1145\/1047788.1047796"},{"key":"208_CR37","series-title":"International Federation for Information Processing","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/978-0-387-84927-0_22","volume-title":"Advances in digital forensics IV","author":"M Kwan","year":"2008","unstructured":"Kwan M, Chow K, Law F, Lai P (2008) Reasoning about evidence using Bayesian networks. In: Advances in digital forensics IV. International Federation for Information Processing. Springer, New York, pp 275\u2013289"},{"key":"208_CR38","doi-asserted-by":"crossref","unstructured":"Loui R, Norman J, Alpeter J, Pinkard D, Craven D, Linsday J, Foltz M (1997) Progress on room 5: a testbed for public interactive semi-formal legal argumentation. In: Proceedings of the 6th international conference on artificial intelligence and law, pp 207\u2013214","DOI":"10.1145\/261618.261655"},{"key":"208_CR39","volume-title":"Machine learning","author":"TM Mitchell","year":"1997","unstructured":"Mitchell TM (1997) Machine learning. McGraw-Hill, New York"},{"issue":"3","key":"208_CR40","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/S0040-5809(03)00006-6","volume":"63","author":"J Mortera","year":"2003","unstructured":"Mortera J, Dawid A, Lauritzen S (2003) Probabilistic expert systems for dna mixture profiling. Theor Popul Biol 63(3):191\u2013205","journal-title":"Theor Popul Biol"},{"key":"208_CR41","first-page":"1","volume-title":"Forensic science: an introduction to scientific and investigative techniques","author":"J Nordby","year":"2005","unstructured":"Nordby J (2005) Here we stand: What a forensic scientist does. In: James S, Nordby J (eds) Forensic science: an introduction to scientific and investigative techniques. CRC Press, Boca Raton, pp 1\u201314"},{"issue":"1","key":"208_CR42","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s10506-006-9023-z","volume":"14","author":"G Oatley","year":"2006","unstructured":"Oatley G, Ewart B, Zeleznikow J (2006) Decision support systems for police: lessons from the application of data mining techniques to \u201csoft\u201d forensic evidence. Artif Intell Law 14(1):35\u2013100","journal-title":"Artif Intell Law"},{"key":"208_CR43","unstructured":"Parsons S (1995) Refining reasoning in qualitative probabilistic networks. In: Proceedings of the 11th conference on uncertainty in artificial intelligence"},{"issue":"3","key":"208_CR44","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1142\/S0218488503002132","volume":"11","author":"S Parsons","year":"2003","unstructured":"Parsons S (2003) Qualitative probability and order of magnitude reasoning. Int J Uncertain, Fuzziness Knowl-Based Syst 11(3):373\u2013390","journal-title":"Int J Uncertain, Fuzziness Knowl-Based Syst"},{"key":"208_CR45","volume-title":"Probabilistic reasoning in intelligent systems: networks of plausible inference","author":"J Pearl","year":"1988","unstructured":"Pearl J (1988) Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan-Kaufmann, San Mateo"},{"issue":"2","key":"208_CR46","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1111\/j.1467-8640.1989.tb00319.x","volume":"5","author":"D Poole","year":"1989","unstructured":"Poole D (1989) Explanation and prediction: An architecture for default and abductive reasoning. Comput Intell 5(2):97\u2013110","journal-title":"Comput Intell"},{"key":"208_CR47","doi-asserted-by":"crossref","unstructured":"Prakken H, Reed C, Walton D (2003) Argumentation schemes and generalisations in reasoning about evidence. In: Proceedings of the 9th international conference on artificial intelligence and law, pp 215\u2013224","DOI":"10.1145\/1047788.1047794"},{"key":"208_CR48","doi-asserted-by":"crossref","unstructured":"Redmond M, Blackburn Line C (2003) Empirical analysis of case-based reasoning and other prediction methods in a social science domain: Repeat criminal victimization. In: Proceedings of the 5th international conference on case-based reasoning, pp 452\u2013464","DOI":"10.1007\/3-540-45006-8_35"},{"issue":"1","key":"208_CR49","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1017\/S0269888907001051","volume":"22","author":"C Reed","year":"2007","unstructured":"Reed C, Walton D, Macagno F (2007) Argument diagramming in logic, law and artificial intelligence. Knowl Eng Rev 22(1):87\u2013109","journal-title":"Knowl Eng Rev"},{"key":"208_CR50","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/S0004-3702(02)00247-3","volume":"140","author":"S Renooij","year":"2002","unstructured":"Renooij S, van\u00a0der Gaag L, Parsons S (2002) Context-specific sign-propagation in qualitative probabilistic networks. Artif Intell 140:207\u2013230","journal-title":"Artif Intell"},{"key":"208_CR51","volume-title":"The evidential foundations of probabilistic reasoning","author":"D Schum","year":"1994","unstructured":"Schum D (1994) The evidential foundations of probabilistic reasoning. Northwestern University Press, Evanston"},{"issue":"2","key":"208_CR52","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1093\/lpr\/mgl014","volume":"5","author":"Q Shen","year":"2006","unstructured":"Shen Q, Keppens J, Aitken C, Schafer B, Lee M (2006) A\u00a0scenario-driven decision support system for serious crime investigation. Law Probab Risk 5(2):87\u2013117","journal-title":"Law Probab Risk"},{"key":"208_CR53","doi-asserted-by":"crossref","DOI":"10.1002\/0470091754","volume-title":"Bayesian networks and probabilistic inference in forensic science","author":"F Taroni","year":"2006","unstructured":"Taroni F, Aitken C, Garbolino P, Biedermann A (2006) Bayesian networks and probabilistic inference in forensic science. Wiley, New York"},{"issue":"1","key":"208_CR54","first-page":"106","volume":"15","author":"J Toland","year":"2005","unstructured":"Toland J, Rees B (2005) Applying case-based reasoning to law enforcement. Int Assoc Law Enforc Intell Anal J 15(1):106\u2013125","journal-title":"Int Assoc Law Enforc Intell Anal J"},{"key":"208_CR55","unstructured":"Verheij B (1999) Automated argumentation assistance for lawyers. In: Proceedings of the 7th international conference on artificial intelligence and law, pp 43\u201352"},{"key":"208_CR56","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/BF01236566","volume":"31","author":"J Plato von","year":"1989","unstructured":"von Plato J (1989) De\u00a0Finetti\u2019s earliest works on the foundations of probability. Erkenntnis 31:263\u2013282","journal-title":"Erkenntnis"},{"key":"208_CR57","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1080\/03081079708945189","volume":"9","author":"P Walley","year":"1997","unstructured":"Walley P (1997) Statistical inferences based on a second-order possibility distribution. Int J Gen Syst 9:337\u2013383","journal-title":"Int J Gen Syst"},{"key":"208_CR58","first-page":"711","volume":"2","author":"D Walton","year":"2000","unstructured":"Walton D (2000) Argumentation and theory of evidence. New Trends Crim Invest Evid 2:711\u2013732","journal-title":"New Trends Crim Invest Evid"},{"key":"208_CR59","doi-asserted-by":"crossref","DOI":"10.1039\/9781847550651","volume-title":"Crime scene to court: the essentials of forensic science","author":"P White","year":"2004","unstructured":"White P (2004) Crime scene to court: the essentials of forensic science, 2nd edn. The Royal Society of Chemistry, Cambridge","edition":"2"},{"key":"208_CR60","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.dss.2004.02.006","volume":"41","author":"Y Xianga","year":"2005","unstructured":"Xianga Y, Chau M, Atabakhsh H, Chen H (2005) Visualizing criminal relationships: comparison of a hyperbolic tree and a hierarchical list. Decis Support Syst 41:69\u201383","journal-title":"Decis Support Syst"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-009-0208-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-009-0208-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-009-0208-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T23:57:29Z","timestamp":1685404649000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-009-0208-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2,5]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,8]]}},"alternative-id":["208"],"URL":"https:\/\/doi.org\/10.1007\/s10489-009-0208-5","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,2,5]]}}}