{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T21:57:15Z","timestamp":1774130235024,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2008,9,1]],"date-time":"2008-09-01T00:00:00Z","timestamp":1220227200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Artif Intell Law"],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1007\/s10506-008-9064-6","type":"journal-article","created":{"date-parts":[[2008,11,5]],"date-time":"2008-11-05T05:22:54Z","timestamp":1225862574000},"page":"245-276","source":"Crossref","is-referenced-by-count":10,"title":["Validation of a bayesian belief network representation for posterior probability calculations on national crime victimization survey"],"prefix":"10.1007","volume":"16","author":[{"given":"Michael","family":"Riesen","sequence":"first","affiliation":[]},{"given":"Gursel","family":"Serpen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,11,6]]},"reference":[{"key":"9064_CR1","unstructured":"Bray T, Paoli J, Sperberg-McQueen CM, Maler E, Yergeau F (2006) Extensible markup language (XML) 1.0 (4th edn)\u2014origin and goals. World Wide Web Consortium. Retrieved on October 29 (September 2006)"},{"key":"9064_CR2","unstructured":"Bouckaert R (2005) Bayesian network classifiers in WEKA. Technical Report, Department of Computer Science, Waikato University, Hamilton, NZ"},{"key":"9064_CR3","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1002\/int.10085","volume":"18","author":"LM Campos de","year":"2003","unstructured":"de Campos LM, Fern\u00e1ndez-Luna JM, Puerta JM (2003) An iterated local search algorithm for learning Bayesian networks with restarts based on conditional independence tests. Int J Intell Syst 18:221\u2013235","journal-title":"Int J Intell Syst"},{"key":"9064_CR4","unstructured":"Catalano SM (2004) Crime victimization 2004. September 2005, NCJ 210674. http:\/\/www.ojp.usdoj.gov\/bjs\/cvict_v.htm#page"},{"key":"9064_CR5","unstructured":"Catalano SM (2005) Crime Victimization 2005, September 2006, NCJ 214644. http:\/\/www.ojp.usdoj.gov\/bjs\/abstract\/cv05.htm (See also http:\/\/www.paralumun.com\/issuesrapestats.htm )"},{"key":"9064_CR6","unstructured":"Chickering DM, Geiger D, Heckerman D (1995) Learning Bayesian networks: search methods and experimental results. In: Preliminary papers of the fifth international workshop on artificial intelligence and statistics, pp 112\u2013128"},{"key":"9064_CR7","first-page":"309","volume":"9","author":"GF Cooper","year":"1992","unstructured":"Cooper GF, Herskovits E (1992) A Bayesian method for the induction of probabilistic networks from data. Mach Learn 9:309\u2013348","journal-title":"Mach Learn"},{"key":"9064_CR8","unstructured":"Cozman FG (2007) JavaBayes\u2014Bayesian networks in Java. Online access at http:\/\/www.cs.cmu.edu\/~javabayes\/index.html . Cited May"},{"key":"9064_CR10","unstructured":"Fenton N, Neil M (2000) The \u201cJury Observation Fallacy\u201d and the use of Bayesian networks to present probabilistic legal arguments. Math Today-Bull Inst Math"},{"key":"9064_CR11","unstructured":"Hart TC, Rennison C (2003) PhD, Bureau of Justice Statistics, \u201cSpecial Report\u201d, March 2003, NCJ 195710. http:\/\/www.ojp.usdoj.gov\/bjs\/abstract\/rcp00.htm"},{"key":"9064_CR12","doi-asserted-by":"crossref","unstructured":"Heckerman D (1997) A tutorial on learning with Bayesian networks. In: Jordan M (ed) Learning in graphical models, MIT Press, Cambridge, MA, 1999. Also appears as Technical Report MSR-TR-95-06, Microsoft Research, March 1995. An earlier version appears as Bayesian networks for data mining, Data Min Knowl Disc 1:79\u2013119","DOI":"10.1007\/978-94-011-5014-9_11"},{"key":"9064_CR13","first-page":"197","volume":"20","author":"D Heckerman","year":"1995","unstructured":"Heckerman D, Geiger D, Chickering DM (1995) Learning Bayesian networks: the combination of knowledge and statistical data. Mach Learn 20:197\u2013243","journal-title":"Mach Learn"},{"key":"9064_CR14","unstructured":"Madden M (2003) The performance of Bayesian network classifiers constructed using different techniques. In: Working notes of the ECML\/PKDD-03 workshop on probabilistic graphical models for classification, pp 59\u201370"},{"key":"9064_CR15","unstructured":"Mitchell TM (2006) The discipline of machine learning. July 2006 CMU-ML-06-108 School of Computer Science, Carnegie Mellon University, Pittsburgh, PA 15213"},{"key":"9064_CR16","unstructured":"SAS (2004) The original data for this paper was generated using SAS software. Copyright, SAS Institute Inc. SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc., Cary, NC, USA"},{"key":"9064_CR17","unstructured":"U.S. Dept. of Justice, Bureau of Justice Statistics (2005) 2005 Summary findings. http:\/\/www.ojp.usdoj.gov\/bjs\/cvict_v.htm#page"},{"key":"9064_CR18","unstructured":"U.S. Dept. of Justice, Bureau of Justice Statistics (2007) National crime victimization survey: MSA DATA, 1979\u20132004 (Computer file). ICPSR04576-v1. Conducted by U.S. Dept. of Commerce, Bureau of the Census"},{"key":"9064_CR19","unstructured":"ICPSR, Inter-university Consortium for Political and Social Research, Ann Arbor, MI. http:\/\/www.icpsr.umich.edu\/cocoon\/NACJD\/STUDY\/04576.xml"},{"key":"9064_CR20","volume-title":"Data mining: practical machine learning tools and techniques","author":"IH Witten","year":"2005","unstructured":"Witten IH, Frank E (2005) Data mining: practical machine learning tools and techniques, 2nd edn. Morgan Kaufmann, San Francisco","edition":"2"}],"container-title":["Artificial Intelligence and Law"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10506-008-9064-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10506-008-9064-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10506-008-9064-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T14:57:15Z","timestamp":1559141835000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10506-008-9064-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,9]]}},"alternative-id":["9064"],"URL":"https:\/\/doi.org\/10.1007\/s10506-008-9064-6","relation":{},"ISSN":["0924-8463","1572-8382"],"issn-type":[{"value":"0924-8463","type":"print"},{"value":"1572-8382","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,9]]}}}