{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:08:00Z","timestamp":1729613280243,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/icsmc.2010.5641797","type":"proceedings-article","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T16:35:53Z","timestamp":1291134953000},"page":"2716-2723","source":"Crossref","is-referenced-by-count":3,"title":["An application of Cyclic Signature (CS) clustering for spatial-temporal pattern analysis to support public safety work"],"prefix":"10.1109","author":[{"given":"Stephen","family":"Chan","sequence":"first","affiliation":[]},{"given":"Kelvin","family":"Leong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Geographic Information Systems and Science","year":"2005","author":"longley","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1038\/nature06958"},{"first-page":"48","year":"1993","author":"everitt","key":"ref31"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1007\/s10791-008-9066-8","article-title":"A comparison of Extrinsic Clustering Evaluation Metrics based on Formal Constraints","volume":"12","author":"enrique","year":"2009","journal-title":"Information Retrieval"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2307\/143141"},{"key":"ref11","article-title":"Temporal Association Rules with Numerical Attributes","author":"wang","year":"1999","journal-title":"UCLA Technical Report"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2001.914839"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2004.63"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/11408079_60"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.90"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014095"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099680"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-387-6.ch006"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/181550.181560"},{"journal-title":"Visitor profile report 2004","year":"2004","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1161583"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2307\/2094589"},{"key":"ref3","first-page":"431","article-title":"The MV3R-Tree: A Spatio-Temporal Access Method for Timestamp and Interval Queries","author":"tao","year":"2001","journal-title":"Proceedings of the Conference on Very Large Data Bases"},{"key":"ref6","article-title":"Mapping Crime: Understanding Hot Spots","author":"gonzales","year":"2005","journal-title":"U S Department of Justice Report"},{"key":"ref29","article-title":"Criterion functions for document clustering: Experiments and analysis","author":"zhao","year":"2001","journal-title":"Tech Rep 05&#x2013;04"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75177-9_11"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/1476-072X-8-36"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/1561426042000191305"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/958942.958943"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2005.04.015"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007637"},{"key":"ref20","first-page":"768","article-title":"Cluster analysis of multivariate data: efficiency vs interpretability of classifications","volume":"21","author":"forgy","year":"1965","journal-title":"Biometrics"},{"key":"ref22","first-page":"324","article-title":"Tourism and crime in Mexico","volume":"56","author":"jud","year":"1975","journal-title":"Social Sciences Quarterly"},{"key":"ref21","first-page":"281","article-title":"Some Methods for classification and Analysis of Multivariate Observations","volume":"1","author":"macqueen","year":"1967","journal-title":"Proceedings of 5-th Berkeley Symposium on Mathematical Statistics and Probability"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"968","DOI":"10.1016\/S0160-7383(99)00031-6","article-title":"Tourism and crime in the Caribbean","volume":"26","author":"mcelroy","year":"1999","journal-title":"Annals of Tourism Research"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1111\/j.1536-7150.1987.tb01992.x","article-title":"Some determinants of property crime: economic factors influence criminal behavior but cannot completely explain the syndrome","volume":"46","author":"roy","year":"1987","journal-title":"American Journal of Economics and Sociology"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.2307\/3145040"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1080\/00222216.1983.11969549","article-title":"Tourism and Crime: An Australian Perspective","volume":"15","author":"walmsley","year":"1983","journal-title":"Journal of Leisure Research"}],"event":{"name":"2010 IEEE International Conference on Systems, Man and Cybernetics - SMC","start":{"date-parts":[[2010,10,10]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2010,10,13]]}},"container-title":["2010 IEEE International Conference on Systems, Man and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5629466\/5641665\/05641797.pdf?arnumber=5641797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T13:59:23Z","timestamp":1559829563000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5641797\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2010.5641797","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}