{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:44:49Z","timestamp":1729619089152,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1109\/isi.2010.5484782","type":"proceedings-article","created":{"date-parts":[[2010,6,23]],"date-time":"2010-06-23T15:18:28Z","timestamp":1277306308000},"page":"13-18","source":"Crossref","is-referenced-by-count":2,"title":["Identifying high risk crime areas using topology"],"prefix":"10.1109","author":[{"given":"Richard","family":"Frank","sequence":"first","affiliation":[]},{"given":"Andrew J.","family":"Park","sequence":"additional","affiliation":[]},{"given":"Patricia L.","family":"Brantingham","sequence":"additional","affiliation":[]},{"given":"Joseph","family":"Clare","sequence":"additional","affiliation":[]},{"given":"Kathryn","family":"Wuschke","sequence":"additional","affiliation":[]},{"given":"Mona","family":"Vajihollahi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Wayfinding Behavior Cognitive Mapping and Other Spatial Processes","year":"1999","author":"golledge","key":"ref10"},{"key":"ref11","first-page":"363","article-title":"Human wayfinding in unfamiliar buildings: a simulation with a cognizing agent","volume":"2?3","author":"raubal","year":"2001","journal-title":"Cognitive Processing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1037\/a0016273"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0272-4944(05)80212-9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1177\/0022427806286566"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-2070(03)00094-3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azh070"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2005.1571717"},{"key":"ref18","article-title":"Clustering for mining in large spatial databases","volume":"1","author":"ester","year":"1998","journal-title":"Kl-Journal"},{"key":"ref19","first-page":"428","article-title":"Wavecluster: A multiresolution clustering approach for very large spatial databases","author":"sheikholeslami","year":"1998","journal-title":"Proc the 28th International Conference on Very Large Data Bases"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4135\/9781412979993.n67"},{"key":"ref3","first-page":"201","article-title":"Space-time patterns of risk: A cross national assessment of residential burglary victimization. journal of quantitative criminology, 23, 201-219","volume":"23","author":"johnson","year":"2007","journal-title":"Criminology"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1515\/mks-2009-922-312","article-title":"Crime propensity, criminogenic exposure and crime involvement in early to mid adolescence","volume":"92","author":"wikstroem","year":"2009","journal-title":"Monatsschrift Fur Kriminologie Und Strafrechtsreform"},{"journal-title":"Breaking and Entering An Ethnographic Analysis of Burglary","year":"1991","author":"cromwell","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10940-006-9021-z"},{"journal-title":"Crime in Everyday Life","year":"1998","author":"felson","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.2009.00140.x"},{"key":"ref1","article-title":"Patricia","author":"brantingham","year":"1991","journal-title":"Environmental Criminology"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2007.05.010"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2009.5137266"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2007.4281401"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01393-5_2"},{"key":"ref23","first-page":"1121","article-title":"Stability of K-Means Clustering","author":"rakhlin","year":"2006","journal-title":"NIPS"}],"event":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","start":{"date-parts":[[2010,5,23]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2010,5,26]]}},"container-title":["2010 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5476380\/5484728\/05484782.pdf?arnumber=5484782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,6]],"date-time":"2020-06-06T02:28:58Z","timestamp":1591410538000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5484782\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/isi.2010.5484782","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}