{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T07:45:25Z","timestamp":1772264725792,"version":"3.50.1"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/isi.2015.7165934","type":"proceedings-article","created":{"date-parts":[[2015,7,27]],"date-time":"2015-07-27T21:16:54Z","timestamp":1438031814000},"page":"25-30","source":"Crossref","is-referenced-by-count":10,"title":["Learning where to inspect: Location learning for crime prediction"],"prefix":"10.1109","author":[{"given":"Mohammad A.","family":"Tayebi","sequence":"first","affiliation":[]},{"given":"Uwe","family":"Glausser","sequence":"additional","affiliation":[]},{"given":"Patricia L.","family":"Brantingham","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"tayebi","year":"2014","journal-title":"Crimetracer Activity space based crime location prediction"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2424321.2424412"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2525314.2525357"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195369083.001.0001"},{"key":"ref4","author":"grimmett","year":"1989","journal-title":"Probability and Random Processes"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/nature06958"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/2193-7680-2-10"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-2070(03)00094-3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.1989.tb00862.x"},{"key":"ref7","author":"rossmo","year":"2000","journal-title":"Geographic Profiling"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0272-4944(05)80212-9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935914"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1142\/S0218202508003029"}],"event":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","location":"Baltimore, MD, USA","start":{"date-parts":[[2015,5,27]]},"end":{"date-parts":[[2015,5,29]]}},"container-title":["2015 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7153595\/7165923\/07165934.pdf?arnumber=7165934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T19:44:52Z","timestamp":1490384692000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7165934\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/isi.2015.7165934","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}