{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:56:42Z","timestamp":1729616202135,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1109\/iske.2010.5680876","type":"proceedings-article","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T14:05:57Z","timestamp":1294409157000},"page":"218-223","source":"Crossref","is-referenced-by-count":1,"title":["AK-Modes: A weighted clustering algorithm for finding similar case subsets"],"prefix":"10.1109","author":[{"family":"Lianhang Ma","sequence":"first","affiliation":[]},{"family":"Yefang Chen","sequence":"additional","affiliation":[]},{"family":"Hao Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"19","article-title":"Matching and predicting crimes","author":"oatley","year":"2004","journal-title":"Proceedings of the Twenty-fourth SGAI International Conference on Knowledge Based Systems and Applications of Artificial Intelligence"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2009.5137289"},{"journal-title":"C4 5 Programs for Machine Learning","year":"1993","author":"quinlan","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1023\/A:1009769707641","article-title":"Extensions to the k-means algorithm for clustering large data sets with categorical values","volume":"2","author":"huang","year":"1998","journal-title":"Data Mining and Knowledge Discovery"},{"article-title":"UCI Repository of Machine Learning Databases","year":"1996","author":"merz","key":"ref14"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/971617.971618"},{"key":"ref3","first-page":"271","article-title":"Extracting Meaningful Entities from Police Narrative Reports","author":"chau","year":"2002","journal-title":"Proc Nat l Conf Digital Government Research"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502541"},{"key":"ref5","first-page":"1","article-title":"COPLINK: Visualization for crime analysis","author":"chen","year":"2003","journal-title":"Proc Nat l Conf Digital Government Research"},{"key":"ref8","first-page":"37","article-title":"Prediction of past unsolved terrorist attacks","author":"ozgul","year":"2009","journal-title":"Proceedings of the IEEE International Conference on Intelligence and Security Informatics"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IATW.2006.55"},{"key":"ref2","first-page":"1","article-title":"Crime Data Mining: An Overview and Case Studies","author":"chen","year":"2003","journal-title":"Proc 5th Annu Nat Conf Digital Government Research"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1297301"},{"key":"ref9","first-page":"171","article-title":"Data Mining Approches to Criminal Career Analysis","author":"bruin","year":"0","journal-title":"Proceedings of the Sixth International Conference on Data Mining"}],"event":{"name":"2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","start":{"date-parts":[[2010,11,15]]},"location":"Hangzhou, China","end":{"date-parts":[[2010,11,16]]}},"container-title":["2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5676709\/5680739\/05680876.pdf?arnumber=5680876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T18:08:41Z","timestamp":1497895721000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5680876\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iske.2010.5680876","relation":{},"subject":[],"published":{"date-parts":[[2010,11]]}}}