{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:16Z","timestamp":1750220896131,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T00:00:00Z","timestamp":1572912000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,5]]},"DOI":"10.1145\/3356995.3364538","type":"proceedings-article","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T15:44:57Z","timestamp":1571845497000},"page":"53-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Approach to Approximate Crime Hotspots to the Road Network"],"prefix":"10.1145","author":[{"given":"Francisco C. F. Nunes","family":"Junior","sequence":"first","affiliation":[{"name":"Insight Data Science Lab, Cear\u00e1, Brazil"}]},{"given":"Ticiana L. Coelho da","family":"Silva","sequence":"additional","affiliation":[{"name":"Insight Data Science Lab, Cear\u00e1, Brazil"}]},{"given":"Jos\u00e9 F. de Queiroz","family":"Neto","sequence":"additional","affiliation":[{"name":"Insight Data Science Lab, Cear\u00e1, Brazil"}]},{"given":"Jos\u00e9 Ant\u00f4nio F. de","family":"Mac\u00eado","sequence":"additional","affiliation":[{"name":"Insight Data Science Lab, Cear\u00e1, Brazil"}]},{"given":"Wellington Clay","family":"Porcino","sequence":"additional","affiliation":[{"name":"National Department of Public Security, Federal District, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2019,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"James Bergstra and Yoshua Bengio. 2012. Random search for hyper-parameter optimization. Journal of Machine Learning Research (2012).  James Bergstra and Yoshua Bengio. 2012. Random search for hyper-parameter optimization. Journal of Machine Learning Research (2012)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.sj.8350066"},{"volume-title":"CPC: Crime, Policing and Citizenship - Intelligent policing and big data.","year":"2016","author":"Cheng T","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Jose Florencio de Queiroz Neto Emanuele Marques dos Santos and Creto Augusto Vidal. 2016. Mskde-using marching squares to quickly make high quality crime hotspot maps. In 29th SIBGRAPI.  Jose Florencio de Queiroz Neto Emanuele Marques dos Santos and Creto Augusto Vidal. 2016. Mskde-using marching squares to quickly make high quality crime hotspot maps. In 29th SIBGRAPI.","DOI":"10.1109\/SIBGRAPI.2016.049"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Coral Featherstone. 2013. Identifying vehicle descriptions in microblogging text with the aim of reducing or predicting crime. In IEEE ICAST.  Coral Featherstone. 2013. Identifying vehicle descriptions in microblogging text with the aim of reducing or predicting crime. In IEEE ICAST.","DOI":"10.1109\/ICASTech.2013.6707494"},{"volume-title":"26th ACM SIGSPATIAL.","author":"Fu Kaiqun","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.02.003"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Eva GT Green Christian Staerkle and David O Sears. 2006. Symbolic racism and Whites' attitudes towards punitive and preventive crime policies. Law and Human Behavior (2006).  Eva GT Green Christian Staerkle and David O Sears. 2006. Symbolic racism and Whites' attitudes towards punitive and preventive crime policies. Law and Human Behavior (2006).","DOI":"10.1007\/s10979-006-9020-5"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Paul J Gruenewald Bridget Freisthler Lillian Remer Elizabeth A LaScala and Andrew Treno. 2006. Ecological models of alcohol outlets and violent assaults: crime potentials and geospatial analysis. Addiction (2006).  Paul J Gruenewald Bridget Freisthler Lillian Remer Elizabeth A LaScala and Andrew Treno. 2006. Ecological models of alcohol outlets and violent assaults: crime potentials and geospatial analysis. Addiction (2006).","DOI":"10.1111\/j.1360-0443.2006.01405.x"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1108\/PIJPSM-04-2013-0039"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271793"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Leslie W. Kennedy Joel M. Caplan and Eric Piza. 2011. Risk Clusters Hotspots and Spatial Intelligence: Risk Terrain Modeling as an Algorithm for Police Resource Allocation Strategies. Journal of Quantitative Criminology (2011).  Leslie W. Kennedy Joel M. Caplan and Eric Piza. 2011. Risk Clusters Hotspots and Spatial Intelligence: Risk Terrain Modeling as an Algorithm for Police Resource Allocation Strategies. Journal of Quantitative Criminology (2011).","DOI":"10.1007\/s10940-010-9126-2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"David J Ketchen and Christopher L Shook. 1996. The application of cluster analysis in strategic management research: an analysis and critique. Strategic management journal (1996).  David J Ketchen and Christopher L Shook. 1996. The application of cluster analysis in strategic management research: an analysis and critique. Strategic management journal (1996).","DOI":"10.1002\/(SICI)1097-0266(199606)17:6<441::AID-SMJ819>3.0.CO;2-G"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Drago Krznaric and Christos Levcopoulos. 1998. Fast algorithms for complete linkage clustering. Discrete & Computational Geometry (1998).  Drago Krznaric and Christos Levcopoulos. 1998. Fast algorithms for complete linkage clustering. Discrete & Computational Geometry (1998).","DOI":"10.1007\/PL00009332"},{"volume-title":"23rd SIGSPATIAL.","author":"Magalh\u00e3es Regis Pires","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","unstructured":"Christopher Manning Prabhakar Raghavan and Hinrich Sch\u00fctze. 2010. Introduction to information retrieval. Natural Language Engineering (2010).  Christopher Manning Prabhakar Raghavan and Hinrich Sch\u00fctze. 2010. Introduction to information retrieval. Natural Language Engineering (2010)."},{"key":"e_1_3_2_1_17_1","unstructured":"United Nations Office on Drugs and Crime. 2013. Global study on homicide 2013: trends contexts data. UNODC.  United Nations Office on Drugs and Crime. 2013. Global study on homicide 2013: trends contexts data. UNODC."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3133024"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Xiangyu Zhao and Jiliang Tang. 2018. Crime in Urban Areas:: A Data Mining Perspective. ACM SIGKDD Explorations Newsletter (2018).  Xiangyu Zhao and Jiliang Tang. 2018. Crime in Urban Areas:: A Data Mining Perspective. ACM SIGKDD Explorations Newsletter (2018).","DOI":"10.1145\/3229329.3229331"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Yu Zheng. 2015. Trajectory data mining: an overview. TIST (2015) 29.  Yu Zheng. 2015. Trajectory data mining: an overview. TIST (2015) 29.","DOI":"10.1016\/B978-0-08-100100-4.00004-1"}],"event":{"name":"SIGSPATIAL '19: 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems","sponsor":["SIGSPATIAL ACM Special Interest Group on Spatial Information"],"location":"Chicago IL USA","acronym":"SIGSPATIAL '19"},"container-title":["Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Prediction of Human Mobility"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3356995.3364538","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3356995.3364538","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:37Z","timestamp":1750203877000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3356995.3364538"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,5]]},"references-count":20,"alternative-id":["10.1145\/3356995.3364538","10.1145\/3356995"],"URL":"https:\/\/doi.org\/10.1145\/3356995.3364538","relation":{},"subject":[],"published":{"date-parts":[[2019,11,5]]},"assertion":[{"value":"2019-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}