-
2
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
Agrawal, R., Imielinski, T., & Swami, A. (1993). Mining association rules between sets of items in large databases. Proceedings of the ACM SIGMOD International Conference on Management of Data, 207-216.
-
(1993)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 207-216
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.3
-
3
-
-
0036013593
-
Statistical mechanics of complex networks
-
Albert, R., & Barabási, A.-L. (2002). Statistical mechanics of complex networks. Reviews of Modern Physics, 74(1), 47-97.
-
(2002)
Reviews of Modern Physics
, vol.74
, Issue.1
, pp. 47-97
-
-
Albert, R.1
Barabási, A.-L.2
-
4
-
-
0030652931
-
CARDWATCH: A neural network based database mining system for credit card fraud detection
-
Aleskerov, E., Freisleben, B., & Rao, B. (1997). CARDWATCH: A neural network based database mining system for credit card fraud detection. Proceedings of Computational Intelligence for Financial Engineering (CIFEr), 220-226.
-
(1997)
Proceedings of Computational Intelligence for Financial Engineering (CIFEr)
, pp. 220-226
-
-
Aleskerov, E.1
Freisleben, B.2
Rao, B.3
-
5
-
-
28844465409
-
-
Retrieved July 27, 2004
-
American Civil Liberties Union. (2004). MATRIX: Myths and reality. Retrieved July 27, 2004, from http://www.aclu.org/Privacy/Privacy.cfm?ID= 14894&c=130
-
(2004)
MATRIX: Myths and Reality
-
-
-
7
-
-
4544373848
-
Security works
-
Anderson, T., Arbetter, L., Benawides, A., & Longmore-Etheridge, A. (1994). Security works. Security Management, 38(17), 17-20.
-
(1994)
Security Management
, vol.38
, Issue.17
, pp. 17-20
-
-
Anderson, T.1
Arbetter, L.2
Benawides, A.3
Longmore-Etheridge, A.4
-
8
-
-
0002721528
-
Constructing blockmodels: How and why
-
Arabie, P., Boorman, S. A., & Levitt, P. R. (1978). Constructing blockmodels: How and why. Journal of Mathematical Psychology, 17, 21-63.
-
(1978)
Journal of Mathematical Psychology
, vol.17
, pp. 21-63
-
-
Arabie, P.1
Boorman, S.A.2
Levitt, P.R.3
-
9
-
-
0024162775
-
AREST: Armed Robbery Eidetic Suspect Typing expert system
-
Badiru, A. B., Karasz, J. M., & Holloway, B. T. (1988). AREST: Armed Robbery Eidetic Suspect Typing expert system. Journal of Police Science and Administration, 16, 210-216.
-
(1988)
Journal of Police Science and Administration
, vol.16
, pp. 210-216
-
-
Badiru, A.B.1
Karasz, J.M.2
Holloway, B.T.3
-
10
-
-
84923618755
-
The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry
-
Baker, W. E., & Faulkner, R. R. (1993). The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. American Sociological Review, 58(12), 837-860.
-
(1993)
American Sociological Review
, vol.58
, Issue.12
, pp. 837-860
-
-
Baker, W.E.1
Faulkner, R.R.2
-
11
-
-
28844509692
-
Applying machine learning for high performance named-entity extraction
-
N. Cercone, K. Naruedomkul, & K. Kogure (Eds.). Waterloo, Ont.: Department of Computer Science, University of Waterloo
-
Baluja, S., Mittal, V., & Sukthankar, R. (1999). Applying machine learning for high performance named-entity extraction. In N. Cercone, K. Naruedomkul, & K. Kogure (Eds.), PACLING '99: Proceedings of the Conference (Pacific Association of Computational Linguistics) (pp. 1-14). Waterloo, Ont.: Department of Computer Science, University of Waterloo.
-
(1999)
PACLING '99: Proceedings of the Conference (Pacific Association of Computational Linguistics)
, pp. 1-14
-
-
Baluja, S.1
Mittal, V.2
Sukthankar, R.3
-
12
-
-
0002696312
-
Matching records in a national medical patient index
-
Bell, G. S., & Sethi, A. (2001). Matching records in a national medical patient index. Communications of the ACM, 44(9), 83-88.
-
(2001)
Communications of the ACM
, vol.44
, Issue.9
, pp. 83-88
-
-
Bell, G.S.1
Sethi, A.2
-
13
-
-
35048873834
-
Data analytics for bioterrorism surveillance
-
Berndt, D. J., Bhat, S., Fisher, J. W., Hevner, A. R., & Studnicki, J. (2004). Data analytics for bioterrorism surveillance. Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI'04), 17-28.
-
(2004)
Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI'04)
, pp. 17-28
-
-
Berndt, D.J.1
Bhat, S.2
Fisher, J.W.3
Hevner, A.R.4
Studnicki, J.5
-
14
-
-
35248894316
-
Bioterrorism surveillance with real-time data warehousing
-
Berndt, D. J., Hevner, A. R., & Studnicki, J. (2003). Bioterrorism surveillance with real-time data warehousing. Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03), 322-335.
-
(2003)
Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03)
, pp. 322-335
-
-
Berndt, D.J.1
Hevner, A.R.2
Studnicki, J.3
-
15
-
-
78650204155
-
NYU: Description of the MENE named entity system as used in MUC-7
-
Retrieved August 19, 2004
-
Borthwick, A., Sterling, J., Agichtein, E., & Grishman, R. (1998). NYU: Description of the MENE named entity system as used in MUC-7. Proceedings of the 7th Message Understanding Conference (MUC-7). Retrieved August 19, 2004, from http://www.itl.nist.gov/iaui/894.02/related_projects/muc/proceedings/ muc_7_proceedings/nyu_english_named_entity.pdf
-
(1998)
Proceedings of the 7th Message Understanding Conference (MUC-7)
-
-
Borthwick, A.1
Sterling, J.2
Agichtein, E.3
Grishman, R.4
-
16
-
-
0028419282
-
An expert system for police investigators of economic crimes
-
Bowen, J. E. (1994). An expert system for police investigators of economic crimes. Expert Systems with Applications, 7(2), 235-248.
-
(1994)
Expert Systems with Applications
, vol.7
, Issue.2
, pp. 235-248
-
-
Bowen, J.E.1
-
17
-
-
0032205202
-
AICAMS: Artificial Intelligence Crime Analysis and Management System
-
Brahan, J. W., Lam, K. P., Chan, H., & Leung, W. (1998). AICAMS: Artificial Intelligence Crime Analysis and Management System. Knowledge-Based Systems, 11, 355-361.
-
(1998)
Knowledge-based Systems
, vol.11
, pp. 355-361
-
-
Brahan, J.W.1
Lam, K.P.2
Chan, H.3
Leung, W.4
-
19
-
-
0032318658
-
The Regional Crime Analysis Program (RECAP): A framework for mining data to catch criminals
-
Piscataway, NJ: IEEE
-
Brown, D. E. (1998). The Regional Crime Analysis Program (RECAP): A framework for mining data to catch criminals. Proceedings of the 1998 International Conference on Systems, Man, and Cybernetics (Vol. 3, pp. 2848-2853). Piscataway, NJ: IEEE.
-
(1998)
Proceedings of the 1998 International Conference on Systems, Man, and Cybernetics
, vol.3
, pp. 2848-2853
-
-
Brown, D.E.1
-
20
-
-
35048816600
-
Spatial forecast methods for terrorism events in urban environments
-
Brown, D. E., Dalton, J., & Hoyle, H. (2004). Spatial forecast methods for terrorism events in urban environments. Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI'04), 426-435.
-
(2004)
Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI'04)
, pp. 426-435
-
-
Brown, D.E.1
Dalton, J.2
Hoyle, H.3
-
21
-
-
0037208449
-
Data association methods with applications to law enforcement
-
Brown, D. E., & Hagen, S. (2002). Data association methods with applications to law enforcement. Decision Support Systems, 34(4), 369-378.
-
(2002)
Decision Support Systems
, vol.34
, Issue.4
, pp. 369-378
-
-
Brown, D.E.1
Hagen, S.2
-
22
-
-
0035720386
-
Data mining time series with applications to crime analysis
-
. Piscataway, NJ: IEEE
-
Brown, D. E., & Oxford, R. B. (2001). Data mining time series with applications to crime analysis. Proceedings of the 2001 IEEE International Conference on Systems, Man & Cybernetics Conference (Vol. 3, pp. 1453-1458). Piscataway, NJ: IEEE.
-
(2001)
Proceedings of the 2001 IEEE International Conference on Systems, Man & Cybernetics Conference
, vol.3
, pp. 1453-1458
-
-
Brown, D.E.1
Oxford, R.B.2
-
24
-
-
28844487453
-
An ontology approach to data integration
-
Buccella, A., Cechich, A., & Brisaboa, N. R. (2003). An ontology approach to data integration. Journal of Computer Science and Technology, 3(2), 62-68.
-
(2003)
Journal of Computer Science and Technology
, vol.3
, Issue.2
, pp. 62-68
-
-
Buccella, A.1
Cechich, A.2
Brisaboa, N.R.3
-
25
-
-
34248355461
-
A spatial temporal visualizer for law enforcement
-
Buetow, T., Chaboya, L., O'Toole, C., Cushna, T., Daspit, D., Peterson, T., et al. (2003). A spatial temporal visualizer for law enforcement. Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03), 181-193.
-
(2003)
Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03)
, pp. 181-193
-
-
Buetow, T.1
Chaboya, L.2
O'Toole, C.3
Cushna, T.4
Daspit, D.5
Peterson, T.6
-
26
-
-
84959779269
-
Positions in networks
-
Burt, R. S. (1976). Positions in networks. Social Forces, 55, 93-122.
-
(1976)
Social Forces
, vol.55
, pp. 93-122
-
-
Burt, R.S.1
-
27
-
-
11144288407
-
Destabilizing dynamic covert networks
-
Retrieved August 19, 2004
-
Carley, K. M., Dombroski, M., Tsvetovat, M., Reminga, J., & Kamneva, N. (2003). Destabilizing dynamic covert networks. Proceedings of the 8th International Command and Control Research and Technology Symposium. Retrieved August 19, 2004, from http://www.dodccrp.org/events/2003/8th_ICCRTS/pdf/021.pdf
-
(2003)
Proceedings of the 8th International Command and Control Research and Technology Symposium
-
-
Carley, K.M.1
Dombroski, M.2
Tsvetovat, M.3
Reminga, J.4
Kamneva, N.5
-
28
-
-
0242549048
-
Destabilizing networks
-
Carley, K. M., Lee, J., & Krackhardt, D. (2002). Destabilizing networks. Connections, 24(3), 79-92.
-
(2002)
Connections
, vol.24
, Issue.3
, pp. 79-92
-
-
Carley, K.M.1
Lee, J.2
Krackhardt, D.3
-
30
-
-
1942475668
-
Extracting meaningful entities from police narrative reports
-
Retrieved August 19, 2004
-
Chau, M., Xu, J., & Chen, H. (2002). Extracting meaningful entities from police narrative reports. Proceedings of the National Conference on Digital Government Research. Retrieved August 19, 2004, from http://www. digitalgovernment.org/library/library/pdf/chau2.pdf
-
(2002)
Proceedings of the National Conference on Digital Government Research
-
-
Chau, M.1
Xu, J.2
Chen, H.3
-
32
-
-
1942500388
-
Crime data mining: A general framework and some examples
-
Chen, H., Chung, W., Xu, J., Wang, G., Chau, M., & Qin, Y. (2004). Crime data mining: A general framework and some examples. IEEE Computer, 37(4), 50-56.
-
(2004)
IEEE Computer
, vol.37
, Issue.4
, pp. 50-56
-
-
Chen, H.1
Chung, W.2
Xu, J.3
Wang, G.4
Chau, M.5
Qin, Y.6
-
33
-
-
0032075534
-
Internet browsing and searching: User evaluation of category map and concept space techniques
-
Chen, H., Houston, A. L., Sewell, R. R., & Schatz, B. R. (1998). Internet browsing and searching: User evaluation of category map and concept space techniques. Journal of the American Society for Information Science, 49(7), 582-603.
-
(1998)
Journal of the American Society for Information Science
, vol.49
, Issue.7
, pp. 582-603
-
-
Chen, H.1
Houston, A.L.2
Sewell, R.R.3
Schatz, B.R.4
-
34
-
-
0000352692
-
Automatic construction of networks of concepts characterizing document databases
-
Chen, H., & Lynch, K. J. (1992). Automatic construction of networks of concepts characterizing document databases. IEEE Transactions on Systems, Man and Cybernetics, 22(5), 885-902.
-
(1992)
IEEE Transactions on Systems, Man and Cybernetics
, vol.22
, Issue.5
, pp. 885-902
-
-
Chen, H.1
Lynch, K.J.2
-
35
-
-
28844495431
-
-
Berlin: Springer
-
Chen, H., Miranda, R., Zeng, D. D., Demchak, C., Schroeder, J., & Madhusudan, T. (Eds.). (2003). Intelligence and security informatics: Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics. Berlin: Springer.
-
(2003)
Intelligence and Security Informatics: Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics
-
-
Chen, H.1
Miranda, R.2
Zeng, D.D.3
Demchak, C.4
Schroeder, J.5
Madhusudan, T.6
-
36
-
-
28844469336
-
-
Berlin: Springer
-
Chen, H., Moore, R., Zeng, D., & Leavitt, J. (Eds.). (2004). Intelligence and security informatics: Proceedings of the Second Symposium on Intelligence and Security Informatics. Berlin: Springer.
-
(2004)
Intelligence and Security Informatics: Proceedings of the Second Symposium on Intelligence and Security Informatics
-
-
Chen, H.1
Moore, R.2
Zeng, D.3
Leavitt, J.4
-
37
-
-
33745783788
-
The Dark Web Portal: Collecting and analyzing the presence of domestic and international terrorist groups on the Web
-
in press
-
Chen, H., Qin, J., Reid, E., Chung, W., Zhou, Y., Xi, W., et al. (in press). The Dark Web Portal: Collecting and analyzing the presence of domestic and international terrorist groups on the Web. Proceedings of the 7th Annual IEEE Conference on Intelligent Transportation Systems (ITSC 2004).
-
Proceedings of the 7th Annual IEEE Conference on Intelligent Transportation Systems (ITSC 2004)
-
-
Chen, H.1
Qin, J.2
Reid, E.3
Chung, W.4
Zhou, Y.5
Xi, W.6
-
38
-
-
0037290058
-
COPLINK Connect: Information and knowledge management for law enforcement
-
Chen, H., Schroeder, J., Hauck, R., Ridgeway, L., Atabakhsh, H., Gupta, H., et al. (2003). COPLINK Connect: Information and knowledge management for law enforcement. Decision Support Systems, 34(3), 271-285.
-
(2003)
Decision Support Systems
, vol.34
, Issue.3
, pp. 271-285
-
-
Chen, H.1
Schroeder, J.2
Hauck, R.3
Ridgeway, L.4
Atabakhsh, H.5
Gupta, H.6
-
39
-
-
0030104572
-
Internet categorization and search: A self-organizing approach
-
Chen, H., Schuffels, C., & Orwig, R. (1996). Internet categorization and search: A self-organizing approach. Journal of Visual Communication and Image Representation, 7(1), 88-102.
-
(1996)
Journal of Visual Communication and Image Representation
, vol.7
, Issue.1
, pp. 88-102
-
-
Chen, H.1
Schuffels, C.2
Orwig, R.3
-
40
-
-
0442298972
-
COPLINK: Managing law enforcement data and knowledge
-
Chen, H., Zeng, D., Atabakhsh, H., Wyzga, W., & Schroeder, J. (2003). COPLINK: Managing law enforcement data and knowledge. Communications of the ACM, 46(1), 28-34.
-
(2003)
Communications of the ACM
, vol.46
, Issue.1
, pp. 28-34
-
-
Chen, H.1
Zeng, D.2
Atabakhsh, H.3
Wyzga, W.4
Schroeder, J.5
-
42
-
-
85120481005
-
Overview of MUC-7/MET-2
-
Retrieved August 19, 2004
-
Chinchor, N. A. (1998). Overview of MUC-7/MET-2. Proceedings of the 7th Message Understanding Conference (MUC-7). Retrieved August 19, 2004, from http://www.itl.nist.gov/iaui/894.02/related_projects/muc/proceedings/ muc_7_proceedings/overview.html
-
(1998)
Proceedings of the 7th Message Understanding Conference (MUC-7)
-
-
Chinchor, N.A.1
-
43
-
-
4544335335
-
Automated link analysis: Artificial intelligence-based tool for investigators
-
Coady, W. F. (1985). Automated link analysis: Artificial intelligence-based tool for investigators. Police Chief, 52(9), 22-23.
-
(1985)
Police Chief
, vol.52
, Issue.9
, pp. 22-23
-
-
Coady, W.F.1
-
44
-
-
0040674960
-
Advances in violent crime analysis and law enforcement: The Canadian violent crime linkage analysis system
-
Collins, P. I., Johnson, G. F., Choy, A., Davidson, K. T., & Mackay, R. E. (1998). Advances in violent crime analysis and law enforcement: The Canadian Violent Crime Linkage Analysis System. Journal of Government Information, 25(3), 277-284.
-
(1998)
Journal of Government Information
, vol.25
, Issue.3
, pp. 277-284
-
-
Collins, P.I.1
Johnson, G.F.2
Choy, A.3
Davidson, K.T.4
Mackay, R.E.5
-
45
-
-
20344384393
-
Social, ethical and legal issues of data mining
-
J. Wang (Ed.). Hershey, PA: Idea Group Publishing
-
Cook, J. S., & Cook, L. L. (2003). Social, ethical and legal issues of data mining. In J. Wang (Ed.), Data mining: Opportunities and challenges (pp. 395-420). Hershey, PA: Idea Group Publishing.
-
(2003)
Data Mining: Opportunities and Challenges
, pp. 395-420
-
-
Cook, J.S.1
Cook, L.L.2
-
46
-
-
0034019401
-
A comparative evaluation of approaches to urban crime pattern analysis
-
Craglia, M., Haining, R., & Wiles, P. (2000). A comparative evaluation of approaches to urban crime pattern analysis. Urban Studies, 37(4), 711-729.
-
(2000)
Urban Studies
, vol.37
, Issue.4
, pp. 711-729
-
-
Craglia, M.1
Haining, R.2
Wiles, P.3
-
48
-
-
10044264094
-
Intelligence, terrorism, and national security
-
Cronin, B. (2005). Intelligence, terrorism, and national security. Annual Review of Information Science and Technology, 39, 395-432.
-
(2005)
Annual Review of Information Science and Technology
, vol.39
, pp. 395-432
-
-
Cronin, B.1
-
49
-
-
0036945848
-
MiTAP for bio-security: A case study
-
Damianos, L., Ponte, J., Wohlever, S., Reeder, F., Day, D., Wilson, G., et al. (2002). MiTAP for bio-security: A case study. AI Magazine, 23(4), 13-29.
-
(2002)
AI Magazine
, vol.23
, Issue.4
, pp. 13-29
-
-
Damianos, L.1
Ponte, J.2
Wohlever, S.3
Reeder, F.4
Day, D.5
Wilson, G.6
-
50
-
-
0035981393
-
Intelligence, information technology, and information warfare
-
Davies, P. H. J. (2002). Intelligence, information technology, and information warfare. Annual Review of Information Science and Technology, 36, 313-352.
-
(2002)
Annual Review of Information Science and Technology
, vol.36
, pp. 313-352
-
-
Davies, P.H.J.1
-
51
-
-
0001765146
-
An efficient algorithm for a complete link method
-
Defays, D. (1977). An efficient algorithm for a complete link method. Computer Journal, 20(4), 364-366.
-
(1977)
Computer Journal
, vol.20
, Issue.4
, pp. 364-366
-
-
Defays, D.1
-
52
-
-
0038604019
-
Authorship attribution with support vector machines
-
Diederich, J., Kindermann, J., Leopold, E., & Paass, G. (2003). Authorship attribution with support vector machines. Applied Intelligence, 19(1-2), 109-123.
-
(2003)
Applied Intelligence
, vol.19
, Issue.1-2
, pp. 109-123
-
-
Diederich, J.1
Kindermann, J.2
Leopold, E.3
Paass, G.4
-
53
-
-
34147120474
-
A note on two problems in connection with graphs
-
Dijkstra, E. (1959). A note on two problems in connection with graphs. Numerische Mathematik, 1, 269-271.
-
(1959)
Numerische Mathematik
, vol.1
, pp. 269-271
-
-
Dijkstra, E.1
-
56
-
-
0032441150
-
Cluster analysis and display of genome-wide expression patterns
-
Eisen, M. B., Spellman, P. T., Brown, P. O., & Botstein, D. (1998). Cluster analysis and display of genome-wide expression patterns. Proceedings of the National Academy of Sciences, 95(25), 14863-14868.
-
(1998)
Proceedings of the National Academy of Sciences
, vol.95
, Issue.25
, pp. 14863-14868
-
-
Eisen, M.B.1
Spellman, P.T.2
Brown, P.O.3
Botstein, D.4
-
58
-
-
3342931840
-
Data mining techniques for autonomous exploration of large volumes of geo-referenced crime data
-
Retrieved August 19, 2004
-
Estivill-Castro, V., & Lee, I. (2001). Data mining techniques for autonomous exploration of large volumes of geo-referenced crime data. Proceedings of the 6th International Conference on GeoComputation. Retrieved August 19, 2004, from http://www.geocomputation.org/2001/papers/estivillcastro. pdf
-
(2001)
Proceedings of the 6th International Conference on GeoComputation
-
-
Estivill-Castro, V.1
Lee, I.2
-
59
-
-
85129835356
-
An organization-set model of interorganizational relations
-
M. Tuite, R. Chisholm, & M. Radnor (Eds.). Chicago: Aldine
-
Evan, W. M. (1972). An organization-set model of interorganizational relations. In M. Tuite, R. Chisholm, & M. Radnor (Eds.), Interorganizational decision-making (pp. 181-200). Chicago: Aldine.
-
(1972)
Interorganizational Decision-making
, pp. 181-200
-
-
Evan, W.M.1
-
60
-
-
0033446109
-
Using nation incident-based reporting system data for strategic crime analysis
-
Faggiani, D., & McLaughlin, C. (1999). Using nation incident-based reporting system data for strategic crime analysis. Journal of Quantitative Criminology, 15(2), 181-191.
-
(1999)
Journal of Quantitative Criminology
, vol.15
, Issue.2
, pp. 181-191
-
-
Faggiani, D.1
McLaughlin, C.2
-
61
-
-
0002389633
-
Automating the analysis and cataloging of sky surveys
-
U. Fayyad, G. Piatetsky-Shapiro, P. Smyth, & R. Uthurusamy (Eds.). Menlo Park, CA: AAAI Press
-
Fayyad, U. M., Djorgovshi, S. G., & Weir, N. (1996). Automating the analysis and cataloging of sky surveys. In U. Fayyad, G. Piatetsky-Shapiro, P. Smyth, & R. Uthurusamy (Eds.), Advances in knowledge discovery and data mining (pp. 471-493). Menlo Park, CA: AAAI Press.
-
(1996)
Advances in Knowledge Discovery and Data Mining
, pp. 471-493
-
-
Fayyad, U.M.1
Djorgovshi, S.G.2
Weir, N.3
-
62
-
-
0030285403
-
The KDD process for extracting useful knowledge from volumes of data
-
Fayyad, U., Piatetsk-Shapiro, G., & Smyth, P. (1996). The KDD process for extracting useful knowledge from volumes of data. Communications of the ACM, 39(11), 27-34.
-
(1996)
Communications of the ACM
, vol.39
, Issue.11
, pp. 27-34
-
-
Fayyad, U.1
Piatetsk-Shapiro, G.2
Smyth, P.3
-
63
-
-
33750177351
-
Centrality in social networks: Conceptual clarification
-
Freeman, L. C. (1979). Centrality in social networks: Conceptual clarification. Social Networks, 1, 215-240.
-
(1979)
Social Networks
, vol.1
, pp. 215-240
-
-
Freeman, L.C.1
-
64
-
-
0013084629
-
-
Upper Saddle River, NJ: Prentice-Hall
-
Garcia-Molina, H., Ullman, J. D., & Widom, J. (2002). Database systems: The complete book. Upper Saddle River, NJ: Prentice-Hall.
-
(2002)
Database Systems: The Complete Book
-
-
Garcia-Molina, H.1
Ullman, J.D.2
Widom, J.3
-
65
-
-
84977363017
-
The analysis of spatial association by use of distance statistics
-
Getis, A., & Ord, J. K. (1992). The analysis of spatial association by use of distance statistics. Geographical Analysis, 24, 189-199.
-
(1992)
Geographical Analysis
, vol.24
, pp. 189-199
-
-
Getis, A.1
Ord, J.K.2
-
66
-
-
0031617713
-
Inferring Web communities from link topology
-
Gibson, D., Kleinberg, J., & Raghavan, P. (1998). Inferring Web communities from link topology. Proceedings of the 9th ACM Conference on Hypertext and Hypermedia, 225-234.
-
(1998)
Proceedings of the 9th ACM Conference on Hypertext and Hypermedia
, pp. 225-234
-
-
Gibson, D.1
Kleinberg, J.2
Raghavan, P.3
-
67
-
-
84976668719
-
Using collaborative filtering to weave an information tapestry
-
Goldberg, D., Nichols, D., Oki, B., & Terry, D. (1992). Using collaborative filtering to weave an information tapestry. Communications of the ACM, 35(12), 61-69.
-
(1992)
Communications of the ACM
, vol.35
, Issue.12
, pp. 61-69
-
-
Goldberg, D.1
Nichols, D.2
Oki, B.3
Terry, D.4
-
70
-
-
28844464772
-
Information extraction
-
R. Mitkov (Ed.). New York: Oxford University Press
-
Grishman, R. (2003). Information extraction. In R. Mitkov (Ed.), The Oxford handbook of computational linguistics (pp. 545-559). New York: Oxford University Press.
-
(2003)
The Oxford Handbook of Computational Linguistics
, pp. 545-559
-
-
Grishman, R.1
-
71
-
-
84861298731
-
Detecting hot spots using cluster analysis and GIS
-
Retrieved August 19, 2004
-
Grubesic, T. H., & Murray, A. T. (2001). Detecting hot spots using cluster analysis and GIS. Proceedings of 2001 Crime Mapping Research Conference. Retrieved August 19, 2004, from http://www.ojp.usdoj.gov/nij/maps/Conferences/ 01conf/Grubesic.doc
-
(2001)
Proceedings of 2001 Crime Mapping Research Conference
-
-
Grubesic, T.H.1
Murray, A.T.2
-
72
-
-
0036937227
-
Data integration through database federation
-
Haas, L. M. (2002). Data integration through database federation. IBM Systems Journal, 41(4), 578-596.
-
(2002)
IBM Systems Journal
, vol.41
, Issue.4
, pp. 578-596
-
-
Haas, L.M.1
-
76
-
-
0346487427
-
Information system integration
-
Hasselbring, W. (2000). Information system integration. Communications of the ACM, 43(6), 33-38.
-
(2000)
Communications of the ACM
, vol.43
, Issue.6
, pp. 33-38
-
-
Hasselbring, W.1
-
77
-
-
0013325845
-
Detecting payment card fraud with neural networks
-
P. J. G. Lisboa, A. Vellido, & B. Edisbury (Eds.). Singapore: World Scientific
-
Hassibi, K. (2000). Detecting payment card fraud with neural networks. In P. J. G. Lisboa, A. Vellido, & B. Edisbury (Eds.), Business applications of neural networks (pp. 141-158). Singapore: World Scientific.
-
(2000)
Business Applications of Neural Networks
, pp. 141-158
-
-
Hassibi, K.1
-
78
-
-
0036500849
-
Using COPLINK to analyze criminal justice data
-
Hauck, R. V., Atabakhsh, H., Ongvasith, P., Gupta, H., & Chen, H. (2002). Using COPLINK to analyze criminal justice data. IEEE Computer, 35(3), 30-37.
-
(2002)
IEEE Computer
, vol.35
, Issue.3
, pp. 30-37
-
-
Hauck, R.V.1
Atabakhsh, H.2
Ongvasith, P.3
Gupta, H.4
Chen, H.5
-
79
-
-
0002370418
-
A tutorial on learning with Bayesian networks
-
M. Jordan (Ed.). Cambridge, MA: MIT Press
-
Heckerman, D. (1995). A tutorial on learning with Bayesian networks. In M. Jordan (Ed.), Learning in Graphical Models (pp. 301-354). Cambridge, MA: MIT Press.
-
(1995)
Learning in Graphical Models
, pp. 301-354
-
-
Heckerman, D.1
-
81
-
-
0036505670
-
A comparison of methods for multi-class support vector machines
-
Hsu, C. W., & Lin, C. J. (2002). A comparison of methods for multi-class support vector machines. IEEE Transactions on Neural Networks, 13, 415-425.
-
(2002)
IEEE Transactions on Neural Networks
, vol.13
, pp. 415-425
-
-
Hsu, C.W.1
Lin, C.J.2
-
82
-
-
0002930277
-
Automated crime profiling
-
Icove, D. J. (1986). Automated crime profiling. Law Enforcement Bulletin, 55, 27-30.
-
(1986)
Law Enforcement Bulletin
, vol.55
, pp. 27-30
-
-
Icove, D.J.1
-
83
-
-
0012547271
-
Image segmentation using clustering
-
N. Ahuja & K. Bowyer (Eds.). Piscataway, NJ: IEEE Press
-
Jain, A. K., & Flynn, P. J. (1996). Image segmentation using clustering. In N. Ahuja & K. Bowyer (Eds.), Advances in image understanding (pp. 65-83). Piscataway, NJ: IEEE Press.
-
(1996)
Advances in Image Understanding
, pp. 65-83
-
-
Jain, A.K.1
Flynn, P.J.2
-
84
-
-
84893405732
-
Data clustering: A review
-
Jain, A. K., Murty, M. N., & Flynn, P. J. (1999). Data clustering: A review. ACM Computing Surveys, 31(3), 264-323.
-
(1999)
ACM Computing Surveys
, vol.31
, Issue.3
, pp. 264-323
-
-
Jain, A.K.1
Murty, M.N.2
Flynn, P.J.3
-
85
-
-
0036940651
-
Information integration: A research agenda
-
Jhingran, A. D., Mattos, N., & Pirahesh, H. (2002). Information integration: A research agenda. IBM Systems Journal, 41(4), 555-562.
-
(2002)
IBM Systems Journal
, vol.41
, Issue.4
, pp. 555-562
-
-
Jhingran, A.D.1
Mattos, N.2
Pirahesh, H.3
-
86
-
-
28844486722
-
Computer Aided Tracking and Characterization of Homicides and sexual assaults (CATCH)
-
J. Mena (Ed.). Amsterdam: Butterworth Heinemann
-
Kangas, L. J., Terrones, K. M., Keppel, R. D., & La Moria, R. D. (2003). Computer Aided Tracking and Characterization of Homicides and sexual assaults (CATCH). In J. Mena (Ed.), Investigative data mining for security and criminal detection (pp. 364-375). Amsterdam: Butterworth Heinemann.
-
(2003)
Investigative Data Mining for Security and Criminal Detection
, pp. 364-375
-
-
Kangas, L.J.1
Terrones, K.M.2
Keppel, R.D.3
La Moria, R.D.4
-
88
-
-
0031864521
-
Innovative information-sharing strategies
-
Retrieved August 19, 2004
-
Kay, B. A., Timperi, R. J., Morse, S. S., Forslund, D., McGowan, J. J., & O'Brien, T. (1998). Innovative information-sharing strategies. Emerging Infectious Diseases, 4(3). Retrieved August 19, 2004, from http://www.cdc.gov/ ncidod/eid/vol4no3/kay.htm
-
(1998)
Emerging Infectious Diseases
, vol.4
, Issue.3
-
-
Kay, B.A.1
Timperi, R.J.2
Morse, S.S.3
Forslund, D.4
McGowan, J.J.5
O'Brien, T.6
-
89
-
-
0242465495
-
The network paradigm applied to criminal organizations: Theoretical nit-picking or a relevant doctrine for investigators? Recent developments in the Netherlands
-
Klerks, P. (2001). The network paradigm applied to criminal organizations: Theoretical nit-picking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections, 24(3), 53-65.
-
(2001)
Connections
, vol.24
, Issue.3
, pp. 53-65
-
-
Klerks, P.1
-
92
-
-
0038401985
-
Mapping networks of terrorist cells
-
Krebs, V. E. (2001). Mapping networks of terrorist cells. Connections, 24(3), 43-52.
-
(2001)
Connections
, vol.24
, Issue.3
, pp. 43-52
-
-
Krebs, V.E.1
-
93
-
-
85120469168
-
IsoQuest Inc.: Description of the NetOwl text extractor system as used for MUC-7
-
Retrieved August 19, 2004
-
Krupka, G. R., & Hausman, K. (1998). IsoQuest Inc.: Description of the NetOwl text extractor system as used for MUC-7. Proceedings of the 7th Message Understanding Conference (MUC-7). Retrieved August 19, 2004, from http://www.itl.nist.gov/iaui/894.02/related_projects/muc/proceedings/ muc_7_proceedings/isoquest.pdf
-
(1998)
Proceedings of the 7th Message Understanding Conference (MUC-7)
-
-
Krupka, G.R.1
Hausman, K.2
-
94
-
-
0007626881
-
A study of composite or hybrid classifiers for knowledge discovery
-
Kumar, A., & Olmeda, I. (1999). A study of composite or hybrid classifiers for knowledge discovery. INFORMS Journal on Computing, 11(3), 267-277.
-
(1999)
INFORMS Journal on Computing
, vol.11
, Issue.3
, pp. 267-277
-
-
Kumar, A.1
Olmeda, I.2
-
96
-
-
85084163349
-
Data mining approaches for intrusion detection
-
Retrieved August 20, 2004
-
Lee, W., & Stolfo, S. (1998). Data mining approaches for intrusion detection. Proceedings of the 7th USENIX Security Symposium. Retrieved August 20, 2004, from http://citeseer.ist.psu.edu/cache/papers/cs/3327/http:zSzzSzwww. cs.columbia.eduzSz~wenkezSzpaperszSzusenix.pdf/lee98data.pdf
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Lee, W.1
Stolfo, S.2
-
97
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions, and reversals
-
Levenshtein, V. L. (1966). Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady, 10, 707-710.
-
(1966)
Soviet Physics Doklady
, vol.10
, pp. 707-710
-
-
Levenshtein, V.L.1
-
98
-
-
28844460718
-
CrimeStat: A spatial statistics program for the analysis of crime incident locations
-
Levine, N. (2000). CrimeStat: A spatial statistics program for the analysis of crime incident locations. Crime Mapping News, 2(1), 8-9.
-
(2000)
Crime Mapping News
, vol.2
, Issue.1
, pp. 8-9
-
-
Levine, N.1
-
99
-
-
0030083481
-
Entity identification in database integration
-
Lim, E.-P., Srivastava, J., Prabhakar, S., & Richardson, J. (1996). Entity identification in database integration. Information Sciences, 89, 1-38.
-
(1996)
Information Sciences
, vol.89
, pp. 1-38
-
-
Lim, E.-P.1
Srivastava, J.2
Prabhakar, S.3
Richardson, J.4
-
102
-
-
0001964443
-
Structural equivalence of individuals in social networks
-
Lorrain, F. P., & White, H. C. (1971). Structural equivalence of individuals in social networks. Journal of Mathematical Sociology, 1, 49-80.
-
(1971)
Journal of Mathematical Sociology
, vol.1
, pp. 49-80
-
-
Lorrain, F.P.1
White, H.C.2
-
103
-
-
35248883392
-
Evacuation planning: A capacity constrained routing approach
-
Lu, Q., Huang, Y., & Shekhar, S. (2003). Evacuation planning: A capacity constrained routing approach. Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03), 111-125.
-
(2003)
Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03)
, pp. 111-125
-
-
Lu, Q.1
Huang, Y.2
Shekhar, S.3
-
104
-
-
0001280495
-
Efficient algorithms for discovering association rules
-
Mannila, H., Toivonen, H., & Inkeri, V. A. (1994). Efficient algorithms for discovering association rules. Proceedings of Knowledge Discovery in Databases (KDD'94), 181-192.
-
(1994)
Proceedings of Knowledge Discovery in Databases (KDD'94)
, pp. 181-192
-
-
Mannila, H.1
Toivonen, H.2
Inkeri, V.A.3
-
105
-
-
10644289949
-
Cross-jurisdictional criminal activity networks to support border and transportation security
-
in press
-
Marshall, B., Kaza, S., Xu, J., Atabakhsh, H., Petersen, T., Violette, C., et al. (in press). Cross-jurisdictional criminal activity networks to support border and transportation security. Proceedings of the 7th Annual IEEE Conference on Intelligent Transportation Systems (ITSC 2004).
-
Proceedings of the 7th Annual IEEE Conference on Intelligent Transportation Systems (ITSC 2004)
-
-
Marshall, B.1
Kaza, S.2
Xu, J.3
Atabakhsh, H.4
Petersen, T.5
Violette, C.6
-
106
-
-
20344393500
-
The structural analysis of criminal networks
-
D. Canter & L. Alison (Eds.). Dartmouth, UK: Aldershot
-
McAndrew, D. (1999). The structural analysis of criminal networks. In D. Canter & L. Alison (Eds.), The social psychology of crime: Groups, teams, and networks (pp. 53-94). Dartmouth, UK: Aldershot.
-
(1999)
The Social Psychology of Crime: Groups, Teams, and Networks
, pp. 53-94
-
-
McAndrew, D.1
-
108
-
-
0002297105
-
Conditional logit analysis of qualitative choice behavior
-
P. Zarembka, (Ed.). New York: Academic Press
-
McFadden, D. (1973). Conditional logit analysis of qualitative choice behavior. In P. Zarembka, (Ed.), Frontiers of econometrics (pp. 105-142). New York: Academic Press.
-
(1973)
Frontiers of Econometrics
, pp. 105-142
-
-
McFadden, D.1
-
109
-
-
77951949134
-
Columbia's Newsblaster: New features and future directions
-
McKeown, K., Barzilay, R., Chen, J., Elson, D., Evans, D., Klavans, J., et al. (2003). Columbia's Newsblaster: New features and future directions. Proceedings of Human Language Technology Conference (HLT-NAACL 2003), 15-16.
-
(2003)
Proceedings of Human Language Technology Conference (HLT-NAACL 2003)
, pp. 15-16
-
-
McKeown, K.1
Barzilay, R.2
Chen, J.3
Elson, D.4
Evans, D.5
Klavans, J.6
-
110
-
-
0345120050
-
BBN: Description of the SIFT system as used for MUC-7
-
Retrieved August 19, 2004
-
Miller, S., Crystal, M., Fox, H., Ramshaw, L., Schwartz, R., Stone, R., et al. (1998). BBN: Description of the SIFT system as used for MUC-7. Proceedings of the 7th Message Understanding Conference (MUC-7). Retrieved August 19, 2004, from http://www.itl.nist.gov/iaui/894.02/related_projects/muc/ proceedings/muc_7_proceedings/bbn_muc7.pdf
-
(1998)
Proceedings of the 7th Message Understanding Conference (MUC-7)
-
-
Miller, S.1
Crystal, M.2
Fox, H.3
Ramshaw, L.4
Schwartz, R.5
Stone, R.6
-
111
-
-
76549254593
-
Notes on continuous stochastic phenomena
-
Moran, P. A. P. (1950). Notes on continuous stochastic phenomena. Biometrika, 37, 17-23.
-
(1950)
Biometrika
, vol.37
, pp. 17-23
-
-
Moran, P.A.P.1
-
113
-
-
0035610888
-
Exploratory spatial data analysis techniques for examining urban crime
-
Murray, A. T., McGuffog, I., Western, J. S., & Mullins, P. (2001). Exploratory spatial data analysis techniques for examining urban crime. British Journal of Criminology, 41, 309-329.
-
(2001)
British Journal of Criminology
, vol.41
, pp. 309-329
-
-
Murray, A.T.1
McGuffog, I.2
Western, J.S.3
Mullins, P.4
-
115
-
-
0001592068
-
Automatic linkage of vital records
-
Newcombe, H. B., Kennedy, J. M., Axford S. J., & James, A. P. (1959). Automatic linkage of vital records. Science, 130(3381), 954-959.
-
(1959)
Science
, vol.130
, Issue.3381
, pp. 954-959
-
-
Newcombe, H.B.1
Kennedy, J.M.2
Axford, S.J.3
James, A.P.4
-
117
-
-
0029514351
-
Local spatial autocorrelation statistics: Distributional issues and an application
-
Ord, J. K., & Getis, A. (1995). Local spatial autocorrelation statistics: Distributional issues and an application. Geographical Analysis, 27, 286-296.
-
(1995)
Geographical Analysis
, vol.27
, pp. 286-296
-
-
Ord, J.K.1
Getis, A.2
-
119
-
-
0038724910
-
Disease surveillance and the academic, clinical, and public health communities
-
Retrieved August 19, 2004
-
Pinner, R. W., Rebmann, C. A., Schuchat, A., & Hughes, J. M. (2003). Disease surveillance and the academic, clinical, and public health communities. Emerging Infectious Diseases, 9(7). Retrieved August 19, 2004, from http://www.cdc.gov/ncidod/eid/vol9no7/03-0083.htm
-
(2003)
Emerging Infectious Diseases
, vol.9
, Issue.7
-
-
Pinner, R.W.1
Rebmann, C.A.2
Schuchat, A.3
Hughes, J.M.4
-
120
-
-
33744584654
-
Induction of decision trees
-
Quinlan, J. R. (1986). Induction of decision trees. Machine Learning, 1, 86-106.
-
(1986)
Machine Learning
, vol.1
, pp. 86-106
-
-
Quinlan, J.R.1
-
122
-
-
35248888932
-
Addressing the homeland security problem: A collaborative decision-making framework
-
Raghu, T. S., Ramesh, R., & Whinston, A. B. (2003). Addressing the homeland security problem: A collaborative decision-making framework. Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03), 249-265.
-
(2003)
Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03)
, pp. 249-265
-
-
Raghu, T.S.1
Ramesh, R.2
Whinston, A.B.3
-
123
-
-
0035657983
-
A survey of approaches to automatic schema matching
-
Rahm, E., & Bernstein, P. A. (2001). A survey of approaches to automatic schema matching. The VLDB Journal, 10, 334-350.
-
(2001)
The VLDB Journal
, vol.10
, pp. 334-350
-
-
Rahm, E.1
Bernstein, P.A.2
-
124
-
-
0000019005
-
Clustering algorithms
-
W. B. Frakes & R. Baeza-Yates (Eds.). Englewood Cliffs, NJ: Prentice Hall
-
Rasmussen, E. (1992). Clustering algorithms. In W. B. Frakes & R. Baeza-Yates (Eds.), Information retrieval: Data structures and algorithms (pp. 419-442). Englewood Cliffs, NJ: Prentice Hall.
-
(1992)
Information Retrieval: Data Structures and Algorithms
, pp. 419-442
-
-
Rasmussen, E.1
-
125
-
-
0003116602
-
Hotbeds of crime and the search for spatial accuracy
-
Ratchliffe, J. H., & McCullagh, M. J. (1999). Hotbeds of crime and the search for spatial accuracy. Journal of Geographical Systems, 1(4), 385-398.
-
(1999)
Journal of Geographical Systems
, vol.1
, Issue.4
, pp. 385-398
-
-
Ratchliffe, J.H.1
McCullagh, M.J.2
-
126
-
-
35048854724
-
Terrorism Knowledge Discovery Project: A knowledge discovery approach to address the threats of terrorism
-
Reid, E., Qin, J., Chung, W., Xu, J., Zhou, Y., Schumaker, R., et al. (2004). Terrorism Knowledge Discovery Project: A knowledge discovery approach to address the threats of terrorism. Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI'04), 125-145.
-
(2004)
Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI'04)
, pp. 125-145
-
-
Reid, E.1
Qin, J.2
Chung, W.3
Xu, J.4
Zhou, Y.5
Schumaker, R.6
-
128
-
-
10044261429
-
What next for networks and netwars?
-
J. Arquilla & D. Ronfeldt (Eds.). Santa Monica, CA: Rand Press
-
Ronfeldt, D., & Arquilla, J. (2001). What next for networks and netwars? In J. Arquilla & D. Ronfeldt (Eds.), Networks and netwars: The future of terror, crime, and militancy (pp. 311-362). Santa Monica, CA: Rand Press.
-
(2001)
Networks and Netwars: The Future of Terror, Crime, and Militancy
, pp. 311-362
-
-
Ronfeldt, D.1
Arquilla, J.2
-
129
-
-
0001785560
-
Overview: Multivariate spatial profiles as a tool in crime investigation
-
C. R. Block, M. Dabdoub, & S. Fregly (Eds.). Washington, DC: Police Executive Research Forum
-
Rossmo, D. K. (1995). Overview: Multivariate spatial profiles as a tool in crime investigation. In C. R. Block, M. Dabdoub, & S. Fregly (Eds.), Crime analysis through computer mapping (pp. 65-97). Washington, DC: Police Executive Research Forum.
-
(1995)
Crime Analysis Through Computer Mapping
, pp. 65-97
-
-
Rossmo, D.K.1
-
130
-
-
0000646059
-
Learning internal representations by error propagation
-
D. E. Rumelhart & J. L. McLelland (Eds.). Cambridge, MA: MIT Press
-
Rumelhart, D. E., Hinton, G. E., & Williams, R. J. (1986). Learning internal representations by error propagation. In D. E. Rumelhart & J. L. McLelland (Eds.), Parallel distributed processing: Explorations in the microstructure of cognition (pp. 318-362). Cambridge, MA: MIT Press.
-
(1986)
Parallel Distributed Processing: Explorations in the Microstructure of Cognition
, pp. 318-362
-
-
Rumelhart, D.E.1
Hinton, G.E.2
Williams, R.J.3
-
131
-
-
84898944587
-
Intrusion detection with neural networks
-
M. I. Jordan, M. J. Kearns, & S. A. Solla (Eds.). Cambridge, MA: MIT Press
-
Ryan, J., Lin, M., & Mikkulainen, R. (1998). Intrusion detection with neural networks. In M. I. Jordan, M. J. Kearns, & S. A. Solla (Eds.), Advances in neural information processing systems (pp. 943-949). Cambridge, MA: MIT Press.
-
(1998)
Advances in Neural Information Processing Systems
, pp. 943-949
-
-
Ryan, J.1
Lin, M.2
Mikkulainen, R.3
-
132
-
-
20344364026
-
A structural analysis of fraud and armed robbery networks in Norway
-
Retrieved August 20, 2004
-
Saether, M., & Canter, D. V. (2001). A structural analysis of fraud and armed robbery networks in Norway. Proceedings of the 6th International Investigative Psychology Conference. Retrieved August 20, 2004, from http://www.i-psy.com/conferences/sixth/multimedia/powerPoint/saether/saether.htm
-
(2001)
Proceedings of the 6th International Investigative Psychology Conference
-
-
Saether, M.1
Canter, D.V.2
-
133
-
-
84903667395
-
-
Philadelphia: University of Pennsylvania Press
-
Sageman, M. (2004). Understanding terror networks. Philadelphia: University of Pennsylvania Press.
-
(2004)
Understanding Terror Networks
-
-
Sageman, M.1
-
134
-
-
0035521221
-
Bayesian models for early warning of bank failures
-
Sarkar, S., & Sriram, R. S. (2001). Bayesian models for early warning of bank failures. Management Science, 47(11), 1457-1475.
-
(2001)
Management Science
, vol.47
, Issue.11
, pp. 1457-1475
-
-
Sarkar, S.1
Sriram, R.S.2
-
135
-
-
34248386387
-
CrimeLink explorer: Using domain knowledge to facilitate automated crime association analysis
-
Schroeder, J., Xu, J., & Chen, H. (2003). CrimeLink Explorer: Using domain knowledge to facilitate automated crime association analysis. Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03), 168-180.
-
(2003)
Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03)
, pp. 168-180
-
-
Schroeder, J.1
Xu, J.2
Chen, H.3
-
136
-
-
84861290371
-
Spatial crime displacement resulting from large-scale urban renewal programs in the city of Baltimore, MD: A GIS modeling approach
-
Retrieved August 19, 2004
-
Schumacher, B. J., & Leitner, M. (1999). Spatial crime displacement resulting from large-scale urban renewal programs in the city of Baltimore, MD: A GIS modeling approach. Proceedings of the 4th International Conference on GeoComputation. Retrieved August 19, 2004, from http://www.geocomputation.org/ 1999/047/gc_047.htm
-
(1999)
Proceedings of the 4th International Conference on GeoComputation
-
-
Schumacher, B.J.1
Leitner, M.2
-
137
-
-
28844464771
-
The computer meets medicine and biology: Emergence of a discipline
-
K. J. Hannah & M. J. Ball (Eds.). New York: Springer-Verlag
-
Shortliffe, E. H., & Blois, M. S. (2000). The computer meets medicine and biology: Emergence of a discipline. In K. J. Hannah & M. J. Ball (Eds.), Health informatics (pp. 1-40). New York: Springer-Verlag.
-
(2000)
Health Informatics
, pp. 1-40
-
-
Shortliffe, E.H.1
Blois, M.S.2
-
138
-
-
11344285341
-
Beyond market baskets: Generalizing association rules to dependence rules
-
Silverstein, C., Brin, S., & Motwani, R. (1998). Beyond market baskets: Generalizing association rules to dependence rules. Data Mining and Knowledge Discovery, 2, 39-68.
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, pp. 39-68
-
-
Silverstein, C.1
Brin, S.2
Motwani, R.3
-
139
-
-
0012254042
-
The application of network analysis to criminal intelligence: An assessment of the prospects
-
Sparrow, M. K. (1991). The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks, 13, 251-274.
-
(1991)
Social Networks
, vol.13
, pp. 251-274
-
-
Sparrow, M.K.1
-
140
-
-
35248879179
-
Behavior profiling and email
-
Stolfo, S. J., Hershkop, S., Wang, K., Nimeskern, O., & Hu, C.-W. (2003). Behavior profiling and email. Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03), 74-90.
-
(2003)
Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03)
, pp. 74-90
-
-
Stolfo, S.J.1
Hershkop, S.2
Wang, K.3
Nimeskern, O.4
Hu, C.-W.5
-
142
-
-
0142120236
-
Information and the war against terrorism (Part II): Were American intelligence and law enforcement effectively positioned to protect the public?
-
Strickland, L. S. (2002b). Information and the war against terrorism (Part II): Were American intelligence and law enforcement effectively positioned to protect the public? Bulletin of the American Society for Information Science and Technology, 28(3), 18-22.
-
(2002)
Bulletin of the American Society for Information Science and Technology
, vol.28
, Issue.3
, pp. 18-22
-
-
Strickland, L.S.1
-
143
-
-
0142088659
-
Information and the war against terrorism (Part III): New information-related laws and the impact on civil liberties
-
Strickland, L. S. (2002c). Information and the war against terrorism (Part III): New information-related laws and the impact on civil liberties. Bulletin of the American Society for Information Science and Technology, 29(3), 23-27.
-
(2002)
Bulletin of the American Society for Information Science and Technology
, vol.29
, Issue.3
, pp. 23-27
-
-
Strickland, L.S.1
-
144
-
-
0142024865
-
Information and the war against terrorism (Part IV): Civil liberties vs. security in the age of terrorism
-
Strickland, L. S. (2002d). Information and the war against terrorism (Part IV): Civil liberties vs. security in the age of terrorism. Bulletin of the American Society for Information Science and Technology, 28(4), 9-13.
-
(2002)
Bulletin of the American Society for Information Science and Technology
, vol.28
, Issue.4
, pp. 9-13
-
-
Strickland, L.S.1
-
147
-
-
33749331861
-
Using support vector machines for terrorism information extraction
-
Sun, A., Naing, M.-M., Lim, E.-P., & Lam, W (2003). Using support vector machines for terrorism information extraction. Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03), 1-12.
-
(2003)
Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03)
, pp. 1-12
-
-
Sun, A.1
Naing, M.-M.2
Lim, E.-P.3
Lam, W.4
-
148
-
-
0033874603
-
Comparing noun phrasing techniques for use with medical digital library tools
-
Tolle, K. M., & Chen, H. (2000). Comparing noun phrasing techniques for use with medical digital library tools. Journal of the American Society for Information Science, 51(4), 352-370.
-
(2000)
Journal of the American Society for Information Science
, vol.51
, Issue.4
, pp. 352-370
-
-
Tolle, K.M.1
Chen, H.2
-
149
-
-
84950351930
-
Multidimensional scaling: Theory and method
-
Torgerson, W. S. (1952). Multidimensional scaling: Theory and method. Psychometrika, 17, 401-419.
-
(1952)
Psychometrika
, vol.17
, pp. 401-419
-
-
Torgerson, W.S.1
-
153
-
-
0011450426
-
-
Washington DC: Office of Homeland Security. Retrieved August 19, 2004
-
U.S. Office of Homeland Security. (2002). National Strategy for Homeland Security. Washington DC: Office of Homeland Security. Retrieved August 19, 2004, from http://www.whitehouse.gov/homeland/book/nat_s trat_hls.pdf
-
(2002)
National Strategy for Homeland Security
-
-
-
155
-
-
1942443495
-
Automatically detecting deceptive criminal identities
-
Wang, G., Chen, H., & Atabakhsh, H. (2004). Automatically detecting deceptive criminal identities. Communications of the ACM, 47(3), 71-76.
-
(2004)
Communications of the ACM
, vol.47
, Issue.3
, pp. 71-76
-
-
Wang, G.1
Chen, H.2
Atabakhsh, H.3
-
156
-
-
35048822540
-
Generating concept hierarchies from text for intelligence analysis
-
Wang, J.-H., Huang, C.-C., Teng, J.-W., & Chien, L.-F. (2004). Generating concept hierarchies from text for intelligence analysis. Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI'04), 100-113.
-
(2004)
Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI'04)
, pp. 100-113
-
-
Wang, J.-H.1
Huang, C.-C.2
Teng, J.-W.3
Chien, L.-F.4
-
157
-
-
35248824065
-
Criminal record matching based on the vector space model
-
Wang, J.-H., Lin, B. T., Shieh, C.-C., & Deng, P. S. (2003). Criminal record matching based on the vector space model. Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03), 386.
-
(2003)
Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03)
, pp. 386
-
-
Wang, J.-H.1
Lin, B.T.2
Shieh, C.-C.3
Deng, P.S.4
-
160
-
-
0003932630
-
-
San Francisco: Morgan Kaufmann
-
Weiss, S. I., & Kulikowski, C. A. (1991). Computer systems that learn: Classification and prediction methods from statistics, neural networks, machine learning, and expert systems. San Francisco: Morgan Kaufmann.
-
(1991)
Computer Systems That Learn: Classification and Prediction Methods from Statistics, Neural Networks, Machine Learning, and Expert Systems
-
-
Weiss, S.I.1
Kulikowski, C.A.2
-
161
-
-
0016606093
-
Mendenhall's studies of word-length distribution in the works of Shakespeare and Bacon
-
Williams, C. (1975). Mendenhall's studies of word-length distribution in the works of Shakespeare and Bacon. Biometrika, 62, 207-212.
-
(1975)
Biometrika
, vol.62
, pp. 207-212
-
-
Williams, C.1
-
162
-
-
84861297124
-
Using language models for generic entity extraction
-
Retrieved August 20, 2004
-
Witten, I. H., Bray, Z., Mahoui, M., & Teahan, W. J. (1999). Using language models for generic entity extraction. Proceedings of the ICML Workshop on Text Mining. Retrieved August 20, 2004, from http://www-ai.ijs.si/ DunjaMladenic/ICML99/WittenFinal.ps
-
(1999)
Proceedings of the ICML Workshop on Text Mining
-
-
Witten, I.H.1
Bray, Z.2
Mahoui, M.3
Teahan, W.J.4
-
164
-
-
28844509691
-
Criminal network analysis and visualization: A data mining perspective
-
in press
-
Xu, J., & Chen, H. (in press). Criminal network analysis and visualization: A data mining perspective. Communications of the ACM.
-
Communications of the ACM
-
-
Xu, J.1
Chen, H.2
-
166
-
-
0033359891
-
Learning approaches for detecting and tracking news events
-
Yang, Y., Carbonell, J., Brown, R., Pierce, T., Archibald, B. T., & Liu, X. (1999). Learning approaches for detecting and tracking news events. IEEE Intelligent Systems, 14(4), 32-43.
-
(1999)
IEEE Intelligent Systems
, vol.14
, Issue.4
, pp. 32-43
-
-
Yang, Y.1
Carbonell, J.2
Brown, R.3
Pierce, T.4
Archibald, B.T.5
Liu, X.6
-
167
-
-
33646511657
-
COPLINK Agent: An architecture for information monitoring and sharing in law enforcement
-
Zeng, D., Chen, H., Daspit, D., Shan, F., Nandiraju, S., Chau, M., et al. (2003). COPLINK Agent: An architecture for information monitoring and sharing in law enforcement. Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03), 281-295.
-
(2003)
Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03)
, pp. 281-295
-
-
Zeng, D.1
Chen, H.2
Daspit, D.3
Shan, F.4
Nandiraju, S.5
Chau, M.6
-
168
-
-
35048858917
-
West Nile virus and botulism portal: A case study in infectious disease informatics
-
Zeng, D., Chen, H., Tseng, C., Larson, C., Eidson, M., Gotham, I., et al. (2004). West Nile virus and botulism portal: A case study in infectious disease informatics. Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI'04), 28-41.
-
(2004)
Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI'04)
, pp. 28-41
-
-
Zeng, D.1
Chen, H.2
Tseng, C.3
Larson, C.4
Eidson, M.5
Gotham, I.6
-
169
-
-
28844489504
-
Applying data mining in investigating money laundering crimes
-
Zhang, Z., Salerno, J. J., & Yu, P. S. (2003). Applying data mining in investigating money laundering crimes. Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 747-752.
-
(2003)
Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 747-752
-
-
Zhang, Z.1
Salerno, J.J.2
Yu, P.S.3
-
170
-
-
35248839491
-
Collaborative workflow management for interagency crime analysis
-
Zhao, J. L., Bi, H. H., & Chen, H. (2003). Collaborative workflow management for interagency crime analysis. Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03), 266-280.
-
(2003)
Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03)
, pp. 266-280
-
-
Zhao, J.L.1
Bi, H.H.2
Chen, H.3
-
171
-
-
35048871882
-
Authorship analysis in cybercrime investigation
-
Zheng, R., Qin, Y., Huang, Z., & Chen, H. (2003). Authorship analysis in cybercrime investigation. Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03), 59-73.
-
(2003)
Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03)
, pp. 59-73
-
-
Zheng, R.1
Qin, Y.2
Huang, Z.3
Chen, H.4
|