Crime in Urban Areas:: A Data Mining Perspective
暂无分享,去创建一个
[1] Philip S. Yu,et al. Enterprise Community Detection , 2017, 2017 IEEE 33rd International Conference on Data Engineering (ICDE).
[2] Philip S. Yu,et al. PCT: Partial Co-Alignment of Social Networks , 2016, WWW.
[3] Matthew S. Gerber,et al. Using Twitter for Next-Place Prediction, with an Application to Crime Prediction , 2015, 2015 IEEE Symposium Series on Computational Intelligence.
[4] Ronald V. Clarke,et al. Introduction: Criminology, Routine Activity, and Rational Choice , 2017 .
[5] Michael J. McCullagh,et al. Crime, repeat victimisation and GIS , 2001 .
[6] Philip S. Yu,et al. HeteroSales: Utilizing Heterogeneous Social Networks to Identify the Next Enterprise Customer , 2016, WWW.
[7] Antal F. Novak,et al. networks Græmlin : General and robust alignment of multiple large interaction data , 2006 .
[8] Zhen Wang,et al. Knowledge Graph Embedding by Translating on Hyperplanes , 2014, AAAI.
[9] Xiaofeng Wang,et al. Automatic Crime Prediction Using Events Extracted from Twitter Posts , 2012, SBP.
[10] A. Loukaitou-Sideris. Hot Spots of Bus Stop Crime , 1999 .
[11] Xu Chen,et al. Cross Entropy approach for patrol route planning in dynamic environments , 2010, 2010 IEEE International Conference on Intelligence and Security Informatics.
[12] Hang-Bong Kang,et al. Prediction of crime occurrence from multi-modal data using deep learning , 2017, PloS one.
[13] Michalis Vazirgiannis,et al. Clustering and Community Detection in Directed Networks: A Survey , 2013, ArXiv.
[14] Patricia L. Brantingham,et al. Notes on the Geometry of Crime , 2017 .
[15] Philip S. Yu,et al. MCD: Mutual Clustering across Multiple Social Networks , 2015, 2015 IEEE International Congress on Big Data.
[16] Erhard Rahm,et al. Similarity flooding: a versatile graph matching algorithm and its application to schema matching , 2002, Proceedings 18th International Conference on Data Engineering.
[17] Milind Tambe,et al. Optimal Allocation of Police Patrol Resources Using a Continuous-Time Crime Model , 2016, GameSec.
[18] Matjaz Perc,et al. Statistical physics of crime: A review , 2014, Physics of life reviews.
[19] Philip S. Yu,et al. BL-MNE: Emerging Heterogeneous Social Network Embedding Through Broad Learning with Aligned Autoencoder , 2017, 2017 IEEE International Conference on Data Mining (ICDM).
[20] Lawrence E. Cohen,et al. Human ecology and crime: A routine activity approach , 1980 .
[21] Philip S. Yu,et al. Discover Tipping Users For Cross Network Influencing , 2016 .
[22] Kyle Luh,et al. Community Detection Using Spectral Clustering on Sparse Geosocial Data , 2012, SIAM J. Appl. Math..
[23] Philip S. Yu,et al. Multiple Anonymized Social Networks Alignment , 2015, 2015 IEEE International Conference on Data Mining.
[24] Shinji Umeyama,et al. An Eigendecomposition Approach to Weighted Graph Matching Problems , 1988, IEEE Trans. Pattern Anal. Mach. Intell..
[25] Maria R. D'Orsogna,et al. Territorial developments based on graffiti: A statistical mechanics approach , 2012, 1208.0401.
[26] Andrea L. Bertozzi,et al. Nonlinear Patterns in Urban Crime: Hotspots, Bifurcations, and Suppression , 2010, SIAM J. Appl. Dyn. Syst..
[27] M E J Newman,et al. Modularity and community structure in networks. , 2006, Proceedings of the National Academy of Sciences of the United States of America.
[28] Pasquale De Meo,et al. Detecting criminal organizations in mobile phone networks , 2014, Expert Syst. Appl..
[29] Yue Zhang,et al. Simulation optimization of police patrol districting plans using response surfaces , 2014, Simul..
[30] Daryl J. Daley,et al. An Introduction to the Theory of Point Processes , 2013 .
[31] R. Karp,et al. From the Cover : Conserved patterns of protein interaction in multiple species , 2005 .
[32] Philip S. Yu,et al. Intertwined viral marketing in social networks , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[33] Michael Trusov,et al. Determining Influential Users in Internet Social Networks , 2010 .
[34] Philip S. Yu,et al. Link Prediction across Heterogeneous Social Networks: A Survey , 2014 .
[35] Martin Ester,et al. Spatially embedded co-offence prediction using supervised learning , 2014, KDD.
[36] Wilpen L. Gorr,et al. Short-term forecasting of crime , 2003 .
[37] Jitendra Malik,et al. Normalized cuts and image segmentation , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[38] Jure Leskovec,et al. Community Detection in Networks with Node Attributes , 2013, 2013 IEEE 13th International Conference on Data Mining.
[39] Paul A. Zandbergen,et al. Kernel density estimation and hotspot mapping: examining the influence of interpolation method, grid cell size, and bandwidth on crime forecasting , 2014 .
[40] Federico Liberatore,et al. A multi-criteria Police Districting Problem for the efficient and effective design of patrol sector , 2015, Eur. J. Oper. Res..
[41] Derek G. Corneil,et al. The graph isomorphism disease , 1977, J. Graph Theory.
[42] Jeong-Hoon Lee,et al. An In-depth Comparison of Subgraph Isomorphism Algorithms in Graph Databases , 2012, Proc. VLDB Endow..
[43] Matthew S. Gerber,et al. Predicting crime using Twitter and kernel density estimation , 2014, Decis. Support Syst..
[44] Mohammad Al Hasan,et al. Link prediction using supervised learning , 2006 .
[45] Philip S. Yu,et al. Link Prediction across Aligned Networks with Sparse and Low Rank Matrix Estimation , 2017, 2017 IEEE 33rd International Conference on Data Engineering (ICDE).
[46] Gert R. G. Lanckriet,et al. On the Convergence of the Concave-Convex Procedure , 2009, NIPS.
[47] Danai Koutra,et al. BIG-ALIGN: Fast Bipartite Graph Alignment , 2013, 2013 IEEE 13th International Conference on Data Mining.
[48] Philip S. Yu,et al. Transferring heterogeneous links across location-based social networks , 2014, WSDM.
[49] Jure Leskovec,et al. Empirical comparison of algorithms for network community detection , 2010, WWW '10.
[50] Juncheng Wei,et al. Existence of Symmetric and Asymmetric Spikes for a Crime Hotspot Model , 2013, SIAM J. Math. Anal..
[51] Philip S. Yu,et al. PNA: Partial Network Alignment with Generic Stable Matching , 2015, 2015 IEEE International Conference on Information Reuse and Integration.
[52] Ulrike von Luxburg,et al. A tutorial on spectral clustering , 2007, Stat. Comput..
[53] Bonnie Berger,et al. IsoRankN: spectral methods for global alignment of multiple protein networks , 2009, Bioinform..
[54] Mahantesh Halappanavar,et al. New Effective Multithreaded Matching Algorithms , 2014, 2014 IEEE 28th International Parallel and Distributed Processing Symposium.
[55] Alan L. Yuille,et al. The Concave-Convex Procedure , 2003, Neural Computation.
[56] J. H. Ratcliffe,et al. Hotbeds of crime and the search for spatial accuracy , 1999, J. Geogr. Syst..
[57] Srinivasan Parthasarathy,et al. Scalable global alignment for multiple biological networks , 2012, BMC Bioinformatics.
[58] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[59] Wei Ding,et al. Crime Forecasting Using Spatio-temporal Pattern with Ensemble Learning , 2014, PAKDD.
[60] I. Kawachi,et al. Social capital, income inequality, and firearm violent crime. , 1998, Social science & medicine.
[61] Ronald V. Clarke,et al. The Reasoning Criminal: Rational Choice Perspectives on Offending , 2017 .
[62] Ronaldo Menezes,et al. Using Self-Organization in an Agent Framework to Model Criminal Activity in Response to Police Patrol Routes , 2006, FLAIRS Conference.
[63] Philip S. Yu,et al. Meta-path based multi-network collective link prediction , 2014, KDD.
[64] Shishir Bharathi,et al. Competitive Influence Maximization in Social Networks , 2007, WINE.
[65] Xu Chen,et al. Fast Patrol Route Planning in Dynamic Environments , 2012, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[66] R. Clarke. Situational Crime Prevention , 1995, Crime and Justice.
[67] Philip S. Yu,et al. Community Detection for Emerging Networks , 2015, SDM.
[68] Steven Skiena,et al. DeepWalk: online learning of social representations , 2014, KDD.
[69] Charles Elkan,et al. Learning classifiers from only positive and unlabeled data , 2008, KDD.
[70] E. B. Patterson,et al. POVERTY, INCOME INEQUALITY, AND COMMUNITY CRIME RATES , 1991 .
[71] Philip S. Yu,et al. Rumor Initiator Detection in Infected Signed Networks , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[72] Shane D. Johnson,et al. The Stability of Space-Time Clusters of Burglary , 2004 .
[73] S. Raudenbush,et al. Neighborhoods and violent crime: a multilevel study of collective efficacy. , 1997, Science.
[74] Wei Ding,et al. Discovery of Geospatial Discriminating Patterns from Remote Sensing Datasets , 2009, SDM.
[75] Nisheeth Shrivastava,et al. Viral Marketing for Multiple Products , 2010, 2010 IEEE International Conference on Data Mining.
[76] Milind Tambe,et al. An extensive study of Dynamic Bayesian Network for patrol allocation against adaptive opportunistic criminals , 2015 .
[77] Linyuan Lu,et al. Link Prediction in Complex Networks: A Survey , 2010, ArXiv.
[78] Creto Augusto Vidal,et al. MSKDE - Using Marching Squares to Quickly Make High Quality Crime Hotspot Maps , 2016, 2016 29th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI).
[79] Malcolm W. Klein,et al. Labeling Theory and Delinquency Policy , 1986 .
[80] Dirk Cattrysse,et al. Organising patrol deployment against violent crimes , 2007, Oper. Res..
[81] Leo Katz,et al. A new status index derived from sociometric analysis , 1953 .
[82] Andrea L Bertozzi,et al. Dissipation and displacement of hotspots in reaction-diffusion models of crime , 2010, Proceedings of the National Academy of Sciences.
[83] Mingzhe Wang,et al. LINE: Large-scale Information Network Embedding , 2015, WWW.
[84] George E. Tita,et al. Measuring and Modeling Repeat and Near-Repeat Burglary Effects , 2009 .
[85] Yizhou Sun,et al. Ranking-based clustering of heterogeneous information networks with star network schema , 2009, KDD.
[86] Kristina Lerman,et al. Non-Conservative Diffusion and its Application to Social Network Analysis , 2011, ArXiv.
[87] François Fouss,et al. Random-Walk Computation of Similarities between Nodes of a Graph with Application to Collaborative Recommendation , 2007, IEEE Transactions on Knowledge and Data Engineering.
[88] Charu C. Aggarwal,et al. Data Mining: The Textbook , 2015 .
[89] Erik A. Lewis,et al. Self-exciting point process models of civilian deaths in Iraq , 2011, Security Journal.
[90] Bonnie Berger,et al. Pairwise Global Alignment of Protein Interaction Networks by Matching Neighborhood Topology , 2007, RECOMB.
[91] Ying Wang,et al. Algorithms for Large, Sparse Network Alignment Problems , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[92] Philip S. Yu,et al. Information Diffusion at Workplace , 2016, CIKM.
[93] Huiling Zhang,et al. Least Cost Influence Maximization Across Multiple Social Networks , 2016, IEEE/ACM Transactions on Networking.
[94] Philip S. Yu,et al. PathSim , 2011, Proc. VLDB Endow..
[95] John E. Eck,et al. Reducing Crime and Drug Dealing by Improving Place Management: A Randomized Experiment , 1999 .
[96] Adam Crawford,et al. Crime Prevention and Community Safety , 2012 .
[97] A. Barab,et al. Evolution of the social network of scienti $ c collaborations , 2002 .
[98] Kristian Behrens,et al. Survival of the Fittest in Cities: Urbanisation and Inequality , 2014 .
[99] Attila Szolnoki,et al. Evolutionary dynamics of group interactions on structured populations: a review , 2013, Journal of The Royal Society Interface.
[100] Dacheng Tao,et al. Empirical Discriminative Tensor Analysis for Crime Forecasting , 2011, KSEM.
[101] Martin Ester,et al. CRIMETRACER: Activity space based crime location prediction , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).
[102] Jun Huan,et al. GPM: A graph pattern matching kernel with diffusion for chemical compound classification , 2008, 2008 8th IEEE International Conference on BioInformatics and BioEngineering.
[103] Lada A. Adamic,et al. Friends and neighbors on the Web , 2003, Soc. Networks.
[104] Christos Faloutsos,et al. Fast Random Walk with Restart and Its Applications , 2006, Sixth International Conference on Data Mining (ICDM'06).
[105] John Braithwaite. Inequality, Crime and Public Policy (Routledge Revivals) , 2013 .
[106] Roxana Roman. Community-based Recommendations toImprove Intranet Users' Productivity , 2016 .
[107] Philip S. Yu,et al. Influence Maximization Across Partially Aligned Heterogenous Social Networks , 2015, PAKDD.
[108] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[109] Xiaofeng Wang,et al. Spatio-temporal modeling of criminal incidents using geographic, demographic, and twitter-derived information , 2012, 2012 IEEE International Conference on Intelligence and Security Informatics.
[110] Philip S. Yu,et al. Enterprise Employee Training via Project Team Formation , 2017, WSDM.
[111] Tao Hu,et al. Integrating near repeat and social network approaches to analyze crime patterns , 2017, 2017 25th International Conference on Geoinformatics.
[112] Philip S. Yu,et al. Multi-source Multi-view Clustering via discrepancy penalty , 2016, 2016 International Joint Conference on Neural Networks (IJCNN).
[113] K. Leong,et al. A review of spatio-temporal pattern analysis approaches on crime analysis , 2015 .
[114] Matthew H. Ranson. Crime, Weather, and Climate Change , 2012 .
[115] Reza Zafarani,et al. Connecting users across social media sites: a behavioral-modeling approach , 2013, KDD.
[116] J. Braithwaite. Crime, shame and reintegration: Contents , 1989 .
[117] Dawei Wang,et al. Optimization of Criminal HotSpots Based on Underlying Crime Controlling Factors Using Geospatial Discriminative Pattern , 2012, IEA/AIE.
[118] Josine Junger-Tas,et al. : Social Sources of Delinquency: An Appraisal of Analytic Models , 1980 .
[119] Kent A. Harries,et al. Mapping Crime: Principle And Practice , 1999 .
[120] A. Arenas,et al. Community analysis in social networks , 2004 .
[121] Piet Van Mieghem,et al. Epidemic processes in complex networks , 2014, ArXiv.
[122] S. Chainey,et al. Mapping Crime: Understanding Hot Spots , 2014 .
[123] Daniel Kifer,et al. Crime Rate Inference with Big Data , 2016, KDD.
[124] Manish Jain,et al. Keeping Pace with Criminals: An Extended Study of Designing Patrol Allocation against Adaptive Opportunistic Criminals , 2016, Games.
[125] John Hagan,et al. Crime and Inequality , 1996 .
[126] Jinde Cao,et al. Weighted-traffic-network–based geographic profiling for serial crime location prediction , 2011 .
[127] Ning Chen,et al. On the approximability of influence in social networks , 2008, SODA '08.
[128] Matthew Richardson,et al. Mining knowledge-sharing sites for viral marketing , 2002, KDD.
[129] Andrea L. Bertozzi,et al. Geographical influences of an emerging network of gang rivalries , 2011 .
[130] Jon M. Kleinberg,et al. The link-prediction problem for social networks , 2007, J. Assoc. Inf. Sci. Technol..
[131] Zhongfei Zhang,et al. Deep Air Learning: Interpolation, Prediction, and Feature Analysis of Fine-Grained Air Quality , 2017, IEEE Transactions on Knowledge and Data Engineering.
[132] Jiliang Tang,et al. Modeling Temporal-Spatial Correlations for Crime Prediction , 2017, CIKM.
[133] Robert M. Goodman,et al. Systemic spread of an RNA insect virus in plants expressing plant viral movement protein genes , 2001, Proceedings of the National Academy of Sciences of the United States of America.
[134] Philip S. Yu,et al. Building text classifiers using positive and unlabeled examples , 2003, Third IEEE International Conference on Data Mining.
[135] Roger Wattenhofer,et al. Word of Mouth: Rumor Dissemination in Social Networks , 2008, SIROCCO.
[136] K. Bowers,et al. NEW INSIGHTS INTO THE SPATIAL AND TEMPORAL DISTRIBUTION OF REPEAT VICTIMIZATION , 1997 .
[137] Guanrong Chen,et al. Complex networks: small-world, scale-free and beyond , 2003 .
[138] E. Levina,et al. Community extraction for social networks , 2010, Proceedings of the National Academy of Sciences.
[139] Jure Leskovec,et al. node2vec: Scalable Feature Learning for Networks , 2016, KDD.
[140] Hsinchun Chen,et al. Untangling Criminal Networks: A Case Study , 2003, ISI.
[141] Paulo Shakarian,et al. Social network intelligence analysis to combat street gang violence , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[142] Ioannis Konstas,et al. On social networks and collaborative recommendation , 2009, SIGIR.
[143] Jon M. Kleinberg,et al. Inferring Web communities from link topology , 1998, HYPERTEXT '98.
[144] H. D. McKay,et al. Juvenile Delinquency and Urban Areas. , 1943 .
[145] Éva Tardos,et al. Influential Nodes in a Diffusion Model for Social Networks , 2005, ICALP.
[146] Louise Biron,et al. Crime and Everyday Life - Insight and Implications for Society; Partners in Crime Prevention: For a Safer Quebec , 1995 .
[147] Isaac Ehrlich,et al. On the Relation between Education and Crime , 1975 .
[148] Philip S. Yu,et al. Predicting Social Links for New Users across Aligned Heterogeneous Social Networks , 2013, 2013 IEEE 13th International Conference on Data Mining.
[149] Chris Couch,et al. Urban regeneration and sustainable development in Britain , 2000 .
[150] Zhaoming Yin,et al. Taming Near Repeat Calculation for Crime Analysis via Cohesive Subgraph Computing , 2017, ArXiv.
[151] Lawrence E. Cohen,et al. Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .
[152] Ingemar Nåsell,et al. Stochastic models of some endemic infections. , 2002, Mathematical biosciences.
[153] Dawei Wang,et al. Crime hotspot mapping using the crime related factors—a spatial data mining approach , 2012, Applied Intelligence.
[154] J. Figueira-Mcdonough. : Disorder and Decline: Crime and the Spiral of Decay in American Neighborhoods , 1992 .
[155] Peng Chen,et al. Forecasting Crime Using the ARIMA Model , 2008, 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery.
[156] Xiuwen Yi,et al. DNN-based prediction model for spatio-temporal data , 2016, SIGSPATIAL/GIS.
[157] Yu Zheng,et al. Deep Spatio-Temporal Residual Networks for Citywide Crowd Flows Prediction , 2016, AAAI.
[158] Mario Vento,et al. Thirty Years Of Graph Matching In Pattern Recognition , 2004, Int. J. Pattern Recognit. Artif. Intell..
[159] Roded Sharan,et al. Fast and Accurate Alignment of Multiple Protein Networks , 2009, J. Comput. Biol..
[160] S. Field. THE EFFECT OF TEMPERATURE ON CRIME , 1992 .
[161] Philip S. Yu,et al. Inferring anchor links across multiple heterogeneous social networks , 2013, CIKM.
[162] Pedro M. Domingos,et al. Ontology Matching: A Machine Learning Approach , 2004, Handbook on Ontologies.
[163] John T. Stasko,et al. HotSketch: Drawing Police Patrol Routes among Spatiotemporal Crime Hotspots , 2017, HICSS.
[164] Philip S. Yu,et al. BL-ECD: Broad Learning based Enterprise Community Detection via Hierarchical Structure Fusion , 2017, CIKM.
[165] Janet Chaseling,et al. Repeat Burglary Victimisation: Spatial and Temporal Patterns , 2000 .
[166] Jason Weston,et al. Translating Embeddings for Modeling Multi-relational Data , 2013, NIPS.
[167] Federico Liberatore,et al. A Decision Support System for predictive police patrolling , 2015, Decis. Support Syst..
[168] Zhiyuan Liu,et al. Learning Entity and Relation Embeddings for Knowledge Graph Completion , 2015, AAAI.
[169] Philip S. Yu,et al. Bicycle-sharing systems expansion: station re-deployment through crowd planning , 2016, SIGSPATIAL/GIS.
[170] Bonnie Berger,et al. IsoBase: a database of functionally related proteins across PPI networks , 2010, Nucleic Acids Res..
[171] Kate J. Bowers,et al. A GIS-linked database for monitoring repeat domestic burglary , 2001 .
[172] Karrie Karahalios,et al. Friend Grouping Algorithms for Online Social Networks: Preference, Bias, and Implications , 2014, SocInfo.
[173] Thomas C. Schelling,et al. Dynamic models of segregation , 1971 .
[174] Philip S. Yu,et al. Organizational Chart Inference , 2015, KDD.
[175] Milind Tambe,et al. Keeping Pace with Criminals: Designing Patrol Allocation Against Adaptive Opportunistic Criminals , 2015, AAMAS.
[176] Philip S. Yu,et al. Synergistic partitioning in multiple large scale social networks , 2014, 2014 IEEE International Conference on Big Data (Big Data).
[177] Bonnie Berger,et al. Global alignment of multiple protein interaction networks with application to functional orthology detection , 2008, Proceedings of the National Academy of Sciences.
[178] Michael R. Gottfredson,et al. A general theory of crime. , 1992 .
[179] Xu Chen,et al. Patrol districting and routing with security level functions , 2010, 2010 IEEE International Conference on Systems, Man and Cybernetics.
[180] R. Merton. Social Theory and Social Structure , 1958 .
[181] Jure Leskovec,et al. Supervised random walks: predicting and recommending links in social networks , 2010, WSDM '11.
[182] N. Levine. Crime Mapping and the CrimeStat Program , 2006 .
[183] J. McCormick,et al. Ebola virus disease in southern Sudan: hospital dissemination and intrafamilial spread. , 1983, Bulletin of the World Health Organization.
[184] John Braithwaite,et al. Crime, Shame, And Reintegration , 1989 .
[185] Patricia L. Brantingham,et al. Environmental Criminology: From Theory to Urban Planning Practice , 1998 .
[186] Philip S. Yu,et al. Bicycle-Sharing System Analysis and Trip Prediction , 2016, 2016 17th IEEE International Conference on Mobile Data Management (MDM).
[187] Uwe Glässer,et al. Locating Central Actors in Co-offending Networks , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.
[188] T. Blomberg. Heat conduction in two and three dimensions : computer modelling of building physics applications , 1996 .
[189] Yuanqing Xia,et al. Solution to gang crime based on Graph Theory and Analytical Hierarchy Process , 2014, Neurocomputing.
[190] S. Chainey,et al. GIS and Crime Mapping , 2005 .
[191] Xuejun Liu,et al. Analysis of Burglary Hot Spots and Near-Repeat Victimization in a Large Chinese City , 2017, ISPRS Int. J. Geo Inf..
[192] J. Wilson,et al. BROKEN WINDOWS: THE POLICE AND NEIGHBOURHOOD SAFETY , 1982 .
[193] Linyuan Lü,et al. Predicting missing links via local information , 2009, 0901.0553.
[194] Masoud Makrehchi,et al. Mining Social Media Content for Crime Prediction , 2016, 2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI).
[195] George E. Tita,et al. Self-Exciting Point Process Modeling of Crime , 2011 .
[196] Sudarshan S. Chawathe,et al. Organizing Hot-Spot Police Patrol Routes , 2007, 2007 IEEE Intelligence and Security Informatics.
[197] M. Fossett,et al. Ethnic Preferences, Social Distance Dynamics, and Residential Segregation: Theoretical Explorations Using Simulation Analysis* , 2006 .
[198] T. Hirschi. Causes of Delinquency. , 1970, British medical journal.
[199] T. N. Narasimhan,et al. Fourier’s heat conduction equation: History, influence, and connections , 1999, Journal of Earth System Science.
[200] Dit-Yan Yeung,et al. Overlapping community detection via bounded nonnegative matrix tri-factorization , 2012, KDD.
[201] Shmuel Friedland,et al. On the graph isomorphism problem , 2008, ArXiv.
[202] Donald E. Brown,et al. Simulating spatial-temporal pulse events in criminal site selection problems , 2012, SpringSim.
[203] John Shawe-Taylor,et al. A Balanced Route Design for Min-Max Multiple-Depot Rural Postman Problem (MMMDRPP): a police patrolling case , 2018, Int. J. Geogr. Inf. Sci..
[204] M. Macy,et al. Ethnic Preferences and Residential Segregation: Theoretical Explorations Beyond Detroit , 2006 .
[205] Philip S. Yu,et al. Inferring Social Influence of anti-Tobacco mass media campaigns , 2016, 2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM).
[206] Ellen G. Cohn,et al. WEATHER AND CRIME , 1990 .
[207] Anthony A. Braga,et al. The Corner and the Crew: The Influence of Geography and Social Networks on Gang Violence , 2013 .
[208] M. Felson,et al. Opportunity Makes the Thief Practical theory for crime prevention , 1998 .