Evaluating temporally weighted kernel density methods for predicting the next event location in a series
暂无分享,去创建一个
[1] Shane D. Johnson,et al. Domestic Burglary Repeats and Space-Time Clusters , 2005 .
[2] Wim Bernasco,et al. Same-Offender Involvement in Repeat and Near Repeat Burglaries , 2008 .
[3] Elizabeth A. Mack,et al. Spatio-Temporal Interaction of Urban Crime , 2008 .
[4] P. Brantingham,et al. Environment, Routine, and Situation: Toward a Pattern Theory of Crime (1993) , 2010 .
[5] Gary LaFreeLaura,et al. Spatial and Temporal Patterns of Terrorist Attacks by ETA 1970 to 2007 , 2012 .
[6] Donald E. Brown,et al. A Statistical Threat Assessment , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[7] Gentry White,et al. Innovative Methods for Terrorism and Counterterrorism Data , 2012 .
[8] Matt R. Nobles,et al. Assessing the Generalizability of the Near Repeat Phenomenon , 2011 .
[9] Wolfgang Härdle,et al. APPLIED NONPARAMETRIC METHODS , 1992 .
[10] Cynthia Lum,et al. Evidence-Based Counterterrorism Policy , 2012 .
[11] Ken Pease,et al. Prospective hot-spotting - The future of crime mapping? , 2004 .
[12] Ken Pease,et al. Offender as Forager? A Direct Test of the Boost Account of Victimization , 2009 .
[13] Gentry White,et al. Self-exciting hurdle models for terrorist activity , 2012, 1203.3680.
[14] George E. Tita,et al. Self-Exciting Point Process Modeling of Crime , 2011 .
[15] Shane D. Johnson,et al. Who commits near repeats? A test of the boost explanation , 2004 .
[16] Shane D. Johnson,et al. Space Time Dynamics of Insurgent Activity in Iraq , 2008 .
[17] Roberto Frias,et al. A brief survey , 2011 .
[18] Frederic Paik Schoenberg,et al. Testing separability in spatial-temporal marked point processes. , 2004, Biometrics.
[19] Jerry H. Ratcliffe,et al. Aoristic Signatures and the Spatio-Temporal Analysis of High Volume Crime Patterns , 2002 .
[20] D. W. Scott,et al. Multivariate Density Estimation, Theory, Practice and Visualization , 1992 .
[21] Shane D. Johnson,et al. Exploring Theories of Victimization Using a Mathematical Model of Burglary , 2011 .
[22] Shane D. Johnson,et al. Spatio-temporal Modelling of Insurgency in Iraq , 2009 .
[23] Shane D. Johnson,et al. The Stability of Space-Time Clusters of Burglary , 2004 .
[24] Donald E. Brown,et al. A decision model for spatial site selection by criminals: a foundation for law enforcement decision support , 2003, IEEE Trans. Syst. Man Cybern. Part C.
[25] Kristian Skrede Gleditsch,et al. The Developmental Dynamics of Terrorist Organizations , 2009, PloS one.
[26] Timothy Coupe,et al. DAYLIGHT AND DARKNESS TARGETING STRATEGIES AND THE RISKS OF BEING SEEN AT RESIDENTIAL BURGLARIES , 2006 .
[27] Hua Liu,et al. C incident prediction using a point-pattern-based density , 2003 .
[28] David W. Scott,et al. Multivariate Density Estimation: Theory, Practice, and Visualization , 1992, Wiley Series in Probability and Statistics.
[29] Sergio J. Rey,et al. Exploratory Space–Time Analysis of Burglary Patterns , 2012 .
[30] Yang Aimin,et al. Criminal incident prediction based on geographical profile , 2014 .
[31] Wim Bernasco,et al. Putting crime in its place: Units of analysis in geographic criminology , 2009 .
[32] George E. Tita,et al. Measuring and Modeling Repeat and Near-Repeat Burglary Effects , 2009 .
[33] Mike O'Leary,et al. The mathematics of geographic profiling , 2009 .
[34] Eric L. Piza,et al. Risk Clusters, Hotspots, and Spatial Intelligence: Risk Terrain Modeling as an Algorithm for Police Resource Allocation Strategies , 2011 .
[35] M. Townsley,et al. Infectious Burglaries. A Test of the Near Repeat Hypothesis , 2003 .
[36] Ken Pease,et al. Predictive Mapping of Crime by ProMap: Accuracy, Units of Analysis, and the Environmental Backcloth , 2009 .
[37] M. Felson,et al. Routine activity and rational choice , 2004 .
[38] Lisa Tompson,et al. (Looking) Back to the Future: Using Space—Time Patterns to Better Predict the Location of Street Crime , 2010 .
[39] Richard Block,et al. WHERE OFFENDERS CHOOSE TO ATTACK: A DISCRETE CHOICE MODEL OF ROBBERIES IN CHICAGO* , 2009 .
[40] Shane D. Johnson,et al. Space–Time Modeling of Insurgency and Counterinsurgency in Iraq , 2012 .
[41] Gary LaFree,et al. Microcycles of Violence: Evidence from Terrorist Attacks by ETA and the FMLN , 2012 .
[42] M. C. Jones,et al. A Brief Survey of Bandwidth Selection for Density Estimation , 1996 .
[43] Shane D. Johnson. Repeat burglary victimisation: a tale of two theories , 2008 .
[44] Erik A. Lewis,et al. Self-exciting point process models of civilian deaths in Iraq , 2011, Security Journal.
[45] R Core Team,et al. R: A language and environment for statistical computing. , 2014 .
[46] P. Brantingham,et al. Crime Pattern Theory , 2013, Oxford Research Encyclopedia of Criminology and Criminal Justice.
[47] C. Loader. Bandwidth selection: classical or plug-in? , 1999 .
[48] P. Diggle,et al. Spatial point pattern analysis and its application in geographical epidemiology , 1996 .
[49] P. Brantingham,et al. Criminality of place , 1995 .
[50] Jerry H. Ratcliffe,et al. Aoristic analysis: the spatial interpretation of unspecific temporal events , 2000, Int. J. Geogr. Inf. Sci..