12 papers:
ICEIS-v1-2015-SouzaBGBE #learning #online- Applying Ensemble-based Online Learning Techniques on Crime Forecasting (AJdS, APB, HMG, JPB, FE), pp. 17–24.
SAC-2014-Gutierrez-GarciaG #multi #safety #simulation- Multi-agent simulation of perception of safety from crime (JOGG, AGdSG), pp. 573–578.
HIMI-LCCB-2013-AntolosLLV #analysis #using- Burglary Crime Analysis Using Logistic Regression (DA, DL, AL, DAV), pp. 549–558.
RE-2013-MuyanjaMNTKN #requirements- Requirements engineering for the uganda police force crime records management system (AM, PIM, CN, SSTT, EKK, AN), pp. 302–307.
CSCW-2012-PoelmanALJ- As if being there: mediated reality for crime scene investigation (RP, OA, SL, PJ), pp. 1267–1276.
RecSys-2011-TayebiJEGF #named #recommendation- CrimeWalker: a recommendation model for suspect investigation (MAT, MJ, ME, UG, RF), pp. 173–180.
KMIS-2010-WiilGM #analysis #information management #network- CrimeFighter Assistant — A Knowledge Management Tool for Terrorist Network Analysis (UKW, JG, NM), pp. 15–24.
CIKM-2008-BacheC- Estimating real-valued characteristics of criminals from their recorded crimes (RB, FC), pp. 1385–1386.
SAC-2008-HanaFOB #classification- Crime scene classification (ROAH, COdAF, LSO, FB), pp. 419–423.
SAC-2007-FurtadoMCM #modelling #network #simulation #social- A crime simulation model based on social networks and swarm intelligence (VF, AM, ALVC, RM), pp. 56–57.
SAC-2006-BreedenM #internet- Investigating “Internet Crimes Against Children” (ICAC) cases in the state of Florida (BB, JM), pp. 288–292.
KDD-2003-ZhangSY #data mining #mining- Applying data mining in investigating money laundering crimes (Z(Z, JJS, PSY), pp. 747–752.