12 papers:
- ICEIS-v1-2015-SouzaBGBE #learning #online
- Applying Ensemble-based Online Learning Techniques on Crime Forecasting (AJdS, APB, HMG, JPB, FE), pp. 17–24.
- SAC-2014-Gutierrez-GarciaG #multi #safety #simulation
- Multi-agent simulation of perception of safety from crime (JOGG, AGdSG), pp. 573–578.
- HIMI-LCCB-2013-AntolosLLV #analysis #using
- Burglary Crime Analysis Using Logistic Regression (DA, DL, AL, DAV), pp. 549–558.
- RE-2013-MuyanjaMNTKN #requirements
- Requirements engineering for the uganda police force crime records management system (AM, PIM, CN, SSTT, EKK, AN), pp. 302–307.
- CSCW-2012-PoelmanALJ
- As if being there: mediated reality for crime scene investigation (RP, OA, SL, PJ), pp. 1267–1276.
- RecSys-2011-TayebiJEGF #named #recommendation
- CrimeWalker: a recommendation model for suspect investigation (MAT, MJ, ME, UG, RF), pp. 173–180.
- KMIS-2010-WiilGM #analysis #information management #network
- CrimeFighter Assistant — A Knowledge Management Tool for Terrorist Network Analysis (UKW, JG, NM), pp. 15–24.
- CIKM-2008-BacheC
- Estimating real-valued characteristics of criminals from their recorded crimes (RB, FC), pp. 1385–1386.
- SAC-2008-HanaFOB #classification
- Crime scene classification (ROAH, COdAF, LSO, FB), pp. 419–423.
- SAC-2007-FurtadoMCM #modelling #network #simulation #social
- A crime simulation model based on social networks and swarm intelligence (VF, AM, ALVC, RM), pp. 56–57.
- SAC-2006-BreedenM #internet
- Investigating “Internet Crimes Against Children” (ICAC) cases in the state of Florida (BB, JM), pp. 288–292.
- KDD-2003-ZhangSY #data mining #mining
- Applying data mining in investigating money laundering crimes (Z(Z, JJS, PSY), pp. 747–752.