Sciweavers

60 search results - page 4 / 12
» Aoristic Crime Analysis
Sort
View
INFOCOM
2011
IEEE
12 years 12 months ago
Identifying mobiles hiding behind wireless routers
—The network address translation technique (NAT) is widely used in wireless routers. It is a low cost solution to IPv4 address space limitations. However, cyber criminals may abu...
Yinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu, ...
DGO
2003
202views Education» more  DGO 2003»
13 years 10 months ago
Crime Data Mining: An Overview and Case Studies
The concern about national security has increased significantly since the 9/11 attacks. However, information overload hinders the effective analysis of criminal and terrorist activ...
Hsinchun Chen, Wingyan Chung, Yi Qin, Michael Chau...
GIS
2008
ACM
14 years 9 months ago
Should SDBMS support a join index?: a case study from CrimeStat
Given a spatial crime data warehouse, that is updated infrequently and a set of operations O as well as constraints of storage and update overheads, the index type selection probl...
Pradeep Mohan, Ronald E. Wilson, Shashi Shekhar, B...
KDD
2003
ACM
266views Data Mining» more  KDD 2003»
14 years 9 months ago
Applying data mining in investigating money laundering crimes
In this paper, we study the problem of applying data mining to facilitate the investigation of money laundering crimes (MLCs). We have identified a new paradigm of problems --- th...
Zhongfei (Mark) Zhang, John J. Salerno, Philip S. ...
SIAMADS
2010
105views more  SIAMADS 2010»
13 years 3 months ago
Nonlinear Patterns in Urban Crime: Hotspots, Bifurcations, and Suppression
We present a weakly nonlinear analysis of our recently developed model for the formation of crime patterns. Using a perturbative approach, we find amplitude equations that govern t...
Martin B. Short, Andrea L. Bertozzi, P. J. Brantin...