{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:37:35Z","timestamp":1729654655070,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/cis.2014.145","type":"proceedings-article","created":{"date-parts":[[2015,1,23]],"date-time":"2015-01-23T21:32:30Z","timestamp":1422048750000},"page":"539-543","source":"Crossref","is-referenced-by-count":0,"title":["Visualization of Police Intelligence Data Based on Word Clouds"],"prefix":"10.1109","author":[{"given":"Peng","family":"Wei","sequence":"first","affiliation":[]},{"given":"Tongge","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xi","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"Tag cloud drawing: Algorithms for cloud visualization","author":"kaser","year":"2007","journal-title":"WWW'07 Workshop on Taggings and Metadata for Social Information Organization"},{"key":"13","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1145\/1240624.1240775","article-title":"Getting our head in the clouds: Toward evaluation studies of tag clouds","author":"rivadeneira","year":"2007","journal-title":"Proceeding of SIGCHI Conference on Human Factors in Computing Systems"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/IV.2008.89"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2011.56"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1379092.1379130"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2007.70577"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1177\/0165551506078083"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/IV.2013.5"},{"journal-title":"Understanding the Spatial Distribution of Crime Based on Its Determinants Variables Using Geospatial Discriminative Pattern","year":"2012","author":"wang","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-012-0400-x"},{"key":"6","first-page":"28","article-title":"Crime data mining for indian police information system","volume":"46","author":"gupta","year":"2011","journal-title":"Communications of the ACM"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1297301"},{"key":"4","first-page":"227","article-title":"Crime data mining: An overview and case studies","author":"chen","year":"2003","journal-title":"Proceedings of the 2003 Annual National Conference on Digital Government Research"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2013.01.008"},{"key":"8","first-page":"553","article-title":"Optimization of criminal hot-spots based on underlying crime controlling factors using geospatial discriminative pattern","author":"wang","year":"2012","journal-title":"The 25th International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems"}],"event":{"name":"2014 Tenth International Conference on Computational Intelligence and Security (CIS)","start":{"date-parts":[[2014,11,15]]},"location":"Kunming, Yunnan, China","end":{"date-parts":[[2014,11,16]]}},"container-title":["2014 Tenth International Conference on Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7008825\/7016831\/07016954.pdf?arnumber=7016954","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T00:16:37Z","timestamp":1498176997000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7016954\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cis.2014.145","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}